%3CLINGO-SUB%20id%3D%22lingo-sub-1192000%22%20slang%3D%22en-US%22%3ERe%3A%20A%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20Part%202%20-%20Identity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1192000%22%20slang%3D%22en-US%22%3E%3CP%3EAnother%20great%20article.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1191669%22%20slang%3D%22en-US%22%3EA%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20Part%202%20-%20Identity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1191669%22%20slang%3D%22en-US%22%3E%3CP%3EWelcome%20to%20part%20two%20of%20%E2%80%9CA%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack.%26nbsp%3B%20For%20those%20wanting%20to%20checkout%20part%20one%20which%20was%20the%20overview%20please%20click%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpremier-field-engineering%2Fa-journey-to-holistic-cloud-protection-with-the-microsoft-365%2Fba-p%2F1147793%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20our%20first%20stop%20on%20the%20journey%20to%20holistic%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack%20we%20will%20be%20discussing%20%3CSTRONG%3EIdentity%20%3C%2FSTRONG%3Esecurity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAt%20the%20core%20of%20identity%20security%2C%20we%20must%20ensure%20that%20whoever%20is%20authenticating%20is%20really%20who%20they%20present%20themselves%20as.%26nbsp%3B%20To%20do%20this%20we%20leverage%20conditional%20access%20to%20define%20unsafe%20scenarios%20to%20block%20access%20to%20corporate%20data%20while%20also%20providing%20access%20requirements%20when%20scenarios%20are%20acceptable.%26nbsp%3B%20Your%20identity%20is%20the%20front%20door%20to%20your%20organization%E2%80%99s%20data.%26nbsp%3B%20Just%20like%20the%20front%20door%20to%20our%20houses%2C%20some%20have%20locks%20with%20keys%20while%20other%20locks%20are%20integrated%20with%20an%20app%20on%20our%20phone.%26nbsp%3B%20Keys%20can%20be%20lost%20or%20duplicated%20while%20the%20app%20will%20use%20something%20we%20have%20with%20you%20to%20allow%20access.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22James%20Key_0-1582578534835.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173123iCF8EE1ABBC06884E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22James%20Key_0-1582578534835.png%22%20alt%3D%22James%20Key_0-1582578534835.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EConditional%20Access%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3EThe%20modern%20workforce%20is%20more%20mobile%20and%20user%20preference%20centric%20than%20ever.%26nbsp%3B%20Gone%20are%20the%20days%20where%20everyone%20works%20in%20a%20corporate%20building%20with%20a%20corporate%20assigned%20device.%26nbsp%3B%20We%20work%20from%20home%2C%20a%20local%20cafe%2C%20a%20plane%20during%20travel%20and%20even%20out%20in%20the%20middle%20of%20the%20woods.%26nbsp%3B%20Instead%20of%20a%20corporate%20standard%20issued%20computer%3B%20people%20work%20from%20their%20family%20computer%2C%20personal%20mobile%20device%20or%20even%20a%20hotel%20kiosk.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUsing%20conditional%20access%20organizations%20are%20able%20to%20specify%20access%20scenarios%20that%20are%20safe%20to%20allow%20access%2C%20require%20additional%20requirements%20to%20be%20satisfied%20or%20block%20access%20all%20together.%26nbsp%3B%20With%20conditional%20access%20you%20can%20define%20the%20below%20plus%20much%20more%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWho%20does%20the%20policy%20affect%3CUL%3E%0A%3CLI%3ESpecific%20users%2C%20groups%2C%20directory%20roles%20or%20even%20external%2Fguest%20accounts%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EWhat%20does%20the%20policy%20affect%3CUL%3E%0A%3CLI%3EAll%20cloud%20apps%2C%20specific%20Office%20365%20apps%20or%20third%20party%20apps%20that%20you%20have%20integrated%20in%20with%20Azure%20AD%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EWhere%20does%20the%20policy%20affect%3CUL%3E%0A%3CLI%3EFrom%20specific%20IP%20addresses%20or%20countries%3C%2FLI%3E%0A%3CLI%3EFrom%20specific%20protocols%20from%20a%20browser%2C%20desktop%20app%2C%20mobile%20app%2C%20modern%20authentication%2C%20Exchange%20ActiveSync%20or%20legacy%20authentication%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EAllow%20access%20with%20requirements%20or%20block%20access%3CUL%3E%0A%3CLI%3ERequire%20Multi-Factor%20Authentication%3C%2FLI%3E%0A%3CLI%3ERequire%20the%20device%20to%20be%20compliant%20with%20Intune%20or%20hybrid%20Azure%20AD%20Joined%3C%2FLI%3E%0A%3CLI%3ERequire%20acceptance%20of%20a%20terms%20of%20use%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EBelow%20are%20some%20common%20scenarios%20that%20organizations%20must%20think%20about%20when%20layering%20security%20around%20identity.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3EIssue%20%231%3C%2FSTRONG%3E%3A%20%3CSTRONG%3EPassword%20are%20insecure%E2%80%A6%20period%3C%2FSTRONG%3E%20-%20Passwords%20rely%20on%20an%20individual%20remembering%20a%20key%20piece%20of%20information%20to%20prove%20who%20they%20are.%26nbsp%3B%20Passwords%20can%20be%20harvested%20through%20phishing%20campaigns%2C%20cracked%20using%20password%20sprays%2Fbrute%20force%20attacks%20or%20found%20written%20down.%26nbsp%3B%20It%E2%80%99s%20a%20known%20fact%20that%20the%20first%20password%20created%20by%20someone%20will%20be%20the%20strongest%20one%20they%20ever%20create.%26nbsp%3B%20Over%20time%20the%20strength%20will%20decrease%20as%20password%20expiration%20policies%20force%20them%20to%20think%20of%20new%20ones%20which%20are%20frequently%20variations%20of%20the%20original%20password.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20Enforce%20MFA%20using%20conditional%20access%20to%20add%20another%20layer%20of%20security%20that%20results%20in%20the%20person%20authenticating%20using%20something%20they%20have%20with%20them%20to%20prove%20who%20they%20are.%26nbsp%3B%20At%20Microsoft%20we%20recommend%20using%20the%20Microsoft%20Authenticator%20App%20with%20push%20notification%20as%20your%20MFA%20option.%26nbsp%3B%20While%20we%20also%20allow%20phone%20call%20and%20SMS%20verification%20options%2C%20these%20are%20less%20secure%20due%20to%20exploits%20like%20text%2Fcall%20masking%20techniques%20and%20SIM%20swapping.%26nbsp%3B%20To%20reduce%20the%20need%20to%20MFA%20internal%20you%20can%20also%20create%20trusted%20IP%20address%20ranges%20using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Freports-monitoring%2Fquickstart-configure-named-locations%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ENamed%20Locations%3C%2FA%3E%20and%20not%20enforce%20MFA%20while%20connecting%20from%20those%20ranges.%26nbsp%3B%20With%20MFA%20enabled%20a%20user%E2%80%99s%20password%20becomes%20useless%20by%20itself%20to%20the%20attacker%20since%20you%20also%20have%20to%20approve%20the%20authentication%20attempt%20with%20your%20MFA%20method%20to%20gain%20access.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CTABLE%20style%3D%22height%3A%20190px%3B%20width%3A%20100%25%3B%20border-style%3A%20hidden%3B%22%20border%3D%220%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22190px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22James%20Key_1-1582578534839.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173126iF02C4F6CC721771D%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22James%20Key_1-1582578534839.png%22%20alt%3D%22James%20Key_1-1582578534839.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2250%25%22%20height%3D%22190px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22James%20Key_2-1582578534843.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173124i80D50822808D4CA5%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22James%20Key_2-1582578534843.png%22%20alt%3D%22James%20Key_2-1582578534843.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3EIssue%20%232%3C%2FSTRONG%3E%3A%20%3CSTRONG%3EGuests%20have%20unverifiable%20security%3C%2FSTRONG%3E%20-%20As%20an%20organization%20you%20are%20able%20to%20decide%20the%20level%20of%20security%20you%20will%20enforce.%26nbsp%3B%20Unfortunately%2C%20some%20organizations%20may%20have%20a%20different%20prioritization%20of%20security%20and%20leave%20themselves%20vulnerable%20to%20malicious%20attacks.%26nbsp%3B%20If%20you%20share%20access%20to%20areas%20of%20your%20environment%20with%20an%20organization%20that%20gets%20compromised%2C%20then%20your%20data%20is%20accessible%20by%20the%20malicious%20attacker.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20By%20applying%20conditional%20access%20policies%20to%20external%20accounts%20we%20can%20extend%20the%20organizations%20security%20posture%20to%20those%20outside%20the%20organization.%26nbsp%3B%20This%20allows%20to%20create%20a%20baseline%20for%20acceptable%20conditions%20for%20external%20users%20accessing%20organization%20data%20no%20matter%20what%20level%20of%20security%20is%20being%20imposed%20by%20their%20organization.%26nbsp%3B%20This%20reduces%20the%20threat%20of%20having%20data%20accessed%20by%20an%20attacker%20that%20has%20compromised%20an%20external%20user%20account%20that%20has%20been%20granted%20access%20to%20your%20organizations%20data.%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorJames%20Key_3%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CTABLE%20style%3D%22border-style%3A%20hidden%3B%20width%3A%20100%25%3B%22%20border%3D%220%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22James%20Key_3-1582578534852.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173128i376484DD0A00D5B0%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22James%20Key_3-1582578534852.png%22%20alt%3D%22James%20Key_3-1582578534852.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3EIssue%20%233%3C%2FSTRONG%3E%3A%20%3CSTRONG%3EBasic%20Authentication%20is%20risky%3C%2FSTRONG%3E%20-%20As%20an%20organization%2C%20modern%20authentication%20should%20be%20used%20in%20all%20case%20scenarios%20for%20Microsoft%20365%20and%20when%20connecting%20to%20third%20party%20services.%26nbsp%3B%20Basic%20authentication%20including%20POP%2C%20IMAP%2C%20MAPI%2C%20SMTP%20and%20Office%20clients%20below%202016%20are%20often%20used%20as%20protocols%20for%20malicious%20attacks%20due%20to%20how%20the%20authentication%20process%20occurs%20compared%20to%20modern%20authentication.%26nbsp%3B%20Basic%20authentication%20is%20also%20incapable%20of%20leveraging%20modern%20authentication%20security%20techniques%20like%20conditional%20access%20which%20leaves%20them%20vulnerable%20to%20attack.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20Block%20basic%20authentication%20using%20conditional%20access%20and%20enable%20modern%20authentication%20for%20all%20cloud%20services.%26nbsp%3B%20If%20there%20are%20instances%20where%20basic%20authentication%20must%20occur%2C%20like%20sending%20emails%20using%20an%20SMTP%20service%20account%2C%20it%20is%20recommended%20to%20only%20allow%20it%20to%20authenticate%20from%20within%20trusted%20IP%20ranges.%26nbsp%3B%20This%20can%20be%20accomplished%20using%20Named%20Locations%20in%20conditional%20access%20to%20define%20trusted%20areas%20for%20the%20specific%20service%20accounts.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20style%3D%22border-style%3A%20hidden%3B%20width%3A%20100%25%3B%22%20border%3D%220%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22James%20Key_4-1582578534861.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173127iEABCCEC199208F87%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22James%20Key_4-1582578534861.png%22%20alt%3D%22James%20Key_4-1582578534861.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EPassword%20Less%20Sign-Ins%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3EOver%20the%20course%20of%20a%20person%E2%80%99s%20life%20they%20will%20create%20many%20passwords%20for%20personal%20accounts%2C%20work%20accounts%2C%20and%20family%20accounts.%26nbsp%3B%20With%20so%20many%20passwords%2C%20we%20begin%20to%20re-use%20passwords%20or%20create%20easier%20variations%20of%20originally%20complex%20passwords.%26nbsp%3B%20From%20time%20to%20time%20organizations%20may%20have%20their%20security%20compromised%20resulting%20in%20the%20leaking%20of%20passwords%20used%20with%20them%20which%20ultimately%20compromise%20other%20accounts%20that%20share%20the%20same%20password.%26nbsp%3B%20As%20you%20can%20see%20passwords%20have%20to%20go%20and%20we%20must%20move%20into%20a%20password%20less%20society%20where%20something%20that%20we%20have%20with%20use%20becomes%20our%20method%20of%20authentication.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWithin%20the%20Microsoft%20365%20security%20stack%20we%20have%20two%20options%20for%20password%20less%20sign-ins%20which%20are%20available%20for%20authentication%20to%20Azure%20AD%20accounts%20and%20Azure%20AD%2FHybrid%20AAD%20Joined%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CSTRONG%3EMicrosoft%3C%2FSTRONG%3E%20%3CSTRONG%3EAuthenticator%20password%20less%20sign-in%3C%2FSTRONG%3E%3CUL%3E%0A%3CLI%3EThis%20method%20leverages%20the%20Microsoft%20Authenticator%20app%20on%20our%20mobile%20device%20to%20sign%20in%20by%20matching%20a%20two%20digit%20number%20presented%20on%20the%20sign-in%20page%20with%20three%20sets%20of%20two%20digit%20numbers%20on%20their%20mobile%20device.%26nbsp%3B%20This%20method%20can%20be%20seamless%20if%20your%20organization%20is%20already%20using%20the%20Microsoft%20Authenticator%20app%20for%20MFA.%26nbsp%3B%20When%20setting%20up%2C%20it%20can%20be%20scoped%20to%20specific%20users%2Fgroups%20for%20piloting%20and%20a%20controlled%20deployment.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CTABLE%20style%3D%22border-style%3A%20hidden%3B%20width%3A%20100%25%3B%22%20border%3D%220%22%20width%3D%22100%25%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%26nbsp%3B%3C%2FTD%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22James%20Key_5-1582578534964.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F173129i9E384E5E31A3B2B7%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22James%20Key_5-1582578534964.png%22%20alt%3D%22James%20Key_5-1582578534964.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FTD%3E%0A%3CTD%20width%3D%2233.333333333333336%25%22%3E%26nbsp%3B%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%20start%3D%222%22%3E%0A%3CLI%3E%3CSTRONG%3EFIDO2%3C%2FSTRONG%3E%20%3CSTRONG%3ESecurity%20Key%3C%2FSTRONG%3E%3CUL%3E%0A%3CLI%3EThis%20method%20leverages%20a%20physical%20security%20key%20that%20you%20either%20insert%20into%20your%20device%20or%20place%20in%20proximity%20of%20the%20device%20it%20allows.%26nbsp%3B%20By%20having%20the%20security%20key%20you%20validate%20who%20you%20are%20and%20are%20allowed%20to%20authenticate.%26nbsp%3B%20There%20are%20many%20supported%20vendors%2C%20but%20please%20ensure%20the%20one%20you%20select%20states%20it%20is%20FIDO2%20compatible.%26nbsp%3B%20When%20setting%20up%2C%20it%20can%20be%20scoped%20to%20specific%20users%2Fgroups%20for%20piloting%20and%20a%20controlled%20deployment.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EAs%20we%20put%20the%20brakes%20on%20this%20stop%20in%20our%20journey%20to%20holistic%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack%E2%80%A6%20I%20want%20to%20reflect%20on%20the%20importance%20of%20identity%20security.%26nbsp%3B%20Your%20identity%20is%20the%20front%20door%20to%20access%20your%20organization%E2%80%99s%20data%20and%20we%20must%20always%20protect%20the%20front%20door.%26nbsp%3B%20Security%20is%20everyone%E2%80%99s%20responsibility%20and%20as%20a%20society%20we%20are%20only%20as%20secure%20as%20our%20weakest%20link.%26nbsp%3B%20By%20securing%20your%20organization%20you%20are%20making%20the%20workplace%20a%20little%20bit%20more%20secure%20for%20everyone%20else.%3C%2FP%3E%0A%3CP%3EThank%20you%20so%20much%20for%20joining%20me%20during%20this%20stop%20while%20we%20discussed%20identify%20security.%26nbsp%3B%20Our%20next%20stop%20in%20this%20journey%20will%20be%20discussing%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpremier-field-engineering%2Fa-journey-to-holistic-cloud-protection-with-the-microsoft-365%2Fba-p%2F1264557%22%20target%3D%22_self%22%3E%3CSTRONG%3EDevice%3C%2FSTRONG%3E%26nbsp%3B%3CSTRONG%3ESecurity%3C%2FSTRONG%3E%3C%2FA%3E%20and%20how%20to%20keep%20all%20of%20our%20devices%20secure%20using%20the%20Microsoft%20365%20security%20stack.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1191669%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EPart%202%20-%20Identity%26nbsp%3B-%20Holistic%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack%20blog%20series%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1191669%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EJamesKey%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1479569%22%20slang%3D%22en-US%22%3ERe%3A%20A%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20Part%202%20-%20Identity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1479569%22%20slang%3D%22en-US%22%3E%3CP%3EThere%20are%20several%20links%20at%20the%20end%20of%20the%20article%2C%20but%20nothing%20tells%20us%20what%20they%20are%20for.%20Could%20you%20please%20add%20some%20descriptive%20information.%20Thanks%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1479650%22%20slang%3D%22en-US%22%3ERe%3A%20A%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20Part%202%20-%20Identity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1479650%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1096%22%20target%3D%22_blank%22%3E%40Dean%20Gross%3C%2FA%3E%26nbsp%3B-%20If%20you%20are%20referring%20to%20the%20five%20links%20with%20the%20paper%20clip%20those%20are%20links%20to%20the%20images%20added%20in%20the%20article.%26nbsp%3B%20Auto%20added%20by%20the%20blog%20solution.%26nbsp%3B%20If%20not%20please%20let%20me%20know%20the%20ones%20you%20are%20referring%20to.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1479671%22%20slang%3D%22en-US%22%3ERe%3A%20A%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20Part%202%20-%20Identity%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1479671%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F55081%22%20target%3D%22_blank%22%3E%40James%20Key%3C%2FA%3EThanks%20for%20the%20explanation%2C%20I%20was%20expecting%20them%20to%20be%20links%20to%20other%20articles.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Welcome to part two of “A Journey to Holistic Cloud Protection with the Microsoft 365 Security Stack.  For those wanting to checkout part one which was the overview please click here.

 

For our first stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Identity security.

 

At the core of identity security, we must ensure that whoever is authenticating is really who they present themselves as.  To do this we leverage conditional access to define unsafe scenarios to block access to corporate data while also providing access requirements when scenarios are acceptable.  Your identity is the front door to your organization’s data.  Just like the front door to our houses, some have locks with keys while other locks are integrated with an app on our phone.  Keys can be lost or duplicated while the app will use something we have with you to allow access.

 

James Key_0-1582578534835.png

 

Conditional Access:

The modern workforce is more mobile and user preference centric than ever.  Gone are the days where everyone works in a corporate building with a corporate assigned device.  We work from home, a local cafe, a plane during travel and even out in the middle of the woods.  Instead of a corporate standard issued computer; people work from their family computer, personal mobile device or even a hotel kiosk.

 

Using conditional access organizations are able to specify access scenarios that are safe to allow access, require additional requirements to be satisfied or block access all together.  With conditional access you can define the below plus much more:

  • Who does the policy affect
    • Specific users, groups, directory roles or even external/guest accounts
  • What does the policy affect
    • All cloud apps, specific Office 365 apps or third party apps that you have integrated in with Azure AD
  • Where does the policy affect
    • From specific IP addresses or countries
    • From specific protocols from a browser, desktop app, mobile app, modern authentication, Exchange ActiveSync or legacy authentication
  • Allow access with requirements or block access
    • Require Multi-Factor Authentication
    • Require the device to be compliant with Intune or hybrid Azure AD Joined
    • Require acceptance of a terms of use

Below are some common scenarios that organizations must think about when layering security around identity.

 

Issue #1: Password are insecure… period - Passwords rely on an individual remembering a key piece of information to prove who they are.  Passwords can be harvested through phishing campaigns, cracked using password sprays/brute force attacks or found written down.  It’s a known fact that the first password created by someone will be the strongest one they ever create.  Over time the strength will decrease as password expiration policies force them to think of new ones which are frequently variations of the original password.

 

Solution: Enforce MFA using conditional access to add another layer of security that results in the person authenticating using something they have with them to prove who they are.  At Microsoft we recommend using the Microsoft Authenticator App with push notification as your MFA option.  While we also allow phone call and SMS verification options, these are less secure due to exploits like text/call masking techniques and SIM swapping.  To reduce the need to MFA internal you can also create trusted IP address ranges using Named Locations and not enforce MFA while connecting from those ranges.  With MFA enabled a user’s password becomes useless by itself to the attacker since you also have to approve the authentication attempt with your MFA method to gain access.

 

James Key_1-1582578534839.png James Key_2-1582578534843.png

 

Issue #2: Guests have unverifiable security - As an organization you are able to decide the level of security you will enforce.  Unfortunately, some organizations may have a different prioritization of security and leave themselves vulnerable to malicious attacks.  If you share access to areas of your environment with an organization that gets compromised, then your data is accessible by the malicious attacker.

 

Solution: By applying conditional access policies to external accounts we can extend the organizations security posture to those outside the organization.  This allows to create a baseline for acceptable conditions for external users accessing organization data no matter what level of security is being imposed by their organization.  This reduces the threat of having data accessed by an attacker that has compromised an external user account that has been granted access to your organizations data.

 
  James Key_3-1582578534852.png  

 

Issue #3: Basic Authentication is risky - As an organization, modern authentication should be used in all case scenarios for Microsoft 365 and when connecting to third party services.  Basic authentication including POP, IMAP, MAPI, SMTP and Office clients below 2016 are often used as protocols for malicious attacks due to how the authentication process occurs compared to modern authentication.  Basic authentication is also incapable of leveraging modern authentication security techniques like conditional access which leaves them vulnerable to attack.

 

Solution: Block basic authentication using conditional access and enable modern authentication for all cloud services.  If there are instances where basic authentication must occur, like sending emails using an SMTP service account, it is recommended to only allow it to authenticate from within trusted IP ranges.  This can be accomplished using Named Locations in conditional access to define trusted areas for the specific service accounts.

 

  James Key_4-1582578534861.png  

 

Password Less Sign-Ins:

Over the course of a person’s life they will create many passwords for personal accounts, work accounts, and family accounts.  With so many passwords, we begin to re-use passwords or create easier variations of originally complex passwords.  From time to time organizations may have their security compromised resulting in the leaking of passwords used with them which ultimately compromise other accounts that share the same password.  As you can see passwords have to go and we must move into a password less society where something that we have with use becomes our method of authentication.

 

Within the Microsoft 365 security stack we have two options for password less sign-ins which are available for authentication to Azure AD accounts and Azure AD/Hybrid AAD Joined devices.

 

  1. Microsoft Authenticator password less sign-in
    • This method leverages the Microsoft Authenticator app on our mobile device to sign in by matching a two digit number presented on the sign-in page with three sets of two digit numbers on their mobile device.  This method can be seamless if your organization is already using the Microsoft Authenticator app for MFA.  When setting up, it can be scoped to specific users/groups for piloting and a controlled deployment.

 

  James Key_5-1582578534964.png  

 

  1. FIDO2 Security Key
    • This method leverages a physical security key that you either insert into your device or place in proximity of the device it allows.  By having the security key you validate who you are and are allowed to authenticate.  There are many supported vendors, but please ensure the one you select states it is FIDO2 compatible.  When setting up, it can be scoped to specific users/groups for piloting and a controlled deployment.

As we put the brakes on this stop in our journey to holistic cloud protection with the Microsoft 365 security stack… I want to reflect on the importance of identity security.  Your identity is the front door to access your organization’s data and we must always protect the front door.  Security is everyone’s responsibility and as a society we are only as secure as our weakest link.  By securing your organization you are making the workplace a little bit more secure for everyone else.

Thank you so much for joining me during this stop while we discussed identify security.  Our next stop in this journey will be discussing Device Security and how to keep all of our devices secure using the Microsoft 365 security stack.

 

4 Comments
Microsoft

Another great article.

Respected Contributor

There are several links at the end of the article, but nothing tells us what they are for. Could you please add some descriptive information. Thanks

Microsoft

@Dean Gross - If you are referring to the five links with the paper clip those are links to the images added in the article.  Auto added by the blog solution.  If not please let me know the ones you are referring to.

Respected Contributor

@James KeyThanks for the explanation, I was expecting them to be links to other articles.