Control: 5.2.8 Ensure a Token Protection Conditional Access policy is considered
Description
This recommendation ensures that issued tokens are only issued to the intended device.
When properly configured, conditional access can aid in preventing attacks involving token theft, via hijacking or reply, as part of the attack flow. Although currently considered a rare event, the impact from token impersonation can be severe.
Remediation
Remediate from Azure Portal
- Sign in to the Microsoft Entra admin center as at least a
Conditional Access Administrator. - Browse to
Protection>Conditional Access>Policies. - Select
New policy. - Give your policy a name.
- Under
Assignments, selectUsers or workload identities.- Under
Include, select the users or groups to apply this policy. - Under
Exclude, select Users and groups and choose your organization's emergency access or break-glass accounts (if applicable).
- Under
- Under
Target resources>Resources>Include>Select resources- Under
Select, select the following applications:- Office 365 Exchange Online
- Office 365 SharePoint Online
- Choose
Select
- Under
- Under
Conditions:- Under
Device platforms- Set
ConfiguretoYes. Include>Select device platforms>Windows.- Select
Done.
- Set
- Under
Client apps:- Set
ConfiguretoYes - Under Modern authentication clients, only select
Mobile apps and desktop clients. - Select
Done
- Set
- Under
- Under
Access controls>Session, selectRequire token protection for sign-in sessionsand selectSelect. - Confirm your settings and set Enable policy to
On. - Select
Createto enable your policy.
Default Value
A Token Protection Conditional Access policy does not exist by default.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v500_5_2_8Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v500_5_2_8 --shareSQL
This control uses a named query:
select id as resource, 'info' as status, 'Manual verification required.' as reason, display_name as subscriptionfrom azure_subscription;