Ir al contenido principal

Break glass vs backdoor accounts

Break glass and backdoor accounts, even though both bypass normal access, they are inherently different. One is a fire extinguisher; the other is a trapdoor.

Break glass accounts: The fire extinguisher 馃Н
Break glass accounts are legitimate emergency access accounts. we may think of them as the “in case of emergency, break glass” option when your identity provider is down, MFA is locked out, or ransomware has frozen your administration console.

They’re:
  • Pre-authorized and documented
  • Highly privileged, often with domain admin or root access
  • Rarely used, and ideally stored offline or in a secure vault
  • Audited and monitored
They’re not inherently dangerous, but if mismanaged or overused, they become a liability. A stale password, a forgotten vault entry, or a lack of logging can turn our safety net into an attacker’s open gate.

Backdoor accounts: The trapdoor 馃毆
Backdoor accounts are unauthorized or hidden access paths, often created by attackers or sometimes by developers who think they need a fast debug access.

They’re:
  • Undocumented, often hardcoded or concealed
  • Designed to bypass authentication
  • Used for persistence, stealth, and privilege escalation
  • Hard to detect, especially if buried in firmware or compiled code
They’re undetected until an incident happens or a good audit detects them.


Both accounts might seem like secret ways in. But the difference is intent and control.
  • Break glass is a controlled bypass, with governance and purpose.
  • Backdoor is an uncontrolled vulnerability, often weaponized.
In practice:
  • We must design and document break glass accounts with expiration, rotation, and alerting.
  • We should hunt for backdoors with threat intel, anomaly detection, and code audits.
Break glass accounts are our safety net but treat them like loaded weapons. Backdoors are our blind spots, hunt them relentlessly.

Comentarios

Entradas populares de este blog

Reporte SOC 2 Type 2 en la seguridad de la informaci贸n

La importancia del reporte SOC 2 Type 2 en la seguridad de la informaci贸n En un entorno digital donde la confianza y la seguridad son fundamentales, las organizaciones deben demostrar que sus pr谩cticas de protecci贸n de datos cumplen con est谩ndares rigurosos. Uno de estos est谩ndares es el SOC 2 (Service Organization Control 2) Type 2 , un informe que eval煤a c贸mo una empresa maneja la seguridad, disponibilidad, integridad del procesamiento, confidencialidad y privacidad de los datos. Este reporte es esencial para empresas que manejan informaci贸n sensible, ya que proporciona evidencia objetiva sobre su capacidad para proteger la informaci贸n de sus clientes y socios comerciales. ¿Qu茅 es un reporte SOC 2 Type 2? El SOC 2 Type 2  es un informe de auditor铆a que eval煤a los controles internos de una organizaci贸n  relacionados con la seguridad de la informaci贸n. Desarrollado por la AICPA (American Institute of Certified Public Accountants), este informe sigue los Criterios de Servicios...

Managing Cyber Risks: Third-Party and End-User Challenges

馃攼 Managing Cyber Risks: Third-Party and End-User Challenges Our organizations face a multitude of cyber threats that can compromise data integrity, disrupt operations, and damage reputations. Among the most challenging risks are those posed by third parties and end users. These risks often operate outside the direct control of the organization, yet their actions or inactions can have profound security implications. Understanding these risks and implementing effective controls is essential for building a resilient cybersecurity posture. 馃敆  Third-Party Risks arises when organizations rely on external vendors, suppliers, or service providers who have access to our sensitive systems or data. These partners may not adhere to the same security standards, creating vulnerabilities that can be exploited by malicious actors. High-profile breaches, such as those involving supply chain attacks, have underscored the dangers of insufficient oversight in third-party relationships. The challeng...

Compendio de terminolog铆a computacional / Compendium of Computational Terminology

1a versi贸n: 22/julio/2023 Actualizado: 9/abril/2026 2FA: Two-Factor Authentication 3DEA: Triple Data Encryption Algorithm 3DES: Triple DES 3PS: Third Person Shooter AAM: Agentic Access Management AC: Access Control ACL: Access Control Lists AES: Advanced Encryption Standard AI: Artificial Intelligence AIoT: Artificial Intelligence of Things AitM:  Adversary-in-the-Middle AML: Anti-Money Laundering AOC: Attestation Of Compliance API: Application Programming Interface APT: Advanced Persistent Threat ASCII: American Standard Code for Information Interchange ASM: Attack Surface Management ASPM: Application Security Posture Management ASV: Approved Scanning Vendor for PCI ATM: Automated Teller Machine ATT$CK: Adversarial Tactics, Techniques, and Common Knowledge AV: Antivirus AWS: Amazon Web Service B2B: Business to Business B2C: Business to Consumer BAS: Breach and Attack Simulation BAU: Business As Usual BBP: Bug Bounty Program BCM: Business Continuity Management ...