ISO 27001 · A.8.20–8.22HIPAA · §164.312(a)NIST CSF · PR.AC / PR.PT

Active Directory & Network Security

Active Directory is the most attacked system in enterprise environments — and the primary control for HIPAA access management and ISO 27001 A.8.2. We find the attack paths before adversaries do and give you the evidence your auditor needs.

Attack Paths

AD Attack Techniques We Identify and Block

The techniques that let attackers go from a standard user to Domain Admin in hours.

Kerberoasting

Extracting service account credentials from Active Directory's Kerberos implementation.

Pass-the-Hash

Reusing captured NTLM hashes for lateral movement without cracking passwords.

DCSync Attack

Simulating a domain controller to extract password hashes for privileged accounts.

Misconfigured Trusts

Exploiting improperly configured AD domain trusts to escalate privileges cross-domain.

Lateral Movement (SMB)

Moving through the network using SMB shares with default or reused credentials.

Unconstrained Delegation

Service accounts with delegation enabled that allow impersonation of any user.

Remediation

Six Hardening Areas We Remediate

01

Tier Model Implementation

Separate admin accounts for Tier 0 (Domain Controllers), Tier 1 (Servers), and Tier 2 (Workstations) to contain lateral movement.

02

Privileged Access Workstations

Dedicated, hardened workstations for privileged admin tasks — required by ISO 27001 A.8.2.

03

Network Segmentation & VLANs

Segment flat networks into zones — workstations, servers, DMZ, management — with enforced inter-zone ACLs.

04

SMB & NTLM Hardening

Disable NTLMv1, enforce SMB signing, restrict NTLM relay opportunities — closes Kerberoasting and pass-the-hash paths.

05

Audit Policy & SIEM Integration

Enable detailed audit policies (logon, account management, object access) and forward to SIEM for HIPAA audit log requirements.

06

Lateral Movement Controls

Deploy Local Administrator Password Solution (LAPS), disable local admin re-use, restrict RDP and SMB scope with host-based firewalls.

Control Mapping

Which Controls Does AD & Network Security Satisfy?

Every finding is tagged to the specific control reference your auditor will verify.

ISO 27001
  • A.8.2

    Privileged access rights — AD admin account management

  • A.8.20

    Networks security — segmentation and access controls

  • A.8.21

    Security of network services

  • A.8.22

    Segregation of networks

HIPAA Security Rule
  • §164.312(a)(1)

    Access control — unique user identification in AD

  • §164.312(a)(2)(iv)

    Encryption and decryption of ePHI in transit

  • §164.308(a)(3)

    Workforce access management via directory services

NIST CSF 2.0
  • PR.AC-3

    Remote access managed via network segmentation

  • PR.AC-4

    Access permissions managed with least-privilege

  • PR.PT-4

    Communications and control networks protected

What You Get

Deliverables

  • AD and network architecture review with attack path visualisation
  • Findings tagged to ISO 27001, HIPAA, and NIST CSF controls
  • Privileged account and group membership audit
  • Network segmentation gap analysis
  • Remediation runbook: GPO settings, firewall rules, account hardening
  • Audit-ready evidence package + free re-test after remediation

Audit-Ready Evidence

Accepted by ISO 27001 certification bodies

ISO 27001 Annex A 8.20–8.22 requires documented evidence of network security controls. Our report provides network diagrams, segmentation evidence, and remediation proof that satisfies Stage 2 auditor requirements.

After remediation, we re-test the same scope and issue a signed attestation letter. Most certification bodies and HIPAA auditors accept this as evidence of control effectiveness.

Book a Scoping Call

Frequently Asked Questions

We review your Active Directory configuration for misconfigurations, over-privileged accounts, insecure delegation settings, and attack paths an adversary could use for lateral movement or privilege escalation. This includes running BloodHound-style path analysis against your AD graph.

ISO 27001:2022 Annex A 8.2 (privileged access rights), 8.20 (networks security), 8.21 (network services), and 8.22 (network segregation) all require documented controls. Our engagement produces the evidence your Stage 2 auditor needs to close these.

AD & network security review includes both assessment (identifying misconfigurations) and simulated exploitation (validating that attack paths work). It can be scoped as a standalone engagement or combined with a full penetration test.

For the assessment phase, yes — read access to AD is required for configuration review. For the exploitation phase, we start from a standard domain user account and attempt to escalate, which more accurately reflects a real attack scenario.

HIPAA §164.312(a)(1) requires access controls — Active Directory is the primary mechanism for controlling who can access ePHI systems. Ensuring AD is properly hardened is a direct requirement, and our report provides the documented evidence for your HIPAA audit.

Harden Your AD Before an Attacker Exploits It

Most ransomware deployments begin with a compromised AD account. Know your attack surface and close it.

Get an AD Security Review