Protect and secure your data from cyber attacks
Data Protection
Data Security
Data Insights
The 5 Steps to Cyber Resilience
Cloud & SaaS
Enterprise
Industries
Understand the real challenges around securing and recovering AD that can put your business at risk.
As the identity backbone for over 90% of organizations, Active Directory (AD) is the gateway to your most critical systems and data. When cybercriminals attack, they can escalate privileges and gain unrestricted access to systems and data for ransomware or exfiltration. Even worse, if they take AD down most organizations are left unable to function—making it one of the most disruptive attack vectors today. In fact, Cohesity’s Cyber Event Response Team (CERT) saw AD compromise in over 90% of incidents over the last 9 months, consistent with findings from Mandiant researchers.
Among the most devastating (and popular) targets for ransomware campaigns is AD. Why? Because a successful breach enables long-term, stealthy access to your organization. From there, the attackers can lie in wait, and strike on their timeline.
Identity system compromises often go undetected for weeks, or even months. When AD is breached, adversaries often avoid immediate detection, choosing instead to maintain stealthy access and exfiltrate sensitive data. By the time they're discovered, attackers may have made sweeping unauthorized and malicious changes, making it difficult to know what “clean” even looks like. These attacks may ultimately lead to a ransomware incident, crippling business operations and leaving backdoors for future attacks.
AD underpins access and authentication for virtually every service and application across the enterprise. If AD becomes unavailable, business operations can come to a standstill. AD’s interconnected nature makes it a prime, and uniquely dangerous, target:
It gets worse. When a compromise occurs, the recovery process for AD is complex and challenging. Here’s why: AD recovery is not like restoring a file or even a database. It’s complicated, with many manual steps. One wrong move during restoration can destabilize your entire environment, or leave an attacker with a way back in.
It’s not enough to just restore your systems after a cyberattack—you must perform forensics and remediate the root cause of the attack. You need secure recovery. Here’s why most organizations struggle with AD recovery:
It’s easy to see why many organizations fail to meet the RTO for AD, and why attackers continue to concentrate on exploiting this workload.
Figure 1: Restoring AD manually is complex, time-consuming, and error-prone.
When AD is down, much of your business is likely to be impacted. Without a validated identity resilience strategy, organizations lose precious days (or weeks) in the aftermath of an attack, with every minute of downtime leading to lost revenue, lost customer trust, and mounting risk. According to a recent study of 1,500 global organizations, despite 90% of respondents having implemented an Identity Threat Detection and Response (ITDR) strategy, a much smaller percentage include AD recovery procedures in their disaster recovery plan or maintain dedicated, AD-specific backup systems—both key parts of effective ITDR. That’s a gap that attackers will be more than happy to exploit. Your strategy needs to ensure AD backups are always recoverable, and you need a thoughtful response and recovery plan that accounts for the unique properties of AD.
Understanding the difficulties around securing AD is one thing. The complexity and high stakes involved in AD recovery often discourage organizations from conducting regular cyber response and recovery tests. As a result, recovery plans go unvalidated, leaving businesses vulnerable when they need resilience the most.
How do you know if you’re ready? Here are a few critical questions to ask yourself:
If you’re unsure about any of the above, it may be time to update your strategy.
AD is a high-value, high-risk target. When it’s compromised, recovery is painful and complex. Most organizations aren’t ready.
What’s needed is a combination of prevention and proven, automated, and secure recovery capabilities. Without them, the best defenses are inadequate, and the cost of unplanned downtime will climb.
Cohesity and Semperis have invested in integrations to quickly and securely recover your Active Directory infrastructure. Together, we enable organizations to proactively detect threats to AD, discover and close attack paths, and rapidly restore AD to a clean state. Explore the integration between Cohesity and Semperis or get a free security assessment of your AD vulnerabilities so your team can start to plan for a cyber resilience strategy that recovers AD faster, safer, and with confidence.
Written By
Andy Drag
Product Manager, Cohesity
Isabelle Yang
Product Marketing Manager, Cohesity