Application Security

2/20/2017
12:00 PM
Derek Melber
Derek Melber
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Controlling Privileged Access To Prevent Rogue Users In Active Directory

Knowing which of your employees have which privileges is the first step to staying safe.

Often, a rogue user is an internal employee who has been granted privileges that he or she shouldn't have. Controlling privileges for your Windows servers, domain controllers, and Active Directory environment is key to limiting what your users can do. The problem is knowing who has privileges and how to restrict those privileges.

But there is a solution! First, you need to report on each area that grants privileged access to ensure the privileges are correct. If they are not correct, simply set the privileges to the appropriate level.

The following is a list of security controls that grant privileges within your Microsoft environment:

  • Group membership (domain admins, enterprise admins, Exchange admins, etc.)
  • User rights (backup files and folders, change system time, system shutdown, etc.)
  • File and folder permissions (access control lists for databases, IP files, etc.)
  • Delegation (Active Directory, Group Policy, etc.)
  • Service access control lists (stop, start, manage) 

To successfully secure your privileged access, have a process and stick to it. Following the steps illustrated in Figure 1 will allow you to get control of privileged access.

Privileged access security control process. (Source: the author.)
Privileged access security control process. (Source: the author.)

1. Report on what security settings are in place. This allows you to make corrections where needed.

2. Analyze the information in the reports that you obtain. Ideally, you should evaluate every area of privileged access to ensure that only the correct users have this level of access to your Windows Servers, domain controllers, and Active Directory.

3. Once you have decided on which security settings to implement, configure them. Usually, Group Policy will be the method to deploy your security controls, but you might also use other Active Directory tools such as Active Directory Users and Computers.

If you stop at just securing your environment, you will never know if anything changes. So, to ensure that a privileged access doesn't change without your knowledge, you need to monitor and alert on changes that occur.

4. Monitor and track all changes that occur to privileged access within your Microsoft environment. This will give you reporting and alerting capabilities.

5. For all of the security settings that can allow vulnerabilities, attacks, and malicious actors to enter your environment, have systems in place to alert you via email when changes to privileges occur.

Once you get control of privileged access for your Windows infrastructure, you will have reduced your attack surface and dramatically increased security for your organization.

Related Content:

Derek Melber is the technical evangelist for ManageEngine, a division of Zoho Corporation. As one of only a handful of Microsoft Group Policy MVPs, Derek helps Active Directory administrators, auditors, and security professionals understand the finer points of how to manage, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kuingul
50%
50%
kuingul,
User Rank: Apprentice
2/21/2017 | 3:00:32 AM
Cure cause as well as symtopms
Just saying that alerts and reports on important security events that lead to overpriveleging users is a great thing to do and it definitely should be done, but it's a bit of taking care of the symptoms, not the causes.

IMO, it's equally (if not more) important to automate things like user lifecycle management, group membership management and other stuff like that. You can do that in a lot of different ways starting from a buch of PowerShell scripts to fully-featured 3rd party solutions like Adaxes or similar.

That is because most of the overprivileging happens because somebody makes a mistake and adds a user to a wrong group. Automation eliminates such things. It's also cool to add approvals that practically send an alert to an admin or another authority before overprivileging happens rather than after like an alert does.
Google Engineering Lead on Lessons Learned From Chrome's HTTPS Push
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
PGA of America Struck By Ransomware
Dark Reading Staff 8/9/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Now about that mortgage refinance offer from Wells Fargo .....
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6970
PUBLISHED: 2018-08-13
VMware Horizon 6 (6.x.x before 6.2.7), Horizon 7 (7.x.x before 7.5.1), and Horizon Client (4.x.x and prior before 4.8.1) contain an out-of-bounds read vulnerability in the Message Framework library. Successfully exploiting this issue may allow a less-privileged user to leak information from a privil...
CVE-2018-14781
PUBLISHED: 2018-08-13
Medtronic MMT 508 MiniMed insulin pump, 522 / MMT - 722 Paradigm REAL-TIME, 523 / MMT - 723 Paradigm Revel, 523K / MMT - 723K Paradigm Revel, and 551 / MMT - 751 MiniMed 530G The models identified above, when paired with a remote controller and having the "easy bolus" and "remote bolu...
CVE-2018-15123
PUBLISHED: 2018-08-13
Insecure configuration storage in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows remote attacker perform new attack vectors and take under control device and smart home.
CVE-2018-15124
PUBLISHED: 2018-08-13
Weak hashing algorithm in Zipato Zipabox Smart Home Controller BOARD REV - 1 with System Version -118 allows unauthenticated attacker extract clear text passwords and get root access on the device.
CVE-2018-15125
PUBLISHED: 2018-08-13
Sensitive Information Disclosure in Zipato Zipabox Smart Home Controller allows remote attacker get sensitive information that expands attack surface.