Connect With Me:

KEEP YOUR Identities and credentials managed

Robin Granberg

on IT security topics

Blog page

KEEP YOUR Identities and credentials managed

Robin Granberg

on IT security topics

Blog page

My

Projects

AD ACL Scanner
Security

AD ACL Scanner

Blog

Posts

Forest Security Boundary
Securing the forest boundary
by Robin Granberg/ on 01 Oct 2022

Securing the forest boundary

In the article SID filter as security boundary between domains? (Part 7) - Trust account attack - from trusting to trusted , by Jonas Bülow Knudsen, Martin Sohn Christensen, Tobias Thorbjørn Munch Torp, they describe how the security boundary of the forest can be breached by an admin in the trusted forest and I will explain how you can mitigate this problem.