Active Directoryãã»ãã¥ã¢ã«éç¨ããããã«
ï½ã¼ããã©ã¹ãæ代ã®ã»ãã¥ãªãã£å¯¾çï½
1. Active Directoryã®éè¦æ§
Active Directoryï¼ä»¥ä¸æ¬æä¸ã¯ADã¨è¡¨è¨ãã¾ãï¼ã¯ã»ã¨ãã©ã®ä¼æ¥ã§ã¦ã¼ã¶ãããã¤ã¹ã®èªè¨¼ã»èªå¯ãå¸ãã·ã¹ãã åºç¤ã¨ãã¦å°å ¥ããã¦ãã¾ããæ¨ä»ã§ã¯ç¤¾å ã·ã¹ãã ã®èªè¨¼ã«ã¨ã©ã¾ãããã¯ã©ã¦ããµã¼ãã¹ã®èªè¨¼ã«ããã¦ãèªè¨¼ãããã·çµç±ã§ADãåç §ããããè¨è¨ããã¦ããã¨ãããå¤ãããã®éè¦æ§ã¯é«ã¾ã£ã¦ãã¾ããã¾ãè¿å¹´æµ¸éãã¦ããã¼ããã©ã¹ãã»ãã¥ãªãã£ã¢ãã«ã§ã¯ãããããã¢ã¯ã»ã¹ã«ã¤ãã¦ãé½åº¦ã®èªè¨¼ã»èªå¯ã®ç¢ºèªãè¡ããã¨ãååã¨ãã¦ãããããå¼·åºãªèªè¨¼åºç¤ã®åå¨ãæ±ãããã¦ãã¾ãã
ä¸æ¹ã大åã®ãµã¤ãã¼æ»æã¯ãæ»æããã»ã¹ã®ä¾µå ¥æ¡å¤§ãã§ã¼ãºã«ããã¦èªè¨¼æ å ±ã®çªåãä¼´ããããADã¯æ»æè ãé »ç¹ã«çãæ¨çã§ããäºå®ãRyukã©ã³ãµã ã¦ã§ã¢ (â»1) ã¯DomainGrabberã¨ããADã®åµå¯ãè¡ããã¼ã«ãå å ãã¦ãããã®ããããä¾µå ¥å¾ã®è¢«å®³ç¯å²ãæ¡å¤§ãããæçµçã«1å5000ä¸ãã«ä»¥ä¸ã®è¢«å®³ããããããã¨ããã¦ãã¾ãã
â»1 Ryukã©ã³ãµã ã¦ã§ã¢: 2018å¹´é ãã確èªãããã©ã³ãµã ã¦ã§ã¢ï¼èº«ä»£éè¦æ±åãã«ã¦ã§ã¢ï¼ã®ä¸ç¨®
2. Active Directoryã®éç¨ã§ããã¿ãããå æ¯
ADéç¨ã®ç¾å ´ã«ç®ã移ãã¨ãå¤ãã®AD管çè ã以ä¸ã®ãããªå ±éã®æ©ã¿ãæ±ãã¦ãã¾ãã
- âçä»»åã«è¨è¨ã»æ§ç¯ãããADãå¼ãç¶ãã§ãããçä»»åã«ä½ããã£ãã®ãããªãç¾å¨ã®æ§æã¨ãªã£ã¦ãããããããªãã
- âM&Aãçµç¹ã®çµ±å»åã®ãã³ã«ä¸è²«ããè¨è¨ããªã·ã¼ã®é©ç¨ãé£ãããæ§æã¯è¤éåã®ä¸éããã©ã£ã¦ããã
- âãã°ã®ã¬ãã¥ã¼ãã»ãã¥ãªãã£ããªã·ã¼ã§è¦å®ããã¦ããããADã«ããã¦ã©ã®ãããªè¦³ç¹ã§ãã§ãã¯ãã¹ããããããªãã
- âITã¤ã³ãã©ã®èå¼±æ§è¨ºæãå®æçã«å®æ½ãã¦ããããADã®æ§æãè¨å®ã¯ãã®å¯¾è±¡ã«ã¯å«ã¾ãããä¸å®ãæ±ãã¦ããã
- âãã¡ã¤ã³ã³ã³ããã¼ã©ã¼ã¯å é¨ãããã¯ã¼ã¯ã«è¨ç½®ãã¦ããããæè¿ã¯ã©ã¦ããµã¼ãã¹ã®èªè¨¼ãæ ã£ã¦ãããã»ãã¥ãªãã£ä¸ã®å¢çãææ§ã«ãªã£ã¦ããã
çè èªèº«ãããã¤ãã®ADéç¨ã®ç¾å ´ã«é¢ãã£ãçµé¨ä¸å¿å½ãããããã®ã§ãããæ§æ管çã¯ä½ã¨ãã§ãã¦ãããã®ã®ãèå¼±æ§ã®ç®¡çã¾ã§ã¯æãåã£ã¦ããªããã¨ããã®ãå¤ãã®éç¨ç¾å ´ã§ã®å®æ ã§ã¯ãªãã§ããããã
3. Active Directoryã«å¯¾ããè å¨
ã§ã¯ãADãåãå·»ãè å¨ã«ã¯ã©ã®ãããªãã®ãããã®ã§ãããããAD対ããè å¨ãç解ããããã«ãä¸è¬çãªãµã¤ãã¼æ»æã®ããã»ã¹ã確èªãã¦ããã¾ãããã
3.1. ãµã¤ãã¼æ»æã®ããã»ã¹
å³1ã«ç¤ºãéãã主ã¨ãã¦æ å ±ã®çªåãç®çã¨ãããµã¤ãã¼æ»æã¯ãä¸è¬çã«ä»¥ä¸ã®ï¼ã¤ã®ãã§ã¼ãºã§è¡ããã¾ãã
å³1 ãµã¤ãã¼æ»æã®ããã»ã¹
- âåµå¯ãã§ã¼ãº
æ¨çã¨ããçµç¹ã®æ å ±èª¿æ»ãè¡ãã¾ããã¾ããå¤é¨ããã®æ»æãå¯è½ã§ããããã¤ã³ã¿ã¼ãããããçµç¹ã®å ¬éãµã¼ãããããã¯ã¼ã¯æ©å¨ã¸ã®æ¥ç¶è©¦è¡ãªã©ãå®æ½ãã¾ãã - âä¸æ¬¡ä¾µå
¥ãã§ã¼ãº
å®è¡ãã¡ã¤ã«ãæ·»ä»ããæ¨çåã¡ã¼ã«ãä¸æ£ãªURLã¸ã®èªå°ãªã©ã«ããã主ã¨ãã¦ã¯ã©ã¤ã¢ã³ãPCãã¿ã¼ã²ããã«ãã«ã¦ã§ã¢ã«ææããã¾ãã - âä¾µå
¥æ¡å¤§ãã§ã¼ãº
ä¸æ¬¡ä¾µå ¥ã«æåããã¯ã©ã¤ã¢ã³ãPCãé éæä½ãã¦ãçµç¹å ã®ãããã¯ã¼ã¯ãæ¢ç´¢ããµã¼ãã®èå¼±æ§çãæªç¨ãã¦çµç¹å ã横æçã«ä¾µå®³ï¼ã©ãã©ã«ã ã¼ãã¡ã³ãï¼ãã¦ããã¾ãããã®ã¨ããä¾µå ¥ãæåãããµã¼ãã«ã¯ããã«ç®¡çè 権éã®å¥ªåã試ã¿ãç¶ç¶çã«æ»æã«å©ç¨ããããã®ããã¯ãã¢ãè¨ç½®ãã¾ãã - âç®çéè¡ãã§ã¼ãº
ç®çã®æ å ±ãæ ¼ç´ããã¦ãããµã¼ãã«å¯¾ãã¦ä¾µå ¥ããæ å ±ãå¤é¨ã«éä¿¡ãããã身代éè¦æ±ã®ããã«æå·åããããã¾ããã¾ãããã°çããæ»ææ´»åã®è¨é²ãåé¤ãããªã©ã証æ ã®é æ» ãå³ãã¾ãã
ADãµã¼ãã¹ãæä¾ãããã¡ã¤ã³ã³ã³ããã¼ã©ã¼ã¯ãé常çµç¹å ãããã¯ã¼ã¯ã®ãµã¼ãã»ã°ã¡ã³ãã«é ç½®ããã¦ãããããä¸æ¬¡ä¾µå ¥ã®æ¨çã«ããããã¨ã¯ç¨ã§ãä¾µå ¥æ¡å¤§ãã§ã¼ãºã§æ¨çã«ããã¾ããæ»æè ã¯å¾è¿°ããææ³ãå©ç¨ãã¦ãã¡ã¤ã³ã³ã³ããã¼ã©ã¼ã¸ã®æ»æã試ã¿ã¾ããä¾µå ¥æ¡å¤§ãã§ã¼ãºã®ä¸ã§ãADã®é¥è½ã¯è´å½çã§ãADã®ç®¡çè 権éã奪åãããå ´åããã¡ã¤ã³ã«æå±ããçµç¹å ã®ãµã¼ãã¯æ»æè ã®ç®¡çä¸ã«ç½®ããããã¨ã«ãªãã¾ãã
ä¸æ¬¡ä¾µå ¥ã«ã¯ãä¸è¿°ã®éãæ¨çåã¡ã¼ã«çã®ææ³ãç¨ãããã¾ããããã®ææ³ã¯å¹´ã å·§å¦åãã¦ãããå®å ¨ã«é²ãã®ã¯æ¥µãã¦å°é£ã§ãããããã£ã¦ããã®æ¬¡ã®ãã§ã¼ãºã§ãããä¾µå ¥æ¡å¤§ãã§ã¼ãºã«ãããé²å¾¡ãã¨ãããADãããã«å®ããããæ å ±æ¼æ´©ãé²ãéè¦ãªè¦ç´ ã¨ãªãã¾ãã
3.2. ADã¸ã®æ»æææ³
ADã¸ã®æ»æã¯ä¸»ã«æ¬¡ã®ï¼ç¨®é¡ãä½µç¨ãã¦è¡ããã¾ãã
- âä¸æ¬¡ä¾µå
¥ãã端æ«ã«æ ¼ç´ããã¦ããèªè¨¼æ
å ±ãæªç¨
ä¾µå ¥ããã¯ã©ã¤ã¢ã³ãPCããµã¼ãã®ãã¼ã«ã«ã«ä¿åããããã¹ã¯ã¼ãããã·ã¥ãèªè¨¼ãã±ãããå©ç¨ãã¦ããã«ã»ãã®ãµã¼ãã«ã¢ã¯ã»ã¹ãã¾ãã代表çãªææ³ã¨ãã¦Pass-the-HashãPass-the-Ticketãããã¾ãã - âADã»ãã¡ã¤ã³ã³ã³ããã¼ã©ã¼ã»Windows Serverã®èå¼±æ§ãæªç¨
ADããããåä½ããããµã¼ãã®èå¼±æ§ãæªç¨ãã¦ç®¡çè 権éã奪åãã¾ããä¾ãã°ä»¥ä¸ã®èå¼±æ§ã¯ãã¡ã¤ã³ã³ã³ããã¼ã©ã¼ã¸ç´æ¥ã¢ã¯ã»ã¹å¯è½ãªç¶æ ã«ããã°ãæ¯è¼ç容æã«ADã®ç®¡çè 権éã奪åã§ããèå¼±æ§ã§ãã- ã»Kerberosèªè¨¼ã®ç¹æ¨©ææ ¼ã®èå¼±æ§(CVE-2014-6324)
- ã»Netlogonãããã³ã«ã®ç¹æ¨©ææ ¼ã®èå¼±æ§(CVE-2020-1472)
- âãã¼ã«ã«ç®¡çè
権éãæªç¨
å¤æ°ã®ç«¯æ«ã®ã»ããã¢ããã®é½åçã§ã³ã³ãã¥ã¼ã¿ã®ãã¼ã«ã«ç®¡çè ã¢ã«ã¦ã³ãã«å ±éã®IDã»ãã¹ã¯ã¼ããè¨å®ãã¦ããã±ã¼ã¹ã§ã¯ããã使ç¨ãã¦ã»ãã®ãµã¼ãçã«ä¾µå ¥ãããå¯è½æ§ãããã¾ãã
4. Active Directoryãã»ãã¥ã¢ã«éç¨ããããã«
以ä¸ãADã¸ã®æ»æææ³ãè¸ã¾ããADãã»ãã¥ã¢ã«ããããã«ã¯ãADç°å¢ã«å¯¾ãã¦ä»¥ä¸ãå®æ½ãããã¨ãèè¦ã§ãã
- âã»ãã¥ãªãã£ããããã¿ã¤ã ãªã¼ã«é©ç¨ãã
èå¼±æ§æªç¨ã®ææ¢ãã»ãã¥ãªãã£æ©è½åä¸ã®æ©æé©ç¨ã®ããã«å¯è½ãªéãè¿ éã«ãã¹ã¦ã®ãã¡ã¤ã³ã³ã³ããã¼ã©ã¼ã«å¯¾ãã¦ã»ãã¥ãªãã£ããããé©ç¨ãã¾ãã - âç¹æ¨©ã®ä»ä¸ãæå°åãã
ã¢ã«ã¦ã³ããä¹ã£åããã¦ç¹æ¨©ãæªç¨ãããæã®å½±é¿ã軽æ¸ããããã«ç¹æ¨©ã®ä»ä¸ãæå°åãã¾ããã¾ãããã¼ã«ã«ç®¡çè 権éã®æªç¨ãé²ãããã«ãããã¡ã¤ã³ã«åå ãããã¹ã¦ã®PCã«å¯¾ãã¦ãã¼ã«ã«ç®¡çè ãä¸ããã¦ã¼ã¶ãæå°åãã¾ãã - âAD管çå°ç¨ç«¯æ«ãè¨ãã
ADã管çãã端æ«ã«ã¯ç®¡çè ã¢ã«ã¦ã³ãã®èªè¨¼æ å ±ãä¿åãããããããããã®ç«¯æ«ã¯ç®¡çå°ç¨ã¨ãããããã¯ã¼ã¯ã¢ã¯ã»ã¹ãéå®åãããã¨ãæã¾ããã§ãã - âèªè¨¼æ
å ±ãä¿è·ãã
LSA Protectionæ©è½ãProtected Usersã»ãã¥ãªãã£ã°ã«ã¼ããæ´»ç¨ããæ»æãã¼ã«ã«ããèªè¨¼æ å ±ã¸ã®ä¸æ£ã¢ã¯ã»ã¹ãææ¢ãã¾ãã - âé©åãªå¼·åº¦ã®ãã¹ã¯ã¼ããå¼·å¶ãã
å¼±ããã¹ã¯ã¼ãã¯æ»æè ã«å®¹æã«è§£èªãããä¾µå ¥æ¡å¤§ã«å©ç¨ããããããé©åãªé·ãããã³è¤éæ§ãæã£ããã¹ã¯ã¼ãã®è¨å®ãå¼·å¶ãã¾ãã
ããã«ããããé©åã«ç¶æã»ç®¡çãã¦ããããã«ã¯ãèå¼±ãªæ§æã»è¨å®ã«ãªã£ã¦ããªããã®æ¤æ»ãå®æçã«å®æ½ããã¤ãã³ãã®ç£è¦ãå®æ½ããå¿ è¦ãããã¾ãããã ã§ããè¤éåãéç¨è² è·ãå¢å¤§ãã¦ããADéç¨ã®ç¾å ´ã§ãããã®æ¤æ»ã»ç£è¦ãè¡ããªã½ã¼ã¹ãæ»åºããã®ã¯è³é£ã®æ¥ã§ããããã§ä»åã¯äººæã«é ¼ããã¨ãªãADã®ã»ãã¥ãªãã£ãªã¹ã¯ãæ¤æ»ã»ç£è¦ããã½ãªã¥ã¼ã·ã§ã³ãå©ç¨ããå ´åã®ä¸ä¾ã¨ãã¦ãTenable.adãããç´¹ä»ãã¾ãã
4.1. Tenable.ad
Tenable.adã¯ç±³å½Tenable社ã2021å¹´ã«ãªãªã¼ã¹ããADã®èå¼±æ§æ¤åºã«ç¹åããèå¼±æ§ç®¡çãã©ãããã©ã¼ã ã§ããADã®èå¼±æ§ãæ¤åºãããµãã¾ããç£è¦ãããã¼ã«ã§ã以ä¸ã®ç¹å¾´ãæã£ã¦ãã¾ãã
- âããã¢ã¯ãã£ããªæ¤æ»
æ»æè ã®ç®ç·ã§æ»æçµè·¯ããªã¢ã«ã¿ã¤ã ã«åçã«ç®åºããå¯è¦åãã¾ãã - âã·ã¼ã ã¬ã¹ãªå°å
¥ã¨ç°¡åãªéç¨
ã¨ã¼ã¸ã§ã³ãã¬ã¹ã§ã管çè 権éãå¿ è¦ããã¾ããã - âSIEMã¨é£æºãããªã¢ã«ã¿ã¤ã ã§ã¢ã©ã¼ãã®å ±åã¨å¯¾å¿ã®æ¯æ´ãå¯è½
æ»æãè¨å®ãã¹ãçºçã¨åæã«æ¤åºããåæãåªå é ä½ä»ãããã¾ããã¾ããå種SIEM製åã¨ã®é£æºãå¯è½ã§ãã - âã»ãã¥ãªãã£æ
å½è
ã®ä½æ¥è² è·è»½æ¸ãå¹ççãªAD侵害ã®æ¤ç¥
ã»ãã¥ãªãã£ãã°ã使ããã«æ»æçµè·¯ãæ¤åºããã¬ããªã±ã¼ã·ã§ã³ããã»ã¹ãåæãã¦ä¾µå®³ãæ ¹æ¬ããç¹å®ãããããå 容ã®ç¢ºèªãå¿ è¦ãªã»ãã¥ãªãã£ã¤ãã³ããå¤§å¹ ã«åæ¸ãã¾ãã - âè¤æ°çµç¹ããã³ãã«ããã©ã¬ã¹ãã®ADç°å¢ã«å¯¾å¿
ãã«ããã¡ã¤ã³ã»ãã«ããã©ã¬ã¹ãç°å¢ããµãã¼ããã¦ãã¾ãã
4.2. Tenable.adã®UI
ã§ã¯ãå®éã®Tenable.adã®UIãè¦ã¦ã¿ã¾ãããã
å³2ã¯Tenable.adã®ããã·ã¥ãã¼ãç»é¢ã§ããããã·ã¥ãã¼ãã§ã¯ãã¦ã¼ã¶æ°ãã³ã³ãã©ã¤ã¢ã³ã¹ã¹ã³ã¢ï¼ãã¡ã¤ã³å ¨ä½ã®å®å ¨æ§ã®ææ¨ï¼ãé¸è±æ°ï¼èå¼±æ§ã®æææ°ï¼ãªã©ã®æ å ±ã確èªãããã¨ãå¯è½ã§ããADã®èå¼±æ§ã®ç¢ºèªã«ã¯ãç»é¢å·¦å´ã®ãé²åºã®ææ¨ãã¨ãæ»æææ¨ãã確èªãã¾ãããé²åºã®ææ¨ãã¨ã¯ãTenable.adãADã®æ§ææ å ±ãå ã«èªèããèå¼±æ§ã®ææã示ãã¦ããããæ»æææ¨ãã¯ä¸»ã«ã¤ãã³ããå ã«ããæ»æã¨èãããããµãã¾ããæ¤ç¥ã»æ½åºãããã®ã§ãã
å³2 ããã·ã¥ãã¼ãç»é¢
å³3ã¯é²åºã®ææ¨ã®ç¢ºèªç»é¢ã§ããåèå¼±æ§ã®æ·±å»åº¦ã«å¿ãã¦ããé大ããé«ããä¸ããä½ãã®ã¬ãã«ãã¨ã«è¡¨ç¤ºããã¾ãã
å³3 é²åºã®ææ¨ç¢ºèªç»é¢
å 容ã確èªãããèå¼±æ§ãã¯ãªãã¯ããã¨ãå³4ã®ãããªèå¼±æ§ã®è©³ç´°ç»é¢ã«é·ç§»ãã¾ãã詳細ç»é¢ã§ã¯ãå½è©²èå¼±æ§ã®è©³ç´°ãã©ã®ãªãã¸ã§ã¯ãã«å¯¾ãã¦ã®ææã§ããããã©ã®ãããªå¯¾å¦ãæ¨å¥¨ããããã表示ããã¾ãã対å¦æ¹æ³ã«ã¤ãã¦ã¯ããªãã¸ã§ã¯ããã¬ã¸ã¹ããªãã¼ã®å¤æ´æ¹æ³ãæé ã¬ãã«ã§è¨è¼ããã¦ãããããã«å¾ããã¨ã§èå¼±æ§ã®ä¿®æ£ãå¯è½ã§ãã
å³4 èå¼±æ§è©³ç´°ç»é¢
å³5ã¯æ»æææ¨ã®ç¢ºèªç»é¢ã§ããæç³»åã§æ»æã¨èãããããµãã¾ãã¨ãã®æ°ã示ãã¾ããããã«ã°ã©ããã¯ãªãã¯ããã¨ãå³ 6ã®ããã«ã¤ãã³ãã®è©³ç´°ã確èªã§ãã¾ãã
å³5 æ»æææ¨ã®ç¢ºèªç»é¢
å³6 æ»æã¤ãã³ãã®è©³ç´°ç»é¢
5. ãããã«
ã¼ããã©ã¹ãæ代ã®å°æ¥ã«ä¼´ã£ã¦ADã®éè¦æ§ã¯ããã«ä¸ãã£ã¦ããä¸æ¹ãã¯ã©ã¦ãå©ç¨ã®æ®åãç¸ã¾ã£ã¦ã»ãã¥ãªãã£ãªã¹ã¯ãå¢å¤§ãã¦ãã¾ããADã®ã»ãã¥ã¢ãªéç¨ã«æ¬ ãããªãã®ã¯ãç¹å¥ãªãã¨ã§ã¯ãªããé©åãªæ§æ管çã¨ã¤ãã³ãã®ç£è¦ã§ããä¸æ¹ãã¯ã¼ã¯ã¹ã¿ã¤ã«ã®å¤å®¹ã§ãã¢ããªã±ã¼ã·ã§ã³ãå©ç¨å½¢æ ãå¢å¤§ããè¤éåããADã®æ§æãé©åã«ç¶æããã®ãé£ããç¶æ³ã«ãªã£ã¦ããã®ã確ãã§ããä»åã¯ãADã®æ§æã®æ¤æ»ã¨ç£è¦ã®å¤§é¨åã人æã«é ¼ããã¨ãªãå®æ½ã§ããã½ãªã¥ã¼ã·ã§ã³ã¨ãã¦Tenable.adããç´¹ä»ãã¾ããã
å½ç¤¾ã§ã¯ãADã®è¨è¨ã»æ§ç¯æ¡ä»¶ãå種ã»ãã¥ãªãã£ãµã¼ãã¤ãéãã¦ãADãã»ãã¥ã¢ã«éç¨ããã¡ã½ããã¸ã¼ã®ç 究éçºãæ¨é²ãã¦ããã¾ããä»å¾ãç¶ç¶çã«æè¡æ å ±ã®æä¾ãè¡ã£ã¦ã¾ããã¾ãã
åèæç®
- [1]Active Directory ã®ã»ãã¥ãªãã£ä¿è·ã«é¢ãããã¹ã ãã©ã¯ãã£ã¹ï¼Microsoft Corp.ï¼
https://docs.microsoft.com/ja-jp/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory - [2]ãµã¤ãã¼æ»æï¼æ¨çåæ»æï¼å¯¾çé²å¾¡ã¢ãã«ã®è§£èª¬ï¼ç·åç æ
å ±ã»ãã¥ãªãã£å¯¾ç室ï¼
https://www.soumu.go.jp/main_content/000495298.pdf - [3]ãã°ãæ´»ç¨ãã Active Directoryã«å¯¾ããæ»æã®æ¤ç¥ã¨å¯¾çï¼JPCERT/CCï¼
https://www.jpcert.or.jp/research/AD.html - [4]ã©ã³ãµã ã¦ã§ã¢ãè¦ãã¤ããWindowsã®èå¼±æ§ãZerologonãã®å¨åï¼ITmedia newsï¼
https://www.itmedia.co.jp/news/articles/2010/26/news057.html