Identity Risk Assessment Report

    The Identity Risk Assessment report in ADManager Plus identifies the potential identity risk indicators in your organization. It offers visibility into the health and risk posture of both your Active Directory (AD) and Microsoft 365 environments. ADManager Plus implements the guidelines of NIST SP 800-30 to assess the likelihood of occurrence and impact level of risk indicators to compute a risk score. It locates the plausible risk indicators in your organization, offers insights on why they could be a risk indicator, and what can be done to secure your organization from them. ADManager Plus also computes and displays a risk score to summarize the significance of the identified risks.

    In a nutshell, ADManager Plus assesses your AD and Microsoft 365 environment, identifies the potential risk indicators, evaluates them, provides remediation measures, and helps you keep risks at bay with this report.

    In this document, you will learn the following:

    Understand the key terms

    The following are some terms that you will come across in this report and it is imperative to know them:

    Term Description
    Risk Score An indicator of your overall risk posture. It can be low, medium, high or critical. It is recommended to have a low risk score to secure your organization.
    Risk Exposure It signifies the percentage of objects vulnerable to a particular risk.
    Likelihood of occurrence The possibility of an occurrence for the identified risk indicator along with insight on the potential damage that it could cause.
    Remediation measures Actions that can be taken to eliminate and avoid the identified risk indicator.
    Dashboard view A comprehensive one-stop view of all the identified risk indicators categorized based on the objects identified, along with a graphical risk score indicator.
    Tile view A tile-view of all the identified risk indicators categorized based on their severity along with graphical indicators.

    Steps to view a risk assessment report in ADManager Plus

    1. Log in to ADManager Plus.
    2. Navigate to the Reports tab.
    3. In the left pane, click Identity Risk Assessment report.
    4. Select the domain for which you would like to view the report in the Domain drop-down menu.
    5. A dashboard will then display your risk score, along with the risks identified in your network.

    View, export and manage risks

    • Export report: The report can be exported by clicking the Export As button. The overall risk assessment report and risky objects can be exported by clicking the appropriate buttons.
    • View report: You can switch between the Tile View and Dashboard View by clicking the appropriate buttons.
    • Filter risks: The risks in Dashboard view can be refined using the Filter drop-down menu based on their severity.
    • Manage risks: Click on a risk to view the risky objects and remediate them using the management actions. The risk data can be refreshed by clicking the Refresh button.

    Note: Only technicians delegated with the Identity Risk Assessment role can view this report and only in the delegated OUs. To delegate this role, Delegation > Help Desk Roles > Edit a help desk role/Create a new role > Administration > General > Check Identity Risk Assessment.

    How is the risk score calculated?

    ADManager Plus assesses active risks in your identity-environment. All risk indicators go through three phases of computation. This assessment blends qualitative and quantitative techniques, making it semi-quantitative. The ultimate output is to derive a risk score that represents the security posture of your AD.

    What follows is an explanation of the risk scoring methodology, the factors used to calculate the risk score, and the rationale behind it.

    Phase 1: Determining the severity

    In the first phase, each risk indicator is assessed by following a three-step calculative process: Likelihood determination, Impact analysis, and Severity determination.

    Step 1: Likelihood determination

    Likelihood of occurrence is the probability or chance that a particular threat event or risk will happen or materialize. The overall likelihood is determined by correlating "Likelihood of Attack Initiation" and "Likelihood of Initiated Attack Succeeds."

    Likelihood of Attack Initiation: The probability that a threat source initiates an threat event or vulnerability-exploit. Factors— pertinent to capability— considered under likelihood of attack initiation are:

    • Skill level required
    • Opportunity required

    Likelihood of Initiated Attack Succeeds: The probability that an initiated attack or threat event will result in an adverse impact on the organization's assets, operations, or aims. The factors considered under Likelihood of Initiated Attack Succeeds are "Capability" and "Vulnerability Severity."

    Capability: Alludes to the skills, resources, and opportunities at the disposal of potential attackers that they can leverage to exploit vulnerabilities, escalate privileges and orchestrate subsequent malicious activities within the AD or identity environment. Capability factors are mentioned under Likelihood of Attack Initiation.

    Vulnerability Severity: The degree or level of harm that could result from the exploitation of a specific risk indicator. Factors considered in deriving the vulnerability severity are:

    • Ease of Discoverability
    • Ease of Exploitation

    For every risk indicator, a numerical value is assigned to each capability and vulnerability severity factors. The average of all capability factors will result in overall capability while the average of all vulnerability severity factors will result in overall vulnerability severity.

    Subsequently, the overall capability and vulnerability severity are averaged to derive the Likelihood of Attack Initiation.

    Overall likelihood: An assessment output derived by correlating the results of Likelihood of Attack Initiation and Likelihood of Initiated Attack Succeeds for each risk indicator using a 4x4 correlation matrix.

    Step 2: Impact analysis

    This step assesses potential consequences of a risk or vulnerability-exploit. Potential consequences can include damage to a company's business operations, financial loss, reputational damage, or any other aspect deemed relevant by the organization. Factors considered under impact analysis are:

    • Confidentiality
    • Integrity
    • Availability

    Similar to the preceding step, for every risk indicator, a numerical value is assigned to each impact analysis factors and the average of all those factors will result in the overall impact.

    Step 3: Determining severity

    This step determines the severity of risks based on their likelihood and impact using a 4x4 correlation matrix.

    Risk Matrix: Likelihood vs Impact

    risk-matrix

    *Vertical scale is likelihood and Horizontal scale is impact

    Phase 2: Assigning weightage and calculating risk exposure

    In the second phase, each risk indicator is assigned a weightage based on their impact and risk severity. The weightage scale ranges from 1 to 10.

    After the weightage has been assigned, the next step is to calculate the risk exposure for each risk indicator. This involves using the formula: number of risky objects related to a specific risk divided by the total number of objects within the scope of that risk in the environment. An example of this would be:

    Risk exposure= Number of disabled users/Total number of AD users

    Phase 3: Determining the risk score

    In the final phase, the overall risk score for your identity environment is calculated using a weighted average method that is comprised of weightage values and risk exposures as variables.

    Note: The risk score and report become obsolete when a newer report is generated. Only risk indicators included in the assessment are scored, and failed to run indicators are not included in the final risk score. It's advisable to include all domains in the selected forest before assessing for an accurate analysis of your identity environment.

    ADManager Plus analyzes the severity of risks in AD and Microsoft 365 using risk indicators such as privileged and non privileged users, computers, and groups.

    Risk indicators in AD

    Users:

      Privileged users

      • Inactive Users*
      • Users Who Never Logged On
      • Users with Unchanged Passwords*
      • Users Whose Password never expires
      • Users with Password Not Required Enabled
      • Disabled Users
      • Members of Privileged Groups

      Non-privileged users

      • Inactive Users*
      • Users Who Never Logged On
      • Users with Unchanged Passwords*
      • Users Whose Password Never Expires
      • Users with Password Not Required Enabled
      • Disabled Users

    Computers

    • Disabled Computers
    • Inactive Computers
    • Computers Trusted with Unconstrained Delegation
    • Computers Running Obsolete OS Versions
    • BitLocker Disabled Computers

    Groups

    • Empty Groups
    • Privileged Groups
    • Large Privileged Groups*
    • Single-membered Groups
    • Large Groups*

    GPOs

    • Unlinked GPOs

    Risk indicators in Microsoft 365

    Users:

      Privileged Users

      • Users Without MFA
      • Multitude Of Privileged Users
      • Multitude Of Global Administrators
      • Inactive Users*
      • Never Logged On Users
      • Blocked Users
      • Synced User Account

      Non-privileged Users

      • Users Without MFA
      • Inactive Users*
      • Never Logged On Users
      • Blocked Users

      General

      • Inactive Users On Specific Microsoft 365 Services*

    Groups

    • Empty Groups

    *The threshold value for these risk indicators can be configured by clicking the Settings button.

    Note: When ADManager Plus accesses the domain objects' details for analyzing the risks through LDAP queries, it might trigger security alerts in your existing security systems.

    Don't see what you're looking for?

    •  

      Visit our community

      Post your questions in the forum.

       
    •  

      Request additional resources

      Send us your requirements.

       
    •  

      Need implementation assistance?

      Try onboarding