-
Notifications
You must be signed in to change notification settings - Fork 225
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
hands-on evaluation of the AAD cross-tenant conditional access for guests marked as high-risk by Identity Protection #258
Comments
Discuss with Microsoft to determine direction of protections. |
@gdasher @mitchelbaker-cisa |
Concur we can close this specific issue out due to the underlying feature being retired. As a follow up @tkol2022 can we confirm the validity of the reviewer's statement, "conditional access policies do not apply to users when they are outbound guests to another organization's AAD." If false this may fall under #754 as an additional todo. |
That statement is likely true because as far as I know conditional access policies protect the tenant in which they are defined when users try to access that tenant. I am not aware of conditional access policies affecting external tenants. There is a way to restrict users to only be able to access specific external tenants (in a whitelist) which many agencies likely use but that is in a completely different configuration portal than conditional access. 754 is about a different topic. Issue #754 is scoped to ensure that our policy checks examine all configuration fields of a conditional access policy and not just some of them (as our current Rego code does). This is to ensure the policies are precise enough so that they catch configurations that would affect the scope of the policy enforcement and therefore not achieve the goal of the baseline policy. For example, if an agency create a policy that requires phishing-resistant MFA, but only scoped it to laptops, that means that users could access the system without MFA from a mobile device. |
yes, lets go ahead and close this issue. |
💡 Summary
We received a comment from an Azure AD subject matter expert suggesting to create a new baseline policy related to 2.2 "High Risk Users SHALL Be Blocked". The suggestion was to create a new access policy directly in Azure Identity Protection (in addition to the conditional access policy) that will also block high risk users. The reviewer suggested that conditional access policies do not apply to users when they are outbound guests to another organization's AAD.
The scope of this issue is to prototype this specific usage scenario and also experiment with the suggested new policy. The output from this exploration could lead to a new baseline policy. Reference comment in the matrix for details.
This maps to comment 4 in the adjudication matrix.
Implementation notes
The text was updated successfully, but these errors were encountered: