Source: Tenable Blog
Author: Sonya Wilcox
URL: https://www.tenable.com/blog/service-accounts-in-active-directory-these-og-nhis-could-be-your-weakest-link
ONE SENTENCE SUMMARY:
Securing Active Directory service accounts by fixing common misconfigurations can significantly reduce risk from non-human identities in IT environments.
MAIN POINTS:
- Non-human identities (NHIs) are crucial in identity management, often overpermissioned and under-secured.
- NHIs include service accounts, API keys, OAuth tokens, and cloud workloads.
- Active Directory service accounts are critical and often misconfigured, posing significant security risks.
- Kerberoasting exploits Kerberos to harvest password hashes from accounts with SPNs.
- Unconstrained Kerberos delegation allows servers to impersonate users, risking credential theft.
- Managed Service Accounts (MSAs) offer secure management but require proper configuration.
- Remediating Kerberoastable accounts involves using unprivileged or group managed service accounts.
- Delegation settings should ideally have “Do not trust this computer for delegation” enabled.
- Regularly cleaning up and managing NHIs is crucial for maintaining cyber hygiene.
- Solutions like Tenable can help identify and remediate NHI vulnerabilities in Active Directory.
TAKEAWAYS:
- Secure and regularly monitor service accounts to prevent overscoping and overpermissioning.
- Address Kerberoastable accounts by using stronger encryption and unprivileged accounts.
- Properly configure unconstrained delegation to avoid potential credential theft.
- Leverage solutions like Tenable for visibility into misconfigurations and attack paths.
- Make NHI management part of routine cybersecurity practices to mitigate risks effectively.