Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conduct an impact analysis of MS Authenticator Passkey authentication against the Entra Id baseline #1493

Open
4 tasks
tkol2022 opened this issue Dec 24, 2024 · 0 comments
Assignees
Labels
baseline-document Issues relating to the text in the baseline documents themselves hands-on-prototyping Reviewing an M365 feature by performing hands-on prototyping
Milestone

Comments

@tkol2022
Copy link
Collaborator

💡 Summary

Microsoft now supports Passkey authentication via the MS Authenticator mobile app and this is considered a phishing-resistant MFA method. The goal of this issue is to examine the changes Microsoft made to the Entra Id > Authentication Methods configurations related to the Authenticator app and passkeys to determine if any changes to CISA baseline policies are necessary.

https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-enable-authenticator-passkey

Motivation and context

We need to ensure the baselines are consistent with Microsoft's configuration changes.

Implementation notes

The work below is to determine impacts to Entra Id policies:

  • 3.1 Phishing-resistant MFA SHALL be enforced for all users.

  • 3.3 If phishing-resistant MFA has not been enforced and Microsoft Authenticator is enabled, it SHALL be configured to show login context information.

  • Review the passkey link above to understand the technical enhancements.

  • Review the MS Authenticator settings in the Entra Id > Authentication Methods portal to see if anything has changed that would warrant a modification to the affected baseline policies.

  • Review the Passkey (FIDO2) settings in the Entra Id portal to see if any changes to the affected baseline policies are needed.

  • Perform a hands-on prototype of passkeys using MS Authenticator with a test user to determine if policy 3.3 should still be dependent on policy 3.1? Currently if there is a conditional access policy that enforces phishing-resistant MFA, then policy 3.3 is not checked and ScubaGear produces a Not Applicable output. We should determine if it makes sense to still check the MS Authenticator settings related to 3.3 regardless of the status of 3.1. This is because now passkeys (a phishing-resistant method) can be implemented with MS Authenticator.

@tkol2022 tkol2022 added baseline-document Issues relating to the text in the baseline documents themselves hands-on-prototyping Reviewing an M365 feature by performing hands-on prototyping labels Dec 24, 2024
@tkol2022 tkol2022 added this to the Lionfish milestone Dec 24, 2024
@tkol2022 tkol2022 self-assigned this Dec 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
baseline-document Issues relating to the text in the baseline documents themselves hands-on-prototyping Reviewing an M365 feature by performing hands-on prototyping
Projects
None yet
Development

No branches or pull requests

1 participant