🛡️ Microsoft Entra ID Token Protection Conditional Access policy is not selected🟢⚪
- Contextual name: 🛡️ Token Protection Conditional Access policy is not selected🟢⚪
- ID:
/ce/ca/azure/microsoft-entra-id/conditional-access-policy - Tags:
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Description
Description
This recommendation ensures that issued tokens are only issued to the intended device.
Rationale
When properly configured, conditional access can aid in preventing attacks involving token theft, via hijacking or reply, as part of the attack flow. Although currently considered a rare event, the impact from token impersonation can be severe.
IMPORTANT: While this recommendation allows exceptions to specific Users or Groups, they should be very carefully tracked and reviewed for necessity on a regular interval through an Access Review process. It is important that this rule be built to include "All Users" to ensure that all users not specifically excepted will be required to use MFA to access Admin Portals.
Impact
A Microsoft Entra ID P1 or P2 license is required.
Start with a Conditional Access policy in "Report Only" mode prior to enforcing for all users.
Audit
From Azure Portal
- Sign in to the Microsoft Entra admin center as at least a
Conditional Access Administrator.- Browse to
Protection>Conditional Access>Policies.... see more
Remediation
Remediation
From Azure Portal
- Sign in to the Microsoft Entra admin center as at least a
Conditional Access Administrator.- Browse to
Protection>Conditional Access>Policies.- Select
New policy.- Give your policy a name.
- Under
Assignments, selectUsers or workload identities.
- Under
Include, select the users or groups to apply this policy.- Under
Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts (if applicable).- Under
Target resources>Resources>Include>Select resources
- Under
Select, select the following applications:
- Office 365 Exchange Online
- Office 365 SharePoint Online
- Choose
Select- Under
Conditions:
- Under
Device platforms
- Set
ConfiguretoYes.Include>Select device platforms>Windows.- Select
Done.- Under
Client apps:
- Set
ConfiguretoYes- Under Modern authentication clients, only select
Mobile apps and desktop clients.... see more
policy.yaml
Linked Framework Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 CIS Azure v5.0.0 → 💼 5.2.8 Ensure a Token Protection Conditional Access policy is considered (Manual) | 1 | no data | |||
| 💼 Cloudaware Framework → 💼 General Access Controls | 12 | no data |