<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US">
	<id>https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3AActive_Directory</id>
	<title>Definition:Active Directory - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.insurerbrain.com/w/index.php?action=history&amp;feed=atom&amp;title=Definition%3AActive_Directory"/>
	<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Active_Directory&amp;action=history"/>
	<updated>2026-05-02T14:20:36Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://www.insurerbrain.com/w/index.php?title=Definition:Active_Directory&amp;diff=19680&amp;oldid=prev</id>
		<title>PlumBot: Bot: Creating new article from JSON</title>
		<link rel="alternate" type="text/html" href="https://www.insurerbrain.com/w/index.php?title=Definition:Active_Directory&amp;diff=19680&amp;oldid=prev"/>
		<updated>2026-03-17T06:18:45Z</updated>

		<summary type="html">&lt;p&gt;Bot: Creating new article from JSON&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;🔐 &amp;#039;&amp;#039;&amp;#039;Active Directory&amp;#039;&amp;#039;&amp;#039; is Microsoft&amp;#039;s directory and identity management service that governs user authentication, access permissions, and network resource management across enterprise IT environments — and within the insurance industry, it serves as the backbone of identity infrastructure for carriers, brokers, and third-party administrators managing vast quantities of sensitive [[Definition:Policyholder | policyholder]] data and regulated systems. Because insurers operate under strict [[Definition:Data protection | data protection]] and [[Definition:Regulatory compliance | regulatory compliance]] mandates across jurisdictions — from the NYDFS Cybersecurity Regulation in the United States to the European Union&amp;#039;s General Data Protection Regulation and the Monetary Authority of Singapore&amp;#039;s Technology Risk Management Guidelines — Active Directory&amp;#039;s role in controlling who can access what, and under what conditions, makes it a critical piece of an insurer&amp;#039;s security posture.&lt;br /&gt;
&lt;br /&gt;
⚙️ Active Directory works by maintaining a centralized, hierarchical database of objects — users, computers, applications, and security groups — within a network domain. When an employee at an [[Definition:Insurance carrier | insurance carrier]] logs into their workstation, Active Directory authenticates their credentials and enforces policies that determine which [[Definition:Policy administration system | policy administration systems]], [[Definition:Claims management system | claims platforms]], actuarial models, and [[Definition:Reinsurance | reinsurance]] databases they can access. Group policies enable IT administrators to push security configurations across thousands of endpoints simultaneously, enforcing requirements such as multi-factor authentication, password complexity, and session timeouts. Many insurers integrate Active Directory with cloud-based extensions like Azure Active Directory (now Microsoft Entra ID) to manage hybrid environments where on-premises legacy systems coexist with cloud-based [[Definition:Software as a service (SaaS) | SaaS]] applications — a common architectural reality in an industry undergoing gradual digital transformation.&lt;br /&gt;
&lt;br /&gt;
🛡️ From a [[Definition:Cyber risk | cyber risk]] perspective, Active Directory is simultaneously an insurer&amp;#039;s most important defensive asset and one of its most attractive targets for attackers. Threat actors who compromise Active Directory — through techniques such as credential harvesting, Kerberoasting, or privilege escalation — can gain access to virtually every system and data store in an organization. For [[Definition:Cyber insurance | cyber insurers]] evaluating [[Definition:Submission | submissions]], the security posture of an applicant&amp;#039;s Active Directory environment has become a key underwriting consideration: questions about privileged access management, domain controller hardening, and Active Directory monitoring capabilities now feature prominently in [[Definition:Application questionnaire | application questionnaires]]. The [[Definition:CrowdStrike | CrowdStrike]] outage of 2024 and high-profile ransomware attacks on insurance organizations have only intensified industry focus on directory service resilience, making Active Directory hygiene a de facto prerequisite for obtaining robust cyber coverage at competitive terms.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Related concepts:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
{{Div col|colwidth=20em}}&lt;br /&gt;
* [[Definition:Cyber insurance]]&lt;br /&gt;
* [[Definition:Attack surface]]&lt;br /&gt;
* [[Definition:Identity and access management (IAM)]]&lt;br /&gt;
* [[Definition:Multi-factor authentication (MFA)]]&lt;br /&gt;
* [[Definition:Privileged access management (PAM)]]&lt;br /&gt;
* [[Definition:Zero trust architecture]]&lt;br /&gt;
{{Div col end}}&lt;/div&gt;</summary>
		<author><name>PlumBot</name></author>
	</entry>
</feed>