Security Basics mailing list archives
Re: Threat vector of running a service using a domain account
From: jfvanmeter () comcast net
Date: Wed, 12 Sep 2007 08:33:19 +0000
Hello, service accounts are a great way to use less privelgee, so yes I think the resk is managable. I would also add deny log on terminal services, and if its not running as a batch job I would also deny that user right. I would also make the password random and at least 24 charactors. are you running windows 2000 or windows 2003? with win2k3 you can also run the service in the context of local service or network service you dont' have to run it as system. just my two shiny centoves --John -------------- Original message ---------------------- From: "Ali, Saqib" <docbook.xml () gmail com>
i would like to understand the threat vector of using a "dedicated" Active Directory account to run a service. Here are some details: 1) This particular account will have domain admin privileges. 2) The account will NOT be used to perform interactive logon to the machines. 3) The password for the account will be stored in a safe-box The brute-force attack risk is mitigated by the fact that the account will lockout after X number of unsuccessful attempt. Also any attempt to use the account for interactive logon will show up in the audit logs. My questions: 1) Is the risk manageable? 2) Or should we completely avoid this application? 3) Is this kind of scenario common? 4) What other popular apps require such domain admin privileges for service accounts? 5) What other Controls can we put in place to prevent misuse of the account? saqib http://security-basics.blogspot.com/
Current thread:
- Threat vector of running a service using a domain account Ali, Saqib (Sep 11)
- RE: Threat vector of running a service using a domain account Jesse Eaton (Sep 12)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 12)
- RE: Threat vector of running a service using a domain account Jesse Eaton (Sep 12)
- Re: Threat vector of running a service using a domain account Kurt Buff (Sep 12)
- Re: Threat vector of running a service using a domain account badz (Sep 13)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 12)
- RE: Threat vector of running a service using a domain account Ramsdell, Scott (Sep 12)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 12)
- Re: Threat vector of running a service using a domain account gjgowey (Sep 13)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 12)
- Re: Threat vector of running a service using a domain account James Fryman (Sep 13)
- <Possible follow-ups>
- Re: Threat vector of running a service using a domain account jfvanmeter (Sep 12)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 12)
- Re: RE: Threat vector of running a service using a domain account levinson_k (Sep 12)
- Re: Threat vector of running a service using a domain account jfvanmeter (Sep 12)
- Re: Re: Threat vector of running a service using a domain account levinson_k (Sep 12)
- Re: Threat vector of running a service using a domain account Jay (Sep 13)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 13)
- RE: Threat vector of running a service using a domain account Ramsdell, Scott (Sep 14)
- RE: Threat vector of running a service using a domain account Roger A. Grimes (Sep 14)
- RE: Threat vector of running a service using a domain account Ramsdell, Scott (Sep 14)
- RE: Threat vector of running a service using a domain account Roger A. Grimes (Sep 18)
- Re: Threat vector of running a service using a domain account Ali, Saqib (Sep 13)
- RE: Threat vector of running a service using a domain account Jesse Eaton (Sep 12)