Skip to content

Commit a3de9d0

Browse files
authored
Update service-accounts-govern-on-premises.md
1 parent 91fd27b commit a3de9d0

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/fundamentals/service-accounts-govern-on-premises.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ For user accounts used as service accounts, apply the following settings:
5555
* Account expiration - set the service account to automatically expire, after its review period, unless the account can continue
5656
* LogonWorkstations - restrict service account sign-in permissions
5757
* If it runs locally and accesses resources on the machine, restrict it from signing in elsewhere
58-
* Cannot change password - set the parameter to **true** to prevent the service account from changing its own password
58+
* Can't change password - set the parameter to **true** to prevent the service account from changing its own password
5959

6060
## Lifecycle management process
6161

@@ -79,7 +79,7 @@ Collect relevant information for each service account. The following table lists
7979
| Purpose| The purpose of the service account |
8080
| Permissions (scopes)| The expected permissions |
8181
| CMDB links| The cross-link service account with the target script or application, and owners |
82-
| Risk| The risk and business impact score, based on a security risk assessment |
82+
| Risk| The results of a security risk assessment |
8383
| Lifetime| The anticipated maximum lifetime to schedule account expiration or recertification |
8484

8585
Make the account request self-service, and require the relevant information. The owner is an application or business owner, an IT team member, or an infrastructure owner. You can use Microsoft Forms for requests and associated information. If the account is approved, use Microsoft Forms to port it to a configuration management databases (CMDB) inventory tool.
@@ -105,17 +105,17 @@ An example is a service account that runs a website with permissions to connect
105105
| Permissions, scopes| HR-WEBServer: sign in locally; run web page<br>HR-SQL1: sign in locally; read permissions on HR databases<br>HR-SQL2: sign in locally; read permissions on Salary database only |
106106
| Cost center| 123456 |
107107
| Risk assessed| Medium; Business Impact: Medium; private information; Medium |
108-
| Account restrictions| Log on to: only aforementioned servers; Cannot change password; MBI-Password Policy; |
108+
| Account restrictions| Sign in to: only aforementioned servers; Can't change password; MBI-Password Policy; |
109109
| Lifetime| Unrestricted |
110110
| Review cycle| Biannually: By owner, security team, or privacy team |
111111

112112
### Service account risk assessments or formal reviews
113113

114114
If your account is compromised by an unauthorized source, assess the risks to associated applications, services, and infrastructure. Consider direct and indirect risks:
115115

116-
* Resources an unauthorized user gains access to
116+
* Resources an unauthorized user can gain access to
117117
* Other information or systems the service account can access
118-
* Permissions the the account can grant
118+
* Permissions the account can grant
119119
* Indications or signals when permissions change
120120

121121
After the risk assessment, documentation likely shows that risks affect account:
@@ -164,7 +164,7 @@ To deprovision:
164164
2. Examine sign-ins and resource access of related service accounts to ensure no potential effect on them.
165165
3. Prevent account sign-in.
166166
4. Ensure the account is no longer needed (there's no complaint).
167-
5. Create a business policy that determines the amount of time accounts are disabled.
167+
5. Create a business policy that determines the amount of time that accounts are disabled.
168168
6. Delete the service account.
169169

170170
* **MSAs** - See, [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true). Use PowerShell, or delete it manually from the managed service account container.

0 commit comments

Comments
 (0)