Describing Azure AD Identity Protection and Conditional Access policies
Conditional Access policies enforce additional verification actions based on a signal that a user or device may be potentially compromised. The foundation of Conditional Access policies is the zero-trust methodology. So, before we discuss planning and implementing Conditional Access, let's discuss the main points of zero-trust.
Zero-trust methodology
As we have moved as companies to using cloud providers, such as Microsoft, the responsibility for securing the physical infrastructure for cloud services is provided by these cloud providers. If we are adhering to a defense in depth security posture, Microsoft is responsible for the physical first layer of defense, making the first layer that we are responsible for as a company the identity and access layer. Therefore, the statements identity is the new perimeter and identity is the new control plane have become extremely important in securing a cloud infrastructure...