12.8
IG3

Establish and Maintain Dedicated Computing Resources for All Administrative Work

Asset Type: Devices
Security Function: Protect

Description

Establish and maintain dedicated computing resources, either physically or logically separated, for all administrative tasks or tasks requiring administrative access. The computing resources should be segmented from the enterprise's primary network and not be allowed internet access.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Enable logging on all in-scope systems
7
Configure log forwarding to centralized SIEM
8
Define log retention periods per policy
9
Establish log review schedule and procedures
10
Review and document current network architecture
11
Define segmentation zones and trust boundaries
12
Implement segmentation controls
13
Test that segmentation is effective

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Administrative Credential Theft from Shared Workstations

Confidentiality

Administrators perform privileged tasks from the same workstations used for email and web browsing, and keyloggers, browser exploits, or phishing attacks on those general-purpose systems capture administrative credentials for critical infrastructure.

Pass-the-Hash Attack from Admin Credentials on User Workstations

Confidentiality

Administrative credentials cached on general-purpose workstations are extracted through pass-the-hash or pass-the-ticket attacks, giving attackers domain admin or infrastructure admin privileges obtained from a standard user endpoint.

Lateral Movement to Critical Systems via Unsegmented Admin Workstations

Integrity

Attackers who compromise a general-purpose workstation where administrators also perform privileged tasks gain a direct path to critical infrastructure because the administrative session provides network access to management interfaces that should be isolated.

Vulnerabilities (When Safeguard Absent)

No Dedicated Administrative Workstations or Jump Boxes

Administrators perform privileged operations from the same workstations used for general business activities, exposing administrative credentials and sessions to threats present on general-purpose endpoints.

Administrative Systems Connected to General Network and Internet

Workstations used for administrative tasks are not segmented from the primary network and have internet access, exposing privileged sessions to web-based threats, phishing attacks, and network-level attacks that dedicated admin systems would avoid.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Technical SIEM dashboard showing log sources and collection status Captured monthly
Record Log review records and findings Per review cycle
Document Governing policy document (current, approved, communicated) Reviewed annually