The domain admin account is considered the most privileged account in the domain. It allows the owner of the DA (Domain Admin) to access any IT resource across the domain and has the most permissions and controls over the domain, AD or otherwise.
Shared domain accounts should be done with extreme caution and strong access controls, being granted only when needed.
Some best practices to secure domain admin accounts are:
- Assign access to domain admin accounts temporarily
- Change the password after a user has accessed the domain account
- Enable two-factor authentication for all domain accounts
- Only use the domain account for configurations that need to be done at a domain-wide level. For all other minor changes, use a local admin account.
Another approach is to use a tiered admin model:
- Provision standard accounts for regular user operations.
- Grant Local Admin (LA) accounts for workstations.
- Server Admin (SA) accounts for managing servers.
- Use the Network Admin (NA) for switching and network gear.
- Use the Domain Admin (DA) for managing the domain only.
- Use separate accounts for Helpdesks with delegated rights for password resets and standard non-privileged group changes.
- Carry out user management through the script engine hires/fires etc.