Sept. 6, 2022, 1:21 p.m. | /u/Real_Lemon8789

cybersecurity www.reddit.com

[https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-f--securing-domain-admins-groups-in-active-directory#step-by-step-instructions-to-secure-domain-admins-in-active-directory](https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/appendix-f--securing-domain-admins-groups-in-active-directory#step-by-step-instructions-to-secure-domain-admins-in-active-directory)


Can anyone map a CIS control that maps to the link above that recommends setting up active directory group policy to block domain administrator accounts from logging into workstations and servers that are not Tier 0 assets?

Deny access from the network

Deny log on as a batch job

Deny log on as a service

Deny log on locally.

​

This is beyond just principle of least privilege where you avoid giving accounts more rights than they need. So, …

accounts benchmark cis controls cybersecurity domain microsoft nist nist controls recommendations

Information Security Engineers

@ D. E. Shaw Research | New York City

Senior Cybersecurity Technical Delivery Manager

@ MUFG | London Ropemaker place

Junior consultant-Technology Risk

@ EY | Bratislava, SK, 811 02

Director of Security Engineering, Information Security

@ Illumio | Sunnyvale, California

Cyber Analyst II 03396 NWG

@ North Wind Group | KNOXVILLE, TN

CRIT Information Security Officer (f/m/d)

@ Deutsche Börse | Frankfurt am Main, DE