Formal, Professional
Formal, Authoritative
The Cybersecurity and Infrastructure Security Agency (CISA) identifies robust remote access protocols as critical infrastructure components; their compromise poses significant operational risks. Increasingly, organizations globally face the challenge where remote access may be permitted for privileged functions, granting elevated permissions to geographically dispersed users. Secure Shell (SSH), a prevalent protocol for remote administration, requires stringent configuration and monitoring to mitigate vulnerabilities exploited by malicious actors. Misconfigured SSH implementations, coupled with inadequate identity and access management (IAM) policies, expose systems to unauthorized modifications, exemplified in the recent data breaches attributed to compromised privileged remote sessions within the financial sector.
Securing the Digital Gateway: The Imperative of Secure Remote Access
In today’s interconnected world, secure remote access is no longer a luxury but a fundamental requirement for organizations of all sizes. The digital landscape has shifted dramatically, compelling businesses to embrace remote work and distributed operations. This transformation, while offering numerous advantages, has simultaneously expanded the attack surface and intensified the need for robust security measures.
The Rise of Remote Work and Its Security Ramifications
The surge in remote work arrangements has redefined the traditional security perimeter. Employees now connect to corporate networks from diverse locations and using a myriad of devices, many of which may lack adequate security controls.
This decentralization creates new vulnerabilities and complexities for IT teams striving to maintain confidentiality, integrity, and availability of critical assets.
The implications of this shift demand a proactive and comprehensive approach to securing remote access, ensuring that sensitive data remains protected regardless of where employees are working.
The Cost of Compromise: Consequences of a Remote Access Breach
A successful remote access breach can have devastating consequences for an organization. Data loss is a primary concern, as attackers may gain unauthorized access to sensitive customer information, intellectual property, or financial records.
Beyond data loss, breaches can also result in significant financial damage, including costs associated with incident response, legal fees, regulatory fines, and reputational damage. The reputational harm stemming from a security incident can erode customer trust and negatively impact long-term business prospects.
It is therefore essential to view secure remote access not merely as a technical implementation, but as a strategic imperative for safeguarding organizational stability and ensuring business continuity.
Measuring Security Posture: Introducing the "Closeness Rating"
To effectively manage and improve remote access security, organizations need a way to assess the strength of their existing controls. We propose the concept of a "Closeness Rating," a metric that quantifies how closely a particular remote access method aligns with best-practice security principles.
This rating would take into account factors such as the strength of authentication, the level of access granted, the use of encryption, and the implementation of monitoring and auditing controls.
By assigning a Closeness Rating to each remote access method, organizations can identify areas for improvement and prioritize remediation efforts.
This proactive assessment enables informed decision-making and strengthens the overall security posture.
The Power of Layers: A Defense-in-Depth Approach
The most effective way to secure remote access is through a layered security approach, also known as defense-in-depth. This strategy involves implementing multiple layers of security controls, so that if one layer fails, others are in place to prevent a breach.
These layers might include strong authentication mechanisms, network segmentation, intrusion detection systems, and endpoint protection solutions. By combining multiple security measures, organizations can significantly reduce the risk of a successful attack.
A layered approach ensures that even if an attacker manages to bypass one security control, they will encounter additional obstacles, making it more difficult to compromise the system.
Guardians of the Gateway: Key Roles and Responsibilities in Secure Remote Access
Securing remote access is not solely a technological challenge; it’s a multifaceted organizational endeavor. A robust security posture hinges on clearly defined roles and responsibilities across various teams. Understanding these roles ensures accountability and fosters a collaborative environment where security is a shared concern.
System Administrators: Securing the Foundation
System administrators are at the forefront, managing the very systems that require secure remote access. Their primary duty is ensuring the underlying operating systems and applications are hardened against attack.
This includes implementing strong security configurations, promptly applying patches, and diligently monitoring system logs for suspicious activity. Privileged access management (PAM) is critical, restricting access to sensitive functions.
Database Administrators (DBAs): Protecting the Data Vault
DBAs are entrusted with the administration and maintenance of databases, often containing an organization’s most valuable data. Securing remote access to databases demands stringent measures.
They must implement robust authentication mechanisms, encrypt data both in transit and at rest, and meticulously audit all remote access activities. Least privilege principles are paramount, granting only the necessary permissions for specific tasks.
Network Engineers: Fortifying the Network Perimeter
Network engineers are responsible for maintaining the network infrastructure and ensuring secure remote access points. They configure and manage firewalls, intrusion detection systems, and VPN gateways to create a secure perimeter.
Regular security assessments are crucial to identify and address vulnerabilities in the network infrastructure. They must also monitor network traffic for anomalies that could indicate a breach.
Security Administrators/Analysts: Enforcing the Security Posture
Security administrators and analysts play a vital role in implementing and enforcing security policies for remote access. They define access controls, configure security tools, and monitor systems for security incidents.
Incident response planning is a key responsibility, ensuring a swift and effective response to any security breach. Continuous monitoring and analysis of security logs are essential for detecting and mitigating threats.
Incident Response Teams: Rapid Containment and Remediation
During security incidents, incident response teams require immediate and secure remote access to affected systems. Their mission is to rapidly contain and remediate the breach, minimizing the impact on the organization.
Secure communication channels are essential for coordinating the response. They must also have access to forensics tools to investigate the incident and identify the root cause.
IT Support/Help Desk Staff (with elevated privileges): Secure Assistance
IT support and help desk staff often require temporary, elevated privileges to provide remote assistance to users. Granting these privileges securely is crucial.
Just-in-time (JIT) access should be implemented, providing privileges only when needed and revoking them immediately afterward. All remote support sessions must be carefully monitored and audited.
Compliance Officers/Auditors: Ensuring Regulatory Alignment
Compliance officers and auditors review logs and security controls to ensure regulatory compliance. They assess whether remote access security practices align with industry standards and legal requirements.
Regular audits are essential for identifying gaps in security controls and ensuring compliance. Their findings should inform improvements to remote access security policies and procedures.
Chief Information Security Officer (CISO): Strategic Oversight
The CISO has overall responsibility for the organization’s remote access security posture. They develop and implement security strategies, oversee security policies, and ensure that security controls are effective.
Risk management is a key aspect of their role, identifying and mitigating risks associated with remote access. The CISO must also stay informed about emerging threats and adapt security strategies accordingly.
Third-Party Vendors/Consultants: Managing External Access
Granting remote access to third-party vendors and consultants introduces significant security risks. These external parties must be carefully managed to prevent breaches.
Vendor risk assessments are crucial to evaluate the security posture of third-party vendors. Access should be granted only for specific tasks and tightly controlled. Regular monitoring of vendor activity is essential.
The Arsenal of Security: Core Technologies for Secure Remote Access
Having defined the crucial roles in securing remote access, it’s imperative to examine the technologies that form the backbone of a secure remote access infrastructure. These tools, when properly implemented and configured, are the front line of defense against unauthorized access and malicious activity.
This section will explore the purpose, functionality, and critical security considerations of these core technologies.
Virtual Private Networks (VPNs): Establishing Secure Tunnels
VPNs are a cornerstone of secure remote access, creating encrypted tunnels between a remote device and the organization’s network. This effectively extends the trusted network perimeter to remote users, safeguarding data in transit.
However, VPNs are not a panacea. The security of a VPN depends heavily on the strength of the encryption protocols used, the configuration of the VPN server, and the security of the endpoint devices connecting to the VPN.
Furthermore, split tunneling, where only some traffic is routed through the VPN, can introduce vulnerabilities if not carefully managed. Modern alternatives like Zero Trust Network Access (ZTNA) are increasingly favored for their granular control and application-level access.
Remote Desktop Protocol (RDP): Securing Remote GUI Access
RDP, Microsoft’s proprietary protocol, enables users to remotely access and control a graphical desktop environment. While RDP offers convenience, it’s a frequent target for attackers.
Default configurations are often insecure, and vulnerabilities in RDP implementations have been exploited in numerous high-profile breaches.
Securing RDP requires a multi-faceted approach. This includes:
- Strong Authentication: Implementing multi-factor authentication (MFA) is crucial.
- Network Segmentation: Limiting RDP access to specific networks or systems.
- Regular Patching: Keeping RDP servers and clients up-to-date with the latest security patches.
- Monitoring: Actively monitoring RDP traffic for suspicious activity.
- Consider alternatives: Evaluate alternatives such as jump servers or ZTNA for enhanced security.
Secure Shell (SSH): Protecting Command-Line Access
SSH provides a secure, encrypted channel for command-line access to remote servers and network devices. It’s essential for system administrators and developers who need to manage systems remotely.
However, like RDP, SSH can be vulnerable if not properly secured. Weak passwords, default configurations, and unpatched vulnerabilities can all be exploited by attackers.
Key security measures for SSH include:
- Key-Based Authentication: Disabling password-based authentication in favor of stronger key-based authentication.
- Regular Key Rotation: Periodically rotating SSH keys to minimize the impact of potential key compromise.
- Restricting Access: Limiting SSH access to specific users and IP addresses.
- Monitoring: Monitoring SSH logs for suspicious activity.
Jump Servers (Bastion Hosts): Minimizing Exposure
Jump servers, also known as bastion hosts, act as intermediaries between remote users and internal resources. Instead of directly accessing sensitive systems, users first connect to the hardened jump server, which then facilitates access to the target system.
This approach significantly reduces the attack surface by limiting the number of systems directly exposed to the external network. Jump servers should be hardened with security best practices, including:
- Minimal Software: Installing only the necessary software.
- Strong Authentication: Enforcing MFA.
- Strict Access Controls: Limiting access to authorized users.
- Regular Auditing: Regularly auditing jump server logs.
Privileged Access Management (PAM) Solutions: Governing Elevated Privileges
PAM solutions provide a comprehensive approach to managing, monitoring, and controlling privileged access. They help organizations enforce the principle of least privilege, granting users only the minimum level of access required to perform their tasks.
PAM solutions offer a range of features, including:
- Password Vaulting: Securely storing and managing privileged credentials.
- Session Recording: Recording and auditing privileged access sessions.
- Just-in-Time Access: Granting privileged access only when needed.
- Multi-Factor Authentication: Enforcing MFA for privileged access.
- Policy Enforcement: Enforcing security policies related to privileged access.
Multi-Factor Authentication (MFA): Adding an Extra Layer of Security
MFA adds an essential layer of security by requiring users to provide multiple forms of authentication before granting access. This significantly reduces the risk of unauthorized access, even if a password is compromised.
Common MFA methods include:
- Something You Know: Password or PIN.
- Something You Have: Security token, smartphone app.
- Something You Are: Biometrics (fingerprint, facial recognition).
Deploying MFA across all remote access points is a critical security measure.
Endpoint Detection and Response (EDR) Solutions: Protecting Remote Endpoints
EDR solutions provide real-time monitoring and threat detection on endpoint devices, including laptops and desktops used for remote access. They can detect and respond to malicious activity, such as malware infections and unauthorized access attempts.
EDR solutions typically include features such as:
- Behavioral Analysis: Identifying suspicious activity based on user and system behavior.
- Threat Intelligence Integration: Correlating endpoint activity with threat intelligence feeds.
- Automated Response: Automatically isolating infected devices and remediating threats.
Remote Monitoring and Management (RMM) Tools: Balancing Convenience and Security
RMM tools enable IT support teams to remotely monitor and manage systems. While they offer convenience, they also introduce potential security risks.
Compromised RMM tools can provide attackers with widespread access to managed systems.
Organizations using RMM tools should implement the following safeguards:
- Secure RMM Platform: Choosing a reputable RMM vendor with strong security practices.
- Strong Authentication: Enforcing MFA for RMM access.
- Principle of Least Privilege: Limiting RMM access to authorized personnel.
- Network Segmentation: Isolating RMM servers and clients from sensitive systems.
- Regular Auditing: Regularly auditing RMM activity.
Cloud Platforms (AWS, Azure, GCP): Securing Cloud-Based Remote Access
Cloud platforms offer a wide range of services that can be accessed remotely. Securing remote privileged access to cloud resources is critical. This requires a combination of cloud-native security controls and best practices.
Key security considerations for cloud-based remote access include:
- Identity and Access Management (IAM): Using IAM roles and policies to control access to cloud resources.
- Multi-Factor Authentication: Enforcing MFA for all privileged access to cloud consoles and APIs.
- Network Security Groups (NSGs): Using NSGs to restrict network access to cloud resources.
- Security Information and Event Management (SIEM): Collecting and analyzing security logs from cloud platforms.
- Cloud-Native PAM: Utilizing cloud-native PAM solutions to manage privileged access to cloud resources.
Building the Foundation: Foundational Security Concepts for Remote Access
Having defined the crucial roles in securing remote access, it’s imperative to examine the foundational security concepts that underpin a secure remote access infrastructure. These principles, when diligently applied, form the bedrock of a robust defense against unauthorized access and potential breaches. Understanding and implementing these concepts is paramount to establishing a secure remote environment.
The Principles of Least Privilege and Need-to-Know
The principles of least privilege and need-to-know are cornerstones of any robust security architecture. Least privilege dictates that users should only be granted the minimum level of access necessary to perform their assigned tasks. This significantly reduces the potential attack surface, limiting the damage an attacker can inflict should a user account be compromised.
Need-to-know complements least privilege by restricting access to sensitive information only to those individuals whose job functions genuinely require it. This principle acknowledges that even authorized users should not have unfettered access to all data.
Applying these principles requires a thorough understanding of user roles and responsibilities. Regular reviews of access permissions are essential to ensure they remain aligned with evolving business needs and security requirements.
Embracing Zero Trust Security
The traditional security model often operates under the assumption that anything inside the network perimeter is inherently trustworthy. Zero Trust fundamentally challenges this assumption. Zero Trust operates on the principle of "never trust, always verify," requiring continuous authentication and authorization for every user, device, and application, regardless of their location.
Implementing Zero Trust requires a multi-faceted approach, including strong authentication mechanisms, micro-segmentation of the network, and continuous monitoring of user activity. While challenging to implement fully, the benefits of a Zero Trust model in mitigating lateral movement and containing breaches are undeniable.
Just-in-Time (JIT) Access: Minimizing the Attack Window
Just-in-Time (JIT) access is a powerful strategy for reducing the window of opportunity for attackers to exploit privileged accounts. JIT access grants privileged access only when it is needed and for a limited duration. This ensures that highly privileged accounts are not constantly active, significantly reducing the risk of compromise.
JIT access often integrates with Privileged Access Management (PAM) solutions to automate the process of granting and revoking access. This ensures that access is granted quickly when needed but also revoked promptly, minimizing the risk of misuse.
Break Glass Accounts: Controlled Emergency Access
Break glass accounts, also known as emergency access accounts, provide a mechanism for gaining access to critical systems in exceptional circumstances when normal access methods are unavailable. These accounts should be highly secured, strictly controlled, and meticulously monitored.
The use of break glass accounts should trigger immediate alerts and require justification. Regular audits of break glass account usage are essential to ensure they are not being misused.
Session Monitoring: A Critical Layer of Visibility
Session monitoring involves recording and auditing remote access sessions to detect and investigate suspicious activity. Comprehensive session monitoring provides invaluable insights into user behavior and can help identify potential security breaches in real-time.
Session recordings can be used to reconstruct security incidents, identify compromised accounts, and improve security controls. Automated analysis of session data can also help identify anomalous behavior that warrants further investigation.
Mitigating Privilege Escalation and Lateral Movement
Privilege escalation occurs when an attacker gains unauthorized privileged access to a system or application. Lateral movement is the process by which an attacker moves from one compromised system to another within the network. These are two tactics frequently used in modern attacks.
Robust security controls, such as least privilege, network segmentation, and endpoint detection and response (EDR) solutions, are essential for preventing privilege escalation and lateral movement. Continuous monitoring of user activity and system logs can also help detect and respond to these types of attacks in their early stages.
Authentication and Authorization: Verifying Identity and Access
Strong authentication and authorization mechanisms are fundamental to secure remote access. Authentication verifies the identity of a user, while authorization determines what resources they are allowed to access.
Multi-Factor Authentication (MFA) is a critical security control that adds an extra layer of protection beyond usernames and passwords. Implementing role-based access control (RBAC) ensures that users are only granted access to the resources they need based on their job roles.
Risk Assessment and Secure Configuration Management
Regular risk assessments are essential for identifying and evaluating threats and vulnerabilities associated with remote access. A thorough risk assessment should consider all aspects of the remote access infrastructure, including hardware, software, and user behavior.
Secure configuration management involves establishing and enforcing secure configurations for all systems involved in remote access. This includes hardening operating systems, patching vulnerabilities promptly, and disabling unnecessary services.
The Threat Landscape: Navigating the Perils of Remote Access Security
Building the Foundation: Foundational Security Concepts for Remote Access.
Having defined the crucial roles in securing remote access, it’s imperative to examine the foundational security concepts that underpin a secure remote access infrastructure. These principles, when diligently applied, form the bedrock of a robust defense against unauthorized access and malicious activities. However, even the most meticulously crafted security architecture can be compromised if we fail to understand and address the specific threats targeting remote access systems.
The modern threat landscape is rife with perils that exploit vulnerabilities in remote access protocols and configurations. To effectively protect organizational assets, a comprehensive understanding of these threats is paramount.
This section delves into the prevailing threats to remote access security, examining their mechanisms and proposing actionable preventative measures.
Credential Theft: The Gateway to Compromise
Credential theft remains one of the most prevalent and damaging threats to remote access security. Attackers frequently employ phishing campaigns, deploy malware, or exploit social engineering tactics to obtain usernames and passwords. These stolen credentials then grant unauthorized access to sensitive systems and data.
The consequences of credential theft can be far-reaching, leading to data breaches, financial losses, and reputational damage. Organizations must implement robust defenses to protect against this persistent threat.
Safeguarding Credentials
- Multi-Factor Authentication (MFA): Implementing MFA is crucial to add an extra layer of security beyond usernames and passwords. Even if credentials are stolen, attackers will still need to bypass the additional authentication factor.
- Phishing Awareness Training: Educating users about phishing scams and how to identify suspicious emails or websites is essential. Regular training and simulated phishing exercises can help users develop a healthy skepticism.
- Password Management Policies: Enforce strong password policies that require complex passwords and regular password changes. Encourage the use of password managers to securely store and manage credentials.
Password Cracking: Undermining Weak Defenses
Even without resorting to theft, attackers can attempt to crack passwords through brute-force attacks or by exploiting known vulnerabilities in password hashing algorithms. Weak or easily guessable passwords are particularly vulnerable to these attacks.
Fortifying Password Security
- Strong Password Policies: Enforce minimum password length and complexity requirements. Prohibit the use of easily guessable passwords, such as dictionary words or personal information.
- Password Salting and Hashing: Use strong password hashing algorithms with unique salts to protect stored passwords. This makes it significantly more difficult for attackers to crack passwords even if they gain access to the password database.
- Regular Password Audits: Conduct regular password audits to identify weak or compromised passwords. Prompt users to change any passwords that are found to be vulnerable.
Malware Infections: Planting the Seeds of Destruction
Malware can be delivered through various remote access channels, including infected files, malicious websites, or compromised software. Once installed, malware can steal data, disrupt operations, or even grant attackers complete control over the compromised system.
Preventing Malware Intrusions
- Endpoint Protection: Deploy endpoint protection software on all devices that are used for remote access. This software should include real-time scanning, behavioral analysis, and automatic updates.
- Intrusion Detection Systems (IDS): Implement an IDS to monitor network traffic for suspicious activity. An IDS can detect and block malware infections before they can cause damage.
- User Awareness Training: Educate users about the risks of malware and how to avoid clicking on suspicious links or downloading infected files.
Ransomware Attacks: Holding Data Hostage
Ransomware attacks have become increasingly prevalent and sophisticated, posing a significant threat to organizations of all sizes. Attackers can use remote access vulnerabilities to gain access to a network and encrypt critical data, demanding a ransom payment in exchange for the decryption key.
Mitigating Ransomware Risks
- Data Backups: Regularly back up critical data to an offsite location. This ensures that data can be restored even if it is encrypted by ransomware.
- Incident Response Plan: Develop and test an incident response plan that outlines the steps to be taken in the event of a ransomware attack. This plan should include procedures for isolating infected systems, contacting law enforcement, and restoring data from backups.
- Network Segmentation: Segment the network to limit the spread of ransomware. This can prevent attackers from encrypting the entire network if they gain access to one system.
Insider Threats: The Enemy Within
Insider threats, whether malicious or negligent, can pose a significant risk to remote access security. Employees or contractors with privileged access can intentionally or unintentionally compromise systems and data.
Addressing Insider Risks
- Least Privilege: Grant users only the minimum level of access required to perform their job functions. This limits the potential damage that an insider can cause.
- Background Checks: Conduct thorough background checks on all employees and contractors who will have access to sensitive systems.
- Monitoring and Auditing: Monitor user activity and audit logs to detect suspicious behavior.
Vulnerability Exploitation: Capitalizing on Weaknesses
Attackers constantly scan for vulnerabilities in remote access software and systems. Unpatched vulnerabilities can provide attackers with an easy entry point into a network.
Staying Ahead of Vulnerabilities
- Patch Management: Implement a robust patch management program to ensure that all systems are promptly patched with the latest security updates.
- Vulnerability Scanning: Regularly scan systems for vulnerabilities using automated vulnerability scanning tools.
- Penetration Testing: Conduct penetration testing to simulate real-world attacks and identify weaknesses in the security posture.
Brute-Force Attacks: Relentless Assaults
Brute-force attacks involve systematically trying different usernames and passwords until the correct combination is found. These attacks can be automated and can be used to target any system that requires authentication.
Countering Brute-Force Attempts
- Account Lockout Policies: Implement account lockout policies to prevent attackers from repeatedly trying to guess passwords. After a certain number of failed login attempts, the account should be locked for a specified period of time.
- Intrusion Detection Systems (IDS): Use an IDS to detect and block brute-force attacks. An IDS can identify and block suspicious login attempts from the same IP address or user account.
- Rate Limiting: Implement rate limiting to restrict the number of login attempts that can be made within a given time period.
Social Engineering: Manipulating Human Behavior
Social engineering attacks rely on manipulating human behavior to gain access to systems or data. Attackers may impersonate legitimate users, trick users into revealing sensitive information, or persuade users to install malware.
Strengthening the Human Firewall
- User Awareness Training: Educate users about social engineering tactics and how to recognize and avoid them.
- Verification Procedures: Implement verification procedures for requests for sensitive information or access.
- Skepticism: Encourage users to be skeptical of unsolicited requests and to verify the identity of anyone asking for sensitive information.
Remote Code Execution (RCE): Gaining Unfettered Control
Remote Code Execution (RCE) vulnerabilities allow attackers to execute arbitrary code on a remote system. This can give attackers complete control over the compromised system and allow them to steal data, install malware, or disrupt operations.
Eliminating RCE Pathways
- Patch Management: Promptly patch systems to address known RCE vulnerabilities.
- Configuration Management: Implement secure configuration management practices to minimize the risk of introducing new RCE vulnerabilities.
- Intrusion Prevention Systems (IPS): Use an IPS to detect and block attempts to exploit RCE vulnerabilities.
By understanding these prevailing threats and implementing the recommended preventative measures, organizations can significantly enhance their remote access security posture and protect themselves from the ever-evolving threat landscape. It is critical to view security as a continuous process, requiring constant vigilance and adaptation.
FAQs: Remote Access Security: Privileged Function Risk
What is meant by "Privileged Function Risk" in the context of remote access?
Privileged Function Risk refers to the increased danger posed when remote access may be permitted for privileged functions. These functions, like system configuration or data modification, could be exploited by attackers gaining unauthorized remote access, leading to severe security breaches and data loss. Mitigating this risk requires stringent security measures.
Why is securing privileged remote access more critical than standard remote access?
Privileged accounts grant elevated permissions. If compromised through remote access, an attacker can bypass normal security controls. They can then access sensitive data, alter configurations, or even take complete control of systems. Because remote access may be permitted for privileged functions, protecting it becomes paramount to safeguard critical assets.
What are some key security measures to mitigate Privileged Function Risk for remote access?
Multi-factor authentication (MFA) adds an extra layer of security beyond passwords. Least privilege principles limit access to only what is necessary. Strong monitoring and auditing track remote access activities for anomalies. Properly implemented jump servers or privileged access management (PAM) solutions can also protect privileged accounts when remote access may be permitted for privileged functions.
How does using a VPN help manage Privileged Function Risk with remote access?
A VPN creates an encrypted tunnel for remote connections, securing data in transit. While VPNs enhance security, they are not a complete solution for privileged access. Additional controls are still required, especially when remote access may be permitted for privileged functions, to specifically protect the accounts themselves. Combine VPNs with MFA, strong access controls, and PAM solutions for comprehensive protection.
So, securing remote access may be permitted for privileged functions boils down to vigilance and a layered approach. Don’t just tick boxes; understand the risks and proactively adapt your defenses. Stay informed, stay cautious, and keep those digital keys locked up tight!