undefined

Different architectures, one identity source 

Identity is a core component of any robust zero-trust infrastructure. And it needs to be treated as such. Many of us are still working from home at least some of the time. While maintaining remote access capabilities, cloud-focused applications and security strategies, organisations must not forget that these depend upon the integrity of their core on-premises identity systems. 

In the past, users have largely depended on Virtual Private Networks (VPN) for remote access. Users are authenticated by a directory service – usually, Active Directory – and are then allowed onto the corporate network. However, as a solution with scalability challenges and reliance on network perimeter security, VPNs alone aren’t the answer for the modern remote workforce. 

Instead, a rapidly growing segment of companies has their users signin to a web-based Identity and Access Management (IAM) service with their corporate credentials to access SaaS apps such as Zoom or Office 365 directly through the internet. This method uses a zero-trust model where a user’s identity – not their network location – is key to gaining access to the application. 

Some of these companies go further by extending this model into their on-premises networks. They deploy devices that create a software-defined perimeter between applications and the users attempting to access them. These proxy devices (for example, Azure AD Application Proxy or Symantec Secure Access Cloud) grant the user access to only the proxy-published application instead of the broad network access granted by a VPN. Because traffic is routed through the IAM service, the user session can have sophisticated access controls such as device integrity, session risk or type of client app used. Nevertheless, some attacks successfully bypass IAM, with intruders moving laterally across networks. 

Securing the source 

Whether a user is logging in to the corporate network with a VPN or signing into a web portal to access SaaS or on-premises apps, identity assurance is always crucial. Whereas VPNs rely upon an on-premises corporate identity source, modern cloud IAM services rely on many factors such as device health, location and behaviour patterns to contribute to an identity’s assurance level. But the cores of these massive cloud services are still based on the individual user’s account credentials. 

Because most organisations use a hybrid identity model (projecting their on-premises identity to Internet services), the identity source for these credentials is the keystone of the entire sophisticated architecture. And for 90% of enterprises, this identity source is Active Directory (AD). 

This means any Zero Trust strategy – in fact, any security architecture – depends heavily on Active Directory. So how do you ensure its integrity and the integrity of its data?  

Minimise AD’s attack surface 

  • Implement a least-privilege administrative model and get rid of all your unnecessary administrators. This 20-year-old advice is still relevant today.  
  • Lock down administrative access to the AD service by implementing administrative tiering and secure administrative workstations.  
  • Secure AD domain controllers against attack by applying recommended policies and settings.  
  • Scan AD regularly for misconfigurations – accidental or malicious – that potentially expose your forest to abuse or attack. 

Monitor AD for signs of compromise and roll back unauthorised changes 

  • Enable both basic and advanced auditing. You can’t know about changes to your AD if you haven’t enabled mechanisms to log the changes. Then you need to actually look at key events via a centralised console.  
  • Monitor object and attribute changes at the directory level. The security event log will show you most, but not all changes made to AD. For example, the DCShadow attack circumvents the event log entirely. The only way to ensure you’re aware of all activity in your AD forest is to monitor the directory changes shared across domain controllers.   

Plan for when compromise happens – because it will 

  • Monitoring for undesired AD changes is important. But you must also be able to quickly and automatically roll back those undesired changes or you only have a partial solution.  
  • Prepare for large-scale compromise. Widespread encryption of your network, including AD, requires you have a solid, highly automated recovery strategy that includes offline backups for all your infrastructure components.  

According to the Identity Defined Security Alliance, 84% of organisations worldwide suffered an identity-related breach in 2021/2022. A staggering 96% reported that they could have prevented or minimised the breach by implementing identity-focused security outcomes. 

It is worth remembering that although you can implement a zero-trust network in a variety of ways, its core principles are always based on user identity. Whether accessing the network through a VPN or signing into an identity service’s web portal, the odds are high that your identity depends upon Active Directory. Therefore, ensuring its integrity is foundational to your company’s security.