M365 Microsoft Entra ID Capability Group

All Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
EID-CA-E3 Conditional Access protect partial T1059.009 Cloud API
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1078 Valid Accounts
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110 Brute Force
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.001 Password Guessing
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.002 Password Cracking
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.003 Password Spraying
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1110.004 Credential Stuffing
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1586.003 Cloud Accounts
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect partial T1621 Multi-Factor Authentication Request Generation
Comments
Multiple conditions along can be combined to create fine-grained and specific policies that partially enforce access controls to account resources that adversaries may attempt to abuse: conditional access to Cloud APIs, blocking legacy authentication, requiring multi-factor authentication for users, block access by location, block access to unsupported devices, failed login attempts, account lockout policies, etc.. These features may require Microsoft Entra ID P2.
References
EID-CA-E3 Conditional Access protect minimal T1074 Data Staged
Comments
This control only provides the ability to restrict file downloads for a limited set of applications and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect minimal T1074.001 Local Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1074.002 Remote Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1078 Valid Accounts
Comments
This control only provides minimal protection for this technique's procedure examples along and also only protects one of its sub-techniques resulting in an overall Minimal score.
References
EID-CA-E3 Conditional Access protect significant T1078.004 Cloud Accounts
Comments
This control can protect against the abuse of valid cloud accounts by requiring MFA or blocking access altogether based on signals such as the user's IP location information, device compliance state, risky sign-in/user state (through integration with Azure AD Identity Protection). Additionally, session controls that can limit what a valid user can do within an app can also be triggered based on the aforementioned triggers.
References
EID-CA-E3 Conditional Access protect significant T1110 Brute Force
Comments
Conditional Access can be used to enforce MFA for users which provides significant protection against password compromises, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.001 Password Guessing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.002 Password Cracking
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.003 Password Spraying
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.004 Credential Stuffing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect minimal T1213 Data from Information Repositories
Comments
This control only provides the ability to restrict an adversary from collecting valuable information for a limited set of applications (SharePoint, Exchange, OneDrive) and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect partial T1213.002 Sharepoint
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint with no ability to download, print, or sync files. Furthermore, with its integration with Microsoft Cloud App Security, it can even restrict cut, copy and paste operations. This can impede an adversary's ability to collect valuable information and/or files from the application. This protection is partial as it doesn't prohibit an adversary from potentially viewing sensitive information and manually collecting it, for example simply writing down information by hand.
References
EID-CA-E3 Conditional Access protect minimal T1530 Data from Cloud Storage
Comments
Conditional Access, when granting (risky) users access to cloud storage, specifically OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to exfiltrate data from OneDrive. The protection coverage provided by this control is Minimal as it doesn't provide protection for other storage services available on Azure such as the Azure Storage service.
References
EID-CA-E3 Conditional Access protect minimal T1074 Data Staged
Comments
This control only provides the ability to restrict file downloads for a limited set of applications and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect minimal T1074.001 Local Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1074.002 Remote Data Staging
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint and OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint/OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to collect and stage files. This offers minimal coverage as it requires the target application to support such a feature that can be triggered by this control and to date only a few (Office) applications support this.
References
EID-CA-E3 Conditional Access protect minimal T1078 Valid Accounts
Comments
This control only provides minimal protection for this technique's procedure examples along and also only protects one of its sub-techniques resulting in an overall Minimal score.
References
EID-CA-E3 Conditional Access protect significant T1078.004 Cloud Accounts
Comments
This control can protect against the abuse of valid cloud accounts by requiring MFA or blocking access altogether based on signals such as the user's IP location information, device compliance state, risky sign-in/user state (through integration with Azure AD Identity Protection). Additionally, session controls that can limit what a valid user can do within an app can also be triggered based on the aforementioned triggers.
References
EID-CA-E3 Conditional Access protect significant T1110 Brute Force
Comments
Conditional Access can be used to enforce MFA for users which provides significant protection against password compromises, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.001 Password Guessing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.002 Password Cracking
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.003 Password Spraying
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect significant T1110.004 Credential Stuffing
Comments
Conditional Access can be used to enforce MFA for users which can significantly reduce the impact of a password compromise, requiring an adversary to complete an additional authentication method before their access is permitted.
References
EID-CA-E3 Conditional Access protect minimal T1213 Data from Information Repositories
Comments
This control only provides the ability to restrict an adversary from collecting valuable information for a limited set of applications (SharePoint, Exchange, OneDrive) and therefore its overall Coverage score is minimal.
References
EID-CA-E3 Conditional Access protect partial T1213.002 Sharepoint
Comments
Conditional Access (CA), when granting (risky) users access to Office applications like SharePoint can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to SharePoint with no ability to download, print, or sync files. Furthermore, with its integration with Microsoft Cloud App Security, it can even restrict cut, copy and paste operations. This can impede an adversary's ability to collect valuable information and/or files from the application. This protection is partial as it doesn't prohibit an adversary from potentially viewing sensitive information and manually collecting it, for example simply writing down information by hand.
References
EID-CA-E3 Conditional Access protect minimal T1530 Data from Cloud Storage
Comments
Conditional Access, when granting (risky) users access to cloud storage, specifically OneDrive, can restrict what they can do in these applications using its app-enforced restrictions. For example, it can enforce that users on unmanaged devices will have browser-only access to OneDrive with no ability to download, print, or sync files. This can impede an adversary's ability to exfiltrate data from OneDrive. The protection coverage provided by this control is Minimal as it doesn't provide protection for other storage services available on Azure such as the Azure Storage service.
References
EID-CA-E3 Conditional Access respond minimal T1078 Valid Accounts
Comments
This control only protects cloud accounts and therefore its overall coverage is minimal resulting in a Minimal respond score for this technique.
References
EID-CA-E3 Conditional Access respond minimal T1078 Valid Accounts
Comments
This control only protects cloud accounts and therefore its overall coverage is minimal resulting in a Minimal respond score for this technique.
References
EID-CA-E3 Conditional Access respond partial T1078.004 Cloud Accounts
Comments
Security controls like Azure AD Identity Protection can raise a user's risk level asynchronously after they have used a valid account to access organizational data. This CAE control can respond to this change in the users risky state to terminate the user's access within minutes or enforce an additional authentication method such as MFA. This mitigates the impact of an adversary using a valid account. This is control only forces the user to re-authenticate and doesn't resolve the usage of a valid account (i.e. password change) and is therefore a containment type of response.
References
EID-CA-E3 Conditional Access respond partial T1078.004 Cloud Accounts
Comments
Security controls like Azure AD Identity Protection can raise a user's risk level asynchronously after they have used a valid account to access organizational data. This CAE control can respond to this change in the users risky state to terminate the user's access within minutes or enforce an additional authentication method such as MFA. This mitigates the impact of an adversary using a valid account. This is control only forces the user to re-authenticate and doesn't resolve the usage of a valid account (i.e. password change) and is therefore a containment type of response.
References
EID-CA-E3 Conditional Access protect partial T1496.001 Compute Hijacking
Comments
In the event that a session is hijacked, continuous access evaluation can be used to terminate the session, potentially before any malicious actions can occur.
References
EID-CA-E3 Conditional Access protect partial T1496.004 Cloud Service Hijacking
Comments
In the event that a session is hijacked, continuous access evaluation can be used to terminate the session, potentially before any malicious actions can occur.
References
EID-CA-E3 Conditional Access protect partial T1557.004 Evil Twin
Comments
Conditional Access policies can restrict devices, potentially stopping them from connecting to an Evil Twin network.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1078 Valid Accounts
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1098.003 Additional Cloud Roles
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1098.006 Additional Container Cluster Roles
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1110 Brute Force
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1114 Email Collection
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1114.002 Remote Email Collection
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1134.001 Token Impersonation/Theft
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1531 Account Access Removal
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1539 Steal Web Session Cookie
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1548.005 Temporary Elevated Cloud Access
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
EID-CAE-E3 Continuous Access Evaluation detect significant T1548.006 TCC Manipulation
Comments
Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1556.006 Multi-Factor Authentication
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1585 Establish Accounts
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1585.002 Email Accounts
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1585.003 Cloud Accounts
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1586 Compromise Accounts
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1586.002 Email Accounts
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1586.003 Cloud Accounts
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1586.003 Cloud Accounts
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-CAE-E3 Continuous Access Evaluation detect significant T1651 Cloud Administration Command
    Comments
    Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1021.007 Cloud Services
    Comments
    Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, use of strong two-factor for remote service accounts will mitigate an adversary's ability to leverage stolen credentials. License Requirements: All Microsoft Entra ID licenses
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1078.004 Cloud Accounts
    Comments
    Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity from credential attacks (e.g., brute force, token theft, etc.). License Requirements: All Microsoft Entra ID licenses
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1098.001 Additional Cloud Credentials
    Comments
    Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity (e.g., additional cloud permissions, etc.). License Requirements: All Microsoft Entra ID licenses
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1098.003 Additional Cloud Roles
    Comments
    Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity (e.g., additional cloud roles, etc.). License Requirements: All Microsoft Entra ID licenses
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1110 Brute Force
    Comments
    Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity from credential attacks (e.g., brute force, token theft, etc.). License Requirements: All Microsoft Entra ID licenses
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1110 Brute Force
    Comments
    This control provides significant protection against this brute force technique by completing obviating the need for passwords by replacing it with passwordless credentials.
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1110.001 Password Guessing
    Comments
    Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity from credential attacks (e.g., brute force, token theft, etc.). License Requirements: All Microsoft Entra ID licenses
    References
    EID-PWLA-E3 Passwordless Authentication protect significant T1110.001 Password Guessing
    Comments
    This control provides significant protection against password based attacks by completing obviating the need for passwords by replacing it with passwordless credentials.
    References
      EID-PWLA-E3 Passwordless Authentication protect significant T1110.002 Password Cracking
      Comments
      Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity from credential attacks (e.g., brute force, token theft, etc.). License Requirements: All Microsoft Entra ID licenses
      References
      EID-PWLA-E3 Passwordless Authentication protect significant T1110.002 Password Cracking
      Comments
      This control provides significant protection against password based attacks by completing obviating the need for passwords by replacing it with passwordless credentials.
      References
        EID-PWLA-E3 Passwordless Authentication protect significant T1110.003 Password Spraying
        Comments
        Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity from credential attacks (e.g., brute force, token theft, etc.). License Requirements: All Microsoft Entra ID licenses
        References
        EID-PWLA-E3 Passwordless Authentication protect significant T1110.003 Password Spraying
        Comments
        This control provides significant protection against password based attacks by completing obviating the need for passwords by replacing it with passwordless credentials.
        References
          EID-PWLA-E3 Passwordless Authentication protect significant T1110.004 Credential Stuffing
          Comments
          Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity from credential attacks (e.g., brute force, token theft, etc.). License Requirements: All Microsoft Entra ID licenses
          References
          EID-PWLA-E3 Passwordless Authentication protect significant T1110.004 Credential Stuffing
          Comments
          This control provides significant protection against password based attacks by completing obviating the need for passwords by replacing it with passwordless credentials.
          References
            EID-PWLA-E3 Passwordless Authentication protect significant T1136.003 Cloud Account
            Comments
            Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity (e.g., account creation, etc.). License Requirements: All Microsoft Entra ID licenses
            References
            EID-PWLA-E3 Passwordless Authentication protect significant T1531 Account Access Removal
            Comments
            Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity (e.g., account creation, account deletion etc.). License Requirements: All Microsoft Entra ID licenses
            References
            EID-PWLA-E3 Passwordless Authentication protect significant T1539 Steal Web Session Cookie
            Comments
            Microsoft recommended the use of Passwordless authentication. This method provides the most secure MFA sign-in process by replacing the password with something you have, plus something you are or something you know.(e.g., Biometric, FIDO2 security keys, Microsoft’s Authenticator app). When combined with Conditional Access policies, Passwordless Authentication can significantly protect against the likelihood of adversary activity from credential attacks (e.g., token theft, etc.). License Requirements: All Microsoft Entra ID licenses
            References
            EID-IDPR-E5 ID Protection detect partial T1021.008 Direct Cloud VM Connections
            Comments
            As this technique involves the use of Valid Accounts, Defender's behavioral analytics and Conditional Access can also lead to the detection of Direct Cloud VM Connections.
            References
            EID-IDPR-E5 ID Protection detect partial T1021.008 Direct Cloud VM Connections
            Comments
            As this technique involves the use of Valid Accounts, Entra ID Protection's partial detection of the use of Valid Accounts for malicious purposes can also lead to the detection of Direct Cloud VM Connections.
            References
              EID-IDPR-E5 ID Protection detect partial T1078 Valid Accounts
              EID-IDPR-E5 ID Protection detect partial T1078.002 Domain Accounts
              Comments
              When Azure Active Directory (AAD) Federation is configured for a tenant, an adversary that compromises a domain credential can use it to access (Azure) cloud resources. Identity Protection supports applying its risk detections (e.g.: Anonymous IP address, Atypical travel, Malware linked IP address, Unfamiliar sign-in properties, etc.) to federated identities thereby providing detection mitigation for this risk. Because this detection is specific to an adversary utilizing valid domain credentials to access cloud resources and does not mitigate the usage of valid domain credentials to access on-premise resources, this detection has been scored as Partial. The temporal factor of this control's detection is low because although there are some real-time detections most are offline detections (multi-day).
              References
                EID-IDPR-E5 ID Protection detect partial T1078.004 Cloud Accounts
                Comments
                This control provides risk detections that can be used to detect suspicious uses of valid accounts, e.g.: Anonymous IP address, Atypical travel, Malware linked IP address, Unfamiliar sign-in properties, etc. Microsoft utilizes machine learning and heuristic systems to reduce the false positive rate but there will be false positives. The temporal factor of this control's detection is low because although there are some real-time detections most are offline detections (multi-day).
                References
                  EID-IDPR-E5 ID Protection respond significant T1078.004 Cloud Accounts
                  Comments
                  Response Type: Eradication Supports blocking and resetting the user's credentials based on the detection of a risky user/sign-in manually and also supports automation via its user and sign-in risk policies.
                  References
                    EID-IDPR-E5 ID Protection protect significant T1098 Account Manipulation
                    Comments
                    Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. Identity Protection requires users be a Security Reader, Security Operator, Security Administrator, Global Reader, or Global Administrator in order to access the dashboard. License Requirements: Microsoft Entra ID P2
                    References
                    EID-IDPR-E5 ID Protection protect partial T1098.001 Additional Cloud Credentials
                    Comments
                    Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. Identity Protection requires users be a Security Reader, Security Operator, Security Administrator, Global Reader, or Global Administrator in order to access the dashboard. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                    References
                    EID-IDPR-E5 ID Protection detect significant T1098.003 Additional Cloud Roles
                    Comments
                    Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. Identity Protection requires users be a Security Reader, Security Operator, Security Administrator, Global Reader, or Global Administrator in order to access the dashboard. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                    References
                    EID-IDPR-E5 ID Protection detect minimal T1110 Brute Force
                    EID-IDPR-E5 ID Protection respond minimal T1110 Brute Force
                    Comments
                    Provides significant response capabilities for one of this technique's sub-techniques (Password Spray). Due to this capability being specific to one of its sub-techniques and not its remaining sub-techniques, the coverage score is Minimal resulting in an overall Minimal score.
                    References
                    EID-IDPR-E5 ID Protection protect partial T1110 Brute Force
                    Comments
                    Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                    References
                    EID-IDPR-E5 ID Protection protect partial T1110.001 Password Guessing
                    Comments
                    Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                    References
                    EID-IDPR-E5 ID Protection protect partial T1110.002 Password Cracking
                    Comments
                    Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                    References
                    EID-IDPR-E5 ID Protection detect partial T1110.003 Password Spraying
                    Comments
                    This control specifically provides detection of Password Spray attacks for Azure Active Directory accounts. Microsoft documentation states that this detection is based on a machine learning algorithm that has been improved with the latest improvement yielding a 100 percent increase in recall and 98 percent precision. The temporal factor for this detection is Partial as its detection is described as offline (i.e. detections may not show up in reporting for two to twenty-four hours).
                    References
                      EID-IDPR-E5 ID Protection respond significant T1110.003 Password Spraying
                      Comments
                      Response Type: Eradication Supports blocking and resetting the user's credentials based on the detection of a risky user/sign-in (such as Password Spray attack) manually and also supports automation via its user and sign-in risk policies.
                      References
                        EID-IDPR-E5 ID Protection protect partial T1110.003 Password Spraying
                        Comments
                        Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                        References
                        EID-IDPR-E5 ID Protection protect partial T1110.004 Credential Stuffing
                        Comments
                        Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                        References
                        EID-IDPR-E5 ID Protection protect minimal T1556 Modify Authentication Process
                        Comments
                        During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                        References
                        EID-IDPR-E5 ID Protection protect significant T1556.006 Multi-Factor Authentication
                        Comments
                        During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                        References
                        EID-IDPR-E5 ID Protection protect partial T1586.003 Cloud Accounts
                        Comments
                        Cloud accounts should have complex and unique passwords across all systems on the network. Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. These identity-based risks can be further fed into tools like Conditional Access to make access decisions or fed back to a security information and event management (SIEM) tool for further investigation and correlation. During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. License Requirements: Microsoft Entra ID P2
                        References
                        EID-IDPR-E5 ID Protection protect significant T1621 Multi-Factor Authentication Request Generation
                        Comments
                        During each sign-in, Identity Protection runs all real-time sign-in detections generating a sign-in session risk level, indicating how likely the sign-in has been compromised. Based on this risk level, policies are then applied to protect the user and the organization. Risk-based Conditional Access policies can be enabled to require access controls such as providing a strong authentication method, perform multi-factor authentication, or perform a secure password reset based on the detected risk level. If the user successfully completes the access control, the risk is automatically remediated. License Requirements: Microsoft Entra ID P2
                        References
                        EID-IDPR-E5 ID Protection detect partial T1606 Forge Web Credentials
                        Comments
                        This control can be effective at detecting forged web credentials because it uses environmental properties (e.g. IP address, device info, etc.) to detect risky users and sign-ins even when valid credentials are utilized. It provides partial coverage of this technique's sub-techniques and therefore has been assessed a Partial score.
                        References
                        EID-IDPR-E5 ID Protection respond partial T1606 Forge Web Credentials
                        EID-IDPR-E5 ID Protection detect partial T1606.002 SAML Tokens
                        Comments
                        This control supports detecting risky sign-ins and users that involve federated users and therefore can potentially alert on this activity. Not all alert types for this control support federated accounts therefore the detection coverage for this technique is partial.
                        References
                          EID-IDPR-E5 ID Protection respond significant T1606.002 SAML Tokens
                          Comments
                          Response Type: Eradication Supports blocking and resetting the user's credentials based on the detection of a risky user/sign-in manually and also supports automation via its user and sign-in risk policies.
                          References
                            EID-IDSS-E3 Identity Secure Score protect minimal T1040 Network Sniffing
                            Comments
                            This control's "Stop clear text credentials exposure" provides a recommendation to run the "Entities exposing credentials in clear text" assessment that monitors your traffic for any entities exposing credentials in clear text (via LDAP simple-bind). This assessment seems specific to LDAP simple-binds and coupled with the fact that it is a recommendation and is not enforced, results in a Minimal score.
                            References
                            EID-IDSS-E3 Identity Secure Score protect minimal T1078 Valid Accounts
                            Comments
                            This control provides recommendations that can lead to protecting against the malicious usage of valid cloud accounts but does not provide recommendations for the remaining sub-techniques Additionally, it provides limited protection for this technique's procedure examples. Consequently, its overall protection coverage score is minimal.
                            References
                            EID-IDSS-E3 Identity Secure Score detect minimal T1078 Valid Accounts
                            Comments
                            This control provides recommendations that can lead to the detection of the malicious usage of valid cloud accounts but does not provide recommendations for the remaining sub-techniques Additionally, it provides limited detection for this technique's procedure examples. Consequently, its overall detection coverage score is minimal.
                            References
                            EID-IDSS-E3 Identity Secure Score protect minimal T1078.001 Default Accounts
                            Comments
                            This control's "Protect and manage local admin passwords with Microsoft LAPS" recommendation recommends periodically running and reviewing the Microsoft LAPS usage report that identifies all Windows based devices not protected by Microsoft LAPS. This can help reduce the compromise of local administrator accounts. Because this is a recommendations and not actually enforced coupled with being limited to sensitive accounts, the assessed score is Minimal.
                            References
                              EID-IDSS-E3 Identity Secure Score protect minimal T1078.002 Domain Accounts
                              Comments
                              This control's "Remove dormant accounts from sensitive groups" recommendation recommends reviewing dormant (domain) accounts from sensitive groups via an assessment report that can identify sensitive accounts that are dormant. Because these are recommendations and do not actually enforce the protections coupled with being limited to sensitive accounts, the assessed score is Minimal.
                              References
                                EID-IDSS-E3 Identity Secure Score protect minimal T1078.003 Local Accounts
                                Comments
                                This control's "Protect and manage local admin passwords with Microsoft LAPS" recommendation recommends periodically running and reviewing the Microsoft LAPS usage report that identifies all Windows based devices not protected by Microsoft LAPS. This can help reduce the compromise of local administrator accounts. Because this is a recommendations and not actually enforced coupled with being limited to sensitive accounts, the assessed score is Minimal.
                                References
                                  EID-IDSS-E3 Identity Secure Score protect partial T1078.004 Cloud Accounts
                                  Comments
                                  This control's "Require MFA for administrative roles" and "Ensure all users can complete multi-factor authentication for secure access" recommendations of MFA can provide protection against an adversary that obtains valid credentials by requiring the adversary to complete an additional authentication process before access is permitted. See the mapping for MFA for more details. This control's "Use limited administrative roles" recommendation recommends reviewing and limiting the number of accounts with global admin privilege, reducing what an adversary can do with a compromised valid account. Because these are recommendations and do not actually enforce the protections, the assessed score is capped at Partial.
                                  References
                                    EID-IDSS-E3 Identity Secure Score detect partial T1078.004 Cloud Accounts
                                    Comments
                                    This control's "Turn on sign-in risk policy" and "Turn on user risk policy" recommendations recommend enabling Azure AD Identity Protection which can lead to detecting adversary usage of valid accounts. See the mapping for Azure AD Identity Protection.
                                    References
                                      EID-IDSS-E3 Identity Secure Score protect partial T1110 Brute Force
                                      EID-IDSS-E3 Identity Secure Score protect partial T1110.001 Password Guessing
                                      Comments
                                      This control's "Require MFA for administrative roles" and "Ensure all users can complete multi-factor authentication for secure access" recommendations for enabling MFA can significantly lead to reducing the impact of a password compromise of accounts, requiring the adversary to complete an additional authentication method before their access is permitted. This control's "Do not expire passwords" recommendation also can lead to mitigating the Password Guessing or Cracking sub-techniques by disabling password reset which tends to lead to users selecting weaker passwords. This control's "Enable policy to block legacy authentication" and "Stop legacy protocols communication" recommendations can lead to protecting against these brute force attacks as Microsoft research has shown organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled. Additionally, the same research shows that more than 99 percent of password spray and more than 97 percent of credential stuffing attacks use legacy authentication. This control's "Resolve unsecure account attributes" recommendation can lead to detecting accounts with disabled (Kerberos) Preauthentication which can enable offline Password Cracking. Because these are recommendations and do not actually enforce MFA, the assessed score is capped at Partial.
                                      References
                                        EID-IDSS-E3 Identity Secure Score protect partial T1110.002 Password Cracking
                                        Comments
                                        This control's "Require MFA for administrative roles" and "Ensure all users can complete multi-factor authentication for secure access" recommendations for enabling MFA can significantly lead to reducing the impact of a password compromise of accounts, requiring the adversary to complete an additional authentication method before their access is permitted. This control's "Do not expire passwords" recommendation also can lead to mitigating the Password Guessing or Cracking sub-techniques by disabling password reset which tends to lead to users selecting weaker passwords. This control's "Enable policy to block legacy authentication" and "Stop legacy protocols communication" recommendations can lead to protecting against these brute force attacks as Microsoft research has shown organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled. Additionally, the same research shows that more than 99 percent of password spray and more than 97 percent of credential stuffing attacks use legacy authentication. This control's "Resolve unsecure account attributes" recommendation can lead to detecting accounts with disabled (Kerberos) Preauthentication which can enable offline Password Cracking. Because these are recommendations and do not actually enforce MFA, the assessed score is capped at Partial.
                                        References
                                          EID-IDSS-E3 Identity Secure Score protect partial T1110.003 Password Spraying
                                          Comments
                                          This control's "Require MFA for administrative roles" and "Ensure all users can complete multi-factor authentication for secure access" recommendations for enabling MFA can significantly lead to reducing the impact of a password compromise of accounts, requiring the adversary to complete an additional authentication method before their access is permitted. This control's "Do not expire passwords" recommendation also can lead to mitigating the Password Guessing or Cracking sub-techniques by disabling password reset which tends to lead to users selecting weaker passwords. This control's "Enable policy to block legacy authentication" and "Stop legacy protocols communication" recommendations can lead to protecting against these brute force attacks as Microsoft research has shown organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled. Additionally, the same research shows that more than 99 percent of password spray and more than 97 percent of credential stuffing attacks use legacy authentication. This control's "Resolve unsecure account attributes" recommendation can lead to detecting accounts with disabled (Kerberos) Preauthentication which can enable offline Password Cracking. Because these are recommendations and do not actually enforce MFA, the assessed score is capped at Partial.
                                          References
                                            EID-IDSS-E3 Identity Secure Score protect partial T1110.004 Credential Stuffing
                                            Comments
                                            This control's "Require MFA for administrative roles" and "Ensure all users can complete multi-factor authentication for secure access" recommendations for enabling MFA can significantly lead to reducing the impact of a password compromise of accounts, requiring the adversary to complete an additional authentication method before their access is permitted. This control's "Do not expire passwords" recommendation also can lead to mitigating the Password Guessing or Cracking sub-techniques by disabling password reset which tends to lead to users selecting weaker passwords. This control's "Enable policy to block legacy authentication" and "Stop legacy protocols communication" recommendations can lead to protecting against these brute force attacks as Microsoft research has shown organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled. Additionally, the same research shows that more than 99 percent of password spray and more than 97 percent of credential stuffing attacks use legacy authentication. This control's "Resolve unsecure account attributes" recommendation can lead to detecting accounts with disabled (Kerberos) Preauthentication which can enable offline Password Cracking. Because these are recommendations and do not actually enforce MFA, the assessed score is capped at Partial.
                                            References
                                              EID-IDSS-E3 Identity Secure Score detect partial T1133 External Remote Services
                                              Comments
                                              This control's "Configure VPN Integration" recommendation can lead to detecting abnormal VPN connections that may be indicative of an attack. Although this control provides a recommendation that is limited to a specific external remote service type of VPN, most of this technique's procedure examples are VPN related resulting in a Partial overall score.
                                              References
                                              EID-IDSS-E3 Identity Secure Score detect minimal T1134 Access Token Manipulation
                                              EID-IDSS-E3 Identity Secure Score detect partial T1134.005 SID-History Injection
                                              Comments
                                              This control's "Remove unsecure SID history attributes from entities" recommendation promotes running the "Unsecure SID history attributes" report periodically which can lead to identifying accounts with SID History attributes which Microsoft Defender for Identity profiles to be risky. Because this is a recommendation and not actually enforced, coupled with the detection its assessed score is capped at Partial.
                                              References
                                                EID-IDSS-E3 Identity Secure Score protect partial T1528 Steal Application Access Token
                                                Comments
                                                This control's "Do not allow users to grant consent to unmanaged applications" recommendation can protect against an adversary constructing a malicious application designed to be granted access to resources with the target user's OAuth token by ensuring users can not be fooled into granting consent to the application. Due to this being a recommendation, its score is capped at Partial.
                                                References
                                                EID-IDSS-E3 Identity Secure Score protect partial T1531 Account Access Removal
                                                EID-IDSS-E3 Identity Secure Score protect partial T1550 Use Alternate Authentication Material
                                                EID-IDSS-E3 Identity Secure Score protect partial T1550.002 Pass the Hash
                                                Comments
                                                This control's "Reduce lateral movement path risk to sensitive entities" recommendation can lead to protecting sensitive accounts against Pass-the-Hash and Pass-the-Ticket attacks by recommending running the Lateral-Movement-Paths report to understand and identify exactly how attackers can move laterally through the monitored network to gain access to privileged identities. Because this is a recommendation, its score has been capped as Partial.
                                                References
                                                  EID-IDSS-E3 Identity Secure Score protect partial T1550.003 Pass the Ticket
                                                  Comments
                                                  This control's "Reduce lateral movement path risk to sensitive entities" recommendation can lead to protecting sensitive accounts against Pass-the-Hash and Pass-the-Ticket attacks by recommending running the Lateral-Movement-Paths report to understand and identify exactly how attackers can move laterally through the monitored network to gain access to privileged identities. Because this is a recommendation, its score has been capped as Partial.
                                                  References
                                                    EID-IDSS-E3 Identity Secure Score protect minimal T1552 Unsecured Credentials
                                                    Comments
                                                    This control's "Resolve unsecure account attributes" provides recommendations that can lead to strengthening how accounts are stored in Active Directory. This control provides recommendations specific to a few types of unsecured credentials (reversible and weakly encrypted credentials) while not providing recommendations for any other, resulting in a Minimal score.
                                                    References
                                                    EID-IDSS-E3 Identity Secure Score protect minimal T1552.007 Container API
                                                    EID-IDSS-E3 Identity Secure Score protect partial T1558 Steal or Forge Kerberos Tickets
                                                    EID-IDSS-E3 Identity Secure Score protect partial T1558.001 Golden Ticket
                                                    Comments
                                                    This control's "Reduce lateral movement path risk to sensitive entities" recommendation can lead to protecting sensitive accounts against Pass-the-Hash and Pass-the-Ticket attacks that may result in an adversary acquiring a golden ticket. It recommends running the Lateral-Movement-Paths report to understand and identify exactly how attackers can move laterally through the monitored network to gain access to privileged identities such as the KRBTGT on the domain controller. Because this is a recommendation, its score has been capped as Partial.
                                                    References
                                                      EID-IDSS-E3 Identity Secure Score protect partial T1558.003 Kerberoasting
                                                      Comments
                                                      This control's "Modify unsecure Kerberos delegations to prevent impersonation" recommendation promotes running the "Unsecure Kerberos delegation" report that can identify accounts that have unsecure Kerberos delegation configured. Unsecured Kerberos delegation can lead to exposing account TGTs to more hosts resulting in an increased attack surface for Kerberoasting. Due to this control providing a recommendation its score is capped at Partial.
                                                      References
                                                        EID-IDSS-E3 Identity Secure Score protect partial T1558.004 AS-REP Roasting
                                                        Comments
                                                        This control's "Resolve unsecure account attributes" recommendation can lead to detecting Active Directory accounts which do not require Kerberos preauthentication. Preauthentication offers protection against offline (Kerberos) Password Cracking. Because this is a recommendation its score is capped as Partial.
                                                        References
                                                          EID-IDSS-E3 Identity Secure Score detect partial T1606 Forge Web Credentials
                                                          EID-IDSS-E3 Identity Secure Score detect partial T1606.002 SAML Tokens
                                                          Comments
                                                          This control's "Turn on sign-in risk policy" and "Turn on user risk policy" recommendations recommend enabling Azure AD Identity Protection which can detect the malicious usage of SAML Tokens. This is a recommendation and therefore the score is capped at Partial.
                                                          References
                                                            EID-RBAC-E3 Role Based Access Control protect significant T1059.009 Cloud API
                                                            Comments
                                                            Using Role-Based Access Control to create a zero-trust environment can ensure that only accounts explicitly granted access to API tools can use them. This prevents unauthorized use and potential exploitation/misuse.
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect minimal T1059 Command and Scripting Interpreter
                                                            Comments
                                                            The RBAC control can be used to partially protect against the abuse of Cloud APIs but does not provide protection against this technique's other sub-techniques or other example procedures. Due to its Minimal coverage score, it receives a score of minimal. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1059.009 Cloud API
                                                            Comments
                                                            The RBAC control can be used to implement the principle of least privilege to limit API functionality administrative accounts can take. This scores Partial for its ability to minimize the actions these accounts can perform. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect minimal T1078 Valid Accounts
                                                            Comments
                                                            The RBAC control can be used to implement the principle of least privilege for account management, reducing the potential actions that can be taken with Valid Default and Cloud Accounts. Although RBAC can limit the actions the adversary can take if a Valid Account has been compromised, it does not protect against different variations of the technique's procedure. Due to overall Minimal coverage, it receives an overall score of Minimal. License Requirements: ME-ID Built-in Roles (Free) License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1078.001 Default Accounts
                                                            Comments
                                                            The RBAC control can be used to implement the principle of least privilege for account management, reducing the available actions an adversary can perform with a default account. This scores Partial for its ability to minimize the overall accounts with management privileges. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1078.004 Cloud Accounts
                                                            Comments
                                                            The RBAC control can be used to implement the principle of least privilege for account management, reducing the available actions an adversary can perform with a cloud account. This scores Partial for its ability to minimize the overall accounts with management privileges. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect minimal T1087 Account Discovery
                                                            Comments
                                                            The RBAC control can be used to partially protect against Cloud Account Discovery, but does not provide protection against this technique's other sub-techniques or example procedures. Due to its Minimal coverage score, it receives an overall score of minimal. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1087.004 Cloud Account
                                                            Comments
                                                            The RBAC control can be used to implement the principle of least privilege for account management, limiting the accounts that can be used to perform account discovery. This scores Partial for its ability to minimize the overall accounts with these role privileges. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1098 Account Manipulation
                                                            Comments
                                                            The RBAC control can generally be used to implement the principle of least privilege to protect against the number of accounts with management capabilities. This has Partial coverage of Account Manipulation sub-techniques, resulting in an overall score of Partial. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1098.001 Additional Cloud Credentials
                                                            Comments
                                                            The RBAC control can be used to implement the principle of least privilege for account management in order to limit the number of accounts with the ability to add additional cloud credentials. This receives a score of Partial for its ability to minimize known accounts with the ability to add credentials. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1098.003 Additional Cloud Roles
                                                            Comments
                                                            The RBAC control can be used to implement the principle of least privilege for account management in order to limit the number of accounts with the ability to add additional cloud roles. This receives a score of Partial for its ability to minimize known accounts with the ability to add roles. License Requirements: ME-ID Built-in Roles (Free)
                                                            References
                                                            EID-RBAC-E3 Role Based Access Control protect partial T1127.002 ClickOnce
                                                            Comments
                                                            Incorporating Role-Based Access Control can help to ensure that only those who need to use ClickOnce applications may do so, protecting against the threat of misuse.
                                                            References
                                                              EID-RBAC-E3 Role Based Access Control protect minimal T1136 Create Account
                                                              Comments
                                                              The RBAC control can generally be used to implement the principle of least privilege to protect against account creation. For the given product space, this control helps protect against only against Cloud Account creation, and none of this technique’s other sub-techniques or procedures. Due to overall Minimal coverage, it receives an overall score of Minimal. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1136.003 Cloud Account
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege for account management in order to limit the number of accounts that can create new accounts. This receives a score of Partial for its ability to minimize known accounts with the ability to create new accounts. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1199 Trusted Relationship
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to properly manage accounts and permissions of parties in trusted relationships. This scores Partial for its ability to minimize the the potential abuse by the party and if it is comprised by an adversary. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1213 Data from Information Repositories
                                                              Comments
                                                              The RBAC control can generally be used to protect against and limit adversary access to valuable information repositories. Although it does not have full coverage of this technique's sub-techniques, it also helps protect against Procedure examples, resulting in an overall score of Partial. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1213.002 Sharepoint
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege for access to SharePoint repositories to only those required for an account. This scores Partial for its ability to minimize the attack surface of accounts with access to potentially valuable information. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1213.003 Code Repositories
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege for access to SharePoint repositories to only those required for an account. This scores Partial for its ability to minimize the attack surface of accounts with access to potentially valuable information. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1213.004 Customer Relationship Management Software
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege for access to SharePoint repositories to only those required for an account. This scores Partial for its ability to minimize the attack surface of accounts with access to potentially valuable information. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1216.002 SyncAppvPublishingServer
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege for access to SharePoint repositories to only those required for an account. This scores Partial for its ability to minimize the attack surface of accounts with access to potentially valuable information. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1484 Domain or Tenant Policy Modification
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to limit administrative accounts. This scores Partial for its ability to minimize the overall accounts that can modify domain policies. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1484.002 Trust Modification
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to limit accounts with the access to domain trusts. This scores Partial for its ability to minimize the overall accounts with these privileges. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1528 Steal Application Access Token
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege, limiting accounts with access to application tokens. This receives a score of Partial for its ability to minimize the attack surface of accounts this ability. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1530 Data from Cloud Storage
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege for cloud data storage access to only those required. This scores Partial for its ability to minimize the attack surface of accounts with storage solution access. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1538 Cloud Service Dashboard
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege, limiting dashboard visibility to necessary accounts. This receives a score of Partial for its ability to minimize the discovery value a dashboard may have in the event of a compromised account. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect minimal T1548.005 Temporary Elevated Cloud Access
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to limit the ability of cloud accounts to assume, create, or impersonate only required privileges. This scores Minimal for its ability to protect against the actions temporary elevated accounts can take. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect minimal T1556 Modify Authentication Process
                                                              Comments
                                                              The RBAC control can be used to limit cloud accounts with authentication modification relevant privileges, but does not provide protection against this technique's other sub-techniques or example procedures. Due to its Minimal coverage score, it receives a score of minimal. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1556.006 Multi-Factor Authentication
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to limit account management control of MFA. This scores Partial for its ability to minimize overall accounts with the ability to change or disable MFA. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1556.007 Hybrid Identity
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to limit Global Administrator accounts, and ensure these accounts are cloud-only. This scores Partial for its ability to minimize hybrid accounts with administrative privileges. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect minimal T1562 Impair Defenses
                                                              Comments
                                                              The RBAC control can be used to partially protect against the ability to Disable or Modify Cloud Logs, but has minimal coverage against this technique's other sub-techniques and example procedures. Due to its Minimal coverage score, it receives an overall score of minimal. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1562.008 Disable or Modify Cloud Logs
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to limit users with permission to modify logging policies to those required. This scores Partial for its ability to minimize the overall accounts with the ability to modify cloud logging capabilities. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1648 Serverless Execution
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege to limit accounts with permissions for serverless services to those required. This scores Partial for its ability to minimize the overall accounts with this ability. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1651 Cloud Administration Command
                                                              Comments
                                                              The RBAC control can be used to implement the principle of least privilege for account management, limiting the number of Global and Intune administrators to those required. This scores Partial for its ability to minimize the overall accounts with associated privileges. License Requirements: ME-ID Built-in Roles (Free)
                                                              References
                                                              EID-RBAC-E3 Role Based Access Control protect partial T1480.002 Mutual Exclusion
                                                              Comments
                                                              Implementing Role-Based Access Control will help prevent access to sensitive resources, ensuring only those with the proper authorization can use them.
                                                              References
                                                                EID-RBAC-E3 Role Based Access Control protect partial T1546.016 Installer Packages
                                                                Comments
                                                                The RBAC control can be used to implement the principle of least privilege to limit the ability of accounts to utilize installer packages, reserving the ability to install software to those with higher privileges.
                                                                References
                                                                EID-MFA-E3 Multifactor Authentication protect minimal T1078 Valid Accounts
                                                                Comments
                                                                This control only protects cloud accounts and therefore its overall protection coverage is Minimal.
                                                                References
                                                                EID-MFA-E3 Multifactor Authentication protect partial T1078.004 Cloud Accounts
                                                                Comments
                                                                MFA can provide protection against an adversary that obtains valid credentials by requiring the adversary to complete an additional authentication process before access is permitted. This is an incomplete protection measure though as the adversary may also have obtained credentials enabling bypassing the additional authentication method.
                                                                References
                                                                  EID-MFA-E3 Multifactor Authentication protect significant T1078.004 Cloud Accounts
                                                                  Comments
                                                                  Requiring the use of MFA for all users can significantly reduce the likelihood of adversaries gaining access to the environment's cloud accounts.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect minimal T1098 Account Manipulation
                                                                  Comments
                                                                  Requiring the use of MFA along with conditional access policies may reduce the likelihood of adversaries making credential modifications, administrator changes, account manipulation, changes to permissions, etc.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect partial T1098.001 Additional Cloud Credentials
                                                                  Comments
                                                                  Requiring the use of MFA along with conditional access policies may reduce the likelihood of adversaries making credential modifications, administrator changes, account manipulation, changes to permissions, etc.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect partial T1098.002 Additional Email Delegate Permissions
                                                                  Comments
                                                                  Requiring the use of MFA along with conditional access policies may reduce the likelihood of adversaries making modifications, such as changes to email delegate permissions.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect partial T1098.003 Additional Cloud Roles
                                                                  Comments
                                                                  Requiring the use of MFA along with conditional access policies may reduce the likelihood of adversaries making credential modifications, administrator changes, account manipulation, changes to permissions, etc.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect significant T1098.005 Device Registration
                                                                  Comments
                                                                  Requiring the use of MFA to register devices in Entra ID along with conditional access policies can reduce the likelihood of successfu use of this technique.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect significant T1110 Brute Force
                                                                  Comments
                                                                  MFA provides significant protection against password compromises, requiring the adversary to complete an additional authentication method before their access is permitted.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect significant T1110 Brute Force
                                                                  Comments
                                                                  MFA provides significant protection against password compromises, requiring the adversary to complete an additional authentication method before their access is permitted.
                                                                  References
                                                                  EID-MFA-E3 Multifactor Authentication protect significant T1110.001 Password Guessing
                                                                  Comments
                                                                  MFA can significantly reduce the impact of a password compromise, requiring the adversary to complete an additional authentication method before their access is permitted.
                                                                  References
                                                                    EID-MFA-E3 Multifactor Authentication protect significant T1110.001 Password Guessing
                                                                    Comments
                                                                    MFA can significantly reduce the impact of a password compromise, requiring the adversary to complete an additional authentication method before access is permitted.
                                                                    References
                                                                    EID-MFA-E3 Multifactor Authentication protect significant T1110.002 Password Cracking
                                                                    Comments
                                                                    MFA can significantly reduce the impact of a password cracking, requiring the adversary to complete an additional authentication method before access is permitted. Based on studies, your account is less likely to get compromised by 99.9% by enabling MFA against the following techniques, for example: phishing, brute force, credential stuffing, key logging, etc.
                                                                    References
                                                                    EID-MFA-E3 Multifactor Authentication protect significant T1110.003 Password Spraying
                                                                    Comments
                                                                    MFA can significantly reduce the impact of a password compromise, requiring the adversary to complete an additional authentication method before their access is permitted.
                                                                    References
                                                                      EID-MFA-E3 Multifactor Authentication protect significant T1110.003 Password Spraying
                                                                      Comments
                                                                      MFA can significantly reduce the impact of a password spraying, requiring the adversary to complete an additional authentication method before access is permitted. Based on studies, your account is less likely to get compromised by 99.9% by enabling MFA against the following techniques: phishing, brute force, credential stuffing, key logging, etc.
                                                                      References
                                                                      EID-MFA-E3 Multifactor Authentication protect significant T1110.004 Credential Stuffing
                                                                      Comments
                                                                      MFA can significantly reduce the impact of a password compromise, requiring the adversary to complete an additional authentication method before their access is permitted.
                                                                      References
                                                                        EID-MFA-E3 Multifactor Authentication protect significant T1110.004 Credential Stuffing
                                                                        Comments
                                                                        MFA can significantly reduce the impact of a password spraying, requiring the adversary to complete an additional authentication method before access is permitted. Based on studies, your account is less likely to get compromised by 99.9% by enabling MFA against the following techniques: phishing, brute force, credential stuffing, key logging, etc.
                                                                        References
                                                                        EID-MFA-E3 Multifactor Authentication protect significant T1136.003 Cloud Account
                                                                        Comments
                                                                        MFA can significantly reduce the impact from adversaries creating accounts by requiring an additional authentication method for verification (e.g., Microsoft Authenticator, Authenticator Lite (in Outlook), Windows Hello for Business, FIDO2 security key, OATH hardware token (preview), OATH software token, SMS, Voice call, etc.)
                                                                        References
                                                                        EID-MFA-E3 Multifactor Authentication protect significant T1530 Data from Cloud Storage
                                                                        Comments
                                                                        MFA provides significant protection by enforcing and restricting access to resources (e.g., cloud storage, APIs, etc.).
                                                                        References
                                                                        EID-MFA-E3 Multifactor Authentication protect partial T1566 Phishing
                                                                        Comments
                                                                        Entra MFA can provide partial security protection against phishing tactics. It is a security measure that adds an extra layer of protection against phishing attacks by requiring users to verify their identity through more than one method.
                                                                        References
                                                                        EID-MFA-E3 Multifactor Authentication protect partial T1566.001 Spearphishing Attachment
                                                                        Comments
                                                                        Entra MFA can provide partial security protection against phishing tactics. It is a security measure that adds an extra layer of protection against phishing attacks by requiring users to verify their identity through more than one method.
                                                                        References
                                                                        EID-MFA-E3 Multifactor Authentication protect partial T1566.002 Spearphishing Link
                                                                        Comments
                                                                        Entra MFA can provide partial security protection against phishing tactics. It is a security measure that adds an extra layer of protection against phishing attacks by requiring users to verify their identity through more than one method.
                                                                        References
                                                                        EID-MFA-E3 Multifactor Authentication protect significant T1621 Multi-Factor Authentication Request Generation
                                                                        Comments
                                                                        Entra MFA can be used to implement limits upon the maximum number of MFA request prompts that can be sent to users in period of time and throttles sign-in attempts in certain cases involving repeated authentication requests.
                                                                        References
                                                                          EID-PWP-E3 Password Policy protect significant T1078 Valid Accounts
                                                                          Comments
                                                                          Accounts should have complex and unique passwords across all systems on the network. Passwords and access keys should be rotated regularly. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                          References
                                                                          EID-PWP-E3 Password Policy protect partial T1110 Brute Force
                                                                          Comments
                                                                          This control provides partial protection for most of this technique's sub-techniques and therefore has been scored as Partial.
                                                                          References
                                                                          EID-PWP-E3 Password Policy protect partial T1110 Brute Force
                                                                          Comments
                                                                          A password policy is applied to all user accounts that are created and managed directly in Microsoft Entra ID. By default, an account is locked out after 10 unsuccessful sign-in attempts with the wrong password. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                          References
                                                                          EID-PWP-E3 Password Policy protect significant T1110.001 Password Guessing
                                                                          Comments
                                                                          The password restrictions provided by the default Password policy along with the lockout threshold and duration settings is an effective protection against this Password Guessing sub-technique.
                                                                          References
                                                                            EID-PWP-E3 Password Policy protect significant T1110.001 Password Guessing
                                                                            Comments
                                                                            A password policy is applied to all user accounts that are created and managed directly in Microsoft Entra ID. By default, an account is locked out after 10 unsuccessful sign-in attempts with the wrong password. Further incorrect sign-in attempts lock out the user in real time for increasing durations of time. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                            References
                                                                            EID-PWP-E3 Password Policy protect partial T1110.002 Password Cracking
                                                                            Comments
                                                                            The password restrictions provided by the default Password policy can provide partial protection against password cracking but a determined adversary with sufficient resources can still be successful with this attack vector. In regards to Credential Stuffing, the password policy's lockout threshold can be partially effective in mitigating this sub-technique as it may lock the account before the correct credential is attempted. Although with credential stuffing, the number of passwords attempted for an account is often (much) fewer than with Password Guessing reducing the effectiveness of a lockout threshold. This led to its score being assessed as Partial rather than Significant (as was assessed for Password Guessing).
                                                                            References
                                                                              EID-PWP-E3 Password Policy protect partial T1110.002 Password Cracking
                                                                              Comments
                                                                              A password policy is applied to all user accounts that are created and managed directly in Microsoft Entra ID. By default, an account is locked out after 10 unsuccessful sign-in attempts with the wrong password. Further incorrect sign-in attempts lock out the user in real time for increasing durations of time. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                              References
                                                                              EID-PWP-E3 Password Policy protect partial T1110.003 Password Spraying
                                                                              Comments
                                                                              A password policy is applied to all user accounts that are created and managed directly in Microsoft Entra ID. By default, an account is locked out after 10 unsuccessful sign-in attempts with the wrong password. Further incorrect sign-in attempts lock out the user in real time for increasing durations of time. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                              References
                                                                              EID-PWP-E3 Password Policy protect partial T1110.004 Credential Stuffing
                                                                              Comments
                                                                              The password restrictions provided by the default Password policy can provide partial protection against password cracking but a determined adversary with sufficient resources can still be successful with this attack vector. In regards to Credential Stuffing, the password policy's lockout threshold can be partially effective in mitigating this sub-technique as it may lock the account before the correct credential is attempted. Although with credential stuffing, the number of passwords attempted for an account is often (much) fewer than with Password Guessing reducing the effectiveness of a lockout threshold. This led to its score being assessed as Partial rather than Significant (as was assessed for Password Guessing).
                                                                              References
                                                                                EID-PWP-E3 Password Policy protect partial T1110.004 Credential Stuffing
                                                                                Comments
                                                                                A password policy is applied to all user accounts that are created and managed directly in Microsoft Entra ID. By default, an account is locked out after 10 unsuccessful sign-in attempts with the wrong password. Further incorrect sign-in attempts lock out the user in real time for increasing durations of time. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWP-E3 Password Policy protect significant T1586.003 Cloud Accounts
                                                                                Comments
                                                                                Cloud accounts should have complex and unique passwords across all systems on the network. Passwords and access keys should be rotated regularly. By default, an account is locked out after 10 unsuccessful sign-in attempts with the wrong password. Further incorrect sign-in attempts lock out the user in real time for increasing durations of time. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1078 Valid Accounts
                                                                                Comments
                                                                                Accounts should have complex and unique passwords across all systems on the network. When a password is changed or reset for any user in a Microsoft Entra tenant, the current version of the global banned password list is used to validate the strength of the password. This validation check results in stronger passwords for all Microsoft Entra customers. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110 Brute Force
                                                                                Comments
                                                                                With Microsoft Entra Password Protection, default global banned password lists are automatically applied to all users in a Microsoft Entra tenant. To support your own business and security needs, you can define entries in a custom banned password list. When a password is changed or reset for any user in a Microsoft Entra tenant, the current version of the global banned password list is used to validate the strength of the password. This validation check results in stronger passwords for all Microsoft Entra customers. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110 Brute Force
                                                                                Comments
                                                                                With Microsoft Entra Password Protection, default global banned password lists are automatically applied to all users in a Microsoft Entra tenant. To support your own business and security needs, you can define entries in a custom banned password list. When a password is changed or reset for any user in a Microsoft Entra tenant, the current version of the global banned password list is used to validate the strength of the password. This validation check results in stronger passwords for all Microsoft Entra customers. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110.001 Password Guessing
                                                                                Comments
                                                                                Microsoft Entra Password Protection efficiently blocks known weak passwords likely to be used in password guessing attacks. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110.002 Password Cracking
                                                                                Comments
                                                                                Microsoft Entra Password Protection efficiently blocks known weak passwords likely to be used in password cracking attacks. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110.003 Password Spraying
                                                                                Comments
                                                                                Microsoft Entra Password Protection efficiently blocks known weak passwords likely to be used in password spray attacks. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110.003 Password Spraying
                                                                                Comments
                                                                                Microsoft Entra Password Protection efficiently blocks known weak passwords likely to be used in password spray attacks. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110.004 Credential Stuffing
                                                                                Comments
                                                                                With Microsoft Entra Password Protection, you can define entries in a custom banned password list. When a password is changed or reset for any user in a Microsoft Entra tenant, the current version of the global banned password list is used to validate the strength of the password. This validation check results in stronger passwords for all Microsoft Entra customers. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1110.004 Credential Stuffing
                                                                                Comments
                                                                                With Microsoft Entra Password Protection, you can define entries in a custom banned password list. When a password is changed or reset for any user in a Microsoft Entra tenant, the current version of the global banned password list is used to validate the strength of the password. This validation check results in stronger passwords for all Microsoft Entra customers. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PWPR-E3 Password Protection protect partial T1586.003 Cloud Accounts
                                                                                Comments
                                                                                Cloud accounts should have complex and unique passwords across all systems on the network. When a password is changed or reset for any user in a Microsoft Entra tenant, the current version of the global banned password list is used to validate the strength of the password. This validation check results in stronger passwords for all Microsoft Entra customers. License Requirements: Microsoft Entra ID Free, Microsoft Entra ID P1, or Microsoft Entra ID P2
                                                                                References
                                                                                EID-PIM-E5 Privileged Identity Management protect minimal T1078 Valid Accounts
                                                                                Comments
                                                                                This control only provides protection for one of this technique's sub-techniques while not providing any protection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
                                                                                References
                                                                                EID-PIM-E5 Privileged Identity Management protect minimal T1078 Valid Accounts
                                                                                Comments
                                                                                The PIM control supports an Access Review feature, which can partially be used to avoid stale role assignment for Valid Accounts: Cloud Accounts. The control does not protect against this technique's other sub-techniques, resulting in a Minimal coverage score, for an overall score of Minimal. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                References
                                                                                EID-PIM-E5 Privileged Identity Management protect partial T1078.004 Cloud Accounts
                                                                                Comments
                                                                                This control's Access Review feature supports scheduling a routine review of cloud account permission levels to look for those that could allow an adversary to gain wide access. This information can then be used to validate if such access is required and identify which (privileged) accounts should be monitored closely. This reduces the availability of valid accounts to adversaries. This review would normally be scheduled periodically, at most weekly, and therefore its temporal score is Partial.
                                                                                References
                                                                                  EID-PIM-E5 Privileged Identity Management protect partial T1078.004 Cloud Accounts
                                                                                  Comments
                                                                                  The PIM control supports an Access Review feature, which can be created to review privileged access to avoid stale role assignments. Access Reviews can be scheduled routinely, and used to help evaluate the state of privileged access. Performing this review can help minimize the availability of valid accounts to adversaries. Although this review can be scheduled periodically, it would not occur at real-time frequency, and is therefore assigned Partial. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                  References
                                                                                  EID-PIM-E5 Privileged Identity Management protect partial T1098 Account Manipulation
                                                                                  Comments
                                                                                  This control provides significant protection for some of this technique's sub-techniques while not providing any protection for others, resulting in a Partial score.
                                                                                  References
                                                                                  EID-PIM-E5 Privileged Identity Management detect minimal T1098 Account Manipulation
                                                                                  Comments
                                                                                  This control only provides detection for one of this technique's sub-techniques while not providing any detection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
                                                                                  References
                                                                                  EID-PIM-E5 Privileged Identity Management detect minimal T1098 Account Manipulation
                                                                                  Comments
                                                                                  The PIM control can assist post-execution detection by alerting on the assignment of privileged Additional Cloud Roles. This is not extendable to detect against the technique's other sub-techniques, resulting in overall minimal detection coverage. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                  References
                                                                                  EID-PIM-E5 Privileged Identity Management protect significant T1098 Account Manipulation
                                                                                  Comments
                                                                                  The PIM control provides significant protection against multiple sub-techniques, although not all, resulting in partial coverage. The control scores Significant for the temporal aspects of its protection, which include requiring activation by eligible privileged roles, and confirming user identity with MFA before execution. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                  References
                                                                                  EID-PIM-E5 Privileged Identity Management protect significant T1098.001 Additional Cloud Credentials
                                                                                  Comments
                                                                                  Privileged roles such as the Application Administrator role can be configured to require MFA on activation to provide additional protection against the execution of this technique. In addition these privileged roles can be assigned as eligible rather than permanently active roles to further reduce the attack surface.
                                                                                  References
                                                                                    EID-PIM-E5 Privileged Identity Management protect significant T1098.001 Additional Cloud Credentials
                                                                                    Comments
                                                                                    The PIM control can enforce on-activation requirements for privileged roles, such as the Application Administrator. Configuration can include an MFA requirement, which can provide additional protection against Additional Cloud Credentials. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. Due to these features, a score of Significant is assigned. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                    References
                                                                                    EID-PIM-E5 Privileged Identity Management protect significant T1098.003 Additional Cloud Roles
                                                                                    Comments
                                                                                    This control can require MFA to be triggered when the Global Administrator role is assigned to an account or when the role is activated by a user.
                                                                                    References
                                                                                      EID-PIM-E5 Privileged Identity Management detect significant T1098.003 Additional Cloud Roles
                                                                                      Comments
                                                                                      This control can notify administrators whenever the Global Administrator role is assigned to an account and can therefore be used to detect the execution of this sub-technique. Assigning the Global Administrator role to an account is an infrequent operation and as a result, the false positive rate should be minimal.
                                                                                      References
                                                                                        EID-PIM-E5 Privileged Identity Management detect significant T1098.003 Additional Cloud Roles
                                                                                        Comments
                                                                                        The PIM control can notify administrators when the Global Administrator and other administrator roles are assigned to an account, allowing it to be a method of detection for Additional Cloud Roles execution. PIM supports multiple security alerts, with customizable triggers, including numeric specificity. Following Microsoft's role based access control Best Practices, assignment of Global Administrator, among other administrative roles should be uncommon, resulting in an overall low false positive rate for detecting unexpected privileged role assignments. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                        References
                                                                                        EID-PIM-E5 Privileged Identity Management protect significant T1098.003 Additional Cloud Roles
                                                                                        Comments
                                                                                        The PIM control can enforce on-activation requirements for privileged roles, such as the Global Administrator. Configuration can include an MFA requirement, which can provide additional protection against Additional Cloud Roles. MFA can be required both when assigning these administrative roles, and/or when a user activates the role. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                        References
                                                                                        EID-PIM-E5 Privileged Identity Management detect significant T1098.007 Additional Local or Domain Groups
                                                                                        Comments
                                                                                        Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
                                                                                        References
                                                                                          EID-PIM-E5 Privileged Identity Management protect significant T1098.007 Additional Local or Domain Groups
                                                                                          Comments
                                                                                          Entra ID's continuous access evaluation is a security control implemented by enabling services to subscribe to critical Microsoft Entra events. Those events can then be evaluated and enforced near real time. This process enables tenant users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after a critical event is detected. The following events are currently evaluated: User Account is deleted or disabled Password for a user is changed or reset Multifactor authentication is enabled for the user Administrator explicitly revokes all refresh tokens for a user High user risk detected by Microsoft Entra ID Protection License Requirements: Continuous access evaluation will be included in all versions of Microsoft 365.
                                                                                          References
                                                                                            EID-PIM-E5 Privileged Identity Management protect minimal T1136 Create Account
                                                                                            Comments
                                                                                            This control only provides protection for one of this technique's sub-techniques while not providing any detection for the remaining and therefore its coverage score is Minimal, resulting in a Minimal score.
                                                                                            References
                                                                                            EID-PIM-E5 Privileged Identity Management protect partial T1136 Create Account
                                                                                            Comments
                                                                                            The PIM control provides significant protection against Create Account: Cloud Account, but not against the technique's other sub-techniques. An overall score of Partial is provided, although overall coverage for the across the sub-techniques is minimal. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                            References
                                                                                            EID-PIM-E5 Privileged Identity Management protect significant T1136.003 Cloud Account
                                                                                            Comments
                                                                                            Privileged roles such as the User Administrator role can be configured to require MFA on activation to provide additional protection against the execution of this technique. In addition, these privileged roles can be assigned as eligible rather than permanently active roles to further reduce the attack surface.
                                                                                            References
                                                                                              EID-PIM-E5 Privileged Identity Management protect significant T1136.003 Cloud Account
                                                                                              Comments
                                                                                              The PIM control can enforce on-activation requirements for privileged roles, such as the User Administrator. Configuration can include an MFA requirement, which can provide additional protection against Cloud Account creation. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. Due to these features, a score of Significant is assigned. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                              References
                                                                                              EID-PIM-E5 Privileged Identity Management protect minimal T1556 Modify Authentication Process
                                                                                              Comments
                                                                                              The PIM control significantly protects against the modification of Multi-Factor Authentication by placing limitations and restrictions on relevant privileged accounts. However, this is overall Minimal coverage relative to the all the technique's sub-techniques. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                              References
                                                                                              EID-PIM-E5 Privileged Identity Management protect significant T1556.006 Multi-Factor Authentication
                                                                                              Comments
                                                                                              The PIM control can enforce on-activation requirements for privileged roles, such as the Conditional Access Administrator, Global Administrator or Security Administrator, which include privileges necessary to modify certain MFA settings. Configuration can include an MFA requirement, which can provide additional protection against modifying Multi-Factor Authentication. MFA can be required both when assigning these administrative roles, and/or when a user activates the role. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. This scores Significant for its limitation of the overall accounts with these privileges, and the conditions for use. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                              References
                                                                                              EID-PIM-E5 Privileged Identity Management protect significant T1556.007 Hybrid Identity
                                                                                              Comments
                                                                                              The PIM control can enforce on-activation requirements for privileged roles, such as the Global Administrator, which may be used for modifying the hybrid identity authentication process from the cloud. Ideally, ensure these accounts are dedicated cloud-only rather than hybrid accounts. MFA can be required both when assigning Global Administrator, and/or when a user activates the role. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. This scores Significant for its limitation of the overall accounts with these privileges, and the conditions for use. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                              References
                                                                                              EID-PIM-E5 Privileged Identity Management protect significant T1651 Cloud Administration Command
                                                                                              Comments
                                                                                              The PIM control can enforce on-activation requirements for privileged roles, such as Global Administrators. Configuration can include an MFA requirement, which can help limit the overall privileged accounts available and their ability to execute administration commands. PIM can also be used to assigned privileged roles as "eligible" rather than "active" to further, requiring activation of the assigned role before use. Due to these features, a score of Significant is assigned. License Requirements: Microsoft Entra ID P2 or Microsoft Entra ID Governance
                                                                                              References

                                                                                              Capabilities

                                                                                              Capability ID Capability Name Number of Mappings
                                                                                              EID-PWLA-E3 Passwordless Authentication 17
                                                                                              EID-IDSS-E3 Identity Secure Score 29
                                                                                              EID-PWP-E3 Password Policy 11
                                                                                              EID-CA-E3 Conditional Access 42
                                                                                              EID-CAE-E3 Continuous Access Evaluation 20
                                                                                              EID-PWPR-E3 Password Protection 10
                                                                                              EID-PIM-E5 Privileged Identity Management 24
                                                                                              EID-RBAC-E3 Role Based Access Control 35
                                                                                              EID-IDPR-E5 Identity Protection 26
                                                                                              EID-MFA-E3 Multi-factor Authentication 23