|
1 | | -As organizations adopt cloud services across SaaS, PaaS, and IaaS models while maintaining on-premises infrastructure, security architects must design identity solutions that provide secure, consistent access across all environments. This unit provides guidance for designing access strategies that span cloud, hybrid, and multicloud scenarios. |
| 1 | +Organizations today operate across SaaS, PaaS, IaaS, hybrid, and multicloud environments. Securing access to resources in these diverse environments requires a coordinated strategy that addresses three control planes: identity, networking, and application controls. This unit helps you design access solutions that apply Zero Trust principles across all deployment models. |
2 | 2 |
|
3 | | -## Access strategy design considerations |
| 3 | +## Design considerations for access across deployment models |
4 | 4 |
|
5 | | -When designing access strategies, consider the level of integration required with existing identity infrastructure: |
| 5 | +Each deployment model presents distinct access challenges. Your access strategy should address how users and workloads authenticate, how network traffic reaches resources, and how applications enforce authorization. |
6 | 6 |
|
7 | | -| Scenario | Characteristics | Design Approach | |
8 | | -|----------|----------------|-----------------| |
9 | | -| **Cloud-only** | No on-premises directory; cloud-native workloads | Microsoft Entra ID as the sole identity provider | |
10 | | -| **Hybrid** | Existing on-premises AD; mix of cloud and on-premises resources | Directory synchronization with Microsoft Entra Connect | |
11 | | -| **Multicloud** | Resources across Azure, AWS, GCP, and other clouds | Federated identity with Microsoft Entra ID as primary provider | |
| 7 | +| Deployment model | Identity controls | Networking controls | Application controls | |
| 8 | +|-----------------|-------------------|--------------------|--------------------| |
| 9 | +| **SaaS** | SSO federation, Conditional Access | Secure Web Gateway, tenant restrictions | Cloud Access Security Broker (CASB), app consent policies | |
| 10 | +| **PaaS** | Managed identities, RBAC | Private endpoints, VNet integration | API authentication, token validation | |
| 11 | +| **IaaS** | Entra ID authentication, PIM | NSGs, Azure Firewall, Private Link | Application Proxy, host-based controls | |
| 12 | +| **Hybrid/on-premises** | Directory synchronization, federation | VPN/ExpressRoute, Private Access | Application Proxy, Kerberos constrained delegation | |
| 13 | +| **Multicloud** | Federated identity, workload identity federation | Cross-cloud network peering, Internet Access | Conditional Access across cloud providers | |
12 | 14 |
|
13 | | -Your access strategy should address authentication methods, authorization models, and the principle of least privilege across all environments. |
| 15 | +## Identity controls |
14 | 16 |
|
| 17 | +Identity controls determine who or what can access resources and under what conditions. |
15 | 18 |
|
16 | | -## Designing for SaaS application access |
| 19 | +### User identity |
17 | 20 |
|
18 | | -SaaS applications require secure authentication without exposing credentials to third parties. Design your SaaS access strategy to: |
| 21 | +Use Microsoft Entra ID as the primary identity provider across all environments. Key design decisions include: |
19 | 22 |
|
20 | | -- **Integrate applications with Microsoft Entra ID** - Use SAML, OAuth 2.0, or OpenID Connect for single sign-on (SSO) |
21 | | -- **Enforce Conditional Access** - Apply policies based on user risk, device compliance, and location |
22 | | -- **Implement application governance** - Use Microsoft Defender for Cloud Apps to discover shadow IT and govern sanctioned applications |
| 23 | +- **Single sign-on (SSO)** for SaaS applications using SAML, OAuth 2.0, or OpenID Connect. Microsoft Entra ID provides a gallery of preintegrated applications and supports custom app registrations. |
| 24 | +- **Azure role-based access control (RBAC)** for authorization to PaaS and IaaS resources. Assign roles at the narrowest scope necessary. |
| 25 | +- **Privileged Identity Management (PIM)** for just-in-time access to sensitive roles, reducing standing administrative privileges. |
| 26 | +- **Conditional Access** policies that evaluate signals like user risk, device compliance, location, and application sensitivity before granting access. |
23 | 27 |
|
24 | | -Microsoft Entra ID provides a gallery of pre-integrated applications and supports custom application registration for applications that support modern authentication protocols. |
| 28 | +### Workload identity |
25 | 29 |
|
26 | | -## Designing for PaaS and IaaS access |
| 30 | +Applications, services, and automation pipelines also need identities. Design for: |
27 | 31 |
|
28 | | -Platform and infrastructure services require both user and workload identity management. Key design considerations include: |
| 32 | +- **Managed identities** to eliminate credential management for Azure resources that access other Azure services. |
| 33 | +- **Workload identity federation** to enable external workloads, such as GitHub Actions or Kubernetes pods, to access Azure resources without storing secrets. |
| 34 | +- **Service principals with certificates** for automation scenarios that require explicit credential management. Avoid long-lived client secrets. |
29 | 35 |
|
30 | | -### User access to Azure resources |
| 36 | +## Networking controls |
31 | 37 |
|
32 | | -- Use Microsoft Entra ID for authentication to the Azure portal, CLI, and APIs |
33 | | -- Implement Azure role-based access control (RBAC) for authorization |
34 | | -- Apply Conditional Access policies to protect administrative access |
35 | | -- Use Privileged Identity Management (PIM) for just-in-time privileged access |
| 38 | +Networking controls determine how traffic flows between users, devices, and resources. Microsoft Entra's Security Service Edge (SSE) solution, called Global Secure Access, provides identity-aware network security. |
36 | 39 |
|
37 | | -### Workload identity access |
| 40 | +### Microsoft Entra Internet Access |
38 | 41 |
|
39 | | -Applications and services need identities to access other resources. Design for: |
| 42 | +Microsoft Entra Internet Access is an identity-based Secure Web Gateway (SWG) that protects access to SaaS applications and internet destinations. Use it to: |
40 | 43 |
|
41 | | -- **Managed identities** - Eliminate credential management for Azure resources accessing other Azure services |
42 | | -- **Workload identity federation** - Enable external workloads (GitHub Actions, Kubernetes) to access Azure resources without storing secrets |
43 | | -- **Service principals** - Use for automation scenarios requiring explicit credential management |
| 44 | +- Apply web content filtering based on categories or fully qualified domain names (FQDNs). |
| 45 | +- Enforce Conditional Access policies for internet traffic, even for destinations not federated with Microsoft Entra ID. |
| 46 | +- Enable universal tenant restrictions to prevent data exfiltration to unauthorized tenants or personal accounts. |
44 | 47 |
|
45 | | -## Designing for hybrid environments |
| 48 | +### Microsoft Entra Private Access |
46 | 49 |
|
47 | | -When your organization maintains both on-premises Active Directory and cloud resources, you need directory synchronization to provide a consistent identity experience. |
| 50 | +Microsoft Entra Private Access replaces traditional VPNs with Zero Trust Network Access (ZTNA). Use it to: |
48 | 51 |
|
49 | | -### Microsoft Entra Connect Sync |
| 52 | +- Provide per-app access to on-premises and IaaS-hosted private applications based on Conditional Access policies. |
| 53 | +- Eliminate broad network access by routing only authorized traffic to specific applications. |
| 54 | +- Secure access across hybrid and multicloud environments without requiring users to connect to corporate networks. |
50 | 55 |
|
51 | | -Microsoft Entra Connect Sync synchronizes users, groups, and credentials between on-premises AD and Microsoft Entra ID. Design your synchronization strategy to: |
| 56 | +### Additional network controls |
52 | 57 |
|
53 | | -- Determine which objects to synchronize based on organizational structure |
54 | | -- Choose the appropriate authentication method (password hash sync, pass-through authentication, or federation) |
55 | | -- Plan for high availability using multiple provisioning agents |
| 58 | +For PaaS and IaaS resources, layer network controls alongside identity controls: |
56 | 59 |
|
57 | | -Password hash synchronization provides the simplest deployment and enables features like leaked credential detection. Pass-through authentication keeps password validation on-premises, while federation with AD FS supports complex scenarios requiring on-premises policy evaluation. |
| 60 | +- **Azure Private Link and private endpoints** to ensure traffic to PaaS services stays on the Microsoft backbone network. |
| 61 | +- **Network security groups (NSGs)** and **Azure Firewall** to limit inbound and outbound traffic for IaaS workloads. |
| 62 | +- **ExpressRoute or site-to-site VPN** for dedicated connectivity between on-premises networks and Azure. |
58 | 63 |
|
59 | | -### Legacy application support |
| 64 | +## Application controls |
60 | 65 |
|
61 | | -Some applications require legacy authentication protocols like Kerberos or NTLM. Consider these options for supporting legacy authentication in hybrid environments: |
| 66 | +Application controls govern what apps users can access and how those apps handle data. |
62 | 67 |
|
63 | | -- **Microsoft Entra Domain Services** - Provides managed domain services (domain join, group policy, LDAP, Kerberos/NTLM) without deploying domain controllers |
64 | | -- **Self-managed AD DS in Azure** - Deploy domain controllers in Azure VMs for full control over the directory |
| 68 | +### Microsoft Defender for Cloud Apps |
65 | 69 |
|
66 | | -Microsoft Entra Domain Services is appropriate for lift-and-shift scenarios where applications need domain services but don't require direct access to domain controllers. |
| 70 | +Microsoft Defender for Cloud Apps provides CASB capabilities to secure SaaS usage. Use it to: |
67 | 71 |
|
68 | | -## Designing for multicloud access |
| 72 | +- Discover shadow IT by identifying unsanctioned SaaS applications in use. |
| 73 | +- Apply session controls that restrict downloads, uploads, or copy/paste actions based on Conditional Access policies. |
| 74 | +- Monitor and govern sanctioned applications with real-time activity policies. |
69 | 75 |
|
70 | | -Organizations using multiple cloud providers need consistent identity management. Design your multicloud strategy to: |
| 76 | +### Microsoft Entra Application Proxy |
71 | 77 |
|
72 | | -- **Federate with Microsoft Entra ID** - Configure AWS, GCP, and other providers to trust Microsoft Entra ID as an identity provider |
73 | | -- **Use Conditional Access** - Apply consistent access policies regardless of which cloud hosts the resource |
74 | | -- **Implement cross-cloud governance** - Use Microsoft Entra Permissions Management to discover and remediate excessive permissions across clouds |
| 78 | +For on-premises web applications that can't be exposed directly to the internet, Application Proxy provides secure remote access. It integrates with Conditional Access to enforce MFA and device compliance checks for legacy web applications without modifying the application code. |
75 | 79 |
|
76 | | -## Security principles and controls for access strategies |
| 80 | +### Application consent and permissions |
77 | 81 |
|
78 | | -A Zero Trust approach provides the foundation for your access strategy design. Apply these principles and their corresponding security controls across all environments: |
| 82 | +Control which applications users can consent to by configuring app consent policies in Microsoft Entra ID. For applications that request high-privilege permissions, require admin consent to prevent users from inadvertently granting broad access to organizational data. |
79 | 83 |
|
80 | | -| Zero Trust Principle | Security Controls | |
81 | | -|---------------------|-------------------| |
82 | | -| **Verify explicitly** | Require phishing-resistant MFA for all users; enforce Conditional Access based on user risk, device compliance, and location; block legacy authentication protocols | |
83 | | -| **Use least privilege** | Implement Azure RBAC with minimal permissions; use Privileged Identity Management (PIM) for just-in-time privileged access; configure time-limited access for sensitive roles | |
84 | | -| **Assume breach** | Enable sign-in and audit logs; integrate with Microsoft Sentinel for security monitoring; require compliant or hybrid-joined devices; configure session controls and sign-in frequency | |
| 84 | +## Access strategy for multicloud environments |
85 | 85 |
|
86 | | -Beyond these core principles, consider these additional design guidelines: |
| 86 | +When resources span multiple cloud providers, establish Microsoft Entra ID as the central identity provider: |
87 | 87 |
|
88 | | -- **Consolidate identity providers** - Use Microsoft Entra ID as the primary identity provider across cloud, hybrid, and multicloud environments to simplify governance and ensure consistent policy enforcement |
89 | | -- **Plan authentication evolution** - Design for phishing-resistant authentication methods like passkeys and certificate-based authentication, even if you can't deploy them immediately |
90 | | -- **Address legacy systems** - Identify applications that can't use modern authentication and plan appropriate solutions (Microsoft Entra Domain Services, federation, or application proxy) |
91 | | -- **Enable visibility** - Ensure all authentication events across all environments flow to centralized logging for security monitoring and incident response |
| 88 | +- **Federate AWS accounts** with Microsoft Entra ID through AWS IAM Identity Center for SSO and automated user lifecycle management. |
| 89 | +- **Federate Google Cloud** projects by configuring Google as a service provider that trusts Microsoft Entra ID for authentication. |
| 90 | +- **Use Conditional Access** to enforce consistent authentication policies regardless of which cloud provider hosts the resource, requiring MFA, device compliance, and risk evaluation for every sign-in. |
| 91 | +- **Monitor cross-cloud permissions** using Microsoft Defender for Cloud to identify overprovisioned identities and enforce least privilege across Azure, AWS, and GCP. |
| 92 | + |
| 93 | +## Apply Zero Trust principles across all environments |
| 94 | + |
| 95 | +A Zero Trust approach provides the foundation for your access strategy. Apply these principles across all control planes: |
| 96 | + |
| 97 | +| Principle | How to apply | |
| 98 | +|-----------|-------------| |
| 99 | +| **Verify explicitly** | Require phishing-resistant MFA; enforce Conditional Access based on risk, device, and location; block legacy authentication | |
| 100 | +| **Use least privilege** | Implement RBAC with minimal permissions; use PIM for just-in-time access; right-size workload identity permissions | |
| 101 | +| **Assume breach** | Route traffic through Global Secure Access for inspection; integrate authentication events with Microsoft Sentinel; configure session controls and sign-in frequency | |
| 102 | + |
| 103 | +When you design your access strategy, ensure all authentication events across all environments flow to centralized logging for security monitoring and incident response. |
0 commit comments