<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>control plane - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/control-plane-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/control-plane-2/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 31 Jan 2025 15:11:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>control plane - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/control-plane-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Enterprise Access Model (2/2): What are the solutions to secure the Control Plane </title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Fri, 31 Jan 2025 15:11:04 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[CICD]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[compromise]]></category>
		<category><![CDATA[control plane]]></category>
		<category><![CDATA[IT support]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25229</guid>

					<description><![CDATA[<p>In the first article of this series, we explored the foundation of Microsoft’s Enterprise Access Model (EAM), focusing on the critical task of scoping the Control Plane to safeguard cloud administration. We delved into the evolving security landscape, where the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/">Enterprise Access Model (2/2): What are the solutions to secure the Control Plane </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">In the first article of this series, we explored the foundation of Microsoft’s Enterprise Access Model (EAM), focusing on the critical task of scoping the Control Plane to safeguard cloud administration. We delved into the evolving security landscape, where the traditional AD 3-tiers model is no longer sufficient for the complexities and dependencies of cloud environments. The shift to the cloud has introduced new risks, particularly the global compromise originating from a single weak point of the Control Plane. Then, we emphasized the importance of identifying and isolating key components whose compromise could lead to a global compromise of Entra ID. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In this second article, we will analyze practical attack scenarios that threaten the Control Plane and provide actionable recommendations to mitigate these risks. Specifically, we will explore three common attack scenarios that pose significant threats to the control plane: IT Support compromise, Control Plane Administrator Laptop compromise and CI/CD compromise. By understanding these attack vectors and implementing robust security measures, you can significantly enhance your cloud environment&#8217;s resilience against potential compromises.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="auto">IT support compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Imagine a scenario where the account of a member of the IT support is compromised. This might occur through a phishing attack, social engineering, or even a credential stuffing attempt. Such accounts often can reset passwords, including those of very high-privilege users, like Application Administrator or an Azure’s </span><i><span data-contrast="auto">Owner</span></i><span data-contrast="auto"> at root level, thereby gaining unauthorized access to critical resources from Entra ID to the Cloud to On-premises to SaaS.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-25220" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario.jpg" alt="1-IT-support-compromise-scenario" width="930" height="417" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario.jpg 930w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario-426x191.jpg 426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario-71x32.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/1-IT-support-compromise-scenario-768x344.jpg 768w" sizes="(max-width: 930px) 100vw, 930px" /></span></p>
<p style="text-align: justify;"><span data-contrast="auto">This type of attack illustrates a critical point we discussed in the first article: the need to scope and isolate the control plane effectively. The help desk, while essential for everyday operations, must be rigorously segregated from high-privilege administrative functions. The lack of such separation can allow an attacker to pivot from a compromised help desk account to a Global Admin role.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To mitigate this risk, organizations must implement a series of strategic defenses:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">First, isolating control plane accounts from those managed by IT support is essential. This ensures that even if a help desk account is compromised, it cannot be used to access or manipulate high-privilege accounts. </span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Second, using cloud-only accounts dedicated to control plane tasks reduces the likelihood of legacy systems being exploited as an entry point. </span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Third, coupling these accounts with phishing-resistant Multi-Factor Authentication (MFA), Just-In-Time admin (JIT), robust identity governance and conditional access policies, strict workstation conformity creates a multi-layered defense that significantly diminishes the risk of such an attack.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">This scenario underscores the importance of viewing every account as a potential threat vector. By enforcing strict segregation and controls, you can ensure that your control plane remains secure, even if a lower-tier account is compromised.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="auto">Control Plane Admin’s Laptop compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Now, consider </span><span data-contrast="auto">a situation where the </span><span data-contrast="auto">attacker successfully compromises Intune’s </span><span data-contrast="auto">Mobile Device Manager (MDM) admin account</span><span data-contrast="auto">. With this access, the attacker gains control over Intune admin portal, allowing him to manipulate the laptop of a control plane admin. He can deploy malicious configurations, install backdoors, or directly connect to the admin’s laptop (Remote Help). This access turns the admin’s laptop into a powerful tool for further exploitation, granting the attacker the ability to execute commands, exfiltrate sensitive data, and manipulate cloud resources without the need for additional sophisticated hacking.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img decoding="async" class="aligncenter size-full wp-image-25222" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario.jpg" alt="2-Control-plane-administration-workstation-compromise-scenario." width="925" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario.jpg 925w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario-427x191.jpg 427w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario-71x32.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/2-Control-plane-administration-workstation-compromise-scenario-768x344.jpg 768w" sizes="(max-width: 925px) 100vw, 925px" /></span></p>
<p style="text-align: justify;"><span data-contrast="auto">This scenario reminds us of a key principle from the first article: cloud security must be approached holistically. It is not just about securing identities but also ensuring that the devices used to access the Control Plane are secured. In this case, the Control Plane admin’s laptop becomes a critical asset that, if compromised, could undermine even the most sophisticated cloud defences.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To prevent such an outcome, organizations need to integrate admin workstations in the Control Plane. At a minimum, devices used for administrative tasks must be tightly controlled through dedicated MDM policies, ensuring strict access controls, encryption, and continuous monitoring. However, for higher-risk scenarios, leveraging Privileged Access Workstations (PAWs) is essential. PAWs are isolated, hardened machines dedicated solely to administrative activities. They operate under a far stricter security regime than standard devices—limited internet access, dedicated management, and enhanced monitoring—ensuring that they cannot easily become a tool for attackers.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This scenario demonstrates that endpoint security is inseparable from cloud security. By securing the very devices that control your cloud infrastructure, you reduce the chances of a breach originating from compromised endpoints, ensuring that your Control Plane remains protected against even the most sophisticated attacks.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<h2><b><span data-contrast="auto">CI/CD compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As cloud environments rely heavily on automation, CI/CD pipelines for managing infrastructure become prime targets for attackers. Imagine a scenario where an attacker gains access to a DevOps engineer’s account via phishing or credential theft. With this foothold, he pushes malicious Infrastructure as Code (IaC) change into a Git repository, knowing this will trigger an automated Azure pipeline. The pipeline validates, plans, and deploys the infrastructure on Azure, leading to the destruction or alteration of key Azure resources, i.e. the foundations of the Landing Zone. Alternatively, the attacker modifies the Azure Pipeline’s YAML configuration. By doing so, he causes the pipeline to leak a service principal secret in the logs or debug console, which is then used to make unauthorized Graph API calls. Abusing the overprivileged identity, the attacker can escalate its privilege, compromising Entra ID identities or Office 365 accounts. Runners also play a crucial role in the CICD pipeline. They are agents responsible for executing jobs in the pipeline. They can be hosted and maintained by the Cloud Provider or hosted on-premises. As with any server, their compromise can be used as a pivot point to bounce back to the Landing Zone (e.g., token stealing) or other associated services.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img decoding="async" class="aligncenter size-full wp-image-25224" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario.jpg" alt="3-CICD-compromise-scenario." width="932" height="387" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario.jpg 932w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario-437x181.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/3-CICD-compromise-scenario-768x319.jpg 768w" sizes="(max-width: 932px) 100vw, 932px" /></span></p>
<p style="text-align: justify;"><span data-contrast="auto">This scenario illustrates interconnectedness of cloud security. The CI/CD pipeline, often seen as a back-office function, is, in reality, deeply integrated with the Control Plane. Its compromise can lead to widespread, devastating consequences to the very foundation of your cloud operations.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To protect against such threat, it is crucial to isolate the Control Plane’s pipeline whose purpose is to build the Landing Zone from project pipelines. Then, one should apply the principle of least privilege, ensuring that accounts and runners within the pipeline have only the permissions they need to perform their tasks. For example, to limit runner permissions we can use federated identity and request OpenID Connect (OIDC) tokens, which provide scoped and temporary access to Cloud Services like Azure. Additionally, adopting automated security practices such as Configuration as Code (CaC) or Policy as Code (PaC), can help reduce human error and ensure consistent security across your deployments.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In cloud security, every process and every tool must be viewed through the lens of potential risk. The CI/CD pipeline is no exception. By securing this critical component, you not only protect your control plane but also ensure the stability and security of your entire cloud infrastructure. This holistic approach to cloud security is what will ultimately keep your operations running smoothly, even in the face of sophisticated attacks.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Synthesis</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">In this article, we have examined three attack scenarios that threaten the security of the control plane in cloud environments: IT support compromise, Control Plane Admin’s laptop compromise, and CI/CD pipeline compromise. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Each of these scenarios highlights the importance of a multi-layered security approach that includes both technical and organizational measures. We propose a four-step strategy designed to design your Control Plane and secure it against potential attacks:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 1: define what is systemic for your infrastructure:</span></b><span data-contrast="auto"> identify the critical components and accounts within your control plane that, if compromised, could lead to a global disruption.</span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 2: assess your current risk with a security audit:</span></b><span data-contrast="auto"> conduct regular security audits to evaluate the current state of your control plane security. This will help you identify vulnerabilities and prioritize remediation efforts.</span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 3: define a roadmap to isolate and secure the assets most at risk:</span></b><span data-contrast="auto"> based on your audit findings, develop a clear roadmap for securing the most critical assets. This should include timelines, resource allocation, and specific actions to mitigate identified risks.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="5" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Step 4: prepare for cloud eraser scenarios:</span></b><span data-contrast="auto"> consider worst-case scenarios where entire sections of your cloud infrastructure might be compromised or disabled. Develop contingency plans and ensure that backups and disaster recovery processes are in place.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">By following these recommendations, you can build a robust defense against potential threats to your control plane, ensuring that your cloud environment remains secure and resilient.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">Thank you to <strong>Louis CLAVERO</strong> for contributing to this article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/">Enterprise Access Model (2/2): What are the solutions to secure the Control Plane </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-2-2-what-are-the-solutions-to-secure-the-control-plane/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enterprise Access Model (1/2): How to scope your Control Plane to secure your Cloud Administration and prevent a global Cloud compromise</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Mon, 27 Jan 2025 06:38:19 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud administration]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[control plane]]></category>
		<category><![CDATA[enterprise access model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25214</guid>

					<description><![CDATA[<p>  This article is the first of a series of 2, tackling the implementation of the Enterprise Access Model, an administration model proposed by Microsoft to secure the administration of Cloud environments.   Today, most companies use public cloud to host...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/">Enterprise Access Model (1/2): How to scope your Control Plane to secure your Cloud Administration and prevent a global Cloud compromise</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"> </p>
<p style="text-align: justify;"><i><span data-contrast="auto">This article is the first of a series of 2, tackling the implementation of the Enterprise Access Model, an administration model proposed by Microsoft to secure the administration of Cloud environments. </span></i><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Today, most companies use public cloud to host numerous workloads from business to functional services. Although this brings benefits, the Cloud also introduces new paradigms, which need to be understood clearly in order to be secured.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Historically, enterprises have relied on a 3-tier model for securing Active Directory environments. This model segments the network into three distinct tiers: Tier 0 for highly sensitive systems and data, Tier 1 for server administration, and Tier 2 for end-user workstations and devices. While this model has proven effective in on-premises environments, the shift to cloud-based infrastructures requires a reevaluation of its applicability.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This article delves into a recent, concerning trend: the global compromise of Entra ID, originating from the compromise of a helpdesk account. Such an attack can have severe repercussions, even more so than an AD Domain Administrator compromise. We will explore the mechanisms behind these attacks, their implications, and, most importantly, how we should protect against this kind of privilege escalation and implement an adapted and secured administration model.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2><b><span data-contrast="auto">Understanding Entra ID, Active Directory, and Azure Permissions</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As shown in </span><span data-contrast="auto">Figure 1</span><span data-contrast="auto">, Active Directory and Entra ID (formerly Azure Active Directory) are two Identity services with different structural properties and IAM protocols. While Entra ID focuses on identity and access management across both cloud and on-premises environments, providing authentication and user management, Azure permissions extend to the broader management of cloud infrastructure and services. Understanding the distinctions and interconnections between these tools is essential for maintaining robust security and effective access control in modern enterprise environments.</span><span data-ccp-props="{}"> </span><i><span data-contrast="none"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25202" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID.jpg" alt="Figure 1: Active Directory and Entra ID key differences" width="538" height="300" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID.jpg 538w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID-343x191.jpg 343w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-1-Differences-cles-entre-Active-Directory-et-Entra-ID-71x39.jpg 71w" sizes="auto, (max-width: 538px) 100vw, 538px" /></span></i></p>
<p style="text-align: center;"><span data-ccp-props="{}"> <i>Figure </i><i>1</i><i>: Active Directory and Entra ID key differences</i></span></p>
<p> </p>
<p style="text-align: justify;"><span data-contrast="auto">Between Active Directory, Entra ID, and Azure- each manages its own permission model:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Aptos" data-listid="26" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Active Directory uses a unified permission model for all its objects, from users to servers.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="26" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Entra ID uses Role-Based Access Control (RBAC) to manage its tenant&#8217;s objects (e.g., users, devices, applications).</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Aptos" data-listid="26" data-list-defn-props="{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Aptos&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Azure Resource Manager (RM) uses RBAC to manage Azure resources</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">However, there is a bridge between Entra ID and Azure RM thanks to the single tenant’s relationship to an Azure organization: the Entra ID’s Global Admin role is assigned by default the User Access Administrator role in the Azure RM service. As a result, it can grant itself full permissions in Azure. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Although there is a link between Azure and Entra ID, it&#8217;s important to remember that the roles in Entra ID and Azure RM can be assigned independently. For example, a standard Entra ID user with very limited permissions on Entra ID can hold the highest privileges in Azure RM, which is a critical point of vulnerability exploited in attacks.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Privilege escalation in Entra ID can lead to an extensive compromise of Azure RM (including all resources and infrastructures), Microsoft 365, workstations, Windows servers, cloud networks, and more.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The most privileged roles in both systems are:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Entra ID</span></b><span data-contrast="auto">: Global Administrator</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="24" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Azure RM</span></b><span data-contrast="auto">: Owner (which can be scoped from Management Groups down to resources)</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">These significant differences mean that the concepts from the traditional AD 3-tier model cannot be directly applied to cloud environments. We must rethink and adapt these concepts to ensure they are relevant and effective in cloud-based contexts, particularly by adequately addressing the specific requirements and risks associated with cloud environments.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559685&quot;:1440}"> </span></p>
<h2><b><span data-contrast="auto">A real-life global Entra ID compromise</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">To focus on Cloud Administration compromise and privilege escalation, a small number of hypotheses will be taken:</span><span data-ccp-props="{}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The victim has an Entra ID tenant as Identity Provider.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The victim</span><span data-contrast="auto"> uses Intune to manage its entire workstation fleet</span><span data-contrast="auto">.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The victim has an Azure subscription for its Virtual Desktop Infrastructure activities.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">A helpdesk account is compromised (the source of the attack is not relevant, but it is important to note that this is a likely scenario that could have been the result of several different compromise like phishing, credential theft, workstation compromise, social engineering, etc.).</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h3><b><span data-contrast="auto">1 Compromising a helpdesk account</span></b><span data-ccp-props="{&quot;335559685&quot;:1066,&quot;335559739&quot;:240,&quot;335559991&quot;:709}"> </span></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Following our last hypothesis, the attacker has gained control of a helpdesk account, that can reset passwords and MFA. </span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">2 Initial Attempt to Reset Global Administrator Account</span></b></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The attacker initially attempts to reset the Global Administrator account, seeking the quickest path to becoming the Global Administrator of Entra ID.</span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">This action is blocked by default by Microsoft. The Global Administrator role is a “privileged role”, and only specific privileged roles are authorized to reset its password or modify its attributes.</span> <span data-contrast="auto">Microsoft updates </span><a href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference"><span data-contrast="none">here</span></a><span data-contrast="auto"> its list of privileged built-in Entra ID roles.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">3 Targeting a High-Value Standard User Account</span></b></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Restricted to resetting standard Entra ID user passwords, the attacker identifies a user with the username &#8220;VDI Admin”, who is the Owner of an Azure RM subscription used for workstation administration services.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Despite MFA being enabled on the account, the attacker successfully resets both the password and MFA mechanisms, gaining access to the account.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">4 Searching the available subscription</span></b><span data-ccp-props="{}"> </span></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">With the VDI Admin password reset, the attacker logs in and accesses the subscription. Through reconnaissance, they discover access to a key vault containing credentials for a service account.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">The service account is identified as having the &#8220;Intune Administrator&#8221; role in Entra ID.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">5 Utilizing Intune Administrator Privileges</span></b><span data-ccp-props="{}"> </span></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">The attacker logs in as the Intune Administrator, gaining permissions related to workstation administration, including the ability to run scripts on any workstation.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1"><span data-contrast="auto">They deploy a script on the Global Administrator’s workstation to extract authentication cookies from the Global Administrator’s browser.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h3><b><span data-contrast="auto">6 Compromising the Global Administrator Account</span></b></h3>
<ul style="text-align: justify;">
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">The attacker obtains the Global Administrator’s authentication cookies and uses them on their own workstation to impersonate the Global Administrator.</span><span data-ccp-props="{}"> </span></li>
<li data-leveltext="-" data-font="Tahoma" data-listid="21" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1"><span data-contrast="auto">This grants the attacker control over the entire Microsoft Entra ID tenant, which includes compromising the Microsoft365 tenant, the Azure RM environments, and all other Microsoft cloud-based tools relying on Entra ID.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25204" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure-.jpg" alt="Figure 2: A global Cloud compromise path " width="573" height="358" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure-.jpg 573w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure--306x191.jpg 306w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-2-Chemin-de-compromission-globale-du-Cloud-Azure--62x39.jpg 62w" sizes="auto, (max-width: 573px) 100vw, 573px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">2</span></i><i><span data-contrast="none">: A global Cloud compromise </span></i><i><span data-contrast="none">path</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">By following these steps, the attacker, beyond being able to compromise the entire cloud infrastructure, can deeply affect a company&#8217;s business through unauthorized access to emails &amp; documents, backups, endpoints and corporate network. This attack demonstrates the critical importance of securing high privilege accounts that have permissions that could lead to a global compromise. </span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;134245418&quot;:true}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25206" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane-.jpg" alt="Figure 3 Impact of a compromise at the Control Plane level " width="599" height="288" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane-.jpg 599w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane--397x191.jpg 397w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-3-Impact-dune-compromission-du-Control-Plane--71x34.jpg 71w" sizes="auto, (max-width: 599px) 100vw, 599px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">3: </span></i><i><span data-contrast="none">Impact of a compromise at the Control Plane level</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">How to ensure this does not happen: Implement the Enterprise Access Model and scope your Control Plane</span></b><span data-ccp-props="{}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As discussed in the first part, cloud directories, particularly Entra ID, exhibit key differences from Active Directory. Consequently, the traditional three-tier model requires adaptation to be fully effective in cloud environments. To address these challenges, Microsoft has introduced a new administration framework specifically designed for cloud environments: </span><a href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model"><span data-contrast="none">the Enterprise Access Model</span></a><span data-contrast="auto">.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-25208" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model.jpg" alt="Figure 4: The Enterprise Access Model " width="600" height="335" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model.jpg 600w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model-342x191.jpg 342w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/Figure-4-LEnterprise-Access-Model-71x39.jpg 71w" sizes="auto, (max-width: 600px) 100vw, 600px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">4</span></i><i><span data-contrast="none">: The Enterprise Access Model</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">While there are some modifications, the core concept remains the same: sensitive resources must be isolated to ensure that a compromise in one plane (formerly tier) does not lead to a compromise in another. This leads us to a crucial question: how should we scope our Control Plane within our Information System to effectively isolate it and mitigate the risks of a global compromise?</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The answer lies in identifying the systemic components within our Information System — those whose compromise could lead to a widespread breach. Losing one project is far less critical than a global compromise of the entire Information System.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In our cloud environment, numerous components interact to support projects, from CI/CD infrastructure and deployment pipelines to various IAM tools (such as Identity Providers like AD, Entra ID or Okta, IGA, etc.), along with cross-functional security tools (like EDR, Bastion, and MDM for example). While these are generic components likely present in many systems, there are also numerous environment-specific ones to consider.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">We must assess the impact of compromising high-privilege accounts within these components. For instance, if an attacker gains control of a high-privilege account for the CI/CD infrastructure, they could potentially alter the CI/CD processes and/or run a specific pipeline to deploy unauthorized changes in the cloud, which would allow them to gain global access. Thus, these high-privilege CI/CD accounts should be part of the Control Plane. Similarly, consider the EDR solution: if a high-privilege administrator can execute scripts across all workstations, potentially stealing authentication cookies, accessing critical data, or rendering all workstations inoperable, then this high-privilege account must also be included in the Control Plane.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">By carefully scoping and securing our Control Plane, we can significantly reduce the risk of a global compromise within our Information System.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><b><span data-contrast="auto">Synthesis</span></b><span data-ccp-props="{&quot;335559685&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">As we have seen, the risk of global compromise in a Cloud environment is significant. While cloud computing offers enhanced flexibility, resilience, and cost optimization, it also introduces new paradigms and operational methodologies that must be mastered to ensure security.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The traditional 3-tier model from the on-premises world, particularly from Active Directory, is not suited for organizing administration in the cloud. To address this, Microsoft has introduced the Enterprise Access Model (EAM). This model expands the 3 tiers into five distinct planes, with the most critical being the Control Plane. However, just as with the 3-tier model, isolation measures are crucial in the EAM, requiring the identification of critical components and high-privilege accounts within your Information System as a top priority for cloud security.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The next article in this series will provide concrete examples of attack scenarios that can lead to a global compromise of cloud environments. It will also include security recommendations to enhance cloud administration and prevent such risks from becoming security incidents.</span><span data-ccp-props="{}"> </span></p>
<p> </p>
<p> </p>
<p> </p>
<p style="text-align: justify;"><span data-ccp-props="{}"> Thank you to <strong>Louis CLAVERO</strong> for contributing to this article.</span></p>
<p> </p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/">Enterprise Access Model (1/2): How to scope your Control Plane to secure your Cloud Administration and prevent a global Cloud compromise</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/enterprise-access-model-1-2-how-to-scope-your-control-plane-to-secure-your-cloud-administration-and-prevent-a-global-cloud-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Protecting the Control Plane: Critical Stakes in Cloud Security </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/#respond</comments>
		
		<dc:creator><![CDATA[Etienne Lafore]]></dc:creator>
		<pubDate>Fri, 17 May 2024 09:35:12 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[control plane]]></category>
		<category><![CDATA[enterprise access model]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23154</guid>

					<description><![CDATA[<p>In the age of hybrid information systems, securing cloud resources is a cornerstone of enterprise security. Faced with constantly evolving threats and increasingly complex IT environments, companies are seeking more effective and scalable cloud information systems and access management solutions.  ...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/">Protecting the Control Plane: Critical Stakes in Cloud Security </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="auto">In the age of hybrid information systems, securing cloud resources is a cornerstone of enterprise security. Faced with constantly evolving threats and increasingly complex IT environments, companies are seeking more effective and scalable cloud information systems and access management solutions. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To meet this challenge, Microsoft has defined the </span><a href="https://learn.microsoft.com/en-us/security/privileged-access-workstations/privileged-access-access-model"><i><span data-contrast="none">Enterprise Access Model</span></i></a><span data-contrast="auto">, offering a new approach to identity and access management adapted to the reality of the cloud. This model promises to redefine how companies manage access to digital resources, whether within cloud solutions like Azure, Office 365 applications, or other strategic services. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This article proposes a methodology and examples for implementing the Enterprise Access Model and defining criteria for assigning roles to the management plane or control plane. The article also aims to highlight the risks associated with poor implementation of the model, with concrete examples. Finally, it lists several best practices for configuring and managing the access model to help mitigate these risks.   </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Is the tiered model unsuitable for access management in the cloud? </span></h2>
<p style="text-align: justify;" aria-level="1"><i><span data-contrast="none">(For more information on this subject, please consult wavestone’s white paper available </span></i><a href="https://www.wavestone.com/app/uploads/2021/10/AD-Security-publications-V1EN_1.0-opti.pdf"><i><span data-contrast="none">here</span></i></a><i><span data-contrast="none">)</span></i><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The tiering security model, applied to Active Directory, is based on the fundamental principle of segmenting privileged accounts into 3 different layers, known as </span><b><span data-contrast="auto">tiers</span></b><span data-contrast="auto">. The aim is to ensure that, if a resource or account in a tier is compromised, the higher-trusted tiers remain preserved, thus avoiding any potential propagation of the compromise to the entire system.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23124 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art.jpg" alt="" width="457" height="418" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art.jpg 457w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art-209x191.jpg 209w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/1art-43x39.jpg 43w" sizes="auto, (max-width: 457px) 100vw, 457px" /></span></p>
<ul>
<li data-leveltext="o" data-font="Courier New" data-listid="6" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Courier New&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;o&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><i><span data-contrast="auto">Tier 0</span></i><span data-contrast="auto"> is the most critical tier, covering all the infrastructure components managing the company&#8217;s AD Domain Controllers.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><i><span data-contrast="auto">Tier 1 </span></i><span data-contrast="auto">typically comprises the company&#8217;s applications and the servers that host them.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><i><span data-contrast="auto">Tier 2</span></i><span data-contrast="auto"> covers everything that revolves around the user environment.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">While the tiering model can be used to secure the Active Directory infrastructure, it encounters significant challenges when applied in a cloud context. One of the major challenges lies in the very nature of the cloud, where access and administration are generally carried out via consoles exposed on the Internet, unlike in on-premises environments. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Microsoft has therefore defined a new model, the “Enterpise Access Model”, to take account of these new challenges. This article will look at how this model can be effectively implemented in a Microsoft cloud environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">The Enterprise Access Model: a new model adapted to the needs of the cloud</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">One of the key features of the Enterprise Access Model is the implementation of a privileged access mode for certain critical tasks and the management of a multitude of critical resources, either on-premises or in the Cloud. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23129 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis.jpg" alt="" width="840" height="452" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis.jpg 840w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis-355x191.jpg 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/2bis-768x413.jpg 768w" sizes="auto, (max-width: 840px) 100vw, 840px" /></span></p>
<p style="text-align: center;"><span data-contrast="none">Source  : </span><span data-contrast="none">https://learn.microsoft.com/en-us/security/privileged-access-workstations/privilegedaccess-access-model</span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Evolution of purpose and scope  </span></p>
<p style="text-align: justify;"><span style="text-decoration: underline;">Tier 0 -&gt; control plane   </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Control plane: includes management of all aspects of access control, identity management, and all elements that could jeopardize the tenant. </span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span style="text-decoration: underline;">Tier 1 divided into 2 parts   </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Management plane: management of the application infrastructure base, such as servers or configuration of PaaS (Platform as a Service) services. </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Data/Workload Plane: management and configuration of applications, resources, and APIs. </span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span style="text-decoration: underline;">Tier 2 divided into 2 parts   </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">User access: includes B2B, B2C, and public access scenarios. </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">App access: takes into account the attack surface of application-to-application exchanges via APIs.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Which accounts should be included in the control plane? </span></b><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To define the accounts in the control plane, this article proposes an approach based on the criticality of the roles and the impact they can have on the cloud environment. If the role could have a systemic impact on the enterprise (destruction of a large part of the cloud and backups, for example), it should be managed in the control plane. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Make sure to carry out a complete analysis, as some common roles, such as helpdesk administrator, with no critical privileges on direct resources, can take control of accounts that do!  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23158 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN.png" alt="" width="855" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN.png 855w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN-363x191.png 363w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/3artEN-768x404.png 768w" sizes="auto, (max-width: 855px) 100vw, 855px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Strategy based on criticality</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p aria-level="1"> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Optimizing security: applying the Enterprise Access Model to the Microsoft cloud  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:240,&quot;335559739&quot;:0}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">At the heart of Microsoft&#8217;s cloud ecosystem are roles, an essential component that governs how users and services interact with cloud resources.   </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This section takes a deep dive into this crucial aspect of identity and access management in the cloud. The section will explain what Azure roles are, how they work, and why good management is crucial to the security and performance of a company’s cloud infrastructure.   </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;"><b><span data-contrast="auto">Organization of roles in Microsoft clouds: </span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Roles are a set of permissions that control who can access Azure resources and what actions they can perform. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23148 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art.png" alt="" width="657" height="527" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art.png 657w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art-238x191.png 238w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/4art-49x39.png 49w" sizes="auto, (max-width: 657px) 100vw, 657px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Roles in Microsoft Cloud </span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It&#8217;s important to differentiate between three types of roles: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><span data-contrast="auto">Azure roles are dedicated to accessing and managing Azure resources. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Microsoft Entra roles are used to manage resources in the Microsoft Entra ID directory.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Microsoft Entra roles used to manage associated Office 365 resources. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">It&#8217;s important to note that these roles can be </span><b><span data-contrast="auto">interconnected</span></b><span data-contrast="auto">. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3> </h3>
<h3 style="text-align: justify;"><b><span data-contrast="auto">Azure roles</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">Azure roles are organized according to the principle of Role-Based Access Control (RBAC), which is an integrated feature of Microsoft&#8217;s Azure cloud platform.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">They are dedicated to the management and access of Azure resources, and encompass elements such as Azure virtual machines, SQL databases, services, as well as application services such as web apps.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Azure role assignment is a key step in implementing access management in a cloud environment. It determines who has access to which resources, and what privileges are granted.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">‘Security Principals’, on Azure, refers to the entities, including users, groups, or services, to which permissions are assigned. There are several types of security principals on Azure, which may or may not be human.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23135 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art.jpg" alt="" width="703" height="213" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art.jpg 703w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art-437x132.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/5art-71x22.jpg 71w" sizes="auto, (max-width: 703px) 100vw, 703px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Security Principal</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Scope, when assigning roles in Azure, is crucial in determining where permissions apply. It can be specified at different levels, as shown in the diagram below:  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23137 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art.jpg" alt="" width="644" height="366" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art.jpg 644w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art-336x191.jpg 336w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/6art-69x39.jpg 69w" sizes="auto, (max-width: 644px) 100vw, 644px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">The scope of RBAC</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To better understand role assignment as well as the strategy based on the criticality of roles, and their impact on the cloud in terms of their placement in the control plane, this article proposes two concrete examples:</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23139 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art.jpg" alt="" width="962" height="527" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art.jpg 962w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art-349x191.jpg 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/7art-768x421.jpg 768w" sizes="auto, (max-width: 962px) 100vw, 962px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Strategy application example</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In example 1, a user is assigned the owner role (allowing him to read, write, and assign roles to other users throughout the scope to which the role is assigned), on the scope of a management group. In this example, the owner role is critical because the scope is very high-level: it will therefore have full authority over all subscriptions, resource groups, and resources in its management group. This is why the owner role is in the control plane. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In example 2, a group is assigned the contributor role (allowing it to read and write to the entire scope to which the role is assigned), on the scope of a subscription. In this example, the impact is limited to one subscription, and therefore probably not systemic for the enterprise. This is why, in this case, the contributor role is in the management plane. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The key takeaway from these examples is that the criticality of a role is not only related to its permissions but also to the scope over which it is assigned.    </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Segmentation between Microsoft Entra ID and Azure? The case of global admin </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Microsoft Entra ID and Azure roles are defined independently: in Microsoft Entra ID and Azure RBAC respectively. This means that authorizations assigned to Microsoft Entra ID roles do not provide access to Azure resources, and vice versa. However, as global admin within Microsoft Entra ID, they can grant themselves access to all associated Azure subscriptions and management groups.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">When the global admin grants themselves access to Azure, they are assigned the role of user access administrator in the Azure management group root scope. This enables them to view all resources and grant themselves access to any subscription or management group in the directory. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It is therefore important to control who and how many people are assigned the global admin role, and to manage it in the </span><i><span data-contrast="auto">Control Plane</span></i><span data-contrast="auto">. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23141 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art.jpg" alt="" width="673" height="546" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art.jpg 673w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art-235x191.jpg 235w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/8art-48x39.jpg 48w" sizes="auto, (max-width: 673px) 100vw, 673px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Global Admin Azure</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Privilege escalation through password reset and MFA </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This method relies on exploiting privileges that allow passwords to be reset for user accounts or systems. Attackers often target specific roles that have this privilege because, once compromised, they can reset the passwords of more sensitive accounts and thus gain access to take control of critical systems.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The table below highlights the Microsoft Entra ID roles that can reset the password of any subscription owner.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Note that security measures such as MFA (Multi-Factor Authentication) can reduce this risk, as detailed in the rest of this article.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23143 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art.jpg" alt="" width="930" height="379" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art.jpg 930w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art-437x178.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/9art-768x313.jpg 768w" sizes="auto, (max-width: 930px) 100vw, 930px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Can a user with a role in column 1 reset the password of the user in row 1?  </span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto"><span style="text-decoration: underline;">Attack scenario 1:</span> </span></b><span data-contrast="auto">Escalation of privilege to an Azure role from a Microsoft Entra ID role: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A helpdesk administrator, which is a very common role in the enterprise, can reset the password of a subscription owner and thus access Azure from within Microsoft Entra ID. As a result, segmentation between the two worlds is no longer guaranteed. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto"><span style="text-decoration: underline;">Attack scenario 2:</span> </span></b><span data-contrast="auto">Escalation of privilege to a Microsoft Entra ID role from a Microsoft Entra ID role: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Within Microsoft Entra ID, privilege escalation from a helpdesk administrator to an Authentication Administrator is possible.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These </span><b><span data-contrast="auto">two scenarios</span></b><span data-contrast="auto"> are no longer possible if MFA is set up, as the password alone cannot be used to authenticate to the account. In most cases, this security measure covers this type of privilege escalation. However, certain roles have the upper hand on both parameters, i.e. password reset and MFA setting, and it is not uncommon for user support to have this ability.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="aligncenter wp-image-23145 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art.jpg" alt="" width="885" height="346" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art.jpg 885w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art-437x171.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art-71x28.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/10art-768x300.jpg 768w" sizes="auto, (max-width: 885px) 100vw, 885px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Does a user with a role in column 1 have rights on the MFA?</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p style="text-align: justify;"><span style="text-decoration: underline;"><b>Attack scenario 3: </b></span><span data-contrast="auto">Privilege escalation from an authentication administrator to Azure or Microsoft Entra ID : </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Here the authentication administrator is a role that can manage and reset the authentication methods of users who do not have an administrator role. In addition to being able to control the MFA, this role can also modify or reset the passwords of a large proportion of users. The tables above show that it can take on the role of a helpdesk administrator or a subscription owner.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">These roles need to be managed in the control plane to avoid privilege escalation scenarios and maintain the watertight seal between Microsoft Entra ID and Azure.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p> </p>
<h2 style="text-align: justify;" aria-level="1"><span data-contrast="none">Reinforce your security, some examples of additional security measures</span></h2>
<p style="text-align: justify;" aria-level="2"><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></p>
<h3 style="text-align: justify;"><span data-contrast="none">Grant privileges to a managed identity rather than to a user</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">To limit the risks associated with assigning control plane roles, it is recommended to use Managed Identities as alternatives to user authorizations, or Privileged Identity Management (PIM) to better manage high-privileged users. This approach limits the risk of privilege escalation. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Managed Identities are authentication entities managed by Azure for applications and services. Rather than granting privileges to individual users, you can assign authorizations to the Managed Identities associated with these applications or services. </span><span data-contrast="auto">This approach offers the following advantages: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Reduced credential exposure: using Managed Identities reduces the potential attack surface, as credentials are not exposed or shared. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Secure automation: applications and services using Managed Identities can automate tasks without the need for high-privileged user accounts. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="%1." data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Centralized control: authorizations are managed centrally, facilitating privilege management across the entire cloud environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h3 style="text-align: justify;" aria-level="2"><span data-contrast="none">Limiting risks with Privileged Identity Management (PIM)  </span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40,&quot;335559739&quot;:0}"> </span></h3>
<p style="text-align: justify;"><span data-contrast="auto">When assigning high-privilege roles or control plane roles, especially to users, it is very important to control and monitor the assignment of these roles. The use of PIM, a feature that enables precise management of administrative privileges, may prove useful. PIM is based on: </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="Tahoma" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Temporary elevation of privileges: users can be granted administrative privileges on a temporary basis to perform specific tasks, thus reducing the risks associated with permanent authorizations and errors. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Mandatory justification for elevated privileges. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li data-leveltext="%1." data-font="Tahoma" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Implementation of control and monitoring. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><span data-contrast="auto">Creation of a workflow to validate privilege elevations: /!\ requires a high level of maturity to manage reactivity and HNO (non-working hours) requirements.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Securing a cloud environment is an essential concern. Attacks using the concepts and intricacies of cloud management will increase in the near future, therefore; it would be a loss to wait until attackers start dealing with this subject before companies start dealing with it properly. </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This article has </span><span data-contrast="auto">explored various aspects of privilege management and security in the cloud, highlighting fundamental strategies and practices for effectively protecting the control plane, which brings together data and resources that are highly sensitive to the integrity of a company&#8217;s infrastructure.  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">The article explored Microsoft&#8217;s enterprise access model, based on the “Zero Trust” principle. This model offers a flexible and secure approach to access management in a cloud environment.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">It was</span><span data-contrast="auto"> then presented that Microsoft Azure roles and some of the risks of privilege escalation, highlighting the importance of accurate authorization assignment and continuous monitoring to prevent abuse and potential threats.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Securing the control plane in a cloud environment is of paramount importance in protecting a company&#8217;s sensitive data and resources. Exploring the strategies and best practices discussed in this article, it&#8217;s clear that every organization needs to carefully define its role model, ensuring that accounts and permissions are appropriately assigned in the control plane or management plane. It is imperative that measures are put in place to ensure the isolation of each plane, while paying particular attention to precise authorization management and continuous monitoring to prevent abuse and potential threats (including privilege escalation).  </span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Security in the cloud is no longer an option, but an absolute necessity!</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/">Protecting the Control Plane: Critical Stakes in Cloud Security </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/05/protecting-the-control-plane-critical-stakes-in-cloud-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
