Protect Root / Global Admins Account
Protect Root / Global Admins Account
Objective
Protect root or administrator account(s) used by the devices hosted on the SAFER lab service.
Key Considerations
- Implement root and administrator passwords tied to SAFER lab domain that will not be shared.
- Implement a mechanism for enforcing access authorizations.
- Configure appropriate alerts on root/master accounts to detect a potential compromise, in accordance with the GC Event Logging Guidance
Validation
- Confirm password policies are configured and set for each device.
- Confirm passwords are unique to each device.
- Confirm on return of device, the administrator’s account password was not changed.
- Confirm all login attempts will administrator accounts are logged and sent to central SIEM.
Additional Considerations
- Leverage enterprise services such as Administrative Access Control System (AACS) for Privileged Access Management (PAM), Attribute-based access control (ABAC).
Applicable Service Models
- Mac
- ChromeOS
- Linux
References
- CSE Top 10 #3
- Refer to the GC Event Logging Guidance
- Related security controls: AC‑2, AC‑2(1), AC‑3, AC‑5, AC‑6, AC‑6(5), AC‑6(10), AC‑7, AC‑9, AC‑19, AC‑20(3), IA‑2, IA‑2(1), IA‑2(2), IA‑2(11), IA‑4, IA‑5, IA‑5(1), IA‑5(6), IA‑5(7), IA‑5(13), IA‑6, IA‑8
- Ubuntu SSSD and Active Directory
- Integrate Active Directory using Directory Utility on Mac
- Manage Chrome devices with Active Directory