Even through Active Directory has its own STIG plus extensive security documentation from Microsoft, hackers can take a few clever shortcuts and may still abuse low-privileged access to become Domain Admins in your environment.
We will perform an in-depth security assessment of your Active Directory focusing on modern attack techniques and on all documented security requirements for administering and using it.
If you are a software development company, we will audit your Secure Software Development and your DevSecOps practices.
📃 Forget about long, boring, dry documents full of unreadable findings and vague solutions.
🎯 After the Active Directory Security Assessment, you will get a step-by-step, priority-based plan on turning your AD into a fortress.
📅 The plan will be split by category and criticality, scheduling changes for each finding category by urgency.
⌚ Within a month, you can completely transform your company’s Active Directory security.
🎁 And yes, you will also get a detailed report. But the main value of the Assessment will be the Step-by-Step AD Security Plan!
✔ Do you hate checklists? We do too!
💬 We turn the audit process into an interactive discussion and rather than asking you yes/no questions, we discuss each one with your team.
📚 Those discussions turn into consulting sessions, allowing for idea sharing and learning.
🔐 We don’t need remote access to your Active Directory.
📲 All we need to help you protect your Active Directory is a remote screen sharing session with your IT team.
👨🏼🎓 Your team will walk out of the audit having learned a great deal about all the topics we discussed.
Our pricing is transparent – and depends only on the number of hours calculated for your audit after our meeting.
The number of hours required for your Active Directory Security Assessment depends on the complexity of the directory.
Let us have a chat, tell us about your company – as soon as we agree on the assessment scope, we will calculate your price based on the hours needed to complete your assessment and generate a Step-by-step AD security improvement plan for you.
Payment is due only after you receive your final report and only if you are happy with its quality.
📅 The data collection process takes two to five business days.
⚡ You will receive your Report and your Step-by-step AD security improvement plan one week after the audit is complete.
Our Active Directory Security Assessment is a great place to start and will highlight many vulnerabilities in your Active Directory that could leave you at risk of a dangerous cyber attack.
Our Active Directory security assessment examines your AD administration practices and current setup against Microsoft’s security documentation and the US DoD Active Directory STIG (Security Technical Implementation Guide). We compare its requirements with what is present in your organization, giving urgent recommendations to implement against the risks to your business. This means you can rest assured your business is safe allowing you to focus on other parts of the business.
An Active Directory Security Assessment checks how resilient is the core of your IT infrastructure to an attack or human error. Its scope depends on the size of your company and your objectives. The assessment might mean a quick check of your domain or a comprehensive security review of its deep configuration and of all your domain controllers and connected servers.
We audit the controls in place (or their absence). These controls might be administrative, or in other words, the practices employed by your administrators. They could also be technical or even physical.
Planning for the audit execution
Before conducting an AD Security Audit, we always have a series of preparation meetings with company executives and IT administrative personnel.
These meetings help establish the reasons behind the audit and its strategic security objectives. Is regulatory compliance driving your desire to audit your IT systems? Were you a victim of a security breach? Or do you want to have full visibility into how prepared you are for a hacking attack?
Here is our IT Security Audit Preparation Process:
“Give me six hours to chop down a tree and I will spend the first four sharpening my ax.”
― Abraham Lincoln
Besides the mandatory pre-audit meetings with management, the client usually has to undergo internal preparation for the IT Security assessment service.
On the client’s side, the following items need to be taken care of:
There might be technical details such as what is the auditor allowed to access and what information can they ask for as proof, as well as how this information will be stored and analyzed safely.
Communication is key in every business process.
Active Directory security audits are no exception, and we need to add a few extra requirements and dependencies.
Do you suspect a security breach happened prior to initiating the assessment? Can the attackers listen in on any internal email communication? In that case, most audit-related communications need to happen outside your corporate network. In other words, they have to happen over the phone or via secure instant messaging, avoiding your corporate email service.
There are several key stages during which communication is key:
The report you receive sometimes has the tendency to heat up political discussions and start the process of blaming each other for the faults discovered. This is not productive.
What we encourage our customers to do is see the report as an excellent opportunity to get better at everything you do and beat your competition at it. Rest assured, if we went to your competitors, we might find similar or even worse findings. So be happy you were the first to discover your faults and get ready to be the first to fix them!
Your AD Security Audit Report will contain an executive section for senior management and a technical section for IT and security personnel.
The Executive Section of the report usually focuses on the business impact of the findings and on prioritization advice. This way management can request specific actions to be expedited and will know about their own responsibility to fund these efforts. Sometimes this also means hiring extra pairs of hands.
The technical section of the report will also be split in High Criticality, Medium Criticality, and Low criticality findings.
Each finding will be paired with its respective advice on fixing the finding – focus on the fix rather than finding who to blame for the finding, it is the only productive way to read and act upon your IT security audit report.
We go beyond asking questions — and turn our security audits into half-audit, half-security consulting sessions. While there are hundreds of topics to go through, we identified the need to explain and discuss them so that your team would better understand why we ask this question and how it could affect your company.
Usually, it takes 2-3 days for data collection and a week to prepare a report and your unique Information Security Program plan. An IT security audit from start to finish usually takes around 2 weeks, excluding any prior logistics preparations and clarification meetings after you get your results.
We welcome you to record the Active Directory security audit sessions on your own — we discuss so many topics and our team provides such valuable input, that it would be a huge loss if you couldn’t watch the sessions later and extract valuable insight from them.
If you ask us, we will also record the sessions for you and provide you with the recordings. We will delete the recordings after the IT Security Audit is complete.
Atlant Security © 2024. All rights reserved