Deprecated: Required parameter $length follows optional parameter $desc in /www/thecypherecom_368/public/wp-content/plugins/essential-addons-elementor/includes/Elements/LD_Course_List.php on line 1883
ACTIVE DIRECTORY SECURITY ASSESSMENT - Cyphere

Active Directory Security Assessment

he Active Directory Security Assessment (ADSA) is a specialised offering designed to provide you with a deep dive into security configuration and vulnerabilities that could be leveraged for company-wide attacks. This is followed by recommendations for risk mitigation and remediation measures.

Get in touch

No salesy newsletters. View our privacy policy.

Why is Active Directory security important?

Active directory is a central component to all steps of a cyber kill-chain. This is the primary reason why Active Directory security is a critical element for organisations.

Active directory (also known as ‘ad’) is a critical element for keeping corporate environments operational and downtimes are unthinkable in this day and age. The ultimate target of any cybercriminal is to compromise the domain controllers of a business, that are the heartbeat of any network resources. Once compromised, it allows open access to the entire estate.

Literally, it is direct access to staff emails, open access around differnet portals and applications, any user’s password hashes and infiltration across multiple networks in case of trusted domain relationships (with third-parties, multiple regions, etc). 

It does not matter how many security solutions you have deployed, how many security resources you have on hand – without a secure Active Directory security misconfigurations, your environment is a low hanging fruit for attackers. Whether it is an insider attacker, an external attacker or supply chain attack vector – it all comes down to compromise of one, two or all three security principles – Confidentiality, Integrity and Availability.

Improve the big picture today. Book an AD security pentest.

How does AD security assessment works?

Initial Scoping & Objectives

Our Active Directory security experts are with you to define the assets in scope covering primary security concerns and any specific requirements. AD risk assessments like these are defined with test cases built around both authenticated and unauthenticated attack vectors.

These objectives and understanding of environment is gained at this stage.

Reconnaissance & Information Gathering

Information gathering phase works as first sub-phase of collecting information and intelligence about the AD structure and implementation. 

First step to preparation is based on whether on-premises AD, Azure AD or hybrid model is in use. All the main components such as Active Directory domain services, certificate services, federation services (if ADFS in use), LDAP are taken into consideration at this point.

Number and layout of active directory infrastructure with all the domains, overall structure, company hierarchy and understanding of Active Directory forest all fall into this initial understanding.

Manual Security Hardening Review

A manual approach is followewd to perform checks such as hardening reviews against Domain Controllers – It covers assessing the services in use, auditing and account policies, password policies and kerberos settings.

Access control list reviews include ACL scans against DC computer objects, critical groups, user accounts and groups (backup, operators, etc).

Identify any escalation paths and GPO weaknesses that would help an attacker exploit privileged accounts memberships vertically or horizontally.

Specific Activities

This phase includes specific activities such as identifying effective attack vectors, password cracking and statistical analysis to assess the password culture of a company. 

Authentication and authorisation mechanisms are reviewed for the presence of any weaknesses around active direcotry forest, group membership, user accounts, privileged accounts (Enterprise admins, Domain Admins, Local Admins), service accounts and access controls. Checks around object ACLs’ covering security group memberships, AdminSDHolder, DCSync, trust relationships, integrated services (Azure Connect or others).

Ad Security Best Practices

Active directory security best practices are checked against the following areas:

  • AD infrastructure, logical structure across IT infrastructure
  • Group Policy Security checks
  • Domain Controller Security configuration
  • Sites, Services, Namespace, Zones
  • Authentication and Authorisation Mechanisms
  • Password Data checks including Cracking, Hashing, Analysis
  • AD delegation, User and Privileged Access Management
  • Logging & Monitoring across SQL, Windows server and the entire domain
  • Insecure Information Storage Practices
  • Administrative workstations
  • Anti-virus, Patching of Operating Systems, Backup, Services and Domain Controller checks

Reporting & Debrief

This includes analysis on the test output, evaluation of the Active Directory risk impact and attack likelihood before providing action plans to remediate the identified security vulnerabilities. All our reports address business as well as the technical audience with supporting raw sensitive data, including mitigation measures at strategic and tactical levels.

Our engagement process includes delivering a free of charge debrief to management and technical teams.

Cyphere also provide a remediation consultancy where we define and execute the risk mitigation plan.vulnerabilities

Active Directory security assessments issues

Key Benefits of Active Directory Security Assessment (ADSA)

See what people are saying about us

Active Directory Security Testing Methodology

To perform an Active Directory assessment, it is important to understand the context of business and associated assets in scope for the engagement. Our proven approach to security assessments is based on more than a decade of experience, industry practices and effective ways to exceed customer expectations. 

Cyphere’s review methodology for active directory environments are broken down into the following phases:

  1. Initial scoping & objectives
  2. Information gathering
  3. Security hardening review
  4. Environment specifics
  5. Security best practices
  6. Detailed report & debrief

Our Pentest Engagement Approach

Customer Business Insight1
Read More
The very first step remains our quest to gain insight into drivers, business, pain points, and relevant nuances. As part of this process, we understand the assets (such as external IP addresses, internal network size and other regulatory compliance requirements) that are part of the scope prepared after taking into account regulatory and contractual requirements.
Services Proposal2
Read More
It is important to gain grips with the reality, therefore, we always stress walkthroughs or technical documentation of the assets. After asset walkthroughs, a tailored proposal is designed to meet your business’ specific requirements.
Execution and Delivery3
Read More
Cyphere’s approach to all work involves excellent communication before and during the execution phase. Customer communication medium and frequency are mutually agreed upon, and relevant parties are kept updated throughout the engagement duration.
Data Analysis & Reporting4
Read More
The execution phase is followed by the data analysis and reporting phase. Cyphere performs analysis on the testing output and evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels.
Debrief & Support5
Read More
As part of our engagement process, customers schedule a free-of-charge to debrief with management and technical teams. This session involves a remediation plan, and assessment QA to ensure that customer contacts are up to date in the language they understand.
Previous
Next

RecentBlog Entries

Healthcare Cyber Attack Statistics

As technology has advanced and the world has become more interconnected, the threat of cyber-attacks has become a significant concern for businesses, smaller healthcare organisations, …

blog-banners-28-768x292-1

Small business cyber attack statistics including surprises for 2023

A cyber attack or data breach is a threat to every business. Still, it can be more devastating for small businesses as they face numerous …

blog-banners-31-768x292-1

Penetration testing statistics, vulnerabilities and trends in 2023 

The cyber-world is an ever-expanding network of digital systems and technologies that have revolutionized our lives and work. However, these advancements come with inherent vulnerabilities, …

Malware statistics to be taken seriously in 2023

We live in a digital age, where new technologies are emerging daily, and old technologies are evolving and merging into new ones so fast that …

How to identify spam email? What to do with suspicious emails?

We have shared real-life examples of phishing emails which are a serious problem for both businesses and consumers. Read our article to learn how to prevent phishing attacks.

One of the trusted penetration testing companies in the UK

Scroll to Top