S 4.313 Provision of secure domain controllers

Initiation responsibility: Specialists Responsible, IT Security Officer, Head of IT

Implementation responsibility: Administrator

Since the Active Directory infrastructure is stored on the domain controllers, these must be configured correspondingly securely. The following security recommendations are intended to help minimise the risk when providing domain controllers.

Secure operation of domain controllers

As a matter of principle, domain controllers should be installed in a secure environment, e.g. in a computer centre or in rooms that can only be accessed by trusted personnel. Furthermore, they should also be protected by a secure infrastructure, for example with routers, switches, etc.

The modules in the IT-Grundschutz Catalogues in layer 3 for the corresponding Windows Server operating systems should be taken into consideration when installing the operating system.

Predictable and repeatable provision of domain controllers

In order to avoid possible configuration errors and to obtain a uniform level of security, the domain controllers should be configured using an image of the configuration of a reference installation. Furthermore, the security settings should also be specified uniformly in the basic setup of the domain controller. The implementation of a predictable and easy-to-repeat provision procedure helps to achieve these goals. This procedure should include the following tasks:

Restriction to required services only

In order too keep the number of potential points of attack on the domain controllers as low as possible, the number of services provided should be restricted to the minimum number required for operation.

Authorisations for executable files

In order to protect the master folders of the data media against storage space attacks after promoting the domain controllers, the authorisations for the "Everyone" group should be restricted to "read and execute". Only administrators should be granted full access rights.

Preventing the start of other operating systems

Starting a different operating system on a domain controller may allow the NTFS access restrictions to be bypassed and therefore allow access to critical data. For this reason, organisational precautions also must be taken in addition to physically securing the server as mentioned above.

Disabling remote network boots and therefore also the option of remote network installation using remote installation services (RIS) or the bootstrap protocol (BOOTP), for example, should be planned, as should be the use of BIOS password when booting the system.

Reboot protection using SYSKEY

The use of the system keys (SYSKEY) protects the security information in Windows against offline attacks. The passwords in the Active Directory database and the local security authority (LSA) are stored in encrypted form on the domain controller for this purpose. When the domain controller is rebooted after the SYSKEY has been enabled, users either must enter the password or the data media with the system key or they will not be able to boot the computer. It is always necessary, though, to remove the data media with the system key from the domain controller after use and to store it at a secure location. It should also be ensured that a working copy of this data medium is also available.

Review questions: