As you know, today Microsoft’s Active Directory is the very foundation of IT and cyber security at 85% of all organizations worldwide, as well as at the foundation of most cyber security companies.
The compromise of an organization’s foundational Active Directory could have colossal consequences for the organization, as well as for all its stakeholders (i.e. customers, investors, partners etc.)
There recently has been a steadily increasing amount of attention being given to Active Directory Security, especially Active Directory ACLs, as they ultimately protect all Active Directory content.
For instance, attack vectors such as Mimikatz DCSync, Active Directory Privilege Escalation, Sneaky Persistence in Active Directory and Active Directory Botnets all target Active Directory ACLs.
Earlier this month, Microsoft finally agreed that recently Active Directory ACLs may in fact be getting a lot of attention these days, in a blog post titled – Active Directory ACLs – Attack and Defense.
Based on what Microsoft shared, it appears it may not seem to understand the depth of this challenge, so we had to share a blog post titled – Active Directory ACLs – Actual Attack and Defense.
Given the paramount role that Active Directory plays in organizational cyber security and IT today, we must do everything we can to adequately secure and defend Active Directory deployments.
Thus, in days to come, I’ll be helping Microsoft and the entire world, by sharing with them exactly how they can adequately secure and defend their foundational Active Directory deployments.
Specifically, in days to come, you can expect the following insightful posts –
Starting October 17, 2017, you’ll be able to find these posts over at the Active Directory Security Blog.