ACTIVE DIRECTORY MANAGEMENT BEST PRACTICES ACTIVE DIRECTORY MANAGEMENT BEST PRACTICES

Similar documents
Attackers Process. Compromise the Root of the Domain Network: Active Directory

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

SECURITY & PRIVACY DOCUMENTATION

The 3 Pillars of SharePoint Security

ANATOMY OF AN ATTACK!

Addressing Cybersecurity in Infusion Devices

Keys to a more secure data environment

10 FOCUS AREAS FOR BREACH PREVENTION

Securing Industrial Control Systems

A (sample) computerized system for publishing the daily currency exchange rates

CS 356 Operating System Security. Fall 2013

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Understanding IT Audit and Risk Management

Cybersecurity Auditing in an Unsecure World

# ROLE DESCRIPTION / BENEFIT ISSUES / RISKS

Cyber Security Audit & Roadmap Business Process and

Security Fundamentals for your Privileged Account Security Deployment

Post-Class Quiz: Access Control Domain

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

How to Improve Your. Cyber Health. Cybersecurity Ten Best Practices For a Healthy Network

Vulnerability Management Policy

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

MU2b Authentication, Authorization and Accounting Questions Set 2

HIPAA Regulatory Compliance

Cyber Security Program

SEVENMENTOR TRAINING PVT.LTD

QuickBooks Online Security White Paper July 2017

Internal Audit Report DATA CENTER LOGICAL SECURITY

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The Top 6 WAF Essentials to Achieve Application Security Efficacy

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor

2. INTRUDER DETECTION SYSTEMS

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

PowerBroker Auditing & Security Suite Version 5.6

Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Securing CS-MARS C H A P T E R

Practical SCADA Cyber Security Lifecycle Steps

Cyber Security. Building and assuring defence in depth

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

Transforming Security from Defense in Depth to Comprehensive Security Assurance

IC32E - Pre-Instructional Survey

GDPR Draft: Data Access Control and Password Policy

Remote Desktop Security for the SMB

Ten Things to Know Before Deploying Active Directory. written by Dmitry Sotnikov. White Paper

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

A Security Model for Space Based Communication. Thom Stone Computer Sciences Corporation

Deploy and Configure Microsoft LAPS. Step by step guide and useful tips

Critical Hygiene for Preventing Major Breaches

Projectplace: A Secure Project Collaboration Solution

System Security Features

Choosing the Right Security Assessment

Network Security Assessment

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

Information Security Policy

InterCall Virtual Environments and Webcasting

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

PREVENTING PRIVILEGE CREEP

Define information security Define security as process, not point product.

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

DIGITAL TRUST Making digital work by making digital secure

Standard for Security of Information Technology Resources

Supporting The Zero Trust Model Of Information Security: The Important Role Of Today s Intrusion Prevention Systems

NETWORK THREATS DEMAN

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation

Cyber security tips and self-assessment for business

FormFire Application and IT Security

Training for the cyber professionals of tomorrow

Guide to Network Defense and Countermeasures Second Edition. Chapter 2 Security Policy Design: Risk Analysis

Secure Application Development. OWASP September 28, The OWASP Foundation

Managing an Active Incident Response Case. Paul Underwood, COO

Interactive Remote Access FERC Remote Access Study Compliance Workshop October 27, Eric Weston Compliance Auditor Cyber Security.

the SWIFT Customer Security

Security of Information Technology Resources IT-12

Security

Cyber Resilience. Think18. Felicity March IBM Corporation

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Incident Response Table Tops

Issues of Operating Systems Security

Caribbean Cyber Security: Not Only Government s Responsibility

Instructor: Eric Rettke Phone: (every few days)

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

E-guide Getting your CISSP Certification

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

CYBER SECURITY AND MITIGATING RISKS

Designing and Operating a Secure Active Directory.

CS6501: Great Works in Computer Science

Heavy Vehicle Cyber Security Bulletin

Canadian Access Federation: Trust Assertion Document (TAD)

Transcription:

ACTIVE DIRECTORY MANAGEMENT BEST PRACTICES 1 ACTIVE DIRECTORY MANAGEMENT BEST PRACTICES Last year, European organizations witnessed a wave of cyberattacks directed against the Active Directory (AD). According to security experts, negligence and unawareness from IT personnel led in most of the cases, to the success of the attacks. The threats to IT security are inexorable, and that's the reason why businesses must take measures to reduce the risks. AD is one of the most critical assets in an organization, so let's analyze which are the best practices to maintain it impregnable. But first, a little bit of theory. Introduction Microsoft released it first with Windows 2000 Server edition, additional improvements were added through the years, and the last version came into view with Windows Server 2008. Active Directory (AD) is a directory service used for Windows domain networks. A domain is the smallest AD structural unit, a logical group (users, hosts, servers). A tree consists of a set of domains that use a common namespace, and the forest combines all the trees. It is a hierarchical structure that stores, manages, and organizes network resources (objects), which can include volumes, folders, files, printers, users, groups, devices, and telephone numbers. It maps the names of network resources to their respective network addresses. It is a core element of a network operating system. A successful cyberattack would reveal the organization's infrastructure, and the perpetrators could access the user accounts, passwords, names, telephone numbers, and applications. Methods used to compromise the AD When an enterprise grows, it grows the structure of the forest AD, adding new trees. All the trees in the forest are typically combined with bidirectional trusts, which allows users in any tree to access resources in any other if they have the appropriate permissions and rights. Let's suppose that a hacker gained primary access with small user privilege, and he sends an email to an employee. The worker, by negligence or unawareness, opens an attachment. Automatically, the attacker receives a shell. Using tools like PowerShell, the payload inject mechanism creates a new session. At that point, it is possible to see all domains in the forest and the trust relationship of the domain.

ACTIVE DIRECTORY MANAGEMENT BEST PRACTICES 2 The invader could even generate a visual map describing all domains and relationships. Having a current PowerShell session (with an imported PowerView module), a hacker can also examine in detail the domain groups and users. From that point on, it is possible to raise the privileges to a local administrator-level, providing access to the objects on the whole network. Best practices 1. Large organizations possess big IT infrastructures. The IT security staff must identify the most critical assets, the ones that store critical information for the organization. The administration of this high-risk assets, such as domain controllers, must be isolated. Only the workers performing their functions can access them. 2. Strict privilege management: The employees should have level access according to the job they execute. Most of them, even those in the IT staff, don t need high-level, or superuser privileges. 3. A correct AD configuration: Misconfiguration issues help hackers. The default security settings might not be appropriate for your organization's requirements. To change the default password policy, and use the NTLMv2 authentication is essential. 4. Implement an appropriate Intrusion Detection System (IDS), and Access Rights Auditor. They stop the malicious traffic from entering or leaving the network, as well as find security risks such as violations of least-privilege access rights, non-expiring passwords, and orphaned objects. The Market is plenty of helpful products like Suricata, SolarWinds, or UTMVAULT. 5. Detect and Patch all Vulnerabilities systematically. 6. Last and not less important: Guarantee Active Directory Backup and Recovery. Remember that the threats to cybersecurity are unavoidable, to keep the backups secures the mitigation process after a breach.