Upgrade to Pro — share decks privately, control downloads, hide ads and more …

AzureBootcamp2022: I've been pwned but I don't ...

AzureBootcamp2022: I've been pwned but I don't care by Michael Rüefli

This session is one of the sessions of Azure Bootcamp Switzerland 2022.
www.azurebootcamp.ch

Everyone talks about safeguarding identities in the cloud. But what does that actually mean? Are you confused about terms like MFA,ATP,CASB,PIM,Tokens? The session will be practical and demo heavy, showing value and usage scenarios every Azure AD admin would want to know about!
🙂 MICHAEL RÜEFLI ⚡️ Managing Partner and Solutions Architect @ scopewyse

Check out Michael at: https://www.linkedin.com/in/drmiru/

More Decks by Azure Zurich User Group

Other Decks in Technology

Transcript

  1. Michael Rüefli Partner | Solutions Architect scopewyse GmbH [email protected] www.miru.ch

    @drmiru drmiru About me | Tech Azure Cloud Platform & Security Security in focus, MCT (Microsoft Certified Trainer) Community worker About me | Private Father, Husband, Skydiver, Skier
  2. ▪ Identity, the new perimeter ▪ Attack scenarios ▪ Why

    we are still using passwords ▪ Alternatives to passwords ▪ Countermeasures / protection use cases (demo) Agenda
  3. Common attack scenarios Weak or stolen Passwords of breaches leverage

    either stolen and/or weak passwords Social Attacks of attacks that resulted in a data breach Credential-Stealing SW Of data breaches involved some form of credential stealing malware 81% 43% 51% Source: okta
  4. Fun fact.. or maybe not even funny.. 1. 2. 3.

    4. 5. 6. 7. 8. 9. Rank Password Most common used passwords in 2021 1234567890 12345678 1q2w3e qwerty123 12345 password qwerty 123456789 123456
  5. Fun fact.. or maybe not even funny.. 1. 2. 3.

    4. 5. 6. 7. 8. 9. Rank Password Most common used passwords in 2022 SERIOUSLY ? 111111 12345678 1q2w3e qwerty123 12345 password qwerty 123456789 123456
  6. ▪ Legacy authentication protocols in apps ▪ Lack of support

    in IDPs ▪ Rolling out WHFB -> spoiler! Why passwords are still around
  7. ▪ PIN ▪ BIOMETRICS ▪ FIDO2 ▪ AUTHENTICATOR with password

    less config Password alternatives With Azure AD
  8. ▪ Microsoft Identity Protection Landscape Identity Protection Charta DETECT PREVENT

    REMEDIATE INVESTIGATE Azure Multi-Factor • Single-Factor • Untrusted Location • Unmanaged Devices • Multi-Factor • Conditional Access • Step-up authentication • Token Lifetime • Compliant Devices • Sign-In logs Azure AD Identity Protection • Atypical Travel • User Risk Detections • Leaked Credentials • Anonymous IP • Conditional Access • PIM & Tiering Model • Priviledged Access • Risk levels remediation • SSPR • JIT Access • Risk investigation • Risky users • Risky sign-ins Microsoft Defender for Identity • Compromised Creds • Lateral Movement • Domain Dominance • Brute Force Attacks • Password Reset & MFA • High-risk user policies • Admin Tiering Model • Priviledged access • Consult logs • Defender for Cloud Apps integration Azure Sentinel • Built-in detections • Multistage attack detection (Fusion) • Connectors • Analytic rules • Playbooks • Investigation graph • Playbooks • Automation Passwordless / Windows Hello for Business • Single password • Biometrics • PIN Login • FIDO 2
  9. Conditional Access & Identity Protection Corporate Network Geo-location Microsoft Cloud

    App Security MacOS Android iOS Windows Microsoft Defender EP Client apps Browser apps Google ID MSA Azure AD ADFS Require MFA Allow/block access Block legacy authentication Force password reset ****** Limited access Controls Employee & Partner Users and Roles Trusted & Compliant Devices Physical & Virtual Location Client apps & Auth Method Conditions Machine learning Policies Real time Evaluation Engine Session Risk 3 171TB Effective policy
  10. ✓Enforce MFA for admin roles ✓Enforce MFA/SSPR for risky sign-ins

    ✓Disable legacy authentication protocols ✓Enforce security information registration from trusted devices / locations ✓Enforce always-authenticate from untrusted devices ✓Enforce step-up authentication (CAE) Identity Protection to-do-list