M365 EID-CA-E3

Conditional access enables organizations to configure and fine-tune access policies with contextual factors such as user, device, location, and real-time risk information to control what a specific user can access, and how and when they have access.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
EID-CA-E3 Conditional Access protect partial T1059.009 Cloud API
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1078 Valid Accounts
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110 Brute Force
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.001 Password Guessing
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.002 Password Cracking
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.003 Password Spraying
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.004 Credential Stuffing
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1586.003 Cloud Accounts
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1621 Multi-Factor Authentication Request Generation
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect minimal T1074 Data Staged
Comments
This control only provides the ability to restrict file downloads for a limited set of applications and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect minimal T1074.001 Local Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1074.002 Remote Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1078 Valid Accounts
Comments
This control only provides minimal protection for this technique's procedure examples along and also only protects one of its sub-techniques resulting in an overall Minimal score.
References
EID-CA-E3 Conditional Access protect significant T1078.004 Cloud Accounts
Comments
This control can protect against the abuse of valid cloud accounts by requiring MFA or blocking access altogether based on signals such as the user's IP location information, device compliance state, risky sign-in/user state (through integration with Azure AD Identity Protection). Additionally, session controls that can limit what a valid user can do within an app can also be triggered based on the aforementioned triggers.
References
EID-CA-E3 Conditional Access protect significant T1110 Brute Force
Comments
Conditional Access can be used to enforce MFA for users which provides significant protection against password compromises, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.001 Password Guessing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.002 Password Cracking
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.003 Password Spraying
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.004 Credential Stuffing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect minimal T1213 Data from Information Repositories
Comments
This control only provides the ability to restrict an adversary from collecting valuable information for a limited set of applications (SharePoint, Exchange, OneDrive) and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect partial T1213.002 Sharepoint
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint with no ability to download, print, or sync files. Furthermore, with its integration with Microsoft Cloud App Security, it can even restrict cut, copy and paste operations. This can impede an adversary's ability to collect valuable information and/or files from the application. This protection is partial as it doesn't prohibit an adversary from potentially viewing sensitive information and manually collecting it, for example simply writing down information by hand.
References
EID-CA-E3 Conditional Access protect minimal T1530 Data from Cloud Storage
Comments
Conditional Access, when granting (risky) users access to cloud storage, specifically OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to exfiltrate data from OneDrive. The protection coverage provided by this control is Minimal as it doesn't provide protection for other storage services available on Azure such as the Azure Storage service.
References
EID-CA-E3 Conditional Access protect minimal T1074 Data Staged
Comments
This control only provides the ability to restrict file downloads for a limited set of applications and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect minimal T1074.001 Local Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1074.002 Remote Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1078 Valid Accounts
Comments
This control only provides minimal protection for this technique's procedure examples along and also only protects one of its sub-techniques resulting in an overall Minimal score.
References
EID-CA-E3 Conditional Access protect significant T1078.004 Cloud Accounts
Comments
This control can protect against the abuse of valid cloud accounts by requiring MFA or blocking access altogether based on signals such as the user's IP location information, device compliance state, risky sign-in/user state (through integration with Azure AD Identity Protection). Additionally, session controls that can limit what a valid user can do within an app can also be triggered based on the aforementioned triggers.
References
EID-CA-E3 Conditional Access protect significant T1110 Brute Force
Comments
Conditional Access can be used to enforce MFA for users which provides significant protection against password compromises, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.001 Password Guessing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.002 Password Cracking
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.003 Password Spraying
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.004 Credential Stuffing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect minimal T1213 Data from Information Repositories
Comments
This control only provides the ability to restrict an adversary from collecting valuable information for a limited set of applications (SharePoint, Exchange, OneDrive) and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect partial T1213.002 Sharepoint
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint with no ability to download, print, or sync files. Furthermore, with its integration with Microsoft Cloud App Security, it can even restrict cut, copy and paste operations. This can impede an adversary's ability to collect valuable information and/or files from the application. This protection is partial as it doesn't prohibit an adversary from potentially viewing sensitive information and manually collecting it, for example simply writing down information by hand.
References
EID-CA-E3 Conditional Access protect minimal T1530 Data from Cloud Storage
Comments
Conditional Access, when granting (risky) users access to cloud storage, specifically OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to exfiltrate data from OneDrive. The protection coverage provided by this control is Minimal as it doesn't provide protection for other storage services available on Azure such as the Azure Storage service.
References
EID-CA-E3 Conditional Access respond minimal T1078 Valid Accounts
Comments
This control only protects cloud accounts and therefore its overall coverage is minimal resulting in a Minimal respond score for this technique.
References
EID-CA-E3 Conditional Access respond minimal T1078 Valid Accounts
Comments
This control only protects cloud accounts and therefore its overall coverage is minimal resulting in a Minimal respond score for this technique.
References
EID-CA-E3 Conditional Access respond partial T1078.004 Cloud Accounts
Comments
Security controls like Azure AD Identity Protection can raise a user's risk level asynchronously after they have used a valid account to access organizational data. This CAE control can respond to this change in the users risky state to terminate the user's access within minutes or enforce an additional authentication method such as MFA. This mitigates the impact of an adversary using a valid account. This is control only forces the user to re-authenticate and doesn't resolve the usage of a valid account (i.e. password change) and is therefore a containment type of response.
References
EID-CA-E3 Conditional Access respond partial T1078.004 Cloud Accounts
Comments
Security controls like Azure AD Identity Protection can raise a user's risk level asynchronously after they have used a valid account to access organizational data. This CAE control can respond to this change in the users risky state to terminate the user's access within minutes or enforce an additional authentication method such as MFA. This mitigates the impact of an adversary using a valid account. This is control only forces the user to re-authenticate and doesn't resolve the usage of a valid account (i.e. password change) and is therefore a containment type of response.
References
EID-CA-E3 Conditional Access protect partial T1496.001 Compute Hijacking
Comments
In the event that a session is hijacked, continuous access evaluation can be used to terminate the session, potentially before any malicious actions can occur.
References
EID-CA-E3 Conditional Access protect partial T1496.004 Cloud Service Hijacking
Comments
In the event that a session is hijacked, continuous access evaluation can be used to terminate the session, potentially before any malicious actions can occur.
References
EID-CA-E3 Conditional Access protect partial T1557.004 Evil Twin
Comments
Conditional Access policies can restrict devices, potentially stopping them from connecting to an Evil Twin network.
References