Taking the Necessary Steps to Secure Active Directory: Checklist
As they turn their attention to identity-focused attack surfaces, threat actors are identifying on-premise and cloud-hosted Active Directory (AD) environments as primary targets.
For most enterprises, AD is the central repository for all accounts and systems within the network, and it is responsible for all authentication and authorization to the network. To the adversary, it represents a skeleton key capable of unlocking the rest of the network.
Enterprise security teams can use this checklist to evaluate risks and gaps in their Active Directory security procedures.
Download this checklist to consider:
- On-Premise and Cloud-Based Active Directory Cyber Hygiene Benchmarks;
- Benchmarks to Identify Attack Indicators;
- How to secure Enterprise Active Directory and Azure AD Accounts?