You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[User accounts that function as service accounts](service-accounts-user-on-premises.md)
22
+
* Group-managed service accounts (gMSAs)
23
+
*[Secure group managed service accounts](service-accounts-group-managed.md)
24
+
* Standalone managed service accounts (sMSAs)
25
+
*[Secure standalone managed service accounts](service-accounts-standalone-managed.md)
26
+
* On-premises computer accounts
27
+
*[Secure on-premises computer accounts with Active Directory](service-accounts-computer.md)
28
+
* User accounts functioning as service accounts
29
+
*[Secure user-based service accounts in Active Directory](service-accounts-user-on-premises.md)
26
30
31
+
Part of service account governance includes:
27
32
28
-
It is critical to govern service accounts closely so that you can:
33
+
* Protecting them, based on requirements and purpose
34
+
* Managing account lifecycle, and their credentials
35
+
* Assessing service accounts, based on risk and permissions
36
+
* Ensuring Active Directory (AD) and Azure Active Directory (Azure AD) have no stale service accounts, with permissions
29
37
30
-
* Protect them based on their use-case requirements and purpose.
31
-
* Manage the lifecycle of the accounts and their credentials.
32
-
* Assess them based on the risk they'll be exposed to and the permissions they carry.
33
-
* Ensure that Active Directory and Azure Active Directory have no stale service accounts with potentially far-reaching permissions.
38
+
## New service account principles
34
39
35
-
## Principles for creating a new service account
36
-
37
-
When you create a service account, understand the considerations listed in the following table:
40
+
When you create service accounts, consider the information in the following table.
38
41
39
42
| Principle| Consideration |
40
43
| - |- |
41
-
| Service account mapping| Tie the service account to a single service, application, or script. |
42
-
| Ownership| Ensure that there's an owner who requests and assumes responsibility for the account. |
43
-
| Scope| Define the scope clearly, and anticipate usage duration for the service account. |
44
-
| Purpose| Create service accounts for a single, specific purpose. |
45
-
| Permissions | Apply the principle of *least permission*. To do so:<li>Never assign permissions to built-in groups, such as administrators.<li>Remove local machine permissions, where appropriate.<li>Tailor access, and use Active Directory delegation for directory access.<li>Use granular access permissions.<li>Set account expirations and location-based restrictions on user-based service accounts. |
46
-
| Monitor and audit use| Monitor sign-in data, and ensure that it matches the intended usage. Set alerts for anomalous usage. |
47
-
|||
48
-
49
-
### Set restrictions for user accounts
44
+
| Service account mapping| Connect the service account to a service, application, or script |
45
+
| Ownership| Ensure there's an owner who requests and assumes account responsibility |
46
+
| Scope| Define the scope, and anticipate usage duration|
47
+
| Purpose| Create service accounts for one purpose |
48
+
| Permissions | Apply the principle of least permission. To do so:<li>Don't assign permissions to built-in groups, such as administrators<li>Remove local machine permissions, where feasible<li>Tailor access, and use AD delegation for directory access<li>Use granular access permissions<li>Set account expiration and location restrictions on user-based service accounts |
49
+
| Monitor and audit use| Monitor sign-in data, and ensure it matches the intended usage. Set alerts for anomalous usage. |
50
+
51
+
### User account restrictions
50
52
51
53
For user accounts that are used as service accounts, apply the following settings:
0 commit comments