October is officially recognized as the cyber security awareness month all over the world, ever since it was started by the National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security (DHS) in 2004. It is aimed at educating people and creating awareness about practices for keeping their cyber environments safe. The theme for 2020 is 'Do your part. Be cyber smart'.
To keep up with this year's theme, this series will focus on easy-to-implement solutions for the week's theme-specific idea, that'd keep the Active Directory (AD) secure while ensuring it's at its efficient best. This week's post will focus on the idea - "If you can connect something, then protect it". In an AD context, we can interpret this as, if you're opening up access to your AD then you should simultaneously implement safety practices to ensure they don't turn into vulnerabilities.
2. Create a delegation policy with clearly defined roles
Once the tasks are established, create delegation roles and group the IT technicians accordingly. Ensure the group has only the least required permissions.
3. Set up role-based access to IAM operations
Now that the roles are created and the tasks to be delegated is established, you can assign these roles to appropriate users to allow them to perform only the delegated operations.
4. Ensure adherence to organizational and IT security policies
To ensure that the delegated technicians do not misuse their rights or perform unauthorized operations, it is vital to supervise the delegated actions, and keep track of all their activities with audit reports.
If you have been delegating IAM rights to your employees without a clear delegation model or tracking mechanism, it's time you inventory such delegated actions, users to whom permissions you have delegated rights, reassess them and reassign the rights to ensure security and adherence to security policies. With ADManager Plus you can,
Assign permissions for delegated tasks at at the product level while their actual privileges in Active Directory remain unchanged. Learn more about it here.
Get pre-built delegation audit reports and technician specific reports to keep track of the delegated activities.
Manage AD groups and access permissions in bulk. Learn more.
Generate reports on permissions assigned to AD users and groups without scripting. Learn more.