Sunday, 14 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > How moving on from Microsoft Active Directory strengthens your security posture
Cloud Computing

How moving on from Microsoft Active Directory strengthens your security posture

Last updated: September 5, 2024 7:34 pm
Published September 5, 2024
Share
Cloud Computing News
SHARE

Excessive-profile, wide-ranging cybersecurity breaches—the SolarWinds provide chain assault, the Colonial Pipeline ransomware incident, Russian hacking of Microsoft—have brutally uncovered the implications of getting insufficient id safety controls. Stolen or mishandled credentials, lateral motion by hackers in search of delicate information throughout a compromised community, and privilege escalation (wherein a hacker beneficial properties unauthorised entry) stay the go-to ways for in the present day’s cybercriminals. Regardless of large investments to fight these threats with new safety instruments and applied sciences, a basic weak point in id and entry administration (IAM) continues to vex enterprises of all sizes.

Although IAM ostensibly ensures that entry to networks and apps is restricted to authorised customers, the fact is that weak IAM approaches imply organisations are breached far too simply and infrequently. A weak IAM method can embrace:

  • A scarcity of multi-factor authentication (MFA) that makes phishing or brute assaults extra doubtless,
  • Granting extreme entry privileges round delicate firm information,
  • Ignoring poor password administration by workers and risking credential theft,
  • A failure to totally monitor entry actions or having insufficient controls round entry,
  • Safety gaps created by cobbling collectively level options, and
  • Making it simpler for compromised accounts to maneuver laterally inside a system. 

Because the menace panorama intensifies, companies can not afford to deal with id administration as an afterthought. Throughout industries, safety and IT leaders are grappling with the cruel actuality that their organisation’s Achilles’ heel—the weak point that threatens organisational failure—might lie within the very techniques they depend on to authenticate and authorise entry: Microsoft Lively Listing (AD). 

The historical past of AD

For those who’re an IT admin, you’ve run into Lively Listing sooner or later. AD has been the spine of id administration for over 20 years, for good or for sick. Developed by Microsoft for Microsoft-dominated IT infrastructures, AD has develop into the de facto normal for authentication and entry management for a lot of organisations. Its widespread adoption is because of the deep integration of AD with the Home windows working system and the strong set of administration instruments and options it supplies. 

See also  Verizon Boasts 'Own' Cloud Platform After Dissing Hyperscaler Deals | DCN

Regardless of its prevalence, preserving AD safe is not any simple feat. As safety necessities develop into extra stringent, cloud computing accelerates, and organisations undertake extra heterogeneous gadget environments (i.e. a mixture of managed and BYOD gadgets working on macOS, Home windows, Linux, Android, and so forth.), the AD method to IAM carries too many dangers. As a result of it’s designed for on-premise use, AD has no native technique for connecting brokers to the cloud. This makes it extremely tough to safe entry for distant staff and cloud assets, to not point out these exterior of the Home windows atmosphere.  

As a result of AD solely helps on-premise environments, many customers hoped that Microsoft’s Entra ID (previously Azure ID) could be a cloud-based different with the identical performance. However Entra ID isn’t a lift-and-shift alternative for Microsoft AD; it’s a separate platform that locks prospects into a brand new Microsoft ecosystem. It doesn’t handle on-premise techniques or non-Home windows endpoints and requires integrations with area controllers or add-on providers to entry community assets. Older, locally-operated and -managed functions can’t help the multi-factor authentication strategies Entra ID requires to substantiate id, specifically FIDO2 safety keys, OAuth tokens, or the Microsoft Authenticator app. Entra ID could also be a cloud listing, however you’ll be able to’t change Microsoft AD—or rid your self of its related challenges— simply by adopting it.

The issues with securing Microsoft AD

Regardless of its widespread use, AD presents a number of vital safety challenges:

  • Outdated and weak service accounts: Many organisations have legacy service accounts with extreme privileges and lax safety insurance policies, leaving them weak to potential compromise. As AD environments develop over time, legacy service accounts accumulate and might stay enabled with extreme permissions, even when not actively used. 
  • Lack of constant safety coverage enforcement: AD implementations are sometimes left to comply with a “reside and let reside” method to imposing safety insurance policies. With out enforcement, this could result in weak password necessities, lack of password expiration, and inadequate auditing of service account actions inside AD. 
  • Complexity and value: Regularly AD configurations require a number of and sophisticated forest configurations to ascertain logical separation of directors, which may be daunting for organisations to handle and safe successfully. Once you add funds for licensing, {hardware}, implementation and migration, coaching and staffing, and infrastructure and operational wants, many organisations utilizing AD discover themselves tethered to an ageing legacy system that lacks the flexibleness, scalability, and cost-savings potential of extra fashionable options.
See also  Hyve Managed Hosting strengthens its European presence with new data capacity in Frankfurt

Modernising AD

Regardless of these points, many organisations will proceed to make use of AD. Once we polled admins during a recent webinar, whereas 50% of IT groups mentioned they plan emigrate away from AD utterly, 34% mentioned they’ll be merely minimising their AD footprint and sustaining it for essential functions. 16% mentioned they’ll maintain AD as-is and lengthen it to the cloud. Some business-critical or legacy functions solely work with AD because the backend and a few groups will not be ready to eradicate assets like Home windows file servers or print servers. These are optimally designed for AD, or they might work in a extremely regulated atmosphere that requires authentication shops to stay on-premises. Others could also be in an in-between state as they transition to the cloud. For the various organisations who need to bridge some a part of AD’s performance with out introducing safety vulnerabilities, modernising AD is essential. 

Listed below are a number of tricks to get began, irrespective of the place you might be in your AD modernisation journey. 

Lengthen AD to the cloud:

  • Combine AD with a cloud-based id and entry administration (IAM) answer to increase consumer entry to cloud assets, similar to SaaS functions, VPNs, Wi-Fi, and non-Home windows gadgets.
  • Synchronise AD customers, teams, and credentials to the cloud IAM answer, enabling centralised administration and authentication.

Minimise the AD footprint:

  • Preserve AD just for mission-critical Home windows servers or functions that can not be migrated or decommissioned.
  • Scale back the variety of area controllers and their places, as fewer customers and gadgets depend on AD authentication.
  • Migrate end-user Home windows computer systems from AD to the cloud IAM answer, eliminating the necessity for direct AD connectivity for these gadgets.
See also  Pocket-Sized Powerhouse Primed for Growth

Handle AD from the cloud:

  • Utilise the cloud IAM answer to create, droop, and handle consumer accounts and safety group memberships, with adjustments propagated to AD in real-time.
  • Minimise the necessity to instantly log into AD servers for consumer and group administration.

Migrate away from AD:

  • Provision entry to cloud assets (SaaS apps, LDAP, RADIUS) for customers managed within the cloud IAM answer and migrate Home windows gadgets.
  • Change Home windows file servers with cloud storage options or network-attached storage (NAS) techniques that help LDAP authentication.
  • Migrate legacy functions to cloud-based options or options that help fashionable authentication protocols.
  • Migrate networking {hardware} and providers to help LDAP and RADIUS authentication from the cloud IAM answer.
  • Decommission and retire the remaining AD infrastructure as soon as all dependencies have been migrated or changed.

Modernise, don’t make do

Whether or not you’re trying to depart AD behind completely or discover a solution to co-exist, merely preserving antiquated AD implementations as-is creates an unacceptable danger posture in in the present day’s hostile cybersecurity panorama. Organisations that select to maintain AD, even quickly, should prioritise securing and modernising their AD environments by strong entry controls, constant safety coverage enforcement, and integration with cloud IAM options. AD modernisation is a vital bridge to a safer future, decreasing danger whereas positioning the enterprise for an eventual full transition to fashionable, cloud-native id administration.

Strong id administration has by no means been extra essential. The delta between the flexibleness and agility of a cloud-forward method and the sophisticated, costly, and antiquated on-premises method is barely rising. Embracing an AD modernisation technique developed round evolving id wants permits organisations of all sizes to guard identities, safeguard essential property, and strengthen factors of organisational weak point.

Source link

TAGGED: active, directory, Microsoft, Moving, posture, security, strengthens
Share This Article
Twitter Email Copy Link Print
Previous Article Ramboll acquires data centre consulting company Ramboll acquires data centre consulting company
Next Article Fountain pen illustrating the UK's signing of an ai safety treaty UK signs AI safety treaty to protect human rights and democracy
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Lendurai Raises €5.57M in Seed Funding

Mark Cowan (left), Siim Maivel (centre) and Sergii Kharagorgiiev (proper) Lendurai, a Tallinn, Estonia-based firm…

June 6, 2025

Resham Kotecha, Open Data Institute: How the EU can lead in AI

The EU has an opportunity to form how the world approaches AI and knowledge governance.…

September 5, 2025

How Crypto Venues are Changing the Landscape

Gambling has been around for centuries, with evidence of early forms dating back to 2300…

January 23, 2024

Data Center Infrastructure Management (DCIM) Market Size (Revenue) | Emerson Network Power, Schneider Electric, Eaton

A report titled “Knowledge Heart Infrastructure Administration (DCIM) Business Forecast to 2031,” which could be…

April 14, 2024

Vertiv launches Free Cooling Evaporative solution

Vertiv has launched a big improve of its thermal administration product portfolio with the introduction…

April 22, 2025

You Might Also Like

atNorth's Iceland data centre epitomises circular economy
Cloud Computing

atNorth’s Iceland data centre epitomises circular economy

By saad
How cloud infrastructure shapes the modern Diablo experience 
Cloud Computing

How cloud infrastructure shapes the modern Diablo experience 

By saad
Microsoft ‘Promptions’ fix AI prompts failing to deliver
AI

Microsoft ‘Promptions’ fix AI prompts failing to deliver

By saad
IBM moves to buy Confluent in an $11 billion cloud and AI deal
Cloud Computing

IBM moves to buy Confluent in an $11 billion cloud and AI deal

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.