Azure AD Identity protection: Help Guard Your Identity
Azure AD Identity Protection
Identity Protection allows organizations to automate the detection and remediation of identity-based risks, investigate risks using data in the portal, and export risk detection data to third-party utilities for further analysis. Risk detection in Azure AD Identity Protection include identifying any suspicious actions in the directory. The signals generated can also be fed into tools like Conditional Access to make access decisions, or back to the Security Information and Event Management (SIEM) tool for further investigation on the basis of your organization's enforced policies.
Identity Protection provides easy access of powerful resources to your organization so that they can instantly respond to suspicious activities.
Identity Protection Policies
Azure Active Directory Identity Protection includes three default policies that can be chosen to enable, they are:
Azure MFA registration policy-
By enabling this policy you can ensure the MFA registration of new users in your organization on their first day. Multi-factor authentication is one of the self-remediation methods for risk events that allows users to act on their own to reduce helpdesk call volume.
Sign-in risk policy
Custom Conditional Access policy
Users can choose to create a custom Conditional Access policy including sign-in risk as an assignment condition.
Risk Events
Discovering compromised identities can be very challenging but Azure Active Directory can easily detect suspicious actions related to your users accounts with the help of its adaptive machine learning algorithms and heuristics. Each detected suspicious action is stored in a record called a risk detection and there are two places where you can review the reported risk detection:
- Azure AD reporting- Risk detection is an integral part of Azure AD's security reports.
- Azure AD Identity Protection- Risk detection is also a part of the reporting capabilities of Azure AD identity Protection.
- Users with leaked credentials- Whenever a legitimate user's valid password is compromised by cyber-criminals, they often share those credentials.
- Sign-ins from anonymous IP addresses- This one can identify users who have successfully signed in from an anonymous proxy IP address.
- Impossible travel to atypical locations- This type of risk detection can easily identify two sign ins originating from geographically remote locations, where at least one of them does not match with the user's past behavior.
- Sign-ins from infected devices- Sign ins from devices infected with malware can be identified in this type of risk detection.
- Sign-in from an unfamiliar location- This detection type considers past sign-in locations (IP, latitude/longitude, ASN) to determine new/unfamiliar locations.
- Sign-ins from IP addresses with suspicious activity- It can easily identify the particular IP address from which a high number of failed sign-in attempts were made over a short period of time.
User Risk Policy
Identity protection calculates what it believes is normal for a user's behavior and use that to base decisions for their risk. User Risk policy applies to user sign-ins, automatic response based on a specific user's risk level, providing the condition (risk level) as well as action (block or allow), use of high threshold during policy roll out, and low threshold for greater security.
Sign-in Risk Policy
Sign-in risk can be evaluated as part of a Conditional Access policy and it supports the following conditions:
location
Client apps
Administrators can choose to include Exchange ActiveSync clients and other clients that can utilize legacy protocols. Browser includes web-based applications that use protocols like SAML, WS-Federation, OpenID Connect, or services registered as an OAuth confidential client. Mobile apps and desktop clients are commonly used in the requirement, blocking legacy authentication and web-application while allowing mobile or desktop app.
Azure AD Conditional Access
The traditional method of security behind a corporate firewall doesn't work anymore. The tool named Conditional Access is used by Azure Active Directory to bring signals together to make decisions. and enforce organizational policies. It is the heart of the new identity driven control plane.
Conditional Access conditions
Conditional access comes with six conditions that is user/group, cloud application, device state, location (IP range), client application, and sign-in risk. The combinations of these conditions can be used to get the exact conditional access policy needed and with the access control in-hand, you can either block access altogether, or Grant access by selecting the desired controls. You can have several options like:
- Require MFA from Azure AD or an on-premises MFA (combined with AD FS)
- Grant access to only trusted devices
- Require a domain-joined device
- Require mobile devices to use intune app protection policies
Azure AD Access Reviews
Why are access reviews important?
Due to the ever-growing challenges in cyber security services and convenience of leveraging the power of self-service has led to need for better access management capabilities. Following points needed to be checked all the time:
- As new employees join, how can you ensure that they have the right access to be productive?
- As people move teams or leave the company, how do you ensure that their old access is removed, especially when it involves guests?
- Excessive access rights may lead to audit findings and compromises as they indicate a lack of control over access.
- You must proactively engage with resource owners to ensure they regularly review who has access to their resources.
Use access reviews in the following cases
- Too many users in privileged roles- Things like how many users have administrative access, how many of them are Global Administrators, and if there are any invited guests or partners that have not been removed after being assigned to do an administrative task needed to be checked on timely basis.
- When automation in infeasible- Rules can be created for dynamic membership on security groups or Microsoft 365 Groups, but if the HR data is not in Azure AD or if users still need access after leaving the group to train their replacement, then you can create a review on that group to ensure those who still need access should have continuous access.
Comments
Post a Comment