Download presentation
Presentation is loading. Please wait.
Published byGwendolyn Easter Mills Modified over 6 years ago
1
Configuring and Deploying Just Enough and Just-In-Time Administration
Orin Thomas @orinthomas
2
In This Session … Assume Breach Privileged Access Workstations
Jump Servers Just In Time Administration Just Enough Administration
3
We are so focused on getting it to “just work” that we spend little time ensuring that it is working in a secure manner
4
A lot of IT security involves closing barn doors after horses have bolted
5
To make our environments secure, we need to rethink the tools of systems administration
6
Context … A large number of attacks involve insiders Edward Snowden
Bradley/Chelsea Manning Ashley Madison
7
Context … A substantial number of attacks involve use of insider credentials Target Breach Metals Fired Admins PMC / ASIO
8
Context … Someone who wants to attack an organization attacks the Administrators as this is often easier than attacking the system.
9
How would you stop an evil mirror universe version of yourself from compromising your network?
10
Always assume that your attacker is smarter and more competent than you are
11
When properly prepared, the less intelligent can block the plans and actions of the more intelligent
12
Context … Administrator accounts are often over-privileged
Administrators are unlikely to complain that they have been given too many rights on the system Administrators often have an attitude that only they can be trusted with the keys to the kingdom
13
Assume Breach Security design where an organization assumes that attackers have already breached the perimeter
14
Assume Breach The current approach is to shore up the castle defenses
A strong castle defense is important … But a great castle design allows defenders to continue their defense once the enemy is inside the gates
15
Assume Breach Design for resiliency
One proton torpedo should not take out the Death Star One vulnerability should not allow everything on the network to be PWNED
16
JIT and JEA are about limiting What accounts can do and when they can do it
17
Microsoft Identity Manager Requirements
SQL Server 2012 SP1 or SQL Server 2014 Standard Edition. SharePoint Foundation 2013 with SP1 Windows Server 2012 R2 Host Computer
18
Just In Time Administration
Privileged Access Management Delegated privileges will only work for limited amount of time User booted from group after expiration date
19
Just In Time Administration
Uses multiple forests Integrated with Microsoft Identity Manager Forest Trust Resource Forest Admin Account Forest with Identity Manager
20
Setting up JIT/PAM The privileged account creation in the Account forest is done using several new PowerShell cmdlets. These cmdlets perform the following functions: Create a new group in the Account forest with the same SID (Security Identifier) as a group in the Resource forest and as an object in the MIM Service database corresponding to the group in the Account forest.
21
Setting up JIT/PAM For each user account, the cmdlets create two objects in the MIM Service database, corresponding to the user in the Resource forest and the new user account in the Account forest. Create a PAM Role object in the MIM Service database.
22
Setting up JIT/PAM The cmdlets need to be run once for each group, and once for each member of a group. Note: The migration cmdlets do not change or modify any user or groups in the Resource forest: that is to be done manually by the PAM administrator subsequently.
23
Setting up JIT/PAM $ca = get-credential –UserName CONTOSO\Administrator –Message "CORP forest domain admin credentials" $pg = New-PAMGroup –SourceGroupName "CorpAdmins" –SourceDomain CONTOSO.local –SourceDC CORPDC.contoso.local –Credentials $ca $sj = New-PAMUser –SourceDomain CONTOSO.local –SourceAccountName Jen $jp = ConvertTo-SecureString –asplaintext –force Set-ADAccountPassword –identity priv.Jen –NewPassword $jp Set-ADUser –identity priv.Jen –Enabled 1 Add-ADGroupMember "Protected Users" priv.Jen $pr = New-PAMRole –DisplayName "CorpAdmins" –Privileges $pg –Candidates $sj
24
Just In Time Administration
User needs to request privileged access
25
Just In Time Administration
Provide Reasons
26
Just In Time Administration
Record kept of elevation requests
27
Just In Time Administration
Modifying properties of secure group
28
Demo: Just In Time Administration
29
Going Further with JIT/PAM
Time based restrictions Requiring approval for elevation Requiring 2 Factor Authentication
30
PAM Guide https://aka.ms/pam
31
Just Enough Administration
Create special task specific endpoints PowerShell sessions configured so that Only certain cmdlets and parameters can be used Limit what they can be used against Ensure all activity is logged
32
Just Enough Administration
Configure endpoint so that only users who are members of specific groups can connect When connected to endpoint, special virtual account is used to perform tasks rather than user’s account
33
Just Enough Administration
Requires: PowerShell 5 / WMF 5 Windows Server 2012 R2 Windows Server 2016
34
Building JEA Determine which PowerShell cmdlets, functions, aliases and providers are needed to accomplish task.
35
Building JEA Store this information in a variable
36
Building JEA
37
Building JEA
38
Building JEA
39
Building JEA
40
JEA Demo: Locking Down Access to Windows Roles
41
JEA Extended Need to configure servers to only accept remote sessions from Jump Servers Admin workstations Lock down who is able to sign on to people who are responsible for configuring JEA endpoints Limit non JEA PowerShell connections
42
JEA Extended JEA can be deployed using DSC or scripting
DSC is a better option as you are likely to want to have multiple servers with the same JEA endpoint configuration
43
Combining JEA with PAM JEA configuration uses groups managed by PAM
User requests PAM elevation There account is made member of appropriate JEA endpoint group Can establish session during PAM elevation window
44
Configuring JEA You have to know exactly what tools people need to perform tasks Most administrators pull tools out of the box as they need them and will be reluctant to embrace a locked-down toolbox JEA requires having an excellent knowledge of what tasks people perform and how they perform them in PowerShell
45
Warning It requires your administration team to use PowerShell
JEA does not support anything other than PowerShell You can build PowerShell tools and use those with JEA
46
Things to keep in mind Complexity is the enemy of correct security configuration Configuring MIM 2016 is challenging Configuring JEA is challenging Getting both of them to work together is very very very challenging
47
Things to keep in mind Security is inconvenient
You can configure MIM to use 2FA. Even though this doubles down on the inconvenience and complexity, it would make things more secure PAM (JIT Administration) is easier to implement than JEA
48
Things to keep in mind Security needs to be commensurate with value of asset protected
49
Q&A
50
11/9/ :55 AM © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.