Server Infrastructure Management Flashcards
(11 cards)
What is the purpose of using a tiered access model for privileged access?
To isolate and build layers of containment between the Windows systems through the directory structure; prevent escalation across tiers by provisioning access to privileged identities only to the tier they need access to
How is a tiered access model implemented?
Through AD OU’s; A hierarchal design that is divided into three or more parent containers
What is the most important tier in a tiered access model?
Tier 0; contains the systems, accounts, and security groups of the highest security concern, such as domain controllers (DCs), Azure AD Connect servers, and identity management systems;
How should access to tier 0 in a tiered access model be secured?
Deploy a PAM solution to include password rotation, an approval request flow
process, auditing logs, session recording or Azure PIM if in the cloud
What would be considered tier 1 in a tiered access model?
Contains systems such as business servers, file servers, web application servers, and database servers.
How should access to tier 1 in a tiered access model be secured?
Use PAM or PIM; Using a top down approach, admins with access to tier 0 will be able to access tier 1
How should the OUs be structured in a tiered access model?
When architecting the organizational structure of the tiered model, create a child OU nested under the tier 1 parent and label them by business unit (BU), application name, or function to create
a descriptive structure.
What does tier 2 in a tiered access model contain?
Common devices; end-user machines
What are additional best practices to secure access to windows resources?
- For RDP and interactive logons, allowed sources should be restricted to a privileged
access workstation (PAW), trusted device, or isolated management environment,
preferably requiring a form of passwordless or biometric authentication, or multi-factor authentication (MFA). - Network restrictions should be considered for tier 0 access scenarios by restricting
RDP connections and other management ports to sources from known virtual
networks (VNets), subnets, and workstations.
What are best practices to secure access?
- Enforce/require MFA for all cloud resrouces and implement MFA tool for on prem
- Deploy a PAM or PIM for Just-In-Time access
- Efficient account provisioning/deprovisioning - automation
- Monitor/Audit privileged accounts
- Separate administrative accounts with regular users’ accounts and limit number of admins
- Limit access to email and internet browsing when applicable from privileged
systems. - Enforce strict fine-grained password policies on administrative accounts.
- Limit the amount of emergency “backdoor” accounts
- Ensure any changes to the environment go through an approval process by a change
advisory board.