What you can do this week: Identity security quick wins
Feeling overwhelmed? Start here. These five actions require minimal investment but can provide immediate visibility into your identity security posture:
Day 1: Run an AD CS configuration scan
If you have AD CS deployed, use free tools like Certify or PSPKIAudit to scan for common misconfigurations (ESC1, ESC4, ESC8, ESC11). This 30-minute scan can reveal critical vulnerabilities that enable certificate forgery and privilege escalation.
Time investment: 30 minutes | Potential impact: Identify critical vulnerabilities present in 42% of environments in our report.
Day 2: Audit service accounts for password age
Query Active Directory for all service accounts and sort by password last-changed date. Any service account with a password older than 90 days (or worse, set to never expire) represents a persistent risk for attacks.
Time investment: 15 minutes | Potential impact: Identify stale credentials, used in 73% of the Kerberoasting attacks in our study.
Day 3: Review help desk MFA reset procedures
Pull the last 30 days of MFA resets and password changes executed by your help desk. Look for patterns: Are resets happening outside business hours? Are the same users repeatedly resetting MFA? Are verification steps documented?
Time investment: 45 minutes | Potential impact: Close the gap exploited in device code phishing and vishing attacks.
Day 4: Scan your top five repositories for hardcoded credentials
Use tools like TruffleHog or GitHub's built-in secret scanning to check your most active code repositories for exposed credentials, application programming interface (API) keys and access tokens.
Time investment: 1 hour | Potential impact: Find credentials in Lambda, IaC and scripts, as we did in 71% of our cloud assessments.
Day 5: Enable and review conditional access policies
If you're using Microsoft 365 or Azure AD, review your conditional access policies. Are legacy authentication protocols blocked? Is MFA enforced for all admin access? Are sign-ins from unusual locations flagged?
Time investment: 1 hour | Potential impact: Close legacy protocol bypass used in 75% of the MFA evasions identified in our testing.