1. Preparation Phase
- Conduct an inventory of all assets in your environment
- Identify and categorize assets into appropriate tiers:
- Tier 0: Domain Controllers, AD CS, DNS Servers, etc.
- Tier 1: Application and database servers
- Tier 2: Workstations and user devices
- Document current administrative accounts and their access levels
- Develop a migration plan and timeline
- Communicate changes to all stakeholders and IT staff
2. Active Directory Restructuring
- Create new Organizational Units (OUs) for each tier:
- OU=Tier0
- OU=Tier1
- OU=Tier2
- Move computer objects to their respective tier OUs
- Create tier-specific security groups:
- SG_Tier0_Admins
- SG_Tier1_Admins
- SG_Tier2_Admins
Important: Ensure you have a backup of your AD before making structural changes.
3. Creating Tiered Administrative Accounts
- Establish a naming convention for tiered accounts (e.g., T0-AdminJohnDoe, T1-AdminJaneSmith)
- Create new administrative accounts for each tier
- Add these accounts to their respective tier security groups
- Implement strong password policies for these accounts
- Enable Multi-Factor Authentication (MFA) for all administrative accounts
Tip: Use a Privileged Access Management (PAM) solution to manage and audit these high-privilege accounts.
4. Implementing Access Controls
- Create and link GPOs to each tier OU to enforce access controls:
- Tier 0 GPO: Restrict logon to Tier 0 assets
- Tier 1 GPO: Restrict logon to Tier 1 assets
- Tier 2 GPO: Restrict logon to Tier 2 assets
- Configure Windows Firewall rules to isolate tiers
- Implement LAPS (Local Administrator Password Solution) for managing local admin accounts
Warning: Test GPOs thoroughly in a non-production environment before applying them.
5. Privileged Access Workstations (PAWs) Setup
- Identify and prepare dedicated workstations for Tier 0 administration
- Harden these PAWs with enhanced security measures:
- Enable BitLocker
- Restrict internet access
- Apply strict AppLocker policies
- Configure these PAWs to only allow logon from Tier 0 accounts
6. Implementing Just-In-Time (JIT) and Just-Enough-Administration (JEA)
- Configure time-based group membership for administrative groups
- Implement a process for requesting and approving elevated access
- Set up PowerShell JEA endpoints for specific administrative tasks
- Create custom JEA role capabilities for different administrative functions
Tip: Use Azure AD Privileged Identity Management (PIM) for cloud-based JIT access.
7. Monitoring and Auditing
- Configure advanced audit policies for each tier
- Set up centralized logging (e.g., using Windows Event Forwarding)
- Implement real-time alerting for suspicious activities:
- Attempts to access higher tiers from lower tiers
- Unusual logon patterns
- Changes to privileged groups
- Regularly review and analyze security logs
8. Training and Documentation
- Develop training materials for IT staff on the new tier model
- Conduct training sessions for all affected administrators
- Create and maintain documentation on:
- Tier model architecture
- Administrative procedures for each tier
- Escalation processes
- Establish a regular review process for the tier model implementation
9. Gradual Rollout and Testing
- Begin with a pilot group of administrators and systems
- Gradually expand the implementation across the organization
- Continuously gather feedback and adjust the implementation as needed
- Conduct regular penetration testing to verify the effectiveness of the tier model
Important: Maintain a rollback plan in case of unforeseen issues during implementation.