Skip to content

eBook:
Deploying PAM in compliance with AD Tiering

By cyberelements

Download AD Tiering eBook Now →

The role of the Active Directory is crucial within the information system. It handles the identification and the authentication services of an organization. Taking control of an organization’s Active Directory is like taking control of its data, and it is easy to imagine what a malicious
person could do with it. Therefore, it is primordial to reinforce its security given the current rise of cyberthreat.

In its guide, the NCSC explains that the directory or directories containing administration accounts must be protected in terms of confidentiality and integrity and must not be exposed on less trusted environments. The NCSC also specifies that in case of a managed IT system based on a Microsoft Active Directory, it is recommended to first adopt a privileged account management model (three-tier model) for this directory and to secure its configuration. This recommendation also states that additional technical measures restricting the use of administration accounts on workstations should be implemented.

Download our eBook to discover the aspects of Active Directory tiering and why deploying a PAM solution in compliance with AD Tiering principles optimize your security.

Share Now:

To Go Beyond AD Tiering