insights

Securing Keys and Credentials: Lessons from the Treasury Cyber Incident

Bill Church

Bill Church

January 6, 2025

Securing Keys and Credentials

How It All Unfolded

The incident began when BeyondTrust, a privileged access management provider, discovered that an API key for their Remote Support SaaS solution had been compromised. On December 5th, 2024, their investigation revealed that this compromise affected a limited number of customers, including the Treasury. Upon discovery, BeyondTrust immediately revoked the compromised API key and suspended affected instances, providing alternative Remote Support SaaS instances to maintain business continuity. However, before these remediation steps were taken, attackers had already leveraged the compromised API key to access affected systems undetected.

Why This Matters

Government systems maintain highly sensitive information. As noted by Senate Banking Committee officials, "Treasury maintains some of the most highly sensitive information on U.S. persons throughout government, including tax information, business beneficial ownership, and suspicious activity reports."

Modern Security Approaches

Ephemeral Authentication

Think about hotel key cards that expire after your stay—that's similar to ephemeral authentication. Imagine applying this concept to every piece of organizational access. Grant someone admin access for exactly as long as they need it, then have it automatically disappear. No more forgotten active credentials floating around.

Just-in-Time Access

Instead of giving people permanent access to systems they might use infrequently, set up a system where they can request access when needed. It's like having a virtual security guard who checks your ID, notes why you're there, and escorts you out when finished.

Practical Steps You Can Take Now

  1. Take a fresh look at your API security. If you're not automatically tracking what APIs you have and who's using them, start there.
  2. Make testing automatic. Your security testing should happen regularly, not just during annual audits.
  3. Keep an eye on things constantly. Set up systems that validate your security in real-time.
  4. Get serious about vendor assessment. Know exactly what security measures your vendors have in place, especially for tools accessing your systems.
  5. Make authentication smarter. Implement systems that automatically generate and destroy credentials based on actual need.
  6. Set up just-in-time access. Create workflows that give people access when they need it and automatically revoke it when done.

Looking Ahead

As systems become more connected, they grow more complex. The Treasury incident shows that even secure organizations can be vulnerable without proper focus. By learning from this incident and implementing smarter security measures, organizations can make it much harder for attackers to succeed.

The best time to strengthen security isn't after a breach—it's right now. Every additional security measure is like adding another lock to your door. Determined attackers might still get in, but they'll work much harder and make more noise doing it.

federal iam data-protection
Bill Church

Bill Church

Vice President, Engineering & Services

LinkedIn