ASD's Blueprint for Secure Cloud

Conditional Access

This section describes the design decisions associated with Conditional Access for system(s) built using ASD's Blueprint for Secure Cloud.

Estimated reading time: 6 minutes

Conditional Access makes policy-based decisions to decide how user and workload identities access the resources associated with an Entra ID tenant. When an access request is a performed, a set of conditions, comprising the set of all Conditional Access policies, are evaluated to decide if access is granted.

Conditional Access deployment considerations

Conditional access should be used for controlling access wherever possible.

Policy names

Policy names should give a clear indication of the scope, type, and purpose of the control.

  • ADM - a policy that relates to administrative users
  • APP - a policy that relates to applications1
  • DEV - a policy that relates to devices
  • GST - a policy that relates to guest users
  • LOC - a policy that relates to locations
  • OTH - a policy that doesn’t easily fit the other categories1
  • USR - a policy that relates to users
  • WKL - a policy that relates to workload identities1

  • B - a policy that blocks access
  • G - a policy that grants access
  • S - a policy that alters session behaviour

1: These policy names are not implemented in the Blueprint.

See the Conditional Access policies configuration page for examples.

Organisations may wish to implement numbering or other keyword standards within the policy name for versioning, to group policy types, or to substitute commonly used wording (abbreviating policy names). Consideration should be given to:

  • the resulting order of policy names in the Entra portal when selecting a prefix for policy names
  • the extensibility of names, including for deviations from existing policies and atypical scenarios
  • the use of special characters in policy names if using any automation or programmatic methods of management
  • marking changes to existing policies or the pre-production status of newly developed policies

Groups

Groups can be used to ensure that policies are scoped to the correct subset of identities.

The use of exclude groups is a common practice that allows groups of identities to be excluded from policy control, because of this the management and membership of exclude groups should be tightly controlled.

1: Using roles in Conditional Access policy assignments may need regular maintenance as roles are regularly updated by Microsoft. New role assignments to users may also require Conditional Access policies to be checked to ensure the role has also been selected within the policy assignment to be included or excluded.

The use of exclude groups is discussed in more detail in the groups design page.

The use of access reviews is discussed in more detail in the groups design page.

The use of PIM for exclude group changes is discussed in more detail in the role-based access control design page.

Emergency access

Methods like break glass accounts and related exclude groups can be used to mitigate a tenant lockout.

The use of break glass accounts is discussed in more detail in the enterprise users design page.

Other deployment considerations

To enhance operational visibility, policy complexity should be minimised by keeping the policy’s purpose focussed on a single objective.

Named locations

Named locations are used primarily for location-based policy control, and while they can be useful, they should not be used when similarly capable, location-agnostic controls are available.

Terms of use

Organisations may wish to consider using different terms of use targeted to different user-types or use cases. For example, a notice for beta-testing an application with external users might require different terms to an employee accessing Microsoft 365 applications.

Authentication contexts

Authentication contexts allow select applications to trigger policy control.

Decision PointDesign DecisionJustification
Authentication contextsRestrict access to PROTECTED information to employees onlyProtect sensitive information

The use of authentication contexts is discussed in more detail in the Purview design page.

Authentication strengths

Authentication strengths allow customisation of the specific methods used to authenticate users.

Decision PointDesign DecisionJustification
Authentication strengths for user accessUse phishing-resistant MFAComply with Essential Eight requirements
Authentication strengths for bootstrapping flowsUse phishing-resistant MFA plus temporary access passes (TAPs)Facilitate onboarding and replacement device MFA setup

Conditional Access policies

For policy details see the Conditional Access policies configuration page.

Administrative user policiesDescription
Time-box web-based administrative sessionsExpire web-based administrative user sessions after 4-hours
Device policiesDescription
Block access from unapproved devicesPrevent access from devices other than iOS and Windows-based devices
Require strong authentication for Intune enrolmentEnforce phishing-resistant MFA when enrolling a device with Intune
Require the use of compliant devicesRequire Intune device compliance for all devices
Guest policiesDescription
Block access for unapproved guestsPrevent access for all guests
Allow guest access to specific applicationsAllow approved guests access to specific applications only
Location policiesDescription
Block access from unapproved countriesPrevent access from countries not in the allowed countries list
User policiesDescription
Block access via legacy authentication methodsPrevent access via legacy authentication methods that do not support MFA
Require strong authentication for usersEnforce phishing-resistant MFA for all users
Require agreement to terms of useRequire agreement to an acceptable use policy before access
Require strong authentication when registering security informationEnforce phishing-resistant MFA and allow the use of a TAP when registering security information
Block high-risk sign-insPrevent high risk sign-ins that are likely malicious
Require strong re-authentication for risky sign-insRequire phishing-resistant MFA for low to medium risk sign-ins
Block high-risk usersPrevent access from accounts that are likely compromised
Block users with elevated insider risksPrevent access from accounts where a trusted insider could negatively impact the organisation
Time-box web-based user sessionsExpire web-based non-administrative user sessions after 16-hours

Contingency policies

Organisations may wish to implement disabled policies that are activated in the event of a critical situation such as a business continuity event or security breach. The policies below are not implemented in the Blueprint but intended to example ideas for policy development.

Contingency policiesDescription
Enable for BCP activation - MFA disruptionEnable additional authentication methods / disable MFA for particular users
Enable for security break - external malicious actorEnforce access from trusted locations

Security & Governance

Design

Configuration

References

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra