Chapter 3: Managing Cloud Identities

Back in the days when IT security was synonymous with blocking network traffic, life was easy. You could be sure that your physical walls constituted your perimeter, so you simply needed to protect your borders. However, today, your network endpoints are no longer enough to secure your perimeter. Today, we see an increasing number of phishing and credential theft attacks against corporate environments. We're in an age where corporate data is moving out of its secure enterprise network environment. It's the age of cloud services such as Microsoft 365 and Microsoft Azure, and so traditional security strategies aren't enough to safeguard data as the data is outside secure walls. We need a new approach to add on top of the traditional approach. This new approach is identity is the new perimeter. This makes identity something we need to protect more than ever before. Of course, this does not mean that we have to do away with the old method of protecting the network, and we'll explore this in Chapter 4, Azure Network Security.

In general, to avoid random attacks, you need to raise the bar and make an attack attempt as expensive as possible for an attacker. It's just like protecting your home: if you secure your front door with a higher resistance class (RC), have grids in front of your windows, and have an automated lighting system to light up your property and your neighbor does not, then burglars looking for random targets will most probably not even try to attack your home. This is because an attack attempt against your home would probably be too time-consuming, or the probability of being detected is too high; thus, it would be too expensive from an attacker's point of view. This does not work if you are suffering a sophisticated attack that is planned and targeted against your home or identities (there is no absolute security!), but it helps against all the random attack attempts out in the wild.

In this chapter, we will not only cover strategies to protect your identities, but you will also learn how to reduce the attack surface of your privileged accounts. The topics we will cover are the following:

  • Exploring passwords and passphrases
  • Understanding multi-factor authentication
  • Using Conditional Access
  • Introducing Azure AD Identity Protection
  • Understanding role-based access control
  • Protecting admin accounts with Azure AD PIM
  • Hybrid authentication and Single Sign-On
  • Understanding passwordless authentication
  • Licensing considerations

Exploring passwords and passphrases

When talking about identity security, there is one principle you always have to keep in mind: assume breach. The question is not whether your accounts are attacked but whether you know about it and whether you can prevent attackers from being successful. We can already see that there are many successful attacks against cloud identities every day. There is no single solution for protecting your identities, but you need to leverage a broader toolset to be resilient against identity attacks.

Important Note

The question is not whether your cloud identities are under attack, but whether you can ensure that attackers are not successful.

If we start with passwords, you could say that no one likes them. Well, attackers do, because passwords often give them leverage for an upcoming identity-focused attack attempt. Given the fact that people tend to create their passwords based on their life experiences, an attacker generally needs to be good at gathering background information about a specific user to guess their password. This, of course, means some effort on the attacker's side, and this would most probably be executed in a sophisticated attack against a high-value target. You can see that passwords are not a good solution for protecting your accounts.

Furthermore, passwords can lead to denial of service (DoS). In Active Directory Domain Services (AD DS) on Windows Server, lots of companies employ a security policy that will lock out user accounts for a given time (or infinitely) following a given number of failed login attempts. The problem is that authenticated users—that is, users who have been able to log in against AD— can read this security policy and list user accounts from AD. An authenticated user can be any employee (internal attacker), or someone who is trying to attack a company from outside and who was able to get access to a set of login credentials (external attacker). By leveraging PowerShell, an attacker can easily do the following:

  • Find out what security policy is in place
  • List all user accounts
  • Lock all user accounts by trying to log in with incorrect passwords
  • Repeat this script every x minutes

If someone does so, no one in this directory will be able to log in again, so the company will suffer a DoS. With that being said, you should not implement this lockout policy but monitor login attempts instead, and then make educated decisions if something unusual happens. Keep an eye on your security event logs on Windows servers or the syslog/auth log domain on Linux.

Dictionary attacks and password protection

Dictionary attacks, such as brute-force and password spray attacks, still find success every day. In a dictionary attack, attackers try combinations of usernames and well-known and often-used passwords against an authentication service. The brute-force attack is more noisy and easier to recognize. With brute force, an attacker will try lots of passwords for a single user account, hoping that one of the attacks will be successful. In the backend, you will see lots of failed login attempts, so you can easily react to them. However, a password spray attack is way more sensitive since an attacker will only use a small set of passwords against lots of user accounts. If the attacks are very slow and widely distributed, it is very hard to notice an attack. To avoid successful password spray and brute-force attacks in the cloud and, to be more precise, in Azure AD, there are some easy best practices:

  • Encourage your users to use passphrases instead of passwords.
  • Block passwords or patterns that should not be used in your environment.

Currently, you can use passwords or passphrases with up to 256 (!) characters in Azure AD. Even if you were only to use all 26 letters from the alphabet in uppercase and lowercase, this would mean (2 x 26)256 possibilities, which results in a number near infinity.

With that said, and knowing that you cannot only use uppercase and lowercase letters but also numbers and other characters in a passphrase, this results in a plethora of combinations. You see that you should definitely enable and encourage your users to use passphrases with a lot of characters.

For passwords you do not want to allow in your organization, there is another option you can enable. By default, Microsoft does not allow you to use passwords or password patterns that can be found on password lists and that are known to be used in dictionary attacks. For example, a pattern that is not allowed is your username, or any part of it. In addition to that, it might make sense for your company to avoid passwords that are easily relatable to your enterprise. These could include well-known marketing phrases, corporate abbreviations, and so on. In Azure AD, there is an option to create a custom banned password list that can be used to either audit or enforce the usage of secure passwords. You can even use this custom list to enable password protection for your on-premises Windows Server AD by installing and enabling an on-premises agent.

The custom banned password list can contain up to 1,000 case-sensitive terms between 4 and 16 characters in length. One nice feature is the fact that character substitution such as e and 3 or o and 0 is considered.

Figure 3.1 – Configuration of a custom banned password list in Azure AD

Figure 3.1 – Configuration of a custom banned password list in Azure AD

In order to configure a custom banned password list, you need to navigate to Azure Active Directory | Security | Authentication methods | Password protection in the Azure portal, as shown in Figure 3.1. On that screen, you'll also find configuration options for the Custom smart lockout feature. As mentioned before, you might find an on-premises AD security policy forcing accounts to be locked after a given number of failed login attempts. This is kind of an on/off decision, and you can easily increment the lockout counter with the same password to force account lockouts. Remember that this is why you should disable such policies in your on-premises AD and monitor login attempts instead.

However, in Azure AD, smart lockout is the feature that combines the best of two worlds: letting users work without blocking them unnecessarily and preventing attackers from guessing your passwords at the same time. To achieve that goal, smart lockout comes with some interesting features:

  • Users are not meant to be blocked from working. Smart lockout recognizes attack attempts and login attempts from valid users. Attack attempts are treated differently, so legitimate users are still able to work while attackers are blocked.
  • Smart lockout stores the last three bad password hashes. Doing so, you cannot simply use the lockout counter to enforce DoS by using the same bad password several times.
  • The default lockout threshold is 10 bad attempts with a lockout duration of 60 seconds. Smart lockout is always on for Azure AD; however, it does not guarantee that legitimate user accounts are never locked out. The service uses familiar versus unfamiliar locations to try to figure out whether a login attempt comes from a bad actor or a genuine user. However, there is still a probability that users will be blocked from logging in. And one important point is that the service does not necessarily protect you from highly sensitive password spray attacks. This is not because the service is bad but because those kinds of attacks can become really difficult to discover.

Imagine an attacker has a list of nine passwords and they use a widely spread network of bots to attack thousands of user accounts in one custom domain over a time frame of weeks. In that situation, there are some facts to realize:

  • The number of login attempts per user account will not exceed the default threshold of 10.
  • By using several widely spread host systems to run the attack, it is hard to discover whether a login attempt is valid or malicious. However, Microsoft will also take into account whether a login attempt comes from a known bad IP address or an unfamiliar location.

So, in this scenario, the service will probably not block an attacker. Of course, the nine passwords in the list need to be quite sophisticated to be accepted. However, there is still a probability of an attacker being successful at guessing your passwords.

Now that you know why passwords are not enough to protect your accounts, let's move one step further and see how multi-factor authentication (MFA) can give an additional layer of security to your accounts.

Understanding MFA

There are few technical features that protect your accounts more than using MFA. With MFA, it is not enough to know a username and a password; you are also challenged to prove who you are using another authentication factor. With MFA, you generally need to be able to log in with the following:

  • Something you are, such as your user account name or a biometric attribute
  • Something you know, such as a password
  • Something you have, such as an additional authentication factor (smartcard, smartphone app, or security key)

Given the fact that an MFA challenge is only triggered following a successful login attempt, it is still reliant on passphrases that are not easy to guess. In other words, if an MFA challenge is triggered, the respective username/password combination has already been successfully validated (refer to the following screenshot for reference):

Figure 3.2 – An MFA challenge is triggered after the user's credentials have successfully been validated

Figure 3.2 – An MFA challenge is triggered after the user's credentials have successfully been validated

Today, there are several options for using MFA in Azure AD:

  • A push message from the Microsoft Authenticator smartphone app
  • A one-time password (OTP) from the Microsoft Authenticator smartphone app
  • A text message with an OTP sent to your mobile device
  • A phone call to an authentication phone
  • A security key or token

If you have set up MFA the right way, you can react to all situations with a combination of these options. If you do not have access to mobile data or Wi-Fi, you can use the OTP code from a text message or from your smartphone app. If you leave your smartphone at home, you can get a call to your office phone (or another authentication phone you defined during the configuration process).

Important Note

It's important to understand that you should not use your mobile phone number as your authentication phone for obvious reasons. If you lose your phone or leave it at home, few options will remain open to you.

In Chapter 2, Governance and Security, you learned about the segregation of duties and the principle of least privilege. Accounts only get the access rights they really need to fulfill a task. However, it is important to prevent being accidentally locked out from your Azure AD environment. So, there is still a need for accounts with higher privileges, such as subscription owner or Global Administrator access. This is why you need to create at least two administrative emergency access accounts. Some of these emergency access or break glass accounts need to be protected with MFA, too. Now, a single smartphone does not seem to be a good option for these kinds of accounts because, according to Murphy's law, something will go wrong; the smartphone's owner is always on holiday, ill, or not available for other reasons when you need them. A good thing to know is that you can have up to five authentication factors connected to a single account. For example, you could associate three security keys, one smartphone app, and a phone number with one account to make sure that there will always be at least one method you can use to fulfill an MFA challenge.

How to enable MFA in Azure AD

From an administrator's perspective, MFA activation in Azure AD is straightforward:

  1. In the Azure portal, navigate to Azure Active Directory and select the Users navigation pane. In the upper navigation pane, select Per-user MFA, as shown in Figure 3.3:
Figure 3.3 – MFA activation in the Azure portal

Figure 3.3 – MFA activation in the Azure portal

  1. You will be redirected to a retro-style portal at the windowsazure.com domain, in which you can enable or disable MFA for single users or bulk-update them by selecting several accounts or using a CSV file in the users tab.
  2. Before you enable MFA for all user accounts, first switch from the users tab to the service settings tab to configure some custom settings for your environment, as shown in Figure 3.4:
Figure 3.4 – Service settings for MFA

Figure 3.4 – Service settings for MFA

The first option is to allow or disallow users to create app passwords for legacy non-browser apps that do not support MFA. Outlook used to be such an application back in the days; however, nowadays, most applications should be able to authenticate with MFA.

You can also define trusted IPs for which you can skip MFA. So, for example, if your users are authenticating from one of your corporate offices and you have defined your external IP range(s) here, you can define that MFA challenges are only triggered when someone wants to authenticate from outside your corporate buildings. You can also enable and disable single verification options if they do not fit your company's needs. The last setting is to allow users to remember MFA for devices they (but not you as a company!) trust. If you enable that option, users are not prompted with an MFA challenge again for a given period of time (between 1 and 365 days) on a particular device.

  1. Now, back to enabling user accounts for MFA on the users tab. When you click the Enable link on the right side after selecting one or several user accounts (see Figure 3.5), you are prompted to read the online deployment guide and then click on enable multifactor auth. That's all from an administrator's point of view. Pretty easy? Indeed.
Figure 3.5 – Enabling MFA for one or several user accounts

Figure 3.5 – Enabling MFA for one or several user accounts

The MFA-activated user has to configure all individual settings after the next login attempt. Telephone numbers for the account are taken from the information that is already stored in Azure AD. However, the user can update these numbers in the wizard that appears after the next logon.

MFA activation from a user's perspective

After enforcing MFA for John, a new window will appear after his next successful login, telling him that his organization needs more information to protect his account, as shown in Figure 3.6:

Figure 3.6 – New message at the first login after enforcing MFA

Figure 3.6 – New message at the first login after enforcing MFA

John now only has two options: Use a different account to log in or click Next to proceed through the MFA activation process. With that being said, you should inform your users before activating MFA to let them know what's going to happen and to reduce the number of support tickets required!

Let's look at what happens if John decides to complete the process:

  1. John decides to proceed, so he clicks the Next button.
  2. On the following screen, John is asked to download the Microsoft Authenticator app to his smartphone. Once finished, he clicks Next.
Figure 3.7 – Downloading the Microsoft Authenticator app

Figure 3.7 – Downloading the Microsoft Authenticator app

  1. The next screen gives John a short intro into what's coming, and he presses Next again.
Figure 3.8 – Keep your account secure

Figure 3.8 – Keep your account secure

  1. John is asked to use his authenticator app to scan the QR code. This will set up his account in the Microsoft Authenticator app on his phone.
Figure 3.9 – Scanning the QR code to set up the account in the Microsoft Authenticator app

Figure 3.9 – Scanning the QR code to set up the account in the Microsoft Authenticator app

  1. After the account has been set up in the app, clicking on the Next button will trigger an MFA challenge in the app. John approves the login attempt and the account has been set up successfully.
Figure 3.10 – Notification has successfully been approved

Figure 3.10 – Notification has successfully been approved

Now that you know how to configure MFA from an administrator's and a user's perspective, let's move one step further and take a look at security defaults in Azure AD.

Introducing security defaults

Security defaults are a rather new capability that will enforce basic identity security mechanisms across an Azure AD. These capabilities will ensure that user and administrator accounts are better protected from common identity-related attacks, such as brute force, or password spray.

Security defaults are enabled by default on new Azure AD enrollments but might need to be manually enabled on existing ones. To manage security defaults, navigate to Azure Active Directory and click the Properties option in the left navigation pane. Then, click the Manage Security defaults link and switch the Enable Security defaults setting to Yes, as shown in Figure 3.11:

Figure 3.11 – Enable Security defaults

Figure 3.11 – Enable Security defaults

Security defaults will require all users and administrators to use MFA and block legacy authentication protocols. Once security defaults have been enabled, users will be asked to proceed through the MFA procedure you already know from the previous section. However, the first screen that users are presented with will look slightly different, as shown in Figure 3.12:

Figure 3.12 – Security defaults have been enabled

Figure 3.12 – Security defaults have been enabled

Besides the Use a different account option, or to proceed by clicking Next, there is a third option that will let users skip the MFA configuration for now. However, 14 days after the first sign-in event, every user is required to configure MFA, so this option will no longer be available as of then. The rest of the configuration is the same as you learned about in the MFA activation from a user's perspective section.

Security defaults are a great and easy way to protect all accounts with the same setting across your Azure AD directory. Now that you know how to enable MFA, and how to configure the settings from a user's perspective, let's move one step further and learn how Conditional Access can be used to fine-tune the MFA process according to your company's business needs.

Using Conditional Access

MFA, the feature we discussed in the previous section, is the perfect option for better protecting your cloud identities. But it is still kind of an on/off decision. Either you activate a user account for MFA, or you don't. Wouldn't it be great to dynamically react to authentication attempts and then decide whether an MFA challenge is needed? With Conditional Access, there is a feature that enables us to define authentication conditions that require more or fewer challenges in the authentication process.

Conditional Access gives customers a broad variety of options to include or exclude in a policy. For example, you could enforce the usage of MFA for specified directory roles, such as Azure AD Global Administrators, and in addition to that, require that the login is performed on a corporate-owned device, or you could exclude your normal Office 365 workers from being challenged by MFA, but only if they are working from a corporate office. As soon as one of them tries to log in from a train station, mobile device, home office, and so on, an MFA challenge is triggered. You see, there are lots of options, and we'll cover them in this section. The following screenshot is a reference of Conditional Access in Azure Active Directory:

Figure 3.13 – Conditional Access in Azure AD's security blade

Figure 3.13 – Conditional Access in Azure AD's security blade

You can find all Conditional Access-related settings in the Azure portal under Azure Active Directory | Security | Conditional Access.

Figure 3.14 – Conditional Access overview page

Figure 3.14 – Conditional Access overview page

The main section that appears now is the Policies section. Conditional Access policies define and enforce the complexity of authentication based on several conditions. Policies can depend on locations from which authentications come, user and sign-in risk, devices, applications, or a combination of all of these. You can use Conditional Access policies to decide when and for whom access to your cloud environment will be allowed or blocked. So, by using Conditional Access policies, you can always make sure to apply the right amount of security enforcements when they are needed to keep your environment secure, and not to challenge your users unnecessarily when not needed.

Before we take a deeper look at how to define all those conditions in a Conditional Access policy, let's first have a look at named locations that can be used within these policies.

Named locations

There is a management area for defining custom settings that you can use in your Conditional Access policies. The first area to mention is Named locations. For named locations, there are three different options to click (as shown in Figure 3.15).

The first option is + Countries location, an option to create a location filter based on IP addresses or GPS coordinates that are mapped to a particular country.

The second option is + IP ranges location, with which you can define IP ranges to use in custom Conditional Access policies. If you select Mark as trusted location for an IP range, a user's sign-in risk is lowered when an authentication request comes from there. Sign-in risks are important for Azure AD Identity Protection, the feature we will look into in the Introducing Azure AD Identity Protection section.

Figure 3.15 – Conditional Access – Named locations

Figure 3.15 – Conditional Access – Named locations

The third option for named locations is Configure MFA trusted IPs, which will redirect you to the Services settings in the legacy portal you already know from the previous section. You can use this option to define IP address ranges that should always be excluded from MFA challenges.

Custom controls

With custom controls, you can redirect your users during the authentication process to an external compatible service to satisfy further authentication requirements outside of Azure AD. During the authentication process, the user's browser window is redirected to a third-party service, where the user needs to perform further authentication requirements before being granted access to their cloud resources. Custom controls depend on the third-party application. For example, you could integrate a third-party MFA provider into your authentication workflow instead of relying on the Azure AD MFA service.

Terms of use

You can define custom terms of use that need to be accepted before users are allowed to access certain cloud applications. For example, you could allow users to use their own devices to access your environment, but only if they accept your terms of use.

Figure 3.16 – Terms of use

Figure 3.16 – Terms of use

Conditional Access policies

As mentioned before, Conditional Access policies help you to always apply the right amount of security for every authentication situation, without unnecessarily blocking or challenging your users when not needed. Conditional Access policies consist of assignments and access controls. Assignments define who will be impacted by this Conditional Access policy and in which situation. Access controls define whether access is blocked or granted, and if it's granted, on which conditions.

Assignments

In the Assignments section, you can select users and groups, cloud apps or user actions, and conditions to include or exclude in a Conditional Access policy, as shown in Figure 3.17:

Figure 3.17 – Users and groups – Selecting which users and groups are to be included or excluded in a Conditional Access policy

Figure 3.17 – Users and groups – Selecting which users and groups are to be included or excluded in a Conditional Access policy

You can choose Include or Exclude | None | All users, or a defined subset of users and groups in a Conditional Access policy. You can also select to exclude all guest and external users, directory roles (such as Global Administrators), or a defined subset of users and groups in your Conditional Access policy.

Important Note

When selecting all users and then blocking access with this policy, this will also affect all your administrator accounts. That said, you could lock yourself out when activating this policy. It is recommended to apply a policy to a small set of users first to make sure it behaves as expected!

You can also include or exclude cloud applications or user actions in the Conditional Access policy. Again, you can select None or All apps, or selected apps to be included, or define selected apps to be exempted from the policy.

Important Note

When selecting all cloud apps to be included in your policy, this will also affect the Azure portal. Make sure not to lock yourself out by only activating the policy on a small set of users first so you can ensure that it behaves as expected!

In the User actions section, you can select whether this policy affects the registration of security information or device registration/join for your users. This means that the policy is active for users when proceeding through the MFA registration process or when registering or joining a device to your Azure AD.

Figure 3.18 – Configuring cloud apps to be included/excluded and user actions in the policy

Figure 3.18 – Configuring cloud apps to be included/excluded and user actions in the policy

Conditions to be included in your assignments are sign-in risk, device platforms, locations, client apps, and device state. Sign-in risk is calculated by Azure AD Identity Protection. You can select the sign-in risk level this policy will apply to from No risk/Low/Medium/High. Device platforms can be included or excluded. You can select to include any device platform in your policy, or to include or exclude one or several of the following:

  • Android
  • iOS
  • Windows Phone
  • Windows
  • macOS

You can include any location or select to include or exclude all trusted locations, or selected locations you have already defined in one of the preceding steps.

Client apps to include can either be a browser or mobile apps and desktop clients, including modern authentication clients, Exchange ActiveSync clients, or other clients (older office clients or other mail protocols).

You can either include all device states in a policy or exclude devices that are hybrid Azure AD joined or marked as compliant in Intune.

Access controls

In the Access controls section, you define whether you want to block or grant access to your environment depending on the selection you made before. If you want to grant access, you can either grant it without any condition or you can require one or all of the following controls to be enforced:

  • Require multi-factor authentication: When the conditions you defined in the policy are met, user access is granted when the user responds to the MFA challenge.
  • Require device to be marked as compliant: In Intune, you can define device compliance policies. For example, you can mark a device as compliant only when it is corporate-owned and currently patched.
  • Require Hybrid Azure AD joined device: Devices that are hybrid Azure AD joined are owned by an organization. They exist in the cloud and on-premises, which means that they are joined to both Windows Server AD and Azure AD.
  • Require approved client app: Access is only granted if one of the approved client apps is used to access corporate information. Today, an approved client app can be one out of more than 25 apps related to Microsoft 365, including, but not limited to, Microsoft Azure Information Protection, Microsoft Excel, Microsoft Edge, Microsoft Intune Managed Browser, Microsoft Teams, and Microsoft Outlook.
  • Require app protection policy: You can use Intune to define an app protection policy for Microsoft Cortana, Microsoft Outlook, Microsoft OneDrive, and Microsoft Planner. With this setting, you can enforce that an app protection policy is present before granting access to corporate information.
  • Require password change: You can require a user to change their password to lower the sign-in risk. This option requires MFA and cannot be used together with other controls. Also, the Conditional Access policy needs to be assigned to All cloud apps, as shown in Figure 3.19:
Figure 3.19 – Granting access based on conditions

Figure 3.19 – Granting access based on conditions

Now that you know how to configure Conditional Access policies in theory, let's go a step further and try to define settings for some behaviors.

For example, you could create a policy that blocks access for all devices that are not hybrid Azure AD joined. However, this policy should not affect users who are members of a particular group of administrators. A policy that would fit your needs could include the following:

  • Include all users and exclude a particular group of administrators.
  • Exclude devices that are hybrid Azure AD joined.
  • Block access.

You might also want to enforce MFA when authentication attempts are not coming from a trusted location or if users are not using corporate-owned devices. This policy would do the following:

  • Include all users.
  • Include all locations and exclude all trusted locations.
  • Exclude devices that are marked as compliant.
  • Grant access and require MFA.

    Important Note

    It is best practice not to include all users without exception in your Conditional Access policies. This is because you would risk locking yourself out of your cloud environment.

Your organization might enforce your users to proceed through the MFA enrollment from their office. That way, your organization can make sure that even if a user's credentials have been leaked, an attacker would need to be within your network perimeter to configure MFA. A Conditional Access policy to enforce that might be configured like this:

  • Include all users and exclude privileged roles or a particular user group containing administrative accounts.
  • Activate the Register security information user action.
  • Include a selected location that defines your office location.
  • Block access.

With Conditional Access, you can granularly define when and how access to your cloud environment is granted or declined. During the course of this topic, we have already touched on Azure AD Identity Protection. Now, let's move on to the next section, in which you will learn what Azure AD Identity Protection is and how you can use it.

Introducing Azure AD Identity Protection

As already mentioned, an important goal in terms of security is to make attack attempts as expensive as possible for an attacker. That said, it is important to raise the bar and have several complementing technologies in place that add extra value to your security posture. On the other hand, you want to make sure not to block legitimate user authentications, so you do not negatively affect your users' login experience. Microsoft has been protecting cloud identities for more than 10 years now, and with Azure AD Identity Protection, they let you protect identities using their protection systems.

Stealing the credentials of user accounts, even if they are not highly privileged, has always been a good way of gaining access to corporate resources. Over the years, attackers have learned to leverage third-party breaches or highly sophisticated phishing attacks to get hold of corporate credentials. Even if attackers gain access to low-privileged user accounts, as soon as they do, it is relatively easy for them to elevate their level of privilege or gain access to important corporate resources through lateral movement.

So, what we need to do is the following:

  • Protect all identities at all levels of privilege
  • Prevent compromised identities from accessing corporate resources

Now, the second step is the more difficult one because you first need to find out whether an identity is compromised. This is when Azure AD Identity Protection comes into play.

Azure AD Identity Protection at a glance

Adaptive machine learning algorithms and heuristics are what Azure AD utilizes when determining anomalies and suspicious behavior during the authentication of user accounts. With this data, Azure AD Identity Protection can generate reports and alerts that enable customers to evaluate recent logons. Furthermore, Azure AD Identity Protection can calculate user and sign-in risk levels that can be used in risk-based Conditional Access policies. For example, you can decide to enforce the usage of MFA when a login attempt's risk level is calculated as medium or above, or to block a sign-in attempt based on the risk calculation.

In Figure 3.20, you see that a sign-in was blocked because the account was used within a suspicious sign-in event. Before John can sign in again, he needs to contact an admin to get his account unlocked.

Figure 3.20 – John's sign-in was blocked by Azure AD Identity Protection

Figure 3.20 – John's sign-in was blocked by Azure AD Identity Protection

Azure AD uses several types of risk detection in real time (shown in the reporting after 5–10 minutes) and offline (2–4 hours). As soon as there has been a risk detection related to an account sign-in, this detection is added to a logical concept called risky sign-ins. A risky sign-in indicates a sign-in attempt that might have been performed by an attacker and not the legitimate account owner. Based on those detections, the probability that the sign-in has been performed by a bad actor is calculated and is reflected in the sign-in risk level. You can use the sign-in risk level (Low, Medium, High) to define a sign-in risk policy. The sign-in risk policy is an automated response depending on the specified sign-in risk level that is used to either block access to your resources or to require a user to pass an MFA challenge before being granted access to your corporate environment.

Besides the sign-in risk, Azure AD also detects the probability that a user account has been compromised. This behavior is called user risk detection. All risk detections that have been detected for a user and that have not been resolved are known as active risk detections. All active risk detections that are associated with a user define the risk to the user. Based on the risk to the user, Azure AD calculates the probability (Low, Medium, High) that the user account has been compromised. This probability is known as the user risk level. For example, if a risky sign-in is detected and the MFA challenge is passed, there is no active risk detection for this user. Thus, in this case, the user risk level will stay low. You can define a user risk policy as an automated response for a specific user risk level. With this policy, you can either block access to corporate resources or enforce a password change to get the user account back to a clean state.

Risk detection

In Azure AD, there are a bunch of different types of risk detection, six of which we want to highlight:

  • Users with leaked credentials: Leaked credentials occur due to mass credential theft by cybercriminals followed by public posting of these credentials, particularly on the dark web. Microsoft actively monitors such channels and compares the leaked username and password pairings against existing users and identifies accounts that have leaked credentials.
  • Sign-ins from anonymous IP addresses: Anonymous IP addresses are used by people who want to mask their device's real IP address. There can be a number of reasons that lead to the use of such IP addresses, some of them malicious. Microsoft checks incoming sign-ins from IP addresses that have previously been identified as anonymous IP addresses.
  • Impossible travel to atypical locations: These are sign-ins from geographically distant locations. At least one location needs to be an atypical location based on the user's sign-in behavior. For example, the user is on their first business trip to the US and logs in from there. In addition to that, the underlying machine learning algorithm considers the time between the sign-ins and the time it would have taken the user to travel from one location to the other. Microsoft tries to ignore obvious false positives, such as virtual private networks (VPNs) between locations, or locations that have been known as familiar for other user accounts within the same organization. This risk detection type needs 14 days of analyzing user behavior before being able to calculate the risk for a user account.
  • Sign-ins from infected devices: This method of risk detection depends on Microsoft keeping track of IP addresses that are known to communicate with bot servers. Microsoft matches all IP addresses connecting to the service against these known rogue IPs to determine whether there are sign-ins from infected devices. This type of risk detection also targets simple attack methods such as password spray attacks.
  • Sign-ins from IP addresses with suspicious activity: In this method of detection, Microsoft examines IPs for signs of suspicious activity. The main indicator is when an IP address has a large number of failed sign-ins in a relatively short period of time. This can be an indication of a bad actor who is trying to guess passwords using simple attack methods such as brute-force or password spray attacks.
  • Sign-ins from unfamiliar locations: This method of risk detection involves Microsoft maintaining a historical record of the IP addresses used by users regularly. The system detects whether a request is coming from an IP address that has not been used before. The system needs at least 30 days to create a useable history of familiar and unfamiliar locations.

    Note

    Microsoft is regularly updating existing and adding new risk types and detections. Please refer to https://aka.ms/AADIPRiskTypes for the current list.

Creating a sign-in risk or user risk policy

Policy creation is the easiest part of Azure AD Conditional Access. To create a sign-in risk policy, you just need to navigate to Azure Active Directory | Security | Identity Protection | Sign-in risk policy in the Azure portal. There, you define conditions (Sign-in risk level – Low and above, Medium and above, or High), access controls (block access or challenge the user with MFA), and select for which user or group you want to enable the policy. That's it.

Figure 3.21 – Creating a sign-in risk policy

Figure 3.21 – Creating a sign-in risk policy

For a new user risk policy, you navigate to Azure Active Directory | Security | Identity Protection | User risk policy and define the respective parameters. The difference from a sign-in risk policy is that you can either block access or enforce a password change for a risky user.

Figure 3.22 – Creating a user risk policy

Figure 3.22 – Creating a user risk policy

Now you know how Azure AD Identity Protection works and how you can use calculated user and sign-in risk levels to protect your accounts. Now, we will move forward and focus on privileged user accounts.

Understanding role-based access control

In Chapter 2, Governance and Security, we mentioned security principles such as segregation of duties and the principle of least privilege. With role-based access control (RBAC), we have the technical feature to implement these principles in Azure AD. RBAC is the way to manage access to all Azure resources, but also to Azure AD and Office 365.

As already discussed earlier, Azure offers several levels of scope that can be used to grant access rights to accounts. Furthermore, there are several built-in roles, such as Owner, Security Admin, or Reader. To create a role assignment, you need to bring together three different entities:

  • A security principal, which can be either one of users, groups, or service principals.
  • A role, which describes a set of management rights. For example, the contributor role contains all actions, except authorization-related rights. So, a contributor may manage all aspects within a given scope without being able to grant access to resources.
  • A scope to set the access rights, starting from the management group level down to single resources.

The following diagram shows a schematic view of a role assignment and the entities it needs:

Figure 3.23 – RBAC role assignment in Microsoft Azure

Figure 3.23 – RBAC role assignment in Microsoft Azure

Important Note

You need to be granted Microsoft.Authorization/ roleAssignments/write and Microsoft.Authorization/ roleAssignments/delete rights in order to be able to create or delete role assignments. These rights are, by default, granted to the RBAC roles User Access Administrator and Owner.

You can edit role assignments at all management scopes of Azure. It is important to know that role assignments are inherited top to bottom. This means that if you configure a role assignment at a resource group level, the access rights are also valid on all resources within this particular resource group; and if you configure a role assignment at a management group level, it is inherited by all subscriptions, resource groups, and resources within that scope.

In the Azure portal, there is the Access Control (IAM) blade (Figure 3.24) that is used to manage all aspects of RBAC. You can check access for particular accounts, find out explicit and inherited roles and deny assignments, and find out which built-in or custom roles exist for the given scope.

Figure 3.24 – RBAC management blade in the Azure portal

Figure 3.24 – RBAC management blade in the Azure portal

To create a new role assignment, you need to click + Add and then select Add role assignment (Preview):

Figure 3.25 – Creating a role assignment

Figure 3.25 – Creating a role assignment

You then select the role and security principal you want to grant access to and then save your selection. And we are done!

RBAC is straightforward to implement but can be way more challenging when planning for access rights in your environment. This is why you should already plan for RBAC roles when defining your governance concept.

Important Note

Define the RBAC roles you need in your environment when creating your governance concept. By doing so, you will have a good overview of which access rights (roles) you need and who (which security principal) you need to grant access to. That said, it will be much easier to create your role assignments later.

In the following section, we will show you how to create custom RBAC roles so you can use roles more granularly according to your needs.

Creating custom RBAC roles

Custom RBAC roles are used whenever built-in roles do not entirely fit your company's needs regarding access rights to your cloud environments. As mentioned before, a role is basically a set of management rights that are then applied to users or groups in a role assignment. There is a difference between custom Azure AD RBAC roles and custom RBAC roles for Azure resources. If you want to create a custom Azure AD RBAC role, you need to perform the following steps:

  1. Navigate to Azure Active Directory | Roles and administrators and then click the + New custom role button in the Azure portal, as shown in Figure 3.26:
Figure 3.26 – Creating a new custom Azure AD RBAC role

Figure 3.26 – Creating a new custom Azure AD RBAC role

  1. Enter a name and, optionally, a description for your custom role. You can decide either to Start from scratch or to Clone from a custom role to continue with your custom role creation. In the following example, we choose the Start from scratch option:
Figure 3.27 – Defining basic information

Figure 3.27 – Defining basic information

  1. On the Permissions tab, you select all permissions that you later want to grant to your identity.
  2. On the Review + create tab, you can finally confirm your settings, and by clicking the Create button, your custom Azure AD RBAC role is created, as illustrated in Figure 3.28:
Figure 3.28 – Reviewing and creating a custom Azure AD RBAC role

Figure 3.28 – Reviewing and creating a custom Azure AD RBAC role

Similar to the creation of custom Azure AD RBAC roles, you can also create custom RBAC roles for Azure resources in the Azure portal. You can create these roles either on a management group or a subscription, using the highest scope as a best practice. The process itself is similar to creating a custom role for Azure AD, explained previously. To start the process, either navigate to the management group or subscription you want to create the role in and select Access control (IAM) in the left navigation pane. In the Create a custom role tile, click Add to start the creation process. You can then follow the tabs as explained in the preceding steps.

Besides using the portal, you can also use PowerShell, the Azure command-line interface (CLI), or the Azure representational state transfer (REST) API. In this example, we will create a custom RBAC role with PowerShell.

To create a custom RBAC role, you need to define which resource operations per resource provider have to be allowed to meet your goals. Therefore, you should initially find out which resource provider operations exist. You can do so by using the Get-AzProviderOperation cmdlet, as shown in the following code block:

Get-AzProviderOperation <operation> | FT OperationName, Operation, Description -autosize

For example, in order to obtain a list of all provider operations for virtual machines (VMs), the command would be as follows:

Get-AzProviderOperation Microsoft.Compute/virtualMachines/* | FT OperationName, Operation, Description -autosize

The result of this command is shown in Figure 3.29:

Figure 3.29 – Resource provider operations for Azure VMs

Figure 3.29 – Resource provider operations for Azure VMs

The resource provider operations that are listed in Figure 3.29 are all actions related to VMs to which you can grant access to users, groups, or service principals. If you want to know which resource provider operations are tied to a specific RBAC role, you can find this out with the following command:

(Get-AzRoleDefinition <role name>).actions

For example, if you want to know which actions are allowed for the VM Contributor RBAC role, the command would be as follows:

(Get-AzRoleDefinition "Virtual Machine Contributor").actions

The result of this command is shown in Figure 3.30:

Figure 3.30 – Virtual Machine Contributor provider operations

Figure 3.30 – Virtual Machine Contributor provider operations

When you know which resource provider operations exist, you can start creating your custom RBAC role. Again, you can start by creating a new role from scratch or by using an existing role as a template to alter according to your needs.

Now that you have learned what RBAC is and how you can leverage it, we will give you an introduction to Azure AD Privileged Identity Management (Azure AD PIM), another service focused on protecting privileged user accounts. Let's move on!

Protecting admin accounts with Azure AD PIM

In Chapter 2, Governance and Security, we discussed the fact that we often see customer environments in which administrators have a huge set of privileges they do not necessarily need. We also discussed Separation of Duties (SoD) and the fact that no one should have more privileges than are required for doing a particular job. Now, what if you could even reduce that set of access rights to a particular point in time or time range? Or what if you need an approval process for granting privileged access? Maybe you want to monitor the usage of privileged roles or want to decide whether a person still needs privileged access rights?

Azure AD PIM is a service that offers several features that help you further protect privileged accounts, some of which are the following:

  • Just-in-time and time-bound privileged access
  • Approval to activate privileged roles
  • Access reviews to ensure that roles are still needed
  • Enforcing MFA for role activation

With Azure AD PIM, you can—but do not need to—infinitely grant access rights to privileged users; you make them eligible for requesting access rights. So, users are only granted access rights when they really need them. Access can be either approved automatically after a user requests access or by manual approval. The nice thing is, you can cover both Azure AD and Azure resource roles with Azure AD PIM.

Tip

Make sure you have enforced the principle of least privilege in your organization before starting with PIM.

Managing Azure AD roles in PIM

To start with PIM, sign in to the Azure portal as a Global administrator of your directory and then navigate to Azure AD Privileged Identity Management. In the Manage section of the PIM dashboard, you can select whether you want to manage privileged identity management for Azure AD roles, Azure resources, or Privileged access groups, as shown in Figure 3.31:

Figure 3.31 – Selecting the scope for managing PIM

Figure 3.31 – Selecting the scope for managing PIM

In the Azure AD roles view, you can manage PIM behavior for all Azure AD roles and also have access to Azure AD role-related tasks, such as access reviews, approvals, or your own roles and access requests, as shown in Figure 3.32:

Figure 3.32 – Azure AD role management in PIM

Figure 3.32 – Azure AD role management in PIM

The Manage section offers all the Azure AD PIM configuration options for your Azure AD directory. Roles gives you an overview of all Azure AD roles and enables you to add members to a particular role. In the Assignments section, you get an overview of all accounts that are either eligible or permanent members of privileged roles. It is an at-a- glance view of all users who have elevated rights in your directory. The Alerts section shows you issues to review. For example, you will get an overview of administrators who are not using their privileged roles (and therefore can be unassigned). You can also create regular Access reviews triggers to determine whether particular accounts still need to be role members. In the respective section, you find a configuration wizard to create these recurring reviews. The wizard in the respective section leads you through a process to convert users with existing permanent role assignments into eligible users. Finally, in Settings, you can configure global settings for Azure AD roles, alerts, and access reviews.

Tip

You can require approval for a role activation. This requirement is a setting that comes with the role, not with the user account. That said, when you configure this requirement, it is valid for all users who are eligible to request access for this particular role.

Once an account is made eligible, its owner needs to request access before conducting a task. Let's walk through an example: John works in the helpdesk team and this team is responsible for managing user accounts. Therefore, we want to make John's account eligible for the User Administrator role. When John signs in to the Azure portal and wants to manage user settings in Azure AD, he will only be able to see what standard user accounts can see; he won't be able to manage any accounts. So, John navigates to the Azure AD PIM dashboard and sees that he needs to activate his role first.

Figure 3.33 – Eligible roles for a user with the option to activate a role

Figure 3.33 – Eligible roles for a user with the option to activate a role

John can activate the role for the time that you configured before in the Settings pane for this particular role (all as the default for all roles). In the following example, the maximum activation duration is 8 hours. In addition to that, John needs to enter a justification that can later be reviewed in the audit history.

Figure 3.34 – Activating a role

Figure 3.34 – Activating a role

As shown in Figure 3.34, John can also set a custom activation start time. For example, when John knows that he will need access later that day, he could manually set an activation time in the future. By clicking on Activate, an activation request is submitted and validated once the activation is done. Then, after signing out and logging back in, John will have role membership in User Administrators for 8 hours.

Figure 3.35 – Role activation in progress

Figure 3.35 – Role activation in progress

So, the process for the user is straightforward. Request access; log out and back in again; and then do the job. Of course, every activation request is logged, as well as every configuration change a user does when having elevated rights. As already mentioned, monitoring is essential, and there's no way around it.

Managing Azure resources with PIM

You can not only use PIM for managing Azure AD roles but also for Azure resource management based on RBAC. You first need to onboard Azure subscriptions to PIM so that you can use it to manage resource-based access rights. To do so, you navigate to Azure resources on the Azure AD PIM dashboard and select Discover resources. You then filter for unmanaged resources and select Manage resource, as illustrated in Figure 3.36:

Figure 3.36 – Onboarding an Azure subscription to PIM

Figure 3.36 – Onboarding an Azure subscription to PIM

You can also select a management group to onboard to PIM. PIM will automatically manage role assignments for all child resources within the given scope after onboarding. The configuration options are similar to the ones for Azure AD management with PIM. One difference is that you need to enter a start and an end date for the role assignment. After the end date, the user will no longer be eligible for requesting access. The maximum is a time frame of 1 year.

Let's take an example. In his role as project owner for the Mastering Azure Security project, John needs to manage all resources within a particular resource group that has been created for this project. However, he should not be able to give other users or groups access to that resource group, so access to the Contributor role should be the right one for him.

Figure 3.37 – John is a member of the Contributor role via PIM

Figure 3.37 – John is a member of the Contributor role via PIM

If John logs in to the Azure portal, he won't be able to see any resources or resource groups because he has no permanent access rights to Azure resources. Again, he navigates to the Azure AD PIM dashboard, selects Azure resources, and then activates his role. After logging out and signing in again, John is able to manage his resources in the MasteringAzSec resource group.

Tip

PIM always activates roles for 1 or several hours, even if access is only needed for 10 minutes. Therefore, users can find an option to deactivate roles after they have finished their tasks by navigating to My roles and then Active roles in both the Azure AD roles and the Azure resources sections.

You have now learned how to further reduce your privileged accounts' attack surfaces by using Azure AD PIM.

Hybrid authentication and Single Sign-On

Organizations have come a long way from an on-premises IT infrastructure since they started to roll out cloud-based Software as a Service (SaaS) applications such as Microsoft Office 365. Users usually do not want to keep track of several accounts and, as they already have a corporate account based on Windows Server AD, they usually also want to use that account for cloud-based authentications. Now, this is when Azure AD Connect comes into play.

Azure AD Connect is a directory replication service that helps you to synchronize existing user accounts from an on-premises Windows Server AD with Azure AD. This is a mandatory step because you can only grant access rights and licenses to cloud-based identities in Azure AD, not to on-premises accounts.

With Azure AD Connect, you have several options to provide a single sign-on experience to your users. In the following diagram, you can see a decision tree that helps you to decide which of them is the best for your organization:

Figure 3.38 – Azure AD Connect authentication decision tree

Figure 3.38 – Azure AD Connect authentication decision tree

Password Hash Sync + Seamless SSO is the easiest way to go. With this, your on-premises password hashes are replicated to the corresponding cloud identities, so users can use the same usernames and passwords across all login environments. Seamless SSO eliminates unnecessary login prompts when users are signed in.

If you have stronger requirements, such as user-level AD security policies that should be enforced during sign-in, you can go with Pass-through Auth + Seamless SSO. In this scenario, you install a software agent on one or more on-premises servers. These servers can validate your user credentials directly against your on-premises domain controllers by building up a secure tunnel through which cloud-based logons can be validated.

Federation with Active Directory Federation Services (AD FS) or another federation service is the most complex authentication method. It should be used in scenarios where sign-in features are not natively supported by Azure AD. These features include the following:

  • Sign-in using smartcards or certificates
  • Sign-in using an on-premises MFA server
  • Sign-in using a third-party authentication solution
  • Multi-site on-premises authentication solutions

    Tip

    We recommend always enabling password hash synchronization in Azure AD Connect. Doing so, you have a fallback scenario in case your on-premises authentication platform is not working properly, and you can use Azure AD Identity Protection to get leaked credential reports. Furthermore, you can enable self-service password reset (SSPR) when password hash synchronization is enabled.

With SSPR, you can effectively reduce both users' non-effective time and support efforts for your helpdesk team. SSPR provides users with an effective means to unblock their corporate accounts if they forget their passwords. In order to use SSPR, users must provide a secondary authentication method. When they lose access to their corporate password, users need to verify their previously registered alternate authentication method to prove their identity. After that, the user can enter a new password. If it is a hybrid user account, meaning an account that is replicated by Azure AD Connect, the new password is written back to the on-premises Active Directory. The feature you need to enable in Azure AD Connect in this case is called password writeback.

You can enable self-service password reset for your Azure AD tenant by navigating to Azure Active Directory | Password reset and then, in the Properties tab, selecting the Self service password reset enabled setting according to your needs, as shown in Figure 3.39:

Figure 3.39 – Enabling SSPR for your Azure Active Directory tenant

Figure 3.39 – Enabling SSPR for your Azure Active Directory tenant

After enabling SSPR, all eligible accounts will be able to set up security info that will be used in case they want to reset their passwords. This page can be found at https://mysignins.microsoft.com/security-info. An example is shown in Figure 3.40:

Figure 3.40 – Configuring security info to reset passwords

Figure 3.40 – Configuring security info to reset passwords

Integrating on-premises identities into Azure AD is a great way to enhance the sign-in experience across your hybrid organization, and you just learned about the considerations to bear in mind before starting your hybrid journey. In the Exploring passwords and passphrases section, you learned that passwords are not good enough to protect your accounts. So, let's move on now to passwordless sign-ins in Azure AD.

Understanding passwordless authentication

In a world in which passwords are not enough to protect identities, we need another, more secure, approach to further protect identities. Passwords can be guessed or phished without physically having access to a user's device or storage. With passwordless authentication, Azure AD offers two different methods to sign in to a cloud-based user account without needing passwords anymore.

You can use the Microsoft Authenticator app, the app you already know from the Understanding multi-factor authentication section. With this method, you are prompted to approve your sign-in by tapping or entering a number in the Authenticator app, as shown in Figure 3.41:

Figure 3.41 – Phone-based passwordless authentication

Figure 3.41 – Phone-based passwordless authentication

All the user has to do is register the app as an MFA option and then, in the smartphone app, choose Enable phone sign-in from the drop-down menu. After following the instructions in the app, the user can sign in to the app without entering a password.

The second option is to use a FIDO2 security key to sign in against Azure AD. FIDO2-based passwordless authentication is currently only supported on Windows 10/11 and in the Microsoft Edge browser.

The following image shows some FIDO2 security keys for reference:

Figure 3.42 – A variety of USB-A and USB-C FIDO2 security keys from different vendors

Figure 3.42 – A variety of USB-A and USB-C FIDO2 security keys from different vendors

Using this method, the user needs to have physical access to the security key that is needed during the authentication process.

Global settings

In order to allow users to leverage FIDO2 security keys, a Global administrator needs to enable this authentication method in Azure AD. To enable authentication methods, navigate to Azure Active Directory | Security | Authentication methods and enable the FIDO2 Security Key setting, as shown in Figure 3.43:

Figure 3.43 – Enabling FIDO2 Security Key authentication in Azure AD

Figure 3.43 – Enabling FIDO2 Security Key authentication in Azure AD

After this, users can select Security Key as the authentication method in https://mysignins.microsoft.com, as shown in Figure 3.44:

Figure 3.44 – Security key as a new authentication method

Figure 3.44 – Security key as a new authentication method

You have now learned how to enable passwordless authentication for your users. In the next section, you will learn about the licensing of security features in Azure AD.

Licensing considerations

Azure AD licensing can become a bit complex when it comes to security features. This is why we decided to compare different licenses and to explain which license you need for which feature. Azure AD is always licensed on a per-user basis, so you need one license for each user. For all security features that have been discussed in this chapter, you will either need an Azure AD Premium P1 or an Azure AD Premium P2 license. These licenses are also part of Microsoft 365 E3 and E5 license packages.

For the following features, you will need an Azure AD Premium P2 (or Microsoft 365 E5 license):

  • Azure AD PIM
  • Azure AD Identity Protection
  • Risk-based Conditional Access policies

For the following features, an Azure AD Premium P1 (or Microsoft 365 E3) license is sufficient:

  • Conditional Access based on group, location, and device status
  • Self-service password reset

Please be aware that these licensing models might be subject to change, so in order to always be up to date, make sure to check Microsoft's Azure AD pricing documentation at https://azure.microsoft.com/pricing/details/active-directory.

Summary

Identity is the new perimeter, and so it's essential to properly protect user and administrator accounts in the cloud. In this chapter, you have learned why passwords are not enough to protect your accounts and how to protect them with MFA, Azure AD Identity Protection, and passwordless authentication. You can reduce your privileged accounts' attack surface as of now, to integrate Azure AD into your existing environments.

In the next chapter, you will learn how to protect network infrastructure resources on Azure and which platform services you need in order to achieve a better security posture.

Questions

As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:

  1. In the cloud in general, identities are...

A. More exposed to attacks

B. Less exposed to attacks

C. Equally exposed to attacks

  1. We can control password settings with…

A. Azure AD protection

B. Account protection

C. Password protection

  1. The best way to increase account security is to use...

A. More complex passwords

B. More frequent password changes

C. Multi-Factor authentication (MFA)

D. Passwordless sign-in methods

  1. You can control actions that require MFA.

A. Yes

B. No

C. Only for some actions

  1. Which report is not available in risk detection?

A. Users with leaked credentials

B. Impossible travel

C. Infected users

D. Infected devices

  1. With roles in Privileged Identity Management (PIM), the user has...

A. More privileges

B. Fewer privileges

C. To activate privileges

  1. The most secure authentication method is...

A. A password that is easy to remember

B. A complex password

C. MFA

D. Passwordless authentication

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset