Dear Mark,
You Sir, are Mark Russinovich, Chief Technology Officer (CTO) of Microsoft Azure, and for you I have the greatest of respect.
A few days ago at Microsoft Ignite, you said - "Ask me anything!" -
By the way, I must compliment you for doing so, because when you do so, you really have to be ready for any/every question!
So, I'd like to ask 1 Question
Mark, on behalf of 1000s of Microsoft's organizational customers, I'd like to most respectfully ask you just one simple question -
Question: How can/should organizations find out exactly who actually has what privileged access in their Active Directory ?
Specifically, how can organizations determine exactly who can do what on the 1000s of domain user accounts, domain computer accounts, domain security groups, containers, OUs, SCPs etc., including of course all their privileged and executive domain user accounts and groups that reside in their foundational Active Directory?
I only ask this question because as you too will likely agree, this 1 simple question directly impacts and thus is paramount to the foundational cyber security of over 85% of all organizations worldwide, all of whom operate on Microsoft Active Directory.
I really do hope that on behalf of Microsoft, you'll answer this question, for organizations worldwide look forward to the answer.
Most respectfully,
Sanjay
CEO, Paramount Defenses
PS: Sir, if you've ever heard of AccessChk.exe and know what it does,
(and I believe you have), then you know the answer to this question.
PS2: As former Microsoft Program Manager for Active Directory Security, I'd like to offer a hint. The answer to this question is also the (premise for, and thus the same as the) key to the ten questions below, and in essence it involves just two words -
1. What Constitutes a Privileged User in Active Directory?
2. How to Correctly Audit Privileged Users/Access in Active Directory?
3. How to Render Mimikatz DCSync Useless in an Active Directory Environment?
4. How to Easily Identify and Thwart Sneaky Persistence in Active Directory?
5. How to Easily Solve The Difficult Problem of Active Directory Botnets?
6. Why are the World's Top Active Directory Permissions Analysis Tools Are Mostly Useless?
7. Why is the Need to Lockdown Access Privileges in Active Directory Paramount to its Defense?
8. How to Attain (Lockdown) and Maintain Least Privileged Access (LPA) in Active Directory?
9. How to Securely Delegate and Correctly Audit Administrative Access in Active Directory?
10. How to Easily Secure Active Directory and Operate a Bulletproof Active Directory deployment?
In short, the answer is (something like) this -
Ans: To do so, all that organizations need to do is to accurately and adequately determine e******** p**********/a***** on their Active Directory objects. That's it.
No comments:
Post a Comment