• 0 Posts
  • 10 Comments
Joined 2 years ago
cake
Cake day: August 15th, 2023

help-circle
  • I do this continually for work as well, I approach every new project assuming best practice or approach options have changed. It doesn’t matter how experienced I am in what I’m doing, I still loop back and check.

    It’s such an automatic thing I don’t even think about it, but honestly not sure if it’s because of interest or because of fear of being called out for doing something wrong lol






  • The attack vectors I’m thinking of just come from the inherent complexity and centralization. I’m just considering the amount of damage that can be done with a compromised DA account for example vs a non directory environment.

    It’s complicated. Done right it can be more secure, not done right it’s less secure.

    I also only get brought in for problems for the last however many years, so I’m probaby a bit biased at this point haha.

    I have had to tell companies they are going to have to rebuild thier AD from scratch because they didn’t know what thier DSRM password was (usually after a ransomware attack). These are the sort of hassles I think about vs non AD.