Skip to content

Conversation

@aahmed-spec
Copy link
Collaborator

Adding test 25395

@aahmed-spec aahmed-spec self-assigned this Jan 6, 2026
Copy link
Collaborator

@sandeepjha000 sandeepjha000 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@aahmed-spec - please address the feedback

Refactor assessment script by updating region markers and improving condition checks.
removed extra lines
@aahmed-spec aahmed-spec marked this pull request as ready for review January 6, 2026 10:05
@aahmed-spec aahmed-spec changed the title Network-25395: Adding test Network-25395: Entra Private Access Application segments are defined to enforce least-privilege access Jan 7, 2026
@alexandair alexandair requested a review from Copilot January 7, 2026 10:28
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds a new security assessment test (Test-Assessment.25395) that evaluates Microsoft Entra Private Access applications to ensure they follow least-privilege principles through granular network segmentation and Custom Security Attributes (CSA) for Conditional Access targeting.

Key Changes

  • Implementation of comprehensive Private Access application segmentation validation
  • Helper functions to detect overly broad CIDR ranges, IP ranges, and port configurations with Active Directory exceptions
  • Integration with Conditional Access policy evaluation using applicationFilter targeting

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 9 comments.

File Description
src/powershell/tests/Test-Assessment.25395.ps1 Implements the core assessment logic with helper functions to validate network segments, check for broad access patterns, verify CSA assignments, and generate detailed compliance reports
src/powershell/tests/Test-Assessment.25395.md Provides documentation explaining the security rationale, threat scenarios, remediation steps, and reference links for implementing least-privilege Private Access configurations

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Copy link
Contributor

Copilot AI commented Jan 7, 2026

@aahmed-spec I've opened a new pull request, #752, to work on those changes. Once the pull request is ready, I'll request review from you.

Copilot AI and others added 8 commits January 7, 2026 12:05
Extract hardcoded AD ports to constant for maintainability
Inconsistent indentation detected. Lines 249-256 use tabs while the rest of the file uses spaces. PowerShell style guidelines typically recommend using spaces consistently throughout the file for better readability across different editors.

Co-authored-by: Copilot <[email protected]>
Inconsistent indentation detected. Line 346 uses tabs while the rest of the file uses spaces. PowerShell style guidelines typically recommend using spaces consistently throughout the file for better readability across different editors.

Co-authored-by: Copilot <[email protected]>
Clarified output descriptions in Test-IsBroadCidr function.
Copy link
Contributor

Copilot AI commented Jan 8, 2026

@aahmed-spec I've opened a new pull request, #753, to work on those changes. Once the pull request is ready, I'll request review from you.

@aahmed-spec
Copy link
Collaborator Author

@copilot check the comments you have shared and let me know if they are resolved now.

Copy link
Contributor

Copilot AI commented Jan 8, 2026

@aahmed-spec I've opened a new pull request, #754, to work on those changes. Once the pull request is ready, I'll request review from you.

Copy link
Collaborator

@alexandair alexandair left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link
Collaborator

@SagarSathe SagarSathe left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@SagarSathe SagarSathe merged commit a4a0ce7 into main Jan 9, 2026
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants