Permission Tier Model

This page is for the Adapted Microsoft Tier permission model for UT Austin.

 

Information here is built on the framework provided from this Microsoft Article: Securing Privileged Access Reference Material

The purpose of this tier model is to protect identity systems using a set of buffer zones between full control of the Environment (Tier 0) and the high risk workstation assets that attackers frequently compromise.

 

Diagram showing the three layers of the Tier model

 

The Tier model is composed of three levels and only includes administrative accounts, not standard user accounts:

 

  • Tier 0 - Direct Control of enterprise identities in the environment. Tier 0 includes accounts, groups, and other assets that have direct or indirect administrative control of the Active Directory forest, domains, or domain controllers, and all the assets in it. The security sensitivity of all Tier 0 assets is equivalent as they are all effectively in control of each other.  

    • At UT Austin this includes, but is not limited to, the Austin Active Directory Domain Administrators, Office 365 Global Administrators, System Center Configuration Manager Server (SCCM), System Center Data Protection Manager (DPM), and Remote Desktop Gateway (RDG)
  • Tier 1 - Control of enterprise servers and applications. Tier 1 assets include server operating systems, cloud services, and enterprise applications. Tier 1 administrator accounts have administrative control of a significant amount of business value that is hosted on these assets. A common example role is server administrators who maintain these operating systems with the ability to impact all enterprise services.

  • Tier 2 - Control of user workstations and devices. Tier 2 administrator accounts have administrative control of a significant amount of business value that is hosted on user workstations and devices. Examples include Help Desk and computer support administrators because they can impact the integrity of almost any user data.