RECOMMENDED CONDITIONAL ACCESS POLICIES IN MICROSOFT ENTRA ID
Conditional access policies in Microsoft Entra ID allow for very granular security management. The problem is that organizations usually do not have conditional access policies properly defined. There tend to be blind spots, policies donโt cover all applications, all users, and all scenarios.
Many organizations have conditional access policies defined but do not think about them properly. This is because they often target only specific applications or specific users. And when I ask them why the MFA policy only targets Office 365 for example, they tell me they donโt use anything else. Or when I ask why they only target one group of users, they tell me that other users donโt use cloud services.
But thatโs just the wrong approach. You are not primarily protecting the services from your users, but from attackers. And just because you donโt use anything other than Office 365 doesnโt mean an attacker will not use it. Or just because some users donโt use cloud services doesnโt mean those accounts canโt be exploited by an attacker. If those apps or accounts exist in the cloud, they need to be protected whether regular users use them or not. Attackers are looking for the most insecure places, the weakest links.
๐บ Watch my YouTube video bellow where I talk about the conditional access policies that I recommend implementing ๐ ๐
https://youtu.be/LtIgFBDJzXs
#cswrld #videotutorial #entraid #conditionalaccess #recommendation