Phase 1 - Investigation
- Conduct interviews with personnel to clarify existing AD and authentication processes.
- Review the current Active Directory architecture and design.
- Evaluate compliance with design standards, policies, and industry best practices.
- Assess security configuration of Active Directory against current threat models.
- Evaluate configuration and health of:
- AD replication services
- DNS
- Authentication and authorization configurations
- Managed File Share access (NTFS/SMB)
- SQL databases and local server permissions
- Review data attributes within AD for consistency and accuracy. Assess access controls, including:
- Nested and cyclic groups
- Remote access
- Linux SSH access controls
- Deliver a comprehensive report detailing all findings, vulnerabilities, and configuration gaps.
Phase 2 - Remediation Planning
- Analyze data collected from the investigation phase.
- Provide a prioritized roadmap of remediation steps with estimated levels of effort.
- Recommend architectural and process improvements to align with best practices and compliance.
- Deliver updated reports for review and approval.
Must-Have Skills & Experience
- Strong documentation and reporting skills.
- Advanced PowerShell Scripting experience.
- Proven expertise in reviewing Active Directory architecture for compliance and optimization.
- Extensive knowledge of SQL databases and local server permissions.
- Deep understanding of nested and cyclic groups in AD.
- Remote access controls
- Linux SSH access controls