Directory Services and Active Directory Security

Directory services form the authentication and authorization backbone of enterprise IT environments, with Microsoft Active Directory (AD) deployed across the majority of Fortune 500 organizations and a substantial share of US federal agency infrastructure. This page covers the structural mechanics of directory services, the specific attack surfaces endemic to Active Directory, the regulatory frameworks that govern directory security posture, and the classification boundaries that distinguish AD security from adjacent identity disciplines.


Definition and scope

A directory service is a hierarchically organized data store that maps network identities — users, computers, service accounts, and groups — to their associated attributes, credentials, and access permissions. In enterprise contexts, the directory functions as the authoritative source of truth for identity and access management (IAM): any service, application, or device that must authenticate a principal or enforce an access policy queries the directory to resolve that principal's attributes.

Microsoft Active Directory, introduced with Windows Server 2000, remains the dominant enterprise directory implementation in US organizations. Active Directory relies on the Lightweight Directory Access Protocol (LDAP) for directory queries, Kerberos v5 for authentication ticket issuance, and DNS for domain controller discovery. Open-source alternatives — notably OpenLDAP — occupy significant deployments in Linux-centric and hybrid environments, while cloud-native directories such as Microsoft Entra ID (formerly Azure AD) extend directory concepts to Software-as-a-Service authentication flows.

The scope of directory security encompasses three distinct layers: the directory infrastructure itself (domain controllers, replication topology, schema), the identity objects stored within it (accounts, groups, group policy objects), and the protocols through which clients interact with it (Kerberos, LDAP, NTLM, SMB). Each layer carries its own threat surface, and a failure at any single layer can expose the entire environment. The Cybersecurity and Infrastructure Security Agency (CISA) classifies Active Directory as critical infrastructure for this reason, dedicating a dedicated guidance document — Securing Active Directory — to hardening standards applicable to both private sector and federal civilian executive branch (FCEB) agencies.


Core mechanics or structure

Active Directory organizes objects within a logical hierarchy composed of forests, domains, organizational units (OUs), and sites. A forest is the outermost security boundary: two forests do not share a schema, a configuration partition, or implicit trust. A domain is an administrative and replication unit within a forest, each governed by its own domain controllers. Organizational units provide a sub-domain container for delegating administrative control and applying Group Policy Objects (GPOs).

Authentication within AD domains proceeds through Kerberos v5 by default. The Key Distribution Center (KDC), which runs on every domain controller, issues Ticket Granting Tickets (TGTs) upon successful credential validation. A principal presents the TGT to obtain service tickets for specific resources. The krbtgt account — a built-in account whose password hash is used to sign all Kerberos tickets — is a singular high-value cryptographic asset: compromise of this hash allows an attacker to forge arbitrary Kerberos tickets (a technique known as a "Golden Ticket" attack).

LDAP serves as the query and modification protocol for directory objects. Clients bind to a domain controller on TCP port 389 (LDAP) or TCP port 636 (LDAPS, the TLS-wrapped variant). Distinguished Names (DNs) form the addressing scheme: a user account might carry a DN of CN=jsmith,OU=Finance,DC=corp,DC=example,DC=com. Access Control Lists (ACLs) on individual directory objects govern who can read, write, or modify attributes — a granularity that creates significant attack surface when misconfigured.

Group Policy Objects propagate security configuration to domain-joined machines through a defined processing order: Local → Site → Domain → OU, with later-applied policies overriding earlier ones (subject to enforcement flags). GPOs control password policies, software restrictions, firewall rules, and logon script execution. Because GPOs execute with machine-level privileges on domain-joined endpoints, unauthorized GPO modification constitutes a direct path to mass lateral movement.

The SYSVOL share, replicated across all domain controllers via the Distributed File System Replication (DFSR) or the legacy File Replication Service (FRS), stores GPO files and logon scripts. Credentials historically embedded in SYSVOL scripts — a practice deprecated but not eliminated — represent a persistent finding in Active Directory security assessments.


Causal relationships or drivers

The concentration of privilege within Active Directory creates compounding risk: a single domain administrator account, when compromised, yields control over every domain-joined system. This architectural reality drives the majority of documented AD-centric attack chains. The MITRE ATT&CK framework catalogues more than 40 techniques specifically applicable to Active Directory, spanning credential access (T1003 — OS Credential Dumping), privilege escalation (T1484 — Domain Policy Modification), and persistence (T1098 — Account Manipulation).

Ransomware operators have systematically operationalized AD compromise as a pre-encryption phase. The pattern — initial access via phishing, lateral movement to a domain controller, mass deployment of ransomware via GPO or scheduled task — is documented in CISA's Joint Cybersecurity Advisories covering ransomware groups including LockBit, BlackCat, and Royal. This sequence elevates AD security from an IT operations concern to a business continuity and regulatory compliance matter.

Regulatory pressure compounds the operational drivers. Organizations subject to the Federal Information Security Modernization Act (FISMA) must align identity controls with NIST SP 800-53 controls, including AC-2 (Account Management), AC-3 (Access Enforcement), and IA-5 (Authenticator Management). The Department of Defense's Cybersecurity Maturity Model Certification (CMMC) Level 2 maps directly to NIST SP 800-171 controls governing access control and identification and authentication — both of which AD configuration directly satisfies or violates. Healthcare organizations under HIPAA (45 C.F.R. §164.312) must implement technical access controls on systems containing protected health information, with AD configuration serving as the primary enforcement mechanism in Windows environments.

Privileged access management (PAM) discipline emerged specifically in response to the AD privilege concentration problem: tiered administration models, just-in-time privilege elevation, and privileged access workstations (PAWs) exist to break the lateral movement paths that flat AD privilege models create.


Classification boundaries

Directory security is a discipline distinct from — though overlapping with — adjacent identity security domains. The following boundaries define where AD security ends and adjacent practices begin.

AD security vs. IAM: IAM encompasses the full lifecycle of identity — provisioning, authentication, authorization, and deprovisioning — across cloud and on-premises systems. AD security is a subset focused on the health, configuration, and threat resistance of the directory infrastructure itself. Identity lifecycle management addresses provisioning workflows that feed into AD, but the security hardening of the AD schema and domain controllers is a distinct operational concern.

AD security vs. Cloud Identity: Microsoft Entra ID shares conceptual lineage with on-premises AD but operates on a fundamentally different trust model. On-premises AD operates on an implicit trust-within-the-perimeter model; Entra ID enforces conditional access policies evaluated at authentication time, aligning with zero trust identity model principles. Organizations running hybrid identity environments — where Entra ID Connect synchronizes on-premises AD objects to the cloud — must manage both attack surfaces simultaneously, as a compromise of on-premises AD can propagate to cloud tenants through synchronization.

AD security vs. Directory Services in General: OpenLDAP, Red Hat Directory Server, and Samba AD DC serve LDAP-compliant directory functions in Linux and mixed environments. These implementations share LDAP protocol vulnerabilities (unauthenticated bind exposure, LDAP injection) but lack the Kerberos-specific attack surface (Kerberoasting, AS-REP roasting, Golden/Silver Ticket attacks) endemic to Microsoft AD. Security frameworks and tooling designed for AD hardening do not translate directly to OpenLDAP environments.


Tradeoffs and tensions

Delegation vs. least privilege: Effective AD administration requires delegating specific administrative tasks to sub-administrators without granting full domain admin rights. The granularity of ACL-based delegation in AD enables precise least-privilege configurations, but the complexity of ACL inheritance creates environments where unintended permission paths — often called "ACL abuse paths" — accumulate over years of incremental delegation decisions. BloodHound, the open-source AD attack path analysis tool published by SpecterOps, was developed specifically to expose these accumulations, and its widespread use by both defenders and attackers reflects the persistent difficulty of maintaining clean delegation boundaries.

Password policy granularity vs. operational complexity: Windows Server 2008 introduced Fine-Grained Password Policies (FGPPs), allowing different password requirements for different user populations. Before FGPPs, a single domain password policy applied to all users, forcing organizations to choose between weak policies for all or operationally burdensome policies for service accounts. FGPPs resolve this tradeoff but require careful management to avoid creating high-complexity policies that drive credential theft and account takeover risk through password reuse behaviors.

Kerberos vs. NTLM: NTLM, the legacy challenge-response authentication protocol, persists in AD environments for backward compatibility with systems that cannot participate in Kerberos authentication (non-domain-joined systems, certain application integrations). NTLM is susceptible to pass-the-hash attacks and NTLM relay attacks; disabling it outright breaks legacy application integrations. Organizations face a documented tradeoff between security posture — NTLM elimination — and operational continuity that CISA's AD hardening guidance acknowledges but cannot fully resolve through policy prescriptions alone.

Tiered administration vs. operational agility: Microsoft's tiered administration model (Tier 0: domain controllers and AD infrastructure; Tier 1: servers; Tier 2: workstations) enforces privilege segmentation that significantly reduces lateral movement risk. However, the model requires dedicated privileged access workstations, separate administrative accounts per tier, and significant operational process change. Organizations with small IT teams frequently find full implementation impractical, creating pressure to accept partial implementations that preserve some lateral movement paths.


Common misconceptions

Misconception: Domain admin accounts are the only high-value AD targets. Specific non-privileged ACL configurations — GenericWrite, WriteDACL, or AllExtendedRights on user or group objects — grant an attacker the ability to reset passwords, add group members, or modify access rights without holding domain admin membership. Attack path analysis tools routinely identify paths to domain compromise that pass through 4 or 5 intermediate accounts, none of which is a domain admin until the final step.

Misconception: AD recycle bin prevents account-based persistence. The AD Recycle Bin (introduced in Windows Server 2008 R2) preserves deleted objects for recovery but does not remove attacker-installed persistence mechanisms such as rogue Service Principal Names (SPNs), AdminSDHolder ACL modifications, or DCShadow-injected replication permissions. Restoration of deleted objects does not restore a clean security state if the persistence mechanism targets AD infrastructure rather than individual accounts.

Misconception: Kerberoasting only targets service accounts with weak passwords. Kerberoasting — requesting Kerberos service tickets for accounts with registered SPNs and cracking them offline — is effective whenever a service account password falls within the range of offline cracking capability, which extends to passwords of 12–14 characters with standard complexity when subjected to modern GPU-accelerated cracking hardware. NIST SP 800-63B's guidance on memorized secrets applies to service account passwords managed through automated rotation just as it does to human-managed credentials.

Misconception: Enabling LDAP signing eliminates LDAP-based attack surface. LDAP signing requires that LDAP messages be digitally signed, preventing in-transit modification. It does not prevent LDAP relay attacks in environments where other authentication protocols remain unsigned, nor does it prevent authenticated LDAP queries from exposing sensitive directory attributes to users with read access to the directory. LDAP channel binding (enforced via KB4520412) is a separate control that addresses a distinct attack class.


Checklist or steps

The following represents a structured sequence of AD security assessment phases, drawn from CISA's Securing Active Directory guidance and the Center for Internet Security (CIS) Microsoft Windows Server benchmarks:

  1. Enumerate privileged group membership — Identify all accounts in Domain Admins, Enterprise Admins, Schema Admins, Group Policy Creator Owners, and account operators groups. Document membership counts and last-logon timestamps for each.

  2. Audit Kerberos delegation settings — Identify accounts configured for unconstrained delegation (a domain-wide trust extension). Enumerate accounts with constrained delegation (S4U2Proxy) and resource-based constrained delegation (RBCD) configurations. Flag machine accounts with unconstrained delegation outside domain controllers.

  3. Review ACLs on high-value objects — Examine ACLs on the AdminSDHolder object, the domain object, and all Tier 0 group objects for non-standard permissions. Identify principals holding WriteDACL, GenericAll, or GenericWrite on sensitive objects.

  4. Assess NTLM exposure — Enumerate NTLM authentication events via Windows Event ID 4776. Identify systems generating NTLM authentication that could be migrated to Kerberos. Review NTLM restriction Group Policy settings.

  5. Validate LDAP signing and channel binding — Confirm domain controller LDAP signing enforcement via registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters\LDAPServerIntegrity (value 2 = required). Confirm LDAP channel binding token requirements.

  6. Inspect SYSVOL for credential exposure — Search SYSVOL scripts and GPO preference files for plaintext or Group Policy Preference (GPP) encrypted credentials. GPP passwords encrypted with the AES-256 key published by Microsoft in 2012 are trivially decryptable.

  7. Review domain controller security event logs — Confirm logging of Event IDs 4624, 4625, 4648, 4768, 4769, 4776, 4625 (authentication events) and 4728, 4732, 4756 (group membership changes). Validate log retention policy against organizational and regulatory requirements.

  8. Assess krbtgt account password age — The krbtgt account password should be rotated at least every 180 days per CISA recommendations, requiring two sequential rotations (due to Kerberos ticket lifetime windows). Verify last password set date via Active Directory Users and Computers or Get-ADUser krbtgt -Properties PasswordLastSet.

  9. Test domain controller exposure — Confirm that domain controllers are not reachable directly from workstation network segments. Verify that administrative access to domain controllers is restricted to dedicated privileged access workstations.

  10. Validate backup and recovery integrity — Confirm that AD backups (System State backups of domain controllers) are stored offline or in a network-isolated location. Test restoration procedures to verify recovery time objectives against incident response planning timelines documented in identity security incident response procedures.


Reference table or matrix

Attack Technique Primary Protocol MITRE ATT&CK ID Key Mitigation CIS/NIST Control
Golden Ticket Kerberos T1558.001 Rotate krbtgt password (2x); monitor for anomalous TGT lifetimes NIST AC-3, IA-5
Silver Ticket Kerberos T1558.002 Enable PAC validation; monitor service ticket anomalies NIST IA-5
Kerberoasting Kerberos T1558.003 Enforce strong service account passwords (≥25 chars); use Managed Service Accounts NIST IA-5; CIS Control 5
AS-REP Roasting Kerberos T1558.004 Require Kerberos pre-authentication on all accounts NIST IA-5
Pass-the-Hash NTLM T1550.002 Restrict NTLM; enable Credential Guard; enforce tiered admin NIST AC-17; CIS Control 4
LDAP Relay LDAP T1187 Enable LDAP signing + channel binding; disable NTLM where possible NIST SC-8
GPO Modification SMB/SYSVOL T1484.001 Restrict GPO edit rights; monitor GPO change events (Event ID 5136) N
📜 4 regulatory citations referenced  ·  🔍 Monitored by ANA Regulatory Watch  ·  View update log

Explore This Site