🕹️
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • 🗃️Exam Prep Notes
    • 📔CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • 📘ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • 📗AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • 📗SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • 📔AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • 🧑‍💻Cyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • ☁️Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • 🕸️Network Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • 🧑‍💻VAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • ☄️GRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • 🔍Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • 🕹️Server are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • 🙍‍♂️Dan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • 🛡️Security Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  • 1. Identity Verification
  • 2. Pillars of Identity
  1. Exam Prep Notes
  2. SC - 900

Microsoft Identity as Primary Security Perimeter

In Microsoft’s security model, Identity is the foundational layer. By making identity verification a primary security perimeter, Microsoft ensures that only trusted users, applications, devices, and identities can access resources. This approach integrates user, application, device, cloud/on-premises identities, and other factors to enforce strong authentication and authorization measures.


1. Identity Verification

The user is the most common entity in identity verification. Users must be authenticated using secure methods like Multi-Factor Authentication (MFA), password policies, or biometric verification (fingerprint, face recognition). Verification ensures the user requesting access is indeed the legitimate one.

Applications: Applications need to authenticate themselves before accessing resources, especially when accessing data on behalf of a user. This is typically achieved through OAuth 2.0, OpenID Connect, and API security mechanisms such as client secrets or certificates.

Devices: Device identity verification ensures that the devices accessing corporate resources are trusted. This can include:

  • Azure AD Join and Intune to manage device compliance.

  • Conditional Access policies that require devices to meet security standards (e.g., device encryption or up-to-date antivirus software).

Ensuring that only compliant, trusted devices can access corporate resources is critical for preventing unauthorized access.

Cloud / On-Premises Identities: Users, applications, and devices can have identities either in the cloud (via Azure Active Directory) or on-premises (via Active Directory). Microsoft enables hybrid identity solutions, where you can synchronize or federate identities between Azure AD (cloud) and Active Directory (on-prem). This allows seamless access to resources regardless of where the identities are stored.

  • Azure AD Connect: Synchronizes on-premises Active Directory with Azure AD, enabling a unified identity across both environments.

  • Federated Identities: Enables single sign-on (SSO) across cloud and on-premises resources.

Other: There may be other identity sources in an organization’s environment, such as guest users or third-party providers. These are often integrated into Azure AD B2B or B2C to enable secure external access or collaboration.

2. Pillars of Identity

Identity management in Microsoft’s framework involves three primary pillars: Administration, Authentication, Authorization, and Auditing. These pillars work together to ensure that only authorized identities can access resources in a secure and compliant way.

Administration

  • Identity Administration refers to the management of user identities, roles, and access to resources. This includes:

    • User lifecycle management (creation, modification, deletion of users).

    • Role-based Access Control (RBAC): Administrators assign roles to users, granting them the right level of access to resources.

    • Self-service tools (e.g., Azure AD Self-Service Password Reset) that allow users to manage their own identities.

    Tools:

    • Azure Active Directory provides centralized management for identities.

    • Microsoft Entra focuses on unified identity governance.

Authentication

  • Authentication ensures that the identity claiming access is legitimate. Microsoft offers multiple secure authentication methods:

    • Username and Password: The most basic form of authentication, but vulnerable to attacks such as phishing and brute force.

    • Multi-Factor Authentication (MFA): Adds an extra layer of security by requiring two or more methods of authentication (something you know, something you have, something you are).

    • Biometric Authentication: Fingerprints, facial recognition, and other biometric factors provide high assurance that the user is genuine.

    • Single Sign-On (SSO): Users authenticate once and are granted access to all resources without needing to re-enter credentials, which improves both security and user experience.

    • Certificate-Based Authentication: Secure, strong authentication using digital certificates to identify users and devices.

Authorization

  • Authorization is the process of determining if an authenticated user has the necessary permissions to access a resource. It ensures that users can only access resources for which they have been granted permission.

    • Role-Based Access Control (RBAC): Provides fine-grained access control by assigning roles to users and defining what actions those roles can perform on specific resources.

    • Attribute-Based Access Control (ABAC): Access is based on the attributes of the user, environment, and resource (e.g., user’s department, location, device compliance).

    • Conditional Access Policies: These policies allow organizations to enforce access restrictions based on factors like location, device compliance, user risk, and more. For example, an employee in the U.S. might be able to access a corporate resource, but an employee in another country might be blocked or required to use additional authentication methods.

Auditing

  • Auditing involves the continuous monitoring of identity-related activities to ensure that all access attempts are legitimate and that the identity system is functioning securely.

    • Audit Logs: Microsoft services like Azure AD provide detailed logs of user sign-ins, changes to permissions, and resource access.

    • Security Monitoring: Tools like Azure Sentinel can analyze audit logs and detect unusual or potentially malicious activity, providing alerts in real-time.

    • Compliance Reporting: Regular audits ensure compliance with regulatory standards like GDPR, HIPAA, and SOX. Microsoft provides reporting tools to assist in tracking and maintaining compliance.

PreviousCommon Identity AttacksNextModern Authentication with Azure AD

Last updated 1 month ago

🗃️
📗