Using Active Directory (AD) in ICS

  • Centralized management of accounts.
  • Centralized logging of Windows activities.
  • Establishing security policies to harden passwords and assets.
  • Managing users/groups roles.

References:

  1. https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md
  2. https://www.sans.org/blog/introduction-to-ics-security-part-3/
  3. https://www.xmind.net/m/5dypm8/
  4. https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
  5. https://dale-peterson.com/2007/04/17/vivid-example-for-separate-domain-tree-forest/
  6. https://www.slideshare.net/dgpeters/active-directory-in-ics-lessons-learned-from-the-field

--

--

--

ICS/IT security researcher

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to configure and use secure properties in Mule 4?

What's new in Apache Spark 3.3.0

The Role of QA in DevOps — Independent Testing Company

A Mini Glossary of 3D Terms

MongoDB Aggregations

Introduction to Database Partitioning/Sharding: NoSQL and SQL databases

How Engineering Lead can Work with Product Teams

Boy leaning on a dog

Deploy a Flask app to Azure — two ways using AKS and Azure Functions

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sulaiman Alhasawi

Sulaiman Alhasawi

ICS/IT security researcher

More from Medium

Log4Shell Part 2: Discovery, Mitigation, and a Digital Vaccine!

Log4j RCE — An analysis and comparison of Software Composition Analysis tools in the market

SANS Holiday Hack Challenge 2021

Parrot CTFs TIKI: 2 — Walkthrough