Skip to content

Commit bbe3369

Browse files
authored
Merge pull request #191319 from BarbaraSelden/BarbaraSelden-22-09-memo
New content set for memo 22-09
2 parents 0fe784a + 8c8994b commit bbe3369

8 files changed

+583
-57
lines changed
Lines changed: 56 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,56 @@
1-
### YamlMime:Landing
2-
3-
title: Azure Active Directory configuring to standards documentation
4-
summary: Azure and Azure Active Directory enable you to leverage their compliance certifications and configure your environment to meet governmental and industry standards.
5-
6-
metadata:
7-
title: Azure Active Directory configuring to standards documentation
8-
description: "Learn to configure Azure and Azure Active directory to meet governmental and industry standards."
9-
manager: mtillman
10-
ms.author: baselden
11-
ms.collection: na
12-
ms.date: 04/26/2021
13-
ms.service: active-directory
14-
ms.subservice: na
15-
ms.topic: landing-page
16-
services: active-directory
17-
18-
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
19-
20-
landingContent:
21-
# Card
22-
- title: Standards overviews
23-
linkLists:
24-
- linkListType: overview
25-
links:
26-
- text: Configure to identity standards
27-
url: standards-overview.md
28-
- text: NIST AAL overview
29-
url: nist-overview.md
30-
- text: FedRAMP High impact overview
31-
url: configure-azure-active-directory-for-fedramp-high-impact.md
32-
33-
# Card
34-
- title: Configure NIST AALs
35-
linkLists:
36-
- linkListType: how-to-guide
37-
links:
38-
- text: Achieve NIST AAL 1
39-
url: nist-authenticator-assurance-level-1.md
40-
- text: Achieve NIST AAL 2
41-
url: nist-authenticator-assurance-level-2.md
42-
- text: Achieve NIST AAL 3
43-
url: nist-authenticator-assurance-level-3.md
44-
45-
# Card
46-
- title: Configure FedRAMP controls
47-
linkLists:
48-
- linkListType: how-to-guide
49-
links:
50-
- text: Configure access controls
51-
url: fedramp-access-controls.md
52-
- text: Configure identification and authentication controls
53-
url: fedramp-identification-and-authentication-controls.md
54-
- text: Configure additional controls
55-
url: fedramp-other-controls.md
56-
1+
### YamlMime:Landing
2+
3+
title: Azure Active Directory configuring to standards documentation
4+
summary: Azure and Azure Active Directory enable you to leverage their compliance certifications and configure your environment to meet governmental and industry standards.
5+
6+
metadata:
7+
title: Azure Active Directory configuring to standards documentation
8+
description: "Learn to configure Azure and Azure Active directory to meet governmental and industry standards."
9+
manager: mtillman
10+
ms.author: baselden
11+
ms.collection: na
12+
ms.date: 04/26/2021
13+
ms.service: active-directory
14+
ms.subservice: na
15+
ms.topic: landing-page
16+
services: active-directory
17+
18+
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
19+
20+
landingContent:
21+
# Card
22+
- title: Standards overviews
23+
linkLists:
24+
- linkListType: overview
25+
links:
26+
- text: Configure to identity standards
27+
url: standards-overview.md
28+
- text: NIST AAL overview
29+
url: nist-overview.md
30+
- text: FedRAMP High impact overview
31+
url: configure-azure-active-directory-for-fedramp-high-impact.md
32+
33+
# Card
34+
- title: Configure NIST AALs
35+
linkLists:
36+
- linkListType: how-to-guide
37+
links:
38+
- text: Achieve NIST AAL 1
39+
url: nist-authenticator-assurance-level-1.md
40+
- text: Achieve NIST AAL 2
41+
url: nist-authenticator-assurance-level-2.md
42+
- text: Achieve NIST AAL 3
43+
url: nist-authenticator-assurance-level-3.md
44+
45+
# Card
46+
- title: Configure FedRAMP controls
47+
linkLists:
48+
- linkListType: how-to-guide
49+
links:
50+
- text: Configure access controls
51+
url: fedramp-access-controls.md
52+
- text: Configure identification and authentication controls
53+
url: fedramp-identification-and-authentication-controls.md
54+
- text: Configure additional controls
55+
url: fedramp-other-controls.md
56+
1002 Bytes
Loading
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: Memo 22-09 authorization requirements
3+
description: Guidance on meeting authorization requirements outlined in US government OMB memorandum 22-09
4+
services: active-directory
5+
ms.service: active-directory
6+
ms.subservice: standards
7+
ms.workload: identity
8+
ms.topic: how-to
9+
author: barbaraselden
10+
ms.author: baselden
11+
manager: martinco
12+
ms.reviewer: martinco
13+
ms.date: 3/10/2022
14+
ms.custom: it-pro
15+
ms.collection: M365-identity-device-management
16+
---
17+
18+
# Meet authorization requirements for Memorandum 22-09
19+
20+
This series of articles offer guidance for employing Azure Active Directory (Azure AD) as a centralized identity management system for implementing Zero Trust principles as described by the US Federal Government’s Office of Management and Budget (OMB) [Memorandum M-22-09](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf). Throughout this document. We refer to it as “The memo.”
21+
22+
[Memorandum M-22-09](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf) requires specific types of enforcement within your MFA policies. Specifically, you must account for device-based, role-based, attribute-based controls, and privileged access management.
23+
24+
25+
26+
## Device-based controls
27+
28+
M-22-09 specifically requires the use of at least one device-based signal when making an authorization decision to access a system or application. This requirement can be enforced using Conditional Access and there are several device signals that can be applied during the authorization. The following table describes the signal and the requirements to retrieve the signal:
29+
30+
| Signal| Signal retrieval |
31+
| - | - |
32+
| Device must be managed| Integration with Intune or another MDM that supports this integration are required.
33+
Hybrid Azure AD joined since the device is managed by active directory also qualifies |
34+
| Device must be compliant| Integration with Intune or other MDM’s that support this integration are required. For more information, see [Use device compliance policies to set rules for devices you manage with Intune](/mem/intune/protect/device-compliance-get-started) |
35+
| Threat signals| Microsoft Defender for Endpoint and other EDR tools have integrations with Azure AD and Intune to send threat signals that can be used to deny access. Threat signals are part of the compliant status signal |
36+
| Cross tenant access policies| permits an organization to trust device signals from devices belonging to other organizations. (public preview) |
37+
38+
## Role-based access controls
39+
40+
Role based access control (RBAC role) remains an important way to enforce basic authorizations through assignments of users to a role in a particular scope. Azure AD has tools that make RBAC assignment and lifecycle management easier. This includes assigning access using [entitlement management](../governance/entitlement-management-overview.md) features, include [Access Packages](../governance/entitlement-management-access-package-create.md) and [Access Reviews](../governance/access-reviews-overview.md). These ease the burden of managing authorizations by providing self-service requests and automated functions to managed the lifecycle, for example by automatically ending access based of specific criteria.
41+
42+
## Attribute-based controls
43+
44+
Attribute based access controls rely on metadata assigned to a user or resource as a mechanism to permit or deny access during authentication. There are several ways you can create authorizations using ABAC enforcements for data and resources through authentication.
45+
46+
### Attributes assigned to users
47+
48+
Attributes assigned to users and stored in Azure AD can be leveraged to create authorizations for users. This is achieved through the automatic assignment of users to [Dynamic Groups](../enterprise-users/groups-create-rule.md) based on a particular ruleset defined during group creation. Rules are configured to add or remove a user from the group based on the evaluation of the rule against the user and one or more of their attributes. This feature has greater value when your attributes are maintained and not statically set on users from the day of creation.
49+
50+
### Attributes assigned to data
51+
52+
Azure AD allows integration of an authorization directly to the data. You can create integrate authorization in multiple ways.
53+
54+
You can configure [authentication context](../conditional-access/concept-conditional-access-cloud-apps.md) within Conditional Access Policies. This allows you to, for example, restrict which actions a user can take within an application or on specific data. These authentication contexts are then mapped within the data source itself. Data sources can be office files like word and excel or SharePoint sites that use mapped to your authentication context. An example of this integration is shown [here](/sharepoint/authentication-context-example).
55+
56+
You can also leverage authentication context assigned to data directly in your applications. This requires integration with the application code and [developers](../develop/developer-guide-conditional-access-authentication-context.md) to adopt this capability. Authentication context integration with Microsoft Defender for Cloud Apps can be used to control [actions taken on data using session controls](/defender-cloud-apps/session-policy-aad). Dynamic groups mentioned previously when combined with Authentication context allow you to control user access mappings between the data and the user attributes.
57+
58+
### Attributes assigned to resources
59+
60+
Azure includes [ABAC for Storage](../../role-based-access-control/conditions-overview.md) which allows the assignment of metadata tags on data stored in an Azure blob storage account. This metadata can then be assigned to users using role assignments to grant access.
61+
62+
## Privileged Access Management
63+
64+
The memo specifically calls out the use of privileged access management tools that leverage single factor ephemeral credentials for accessing systems as insufficient. These technologies often include password vault products that accept MFA logon for an admin and produce a generated password for an alternate account used to access the system. The system being accessed is still accessed with a single factor. Microsoft has tools for implementing [Privileged identity management](../privileged-identity-management/pim-configure.md) (PIM) for privileged systems with the central identity management system of Azure AD. Using the methods described in the MFA section you can enforce MFA for most privileged systems directly, whether these are applications, infrastructure, or devices. Azure also features PIM capabilities to step up into a specific privileged role. This requires implementation of PIM with Azure AD identities and identifying those systems that are privileged and require additional protections to prevent lateral movement. Configuration guidance is located [here](../privileged-identity-management/pim-deployment-plan.md).
65+
66+
## Next steps
67+
68+
The following articles are a part of this documentation set:
69+
70+
[Meet identity requirements of Memorandum 22-09](memo-22-09-meet-identity-requirements.md)
71+
72+
[Enterprise-wide identity management system](memo-22-09-enterprise-wide-identity-management-system.md)
73+
74+
[Multi-factor authentication](memo-22-09-multi-factor-authentication.md)
75+
76+
[Authorization](memo-22-09-authorization.md)
77+
78+
[Other areas of Zero Trust](memo-22-09-other-areas-zero-trust.md)
79+
80+
Additional Zero Trust Documentation
81+
82+
[Securing identity with Zero Trust](/security/zero-trust/deploy/identity)

0 commit comments

Comments
 (0)