-
Notifications
You must be signed in to change notification settings - Fork 332
Description
💡 Summary
Review Entra ID token protection feature (currently in preview) as a possible target for a future baseline policy item. Consider if it affects existing policies, augments them, or warrants a new policy.
Motivation and context
Attacks and mitigation techniques continue to evolve. Microsoft has added a new conditional access feature called "Token Protection for Sign-in Sessions" based on token stealing attacks seen in the wild increasing throughout 2023. The project should evolve with available technologies and protections. The purpose of this issue is to perform a hands-on evaluation of this feature and determine if a new Azure AD baseline policy would add value.
Additional details of new token protection feature here:
Entra ID Token Protection for Sign-In Sessions
Token Tactics - How to Prevent, Detect, and Respond to cloud token theft
Implementation notes
Please provide details for implementation, such as:
- Review available documentation on token protection, related attacks, and efficacy
- Test token protection in test tenant against attack scenarios
- Review and analyze results of token protection testing
- Make a recommendation on whether or not token protection warrants inclusion in policy along with a candidate policy changes and associated implementation guidance.
Acceptance criteria
How do we know when this work is done?
- Documentation on token protection, related attacks, and efficacy reviewed
- Token protection successfully tested in tenant against attack scenarios
- Results of token protection testing analyzed for effectiveness
- Policy recommended changes and implementation instructions drafted