
Active Directory tiering
AD tiering: three-tier model isolating Tier 0 domain-controller admin accounts from internet-facing assets; absent in Capita and Advanced Computer Software breaches.
Last refreshed: 17 April 2026
What is AD tiering and why are UK companies being fined for not having it?
Timeline for Active Directory tiering
Mentioned in: UK 24-hour reporting bill at Report
Cybersecurity: Threats and Defences- What is Active Directory tiering and why does the ICO care about it?
- AD tiering isolates privileged admin accounts by function: Tier 0 (domain controllers), Tier 1 (servers), Tier 2 (endpoints). The UK ICO fined Capita £14m and Advanced Computer Software £3.07m after absent AD tiering contributed to breaches, citing NCSC guidance as the GDPR Article 32 standard.Source: ICO / NCSC
Background
Active Directory (AD) tiering is a security architecture model that isolates administrative accounts by function and privilege level: Tier 0 covers domain controllers and identity infrastructure; Tier 1 covers servers and applications; Tier 2 covers endpoints and standard workstations. Absent AD tiering was cited alongside absent PAM controls as a GDPR Article 32 failure by the ICO in both the Capita (£14m) and Advanced Computer Software (£3.07m) monetary penalty notices.
In both ICO enforcement cases, the lack of AD tiering allowed attackers to escalate privileges from a compromised lower-tier account to domain-controller-equivalent access, producing the impact that triggered the GDPR breach notification. NCSC guidance on AD tiering is the reference document the ICO applied as its Article 32 baseline in both decisions.
For enterprise security architects and compliance teams, the ICO decisions mean that NCSC's AD tiering model is now a compliance obligation for UK-regulated organisations, not merely a security recommendation. The Stryker MDM wipe provides the complementary operational illustration: while Stryker's specific failure was at the MDM control-plane level, the underlying principle is identical — privilege levels within administrative tooling must be isolated and bounded to limit blast radius.