Photo by Ari Sha on Unsplash
Zero-Trust Features and Tools for Identities in Entra ID
Key to the Fortress
Zero trust is not a specific action, but an ongoing process. Microsoft refers to it as a journey that never really ends. Why a journey? Because there is always something new to discover, and because existing technologies are critically questioned and new approaches examined in a cycle that constantly repeats.
Two issues pose specific challenges: On the one hand, the awareness that with zero trust, especially in the context of identities in Entra ID, particularly sensitive areas are accessed over the Internet, which changes the rules of the game. On the other hand, the mindset of many administrators is shaped by decades of working in classic on-premises environments, where domain controllers are protected by firewalls and identities are therefore relatively well secured. The situation with Entra ID is different, and you need to rethink because identity is the new perimeter.
Admin accounts, with access to comprehensive authorizations, are particularly vulnerable to criminal activity. Therefore, maximum security is essential for these accounts, which is exactly where the scenarios I look at here come into play. The objective is to use Entra ID to achieve a level of security that surpasses that of on-premises products.
The toolbox in Entra ID is comprehensively equipped for this purpose. One of the central tools it contains is Conditional Access policies, which are among the most powerful control instruments available to admins. They let you specify precisely who is allowed to access a specific set of resources and under which conditions. The mechanism behind policies is particularly useful for admin accounts and is made possible because a large number of signals are sent every time you log in to Entra ID or use an application. The signals then contribute to access decisions in the Conditional Access policy ruleset, among which are: On which device did the request originate? From which location? Which application did it target?
The policy
...Buy this article as PDF
(incl. VAT)
Buy ADMIN Magazine
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

