Active Directory Delegation: A Security Audit Checklist
Active Directory delegation is one of those features that every Windows admin uses but few audit properly. It is also a common source of privilege escalation paths.
The Problem
When an administrator delegates permissions in AD, those permissions are stored as Access Control Entries on the target objects. Over time, delegation accumulates. The result is an AD environment where the effective permissions bear little resemblance to the intended security model.
Audit Approach
First, export the DACL from every OU in the domain. Second, identify all non-default ACEs. Third, for each delegated permission, verify that the grantee still needs the access and that the scope is appropriate.
Common Findings
In the eight AD environments I have audited this year, the most common issues are password reset delegation to groups broader than intended, write access to servicePrincipalName allowing Kerberoasting, and GenericAll permission on computer objects enabling resource-based constrained delegation attacks.