Thomas Naunheim 

239 Followers
19 Following
19 Posts
#Microsoft MVP, #AzureAD ๐Ÿ”, #AzureSecurity ๐Ÿ›ก๏ธ, #Schaengel ๐Ÿ‡ช๐Ÿ‡บ
WebSitehttps://www.cloud-architekt.net/about
[New blog post]: "Microsoft #Entra Workload ID - Lifecycle Management and Operational Monitoring" ๐Ÿค– ๐Ÿ” In the second part of this blog post series, I will give an overview about some key aspects in configuring and managing non-human identities. #azuread
https://www.cloud-architekt.net/entra-workload-id-lifecycle-management-monitoring
Microsoft Entra Workload ID - Lifecycle Management and Operational Monitoring

Workload identities should be covered by lifecycle management and processes to avoid identity risks such as over-privileged permissions but also inactive (stale) accounts. Regular review of the provisioned non-human identities and permissions should be part of identity operations. In this article, we will go through the different lifecycle phases and other aspects to workload identities in your Microsoft Entra environment.

Thomas Naunheim

[New blog post]: "Protection of privileged users and groups by #AzureAD Restricted Management Administrative Units"

Privileged and sensitive objects can be protected from #AzureAD roles on directory-level by using this great new feature. In this blog post, will describe use cases for privileged access and tiering model but also automation, limitations and comparison to role-assignable groups:
https://www.cloud-architekt.net/restricted-management-administrative-unit/

Protection of privileged users and groups by Azure AD Restricted Management Administrative Units

Restricted Management Administrative Unit (RMAU) allows to protect objects from modification by Azure AD role members on directory-level scope. Management permissions will be restricted to granted Azure AD roles on scope of the particular RMAU. In this blog post, we will have a look on this feature and how you can automate management of RMAUs with Microsoft Graph API. In addition, I will explain use cases, limitations and why this feature support to implement a tiered administration model.

Thomas Naunheim

New blog post: "Abuse and Detection of Microsoft 365 Defender Live Response for privilege escalation on Control Plane (Tier0) assets"

Description of potential attack paths to gain privilege access to #ActiveDirectory and #AzureAD by abusing script execution and how to detect and mitigate them.
https://www.cloud-architekt.net/abuse-detection-live-response-tier0/

Abuse and Detection of M365D Live Response for privilege escalation on Control Plane (Tier0) assets

Live Response in Microsoft 365 Defender can be used to execute PowerShell scripts on protected devices for advanced incident investigation. But it can be also abused by Security Administrators for privilege escalation, such as creating (Active Directory) Domain Admin account or โ€œphishingโ€ access token from (Azure AD) Global Admin on a PAW device. In this blog post, I will describe the potential attack paths and a few approaches for detection but also mitigation.

Thomas Naunheim

Integration of Authentication Context in #AzureAD PIM is a great addition for implementing #ConditionalAccess. It allows to trigger a policy when an eligible #AzureAD, #Azure or Group membership will be requested. I like to share some of my notes from the field...

โ„น๏ธ Auth. Context will not enforce re-authentication. There is no step-up if you are already satisfied conditions/controls by token claim (e.g. previously Passwordless sign-in will not re-prompt for PIN or Biometric). It would be great to combine the feature with SIF Everytime.

๐Ÿ’ก I experimented with following step-up: FIDO2/WHfB is already enforced in CA policy (Auth. Strength). Auth. Context is requesting GPS-based Location from Auth. App to verify access from allowed countries. User will be prompted for Number Match + GPS during role activation.

โš ๏ธ Owner and User Access Administrator can change or remove assignment to Authentication Context from PIM role settings:
https://learn.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings

But also Classic Administrators (e.g., from EA Portal) are able to modify PIM role settings. Keep this in mind!

Configure Azure resource role settings in PIM - Azure Active Directory - Microsoft Entra

Learn how to configure Azure resource role settings in Azure AD Privileged Identity Management (PIM).

Microsoft has been published a very interesting article about protecting elevated-privilege accounts internally. It's a summary about implementing a secure high-risk environment (HRE) which is accessible by SAW only and supported by a dedicated team (SAS).
๐Ÿ”— https://www.microsoft.com/insidetrack/blog/improving-security-by-protecting-elevated-privilege-accounts-at-microsoft/?WT.mc_id=AZ-MVP-5003945

Insights about SAW usage at Microsoft will be shared:
"Each administrator has a single device, a SAW, where they have a hosted virtual machine (VM) to perform their administrative duties and a corporate VM for productivity work like email, Microsoft Office products, and web browsing."

In my opinion, the following (high-level) key aspects are really important to consider for own strategies and implementation to protect privileged identities and access:

๐Ÿ”Ž Identify sensitive and high risk assets and privileges
๐Ÿฆธ Consistent implementation of least privilege and JIT access
โ›“๏ธ End-to-end supply chain for DevOps and SAW management
๐Ÿš€ Automation for scaled and standardized deployment for SAWs
โŒจ๏ธ Provide "secure keyboard" for critical administrative tasks
โ›” Restrict access to SAW devices by enforcing CA Device Filters
๐Ÿง‘โ€๐Ÿ’ป Consider to include developers in a different security approach

I've started to write a blog post series about my approach to secure privileged access in Azure AD which could help you get started your journey to protect administrators:

๐Ÿ›ก๏ธ Securing privileged user access with Azure AD Conditional Access and Identity Governance:
https://www.cloud-architekt.net/securing-privileged-access-conditionalaccess-governance/

๐Ÿ” Automated Lifecycle Workflows for Privileged Identities with Azure AD Identity Governance:
https://www.cloud-architekt.net/manage-privileged-identities-with-azuread-identity-governance/

๐Ÿ”— More resources related to this topic:

Improving security by protecting elevated-privilege accounts at Microsoft - Inside Track Blog

Learn how Microsoft is protecting its environment and its system administrators.

Inside Track Blog
Do you like to track changes in #MicrosoftGraph API? Checkout the changelog page to follow updates on resources, methods or permissions. A must have for every #AzureAD or #Microsoft365 admin who is heavily using Graph API for programmatically access.
๐Ÿ‘‰https://developer.microsoft.com/en-us/graph/changelog

Microsoft Digital Defense Report offers interesting statistics and insights about security posture. The following chart shows missing security controls (such as Admin workstations or privilege isolations).

I can only strongly recommend to read the report:
https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2022

Microsoft Digital Defense Report 2022 | Microsoft Security

Read the Microsoft Digital Defense Report 2022 to gain insights into the digital threat landscape and empower your organization's digital defense.

Microsoft has been published a very good summary about #AzureAD security trends in 2023 which considered post authentication attacks, such as #TokenTheft: https://microsoft.com/en-us/security/blog/2023/01/26/2023-identity-security-trends-and-solutions-from-microsoft/

If you are interested to learn more about Token replay attacks, check the following blogs:

๐Ÿ”— Token tactics: How to prevent, detect, and respond to cloud token theft by Microsoft DART team: https://www.microsoft.com/en-us/security/blog/2022/11/16/token-tactics-how-to-prevent-detect-and-respond-to-cloud-token-theft/

This article describes Adversary-in-the-middle (AitM) phishing/Pass-the-cookie attack scenarios and recommendations.

๐Ÿ”— Abuse and replay of Azure AD refresh token from Microsoft Edge in macOS Keychain:
https://www.cloud-architekt.net/abuse-and-replay-azuread-token-macos/

I've written this blog post about token replay on #macOS devices last year. It covers an attack scenario to exfiltrate tokens from Keychain which is used to store cached Azure AD tokens for โ€œlogged inโ€ Edge profiles on macOS devices.

๐Ÿ”— Azure AD Attack & Defense: Replay of Primary Refresh (PRT) and other issued tokens from an Azure AD joined device:
https://github.com/Cloud-Architekt/AzureAD-Attack-Defense/blob/main/ReplayOfPrimaryRefreshToken.md

A comprehensive overview about attack and defense scenarios primary refresh token (PRT) & other tokens on Windows has been published by Sami Lamppu and and me. The article includes many references and links to other community resources around this topic.

Improve identity strategy with Microsoft - Microsoft Security Blog

Learn about the latest identity-based cyberattacks and how your organization can create an integrated, layered defense with Microsoft.

Microsoft Security Blog

Update on #AzureAD Attack & Defense Playbook ๐Ÿ”โ˜๏ธ:
@samilamppu and I have added new attack scenarios on #RefreshToken replay from our latest research:

  • Decrypted HTTPS traffic from #Azure PowerShell
  • Replay RT from Edge browser on compliant device

๐Ÿ”— Link: https://github.com/Cloud-Architekt/AzureAD-Attack-Defense/blob/main/ReplayOfPrimaryRefreshToken.md#refresh-token-rt

AzureAD-Attack-Defense/ReplayOfPrimaryRefreshToken.md at main ยท Cloud-Architekt/AzureAD-Attack-Defense

This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. - AzureAD-Attack-Defense/ReplayOfPrimaryRefreshToken.md at m...

GitHub

New blog post: "Securing privileged user access with #AzureAD #ConditionalAccess and #IdentityGovernance"

Overview and considerations to enforce security controls for using #PAW, strong authentication and manage access for privileged roles based on tiering levels.

https://www.cloud-architekt.net/securing-privileged-access-conditionalaccess-governance/

Securing privileged user access with Azure AD Conditional Access and Identity Governance

Conditional Access and Entitlement Management plays an essential role to apply Zero Trust principles of โ€œVerify explicitlyโ€œ and โ€œUse least-privilege accessโ€œ to Privileged Identity and Access. In this article, I like to describe, how this features can be use to secure access to privileged interfaces and how to assign privileged access by considering Identity Governance policies.

Thomas Naunheim