Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Who owns AD security in your organization?

By Gil Kirkpatrick
network access freepik

Background photo created by natanaelginting - www.freepik.com

May 17, 2021

Establishing operational resilience in the face of cyberattacks has become a top priority for organizations. As a core component of the IT infrastructure, Active Directory (AD) must be at the center of that process. But who is responsible for ensuring Active Directory is both protected and can be recovered quickly when a cyberattack occurs? In many organizations the answer is not clear, which can lead to missteps in detecting, defending against, and responding to cyberattacks.

AD is part of an IT organization’s Tier 0 infrastructure, meaning that it is a service upon which the company’s critical applications and processes depend. If AD isn’t running, many information systems shut down. AD is the primary authentication service for nearly all companies, and usually serves as the primary “source of truth” for the company’s identity management and authorization functions. AD provides endpoint configuration services through group policy. And AD-integrated DNS is a core networking service for most IT organizations. Nearly every cyberattack uses AD at some point in its evolution.

This combination of capabilities means that several groups within the IT organization will have interest in Active Directory’s care and feeding:

  • The IT operations team:  This team performs day-to-day administrative tasks in AD such as patching, joining and removing servers and workstations, resetting passwords, changing users’ profile information, running reports, and creating and deleting users and groups. They also typically manage AD server backups.
  • The Windows Server team: In many organizations, AD falls to the Windows Server team to manage. This team is responsible for all the Windows servers on the network, and because AD is part of the Windows OS, managing it is a straightforward extension of the work they already do.
  • The identity team: If the operations team doesn’t manage users and entitlements, an identity team has this responsibility. They manage the transfer of data and policies from the HR systems to AD, either manually, using scripts, or with some sort of a provisioning product.
  • The security team: The security team typically sets security and access control policy and manages the IT infrastructure from a security point of view, making sure that systems are patched, network devices are properly configured, and deploying and monitoring endpoint detection and prevention tools such as antivirus. The security team also typically performs periodic audits and monitors the network for malicious activity.

In the “business as usual” scenario, day-to-day operations clearly fall to the operations group. The Windows Server team will handle normal maintenance, configuration, troubleshooting, upgrading, and so forth. The identity team, if it exists, will manage the automated provisioning of accounts and permissions. And the security team will set security policy and audit and monitor the environment. But who should develop the cyber-resiliency plans for AD? The answer is not necessarily clear.

Approaching the cyber-resiliency problem for a system as pervasive and as complex as Active Directory requires the involvement of all the groups that have both relevant knowledge and a vested interest in keeping AD secure. All the groups mentioned above should be involved. And there’s the rub: It’s a bit like the parable of the blind men and the elephant. Each group will have its own view of what Active Directory is, how it is used, and what should be done to make it more resilient. How do you get these disparate groups to achieve some consensus for an Active Directory security strategy?

Agree on a Framework

The first step is to agree on a framework for understanding and discussing the problem. The best approach I’ve seen is based on the NIST Cybersecurity Framework model, which divides the cyber-security universe into five buckets of activities:

 

NIST image

NIST Cybersecurity Framework 1.1. Image belongs to NIST

Right away, the teams can see where their normal responsibilities fit, and they can bring their knowledge and expertise to bear on developing a strategy that addresses all five activity categories.

 

Establish Priorities

The scope of security activities around Active Directory is both wide and deep, and trying to bite off the whole thing at one time has little chance of success. If the group hasn’t been given priorities from upper management or the business continuity/risk management departments, they must develop priorities themselves. This is a conversation that can be led by the security team because they should have some expertise in threat assessment and risk modeling. For instance, consider a situation in which the identity management team has a good process for provisioning users and access rights and the security team has effective monitoring in place. Despite that good groundwork in place, if there is no plan to recover Active Directory from a successful ransomware attack, developing an AD recovery plan should be at the top of the list.

 

Develop the Strategy and Projects as a Team

It’s easy to fall into the trap of delegating any particular cybersecurity project to the team that seems to have the most relevant expertise, but this is a mistake. We’ve already seen that the scope of Active Directory security spans all the teams, and each team can have valuable input into both the overall strategy and the individual projects. Continuing with the example of developing an AD recovery plan, it’s likely the Windows Server team will have the most expertise regarding the recovery of AD from backup, but the security team might have input into how to assess the backups to identify the most suitable one to recover from. The identity team will understand what should be done to re-synchronize the restored Active Directory with the HR system. And the operations team might understand what applications are most critical—and, therefore, which AD domain controllers should be recovered first. Involving the entire group will help ensure that the strategy incorporates all the expertise available. This approach has the side benefit of building trust and buy-in across the teams.

 

Keep Your Strategy Flexible

The threat landscape for enterprise IT changes on a monthly or even a weekly basis. One month, the most critical issue might be dealing with potential ransomware attacks. The next month, it might be determining the risk of your software supply chain. The month after that, it might assessing the damage done by threat actors taking advantage of vulnerabilities in Microsoft Exchange. While it is important to deliver security improvement projects on time, the overall strategy needs to accommodate the changes in the AD threat landscape.

What’s most important here is that AD needs to be resilient from both a security and operations perspective. After an attack, AD needs to keep the business running while protecting the environment from subsequent attack. It doesn’t take a village to develop a cyber-resilience strategy for AD, but it does take a concerted effort by multiple teams with a broad range of expertise. By starting the discussion now, you can avoid confusion, arguments, and rash decision-making in the midst of an attack response. Having clear roles for each team and good communication helps the organizations effectively prevent, detect, and respond to identity-related cyberattacks.

KEYWORDS: active directory critical infrastructure cyber security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gil Kirkpatrick is Chief Architect at Semperis. Kirkpatrick is a long-time veteran of the commercial software industry and has focused on identity and access management products since the early 1990s. He has held technology leadership roles at HTS, NetPro, Quest Software, and ViewDS Identity Solutions, and is known as the founder of the Directory Experts Conference (later renamed The Experts Conference). Kirkpatrick is the author of Active Directory Programming, the original reference book for developers working with Microsoft’s Active Directory. He has been nominated as a Microsoft MVP for Active Directory and Enterprise Mobility for each of the last 15 years.
 
 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • finger-cyberenews

    Who in an Organization is Responsible for a Data Breach?

    See More
  • perimeter security

    8 tips for improving physical security in your organization

    See More
  • remote-enews

    Reimagine your organization’s approach to in-office infrastructure

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Classified Ad Listing

See More Products

Events

View AllSubmit An Event
  • January 14, 2026

    Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

    The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing