Active Directory “Best Practise” – Part 1 – Setting Standards

Its not a standard until its written down

Mystery Colleague

Lets preface the phrase “Best Practise”. In IT best practise often depends on the environment and the organisations appetite for best practise rather than actual true best practise. In an ever growing industry the need for security continues to exponentially increase year on year.

Over the years I have tried to create a framework that can grow or shrink with the organisation’s needs and requirements. This helps maintain some semblance of security while balancing usability.

Another challenge I often find is that large scale infrastructure grows organically and rarely has a master road map. As needs and requirements arise adhoc changes are made. Worse still, when people try to implement least privilege it doesn’t work the first time and suddenly accounts that shouldn’t need it become administrators and domain admins.

Lastly when people try to implement a “best practise” project it fails due to the amount of risk it can carry, inertia that needs to be overcome and lack of priority. Everyone knows that security and best practise should be implemented and adhered to, just like we all know we should be checking and topping up the oil in our cars. The reality is we all put it off until the warning light comes on and sometimes that can be too late.

Setting Standards

A colleague once said to me “its not a standard until is written down”. The first thing is setup some standards, naming conventions, and processes. Even if this initially is a very loose framework it allows everyone to work towards the same goal. Make sure the document goes through whatever change process you have to get corporate endorsement and provide the standard some gravitas.

Lets focus initially on organising administrative users and roles within the IT department. This is the easiest starting point as it rarely involves outside engagement and helps build the foundation framework.

Naming Conventions

When it comes to creating administrative groups and administrative roles its good to keep the following principles in mind.

Avoid baking the company name, company location, equipment location into the name unless absolutely critical. Use the description fields to highlight the location. In my experience, company names and locations change more frequently that you would expect. This is particular the case in healthcare or accounting where organizations change names a lot.

I try to use descriptive and human readable names. Its always good to have the first operator in a group name outline the purpose. The means if your groups are all in one location they are ordered alphabetically and naturally grouped into similar purposes.

Avoid including words like Group/GPO/OU/Server in the names of things. I often see so many superfluous words in names that add no benefit. “Local Desktop Administrators Group” We know its a group, why not call the group “Local Desktop Administrators” or servers with the word server in it: “DNS-Server-01″

Whatever you decide why you create your standards documented, make sure to outline what phrases should not be used as well as what phrases should be used.

Administration Groups

These are groups of administrators who perform similar tasks. These groups only contain user accounts. These groups can later be assigned roles. One group might be all service desk staff, the other might be second line staff. Another might be the Infrastructure staff and the last network staff. Generally I create the following groups.

Group NameDescription
Administrators – Service DeskAdministrator accounts for service desk
Administrators – ESC SupportAdministrator accounts for escalation support
Administrators – InfrastructureAdministrator accounts for Infrastructure
Administrators – NetworkingAdministrator accounts for networking
Administrators – DBAAdministrator accounts for DBA

Role Groups

These are roles that a given administrator might carry out on a day to day basis. These can be as granular or general as you require. You can create roles for various applications or work areas within the organization. These roles are granted permissions and then the administration groups are assigned to these roles.

I know that in the ideal world you would set super granular access on a user by user basis but the reality is that unless you have a large security team this just isn’t possible or practical to maintain. I find this process of matching groups of users to groups of roles the most pragmatic and manageable solution. Below are some example groups I might create.

Group NameDescription
Role – Manage ServersThis groups is allowed to manage servers by default
Role – Manage WorkstationsThis group is allowed to manage workstations
Role – Manage MFAThis group can manage MFA in Azure
Role – Join DomainThis group can join devices to the domain
Role – Manage AD L1This group can manage AD at level 1
Role – Manage AD L2This group can manage AD at level 2
Role – Manage AD L3This group can manage AD at level 3
Role – Manage FirewallsThis group can manage firewalls
Role – RO Firewall AccessThis group has read only access to the FW.

Pairing Roles to Administration Groups

Now its simply a case of creating a spreadsheet, listing the roles and the groups, then ticking who gets what access. This access list can start to form the basis of your security controls and documentation.

This also helps provide a simple and none technical explanation of who has what access.

Now we have created the roles, Administrators groups, paired them together and added users to each group we need to start implementing.

Follow along for Part 2.

Active Directory “Best Practise” – Part 1 – Setting Standards

Its not a standard until its written down

Mystery Colleague

Lets preface the phrase “Best Practise”. In IT best practise often depends on the environment and the organisations appetite for best practise. In an every growing industry the need for security continues to exponentially increase year on year.

I have tried to create a boiler plate template that can grow or shrink with the organisation’s needs and requirements. This helps maintain some semblance of security while balancing usability.

The second challenge I often find is that large scale infrastructure grows organically and rarely has a master road map. As needs and requirements arise adhoc changes are made. Worse still, when people try to implement least privilege it doesn’t work the first time and suddenly accounts that shouldn’t need it become administrators and domain admins.

Lastly when people try to implement a best practise project it fails due to the amount risk it can carry, inertia that needs to be overcome and lack of priority. Everyone knows that security and best practise should be implemented and adhered to, just like we all know we should be checking and topping up the oil in our cars. The reality is we all put it off until the warning light comes on and sometimes that can be too late.

Setting Standards

A colleague once said to me “its not a standard until is written down”. The first thing is setup some standards, naming conventions, and processes. Even if this initially is a loose framework it allows everyone to work towards the same goal. Make sure the document goes through whatever change process you have to get corporate endorsement and provide the standard some gravitas.

Leave a Reply

Your email address will not be published. Required fields are marked *