{"id":20583,"date":"2025-01-27T05:16:50","date_gmt":"2025-01-27T05:16:50","guid":{"rendered":"https:\/\/www.insentragroup.com\/gb\/insights\/uncategorized\/azure-conditional-access-finding-and-addressing-gaps-in-your-policy\/"},"modified":"2025-01-27T05:21:18","modified_gmt":"2025-01-27T05:21:18","slug":"azure-conditional-access-finding-and-addressing-gaps-in-your-policy","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/gb\/insights\/geek-speak\/secure-workplace\/azure-conditional-access-finding-and-addressing-gaps-in-your-policy\/","title":{"rendered":"Azure Conditional Access: Finding and Addressing Gaps in your Policy"},"content":{"rendered":"\n<p>In this blog, we&#8217;re diving into the intricate world of Microsoft Azure Conditional Access. Imagine Conditional Access as the protective shield guarding every authorisation attempt within your directory. Now, while it offers a plethora of controls, the question arises: How do we ensure we&#8217;ve covered all the bases and left no room for security gaps?&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s explore Conditional Access and discover effective ways to identify and address potential vulnerabilities in your organisation&#8217;s security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conditional Access<\/h2>\n\n\n\n<p>Conditional Access is your go-to armour when it comes to fortifying the access points in your Azure directory. It allows you to scrutinise user attributes, group affiliations, guest statuses, app-specific details, actions being performed, and even factors like user risk and sign-in risk.&nbsp;<\/p>\n\n\n\n<p>The beauty of Conditional Access lies in its ability to craft policies that dictate responses\u2014be it blocking unauthorised attempts or allowing access with specific controls in place, such as Multi-Factor Authentication (MFA) or device health checks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">THE CHALLENGE: GAPS IN PROTECTION<\/h2>\n\n\n\n<p>The challenge arises when we ponder the possibility of missing out on a specific combination of factors. What if you forgot to block certain actions or security threats? This creates a gap in your coverage, leaving a potential vulnerability unnoticed. So, how do we identify these gaps and fortify our security measures?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">COVERAGE IN CONDITIONAL ACCESS<\/h2>\n\n\n\n<p>One way to start is by heading to the Azure portal. Under Conditional Access or the overview section, explore the &#8220;Coverage&#8221; tab. Here, you&#8217;ll find insights into the top access applications lacking Conditional Access coverage. This is a quick way to spot potential gaps in the last seven days and prioritise addressing them.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"909\" height=\"681\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-9.png\" alt=\"\" class=\"wp-image-20584\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-9.png 909w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-9-300x225.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-9-768x575.png 768w\" sizes=\"(max-width: 909px) 100vw, 909px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">GAP ANALYSER WORKBOOK<\/h2>\n\n\n\n<p>For a more detailed analysis, turn your attention to the Identity Gap Analyser Workbook. This powerful tool allows you to delve deeper into the nuances of your Conditional Access strategy. Modify the time range to suit your needs and explore key aspects such as Legacy authentication usage, unprotected applications, compromised user sign-ins and more.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"911\" height=\"393\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-10.png\" alt=\"\" class=\"wp-image-20586\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-10.png 911w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-10-300x129.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-10-768x331.png 768w\" sizes=\"(max-width: 911px) 100vw, 911px\" \/><\/figure>\n\n\n\n<p>The Gap Analyser within the workbook provides a comprehensive view of potential vulnerabilities. Are you unknowingly allowing Legacy authentication? Are there applications lacking protection? Is your user base exposed to compromised sign-ins? These are critical questions, and the Gap Analyer equips you with the answers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">REQUIRED LOGS<\/h2>\n\n\n\n<p>To make the most of the Gap Analysis, ensure you&#8217;re sending sign-in logs to a Log Analytics workspace. This step is crucial for the workbook to fetch the required data. Set up diagnostic settings to include sign-in logs, and you&#8217;ll have a treasure trove of insights at your fingertips.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"910\" height=\"328\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-13.png\" alt=\"\" class=\"wp-image-20588\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-13.png 910w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-13-300x108.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-13-768x277.png 768w\" sizes=\"(max-width: 910px) 100vw, 910px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"909\" height=\"596\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-12.png\" alt=\"\" class=\"wp-image-20590\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-12.png 909w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-12-300x197.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-12-768x504.png 768w\" sizes=\"(max-width: 909px) 100vw, 909px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">POLICY TEMPLATES<\/h2>\n\n\n\n<p>Armed with the knowledge of the gaps in your Conditional Access, it&#8217;s time to take action. Azure now offers Policy Templates, saving you from creating policies from scratch. These templates cover various scenarios, from remote work to securing administrators and addressing emerging threats. Pick a template that aligns with your needs and customise it accordingly.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"910\" height=\"760\" src=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-14.png\" alt=\"\" class=\"wp-image-20592\" srcset=\"https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-14.png 910w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-14-300x251.png 300w, https:\/\/www.insentragroup.com\/gb\/wp-content\/uploads\/sites\/20\/2024\/03\/image-14-768x641.png 768w\" sizes=\"(max-width: 910px) 100vw, 910px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">GRADUAL DEPLOYMENT OF NEW POLICY<\/h2>\n\n\n\n<p>As you embark on implementing a new Conditional Access policy, be sure to adopt a cautious approach. Start by enabling it in &#8220;report only&#8221; mode. This allows you to assess the impact the policy would have without affecting users negatively. Examine the logs, understand the implications, and once confident, proceed with gradual deployment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">STRENGTHEN YOUR CONDITIONAL ACCESS POLICY<\/h2>\n\n\n\n<p>In the ever-evolving landscape of cybersecurity, finding and addressing gaps in your organisation&#8217;s Conditional Access is paramount. Microsoft Azure provides powerful tools to not only identify vulnerabilities but also to fortify your defences effectively. Whether it&#8217;s through quick coverage checks or in-depth gap analysis, the key is to stay vigilant and ensure your security measures evolve with the dynamic threat landscape.&nbsp;&nbsp;<\/p>\n\n\n\n<p>If you need assistance in strengthening your security architecture, Insentra is here to help. Check out our <a href=\"https:\/\/www.insentragroup.com\/gb\/services\/professional-services\/secure-workplace\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/www.insentragroup.com\/nz\/services\/professional-services\/secure-workplace\/\" rel=\"noreferrer noopener\">Secure Workplace services<\/a> or <a href=\"https:\/\/www.insentragroup.com\/gb\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact us<\/a> today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">&nbsp;<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Discover how to identify and fix gaps in your Azure Conditional Access policies to enhance security and protect your workplace. Read more in our blog now!<\/p>\n","protected":false},"author":177,"featured_media":20594,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-20583","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/20583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/comments?post=20583"}],"version-history":[{"count":7,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/20583\/revisions"}],"predecessor-version":[{"id":22740,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/posts\/20583\/revisions\/22740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media\/20594"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/media?parent=20583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/categories?post=20583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/gb\/wp-json\/wp\/v2\/tags?post=20583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}