3. Manage connected tenants
Be aware and manage connected tenants to know what’s touching your production environment. It's crucial to have visibility into all subscriptions, networks, Virtual Private Networks (VPNs) or ExpressRoute connections tied to your production environment.
Additionally, you need visibility into how identities sync or pair across tenants. Essentially, you’d want to know what can reach your network and resources and from where. This helps confirm that your organisation’s policies and any regulatory requirements are being followed. Besides, it uncovers unexpected connections that could pose a risk, helping you keep your environment secure.
4. Strengthen your credentials
Password-based attacks continue to dominate identity attacks, accounting for more than 99%.
Alongside countermeasures such as strong authentication, start by banning commonly attacked passwords. Research shows that traditional complexity and expiration rules often backfire, causing users to pick passwords that are easier to guess.
Instead, use Microsoft Entra password protection to prevent easily guessable passwords, or consider going passwordless. By all means, don’t rely solely on strong passwords.
5. Enable single sign-on
Organisations that don’t provide a single, common identity force users to manage multiple passwords, increasing the risk of weak or reused credentials. A better approach is to use single sign-on (SSO).
You can achieve SSO by using a single identity solution across all your apps and resources. Your users can use the same set of credentials to log in and access all the apps and resources they need without having to re-enter their password.
6. Enable multi-factor authentication (MFA)
The strongest countermeasure to prevent password-based identity attacks is to enable multi-factor authentication (MFA). There are multiple ways to enable MFA within Entra ID:
- Security Defaults: It’s a default setting you enable at the tenant level that requires administrators to use MFA. It blocks legacy authentication and protects privileged activities with MFA, but you cannot change anything. It's a default setting, so it's on or off.
- Per user: As the name suggests, it enables MFA on a per-user basis. Again, this isn’t the preferred method, as it requires manually setting up MFA for every new user in your tenant. You don’t want that.
- Mandatory MFA: Introduced last year by Microsoft, it requires MFA to be set up for all users within the tenants when signing in to the Azure Portal, Entra Admin Centre, Azure CLI, etc. And again, it's mandatory, so you cannot change anything.
- Conditional access: Provides granular control over access and MFA, and is based on if and then statements. These if-then statements can be based on location, user risk, or the application being accessed. You can include whatever conditions make sense for your environment. Based on those rules, access will either be allowed, denied, or require MFA before granting entry.