Taking the Necessary Steps to Secure Active Directory: Checklist

Taking the Necessary Steps to Secure Active Directory: Checklist

As they turn their attention to identity-focused attack surfaces, threat actors are identifying on-premise and cloud-hosted Active Directory (AD) environments as primary targets.

For most enterprises, AD is the central repository for all accounts and systems within the network, and it is responsible for all authentication and authorization to the network. To the adversary, it represents a skeleton key capable of unlocking the rest of the network.

Enterprise security teams can use this checklist to evaluate risks and gaps in their Active Directory security procedures.

Download this checklist to consider:

  • On-Premise and Cloud-Based Active Directory Cyber Hygiene Benchmarks;
  • Benchmarks to Identify Attack Indicators;
  • How to secure Enterprise Active Directory and Azure AD Accounts?



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.