Implementing Least-Privilege Administrative Models (learn.microsoft.com)
from redfox@infosec.pub to cybersecurity@infosec.pub on 11 Apr 2024 23:48
https://infosec.pub/post/10948945

Does anyone fully implement workstation and server logon restrictions, and priviledged access workstations (PAW) as prescribed by NIST/STIG/CIS?

The URL is Microsoft’s long description of the same concepts.

Specifically from the above, there’s a few things like:

Question:

Does anyone actually do any of this at their organization?

If so, to what degree?

People hated red forest because it was a whole other set of infrastructure to baby sit.

People hate air gapped systems because no remote access or work from home.

The above doesn’t work well with cloud, and as a result Microsoft (just as an example) pushed for the new hybrid PIM models replacing their old red forest concept.

I’m just curious.

#cybersecurity

threaded - newest

[deleted] on 12 Apr 2024 02:49 collapse

.

redfox@infosec.pub on 12 Apr 2024 02:51 collapse

What do you guys use for STIG audit?

Manual STIG viewer or SCAP?