Friday, February 20, 2026
HomeArtificial IntelligenceMicrosoft Entra ID: Enhancing id safety for US companies

Microsoft Entra ID: Enhancing id safety for US companies


For those who’re accountable for cybersecurity for a United States authorities company, you’re already acquainted with Memorandum M-22-09, “Shifting the U.S. Authorities Towards Zero Belief Cybersecurity Ideas,” which the US Workplace of Administration and Finances issued in January 2022. This memo set a September 30, 2024, deadline for assembly “particular cybersecurity requirements and goals” towards implementing a Zero Belief structure in compliance with the Govt Order on Bettering the Nation’s Cybersecurity.

Microsoft has embraced Zero Belief ideas, each in our safety merchandise and in the best way we safe our personal enterprise atmosphere. We’ve been serving to 1000’s of organizations worldwide transition to a Zero Belief safety mannequin, together with army departments and civilian companies. Over the previous three years, we’ve listened to our US authorities clients, so we will construct wealthy new security measures that assist them meet the necessities described within the Govt Order, after which help their deployments. These developments embody certificate-based authentication within the cloud, Conditional Entry authentication power, cross-tenant entry settings, FIDO2 provisioning APIs, Azure Digital Desktop help for passwordless authentication, and device-bound passkeys.

The illustration under depicts the Zero Belief Maturity Mannequin Pillars adopted by the US Cybersecurity and Infrastructure Safety Company (CISA).

Because the memo’s deadline approaches, we’d wish to have a good time the progress our clients have made utilizing the capabilities in Microsoft Entra ID not solely to fulfill necessities for the Id pillar, but in addition to scale back complexity and to enhance the consumer expertise for his or her staff and companions.

An architectural diagram that illustrates the Zero Trust Maturity Model Pillars adopted by the U.S. Cybersecurity and Infrastructure Security Agency. The five pillars are depicted as five vertical boxes labeled Identity, Devices, Networks, Applications and Workloads, and Data. Along the bottom of the diagram are three horizontal boxes labeled

Microsoft Entra ID helps US authorities clients meet the M-22-09 necessities for id

US authorities companies are adopting Microsoft Entra ID to consolidate siloed id options, scale back operational complexity, and enhance management and visibility throughout all their customers, because the memo requires. With Microsoft Entra ID, companies can implement multifactor authentication on the utility stage for extra granular management. They’ll additionally strengthen safety by enabling phishing-resistant authentication for workers, contractors, and companions, and by evaluating system info earlier than authorizing entry to assets.

Imaginative and prescient:

Company workers use enterprise-managed identities to entry the functions they use of their work. Phishing-resistant multifactor authentication protects these personnel from refined on-line assaults.

Actions:

  1. Companies should make use of centralized id administration programs for company customers that may be built-in into functions and customary platforms.
  2. Companies should use robust multifactor authentication all through their enterprise.
    • Multifactor authentication should be enforced on the utility layer, as an alternative of the community layer.
    • For company workers, contractors, and companions, phishing-resistant multifactor authentication is required.
    • For public customers, phishing-resistant multifactor authentication should be an possibility.
    • Password insurance policies should not require use of particular characters or common rotation.
  3. When authorizing customers to entry assets, companies should think about no less than one device-level sign alongside id details about the authenticated consumer.

Supply: M-22-09: Shifting the US Authorities Towards Zero Belief Cybersecurity Ideas, issued by the US Workplace of Administration and Finances, January 2022, web page 5.

Lots of our US authorities civilian and army clients wish to use the identical options throughout their totally different environments. Because it’s out there in secret and top-secret Microsoft Azure Authorities clouds, companies can standardize on Microsoft Entra ID to safe consumer identities, to configure granular entry permissions in a single place, and to offer easier, simpler, and safer sign-in experiences to functions their staff use of their work.

Microsoft Entra ID

Set up Zero Belief entry controls, stop id assaults, and handle entry to assets.

Utilizing Microsoft Entra ID as a centralized id administration system

Anybody who has struggled to handle a number of id programs understands that it’s an costly and inefficient strategy. Authorities clients who’ve adopted Microsoft Entra ID as their central company id supplier (IdP) gained a holistic view of all customers and their entry permissions as required by the memo. In addition they gained a centralized entry coverage engine that mixes indicators from a number of sources, together with identities and gadgets, to detect anomalous consumer conduct, assess threat, and make real-time entry choices that adhere to Zero Belief ideas.

Furthermore, Microsoft Entra ID permits single sign-on (SSO) to assets and apps, together with apps from Microsoft and 1000’s of different distributors, whether or not they’re on-premises or in Microsoft business or authorities clouds. When deployed because the central company IdP, Microsoft Entra ID additionally secures entry to assets in clouds from Amazon, Google, and Oracle.

Many authorities clients are facilitating safe collaboration amongst totally different organizations through the use of Microsoft Entra Exterior ID for business-to-business (B2B) collaboration to allow cross-cloud entry eventualities. They don’t have to offer collaboration companions separate credentials for accessing functions and paperwork of their atmosphere, which reduces their cyberattack floor and spares their accomplice customers from sustaining a number of units of credentials for a number of id programs.

Utilizing Microsoft Entra ID to facilitate cross-organizational collaboration

Cross-tenant entry with Microsoft Entra Exterior ID


Learn extra

Certainly one of our authorities clients, together with their accomplice company, configured cross-tenant entry settings to belief multifactor authentication claims from every consumer’s dwelling tenant. Their accomplice company can now belief and implement robust phishing-resistant authentication for the shopper’s customers with out forcing them to check in a number of occasions to collaborate. The accomplice company additionally explicitly enforces, via a Conditional Entry authentication power coverage, that the shopper’s customers should check in utilizing a private id verification (PIV) card or a standard entry card (CAC) earlier than gaining entry.

Configure cross-tenant entry settings for B2B collaboration


Study extra

One other authorities buyer wanted to offer staff from totally different organizations inside the similar company entry to shared providers functions corresponding to human assets programs. They used Microsoft Entra Exterior ID for B2B collaboration together with cross-cloud settings to allow seamless and safe collaboration and useful resource sharing for all company staff, different authorities companies (OGAs), and exterior companions. They used Microsoft Entra Conditional Entry coverage and cross-tenant entry settings to require that staff check in utilizing phishing-resistant authentication earlier than accessing shared assets. Belief relationships be sure that this strategy works whether or not the house tenant of an worker is in an Azure business or authorities cloud. In addition they enabled collaboration with companies that use an IdP apart from Microsoft Entra ID by establishing federation via the SAML 2.0 and WS-Fed protocols.

Subsequent step after standardizing on Microsoft Entra ID as your centralized IdP: Use Microsoft Entra ID Governance to automate lifecycle administration of visitor accounts in your tenant, so visitor customers solely get entry to the assets they want, for under so long as they want it. Begin right here: What are lifecycle workflows?

Enabling robust multifactor authentication

Standardizing on Microsoft Entra ID has made it doable for our authorities clients to allow phishing-resistant authentication strategies. Over the previous 18 months, we’ve labored with our US authorities clients to extend adoption of phishing-resistant multifactor authentication with Microsoft Entra by nearly 2,000%.

From there, clients configure Conditional Entry insurance policies that require robust phishing-resistant authentication for accessing functions and assets, as required by the memo. Utilizing Conditional Entry authentication power, they’ll even set insurance policies to require extra, stronger authentication based mostly on the sensitivity of the applying or useful resource the consumer is making an attempt to entry, or the operation they’re making an attempt to carry out.

Microsoft Entra helps robust phishing-resistant types of authentication:

  • Certificates-based authentication (CBA) utilizing Private Identification Playing cards (PIV) or Widespread Entry Playing cards (CAC)
  • Machine-bound passkeys
    • FIDO2 safety keys
    • Passkeys within the Microsoft Authenticator app
  • Home windows Hey for Enterprise
  • Platform single sign-on SSO for macOS gadgets (in preview)

For a deep dive into phishing resistant authentication in Microsoft Entra, discover the video collection Phishing-resistant authentication in Microsoft Entra ID.

Whereas Microsoft Entra ID can stop the usage of widespread passwords, establish compromised passwords, and allow self-service password reset, lots of our authorities clients want to require essentially the most safe types of authentication, corresponding to sensible playing cards with x.509 certificates and passkeys, which don’t contain passwords in any respect. This makes signing in safer, simplifies the consumer expertise, and reduces administration complexity.

Implementing phishing-resistant multifactor authentication strategies with Microsoft Entra ID

Migrate to cloud authentication utilizing Staged Rollout


Study extra

To cut back the fee and complexity of sustaining an on-premises authentication infrastructure utilizing Lively Listing Federation Companies (AD FS) for worker PIV playing cards, one company wished to make use of certificate-based authentication (CBA) in Microsoft Entra ID. To make sure the transition went easily, they moved customers with Staged Rollout, fastidiously monitoring menace exercise utilizing Microsoft Entra ID Safety dashboards and Microsoft Graph API logs exported to their safety info and occasion administration (SIEM) system. They migrated all their customers to cloud-based CBA in Microsoft Entra in lower than three months and after monitoring the atmosphere for a time, confidently decommissioned their AD FS servers.

Public preview: Microsoft Entra ID FIDO2 provisioning APIs


Study extra

A neighborhood authorities division selected an opt-in strategy for shifting staff and distributors to phishing-resistant authentication. Each consumer contacting the assistance desk for a password reset as an alternative obtained assist onboarding to Home windows Hey for Enterprise. This company additionally gave FIDO2 keys to all admins and set a Conditional Entry authentication power coverage requiring all distributors to carry out phishing-resistant authentication. Their subsequent step will probably be to roll out device-bound passkeys managed within the Microsoft Authenticator app and implement their use via Conditional Entry. This may save them the expense of issuing separate bodily keys and provides their customers the acquainted expertise of authenticating securely from their cellular system.

Supported identities and authentication strategies in Azure Digital Desktop


Study extra

By giving customers entry to functions and assets via Azure Digital Desktop, one other massive company avoids the overhead of sustaining and supporting particular person gadgets and the software program working on them. In addition they defend their atmosphere from doubtlessly unhealthy, misconfigured, or stolen gadgets. Whether or not staff use gadgets working Home windows, MacOS, iOS, or Android, they run the identical Digital Desktop picture and check in, as coverage requires, utilizing phishing-resistant, passwordless authentication.

Subsequent step after enabling robust multifactor authentication: Configure Conditional Entry authentication power to implement phishing-resistant authentication for accessing delicate assets. Begin right here: Overview of Microsoft Entra authentication power.

Utilizing Conditional Entry insurance policies to authorize entry to assets

Utilizing Conditional Entry, our authorities clients have configured fine-tuned entry insurance policies that think about contextual details about the consumer, their system, their location, and real-time threat ranges to manage which apps and assets customers can entry and beneath what circumstances.

To fulfill the memo’s third id requirement, these clients embody device-based indicators in insurance policies that make authorization choices. For instance, Microsoft Entra ID Safety can detect whether or not a tool’s originating community is secure or unsafe based mostly on its geographic location, IP deal with vary, or whether or not it’s coming from an nameless IP deal with (for instance, TOR). Conditional Entry can consider indicators from Microsoft Intune or different cellular system administration programs to find out whether or not a tool is correctly managed and compliant earlier than granting entry. It might probably additionally think about system menace indicators from Microsoft Defender for Endpoint.

Enabling Microsoft Entra Conditional Entry risk-based insurance policies

One authorities division enabled risk-based Conditional Entry insurance policies throughout their functions, requiring extra stringent sign-in strategies relying on ranges of consumer and sign-in threat. For instance, a consumer evaluated as ‘no-risk’ should at all times carry out multifactor authentication, a consumer evaluated as ‘low-medium threat’ should check in utilizing phishing-resistant multifactor authentication, and a consumer deemed ‘high-risk’ should check in utilizing a particular certificates issued to them by the division. The client has additionally configured coverage to require compliant gadgets, allow token safety, and outline sign-in frequency. To facilitate menace looking and automated mitigation, they ship their sign-in and different Microsoft Entra logs to Microsoft Sentinel.

Subsequent step after configuring fundamental Conditional Entry insurance policies: Configure risk-based Conditional Entry insurance policies utilizing Microsoft Intune. Begin right here: Configure and allow threat insurance policies.

Subsequent steps

On July 10, 2024, the White Home issued Memorandum M-21-14, “Administration Cybersecurity Priorities for the FY 2026 Finances.” One funds precedence calls on companies to transition towards absolutely mature Zero Belief architectures by September 30, 2026. Companies must submit an up to date implementation plan to the Workplace of Administration and Finances inside 120 days of the memo’s launch. Companies within the Division of Protection should additionally implement Zero Belief by September 30, 2026, a 12 months sooner than the beforehand revealed timeline.

Microsoft is right here that will help you rearchitect your atmosphere and implement your Zero Belief technique, so you possibly can adjust to each milestone of the Govt Order. We’ve revealed technical steering and detailed documentation to assist federal companies use Microsoft Entra ID to fulfill id necessities. We’ve additionally revealed detailed steering on assembly the Division of Protection Zero Belief necessities with Microsoft Entra ID.

Within the coming weeks and months, you’ll see bulletins about extra steps we’re taking to simplify your Zero Belief implementation, corresponding to the overall availability of help for device-bound passkeys in Microsoft Authenticator and Microsoft-managed Conditional Entry insurance policies that allow multifactor authentication by default for US authorities clients.

We look ahead to supporting you thru the following phases of your Zero Belief journey.

  1. Standardize on Microsoft Entra ID as your centralized id supplier to safe each id and to safe entry to your apps and assets. Begin right here: What’s Microsoft Entra ID?
  2. To facilitate safe cross-organization collaboration, configure cross-tenant entry settings and Conditional Entry insurance policies to require that companions accessing your assets check in utilizing phishing-resistant authentication. Begin right here: Microsoft Entra B2B in authorities and nationwide clouds.
  3. For those who’re utilizing CBA on AD FS, migrate to cloud-based CBA utilizing Staged Rollout and retire your on-premises federation servers. Begin right here: Migrate from AD FS Certificates-based Authentication (CBA) to Microsoft Entra ID CBA.
  4. Eradicate passwords altogether by enabling passwordless phishing-resistant authentication utilizing CBA, Home windows Hey for Enterprise, device-bound passkeys (FIDO2 safety keys or passkeys managed within the Microsoft Authenticator app), or Platform SSO for MacOS. Begin right here: Plan a passwordless authentication deployment in Microsoft Entra ID.
  5. Implement risk-based Conditional Entry insurance policies to regulate entry necessities dynamically. Begin right here: DoD Zero Belief Technique for the consumer pillar.

To study extra about Microsoft Safety options, go to our web site. Bookmark the Safety weblog to maintain up with our professional protection on safety issues. Additionally, observe us on LinkedIn (Microsoft Safety) and X (@MSFTSecurity) for the most recent information and updates on cybersecurity.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments