Identity & Access Management (IAM)
Identity is the control plane.
1. Tiered Administration (Red Forest)
Preventing "Credential Theft" from escalating to Domain Dominance.
graph TD
subgraph "Tier 0 (Control Plane)"
style A fill:#ffcccc,stroke:#333
A[Domain Controllers]
B[PKI / ADFS]
C[Tier 0 Admins]
end
subgraph "Tier 1 (Data Plane)"
style D fill:#ffffcc,stroke:#333
D[App Servers]
E[Database Servers]
F[Tier 1 Admins]
end
subgraph "Tier 2 (User Plane)"
style G fill:#ccffcc,stroke:#333
G[Workstations]
H[Laptops / Mobile]
I[General Users]
end
C -->|Manage| A
C -->|Manage| B
F -->|Manage| D
F -->|Manage| E
I -->|Logon| G
C -.->|NEVER LOGON| G
F -.->|NEVER LOGON| G
- Rule: A Higher Tier account never logs into a Lower Tier asset. If a Domain Admin logs into an infected workstation, their hash is stolen, and the game is over.
2. Privileged Access Workstations (PAW)
Admins should not check email or browse the web on the same machine they use to manage the Domain Controller.
PAW Implementation Specs
- Dedicated Hardware: A separate physical laptop for admin tasks.
- Clean Source: Built from clean media, never internet-connected during build.
- Restricted Internet: Block ALL internet access except specific management endpoints (Azure Portal, etc.).
- No Email: No Outlook. No Browsing.
- IPsec Enforcement: Domain Controllers should be configured to configured to REJECT RDP connections unless they come from a known PAW IP Address.
3. MFA & Conditional Access
- MFA: Non-negotiable for external access.
- Conditional Access: "If trying to access Email AND User is in USA AND Device is Managed -> ALLOW". "If User is in North Korea -> BLOCK".
4. Just-In-Time (JIT) Access
Admins shouldn't have permanent admin rights.
- Workflow: Admin requests access to Server X -> Approval -> Temporary Admin rights granted for 4 hours -> Automatic removal.