πΌ Management Samenvatting
Authentication Contexts Schakel in granular, resource-specific authentication requirements (step-up auth) voor sensitive operations binnen applications.
β voorwaardelijke toegang
Traditional voorwaardelijke toegang past toe bij application level (all SharePoint users need MFA). Authentication Contexts Schakel in GRANULAR Vereisten: viewing SharePoint document is passwordless OK, editing Confidential document is phishing-resistant MFA vereist, deleting site is re-authentication vereist. gebruiken cases: (1) SharePoint - Different auth requirements per sensitivity label (view Public is enige auth, edit Confidential is FIDO2 vereist), (2) Privileged operations - Deleting data, changing permissions, financial approvals require step-up auth, (3) Compliance - Auditors access audit logt vereist phishing-resistant MFA. Authentication Contexts bieden nul Trust granularity - not slechts "who" maar "what are they doing" determines auth requirements.
Connection:
Connect-MgGraphRequired Modules: Microsoft.Graph.Identity.SignIns
Implementatie
Authentication Context design: Maak aan contexts (C1=High-Value-Data-Access, C2=Privileged-Operations, C3=Financial-Approvals), Map to Conditional Access beleidsregels (Context C1 is phishing-resistant MFA vereist), Applications tag resources met contexts (SharePoint labels Confidential documents met C1), Users attempting context-beschermde actions krijgen step-up auth prompt. implementeren via: Azure AD β voorwaardelijke toegang β Authentication context definitions.
- Define contexts: Azure AD β voorwaardelijke toegang β Authentication context
- Maak aan CA policies per context: Context C1 β Require phishing-resistant MFA
- Tag resources: SharePoint sensitivity labels β Authentication context C1
- Test thoroughly: Pilot users, Verifieer step-up prompts, Controleer gebruikerservaring
- Production rollout: Phased approach, monitoren auth failures
Vereisten
- Azure AD Premium P1 (P2 aanbevolen)
- Applications met Authentication Context ondersteunen (SharePoint, aangepaste apps via APIs)
- Phishing-resistant MFA deployed (FIDO2, Windows Hello, Certificate-based)
- Sensitivity labels (for SharePoint context scenarios)
- User training: Understanding step-up auth prompts
Implementatie
Gebruik PowerShell-script authentication-contexts.ps1 (functie Invoke-Remediation) β Authentication Contexts deployment.
- Define contexts: Azure AD β voorwaardelijke toegang β Authentication context
- Maak aan CA policies per context: Context C1 β Require phishing-resistant MFA
- Tag resources: SharePoint sensitivity labels β Authentication context C1
- Test thoroughly: Pilot users, Verifieer step-up prompts, Controleer gebruikerservaring
- Production rollout: Phased approach, monitoren auth failures
Monitoring
Gebruik PowerShell-script authentication-contexts.ps1 (functie Invoke-Monitoring) β Controleren.
- Step-up auth events in Azure AD sign-in logs
- Context evaluation failures (blocked access)
- User feedback op auth friction
- Compliance: High-value resources protected?
Compliance en Auditing
- BIO 9.04 - Authentication management
- ISO 27001:2022 A.5.15 - Toegangscontrole en authenticatie (granular permissions)
- Zero Trust Architecture - Resource-based authentication
Remediatie
Gebruik PowerShell-script authentication-contexts.ps1 (functie Invoke-Remediation) β Herstellen.
Compliance & Frameworks
- BIO: 09.04.02 - Granular authentication requirements
- ISO 27001:2022: A.5.15 - Toegangscontrole en authenticatie gebaseerd op sensitivity
Automation
Gebruik het onderstaande PowerShell script om deze security control te monitoren en te implementeren. Het script bevat functies voor zowel monitoring (-Monitoring) als remediation (-Remediation).
Risico zonder implementatie
Management Samenvatting
Authentication Contexts: Granular auth requirements per resource sensitivity - Sensitive operations require step-up auth (FIDO2 re-authentication), Normal operations allow convenient auth (passwordless), Context-aware policies (M365 apps call specific auth contexts). Vereist: Azure AD P1 + app integration. Activatie: Entra ID β CA β Auth contexts definition β App integration. Gratis (P1 included). Implementatie: 12-24 uur. ADVANCED Zero Trust - only mature identity programs. Complex implementation.
- Implementatietijd: 24 uur
- FTE required: 0.15 FTE