Use Sign-In Logs to find Legacy Auth Step 1: Understand the usage of Legacy Authentication in your organization
10
Review Risk Users in Azure AD
11
Azure AD Conditional Access
12
Baseline Policies
13
Cloud Security Checklist
14
External Security Observations • Management interfaces exposed to Internet
15
Account Security Observations
16
Insufficient Password Policy
17
Password Guidelines for Administrators
18
Azure AD Premium Password Protection
19
Other Password Filter Software
20
Password Length (Azure AD)
21
Password Managers
22
Credential Theft
23
Securing Privileged Access
24
Tiered Privilege Access
25
Separate Administrative Accounts
26
Service Accounts
27
Privileged Access Workstations (PAWs)
28
Endpoint Security Observations
29
LLMNR/NBT-NS Poisoning and Relay
30
Emotet/Trickbot
31
Common Security Control Observations
32
Commercial Solutions
33
Free Tools / Informative References
Description:
Explore common observations from a security assessor's perspective in this 47-minute conference talk from Louisville Metro Infosec 2019. Delve into cloud security, data breach statistics, and identity attacks. Learn about secure score types, Microsoft Secure Score, and multi-factor authentication. Discover the differences between legacy and modern authentication, and how to use sign-in logs to identify legacy auth. Examine Azure AD features, including conditional access and baseline policies. Review a comprehensive cloud security checklist and external security observations. Analyze account security, password policies, and guidelines for administrators. Investigate Azure AD Premium Password Protection and other password filter software. Understand the importance of password length, managers, and protecting against credential theft. Explore tiered privilege access, separate administrative accounts, and Privileged Access Workstations (PAWs). Examine endpoint security observations, including LLMNR/NBT-NS poisoning and relay, and Emotet/Trickbot threats. Conclude with common security control observations, commercial solutions, and free tools for enhancing your organization's security posture.
Read more