You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/service-accounts-govern-on-premises.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ For user accounts used as service accounts, apply the following settings:
55
55
* Account expiration - set the service account to automatically expire, after its review period, unless the account can continue
56
56
* LogonWorkstations - restrict service account sign-in permissions
57
57
* If it runs locally and accesses resources on the machine, restrict it from signing in elsewhere
58
-
*Cannot change password - set the parameter to **true** to prevent the service account from changing its own password
58
+
*Can't change password - set the parameter to **true** to prevent the service account from changing its own password
59
59
60
60
## Lifecycle management process
61
61
@@ -79,7 +79,7 @@ Collect relevant information for each service account. The following table lists
79
79
| Purpose| The purpose of the service account |
80
80
| Permissions (scopes)| The expected permissions |
81
81
| CMDB links| The cross-link service account with the target script or application, and owners |
82
-
| Risk| The risk and business impact score, based on a security risk assessment |
82
+
| Risk| The results of a security risk assessment |
83
83
| Lifetime| The anticipated maximum lifetime to schedule account expiration or recertification |
84
84
85
85
Make the account request self-service, and require the relevant information. The owner is an application or business owner, an IT team member, or an infrastructure owner. You can use Microsoft Forms for requests and associated information. If the account is approved, use Microsoft Forms to port it to a configuration management databases (CMDB) inventory tool.
@@ -105,17 +105,17 @@ An example is a service account that runs a website with permissions to connect
105
105
| Permissions, scopes| HR-WEBServer: sign in locally; run web page<br>HR-SQL1: sign in locally; read permissions on HR databases<br>HR-SQL2: sign in locally; read permissions on Salary database only |
106
106
| Cost center| 123456 |
107
107
| Risk assessed| Medium; Business Impact: Medium; private information; Medium |
108
-
| Account restrictions|Log on to: only aforementioned servers; Cannot change password; MBI-Password Policy; |
108
+
| Account restrictions|Sign in to: only aforementioned servers; Can't change password; MBI-Password Policy; |
109
109
| Lifetime| Unrestricted |
110
110
| Review cycle| Biannually: By owner, security team, or privacy team |
111
111
112
112
### Service account risk assessments or formal reviews
113
113
114
114
If your account is compromised by an unauthorized source, assess the risks to associated applications, services, and infrastructure. Consider direct and indirect risks:
115
115
116
-
* Resources an unauthorized user gains access to
116
+
* Resources an unauthorized user can gain access to
117
117
* Other information or systems the service account can access
118
-
* Permissions the the account can grant
118
+
* Permissions the account can grant
119
119
* Indications or signals when permissions change
120
120
121
121
After the risk assessment, documentation likely shows that risks affect account:
@@ -164,7 +164,7 @@ To deprovision:
164
164
2. Examine sign-ins and resource access of related service accounts to ensure no potential effect on them.
165
165
3. Prevent account sign-in.
166
166
4. Ensure the account is no longer needed (there's no complaint).
167
-
5. Create a business policy that determines the amount of time accounts are disabled.
167
+
5. Create a business policy that determines the amount of time that accounts are disabled.
168
168
6. Delete the service account.
169
169
170
170
***MSAs** - See, [Uninstall the account](/powershell/module/activedirectory/uninstall-adserviceaccount?view=winserver2012-ps&preserve-view=true). Use PowerShell, or delete it manually from the managed service account container.
0 commit comments