信息安全研究 ›› 2021, Vol. 7 ›› Issue (1): 95-100.

• 技术应用 • 上一篇    

企业活动目录域服务安全防护措施探讨

李东,张德政   

  1. 核工业计算机应用研究所
  • 收稿日期:2021-01-10 出版日期:2021-01-05 发布日期:2021-01-10
  • 通讯作者: 李东
  • 作者简介:李 东 理学学士,信息安全工程师,主要研究方向为网络安全、红蓝对抗. lidong@cnnc.com.cn 张德政 工学学士,信息安全工程师,主要研究方向为网络安全、数据分析、安全防护. zhangdezheng@cnnc.com.cn

Discussion on Protective Measures of Enterprise Active direcorty Domain Service

  • Received:2021-01-10 Online:2021-01-05 Published:2021-01-10

摘要: 当今,随着信息技术在企业科研生产应用中的不断深入,越来越多的企业采用了集约化的网络架构及统一的管控模式,这种方法优点在于支撑业务高效运行的同时,可快速降低企业资源投入的成本。从网络安全方面来看,原有分散式的IT资产所暴露的安全风险将收敛减少,而关键节点的核心IT资产所面临的安全风险将呈倍增加,如何保障企业中核心资产的网络安全,本文将以现实中企业应用最多的架构模式Windows域环境(活动目录域服务)为例,以攻击者视角,试图将活动目录域服务常见攻击方法进行归类,分析各个环节中各类攻击方法的特点,并针对不同特点的攻击方法,提出一种让企业依据PDCA循环,依次开展域环境加固、流量监测、日志分析及安全检查等全生命周期安全防护措施的思路,以实现降低活动目录域服务安全风险的目的.

关键词: 信息技术, 企业安全, IT资产, PDCA循环, 域防护

Abstract: Nowadays, with the deepening of information technology in the application of enterprise scientific research and production, more and more enterprises adopt the intensive network architecture and unified management and control mode. The advantage of this method is to support the efficient operation of the business, at the same time, it can quickly reduce the cost of enterprise resource investment. From the perspective of network security, the security risks exposed by the original decentralized IT assets will converge and reduce, while the security risks faced by the core IT assets of key nodes will increase exponentially. How to ensure the network security of core assets in enterprises, this paper will take Windows domain environment (Active Directory Domain Service), which is the most widely used architecture mode in enterprises, as an example,from the perspective of attackers, this paper attempts to classify the common attack methods of active directory domain services, analyzes the characteristics of various attack methods in each link, and puts forward an idea that enterprises can carry out the whole life cycle security protection measures such as domain environment reinforcement, traffic monitoring, log analysis and security inspection in turn according to PDCA cycle, so as to achieve the reduction The purpose of active directory domain service security risk.

Key words: information technology, enterprise security, IT asset, PDCA cyc, domain protection