Skip to content

Commit 51f5ca3

Browse files
Merge pull request #11720 from shlipsey3/zt-checks-030426
zt-checks-030436
2 parents 25e95d5 + 7d9473c commit 51f5ca3

File tree

7 files changed

+97
-4
lines changed

7 files changed

+97
-4
lines changed

docs/fundamentals/configure-security.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,9 @@ Reduce credential-related risk by implementing modern identity standards.
6161
| [Use cloud authentication](zero-trust-protect-identities.md#use-cloud-authentication) | Microsoft Entra ID P1 |
6262
| [All users are required to register for MFA](zero-trust-protect-identities.md#all-users-are-required-to-register-for-mfa) | Microsoft Entra ID P2 |
6363
| [Users have strong authentication methods configured](zero-trust-protect-identities.md#users-have-strong-authentication-methods-configured) | Microsoft Entra ID P1 |
64+
| [Reduce the user-visible password surface area](zero-trust-protect-identities.md#reduce-the-user-visible-password-surface-area) | Microsoft Entra ID P1 |
6465
| [User sign-in activity uses token protection](zero-trust-protect-identities.md#user-sign-in-activity-uses-token-protection) | Microsoft Entra ID P1 |
66+
| [Token protection policies are configured](zero-trust-protect-identities.md#token-protection-policies-are-configured) | Microsoft Entra ID P1 |
6567
| [All user sign-in activity uses phishing-resistant authentication methods](zero-trust-protect-identities.md#all-user-sign-in-activity-uses-phishing-resistant-authentication-methods) | Microsoft Entra ID P1 |
6668
| [All sign-in activity comes from managed devices](zero-trust-protect-identities.md#all-sign-in-activity-comes-from-managed-devices) | Microsoft Entra ID P1 |
6769
| [Security key authentication method enabled](zero-trust-protect-identities.md#security-key-authentication-method-enabled) | None (included with Microsoft Entra ID) |
@@ -75,6 +77,7 @@ Reduce credential-related risk by implementing modern identity standards.
7577
| [Require multifactor authentication for device join and device registration using user action](zero-trust-protect-identities.md#require-multifactor-authentication-for-device-join-and-device-registration-using-user-action) | Microsoft Entra ID P1 |
7678
| [Local Admin Password Solution is deployed](zero-trust-protect-identities.md#local-admin-password-solution-is-deployed) | Microsoft Entra ID P1 |
7779
| [Entra Connect Sync is configured with Service Principal Credentials](zero-trust-protect-identities.md#entra-connect-sync-is-configured-with-service-principal-credentials) | None (included with Microsoft Entra ID) |
80+
| [Directory sync account is locked down to specific named location](zero-trust-protect-identities.md#directory-sync-account-is-locked-down-to-specific-named-location) | Microsoft Entra ID P1 |
7881
| [No usage of ADAL in the tenant](zero-trust-protect-identities.md#no-usage-of-adal-in-the-tenant) | None (included with Microsoft Entra ID) |
7982
| [Block legacy Azure AD PowerShell module](zero-trust-protect-identities.md#block-legacy-azure-ad-powershell-module) | None (included with Microsoft Entra ID) |
8083
| [Enable Microsoft Entra ID security defaults for free tenants](zero-trust-protect-identities.md#enable-microsoft-entra-id-security-defaults-for-free-tenants) | None (included with Microsoft Entra ID) |

docs/fundamentals/zero-trust-protect-identities.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,9 +119,15 @@ The recommendations and Zero Trust checks that are part of this pillar help redu
119119
### Users have strong authentication methods configured
120120
[!INCLUDE [21801](../includes/secure-recommendations/21801.md)]
121121

122+
### Reduce the user-visible password surface area
123+
[!INCLUDE [21889](../includes/secure-recommendations/21889.md)]
124+
122125
### User sign-in activity uses token protection
123126
[!INCLUDE [21786](../includes/secure-recommendations/21786.md)]
124127

128+
### Token protection policies are configured
129+
[!INCLUDE [21941](../includes/secure-recommendations/21941.md)]
130+
125131
### All user sign-in activity uses phishing-resistant authentication methods
126132
[!INCLUDE [21784](../includes/secure-recommendations/21784.md)]
127133

@@ -167,6 +173,9 @@ The recommendations and Zero Trust checks that are part of this pillar help redu
167173
### Entra Connect Sync is configured with Service Principal Credentials
168174
[!INCLUDE [24570](../includes/secure-recommendations/24570.md)]
169175

176+
### Directory sync account is locked down to specific named location
177+
[!INCLUDE [21834](../includes/secure-recommendations/21834.md)]
178+
170179
### No usage of ADAL in the tenant
171180
[!INCLUDE [21780](../includes/secure-recommendations/21780.md)]
172181

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
---
2+
title: Directory sync account is locked down to specific named location
3+
ms.author: sarahlipsey
4+
author: shlipsey3
5+
ms.service: entra-id
6+
ms.topic: include
7+
ms.date: 03/05/2026
8+
ms.custom: Identity-Secure-Recommendation
9+
ai-usage: ai-assisted
10+
# minimumlicense:
11+
# sfipillar: Protect identities and secrets
12+
# category: Access control
13+
# risklevel: High
14+
# userimpact: Low
15+
# implementationcost: Medium
16+
---
17+
Directory synchronization accounts are highly privileged service accounts that facilitate identity synchronization between on-premises Active Directory and Microsoft Entra ID. Without location-based access controls, threat actors who compromise these accounts can synchronize malicious changes from any location, including unauthorized networks or geographic regions.
18+
19+
Once a directory sync account is compromised, threat actors can:
20+
- Manipulate identity synchronization processes
21+
- Create unauthorized user accounts
22+
- Escalate privileges of existing accounts
23+
- Persist access by modifying synchronization rules
24+
25+
Unrestricted network access allows threat actors to operate remotely from compromised infrastructure, making detection harder while maintaining long-term access to the hybrid identity environment. Restricting these accounts to trusted named locations through Conditional Access policies limits the attack surface by ensuring synchronization operations only occur from authorized network locations.
26+
27+
**Remediation action**
28+
29+
- [Block access by location with Conditional Access](/entra/identity/conditional-access/policy-block-by-location).
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Reduce the user-visible password surface area
3+
ms.author: sarahlipsey
4+
author: shlipsey3
5+
ms.service: entra-id
6+
ms.topic: include
7+
ms.date: 03/04/2026
8+
ms.custom: Identity-Secure-Recommendation
9+
ai-usage: ai-assisted
10+
# minimumlicense:
11+
# sfipillar: Protect identities and secrets
12+
# category: Authentication
13+
# risklevel: High
14+
# userimpact: Medium
15+
# implementationcost: Medium
16+
---
17+
Organizations with extensive user-facing password surfaces expose multiple entry points for credential-based attacks. Threat actors often begin with credential stuffing using compromised credentials from data breaches, followed by password spraying to test common passwords across multiple accounts. Once initial access is gained, they conduct credential discovery by examining browser password stores, cached credentials in memory, and credential managers to harvest additional authentication materials. These stolen credentials enable lateral movement to more systems and applications, often escalating privileges by targeting administrative accounts that still rely on password authentication.
18+
19+
Without passwordless methods like Windows Hello for Business, FIDO2 security keys, and Microsoft Authenticator deployed broadly, every password prompt is an opportunity for interception and exploitation. Reducing the password surface area limits these attack vectors and reduces the overall exposure to credential-based threats.
20+
21+
**Remediation action**
22+
23+
- [Plan a phishing-resistant passwordless authentication deployment](/entra/identity/authentication/how-to-plan-prerequisites-phishing-resistant-passwordless-authentication).
24+
- [Enable passkeys (FIDO2)](/entra/identity/authentication/how-to-enable-passkey-fido2).
25+
- [Configure Windows Hello for Business](/windows/security/identity-protection/hello-for-business/).
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Token protection policies are configured
3+
ms.author: sarahlipsey
4+
author: shlipsey3
5+
ms.service: entra-id
6+
ms.topic: include
7+
ms.date: 03/09/2026
8+
ms.custom: Identity-Secure-Recommendation
9+
ai-usage: ai-assisted
10+
# minimumlicense: P1
11+
# sfipillar: Protect identities and secrets
12+
# category: Access control
13+
# risklevel: Medium
14+
# userimpact: Low
15+
# implementationcost: Medium
16+
---
17+
Without the Token Protection Conditional Access policy, threat actors who steal sign-in session tokens can replay them from any device to gain unauthorized access to resources. Token theft allows attackers to bypass authentication entirely because the stolen token is already a valid proof of identity. This access vector enables lateral movement, privilege escalation, and data exfiltration without triggering reauthentication challenges.
18+
19+
Token protection in Microsoft Entra ID binds sign-in session tokens to the device where they were originally issued, rendering stolen tokens unusable on attacker-controlled devices. Configuring the Conditional Access Token Protection policy for Windows and Apple platforms ensures that sign-in session tokens for critical services like SharePoint Online and Exchange Online can't be replayed from unauthorized endpoints.
20+
21+
**Remediation action**
22+
23+
- [Configure token protection in Conditional Access](/entra/identity/conditional-access/concept-token-protection#create-a-conditional-access-policy).

docs/includes/secure-recommendations/21953.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ ms.author: joflore
44
author: MicrosoftGuyJFlo
55
ms.service: entra-id
66
ms.topic: include
7-
ms.date: 10/07/2025
7+
ms.date: 03/05/2026
88
ms.custom: Identity-Secure-Recommendation
99
# minimumlicense: P1
1010
# sfipillar: Protect identities and secrets
@@ -13,7 +13,11 @@ ms.custom: Identity-Secure-Recommendation
1313
# userimpact: Low
1414
# implementationcost: Medium
1515
---
16-
Without Local Admin Password Solution (LAPS) deployed, threat actors exploit static local administrator passwords to establish initial access. After threat actors compromise a single device with a shared local administrator credential, they can move laterally across the environment and authenticate to other systems sharing the same password. Compromised local administrator access gives threat actors system-level privileges, letting them disable security controls, install persistent backdoors, exfiltrate sensitive data, and establish command and control channels.
16+
Without Local Admin Password Solution (LAPS) deployed, threat actors exploit static local administrator passwords to establish initial access. After threat actors compromise a single device with a shared local administrator credential, they can move laterally across the environment and authenticate to other systems sharing the same password. Compromised local administrator access gives threat actors system-level privileges, which lets them accomplish a wide range of malicious activities, including:
17+
- Disable security controls
18+
- Install persistent backdoors
19+
- Exfiltrate sensitive data
20+
- Establish command and control channels
1721

1822
The automated password rotation and centralized management of LAPS closes this security gap and adds controls to help manage who has access to these critical accounts. Without solutions like LAPS, you can't detect or respond to unauthorized use of local administrator accounts, giving threat actors extended dwell time to achieve their objectives while remaining undetected.
1923

docs/includes/secure-recommendations/21954.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ ms.author: joflore
44
author: MicrosoftGuyJFlo
55
ms.service: entra-id
66
ms.topic: include
7-
ms.date:
7+
ms.date: 03/04/2026
88
ms.custom: Identity-Secure-Recommendation
99
# minimumlicense: Free
1010
# sfipillar: Protect tenants and isolate production systems
@@ -13,7 +13,7 @@ ms.custom: Identity-Secure-Recommendation
1313
# userimpact: Low
1414
# implementationcost: Low
1515
---
16-
When non-administrator users can access their own BitLocker keys, threat actors who compromise user credentials gain direct access to encryption keys without requiring privilege escalation. Once attackers obtain BitLocker keys, they can decrypt sensitive data stored on the device, including cached credentials, local databases, and confidential files.
16+
When non-administrator users can access their own BitLocker keys, threat actors who compromise user credentials can gain direct access to encryption keys without requiring privilege escalation. Once attackers obtain BitLocker keys, they can decrypt sensitive data stored on the device, including cached credentials, local databases, and confidential files.
1717

1818
Without proper restrictions, a single compromised user account provides immediate access to all encrypted data on that device, negating the primary security benefit of disk encryption and creating a pathway for lateral movement.
1919

0 commit comments

Comments
 (0)