Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
7
9
category
stringlengths
3
36
subcategory
stringlengths
6
55
question
stringlengths
35
116
answer
stringlengths
461
2.14k
source_url
stringclasses
1 value
metadata
stringlengths
32
124
TIER-000
tier_architecture
Tier 0
Describe Tier 0 of the Active Directory tiering model, its assets, access rules, and monitoring requirements.
Tier 0 represents the highest control level of the Active Directory infrastructure. It contains assets that directly control identity and access across the entire AD forest. A Tier 0 compromise equals a total environment compromise. Tier 0 administrators hold absolute power over the entire information system. Protectin...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"tier_level": 0, "type": "tier_definition"}
TIER-001
tier_architecture
Tier 1
Describe Tier 1 of the Active Directory tiering model, its assets, access rules, and monitoring requirements.
Tier 1 encompasses member servers and enterprise applications that do not directly control identity but host critical data and services for the organization's operations. A Tier 1 compromise can lead to a Tier 0 compromise if segmentation controls are not properly implemented. Securing Tier 1 is essential to prevent la...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"tier_level": 1, "type": "tier_definition"}
TIER-002
tier_architecture
Tier 2
Describe Tier 2 of the Active Directory tiering model, its assets, access rules, and monitoring requirements.
Tier 2 represents the workstation and user endpoint layer. It is the most threat-exposed level as it is in direct contact with users and the Internet. The majority of attacks begin at Tier 2 (phishing, malware, social engineering). The objective is to prevent a Tier 2 compromise from spreading to upper tiers through cr...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"tier_level": 2, "type": "tier_definition"}
TIER-003
tier_architecture
Control Plane
Describe Control Plane of the Active Directory tiering model, its assets, access rules, and monitoring requirements.
The Control Plane groups tools and systems used to administer the different tiers securely. It includes Privileged Access Workstations (PAW), jump servers, and bastion hosts. The Control Plane applies the Clean Source Principle by ensuring administration always occurs from a trusted environment. It is the central eleme...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"tier_level": -1, "type": "tier_definition"}
TIER-004
tier_architecture
Data Plane
Describe Data Plane of the Active Directory tiering model, its assets, access rules, and monitoring requirements.
The Data Plane groups enterprise storage systems and data repositories. While these systems are generally classified as Tier 1 from an infrastructure perspective, they deserve special attention as they contain the most sensitive business data. Data classification and granular access control are essential to protect thi...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"tier_level": -2, "type": "tier_definition"}
IAM-001
Identity & Access Management
Protected Users group membership
How to implement the 'Protected Users group membership' control in the AD tiering model?
Add all Tier 0 privileged accounts to the Protected Users group to disable NTLM, unconstrained Kerberos delegation, and credential caching. This group forces Kerberos with AES usage and drastically reduces the credential theft attack surface. **Implementation steps:** Identify all Tier 0 accounts -> Verify application...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0], "type": "control_point"}
IAM-002
Identity & Access Management
AdminSDHolder hardening
How to implement the 'AdminSDHolder hardening' control in the AD tiering model?
Secure the AdminSDHolder container that automatically protects privileged objects every 60 minutes via the SDProp process. Verify and harden AdminSDHolder container ACLs to prevent unauthorized modifications of privileged group permissions. **Implementation steps:** Audit current AdminSDHolder ACLs -> Remove unnecessa...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
IAM-003
Identity & Access Management
Service account management (gMSA)
How to implement the 'Service account management (gMSA)' control in the AD tiering model?
Migrate traditional service accounts to Group Managed Service Accounts (gMSA) which offer automatic password rotation (every 30 days) and simplified management. gMSAs eliminate the risk of static passwords and Kerberoasting on service accounts. **Implementation steps:** Inventory all service accounts -> Identify gMSA-...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
IAM-004
Identity & Access Management
Kerberos delegation restrictions
How to implement the 'Kerberos delegation restrictions' control in the AD tiering model?
Restrict unconstrained Kerberos delegation and configure only Resource-Based Constrained Delegation (RBCD) when necessary. Unconstrained delegation allows an attacker to impersonate any user, including administrators. **Implementation steps:** Identify all accounts with unconstrained delegation -> Evaluate delegation ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
IAM-005
Identity & Access Management
LAPS deployment
How to implement the 'LAPS deployment' control in the AD tiering model?
Deploy Microsoft LAPS (Local Administrator Password Solution) on all workstations and servers to automatically generate and store unique local administrator passwords. LAPS eliminates the lateral movement risk via identical local admin passwords. **Implementation steps:** Extend AD schema for LAPS -> Deploy LAPS clien...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
IAM-006
Identity & Access Management
Fine-grained password policies
How to implement the 'Fine-grained password policies' control in the AD tiering model?
Implement Fine-Grained Password Policies (FGPP) with enhanced requirements for privileged accounts: minimum 20 character length, lockout after 3 attempts, 24 password history, and 60-day maximum lifetime for Tier 0. **Implementation steps:** Create a PSO for each tier -> Define complexity parameters per tier -> Link P...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "medium", "tier_applicable": [0, 1, 2], "type": "control_point"}
IAM-007
Identity & Access Management
Privileged group cleanup
How to implement the 'Privileged group cleanup' control in the AD tiering model?
Clean up Domain Admins, Enterprise Admins, and Schema Admins groups by removing all non-strictly necessary members. Domain Admins should contain only 3 to 5 accounts maximum. Enterprise Admins and Schema Admins should be empty during normal operations. **Implementation steps:** List all privileged group members -> Eva...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
IAM-008
Identity & Access Management
SIDHistory cleanup
How to implement the 'SIDHistory cleanup' control in the AD tiering model?
Remove residual SIDHistory attributes after domain migrations. SIDHistory can be exploited to perform privilege escalation attacks by injecting privileged group SIDs (SID History Injection). **Implementation steps:** Identify all accounts with SIDHistory -> Evaluate if SIDHistory is still needed -> Migrate ACLs using ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
IAM-009
Identity & Access Management
AdminCount attribute reset
How to implement the 'AdminCount attribute reset' control in the AD tiering model?
Clean up the AdminCount attribute on accounts that are no longer members of privileged groups. Accounts with AdminCount=1 retain restrictive ACLs defined by AdminSDHolder even after removal from privileged groups, which can cause operational issues. **Implementation steps:** Identify non-privileged accounts with Admin...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "low", "impact": "medium", "tier_applicable": [0, 1], "type": "control_point"}
IAM-010
Identity & Access Management
Authentication policies and silos
How to implement the 'Authentication policies and silos' control in the AD tiering model?
Configure Authentication Policies and Authentication Policy Silos (Windows Server 2012 R2+) to restrict privileged accounts to specific machines. Authentication silos allow confining Tier 0 accounts to authorized domain controllers and PAWs only. **Implementation steps:** Create an authentication policy per tier -> De...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "high", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
IAM-011
Identity & Access Management
Inactive account disabling
How to implement the 'Inactive account disabling' control in the AD tiering model?
Identify and disable user and computer accounts inactive for more than 90 days. Inactive accounts represent an unmonitored attack surface and can be exploited for lateral movement or privilege escalation. **Implementation steps:** Identify inactive accounts (lastLogonTimestamp) -> Notify owners -> Disable accounts aft...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "low", "impact": "medium", "tier_applicable": [0, 1, 2], "type": "control_point"}
IAM-012
Identity & Access Management
KRBTGT account restriction
How to implement the 'KRBTGT account restriction' control in the AD tiering model?
Perform regular KRBTGT account password rotation (twice consecutively to invalidate all existing tickets). The KRBTGT account is the target of Golden Ticket attacks. Regular rotation limits the lifetime of a compromised Golden Ticket. **Implementation steps:** Schedule rotation during off-peak hours -> Perform first r...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
IAM-013
Identity & Access Management
Administration account separation
How to implement the 'Administration account separation' control in the AD tiering model?
Implement dedicated administration accounts per tier (T0-admin, T1-admin, T2-admin) separate from standard user accounts. An administrator must never use their privileged account for daily tasks (email, web browsing). **Implementation steps:** Define naming convention (prefix T0-, T1-, T2-) -> Create dedicated adminis...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
IAM-014
Identity & Access Management
Service account restrictions
How to implement the 'Service account restrictions' control in the AD tiering model?
Restrict service accounts to the minimum necessary privileges. Apply 'Deny logon locally' and 'Deny logon through RDP' on service accounts. Configure SPNs correctly to prevent Kerberoasting. **Implementation steps:** Audit each service account's privileges -> Apply least privilege principle -> Configure interactive lo...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
IAM-015
Identity & Access Management
AD replication permission control
How to implement the 'AD replication permission control' control in the AD tiering model?
Restrict 'Replicating Directory Changes' and 'Replicating Directory Changes All' permissions to only legitimately necessary accounts. These permissions are exploited in DCSync attacks to extract hashes of all domain accounts. **Implementation steps:** List all accounts with replication rights -> Verify legitimacy of e...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0], "type": "control_point"}
NET-001
Network Segmentation
Tier 0 network isolation (VLAN/firewall)
How to implement the 'Tier 0 network isolation (VLAN/firewall)' control in the AD tiering model?
Isolate domain controllers and Tier 0 assets in a dedicated VLAN protected by strict firewall rules. Only flows necessary for authentication and AD replication should be allowed. **Implementation steps:** Design Tier 0 VLAN architecture -> Configure VLAN on network equipment -> Migrate DCs to new VLAN -> Configure fir...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0], "type": "control_point"}
NET-002
Network Segmentation
RDP restrictions between tiers
How to implement the 'RDP restrictions between tiers' control in the AD tiering model?
Block RDP connections between tiers except from authorized PAWs. A Tier 2 administrator must never be able to RDP to a Tier 1 server or Tier 0 domain controller. **Implementation steps:** Identify all existing RDP flows -> Configure Windows and network firewall rules -> Apply restrictions via GPO (User Rights Assignme...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
NET-003
Network Segmentation
SMB signing enforcement
How to implement the 'SMB signing enforcement' control in the AD tiering model?
Enable and enforce SMB signing on all servers and workstations. SMB signing prevents NTLM relay and man-in-the-middle attacks on the SMB protocol. **Implementation steps:** Enable SMB signing via GPO -> Test application compatibility -> Progressively enforce by OU -> Verify on third-party equipment (NAS, printers) -> ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
NET-004
Network Segmentation
LDAP signing and channel binding
How to implement the 'LDAP signing and channel binding' control in the AD tiering model?
Configure and enforce LDAP signing and LDAP channel binding on all domain controllers. These measures prevent LDAP relay attacks and unauthenticated or unencrypted LDAP queries. **Implementation steps:** Audit unsigned LDAP clients (Event ID 2889) -> Fix applications using LDAP simple bind -> Configure required LDAP s...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
NET-005
Network Segmentation
IPsec between domain controllers
How to implement the 'IPsec between domain controllers' control in the AD tiering model?
Configure IPsec tunnels between domain controllers to encrypt and authenticate AD replication traffic. IPsec protects against interception and manipulation of replication traffic. **Implementation steps:** Define IPsec policy for DCs -> Configure connection security rules -> Deploy via GPO on DCs -> Test replication w...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "high", "impact": "medium", "tier_applicable": [0], "type": "control_point"}
NET-006
Network Segmentation
DNS security
How to implement the 'DNS security' control in the AD tiering model?
Secure the Active Directory-integrated DNS infrastructure. Enable DNSSEC, restrict dynamic updates, configure DNS logging, and protect against DNS poisoning and unauthorized zone transfers. **Implementation steps:** Configure AD-integrated DNS zones in secure mode -> Restrict zone transfers -> Enable DNS logging -> Co...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "medium", "tier_applicable": [0], "type": "control_point"}
NET-007
Network Segmentation
NTLMv1 elimination
How to implement the 'NTLMv1 elimination' control in the AD tiering model?
Completely eliminate NTLMv1 from the environment and restrict NTLMv2 to strict necessity. NTLMv1 is cryptographically weak and can be cracked in seconds. Migration to Kerberos should be the long-term goal. **Implementation steps:** Audit NTLM usage (Event ID 4624 NTLM type) -> Identify dependent applications -> Config...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
NET-008
Network Segmentation
Network monitoring at tier boundaries
How to implement the 'Network monitoring at tier boundaries' control in the AD tiering model?
Deploy network monitoring probes (IDS/IPS) at boundaries between tiers to detect lateral movement attempts, unauthorized flows, and network attacks. **Implementation steps:** Identify inter-tier crossing points -> Deploy IDS/IPS probes -> Configure detection rules -> Integrate alerts into SIEM -> Test with attack scen...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "high", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
NET-009
Network Segmentation
Administration port restriction
How to implement the 'Administration port restriction' control in the AD tiering model?
Restrict access to administration ports (RDP 3389, WinRM 5985/5986, SSH 22, SMB 445) to only authorized PAW and jump server IP addresses via Windows Firewall and network firewalls. **Implementation steps:** List administration ports per tier -> Configure Windows Firewall rules -> Configure network ACLs -> Test access ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
NET-010
Network Segmentation
WMI protocol restriction
How to implement the 'WMI protocol restriction' control in the AD tiering model?
Restrict WMI access to authorized administration machines only. WMI is frequently used for lateral movement and remote command execution by attackers. **Implementation steps:** Configure WMI permissions via GPO -> Restrict DCOM access -> Configure firewall for WMI -> Test management tools -> Monitor WMI usage **Appli...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "medium", "tier_applicable": [0, 1], "type": "control_point"}
NET-011
Network Segmentation
LLMNR and NetBIOS disabling
How to implement the 'LLMNR and NetBIOS disabling' control in the AD tiering model?
Disable LLMNR (Link-Local Multicast Name Resolution) and NetBIOS on all network segments. These protocols are exploited by Responder-type attacks to capture NTLM hashes. **Implementation steps:** Disable LLMNR via GPO -> Disable NetBIOS on network adapters -> Verify DNS resolution works correctly -> Test dependent app...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
NET-012
Network Segmentation
Inter-domain trust hardening
How to implement the 'Inter-domain trust hardening' control in the AD tiering model?
Secure trust relationships between domains. Enable SID filtering, restrict selective authentication, and regularly audit existing trusts. Misconfigured trusts are a cross-forest attack vector. **Implementation steps:** Inventory all existing trusts -> Enable SID filtering on external trusts -> Configure selective auth...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
PAW-001
Privileged Access Workstations (PAW)
Dedicated hardware for Tier 0 admin
How to implement the 'Dedicated hardware for Tier 0 admin' control in the AD tiering model?
Deploy dedicated physical hardware exclusively for Tier 0 administration. Tier 0 PAWs must never be virtual machines on a shared hypervisor and should only be used for domain controller and Tier 0 asset administration. **Implementation steps:** Acquire dedicated hardware with TPM 2.0 -> Install clean OS from verified ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0], "type": "control_point"}
PAW-002
Privileged Access Workstations (PAW)
Device Guard / Credential Guard
How to implement the 'Device Guard / Credential Guard' control in the AD tiering model?
Enable Windows Defender Credential Guard on all PAWs to protect authentication secrets (NTLM hashes, Kerberos TGT tickets) in an isolated virtualized environment (VSM). Credential Guard renders Mimikatz attacks ineffective. **Implementation steps:** Verify hardware prerequisites (VBS, UEFI, TPM) -> Enable Credential G...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
PAW-003
Privileged Access Workstations (PAW)
AppLocker / WDAC policies
How to implement the 'AppLocker / WDAC policies' control in the AD tiering model?
Deploy AppLocker or Windows Defender Application Control (WDAC) policies on PAWs to only allow approved administration applications. Block execution of unsigned scripts, unauthorized binaries, and unapproved DLLs. **Implementation steps:** Inventory required applications on PAWs -> Create a baseline policy in audit mo...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
PAW-004
Privileged Access Workstations (PAW)
Clean source principle
How to implement the 'Clean source principle' control in the AD tiering model?
Apply the clean source principle: a security asset can only be administered from a trust environment at least equal to its security level. A Tier 0 DC can only be administered from a Tier 0 PAW, never from a standard workstation. **Implementation steps:** Document the principle and associated rules -> Configure logon ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
PAW-005
Privileged Access Workstations (PAW)
USB device restrictions
How to implement the 'USB device restrictions' control in the AD tiering model?
Block unauthorized USB device usage on PAWs to prevent malicious USB key attacks (BadUSB, Rubber Ducky) and data exfiltration. Only input devices (keyboard, mouse) should be allowed. **Implementation steps:** Configure USB restrictions via GPO -> Allow only necessary device classes -> Block USB storage devices -> Depl...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "low", "impact": "medium", "tier_applicable": [0, 1], "type": "control_point"}
PAW-006
Privileged Access Workstations (PAW)
Internet access restrictions
How to implement the 'Internet access restrictions' control in the AD tiering model?
Completely block Internet access on Tier 0 PAWs and severely restrict on Tier 1 PAWs. Internet access is the primary initial compromise vector (phishing, drive-by download, watering hole). **Implementation steps:** Configure proxy to block Internet on PAWs -> Configure outbound firewall rules -> Allow only Windows upd...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
PAW-007
Privileged Access Workstations (PAW)
Multi-factor authentication (MFA)
How to implement the 'Multi-factor authentication (MFA)' control in the AD tiering model?
Implement multi-factor authentication for PAW access and all administrative connections. Use hardware tokens (smartcard, FIDO2) rather than software solutions for Tier 0 accounts. **Implementation steps:** Deploy PKI infrastructure for smartcards -> Issue certificates for Tier 0 administrators -> Configure smartcard l...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
PAW-008
Privileged Access Workstations (PAW)
Secure boot chain
How to implement the 'Secure boot chain' control in the AD tiering model?
Configure Secure Boot, BitLocker with TPM, and boot integrity verification on all PAWs. The secure boot chain ensures the operating system has not been altered by a bootkit or rootkit. **Implementation steps:** Enable Secure Boot in BIOS/UEFI -> Configure BitLocker with TPM + PIN -> Enable boot integrity measurement -...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "medium", "tier_applicable": [0, 1], "type": "control_point"}
PAW-009
Privileged Access Workstations (PAW)
PAW patching and hardening
How to implement the 'PAW patching and hardening' control in the AD tiering model?
Keep PAWs updated with the latest security patches and apply hardening compliant with CIS benchmarks. PAWs must be the best-protected machines in the environment as they serve as the administration vector for all critical assets. **Implementation steps:** Configure dedicated WSUS for PAWs -> Apply patches within 48h (...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
PAW-010
Privileged Access Workstations (PAW)
PAW logging and monitoring
How to implement the 'PAW logging and monitoring' control in the AD tiering model?
Configure comprehensive logging on PAWs with centralized log forwarding. Record all administrative actions, logons, program executions, and configuration changes. PAWs are highly monitored assets. **Implementation steps:** Configure advanced audit policy -> Enable Sysmon with custom configuration -> Configure log forw...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
GPO-001
Group Policy Hardening
Dedicated GPO per tier
How to implement the 'Dedicated GPO per tier' control in the AD tiering model?
Create dedicated GPOs for each tier with a corresponding OU structure. Each tier must have its own hardening, access restriction, and audit GPOs. Never mix security settings between tiers in the same GPO. **Implementation steps:** Design OU structure per tier -> Create baseline GPOs per tier -> Link GPOs to correspond...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-002
Group Policy Hardening
Logon restrictions (Deny logon)
How to implement the 'Logon restrictions (Deny logon)' control in the AD tiering model?
Configure 'Deny logon locally', 'Deny logon through Remote Desktop Services', and 'Deny access to this computer from the network' restrictions to prevent privileged accounts from logging on to wrong tiers. This is the fundamental technical mechanism of tiering. **Implementation steps:** Define access matrices per tier...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-003
Group Policy Hardening
User Rights Assignment
How to implement the 'User Rights Assignment' control in the AD tiering model?
Configure User Rights Assignment restrictively to limit privileges on each tier. Restrict 'Act as part of the operating system', 'Debug programs', 'Take ownership', 'Load drivers' to strictly necessary accounts only. **Implementation steps:** Audit current rights on each tier -> Define minimum rights per tier -> Confi...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-004
Group Policy Hardening
Security Options hardening
How to implement the 'Security Options hardening' control in the AD tiering model?
Configure GPO Security Options to harden system behavior: disable anonymous enumeration, force logoff on session expiration, disable LM hash storage, configure SMB signing level. **Implementation steps:** Apply CIS recommendations for Security Options -> Disable LM hash storage -> Configure UAC elevation behavior -> R...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "medium", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-005
Group Policy Hardening
Audit policy configuration
How to implement the 'Audit policy configuration' control in the AD tiering model?
Configure Advanced Audit Policy on all tiers to capture critical security events: logons, object access, policy changes, account management, and privilege use. **Implementation steps:** Define audit policy per tier -> Configure Advanced Audit Policy via GPO -> Ensure log sizes are sufficient -> Configure centralized c...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-006
Group Policy Hardening
PowerShell logging (ScriptBlock, Module, Transcription)
How to implement the 'PowerShell logging (ScriptBlock, Module, Transcription)' control in the AD tiering model?
Enable all three levels of PowerShell logging: ScriptBlock Logging (records executed code), Module Logging (records used modules), and Transcription (records complete sessions). PowerShell is the primary attacker tool for post-exploitation. **Implementation steps:** Enable ScriptBlock Logging via GPO -> Enable Module ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-007
Group Policy Hardening
WMI/WinRM restrictions
How to implement the 'WMI/WinRM restrictions' control in the AD tiering model?
Restrict WMI and WinRM usage to authorized administration accounts and machines only. These remote administration protocols are widely used by attackers for lateral movement and remote command execution. **Implementation steps:** Configure WMI permissions per namespace -> Restrict WinRM to authorized machines (Trusted...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
GPO-008
Group Policy Hardening
LSASS protection (RunAsPPL)
How to implement the 'LSASS protection (RunAsPPL)' control in the AD tiering model?
Enable PPL (Protected Process Light) protection on the LSASS process to prevent in-memory credential extraction by tools like Mimikatz. RunAsPPL prevents non-Microsoft signed processes from interacting with LSASS. **Implementation steps:** Test in audit mode with LSA protection audit mode -> Verify security provider c...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-009
Group Policy Hardening
Script execution restriction
How to implement the 'Script execution restriction' control in the AD tiering model?
Restrict script execution (VBScript, JScript, HTA, WSH) via GPO and AppLocker/WDAC. Scripts are widely used in phishing attacks and for persistence. Disable Windows Script Host (WSH) on machines that do not need it. **Implementation steps:** Audit script usage in the environment -> Disable WSH via registry -> Configur...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "medium", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-010
Group Policy Hardening
Debug mode restriction
How to implement the 'Debug mode restriction' control in the AD tiering model?
Restrict the SeDebugPrivilege to only accounts that strictly need it. This privilege allows access to any process memory and is used by credential extraction tools like Mimikatz. **Implementation steps:** Remove SeDebugPrivilege from all groups except local Administrators on DCs -> Configure via GPO User Rights Assign...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-011
Group Policy Hardening
Command line process creation auditing
How to implement the 'Command line process creation auditing' control in the AD tiering model?
Enable process creation auditing with complete command line (Process Command Line). This feature records arguments passed to each created process, essential for post-exploitation attack detection. **Implementation steps:** Enable process creation auditing via GPO -> Enable command line inclusion -> Configure security ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
GPO-012
Group Policy Hardening
Software installation restriction
How to implement the 'Software installation restriction' control in the AD tiering model?
Restrict software installation to authorized accounts only and from approved sources only. Use AppLocker/WDAC to block execution of unsigned or unapproved binaries, especially on Tier 0 and Tier 1 servers. **Implementation steps:** Define approved software list per tier -> Configure AppLocker in allowlist mode -> Bloc...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "high", "impact": "medium", "tier_applicable": [0, 1, 2], "type": "control_point"}
MON-001
Monitoring & Detection
Centralized event log forwarding
How to implement the 'Centralized event log forwarding' control in the AD tiering model?
Deploy centralized Windows log collection via WEF (Windows Event Forwarding) or SIEM agents to a centralized security platform. All critical security events must be centralized for correlation and detection. **Implementation steps:** Deploy WEF/WEC infrastructure or SIEM agents -> Configure subscriptions to critical e...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
MON-002
Monitoring & Detection
Honey tokens and honey accounts
How to implement the 'Honey tokens and honey accounts' control in the AD tiering model?
Deploy honey tokens (fake privileged accounts, fake SPNs, fake DNS entries) in Active Directory to detect reconnaissance and attacks. Any interaction with a honey token indicates malicious activity. **Implementation steps:** Create realistic honey token accounts (fake DA, fake service accounts) -> Configure fake SPNs ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
MON-003
Monitoring & Detection
DCSync attack detection
How to implement the 'DCSync attack detection' control in the AD tiering model?
Implement DCSync attack detection which exploits AD replication rights to extract hashes of all domain accounts. Monitor Event ID 4662 with replication GUIDs from non-DC machines. **Implementation steps:** Configure directory service access auditing -> Create SIEM rule for Event ID 4662 with replication GUIDs -> Filte...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
MON-004
Monitoring & Detection
Golden Ticket attack detection
How to implement the 'Golden Ticket attack detection' control in the AD tiering model?
Implement Golden Ticket attack detection which uses the KRBTGT account hash to forge arbitrary TGTs. Monitor anomalies in Kerberos tickets: abnormal lifetime, non-existent SIDs, name/SID mismatch. **Implementation steps:** Configure detailed Kerberos auditing -> Create detection rules for Event ID 4769 with anomalies ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0], "type": "control_point"}
MON-005
Monitoring & Detection
Kerberoasting detection
How to implement the 'Kerberoasting detection' control in the AD tiering model?
Detect Kerberoasting attacks that request service tickets (TGS) for accounts with SPNs to attempt offline password cracking. Monitor massive TGS requests with RC4 encryption for service accounts. **Implementation steps:** Configure detailed service ticket auditing (Event ID 4769) -> Create rules for massive TGS reques...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
MON-006
Monitoring & Detection
Lateral movement detection
How to implement the 'Lateral movement detection' control in the AD tiering model?
Implement lateral movement detection between machines. Monitor unauthorized inter-tier connections, pass-the-hash, pass-the-ticket, and overpass-the-hash techniques. Correlate logon events with normal patterns. **Implementation steps:** Establish a baseline of normal connections -> Configure abnormal connection detect...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
MON-007
Monitoring & Detection
Privileged group change alerts
How to implement the 'Privileged group change alerts' control in the AD tiering model?
Configure real-time alerts on any modification of privileged groups (Domain Admins, Enterprise Admins, Schema Admins, Administrators, Backup Operators, etc.). Any member addition or removal must trigger an immediate notification. **Implementation steps:** Identify all privileged groups to monitor -> Configure SIEM rul...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0], "type": "control_point"}
MON-008
Monitoring & Detection
AD replication monitoring
How to implement the 'AD replication monitoring' control in the AD tiering model?
Monitor Active Directory replication health and detect anomalies. Replication failures can indicate a compromise or critical malfunction. Also monitor unauthorized DC additions (DCShadow). **Implementation steps:** Configure repadmin /replsummary monitoring -> Alert on persistent replication failures -> Detect unplann...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
MON-009
Monitoring & Detection
AS-REP Roasting detection
How to implement the 'AS-REP Roasting detection' control in the AD tiering model?
Detect AS-REP Roasting attacks targeting accounts with Kerberos pre-authentication disabled. Monitor AS-REQ requests without pre-authentication and identify vulnerable accounts. **Implementation steps:** Identify accounts without Kerberos pre-authentication -> Enable pre-authentication on all possible accounts -> Conf...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "low", "impact": "medium", "tier_applicable": [0, 1], "type": "control_point"}
MON-010
Monitoring & Detection
AD persistence detection
How to implement the 'AD persistence detection' control in the AD tiering model?
Detect persistence mechanisms in Active Directory: schema modifications, ACL backdoor additions, default security descriptor modification, SPN additions on privileged accounts, unauthorized trust creation. **Implementation steps:** Configure schema modification auditing -> Monitor ACL changes on critical objects -> De...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0], "type": "control_point"}
OPS-001
Operational Procedures
Break-glass procedures
How to implement the 'Break-glass procedures' control in the AD tiering model?
Define and test break-glass procedures for emergency access to Tier 0 systems when normal authentication mechanisms are unavailable. Break-glass accounts must be stored securely (physical safe) and their use must trigger an immediate alert. **Implementation steps:** Create dedicated break-glass accounts -> Store crede...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
OPS-002
Operational Procedures
AD change management
How to implement the 'AD change management' control in the AD tiering model?
Implement a formal change management process for all Active Directory infrastructure modifications. Any modification to GPOs, privileged groups, schema, DNS configuration, or trusts must follow a formal approval process. **Implementation steps:** Define the AD change management process -> Create change request forms -...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "medium", "tier_applicable": [0, 1], "type": "control_point"}
OPS-003
Operational Procedures
AD backup and recovery (DSRM, snapshots)
How to implement the 'AD backup and recovery (DSRM, snapshots)' control in the AD tiering model?
Implement robust Active Directory backup and recovery procedures. Regularly back up DC System State, test restorations, keep DSRM passwords up to date, and document complete forest recovery procedures. **Implementation steps:** Configure daily System State backups -> Store backups offline and offsite -> Test restorati...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0], "type": "control_point"}
OPS-004
Operational Procedures
Tier 0 admin onboarding
How to implement the 'Tier 0 admin onboarding' control in the AD tiering model?
Define a structured onboarding process for new Tier 0 administrators including background checks, mandatory tiering model training, PAW provisioning, dedicated account creation, and acceptable use policy signing. **Implementation steps:** Define prerequisites to become a Tier 0 admin -> Create the mandatory training p...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "medium", "tier_applicable": [0], "type": "control_point"}
OPS-005
Operational Procedures
Regular access reviews
How to implement the 'Regular access reviews' control in the AD tiering model?
Perform quarterly access reviews on all privileged accounts and sensitive group memberships. Each membership must be justified by an active business need. Unjustified access must be revoked immediately. **Implementation steps:** Define access review scope -> Automate membership extraction -> Send reviews to managers f...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "medium", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
OPS-006
Operational Procedures
Penetration testing schedule
How to implement the 'Penetration testing schedule' control in the AD tiering model?
Schedule regular penetration tests (at least annual) specifically targeting the Active Directory infrastructure. Tests must validate tiering model effectiveness, resistance to known attacks, and detection capability. **Implementation steps:** Define AD pentest scope and objectives -> Select an AD-specialized provider ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "high", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
OPS-007
Operational Procedures
AD compromise incident response
How to implement the 'AD compromise incident response' control in the AD tiering model?
Develop an incident response plan specific to Active Directory compromises. Define procedures for each attack type (DCSync, Golden Ticket, Kerberoasting, DC compromise), responsible teams, containment and remediation steps. **Implementation steps:** Develop playbooks per AD attack type -> Define roles and responsibili...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "high", "impact": "high", "tier_applicable": [0, 1, 2], "type": "control_point"}
OPS-008
Operational Procedures
Documentation requirements
How to implement the 'Documentation requirements' control in the AD tiering model?
Maintain complete and up-to-date documentation of the Active Directory infrastructure, tiering model, operational procedures, access matrices, network mapping, and emergency contacts. Documentation is essential for operational continuity. **Implementation steps:** Define documentation scope -> Create documentation tem...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P3", "effort": "medium", "impact": "medium", "tier_applicable": [0, 1, 2], "type": "control_point"}
OPS-009
Operational Procedures
Continuous administrator training
How to implement the 'Continuous administrator training' control in the AD tiering model?
Implement a continuous training program for AD administrators on new threats, emerging attack techniques, security best practices, and tiering model evolutions. Administrators are the first line of defense. **Implementation steps:** Define the annual training program -> Include technical and awareness training -> Orga...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P2", "effort": "medium", "impact": "medium", "tier_applicable": [0, 1, 2], "type": "control_point"}
OPS-010
Operational Procedures
Privileged administrator offboarding
How to implement the 'Privileged administrator offboarding' control in the AD tiering model?
Define a structured offboarding process for privileged administrators leaving the organization or changing roles. Immediately revoke all access, rotate shared secrets, audit recent actions, and recover equipment (PAW, MFA tokens). **Implementation steps:** Define the admin offboarding checklist -> Revoke all access wi...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"priority": "P1", "effort": "low", "impact": "high", "tier_applicable": [0, 1], "type": "control_point"}
PHASE-000
implementation_roadmap
Phase 0: Assessment and inventory
Describe Phase 0: Assessment and inventory of the AD tiering model implementation.
Perform a complete audit of the existing Active Directory environment. Map all assets, privileged accounts, network flows, and application dependencies. Identify gaps against Microsoft best practices and ANSSI recommendations. Assess the current maturity level and define the target. This phase is fundamental as it cond...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "4-6 semaines / 4-6 weeks", "dependencies": [], "type": "roadmap_phase"}
PHASE-001
implementation_roadmap
Phase 1: Quick wins - Rapid hardening
Describe Phase 1: Quick wins - Rapid hardening of the AD tiering model implementation.
Implement quick-win security measures that immediately reduce the attack surface. Add privileged accounts to the Protected Users group, deploy LAPS for local administrator passwords, clean up privileged groups, disable obsolete protocols. These actions offer an optimal effort/benefit ratio and form the foundation of th...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "2-4 semaines / 2-4 weeks", "dependencies": ["PHASE-000"], "type": "roadmap_phase"}
PHASE-002
implementation_roadmap
Phase 2: Network segmentation
Describe Phase 2: Network segmentation of the AD tiering model implementation.
Implement network segmentation between the different tiers. Create dedicated VLANs for Tier 0, Tier 1, and Tier 2. Configure firewall rules to control flows between tiers. Implement microsegmentation for the most critical assets. This phase is often the most complex as it impacts existing network infrastructure and req...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "6-10 semaines / 6-10 weeks", "dependencies": ["PHASE-000", "PHASE-001"], "type": "roadmap_phase"}
PHASE-003
implementation_roadmap
Phase 3: PAW deployment
Describe Phase 3: PAW deployment of the AD tiering model implementation.
Deploy Privileged Access Workstations (PAW) for administrators of each tier. Tier 0 PAWs are the most critical and must be deployed first. Apply the Clean Source Principle to ensure administration occurs from a trusted environment. Configure Device Guard, Credential Guard, AppLocker, and network access restrictions. *...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "4-8 semaines / 4-8 weeks", "dependencies": ["PHASE-001", "PHASE-002"], "type": "roadmap_phase"}
PHASE-004
implementation_roadmap
Phase 4: GPO hardening
Describe Phase 4: GPO hardening of the AD tiering model implementation.
Configure and deploy hardening Group Policy Objects (GPO) for each tier. Implement logon restrictions to prevent privileged accounts from logging on to the wrong tiers. Configure audit policies, PowerShell restrictions, LSASS protection, and advanced security settings. GPOs are the central mechanism for enforcing tieri...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "4-6 semaines / 4-6 weeks", "dependencies": ["PHASE-001", "PHASE-003"], "type": "roadmap_phase"}
PHASE-005
implementation_roadmap
Phase 5: Monitoring deployment
Describe Phase 5: Monitoring deployment of the AD tiering model implementation.
Set up the monitoring and detection infrastructure for the entire AD environment. Deploy centralized event log collection, configure real-time alerts, implement honey tokens and known attack detection mechanisms (DCSync, Golden Ticket, Kerberoasting). Monitoring is essential to detect tiering model violations and compr...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "6-8 semaines / 6-8 weeks", "dependencies": ["PHASE-004"], "type": "roadmap_phase"}
PHASE-006
implementation_roadmap
Phase 6: Tier 1 segmentation
Describe Phase 6: Tier 1 segmentation of the AD tiering model implementation.
Refine Tier 1 segmentation by creating subcategories by application type and criticality level. Separate database servers, application servers, Exchange servers, SCCM, and WSUS into distinct segments. Implement dedicated administration accounts per segment. This additional granularity significantly reduces the impact o...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "6-10 semaines / 6-10 weeks", "dependencies": ["PHASE-002", "PHASE-004", "PHASE-005"], "type": "roadmap_phase"}
PHASE-007
implementation_roadmap
Phase 7: Tier 2 hardening
Describe Phase 7: Tier 2 hardening of the AD tiering model implementation.
Strengthen security of workstations and user endpoints (Tier 2). Deploy EDR solutions, harden Windows configurations, restrict user privileges, implement application control policies. Tier 2 being the most likely entry point for attackers, its hardening is essential to protect the entire tier chain. **Deliverables:** ...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "8-12 semaines / 8-12 weeks", "dependencies": ["PHASE-004", "PHASE-005"], "type": "roadmap_phase"}
PHASE-008
implementation_roadmap
Phase 8: Operational maturity
Describe Phase 8: Operational maturity of the AD tiering model implementation.
Establish mature operational processes to maintain and evolve the tiering model. Formalize AD change management procedures, privileged administrator onboarding/offboarding processes, break-glass procedures, regular access reviews, and incident response exercises. Operational maturity is what ensures the tiering model's...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "6-8 semaines / 6-8 weeks", "dependencies": ["PHASE-005", "PHASE-006", "PHASE-007"], "type": "roadmap_phase"}
PHASE-009
implementation_roadmap
Phase 9: Continuous improvement
Describe Phase 9: Continuous improvement of the AD tiering model implementation.
Establish a continuous improvement cycle for the tiering model. Perform regular audits, adapt the model to new threats and technologies, integrate incident feedback, and evolve controls based on organizational maturity. Continuous improvement is an endless process that ensures the tiering model remains effective agains...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"duration": "Continu / Ongoing", "dependencies": ["PHASE-008"], "type": "roadmap_phase"}
QA-EN-001
Core concepts
questions_answers
What is the Active Directory Tiering Model and why is it essential for security?
The Active Directory Tiering Model is a security architecture that segments the AD environment into hierarchical levels (Tier 0, Tier 1, Tier 2) to prevent attack propagation between layers. Tier 0 contains domain controllers and identity control assets, Tier 1 contains member servers and applications, and Tier 2 conta...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-002
Tier 0
questions_answers
What does Tier 0 contain and why is it the most critical level?
Tier 0 contains Domain Controllers (DCs), AD CS (Certificate Services), AD FS (Federation Services), Azure AD Connect, PKI infrastructure, and KRBTGT accounts. It is the most critical because a Tier 0 compromise equals a total compromise of the entire AD forest. An attacker controlling Tier 0 can create accounts, modif...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-003
Protected Users
questions_answers
How does the Protected Users group protect privileged accounts in the tiering model?
The Protected Users group (available since Windows Server 2012 R2) automatically applies enhanced protections to member accounts: NTLM authentication disabled (Kerberos with AES only), credential caching prohibited, unconstrained Kerberos delegation disabled, and TGT lifetime reduced to 4 hours. In the tiering context,...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-004
PAW
questions_answers
What is a PAW (Privileged Access Workstation) and how to implement it?
A PAW is a physical workstation dedicated exclusively to administering a specific tier. For Tier 0, the PAW must be dedicated hardware with TPM 2.0, Secure Boot, BitLocker, Credential Guard, and Device Guard enabled. Internet access is completely blocked, only AD administration tools are allowed via AppLocker/WDAC, and...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-005
gMSA
questions_answers
How do gMSA (Group Managed Service Accounts) improve tiering security?
gMSAs replace traditional service accounts by offering automatic password rotation every 30 days, with complex 240-character passwords automatically generated by AD. They eliminate the risk of static passwords targeted by Kerberoasting attacks. In the tiering model, each service should use a gMSA with minimum necessary...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-006
LAPS
questions_answers
How to deploy LAPS within the tiering model framework?
LAPS (Local Administrator Password Solution) automatically generates and stores unique local administrator passwords for each machine in a protected AD attribute. Deployment includes: AD schema extension, LAPS client deployment via GPO or SCCM, read permission configuration per tier (only Tier 0 admins read DC password...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-007
Kerberos
questions_answers
Why is unconstrained Kerberos delegation dangerous for tiering?
Unconstrained Kerberos delegation allows a server to store TGTs of users who authenticate to it and reuse them to access any service on their behalf. If a Tier 1 server with unconstrained delegation is compromised, the attacker can capture TGTs of Tier 0 administrators who connect to it and replay them to take domain c...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-008
AdminSDHolder
questions_answers
What is the role of AdminSDHolder in tiering security?
AdminSDHolder is an automatic Active Directory protection mechanism that reapplies protective ACLs every 60 minutes (via the SDProp process) on objects belonging to privileged groups. In tiering, it is crucial to harden the AdminSDHolder container ACLs (CN=AdminSDHolder,CN=System) to ensure only authorized Tier 0 accou...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-009
GPO
questions_answers
How to configure GPO logon restrictions to enforce tiering?
GPO logon restrictions are the central technical mechanism of tiering. On Tier 2 machines (workstations), configure 'Deny logon locally' and 'Deny logon through Remote Desktop Services' for Tier 0 and Tier 1 groups. On Tier 1 machines (servers), apply the same restrictions for Tier 0 groups (except from PAWs). Use User...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-010
Network segmentation
questions_answers
How to segment the network to support the AD tiering model?
Network segmentation for tiering requires at minimum three VLANs: one for Tier 0 (DCs and critical assets), one for Tier 1 (member servers), and one for Tier 2 (workstations). Firewall rules should only allow necessary flows: authentication (Kerberos 88, LDAP 389/636, DNS 53) from all tiers to Tier 0, but block adminis...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-011
Lateral movement
questions_answers
How to prevent lateral movement in the tiering model?
Lateral movement prevention in tiering relies on several complementary measures: LAPS deployment to eliminate identical local admin passwords, Credential Guard to protect in-memory credentials, GPO logon restrictions to prevent privileged accounts from logging on to wrong tiers, SMB signing to prevent NTLM relay, LLMNR...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-012
Privilege escalation
questions_answers
What are the privilege escalation prevention techniques in tiering?
Privilege escalation prevention in tiering combines: privileged group cleanup (fewer than 5 members in Domain Admins), residual SIDHistory removal, SeDebugPrivilege restriction, LSASS protection with RunAsPPL, AD replication permission control (against DCSync), ACL rights restriction on critical AD objects, AdminSDHold...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-013
Attack detection
questions_answers
How to detect a DCSync attack in the AD environment?
The DCSync attack exploits 'Replicating Directory Changes' and 'Replicating Directory Changes All' rights to simulate a domain controller and extract hashes of all accounts. Detection relies on monitoring Event ID 4662 with replication GUIDs (1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 and 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-014
Attack detection
questions_answers
How to detect and prevent a Golden Ticket attack?
The Golden Ticket attack uses the KRBTGT account hash to forge arbitrary TGTs with any privileges. Prevention requires regular KRBTGT password rotation (twice consecutively, at least 12 hours apart). Detection relies on identifying anomalies in Kerberos tickets: lifetime exceeding policy (Event ID 4769), RC4 encryption...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-015
Kerberoasting
questions_answers
How to protect against Kerberoasting in the tiering model?
Kerberoasting targets service accounts with SPNs to extract TGS tickets and attempt offline password cracking. Protection in tiering includes: migration to gMSAs (240-character passwords), enforcing 25+ character passwords for service accounts that cannot use gMSA, using AES encryption instead of RC4, deploying honey t...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
QA-EN-016
Core concepts
questions_answers
What is the difference between Tier 1 and Tier 2 in the tiering model?
Tier 1 includes member servers and enterprise applications (SQL Server, Exchange, SCCM, WSUS, file servers) that host critical data and services but do not directly control identity. Tier 2 includes workstations, laptops, and mobile devices. The main difference is the risk level: Tier 2 is the most exposed (direct cont...
https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/
{"type": "qa", "language": "en"}
End of preview. Expand in Data Studio

Active Directory Tiering Model Dataset (EN)

Comprehensive English dataset on Active Directory tiering model implementation, covering tier architecture, security control points, implementation roadmap, and detailed Q&A.

Dataset Contents

Category Entries Description
Tier Architecture 5 Detailed definitions for Tier 0, 1, 2, Control Plane, Data Plane
Control Points 69 Security controls organized in 6 categories
Implementation Roadmap 10 Phases 0 to 9 with deliverables and success criteria
Questions & Answers 80 Q&A covering all tiering aspects
Total 164

Control Point Categories

  • Identity & Access Management (15 points): Protected Users, AdminSDHolder, gMSA, LAPS, Kerberos delegation, FGPP
  • Network Segmentation (12 points): VLAN isolation, SMB signing, LDAP signing, IPsec, NTLMv1
  • Privileged Access Workstations - PAW (10 points): Credential Guard, AppLocker/WDAC, MFA, Secure Boot
  • Group Policy Hardening (12 points): Per-tier GPO, logon restrictions, PowerShell auditing, RunAsPPL
  • Monitoring & Detection (10 points): DCSync, Golden Ticket, Kerberoasting, honey tokens
  • Operational Procedures (10 points): Break-glass, backups, access reviews, incident response

Data Structure

{
  "id": "IAM-001",
  "category": "Identity & Access Management",
  "subcategory": "Protected Users group membership",
  "question": "How to implement the control...",
  "answer": "Detailed description with steps...",
  "source_url": "https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/",
  "metadata": "{\"priority\": \"P1\", \"effort\": \"low\", \"impact\": \"high\"}"
}

Usage

from datasets import load_dataset

dataset = load_dataset("AYI-NEDJIMI/ad-tiering-model-en")

# Filter by category
tier0_controls = [r for r in dataset["train"] if "Tier 0" in r["answer"]]

# Search by priority
import json
p1_controls = [r for r in dataset["train"]
               if json.loads(r["metadata"]).get("priority") == "P1"]

Additional Resources

About the Author

AYI-NEDJIMI Consultants - Cybersecurity consulting firm specialized in Active Directory infrastructure security.

Our experts help organizations implement the tiering model, conduct AD security audits, respond to incidents, and train technical teams.

Free Resources - 8 Whitepapers

We provide 8 free whitepapers covering Active Directory security, the tiering model, attack techniques, and defense best practices. Visit our complete resource collection.

French Version

This dataset is also available in French: AYI-NEDJIMI/ad-tiering-model-fr

License

MIT License - Free to use with attribution.

Author

Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert

Related Articles

Free Cybersecurity Resources

Part of the Collection

This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.

Downloads last month
15

Space using AYI-NEDJIMI/ad-tiering-model-en 1

Collections including AYI-NEDJIMI/ad-tiering-model-en