<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Azure AD - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/azure-ad-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/azure-ad-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 03 Aug 2022 13:21:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Azure AD - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/azure-ad-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>MS365 101: Manage Azure AD B2B Guest Identities</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/#respond</comments>
		
		<dc:creator><![CDATA[Jules Haddad]]></dc:creator>
		<pubDate>Wed, 03 Aug 2022 13:21:16 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[Collaboration]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[O365]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18362</guid>

					<description><![CDATA[<p>The use of &#8220;guest&#8221; identities to facilitate collaboration externally   The need for collaboration externally entails risks for companies Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/">MS365 101: Manage Azure AD B2B Guest Identities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: justify;">The use of &#8220;guest&#8221; identities to facilitate collaboration externally</h1>
<h2> </h2>
<h2 style="text-align: justify;">The need for collaboration externally entails risks for companies</h2>
<p style="text-align: justify;">Companies have always <strong>needed to collaborate</strong> with each other by sharing resources and exchanging data. To do this, their collaborators must be able to <strong>interact securely </strong>with users outside their environment.</p>
<p style="text-align: justify;">Several<strong> use cases</strong> can be applied, including <strong>time-bound collaboration with partners</strong>, external service providers, suppliers or B2B customers.</p>
<p style="text-align: justify;">Additionally, it is common to observe<strong> continuous collaboration between subsidiaries</strong> of the same group that have access to the resources and data of the company whilst not necessarily requiring to share the same Information Systems.</p>
<p style="text-align: justify;">Historically, collaboration could be achieved in several ways. However, collaboration also comes with certain disadvantages:</p>
<ul style="text-align: justify;">
<li>By <strong>successive exchange of emails</strong> &#8211; which can be inefficient and can result in a loss of control of the data exchanged;</li>
<li>By <strong>using solutions dedicated</strong> to share documents with third parties &#8211; which can be costly and unsuitable from a user experience point of view;</li>
<li>By <strong>creating a new identity in legacy systems</strong> (Active Directory, etc.), and by providing third-party entities with a means to access the company&#8217;s IS (VPN, virtual machines, physical machines, etc.) &#8211; which can significantly increase the company&#8217;s attack surface.</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">Microsoft introduced Azure AD B2B to address the need for collaboration</h2>
<p style="text-align: justify;">Today, using Azure AD B2B allows two or more entities to <strong>collaborate within the host company&#8217;s Azure tenant</strong>.  Shared resources can be apps, documents, SharePoint sites, OneDrive, or Teams teams.</p>
<p style="text-align: justify;">In effect, the Azure B2B solution allows an external user to <strong>access the host company tenant through their regular account by</strong> creating a &#8220;guest&#8221; identity within the company&#8217;s Azure Active Directory (AAD).</p>
<p style="text-align: justify;">The &#8220;client&#8221; tenant then fully or partially trusts the &#8220;external&#8221; tenant for authentication via a token exchange mechanism.</p>
<p style="text-align: justify;">There are three native possibilities for creating a &#8220;guest&#8221; identity:</p>
<ul style="text-align: justify;">
<li>Directly from the <strong>Azure portal</strong>;</li>
<li>Via <strong>document sharing</strong> on OneDrive/SharePoint/Teams;</li>
<li>Through the use of the<strong> GRAPH API.</strong></li>
</ul>
<p> </p>
<p><em><img fetchpriority="high" decoding="async" class="wp-image-18366 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1.png" alt="" width="4150" height="2385" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1.png 4150w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-332x191.png 332w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-768x441.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-1536x883.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image1-2048x1177.png 2048w" sizes="(max-width: 4150px) 100vw, 4150px" /></em></p>
<p style="text-align: center;"><em>Figure 1 &#8211; Native Operation: Authentication and Identity Creation</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">At the level of the host tenant, the owner can choose to authorize the sharing of data to external users while also being able to administer guest accounts (creation, deactivation, deletion etc.).</p>
<p style="text-align: justify;">A direct benefit of this solution is the <strong>ease of use</strong> for users who are familiar with Microsoft environments.</p>
<p style="text-align: justify;">The second advantage is the<strong> cost of the solution</strong>. A &#8220;guest&#8221; identity has a licensing cost whereby up to a ceiling of 50,000 &#8220;guest&#8221; identities, their license is free. Beyond this and depending on the company&#8217;s subscriptions, a license may cost between €0.003 and €0.015 / month / user, which is then added on to a fixed fee of €0.029 for each multi-factor authentication attempt. This pricing policy is out of step with the usual price of an M365 license, which is between €10 and €50 / month / user depending on the license plan.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">However, Azure AD B2B has a default configuration that is too open, which creates risks for the company</h2>
<p style="text-align: justify;">Azure AD B2B introduces several factors that can lead to <strong>risk</strong>:</p>
<ul style="text-align: justify;">
<li>The <strong>creation of</strong> guest identities is very simple and uncontrolled (no identity manager, no traceability, no restrictions etc.);</li>
<li>The <strong>number of</strong> guest identities may increase in an uncontrolled manner, which makes managing their lifecycles difficult.</li>
<li>The company does <strong>not control the security</strong> of the initial holder of the &#8220;guest&#8221; identity;</li>
<li>No <strong>conditional access rules</strong> are set up by default (no strong authentication, no restriction of access to the Azure A D portal, etc.);</li>
<li>The &#8220;guest&#8221; identity <strong>has access to the Azure AD attributes</strong> of other users.</li>
</ul>
<p style="text-align: justify;">These factors create risks for the company&#8217;s data since the &#8220;guest&#8221; identity may have rights to a significant number of documents and information about its host owner.</p>
<p style="text-align: justify;">We can consider two triggering events for the different threat scenarios:</p>
<ul style="text-align: justify;">
<li>A <strong>malicious</strong> &#8220;guest&#8221; identity;</li>
<li>A &#8220;guest&#8221; identity <strong>compromised</strong> by an attacker.</li>
</ul>
<p style="text-align: justify;">An attacker would then have the opportunity to:</p>
<ul style="text-align: justify;">
<li><strong>Retrieve confidential data </strong>that the identity has access to;</li>
<li><strong>Destroy all data</strong> accessible by this identity;</li>
<li><strong>Compromise AD</strong> by assigning roles to this identity;</li>
<li><strong>Perform social engineering</strong> through their access to all user data.</li>
</ul>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">Depending on the level of maturity of the company and the willingness to hedge risk, it is necessary to implement a number of measures</h1>
<h2> </h2>
<h2 style="text-align: justify;">To get started: harden the default configuration</h2>
<h4> </h4>
<h4 style="text-align: justify;">Master the means to add &#8220;guest&#8221; identities on the tenant</h4>
<p style="text-align: justify;">The first step is to <strong>cut off access to the Azure portal</strong> to non-administrator employees of the company so that it is no longer a vector for creating &#8220;invited&#8221; identities.</p>
<p><img decoding="async" class="aligncenter wp-image-18370 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1.png" alt="" width="1595" height="761" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1.png 1595w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-400x191.png 400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-768x366.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen1-1536x733.png 1536w" sizes="(max-width: 1595px) 100vw, 1595px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Restricting access to the Azure AD console</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">It should be noted that it is also possible <strong>to restrict the population who can invite external users to collaborate</strong>. However, this will not be applicable to all companies &#8211; especially those wishing to decentralize the management of this population. The idea of restricting this population forces the creation of a service dedicated to the creation of these identities. This goes against the very principle of this service, which is to leave it in the hands of the user.</p>
<p style="text-align: justify;">Finally, there is a feature to<strong> apply constraints to the email addresses of &#8220;guest&#8221; identities</strong>, via white-listing or domain name blacklisting. However, before embarking on this action, it is necessary to consider the complexity of its implementation and the potential low level of associated risk reduction.</p>
<h4> </h4>
<h4 style="text-align: justify;">Restrict what these identities can access</h4>
<p style="text-align: justify;">It is also possible <strong>to restrict what can be accessed</strong> by the invited identities, so that they are unable to retrieve a large volume of information on the host tenant.</p>
<p><img decoding="async" class="aligncenter wp-image-18374 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3.png" alt="" width="1603" height="647" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3.png 1603w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-71x29.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-768x310.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen3-1536x620.png 1536w" sizes="(max-width: 1603px) 100vw, 1603px" /></p>
<p style="text-align: center;"><em>Figure 3 &#8211; Restrict access for &#8220;guest&#8221; identities</em></p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Strengthen authentication and access control of &#8220;guest&#8221; identities</h2>
<p style="text-align: justify;">The <strong>multi-factor authentication (MFA)</strong> mechanism for a &#8220;guest&#8221; identity is almost native and reduces the risk of spoofing by an attacker. It is also possible to set up a <strong>conditional access policy</strong> that specifically targets these &#8220;guest&#8221; identities.</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18372 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2.png" alt="" width="1063" height="446" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2.png 1063w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2-437x183.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Screen2-768x322.png 768w" sizes="auto, (max-width: 1063px) 100vw, 1063px" /></p>
<p style="text-align: center;"><em>Figure 4 &#8211; Multi-Factor Authentication</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">However, challenges can still complicate this operation and need to be considered:</p>
<ul style="text-align: justify;">
<li>Managing <strong>change management</strong> on these &#8220;guest&#8221; populations remains complex to perform, even if user onboarding operations are simple and carefully guided.</li>
<li>Managing <strong>second-factor reset processes</strong> in the event of loss or theft can be costly and complex if left unchecked.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Educate users about risks and best collaboration practices</h2>
<p style="text-align: justify;">The major complexity of the Azure AD B2B solution is <strong>the lack of a mechanism for managing &#8220;guest&#8221; identities</strong>. Users are therefore the <strong>main actors</strong> of the management strategy and must be informed at the right level by emphasizing:</p>
<ul style="text-align: justify;">
<li>Collaboration <strong>best practices</strong>: when should they use the solution, how to create a guest, and more;</li>
<li><strong>Proper management of their access</strong>: they must be removed as soon as possible in order to avoid subsequent illegitimate access;</li>
<li><strong>Disabling identities when they are no longer in use</strong>, especially for service providers/partners, ensuring that the documents produced are not lost.</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Protect the data that guests can access</h2>
<p style="text-align: justify;">We must also not forget to protect the data to which a legitimate guest can have access to, which gives rise to several measures:</p>
<ul style="text-align: justify;">
<li>It is possible to set up constraints for &#8220;guest&#8221; identities via <strong>conditional access rules </strong>that include: mandatory use of thin clients (web clients), the prohibition of data downloading, constraints on the terminals to be used, etc.</li>
<li>If the company has deployed the Azure Identity Protection (AIP) classification tool, an alternate solution is to <strong>create a privacy label</strong> that encrypts the data for &#8220;guest&#8221; identities. This label can also be used to restrict certain actions for this population: modification restriction (via associated permissions), download restriction (via a DLP rule), etc.</li>
</ul>
<p style="text-align: justify;">Moving a step further, a <strong>Cloud Access Security Broker</strong> (such as Microsoft&#8217;s MS Defender for Cloud Apps) can enable the implementation of advanced and targeted rules, such as preventing uploads to specific Sharepoint spaces as an example.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Managing the Lifecycle of Guest Identities: 3 Scenarios to Consider</h2>
<p style="text-align: justify;">As mentioned earlier, the key topic is <strong>managing the lifecycle of &#8220;guest&#8221; identities</strong> i.e., the creation, deletion, and review of access. As such, there are 3 scenarios to be considered. These scenarios depend on the desired <strong>risk coverage</strong>, <strong>the level of maturity </strong>of identity and access management, and the <strong>cost of implementing</strong> the scenario.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18368 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2.png" alt="" width="4457" height="2512" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2.png 4457w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-339x191.png 339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-768x433.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-1536x866.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-2048x1154.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/08/Image2-800x450.png 800w" sizes="auto, (max-width: 4457px) 100vw, 4457px" /></p>
<p style="text-align: center;"><em>Figure 5 &#8211; Guest Identity Lifecycle Management Scenarios</em></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;">Scenario 1 &#8211; Stay pragmatic on a budget: use native tools and configurations</h3>
<p style="text-align: justify;">In this scenario, the company <strong>creates a certain group typology for “External” groups</strong>, and therefore to the creation of guests. The distinction can be made by the use of language by the group. For example: all external groups must start with &#8220;X_&#8221;.</p>
<p style="text-align: justify;">It can thus carry out checks more easily on this limited perimeter of groups.</p>
<p style="text-align: justify;">The main prerequisite is <strong>to block the addition of &#8220;guest&#8221; identities to “Internal” groups. </strong>This is possible in two ways:</p>
<ul style="text-align: justify;">
<li>If the company has deployed the AIP classification tool on SharePoint and Teams spaces: a <strong>dedicated label</strong> can be used to prevent external sharing on these spaces. For example, the creation of an &#8220;Indull&#8221; label that blocks sharing with &#8220;guest&#8221; identities;  &#8211; <a href="https://docs.microsoft.com/en-us/microsoft-365/compliance/sensitivity-labels-teams-groups-sites?view=o365-worldwide">LINK</a></li>
<li><strong>Via a PowerShell script: </strong>block sharing with &#8220;guest&#8221; identities for &#8220;Internal&#8221; groups by identifying them via classifications. &#8211; <a href="https://docs.microsoft.com/en-us/microsoft-365/solutions/per-group-guest-access?view=o365-worldwide">LINK</a></li>
</ul>
<h4 style="text-align: justify;">Creating a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">The only way to create a &#8220;guest&#8221; identity is to add<strong> them as external users to &#8220;External&#8221; group types.</strong></p>
<p style="text-align: justify;">If the company needs to give its tenant access to a subsidiary or an entire entity, it is possible to regularly synchronize their AD or Azure AD, and thus create their identities as a &#8220;guest&#8221; in the tenant of the company.</p>
<h4 style="text-align: justify;">Deleting a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">The process of deleting identities is simple through the <strong>deletion of inactive &#8220;guest&#8221; identities. </strong>For example, using a PowerShell script based on the frequency of &#8220;Sign-In Activity&#8221;. Alternatively, it is also possible to remove &#8220;guest&#8221; identities that do not have access to any group via a PowerShell script.</p>
<h4 style="text-align: justify;">Review of &#8220;guest&#8221; access</h4>
<p style="text-align: justify;">It is possible <strong>to expire access for &#8220;guest&#8221; identities</strong> on SharePoint groups or OneDrives after 60 days. Note that the owner of the SharePoint or OneDrive group will be notified of the expiration 21 days beforehand.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18348 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7.png" alt="" width="1027" height="372" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7.png 1027w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7-437x158.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture7-768x278.png 768w" sizes="auto, (max-width: 1027px) 100vw, 1027px" /></p>
<p style="text-align: center;"><em>Figure 6 &#8211; Guest Access Expiration</em></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Finally, it is possible to use the &#8220;Guest Access Review&#8221; feature for external groups. It should be noted, however, that this feature requires advanced licenses (AAD P2) assigned to the users who carry out the reviews i.e. all the owners of the groups (normally a small number).</p>
<p style="text-align: justify;"><strong>This scenario is an efficient way that reduces guest risk, maintains a near-native solution, and doesn’t require too much investment.</strong></p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;">Scenario 2 &#8211; To go further in the level of security: develop a guest management application</h3>
<p style="text-align: justify;">In this second scenario, the company wants to <strong>have complete control over the lifecycle management of &#8220;guest&#8221; identities</strong>. To do this, the company <strong>creates an application</strong> (for example by using Power App) to manage this lifecycle, making it the single point of creation and deletion.</p>
<p style="text-align: justify;">Once this lifecycle is in place, it is necessary to set the SharePoint sharing setting to &#8220;Existing guest only&#8221; mode, allowing only content to be shared with &#8220;guest&#8221; identities that already exist in the Azure AD tenant. This prevents the creation of new identities through this vector.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-18350 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8.png" alt="" width="1048" height="585" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8.png 1048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8-342x191.png 342w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/07/Picture8-768x429.png 768w" sizes="auto, (max-width: 1048px) 100vw, 1048px" /></p>
<p style="text-align: center;"><em>Figure 7 &#8211; Restricting Sharing Opportunities</em></p>
<h4 style="text-align: justify;">Creating a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">In this scenario, users <strong>use the dedicated application to create the &#8220;guest&#8221; identities</strong> by entering an end date. The user then designates the owner of the identity created.</p>
<h4 style="text-align: justify;">Deleting an &#8220;invite&#8221; identity</h4>
<p style="text-align: justify;">To delete identities, it is possible <strong>to trigger an automatic workflow</strong> before the end date by asking the owner of the identity in question whether to delete it or extend its end date. It should be noted that if the owner has left the company without making the change of ownership, consideration can be given to reassigning the guest to his or her supervisor.</p>
<h4 style="text-align: justify;">Review of &#8220;guest&#8221; access</h4>
<p style="text-align: justify;">With this type of &#8220;in-house&#8221; application, it is complicated to go much further in the management of the lifecycle &#8211; especially when it comes to access review.</p>
<p style="text-align: justify;">It is still possible, as in Scenario 1, to expire guest access or to use the &#8220;Guest Access review&#8221; feature (with the same constraints as stated above).</p>
<p style="text-align: justify;">To go further, we can also consider the use of third-party tools such as IDECSI or Sharegate that make it possible to manage these access journals automatically and intuitively.</p>
<p style="text-align: justify;"><strong>This scenario changes the native behavior and enables better control of the lifecycle, but at a significant blow with regard to the deployment and the management of the change to be implemented.</strong></p>
<h3 style="text-align: justify;">Scenario 2&#8242; &#8211; Integrating &#8220;guest&#8221; identities into traditional IAM processes</h3>
<p style="text-align: justify;">The last scenario to consider is a variant of the previous scenario, where the company still wants to have control over the lifecycle management of &#8220;guest&#8221; identities. In this case, the company can<strong> integrate &#8220;guest&#8221; identity management into its identity and access management (IAM) tools</strong> in the same way as &#8220;external&#8221; identities.</p>
<p style="text-align: justify;">The IAM tool then becomes the <strong>authoritarian source</strong> for this type of population and its management is done directly there.</p>
<p style="text-align: justify;">In this scenario, as in the previous one, you must also set the SharePoint sharing setting to &#8220;Existing guest only&#8221; mode.</p>
<h4 style="text-align: justify;">Creating a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">Identities are created on external <strong>creation forms</strong> from IAM tools by choosing the &#8220;guest&#8221; type for the identity. The &#8220;guest&#8221; identity can then be provisioned automatically in the Azure AD by IAM tools.</p>
<h4 style="text-align: justify;">Deleting a &#8220;guest&#8221; identity</h4>
<p style="text-align: justify;">The removal of the identity is also <strong>done by the IAM tool</strong> according to the positioned end date and the workflows already defined.</p>
<h4 style="text-align: justify;">Reviews of &#8220;guest&#8221; access</h4>
<p style="text-align: justify;">In the event that the company&#8217;s IAM tools are used to manage rights on Sharepoint spaces, it is possible to use the <strong>access review capabilities of these tools</strong> to review access to sensitive resources for which &#8220;guest&#8221; identities have access.</p>
<p style="text-align: justify;">Alternatively, a second option is to use access governance features via IAM solutions, such as Sailpoint OneIdentity, or via dedicated Identity and Access Governance solutions, such as Brainwave or Varonis. We can imagine retrieving the rights assigned directly in the Azure AD and having them verified to the owners of the resources through these tools.</p>
<p style="text-align: justify;"><strong>This scenario is a variant of Scenario 2, which allows the most mature companies in identity and access management to capitalize on existing tools and processes.</strong></p>
<h2> </h2>
<h2 style="text-align: justify;">Finally, do not neglect the surveillance of this exposed population</h2>
<p style="text-align: justify;">It is useful to build a form of <strong>adapted reporting using KPIs and dashboards</strong>. A pool of information is available natively in the Azure AD (date of last connection, activity on the tenant as well as on Office 365 via the &#8220;unified audit logs&#8221;). This information can be interacted with via visualization tools, like Power Bi, for the generation of dashboards.</p>
<p style="text-align: justify;">Secondly, it is important to <strong>monitor the activities of these particularly exposed populations</strong>. Two levels of detection can be set up depending on monitoring capabilities:</p>
<ul style="text-align: justify;">
<li>Implement <strong>native DLP rules</strong> or <strong>classic alert scenarios</strong> in the Microsoft console: some alert scenarios are preconfigured, such as mass deletion of documents, elevation of privilege etc.</li>
<li>Implement<strong> advanced DLP rules</strong> and detection scenarios or specific thresholds for guests<strong> with the support of the company&#8217;s SOC</strong>. For example, the data download threshold allowed for a guest may be lower than the threshold allowed for an intern.</li>
</ul>
<p style="text-align: justify;">We can imagine the use of the <strong>Azure AD Identity Protection</strong> module to trigger alerts for guests with a high level of risk.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;">In conclusion, AAD B2B greatly facilitates collaboration, but its configuration needs to be hardened to reduce the level of risk induced by the solution</h1>
<p style="text-align: justify;">AAD B2B greatly <strong>simplifies</strong> collaboration with users outside the company, but entails risks<strong> related to the default operation</strong> of the solution. To control these risks, it is necessary to <strong>reduce </strong>the level of open access, and <strong>to control the lifecycle of these identities</strong> at a deeper level, depending on the potential level of investment that is planned. Finally, it is necessary to focus on <strong>monitoring</strong> via native tools or tools used by the company given the high exposure of these populations.</p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/">MS365 101: Manage Azure AD B2B Guest Identities</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/08/ms365-101-manage-azure-ad-b2b-guest-identities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to manage administration in Microsoft 365?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/10/how-to-manage-administration-in-microsoft-365/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 13:03:15 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[administrator]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[PIM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14420</guid>

					<description><![CDATA[<p>Within any infrastructure or application, privileged accounts are particularly sensitive accounts. Securing them is a key issue. This is especially true for SaaS services, where the shared responsibility model requires an organization to protect its data and identities, and the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-manage-administration-in-microsoft-365/">How to manage administration in Microsoft 365?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Within any infrastructure or application, privileged accounts are particularly sensitive accounts. Securing them is a key issue. This is especially true for SaaS services, where the shared responsibility model requires an organization to protect its data and identities, and the Microsoft 365 suite is no exception.</p>
<p style="text-align: justify;"><strong>In fact, if there&#8217;s one thing you need to protect, it&#8217;s your administrators!</strong></p>
<p style="text-align: justify;">Whether it concerns authentication methods, third-party application permissions via APIs (allowing a third-party application to synchronize data with an external storage service, for example) or changing retention policies, an administrative action can significantly affect the data and security of the tenant on a larger scale. If it is necessary to make this point even more explicit, a Global Administrator has the ability to access all data or manage all the settings of Office 365, Windows 10, Azure AD&#8230; but also Azure!</p>
<p style="text-align: justify;">
<h1 style="text-align: justify;">What are the native functionalities in the Microsoft platform?</h1>
<h2 style="text-align: justify;">Which rights models within Microsoft 365?</h2>
<p style="text-align: justify;">To date, Microsoft 365 has two main levels of rights. These two levels schematically allow the delegation of administrative rights by adapting to different organisational models (small / medium / large, centralised / decentralised):</p>
<ul style="text-align: justify;">
<li>Azure AD roles: Administration of Azure AD and Microsoft 365 services;</li>
<li>RBAC roles: Administration of objects within services.</li>
</ul>
<h4 style="text-align: justify;">Level One: Using Azure AD roles to manage services</h4>
<p style="text-align: justify;">The person behind the opening of the tenant automatically takes over the role of General Administrator. He can then appoint other administrators to accompany him in his tasks. As far as possible, Global Admin&#8217;s rights should not be used in order to limit overexposure of the administration accounts. It is good practice to limit this general role to a maximum of 3-4 accounts. In addition, for almost all actions there is an equivalent service administration role (e.g. SharePoint Administrator, User Administrator, etc.).</p>
<p style="text-align: justify;">These service administration roles are also known as <a href="https://docs.microsoft.com/en-en/microsoft-365/admin/add-users/azure-ad-roles-in-the-mac?view=o365-worldwide">Azure AD roles</a>. Each service can be viewed as an Azure AD application. An administrator would thus be equivalent to the owner of the service in question. At the time of writing this article, Microsoft offers 59 different roles, which provides a <strong>good level of segregation of rights</strong> in most cases.</p>
<p style="text-align: justify;">However, the default roles provide access to the entire Admin Service for the entire tenant and may in some cases provide access to the underlying data (e.g. for SharePoint Administrator, Exchange Administrator and User Administrator).</p>
<p>&nbsp;</p>
<figure id="post-14425 media-14425" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14425 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3.png" alt="" width="1750" height="1031" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3.png 1750w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-324x191.png 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-768x452.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1536x905.png 1536w" sizes="auto, (max-width: 1750px) 100vw, 1750px" /></figure>
<p style="text-align: center;">Figure 1 – Example of sensitive rights</p>
<p style="text-align: justify;">
<p style="text-align: justify;">In the case of <strong>advanced maturity</strong>, it is possible to go further in the segregation of rights by creating <strong>personalised Azure AD roles</strong>. In concrete terms, this means deciding what permissions this role has (e.g. &#8220;microsoft.directory/applications/create&#8221; allows you to create applications in Azure Active Directory).</p>
<p style="text-align: justify;">The downside will be that it will be more complicated to audit the administration and that it will be necessary to monitor the evolution of services to ensure that permissions remain consistent with the needs of administrators.</p>
<h4 style="text-align: justify;">Second level: Using the RBAC model to manage objects</h4>
<p style="text-align: justify;">Certain services such as Exchange Online, Intune, Security and Compliance Centres or Cloud App Security offer <a href="https://docs.microsoft.com/en-en/microsoft-365/security/office-365-security/permissions-microsoft-365-compliance-security?view=o365-worldwide">specific RBAC rights models</a>.</p>
<p style="text-align: justify;">As its name suggests, <em>Role Based Access Control</em> (RBAC), allows for the implementation of more refined permissions management; with the ability to define roles for defined perimeters (e.g. for certain user groups). For example, it will be possible to create &#8220;Helpdesk A&#8221; and &#8220;Helpdesk B&#8221; in Exchange Online to give support rights to two separate teams on a perimeter A and a perimeter B.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">How to provision the accounts of administrators?</h2>
<p style="text-align: justify;">The first question is how to create an administrator&#8217;s identity. Two strategies are possible:</p>
<ul style="text-align: justify;">
<li>The creation of an account in the organisation&#8217;s identity repository, which will then be synchronised with Azure AD (ex: wavestone.com);</li>
<li>The creation of the account directly in Azure AD. This account will then be called &#8220;cloud-only&#8221; (example: wavestone.onmicrosoft.com).</li>
</ul>
<p style="text-align: justify;">Regardless of the administration role, it is recommended for a SaaS service such as Microsoft 365 that <strong>the account be located as close as possible to the administered resource</strong>. Here, this amounts to <strong>using cloud-only accounts</strong>. The objective is twofold: to protect against a possible unavailability or of a compromise of the organisation&#8217;s identity repository.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">How to assign permissions?</h2>
<p style="text-align: justify;">The second question is how to assign the right privileges to the administrative roles created.</p>
<h4 style="text-align: justify;">In the case of service administration</h4>
<p style="text-align: justify;">In order to assign an AAD role, it is possible to use 3 methods (via the portal or the corresponding PowerShell command):</p>
<ul style="text-align: justify;">
<li>The <strong>Azure portal</strong> (portal.azure.com): this is <strong>the method</strong> that should be favoured, as it allows the association of rights as close as possible to the resources and the use of PIMs, which we will discuss in the rest of the article;</li>
<li>The <strong>Microsoft 365 portal</strong> (admin.microsoft.com): it is possible to carry out the assignment of roles directly through the main administration portal. However, this method is not compatible with PIM;</li>
<li>The use of <strong>third party IAM tools</strong>: these solutions now have connectors with Office 365 to perform identity and privilege provisioning. These solutions offer less granularity, are not compatible with PIM and are a source of common errors. For example, synchronisation is typically one-way, resulting in the administration account reappearing if it is only deleted in Azure AD.</li>
</ul>
<p style="text-align: justify;">Note that it is also now possible to assign an Azure AD role to a security group (Cloud only) via a <a href="https://docs.microsoft.com/en-en/azure/active-directory/users-groups-roles/roles-groups-concept">preview feature</a>. This may simplify certain administrative models, such as where the Unified Communications team needs the SharePoint Administrator role and Teams Administrator. However, be careful with the management of this group.</p>
<h4 style="text-align: justify;">In the case of the administration of objects</h4>
<p style="text-align: justify;">For RBAC roles, the definition of roles is done directly in the administration platform of the service concerned. It is then possible to assign the role in question manually or to a security group, in the portal or via an IAM solution.</p>
<p>&nbsp;</p>
<figure id="post-14423 media-14423" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14423 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893.png" alt="" width="1492" height="948" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893.png 1492w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893-301x191.png 301w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893-61x39.png 61w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893-768x488.png 768w" sizes="auto, (max-width: 1492px) 100vw, 1492px" /></figure>
<p style="text-align: center;">Figure 2 – Natives functionalities of the solution</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">How to build and implement your administration model?</h1>
<h2 style="text-align: justify;">What strategy to define your rights model?</h2>
<p style="text-align: justify;">The construction of a delegation model must be based on the <strong>principle of least privilege</strong>. The core of the work is to make an inventory of the cases of Office 365 administration usage and to <strong>match your teams with the available rights</strong>.</p>
<p style="text-align: justify;">This can be an opportunity to rethink the organisation of teams dealing with the working environment. Two observations are quite significant:</p>
<ul style="text-align: justify;">
<li>Mobile terminals and workstations are intended to be managed by unified solutions (UEM) such as Intune, Workspace One or MobileIron, and therefore by the same team.</li>
<li>Security and compliance tools are increasingly integrated natively in Office 365. It is therefore necessary to break down the wall that existed between the workplace world and the security world, in order to create a team with the same ambition: to create and maintain a controlled and secure platform.</li>
</ul>
<p style="text-align: justify;">Office 365 has the particularity of bringing together a multitude of different services, such as file or information storage (SharePoint, OneDrive), communication tools (Exchange, Teams) but also security (Defender, Information Protection, etc.). It is therefore essential to group the services into categories and define a <strong>correspondence matrix</strong> between team and administration roles.</p>
<p style="text-align: justify;">Concretely, we advise you first to <strong>use the default Azure AD roles for service administration</strong>, <strong>and then to define more granular roles</strong> with RBAC and custom roles.</p>
<p style="text-align: justify;">It is also interesting to <strong>identify the most sensitive roles</strong>, such as those allowing access to data or security settings (for example: Global Admin, Exchange Admin, Security Administrator and Application Administration) in order to be able to adapt the security of these roles.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">How to delegate administration rights on objects in a multi-entity context ?</h2>
<p style="text-align: justify;">Before talking about security in the strict sense of the word, there is another question. Although <strong>the configuration of services and security parameters can only be done centrally, local teams need to carry out support actions</strong>: creation or modification of an internal or guest account, resetting of authenticators, creation of a Microsoft 365 group or a distribution list, etc.</p>
<p style="text-align: justify;">The service administration roles, the Azure AD roles, <strong>do not offer privilege segregation by perimeter</strong>; an Exchange Online administrator will therefore be able to handle all mailboxes. It will not be conceivable to give them in complex organisations or in regulated contexts. Several strategies are available, depending on the maturity and complexity of the organisation.</p>
<p style="text-align: justify;">In the case of small structures, it is easiest to use the native functionalities:</p>
<ul style="text-align: justify;">
<li><strong>RBAC roles</strong>: RBAC Exchange and Intune roles generally provide the right level of granularity to manage objects in native portals;</li>
<li><strong>Administrative Units</strong>: Administrative Units, <a href="https://docs.microsoft.com/en-en/azure/active-directory/users-groups-roles/directory-administrative-units">finally in GA</a> since the end of September, are the equivalent of RBAC for Azure Active Directory. They take the form of containers in which an administrator can create or modify objects, which makes sense for support activities.</li>
</ul>
<p style="text-align: justify;">In the case of larger structures, good practice is not to manage objects (users, mailboxes, groups, SharePoint sites, etc.) directly in native portals. What is needed is an <strong>interface that allows all these objects to be managed, while taking into account the business logic and the target administration model</strong>. Below are three examples of interfaces:</p>
<ul style="text-align: justify;">
<li><strong>In-house development of a &#8220;Custom Automation Engine&#8221;</strong>: this interface will be decorrelated from the IAM and very often a large powershell / Graph API machine;</li>
<li><strong>Integration of a connector to the current IAM solution</strong> in order to present a complete management of the objects by disregarding their direct hosting;</li>
<li><strong>Investment in a SaaS Management Platform (SMP)</strong>: software publishers have specialised in the creation of management tools for Office 365, combining object administration, licence management and security and operational supervision functions. Among these solutions, which are still relatively unknown, are ManageEngine, CoreView and Quadrotech.</li>
</ul>
<p style="text-align: justify;">Please note: this interface, dedicated to support teams, will be distinct from an interface open to all users allowing them to centrally create guest users, SharePoint sites, Teams, etc. In concrete terms, this second interface could be integrated with ITSM tools, SMP or even be developed based on Power Apps and Graph API.</p>
<p style="text-align: justify;">
<h1 style="text-align: justify;">How to protect access to these accounts ?</h1>
<h2 style="text-align: justify;">10 measures to secure administration accounts</h2>
<h2 style="text-align: justify;">Depending on the security licenses, mainly the EMS bundle, Microsoft provides a number of controls to secure administration accounts.</h2>
<p style="text-align: justify;">Most of these could also be obtained via third-party tools.</p>
<h3 style="text-align: justify;">Basic measures to secure the administration account</h3>
<ol>
<li style="text-align: justify;"><strong>A dedicated administrator account</strong></li>
</ol>
<p style="text-align: justify;">An administrator must have an account dedicated to administration, different from the office automation account. It should be cloud-only where possible (e.g. wavestone.onmicrosoft.com).</p>
<ol style="text-align: justify;" start="2">
<li><strong>Multi-Factor Authentication</strong></li>
</ol>
<p style="text-align: justify;">Multi-factor authentication is no longer an option today, and even less so for administrators.</p>
<p style="text-align: justify;">This measure is available for everyone, for all licences:</p>
<ul style="text-align: justify;">
<li>Via MFA for Office 365 (also called MFA with per-person inheritance) which forces a challenge at every connection;</li>
<li>Via Security Defaults which forces an additional factor to be registered for all users and imposes the MFA for administrators at each login;</li>
</ul>
<p style="text-align: justify;">It is also important to ensure that <a href="https://docs.microsoft.com/en-en/azure/active-directory/conditional-access/block-legacy-authentication">legacy authentication protocols</a> that do not support MFA are disabled. These would allow single sign-on to be bypassed.</p>
<p style="text-align: justify;">It will also make sense to limit the types of additional factors available; what is the point of securing administration accounts if the second factor is the administrator&#8217;s Gmail address.</p>
<h3 style="text-align: justify;">Highly recommended security measures</h3>
<ol style="text-align: justify;" start="3">
<li><strong>Unlicensed Office 365 account</strong></li>
</ol>
<p style="text-align: justify;">Without a licence, it will not be possible for an administrator to access the different services and data of the platform, or to have a mailbox.</p>
<p style="text-align: justify;">Please note that some services, such as Power Apps or Power BI, require a licence to access the administration portal. In practice, it can be interesting to create a security group that allocates the necessary licences for administrators.</p>
<ol style="text-align: justify;" start="4">
<li><strong>Conditional Access (with Azure AD P1)</strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/conditional-access/overview">Conditional access</a> allows you to evaluate the context when accessing an Office 365 service and to authorise access accordingly. For example, access can be blocked depending on the type of workstation used (whether managed by the company or not), the network on which the user is connected, the application in question or the user&#8217;s administrative role.</p>
<p style="text-align: justify;">In a Zero Trust logic, there should be no differentiation between the internal and external network, especially for administrators, but rather focus on the status of the workstation and the risk of connection.</p>
<ol style="text-align: justify;" start="5">
<li><strong>Password Protection (with </strong><strong>Azure AD P1)</strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/authentication/concept-password-ban-bad-on-premises">Azure AD Password Protection</a> provides controls over passwords. It will thus be possible to prohibit the use of a current password or a derivative (with a list predefined by Microsoft or maintained by the organisation).</p>
<p style="text-align: justify;">A good practice is to apply this protection to all Cloud-only administration accounts as a minimum.</p>
<ol style="text-align: justify;" start="6">
<li><strong>Azure AD Identity Protection (with Azure AD P2)</strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/identity-protection/overview-identity-protection">Azure AD Identity Protection</a> adds a notion of risk in the evaluation of user access and behaviour. Concretely, it will be advisable to define the following policies;</p>
<ul style="text-align: justify;">
<li>Risky users: Force password change for an administrator likely to be compromised (with a Medium or High risk);</li>
<li>Risky sign-in: Forcing an MFA challenge during risky access (e.g. anonymous or unusual IP).</li>
</ul>
<ol style="text-align: justify;" start="7">
<li><strong>Azure AD Privileged Identity Management (with Azure AD P2): </strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/privileged-identity-management/">Azure AD Privileged Identity Management</a> is a service to control the assignment and use of administrative roles:</p>
<ul style="text-align: justify;">
<li>Allocate just-in-time rights by giving an eligible role instead of a permanent one;</li>
<li>Submit role activation to third party validation;</li>
<li>Set up an end date for an administrative role;</li>
<li>Force recertifications of administrators.</li>
</ul>
<p style="text-align: justify;">It will be relevant to distinguish the so-called sensitive roles from the others during implementation.</p>
<p style="text-align: justify;">The monitoring of eligible administrators allows, as a bonus, to become aware of the real use of administration rights and therefore to clean up the list of administrators more easily.</p>
<p style="text-align: justify;">It should be noted that the PIM functionalities have recently been <a href="https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/groups-features">extended to the different groups</a>, which makes it possible to set up &#8220;Just-in-time&#8221; for more <a href="https://techcommunity.microsoft.com/t5/microsoft-security-and/using-azure-pim-for-the-aip-super-user-feature-management/ba-p/1587690">exotic cases such as RMS / AIP Super-Users</a>.</p>
<h3 style="text-align: justify;">To go even further</h3>
<ol style="text-align: justify;" start="8">
<li><strong>Supervision of administrator actions to detect abnormal behaviour</strong></li>
</ol>
<p style="text-align: justify;">Once all these security measures are in place, all that remains is for you to implement supervision to detect non-compliance with the previous rules and abnormal behaviour.</p>
<p style="text-align: justify;">And for this, nothing better than to refer to <a href="https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/">our article</a> on the subject to understand the available logs.</p>
<ol style="text-align: justify;" start="9">
<li><strong>Setting up a Privileged Access Workstation</strong></li>
</ol>
<p style="text-align: justify;">Administration is by definition a critical action. It must be carried out within a perimeter of trust. The provision of <a href="https://docs.microsoft.com/en-en/windows-server/identity/securing-privileged-access/privileged-access-workstations">PAW, or administration post</a>, will enable us to achieve this objective.</p>
<p style="text-align: justify;">The configuration of the administration station should be simple (no local administration rights, restricted Internet browsing, blocked USB ports, pre-installed PowerShell modules, etc.). But restricting the connection of an Office 365 administrator from this workstation may cause more problems. There are several possibilities for this:</p>
<ul style="text-align: justify;">
<li>In a modern context, a simple answer is to rely on Microsoft tools: define an administration workstation profile in Intune and assign it to the administrators. With a conditional access rule, it is possible to require a compliant workstation when connecting.</li>
<li>In a more traditional model, it is possible to set up an <a href="https://docs.microsoft.com/en-en/windows-server/security/credentials-protection-and-management/authentication-policies-and-authentication-policy-silos">authentication silo</a> with administrators and associated workstations. In this way, we would have a model similar to the third-party model well known to AD teams.</li>
<li>Other approaches are also possible, even if more complex: association of a certificate and a reverse proxy or even a bastion.</li>
</ul>
<ol style="text-align: justify;" start="10">
<li><strong>Keep up to date with good practices and news </strong></li>
</ol>
<p style="text-align: justify;">It cannot be repeated often enough that Office 365 is a Cloud platform and is constantly evolving. Keeping up to date will continue to increase its level of security over time.</p>
<p style="text-align: justify;">
<figure id="post-14421 media-14421" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14421 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1.png" alt="" width="1875" height="785" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1.png 1875w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-437x183.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-768x322.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-1536x643.png 1536w" sizes="auto, (max-width: 1875px) 100vw, 1875px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; The security of accounts, measures that can be counted on the fingers of one hand</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">Focus on glass breaking accounts</h2>
<p style="text-align: justify;">A good practice in the administration of the Microsoft platform is the setting up of administrator accounts that allow control over the platform to be regained in the event of an incident.  These are called glass-breaking accounts. These accounts should allow full control over the Office 365 tenant and are therefore assigned the role of Global Administrator.</p>
<p style="text-align: justify;">These accounts must be secure; however, we must not forget their specificity which consists in using them in the event of an incident. Thus, <strong>the security imposed on these accounts must remain compatible with the urgent nature of their use</strong>.  These accounts must therefore comply with the following recommendations:</p>
<ul style="text-align: justify;">
<li>To be cloud-only accounts</li>
<li>No MFA configured (or at least a third party MFA)</li>
<li>Storage of the password in a safe which only identified members of the security team or Office 365 can access</li>
<li>Setting up alerts to check that these accounts are not used outside of an incident procedure requiring the use of glass breakage.</li>
</ul>
<p style="text-align: justify;">It is also recommended not to use a specific naming convention for these accounts, they should not catch the eye of a possible attacker!</p>
<p style="text-align: justify;">
<h1 style="text-align: justify;">Conclusion</h1>
<p style="text-align: justify;">Security on Office 365 is based on technical measures to protect administrator accounts, as well as the implementation of a target administration model, which includes clear governance and processes, tools to implement this delegation of rights, and mechanisms to maintain it over time.</p>
<p style="text-align: justify;">But whatever protection measures are implemented, security rests first and foremost with the administrators of the solution. <strong>Awareness raising and controls for administrators will be essential</strong>.</p>
<p style="text-align: justify;">Administrators must bear in mind that their accounts give access to extremely sensitive information and actions: they are therefore the preferred target of hackers!</p>
<p style="text-align: justify;">As O365 is constantly evolving, each new feature introduced by Microsoft may also bring with it its share of security problems that need to be studied and taken into account. Take the opportunity to update your documentation: O365 risk analysis, service configuration, delegation model&#8230;always <strong>without forgetting to allow your administrators to train</strong>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-manage-administration-in-microsoft-365/">How to manage administration in Microsoft 365?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Migrate your work environment to Office 365 with confidence</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/</link>
		
		<dc:creator><![CDATA[GEneviEveLardon]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 17:14:42 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Digital Workplace]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[DRM]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[Licensing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[SaaS]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13945</guid>

					<description><![CDATA[<p>Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations&#8217; activities. For those who have not yet taken the plunge (mainly ETIs and the public sector),...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/">Migrate your work environment to Office 365 with confidence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Recent events have shown us that teleworking is no longer a luxury for employees, but a real necessity to ensure the continuity of organisations&#8217; activities.</p>
<p style="text-align: justify;">For those who have not yet taken the plunge (mainly ETIs and the public sector), it is essential to start thinking about Cloud collaboration and communication platforms as soon as possible. This, in order to be able to ensure continuity of service in case of force majeure (cyber attack, natural disaster or even pandemic), or even to envisage a more consequent migration.</p>
<p style="text-align: justify;">For this Digital Workplace platform, a close collaboration between the security team and the workplace will be a prerequisite!</p>
<p style="text-align: justify;">In this article, I will share with you some feedbacks on the deployment of Office 365, Microsoft&#8217;s solution that is becoming increasingly popular with the companies we support.</p>
<p style="text-align: justify;">There is a lot of interesting documentation on the subject on the Internet (&#8220;Top 10 best practices&#8221; or &#8220;3 good reasons to connect the xxx application to ensure your security&#8221;). Microsoft summarizes some of these good practices in these two articles:</p>
<ul style="text-align: justify;">
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/security-roadmap?view=o365-worldwide">Security roadmap &#8211; Top priorities for the first 30 days, 90 days, and beyond</a></li>
<li><a href="https://docs.microsoft.com/en-us/microsoft-365/admin/security-and-compliance/secure-your-business-data?view=o365-worldwide">Top 10 ways to secure Microsoft 365 for business plans</a></li>
</ul>
<p style="text-align: justify;">Today, I am not going to repeat here a non-exhaustive list of these good practices, but rather to remind you of six points of attention when opening such a service.</p>
<h2 style="text-align: justify;">1st point: Building the safety standard, a pillar of the future relationship between the safety and workplace teams.</h2>
<p style="text-align: justify;">As with any project of this type, the first step is to assess the potential of the service and see how it can meet the initial need, through the development of a business case. The possibilities offered by Office 365 are numerous: office automation, instant messaging or email, data visualization, development of applications without code, etc.</p>
<p style="text-align: justify;">As far as cybersecurity teams are concerned, there are two choices: to oppose this migration because of the risks linked to the American Cloud or to support the reflection to create new secure uses.</p>
<p style="text-align: justify;">In the vast majority of cases, the second choice is preferred. A tripartite relationship then begins, between the workplace teams, security and architects, with the aim of building a service for the users. A result of this step could be the development of a security standard, resulting from a risk analysis, defining the services used and with the associated configuration.</p>
<p style="text-align: justify;">Among the issues to be addressed are generally the following three themes:</p>
<ul style="text-align: justify;">
<li>What uses should be offered to people in a situation of mobility? With what authentication?</li>
<li>What new services to offer with the possibilities of integration with APIs?</li>
<li>How to share documents with external users?</li>
</ul>
<p style="text-align: justify;">The current trend is to provide answers with a &#8220;<a href="https://www.wavestone.com/app/uploads/2017/07/generation-cybersecurity-model.pdf">Zero Trust</a>&#8221; approach. Any deviation from the defined safety standard will have to be detected, thanks to the implementation of dashboards and supervision. The adage &#8220;Trust does not exclude control&#8221; has never made more sense.</p>
<p style="text-align: justify;">This reflection may even be an opportunity to ask fundamental questions in order to lay a coherent foundation for the working environment. For example, why leave email, a 30-year-old system, open to everything and externally block my Teams and SharePoint shares? Improving the user experience can only be achieved by standardizing security practices.</p>
<figure id="post-15076 media-15076" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15076 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1.png" alt="" width="1603" height="925" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1.png 1603w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-331x191.png 331w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-768x443.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/1-1536x886.png 1536w" sizes="auto, (max-width: 1603px) 100vw, 1603px" /></figure>
<p>&nbsp;</p>
<h2 style="text-align: justify;">2nd point: Data protection, a subject with the wind in its sails</h2>
<p style="text-align: justify;">Parallel to the construction of the service, comes the subject of the data that will be used in the tenant. For this, two simple questions must find answers (often complex).</p>
<h3 style="text-align: justify;">How do I protect my data?</h3>
<p style="text-align: justify;">Today, unstructured data protection strategies are based on <a href="https://www.riskinsight-wavestone.com/en/2018/05/classification-essential-aspect-data-protection/">a common basis</a>: the linking of data to a level of sensitivity. This correspondence leads to protection measures to be put in place:</p>
<ul style="text-align: justify;">
<li>&#8211; Encryption with keys controlled by the CSP or the organisation;</li>
<li>&#8211; Restriction of rights (or DRM);</li>
<li>&#8211; Conditional access with multi-factor authentication;</li>
<li>&#8211; Data Leakage Protection (or DLP).</li>
</ul>
<p style="text-align: justify;">In order not to over-protect data and thus avoid undermining the user experience, encryption and rights restriction can be reserved for the most critical data. Other data will still remain under control using more traditional measures, such as end-to-end encryption and exposure control.</p>
<p style="text-align: justify;">A key factor for such a project will be to turn it into a real business project, with a <a href="https://www.riskinsight-wavestone.com/en/2020/06/the-creation-of-wavestones-new-internal-awareness-program-1-2/">comprehensive awareness programme</a> dedicated to classification.</p>
<h3 style="text-align: justify;">How to remain compliant with the regulations?</h3>
<p style="text-align: justify;">An organisation may be subject to local, implementation-related and sector-specific regulations, depending on its activities.</p>
<p style="text-align: justify;">These regulations and directives in some cases impose real obstacles that need to be removed at the outset of the project: data retention, legal archiving, geolocation, judicial investigation, requests related to personal data.</p>
<p style="text-align: justify;">Let&#8217;s take a concrete example: Russia. With the law on personal data of 2015, the national regulatory authority imposes the obligation to keep the source (called primary database) of its citizens&#8217; data on Russian soil. In practice, this means that the Active Directory (primary base of corporate identities) of the Russian entity must remain Russian. From there, the information can be synchronized with the GAL (Global Access List) and Azure Active Directory.</p>
<h3 style="text-align: justify;">The thorny issue of stock management</h3>
<p style="text-align: justify;">What to do with the data already existing? This is a complex issue, especially if the opening of a Cloud collaboration solution is linked to the decommissioning of existing file servers.</p>
<p style="text-align: justify;">First of all, there is a technical question. Will the company&#8217;s network be able to support massive migrations of .pst and documents? In particular, it will not necessarily be useful to migrate data that does not comply with the retention policy.</p>
<p style="text-align: justify;">Secondly, historical data may have heterogeneous levels of sensitivity and be subject to various regulations. A trade-off will be necessary to arbitrate between local data retention, risk acceptance and a broad classification project before or after migration.</p>
<h2 style="text-align: justify;">3rd point: The Target Operating Model, guaranteeing the preservation of security over time</h2>
<p style="text-align: justify;">The operational model of a service such as Office 365 defines the responsibilities of the players (administrators, support staff, etc.) and the principles of object management. It is complementary to the security standard mentioned above, providing an operational vision.</p>
<p style="text-align: justify;">The TOM must be drawn up prior to the opening of the service and updated regularly. It must include at least the following subjects.</p>
<h3 style="text-align: justify;">A model of administration</h3>
<p style="text-align: justify;">Microsoft offers by default about 50 administration roles, not counting the RBAC roles of services (e.g. Exchange and Intune). A relevant use of these roles and custom roles will help to avoid having too many General Administrators and to follow the principle of least privilege. The implementation of Just-in-Time access will moreover make it possible to monitor the actual use of roles, while reinforcing security.</p>
<h3>A semi-architectural / semi-security community</h3>
<p style="text-align: justify;">Like any SaaS platform, Microsoft regularly upgrades the functionalities of its collaborative suite. The mission of this community will be to monitor trends, in order to master new uses and keep control of the tenant considering the evolutions.</p>
<h3 style="text-align: justify;">The life cycle of shared identities and spaces</h3>
<p style="text-align: justify;">If shared spaces (Teams, SharePoint) are not managed freely, this can lead to an explosion in the number of spaces that do not comply with the security standard. The reports of the editors of Data Discovery solutions are quite striking. To avoid this, it is necessary to establish a life cycle for shared spaces. These rules can include a naming convention, retention policies, a lifespan, principles for rights management.</p>
<p style="text-align: justify;">The establishment of a single portal for the creation of these spaces will make it possible to implement these good practices, while promoting the user experience.</p>
<p style="text-align: justify;">Similarly, a life cycle for Azure AD objects (including guest users, security groups, Office 365 groups and applications) must be defined and equipped. Here are two examples that deserve to be addressed: the delegation of APIs is left open and leaves the door open to massive data leaks; users invited to collaborate are never deleted. For this, two strategies are possible:</p>
<p style="text-align: justify;">If shared spaces (Teams, SharePoint) are not managed freely, this can lead to an explosion in the number of spaces that do not comply with the security standard. The reports of the editors of Data Discovery solutions are quite striking. To avoid this, it is necessary to establish a life cycle for shared spaces. These rules can include a naming convention, retention policies, a lifespan, principles for rights management.</p>
<p style="text-align: justify;">The establishment of a single portal for the creation of these spaces will make it possible to implement these good practices, while promoting the user experience.</p>
<p style="text-align: justify;">Similarly, a life cycle for Azure AD objects (including guest users, security groups, Office 365 groups and applications) must be defined and equipped. Here are two examples that deserve to be addressed: the delegation of APIs is left open and leaves the door open to massive data leaks; users invited to collaborate are never deleted. For this, two strategies are possible:</p>
<ul style="text-align: justify;">
<li>#1 &#8211; Creation of <em>a Custom Automation Engine</em> decorrelated from the IAM, via an in-house application developed in PowerShell ;</li>
<li>#2 &#8211; Integration of a Powershell / Graph API connector to the IAM solution in place in order to present a complete management of the objects, disregarding their direct hosting.</li>
</ul>
<h2 style="text-align: justify;">4th point: take a fresh look at the subject of user identity</h2>
<p style="text-align: justify;">Indeed, the subject of identity is a pillar of SaaS!  So, take the time to consider all the possibilities and risks of SaaS Identity Providers (or IdPs). In particular, it is unthinkable in 2020 to consider Azure Active Directory as a simple Domain Controller in the Cloud.</p>
<p style="text-align: justify;">Three approaches are possible for the source of identities accessing Office 365.</p>
<h3 style="text-align: justify;">The dissociation of identities, a quick-win but complicated from a user&#8217;s point of view</h3>
<p style="text-align: justify;">It is possible to dissociate the local and Cloud identities if the local DA is no longer available or to decorate the Cloud workspace from the historical IS. This scenario is obviously not in favour of an optimal experience, but may be a valuable asset in the event of a crisis.</p>
<h3 style="text-align: justify;">The use of local identity in the Cloud, a classic strategy</h3>
<p style="text-align: justify;">In order to reconcile security and user experience, it is necessary to use the same identity between the legacy applications and this new service. For this, three technical scenarios are available:</p>
<ul style="text-align: justify;">
<li>Identity Federation : This historic solution is widely used by large French companies that are reluctant to host passwords in the Cloud and wish to have SSO;</li>
<li>Password Hash Sync (PHS): This solution, recommended by Microsoft and the British equivalent of ANSSI, is implemented by the vast majority of Microsoft customers. This solution can also be used as a back-up when the federation service is no longer available;</li>
<li>Direct Authentication (Password Through Authentication or PTA): This solution provides the best user experience but has the disadvantage of passing the password through Azure AD.</li>
</ul>
<h3 style="text-align: justify;">Migrating one&#8217;s identity repository to the Cloud, a longer-term vision</h3>
<p style="text-align: justify;">Before or after migration, it may be appropriate to consider fully migrating the source of identities into the Cloud (whether Azure AD or a third party solution), in order to take advantage of the new possibilities. There are still several prerequisites that need to be lifted, such as printer, GPO and terminal management.</p>
<h2 style="text-align: justify;">5th point: Gradually open up services to encourage controlled adoption</h2>
<p style="text-align: justify;">It is always easier to open a new service than to go back for safety reasons. Massively opening the different services of the collaborative suite has the advantage of offering a maximum number of uses cases but can cause several side effects.</p>
<p style="text-align: justify;">First of all, services that are not officially supported and left in the hands of users for testing purposes represent a definite risk. They need to be configured and hardened. In some cases, it may even be preferable to disable the corresponding licenses.</p>
<p style="text-align: justify;">Secondly, a controlled launch of the tools will help control costs during the first months or years of the transition. As Microsoft licences represent a certain load, it is possible to optimize unused licences.</p>
<p style="text-align: justify;">Change management is also a key aspect to consider; to promote the user experience, of course, but also to promote data security. It is essential to have a clearly defined roadmap and user journey. Accompanied adoption will lay the foundations for proper governance of shared spaces and data (both in terms of exposure and protection).</p>
<p style="text-align: justify;">It will be useful to consider creating a community of evangelists and users in order to maintain momentum in the adoption of the new functionalities brought by Microsoft. A uservoice system could be an asset; the ideal would be to listen to the needs of users and prioritise future openings.</p>
<h2 style="text-align: justify;">6th and last point: Licences, the lifeblood of Office 365 and its security</h2>
<p style="text-align: justify;">SaaS solutions are generally subject to a monthly invoiced licensing model. The choice of Microsoft 365 licences must be the result of a global reflection. It cannot remain the prerogative of workplace teams and be determined solely by the need for collaboration and communication.</p>
<p style="text-align: justify;">Indeed, the choice of licensing level will condition the security strategy of the tenant. This choice will have a wider impact on the strategy for securing the work environment. Indeed, Microsoft is increasingly positioning itself as a challenger to security solution providers, being the only one to offer such a complete suite.</p>
<p style="text-align: justify;">The <em>licensing</em> of security options must be dealt with at the start of the project and at each renewal. It will be cheaper to include a licensing package from the outset than to order AAD P1 licences on an emergency basis to cover an unforeseen need for conditional access.</p>
<p style="text-align: justify;">In this strategy to be defined, it may be appropriate to target individuals to adapt the security requirements to their profile (VIP, admin, medical population, etc.).</p>
<p style="text-align: justify;"><em>This approach, presented here for Office 365, can be generalised to any SaaS (Solution as a Service) service, or even IaaS (Infrastructure as a Service) or PaaS (Platform as a Service) service.</em></p>
<p style="text-align: justify;"><em> </em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/how-to-migrate-your-work-environment-serenely-to-office-365/">Migrate your work environment to Office 365 with confidence</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
