How To Secure Active Directory
How To Secure Active Directory
1
1
PLATFORM INFORMATION & QUICK TIPS
• Use the HELP icon at the bottom for FAQ’s and system requirements.
2
CPE CREDIT PROCESS
LIVE EVENT & ON DEMAND RECORDING
• You must view the live or recorded webinar for the required amount of time
(50-minutes). Check the CPE Credit window to view the timer.
• Your CPE Certificate will automatically appear in the ISACA CPE RECORDS
tab on the MyISACA page after completing the required viewing time.
• Please be patient. This process could take up to 48 hours for your CPE Certificate
and the CPE credit to be applied to your account.
• As a reminder, ALL ISACA webinars, the CPE credits and CPE certificates expire
365 DAYS POST LIVE EVENT. Please make sure you save the appropriate
documents to your personal records.
3
TODAY’S SPEAKER
Derek Melber
Tenable
dmelber@tenable.com
4
Scary Active Directory Security
18%
55
Attackers Know AD is not Secure
66
Attackers Know AD is not Secure
77
Attackers Know AD is not Secure
88
Attackers Know AD is not Secure
99
Active Directory Proven to be Target of Attacks
Lapsus$
On March 22, 2022, Microsoft stated
"DEV-537 (LAPSUS$) used DCSync attacks and Mimikatz to perform privilege escalation routines. Once Domain
Admin access had been obtained,.."
THE defining step in LAPSUS$'s methodology is "Active Directory Privilege Escalation"
"They (LAPSUS$) have been CONSISTENTLY observed to use AD Explorer, to enumerate all users and groups in the
said network... this allows them to understand which accounts might have higher privileges" <to escalate privilege
to in AD.>
*Source: lnkd.in/guca2AAp
10
Typical Attack Tactics
11
Vulnerabilities
Misconfigurations
Privileged accounts
Password attacks
Advanced attacks
Persistence
Backdoors
Attacks and Defenses
13
Vulnerability Management
Defensive Actions Secure privileged users
Vulnerability Management Secure service accts
LAPS Secure computer accts
Unique passwords Clean up old security
Vulnerability Management Common passwords Password spray detect Vulnerability Management
AV Change PW often Brute force detect DCSync detect
EDR Strong Password Policy LSASS detect DCShadow detect
Educate users Golden Ticket detect
Least privilege Password spray detect DCSync detect
Email security LSASS detect
User is not local Administrator Brute force detect DCShadow detect
Application Restriction MFA SPN modification SIDHistory modification
UEBA PAM Kerberos delegation mod Primary Group ID modification
0 2 4 6 8
1 3 5 7
15
Powershell for AD Enumeration
The following are a few examples of Powershell cmds that an authenticated,
non-privileged user can easily run and that attackers leverage:
16
16
Attack Path Visualization
A need for graph visualization
17
17
Attacker Requirements
18
Attacker Process – Entering the Enterprise
21
21
Enumeration – Attack Accounts
2. Query AD accounts
4. Attack users/computers
to gain privileges
22
22
MITIGATE EXISTING THREATS
● Immediately discover, map, and score
23
Privileged Groups
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : Privilege escalation
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Ensure group members are correct
24
24
Primary Group ID
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : Privileged Escalation
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Set primaryGroupID to 513
25
25
GPO Permissions
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : Privileged Escalation, Ransomware deployment
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Ensure GPO permissions are correct
26
26
adminSDHolder
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : Privileged Escalation
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Remove users from AdminSDHolder ACL (via groups too)
27
27
Kerberos Delegation
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : Impersonation
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Configure contrained delegation
28
28
Service Principal Name
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : Kerberoasting
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Remove SPN users from privileged groups
29
29
KRBTGT User Password
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : Kerberoasting, Golden Ticket
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Reset KRBTGT password 2X/year
30
30
AD Root Permissions
- Availability : In every AD domain
- Level of Threat : Critical
- Attack Method : DCSync
- Commonality of being misconfigured : Near 100%
- Ability to secure : Yes
- How to secure: Ensure AD root permissions are correct
31
31
QUESTIONS?
32
THANK YOU FOR
ATTENDING THIS
THANK YOU
ISACA WEBINAR FOR ATTENDING