Active Directory Security
Active Directory Security
Active Directory Security
Active Directory
Dana J. Willis
Security Engineer
NetIQ Corporation
[email protected]
Securing Active Directory Agenda
Planning
Creating
− Establish Secure AD Boundaries
− Deploy Secure Domain Controllers
− Establish Secure Domain and DC Policies
− Establish Secure Administrative Practices
− Secure DNS
Maintaining
− Maintain Secure Domain Controller Operations
− Staying Current with Service Packs and Security Hotfixes
− Monitor the AD Infrastructure
Best Practices Summary
AD Security Solutions to Invest In
Active Directory Security Fundamentals
Forests Schema NC
Domains ACLs
Trusts Authentication
Kerberos Authorization
OUs Replication
Group policy (GPO’s) FSMOs
Configuration NC Delegation
Planning AD Security
Considerations upon deployment of AD DC’s
− Datacenter
− Centralized & Secure
− High End Performance
− Branch Offices
− Lack of IT Expertise
− Slow connectivity to rest of organization
Planning AD Security
Identifying Types of Threats
− Spoofing
− Data Tampering
− Repudiation
− Information Disclosure
− Denial of Service
− Elevation of Privilege
− Social Engineering
Identifying Sources of Threats
− Anonymous Users
− Authenticated Users
− Service Administrators
− Data Administrators
− Users with Physical Access
Establishing Secure AD Boundaries
Delegation of Administration
− Needs to be flexible, limited, secure, dynamic and meet
the needs of the organization based upon need for
autonomy and isolation
Forest/Domain Model
Establish Secure Trusts
Deploying Secure Domain Controllers
Establish secure domain controller build practices
− Limit physical access to trusted personnel
− Restricted access area
− Build automated process for installation of DC’s
− SYSPREP, RIS, Unattended Setup
Deploying Secure Domain Controllers
Ensure predictable, repeatable, and secure domain
controller deployments.
− Create strong administrator password
− 9 characters, non-dictionary, symbols, etc.
− Use TCP/IP only if possible
− Disable non-essential services
− IIS, Messenger, SMTP, Telnet, etc.
− Format partitions with NTFS
− Install latest service packs and security updates
− Prohibit the use of cached credentials when unlocking DC
console
− Install anti-virus scanning software
− Maintain Secure Physical Access to Domain Controllers
Establish Secure Domain and Domain
Controller Policy Settings
Domain Policies
− Password Policies
− History
− Age
− Length
− Complexity
− Lockout Policy
− Duration
− Threshold
− Reset
Establish Secure Domain and Domain
Controller Policy Settings
Domain Controller Policies
− User Rights
− Log on locally
− System Shutdown
− Enable Auditing
− Account logon
− Account Management
− Directory Service Access
− Logon events
− Policy changes
− System events
− Event Logging
− Security log size set to 128 MB
− Retention – set to overwrite events as needed
Establishing Secure Administrative Practice
Secure Service Admin Accounts
− Enterprise Admins
− Schema Admins
− Administrators
− Domain Admins – rename this acct
− Server Operators
− Account Operators
− Backup Operators
Best Practices
− Rename the administrator account
− Limit the number of service admin accts
− Separate administrator accts from end user accts
− Use delegation solution from 3rd Party
Deploy Secure DNS
Protecting DNS Servers
− Use Active Directory–integrated DNS zones.
− Implement IPSec between DNS clients and servers
− Protect the DNS cache on domain controllers.
− Monitor network activity.
− Close all unused firewall ports.
Protecting DNS Data
− Use secure dynamic update.
− Ensure that third-party DNS servers support secure dynamic
update.
− Ensure that only trusted individuals are granted DNS
administrator privileges
− Set ACLs on DNS data.
− Use separate internal and external namespaces.
Maintaining Secure AD Operations
Domain Controller and Administrative
Workstation Security
− DC backup and restore.
− Limit backup services and media to secure location.
− Develop a secure remote backup process.
− Ensure backup media is available when needed.
− DC and administrative workstation hardware retirement.
− DC and administrative workstation virus scans
− Obtain regular virus signature updates.
Maintaining Secure AD Operations
Stay Current with Security Hotfixes and Service
Packs
− Select a Security Update Strategy
− Select Notification, Deployment, and Auditing Methods
− Microsoft Security Notification Service Newsletter
− Windows Update Service
− Software Update Services
Maintaining Secure AD Operations
Deploying Security Hotfixes and Service Packs
− Obtain notification and download most current
− Windows Update and SUS
− Evaluate the threat
− Arrange to install
− Test the updates on Domain Controllers in a test lab
− Distribute and Deploy to production environment
− Windows Update and SUS
Maintaining Secure AD Operations
Maintain Baseline Information
− Create a baseline database of Active Directory infrastructure
information.
− Audit Policies
− List of GPO’s and their assignments
− List of Trusts
− List of Domain Controllers, Administrative workstations
− Service Administrators
− Operations Masters (FSMO roles)
− Replication topology
− Database size (.DIT file)
− OS version, Service Packs, Hotfixes, Anti-Virus version
− Detect and verify infrastructure changes
− Update Baseline information
Maintaining Secure AD Operations
Monitoring the AD Infrastructure
− Collect information in real time or at specified time
intervals.
− Security Event Logs
− Compare this data with previous data or against a
threshold value.
− Respond to a security alert as directed in your
organization’s practices.
− Summarize security monitoring in one or more regularly
scheduled reports
Maintaining Secure AD Operations
Monitoring the AD Infrastructure
− Monitoring Forest-level Changes
− Detect changes in the Active Directory schema.
− Identify when domain controllers are added or
removed.
− Detect changes in replication topology.
− Detect changes in LDAP policies.
− Detect changes in dSHeuristics.
− Detect changes in forest-wide operations master
roles.
Maintaining Secure AD Operations
Monitoring Domain-level Changes
− Detect changes in domain-wide operations master roles.
− Detect changes in trusts.
− Detect changes in AdminSDHolder.
− Detect changes in GPOs for the Domain container and
the Domain Controllers OU.
− Detect changes in GPO assignments for the Domain
container and the Domain Controllers OU.
− Detect changes in the membership of the built-in groups.
− Detect changes in the audit policy settings for the
domain.
Maintaining Secure AD Operations
Monitoring Service Admin and Admin Workstation Changes
− Detect changes in service administrator accounts.
− Detect changes in GPOs for the Service Administrators controlled subtree.
− Detect changes in GPO assignments for the Service Administrators
controlled subtree.
Monitoring for Disk Space Consumed by Active Directory Objects
− Monitor for an inordinately large number of normal-sized objects.
− Monitor for a limited number of extraordinarily large-sized objects.
Monitoring Domain Controller Availability
− Monitor domain controllers for active status.
− Monitor domain controllers for restarts.
Monitoring Changes in Domain Controller Performance Counters
− Detect changes in domain controller system resources.
− Detect changes in LDAP responsiveness.
Maintaining Secure Active Directory Operations
Data center
− Access list
− Cleared personnel
− Segregated equipment rack
− Tamper proof cages
Domain controllers
− Highly restricted
Cabling
− Concrete harden
Best Practices
DC policies
Enable auditing
Disable anonymous connections
Digitally sign client communications
Disable cached credentials
See Best Practice Guide
Best Practices
Domain Policies