Website under construction


Figure 4-4: Medium-term goal plan  The figure shows six separate areas:  1



Download 13,37 Mb.
Pdf ko'rish
bet109/131
Sana27.03.2022
Hajmi13,37 Mb.
#512480
1   ...   105   106   107   108   109   110   111   112   ...   131
Bog'liq
9780735697744 Introducing Windows Server 2016 pdf

Figure 4-4:
Medium-term goal plan 
The figure shows six separate areas: 
1.
Extend PAWs to all administrators and provide additional hardening such as Credential Guard and 
RDP Restricted Admin. For more information, go to 
http://aka.ms/CyberPAW
, where this is shown 
in Phases 2 and 3. 
2.
Establish time-bound privileges (no permanent administrators). For more information, go to 
http://aka.ms/AzurePIM

3.
Create multifactor elevation. For more information, go to 
http://aka.ms/PAM

4.
Provide JEA for domain controller maintenance. For more information, go to 
http://aka.ms/JEA

5.
Lower the attack surface of domains and domain controllers. For more information, go to 
http://aka.ms/HardenAD

6.
Implement attack detection for your servers and domain controllers. For more information, go to 
http://aka.ms/ata



122 
CHAPTER 4 | Security and identity 
Long-term plan 
The long-term goals (see Figure 4-5) detail the final parts to date in an ever-evolving strategy. 
Securing your environment never stops. Therefore, this strategy will need to be reviewed and adapted 
over time, but it will provide you with a basis to begin and grow. 
As with software development, you should apply a lifecycle with regard to how you control access to 
resources. Your approach should be based on the latest principles and JEA. Following on from this, all 
administrators should be issued strong authentication mechanisms such as SmartCard or Passport 
Authentication. 
To really enhance protection, you can implement a secure forest that is isolated from a traditional user 
forest. Here, you can store the most secure systems in the environment and be fully isolated from the 
production network. The next section is to implement code integrity, which will ensure that only 
authorized code can be run on the systems. 
Finally, you can use a new feature in Hyper-V Server 2016 called shielded virtual machines. This uses a 
Generation 2 VM to encrypt a VM. In this case, you can begin by focusing on domain controllers so 
that an attacker can’t inspect a VM and copy it from the drives or do a host attack to gain access to 
the VM. Shielded VMs are described further later in this chapter. 

Download 13,37 Mb.

Do'stlaringiz bilan baham:
1   ...   105   106   107   108   109   110   111   112   ...   131




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish