A few weeks ago, Nicolas Blank and I conducted a webinar to talk about Real word Standards for application security in Microsoft Entra ID. It formed part of our series on securing your identities in your Microsoft cloud environment, specifically what Entra ID caters to when looking at applications running in your Microsoft 365 tenant and Azure subscription. We focused on the following core topics:
Let's recap what we covered in a more consumable manner.
Worldwide, governments and organizations must meet or exceed specific regulations and requirements for security, data governance, compliance, data residency, and sovereign protections. These requirements vary according to local and national laws.
Standards help organizations adhere to specific requirements that support security principles. Industry verticals have different standards. Healthcare is different to Petrochemical, which is different to retail, which is different to financial institutions.
Security frameworks exist to provide organizations with a standardized approach to managing cybersecurity risks. They ensure consistency, help meet regulatory compliance, offer best practices, and guide effective incident response. Frameworks also promote continuous improvement and efficient resource allocation, helping organizations protect against evolving threats while staying compliant with legal obligations.
Standards are something that you must comply to because there is legislation, regulation or fiduciary requirements that your business must attain, in order to operate.
Frameworks are guides that you can subscribe to, to improve your overall security posture. Ergo, it's not rigid and typically easier to follow.
Figure 2: Commonalities
As you can see from the image above, most, if not all frameworks address the same 5-6 core areas and pretty much achieve the same outcomes. Yes, you get to choose which framework best suits your needs.
The benefits of using a framework and/or standards include ensuring compliance with regulatory requirements, policy alignment, enablement of proactive security measures, accountability, and risk reduction.
Figure 3: What frameworks and standards provide
To enhance the security posture of your organization's application registrations in Microsoft Entra ID, here are several steps you can take:
1. Use Conditional Access for App Registrations
Figure 4: Disable user app registrations.
Figure 6: Risk evaluation decision process – Source
Figure 7: PIM in Azure.
4. Use Managed Identities Instead of Client Secrets
6. Monitor Entra ID App Activity and Audit Logs
7. Regularly Review Permissions and Roles
8. Use Identity Protection and Risk-Based Policies
In closing, we recommend doing more than just the eight steps above, but they are a great start. This will help you ensure that you have a better sense of what is going on in your Entra ID tenant and a better grasp of how enterprise applications get registered and deployed in your Microsoft cloud environment. You can watch full webinar recording on-demand here.
On October 6th, we'll be breaking down Security Frameworks one step further and discussing how to apply a Zero Trust Security Framework for Entra ID Enterprise Application Security.
When: Wednesday, October 6, 2024 at 10 am PT / 1 pm ET.
Register HereDo you know how many unused or risky applications reside in your tenant that could be increasing your attack surface and creating a security risk? The ENow AppGov Score is a free security assessment tool that will quantify your application governance state quickly. In addition to providing your AppGov Score, the tool will provide a comprehensive Application Governance Assessment report that includes each test, your result and why the test matters. Sign up to get your score and assessment report in just a few minutes - Get Your AppGov Score today!