Cloud

Securing Active Directory on AWS: A Practical Guide to AD Tiering with ANSSI and AWS SRA Alignment

How to map the ANSSI AD tiering model onto AWS, why Managed AD may not be enough for Tier 0, and which AWS security services close the compliance gaps.

Alexandre Agius

Alexandre Agius

AWS Solutions Architect

11 min read
Share:

95% of enterprises use Active Directory for authentication. When you migrate AD to AWS under regulatory pressure — ANSSI in France, NIS2 across the EU — the architecture decisions get surprisingly hard. This post breaks down how to align the AD tiering model with AWS multi-account patterns, and which AWS security services fill the compliance gaps.

The Problem

Most enterprises federate their on-premises Active Directory with AWS through IAM Identity Center. It works, it’s convenient, and it gives users single sign-on across AWS accounts. But here’s the thing nobody talks about: if your on-prem AD Tier 0 is compromised, your entire AWS environment is compromised too.

The attack chain is straightforward:

  1. Attacker compromises on-prem AD (phishing, vulnerability, insider)
  2. Modifies AD group memberships mapped to IAM Identity Center permission sets
  3. Issues valid SAML assertions for any AWS role
  4. Gets admin access to the AWS Organization — CloudTrail, S3, IAM, everything

There is no security boundary between a compromised AD domain and the AWS resources that trust it via federation. Tier 0 AD = Tier 0 AWS. And if you’re subject to ANSSI recommendations (the French national cybersecurity agency), you need to treat this seriously — their AD security guide (ANSSI-PA-099) explicitly mandates a tiered administration model.

The real challenge: how do you implement AD tiering on AWS while staying compliant with ANSSI and aligned with the AWS Security Reference Architecture?

The Solution

Map the ANSSI 3-tier model directly onto your AWS multi-account strategy. Use AD self-managed on EC2 for Tier 0 (not AWS Managed AD), IAM-only access for privileged admins, and layer AWS SRA security services on top to close the compliance gaps that AD alone cannot address.

AD Tiering on AWS — Multi-Account Architecture

How It Works

The ANSSI Tiering Model — Quick Primer

The ANSSI guide ANSSI-PA-099 (October 2023) mandates a privileged access management model based on Microsoft’s 3-tier architecture:

TierScopeWhat’s at Stake
Tier 0Domain Controllers, Enterprise Admins, PKI, Federation servicesTotal domain control — if compromised, everything falls
Tier 1Application servers, databases, management infrastructureWorkload impact, business data exposure
Tier 2Workstations, user accounts, mobile devicesIndividual user compromise

The fundamental rule: Tier 0 credentials must never touch Tier 1 or Tier 2 systems. If a Domain Admin logs into a standard workstation, their credentials sit in memory and can be extracted with tools like Mimikatz. This breaks the entire tiering model.

ANSSI takes this further with recommendation R68 — Kerberos Armoring (section 4.12): enable “blindage Kerberos” on all Tier 0 systems. This protects Kerberos exchange traffic using the machine account (240-bit password), making offline brute-force attacks unrealistic. It requires machine certificates from a PKI infrastructure and a Domain Functional Level >= 5 (Windows Server 2012+).

Why AWS Managed AD Doesn’t Work for Tier 0

This is the insight that’s not documented anywhere in AWS docs: AWS Managed AD is incompatible with ANSSI Tier 0 requirements.

Here’s why:

RequirementAWS Managed ADAD on EC2
Domain Admin accessNo (delegated admin only)Yes (full control)
RDP access to DCsNoYes
ANSSI audit tools (PingCastle, Purple Knight)Cannot run (no DC access)Full access
AD Certificate Services (PKI)Not supportedFull support
Kerberos Armoring (R68) GPO deploymentConstrainedFull control
Custom schema extensionsEnterprise Edition onlyFull control
Isolated Tier 0 forestNot feasible (1 forest per instance)Multiple forests possible
Security hardening (dSHeuristics, adminSDHolder)LimitedFull access

The deal-breaker for ANSSI compliance: you cannot audit what you cannot access. ANSSI requires full audit capability on Tier 0 systems, and Managed AD gives you a delegated admin account — not Domain Admin. You can’t run PingCastle. You can’t inspect the adminSDHolder. You can’t verify dSHeuristics values. You’re flying blind on the most critical part of your infrastructure.

There’s also a concrete technical blocker: Kerberos Armoring (R68) requires machine certificates issued by an AD CS PKI. AWS Managed AD doesn’t support AD Certificate Services. And if you try to use IAM Identity Center with an AD Connector for Tier 0 access, you can’t implement Kerberos Armoring or machine certificate authentication — AD Connector is a simple LDAP/Kerberos proxy that doesn’t support these features.

Mapping AD Tiers to AWS Accounts

Here’s how the tiers translate into AWS multi-account architecture:

AD TierAWS ScopeAccess MethodExample
Tier 0Management Account, Security OU (Log Archive, Audit, Security Tooling)IAM users only — no federation, hardware MFA, PAWs~15 users: AD admins, network team, AWS admins
Tier 1Workload accounts (Infrastructure OU, Workloads OU)Federation via Entra ID + Conditional Access + TOTP MFAServer admins, database admins, DevOps
Tier 2Sandbox accounts, read-only, application accessStandard federation, push notification MFADevelopers, read-only users

The critical design principle: Tier 0 AWS access must never go through federation. If your AD is compromised, federated access is compromised. Tier 0 admins authenticate with native IAM users stored in a physical safe, with hardware MFA tokens. This is your break-glass path that works even when Active Directory is down.

Align this with AWS Control Tower OUs:

Root
├── Security OU (Tier 0) ← Ultra-restrictive SCPs
│   ├── Log Archive Account
│   ├── Security Tooling Account
│   └── Audit Account

├── Infrastructure OU (Tier 1) ← Restrictive SCPs
│   ├── Network Account
│   ├── Shared Services Account (Managed AD + IAM IDC)
│   └── Management Tools Account

├── Workloads OU (Tier 1)
│   ├── Production Accounts
│   └── Non-Production Accounts

└── Sandbox OU (Tier 2) ← Budget + blast radius SCPs
    └── Developer Sandbox Accounts

Building Tier 0 AD on EC2

For the AD infrastructure itself, the architecture follows these patterns:

AD Forest design — 2 domains:

  • Root Domain (pure Tier 0): Domain Controllers, PKI Root CA (offline), SubCA dedicated to Tier 0
  • Child Domain (operational): Domain Controllers behind NLB, SubCA for Tier 1, WSUS

PKI hierarchy — separated by tier:

PKI Root CA (offline) ← Private key never exposed to network

    ├── SubCA/T0 ← Certificates for Tier 0 machines (Kerberos Armoring)

    └── SubCA/T1 ← Certificates for Tier 1 machines

This separation means a compromised Tier 1 SubCA cannot issue Tier 0 certificates. The Root CA being offline means its private key cannot be stolen through a network attack — it’s the gold standard for PKI security recommended by both ANSSI and Microsoft.

Network isolation:

  • Dedicated VPCs per T0 account (Network T0, Windows T0, Backup T0)
  • Transit Gateway for inter-account connectivity
  • NLB in front of Domain Controllers (LDAP/Kerberos load balancing)
  • AWS Client VPN as the single entry point for T0 admins from PAWs
  • Route 53 Resolver Rules for DNS resolution of AD domains

Backup — immutable:

  • AWS Backup Vault Lock with retention + lock periods (e.g., 180 days production)
  • Even a compromised AWS admin cannot delete these backups
  • This is your anti-ransomware insurance for the AD database

Admin access:

T0 Admin → PAW (hardened workstation) → Client VPN → Network T0 → NLB → Domain Controllers

No shortcuts. No RDP from a standard workstation. No VPN from a corporate laptop. PAWs only.

AWS SRA Security Services for Tier 0

The AD infrastructure handles identity and authentication. But the AWS accounts hosting it need their own security posture. Here’s where the AWS Security Reference Architecture comes in.

Must-have services for Tier 0 accounts:

ServiceWhy It Matters for Tier 0
Security Hub CSPMContinuous posture management with NIST 800-53 and CIS AWS Foundations standards. Validates ~200+ controls: CloudTrail enabled, MFA on root, EBS encrypted, VPC Flow Logs active. This is your ANSSI compliance baseline on the AWS side.
CloudTrailOrganization trail logging all API actions across T0 accounts. Immutable logs in S3 with SSE-KMS. If someone disables GuardDuty or modifies a Security Group on a DC, you’ll know.
GuardDutyBehavioral anomaly detection: abnormal federated logins, credential exfiltration, privilege escalation, off-hours activity. Extended Threat Detection catches multi-stage attacks.
AWS ConfigContinuous config audit. Conformance packs for NIST/CIS. Detects drift: “someone changed the Security Group on the DC subnet” triggers an alert.
KMSCustomer-managed keys for EBS encryption (NTDS.dit contains all AD secrets), CloudTrail logs, and backups.
SCPsPreventive guardrails: deny CloudTrail deletion, deny GuardDuty disable, deny Security Hub disable, restrict regions. First line of defense.

High-value additions:

ServiceWhy
IAM Access AnalyzerValidates that none of the ~15 Tier 0 IAM users have excessive permissions. Detects external access to S3 buckets or IAM roles.
VPC Flow LogsCaptures all network traffic in T0 VPCs. Essential for detecting lateral movement and abnormal AD traffic (LDAP, Kerberos, SMB).
Security LakeNormalizes all logs to OCSF format for correlation with on-prem SIEM.
EventBridgeAutomated remediation: CloudTrail disabled → Lambda re-enables it in < 2 minutes.
Secrets ManagerAutomatic rotation of AD service account passwords. Aligned with ANSSI remediation guide (krbtgt, DSRM, admin accounts).
InspectorVulnerability scanning of Windows DCs. Detects unpatched CVEs on your most critical servers.

SRA Meets ANSSI — Mapping the Gaps

Here’s the cross-reference table that ties everything together:

ANSSI RequirementCovered by AD/GPOCovered by AWS SRA
R1 — Tiered administration modelOU structure, GPOs, dedicated admin accountsSCPs per tier, multi-account isolation
R18 — Security baselinesMicrosoft security baselines via GPOAWS Config conformance packs + Inspector
R29 — Control secret disseminationTier isolation, Protected Users groupGuardDuty (credential exfiltration), IAM Access Analyzer
R68 — Kerberos ArmoringPKI SubCA/T0 machine certificates, GPO configNot covered by AWS (AD-level config)
R71 — Prohibit NTLM for Tier 0Protected Users group, GPO NTLM restrictionVPC Flow Logs detect abnormal NTLM traffic
R73 — Block outbound NTLM from Tier 0GPO outbound NTLM blockingNetwork Firewall can filter at network level
Section 2.4 — Logging and detectionWindows Event Forwarding, SIEMCloudTrail + VPC Flow Logs + Security Lake
Immutable backupsN/AAWS Backup Vault Lock
Compliance postureN/ASecurity Hub CSPM (NIST 800-53 / CIS)
Incident responseN/ASecurity Incident Response + CIRT (free with Enterprise Support)

The key insight: neither AD alone nor AWS alone covers everything. AD handles identity-level security (Kerberos, NTLM, GPOs, tiering). AWS handles infrastructure-level security (posture management, logging, detection, backup immutability). You need both, working in concert.

What I Learned

  • Tier 0 AD = Tier 0 AWS when federated — this is the single most important insight. If your AD is compromised and you federate to AWS, your AWS environment is compromised. No exceptions. Design for this assumption.

  • AWS Managed AD is great for Tier 1/2, but incompatible with ANSSI Tier 0 — the lack of Domain Admin access, DC access, and AD Certificate Services makes it impossible to implement the full ANSSI hardening recommendations. AD on EC2 is the right choice when regulatory compliance requires full audit capability.

  • Kerberos Armoring (ANSSI R68) is a concrete technical blocker for IAM Identity Center on Tier 0 — this isn’t theoretical. If ANSSI requires R68, and R68 requires machine certificates + GPO deployment on DCs, then AD Connector / IAM IDC cannot serve Tier 0. Use native IAM users with hardware MFA instead.

  • The AWS SRA and ANSSI are complementary, not competing — ANSSI covers identity-level security (AD, GPO, PKI, Kerberos). The AWS SRA covers infrastructure-level security (CSPM, logging, detection, remediation). Map them together for full coverage.

  • Backup Vault Lock is the AD anti-ransomware insurance — if an attacker takes over your domain, they’ll try to destroy backups. AWS Backup Vault Lock makes this physically impossible for the lock period. This single feature justifies hosting AD on AWS.

What’s Next

  • Build an open-source SCP template library for AD Tier 0/1/2 accounts (CloudFormation + Terraform)
  • Create an AWS Config conformance pack mapping ANSSI-PA-099 recommendations to AWS controls
  • Write a follow-up on the ANSSI AD Remediation Guide and how it maps to AWS migration (Scenario 3 = migration checklist)
  • Test Security Hub NIST 800-53 standard coverage against the full ANSSI-PA-099 recommendation set
Alexandre Agius

Alexandre Agius

AWS Solutions Architect

Passionate about AI & Security. Building scalable cloud solutions and helping organizations leverage AWS services to innovate faster. Specialized in Generative AI, serverless architectures, and security best practices.

Related Posts

Back to Blog