Domain and DMZ Critical Consideration
Domain and DMZ Critical Consideration
capgemini.com/2011/07/domain-and-dmz-critical-consideration/
It is not a good proposal to place domain controllers or extend internal domain within the
DMZ.
The primary advantage of a DMZ is that it provides a neutral ground, typically for services
that must be accessed (example, Web service) by both internal and external users.
Domain controllers, by their nature, are some of the most highly valued assets within the
organization. These are the servers that control access to the resources on a Windows
network, including the Active Directory database. If an attacker is able to compromise a
domain controller / domain, he or she essentially owns the entire Windows infrastructure.
Therefore, given the immense importance of keeping it protected, placing a domain
controller in DMZ is not a preferable solution.
The most common solution we experience is placing DMZ servers as standalone. If Active
Directory authentication is required to allow internal users privileged access to those servers,
use LDAP authentication back to the domain controller on the internal network. If you do
need a domain controller inside the DMZ to facilitate specific services, we can prefer creating
a separate Active Directory forest within the DMZ and then using a one-way trust mechanism
that permits systems in the DMZ to trust user accounts within the internal forest.
1/2
Now the argument is that by having a separate forest in domain we are increasing
management complexity. Nevertheless, for simplified management can we compromise a
significant security risk? I think we should be very careful regarding domain in DMZ as
otherwise the use of DMZ might be completely ineffective!
2/2