CyberSecurity Training and Certification
  • Back
  • Certifications
    • Certification roadmap
    • CyberSecurity Foundations for Beginners
    • For Working IT Professionals
    • For Penetration Testers and Ethical Hackers
    • For Managers and IT leads
  • Training
    • Live, Instructor-led
    • Self-Study Kits
    • Exam Prep Combos
  • About Us
  • Resources
  • Contact us
Login
CyberDefenceTech

Active Directory Security: What IT Pros Need to Understand

by Mile2 Canada4 minutes read May 15, 2026
  • Share:
Active Directory Security: What IT Pros Need to Understand — photo by panumas nikhomkhai via Pexels

Active Directory sits at the centre of nearly every enterprise network in Canada. It controls who gets in, what they access, and how far they go. When it fails — or gets exploited — attackers get the keys to everything. This is not a metaphor. According to Wavestone incident response data, 38% of attacks in 2024-2025 began with identity compromise, up from 20% the year before. Active Directory is where the compromise happens.

If you manage systems and have never taken a structured look at your AD security posture, this is where to start.

Why Active Directory Is Such a Target

Active Directory is not inherently broken. It is, by design, accessible. Every authenticated user in an AD environment has enough read access to query the directory and enumerate users, groups, and permissions. The accessibility makes it functional. It also makes the attack surface enormous.

Attackers do not need a zero-day to exploit AD. They need a foothold and patience. Once inside, techniques like Pass-the-Hash, Kerberoasting, and Golden Ticket attacks allow them to escalate privileges without triggering obvious alerts. Verizon’s 2025 Data Breach Investigations Report found 88% of breaches involve compromised credentials. In most enterprise environments, those credentials are AD credentials.

The speed at which this plays out is what security teams often underestimate. Research from 2025 found lateral movement begins within 48 minutes of initial compromise on average. In the fastest recorded intrusions, attackers reached full network propagation in under 20 minutes. Your AD environment is not a static target. It is an active one.

What the Canadian Centre for Cyber Security Says

The Canadian Centre for Cyber Security (CCCS) has published two documents every IT professional in Canada should read before touching their AD configuration.

The first is ITSM.60.100 — the management-level guidance for securing Microsoft Active Directory. It sets the strategic baseline for organizations operating AD in on-premises or hybrid environments.

The second is ITSP.60.100 — the practitioner guidance. This document goes further, with specific controls around privileged access, authentication hardening, and monitoring requirements. One of its non-negotiable requirements: all access to AD services must use hardware token MFA for all user and administrative accounts. Not soft tokens. Not SMS. Hardware.

The CCCS also co-authored joint guidance with the Five Eyes alliance — including CISA, the NSA, and the UK’s NCSC — specifically on detecting and mitigating Active Directory compromises. The joint document identifies 17 common attack techniques observed across member nations. If your organization has not reviewed it, start there.

The Privileged Access Problem

Most AD security failures trace back to the same root cause: over-privileged accounts left unmanaged for too long.

Domain Admin accounts used for daily tasks. Service accounts with passwords never rotating. Admin accounts with no MFA. These are not exotic attack paths. They are the standard ones. Attackers know IT environments tend to accumulate privilege debt over time, and they exploit exactly this.

Your first hardening priority is a privilege audit. Map every account with elevated permissions. Separate administrative functions from daily use accounts. Implement a tiered administration model isolating your domain controllers from workstation-level administration. The CCCS ITSP.60.100 guidance outlines this structure in detail, and it is worth following line by line.

What Your Monitoring Needs to Cover

Hardening reduces attack surface. Monitoring gives you visibility when something gets through anyway.

The specific AD events to monitor are well-documented: changes to privileged group membership, new accounts added to Domain Admins, changes to Group Policy Objects, failed Kerberos authentication attempts, and replication requests from non-domain-controller machines — a classic indicator of a DCSync attack.

Most organizations collect these logs. Few analyze them in time to matter. The 2025 IBM Cost of a Data Breach Report found breaches take an average of 292 days to detect. This number reflects what happens when monitoring is present but not acted on.

If your organization runs a SIEM, your AD logging should feed into it with alerting tuned specifically to these event IDs. If it does not, this is a gap worth closing before anything else.

The Career Angle: Why AD Security Skills Matter Right Now

Understanding Active Directory — and how attackers exploit it — is one of the most transferable skills in cybersecurity. It applies to penetration testing, vulnerability assessment, security operations, and compliance work.

If you want to work in offensive security, the Mile2 Certified Penetration Testing Engineer (CPTE) covers AD attack techniques including lateral movement, privilege escalation, and credential harvesting in a structured, lab-based environment. These are not theoretical exercises. They reflect what real threat actors do in production environments.

If your focus is on the defensive side — assessing and documenting what is exposed before attackers find it — the Certified Vulnerability Assessor (CVA) builds the skills to systematically identify privilege misconfigurations, excessive permissions, and authentication weaknesses across an AD environment.

Both tracks assume you already work in IT. They build on existing experience rather than replacing it.

Where to Start This Week

You do not need a full infrastructure overhaul to improve your AD security posture. Three actions, in order of impact: read the CCCS ITSP.60.100 document and map your current controls against it; pull a list of all accounts in privileged groups and confirm whether each one still requires the access; and verify your domain controllers are generating and forwarding authentication and replication event logs into your SIEM.

Active Directory security is not a project with a finish line. It is an ongoing practice. The organizations treating it as one are the ones keeping attackers from turning a single compromised account into a full domain takeover.

  • Share:
Previous
What Is SIEM and Why Security Analysts Need to Know It
4 minutes read
Mile2 Canada
editor

Got Questions? Talk to us

Name(Required)
This field is hidden when viewing the form

Recent Posts

  • Active Directory Security: What IT Pros Need to Understand
  • What Is SIEM and Why Security Analysts Need to Know It
  • How to Read a CVE and What to Do About It
  • Vulnerability Assessment vs Penetration Testing: Key Differences
  • Security Operations Center Careers: A Practical Guide

Share this

Newsletter Subscription

Get practical insights, training updates, and career tips delivered straight to your inbox.

loader
About Mile2

Mile2 develops cyber security certifications that meet the evolving needs of the Information Systems sector. Read more…

Facebook-f Linkedin Youtube
Courses
  • Courses
  • Certifications
  • Blogs
  • CyberSecurity Resources
Useful Links
  • Code of Ethics
  • Legal & Trademark
  • Privacy Statement
Contact Us
  • (613) 416-8898
  • info@mile2.ca
  • 451-207 Bank Street Ottawa, ON K2P 2N2 Canada
  • Copyright © 2025 Mile2 Canada. All Rights Reserved.
HomeSearchAccount