Azure Security Architect https://azuresecurityarchitect.com/ For all your cloud security needs Wed, 27 Nov 2024 18:13:19 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 214478653 Device Restrictions using Conditional Access Policies in Azure Entra ID https://azuresecurityarchitect.com/entra-id/device-restrictions-using-conditional-access-policies-in-azure-entra-id/ https://azuresecurityarchitect.com/entra-id/device-restrictions-using-conditional-access-policies-in-azure-entra-id/#respond Wed, 27 Nov 2024 18:13:19 +0000 https://azuresecurityarchitect.com/?p=270 Now, there’s a policy that allows you to restrict which devices get into your Azure subscriptions. The compliant devices policy requires you to list CIDR ranges/devices that are permitted. You […]

The post Device Restrictions using Conditional Access Policies in Azure Entra ID appeared first on Azure Security Architect.

]]>
Now, there’s a policy that allows you to restrict which devices get into your Azure subscriptions. The compliant devices policy requires you to list CIDR ranges/devices that are permitted. You can also make exceptions for specific devices if you need to.

The exact error

The portal encountered an issue while attempting to retrieve access tokens. We suggest attempting to sign in again, or alternatively, continuing without access tokens, although this may result in a suboptimal user experience. Additional details: invalid_grant: AADSTS530004: AcceptCompliantDevice setting isn’t configured for this organization. The admin needs to configure this setting to allow external users access to protected resources. Trace ID: af449c59-5668-4e01-9c12-6148328d6500 Correlation ID: e0318484-7e18-4c0f-b7a9-a678a9bc8cfd Timestamp: 2024-11-27 17:58:53Z.

The post Device Restrictions using Conditional Access Policies in Azure Entra ID appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/entra-id/device-restrictions-using-conditional-access-policies-in-azure-entra-id/feed/ 0 270
Letting in vendors to your Entra Tenant https://azuresecurityarchitect.com/entra-id/letting-in-vendors-to-your-entra-tenant/ https://azuresecurityarchitect.com/entra-id/letting-in-vendors-to-your-entra-tenant/#respond Sat, 23 Nov 2024 00:26:33 +0000 https://azuresecurityarchitect.com/?p=263 Use Case Let in a set of Vendor Engineers into your Azure Subscription (typically with GLOBAL READER permissions) Steps in Entra and in Azure Set up SSO using the vendor’s […]

The post Letting in vendors to your Entra Tenant appeared first on Azure Security Architect.

]]>
Use Case

Let in a set of Vendor Engineers into your Azure Subscription (typically with GLOBAL READER permissions)

Steps in Entra and in Azure

  1. Set up SSO using the vendor’s email id as the UUID.
  2. Grant them GUEST User licenses – into your Entra Tenant
  3. Put all these VENDOR GUESTS into a single AAD User Group.
  4. Now use RBAC to grant this user group Azure resource permissions.

The post Letting in vendors to your Entra Tenant appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/entra-id/letting-in-vendors-to-your-entra-tenant/feed/ 0 263
P2 licenses – Use Case – SSO Authentication and MFA – no mailbox https://azuresecurityarchitect.com/entra-id/licensing/p2-licenses-use-case-sso-authentication-and-mfa-no-mailbox/ https://azuresecurityarchitect.com/entra-id/licensing/p2-licenses-use-case-sso-authentication-and-mfa-no-mailbox/#respond Fri, 22 Nov 2024 20:36:46 +0000 https://azuresecurityarchitect.com/?p=257 Use Case – SSO Authentication and MFA – no mailbox P2 licenses – Cloud Only Authentication (not federated)

The post P2 licenses – Use Case – SSO Authentication and MFA – no mailbox appeared first on Azure Security Architect.

]]>
Use Case – SSO Authentication and MFA – no mailbox

P2 licenses – Cloud Only Authentication (not federated)

The post P2 licenses – Use Case – SSO Authentication and MFA – no mailbox appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/entra-id/licensing/p2-licenses-use-case-sso-authentication-and-mfa-no-mailbox/feed/ 0 257
Devices versus Apps – Managed by Intune https://azuresecurityarchitect.com/intune/devices-versus-apps-managed-by-intune/ https://azuresecurityarchitect.com/intune/devices-versus-apps-managed-by-intune/#respond Fri, 22 Nov 2024 20:36:05 +0000 https://azuresecurityarchitect.com/?p=259 Intune Can be used to manage both devices as well as applications on the devices. One can configure InTune for JUST application management (and have some other tool do the […]

The post Devices versus Apps – Managed by Intune appeared first on Azure Security Architect.

]]>
Intune

Can be used to manage both devices as well as applications on the devices.

One can configure InTune for JUST application management (and have some other tool do the device management).

The post Devices versus Apps – Managed by Intune appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/intune/devices-versus-apps-managed-by-intune/feed/ 0 259
Migration of Azure site-to-site VPN tunnel from one region to another https://azuresecurityarchitect.com/expressroute/migration-of-azure-site-to-site-vpn-tunnel-from-one-region-to-another/ https://azuresecurityarchitect.com/expressroute/migration-of-azure-site-to-site-vpn-tunnel-from-one-region-to-another/#respond Mon, 18 Nov 2024 14:14:32 +0000 https://azuresecurityarchitect.com/?p=225 Option 1 – create a new VPN in the new region Create a new VPN gateway in the desired region Configure the new gateway with the same connection settings as […]

The post Migration of Azure site-to-site VPN tunnel from one region to another appeared first on Azure Security Architect.

]]>
Option 1 – create a new VPN in the new region

Create a new VPN gateway in the desired region

Configure the new gateway with the same connection settings as the old one

and then update your on-premises VPN device to point to the new Azure gateway effectively switching the tunnel to the new region while maintaining connectivity

Most of this can be done through the Azure portal by modifying the VPN gateway’s location and connection details, ensuring your on-premises device is updated accordingly.

Option 2 – actually move the resources over (not preferred)

Entire VNet  (containing the gateway Subnet) needs to be migrated

Done using the Resource Manager migration

 

The post Migration of Azure site-to-site VPN tunnel from one region to another appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/expressroute/migration-of-azure-site-to-site-vpn-tunnel-from-one-region-to-another/feed/ 0 225
Azure Hub Spoke Best Practices https://azuresecurityarchitect.com/azure-network-security/azure-hub-spoke-best-practices/ https://azuresecurityarchitect.com/azure-network-security/azure-hub-spoke-best-practices/#respond Tue, 16 Apr 2024 19:22:10 +0000 https://azuresecurityarchitect.com/?p=192 The HUB VNET contains the Firewall Subnet, the Gateway VPN Subnet (which has a SITE TO SITE VPN) and the workload Subnet A. The Spoke VNET contains other workloads in […]

The post Azure Hub Spoke Best Practices appeared first on Azure Security Architect.

]]>
The HUB VNET contains the Firewall Subnet, the Gateway VPN Subnet (which has a SITE TO SITE VPN) and the workload Subnet A. The Spoke VNET contains other workloads in Subnet B.

Once you set it up this way (Gateway Subnet, Firewall Subnet, and Hub Subnet A), then, all traffic anyway goes through the Gateway-VPN-Subnet.

ROUTING so that ALL TRAFFIC goes through the Firewall?

  1. All you have to do is attach a ROUTE (ROUTE-FW) with the NEXT HOP as the Firewall Subnet to the Gateway Subnet.
  2. And you have another Route for Subnet B – one that also has the next hop as the Gateway Subnet  AND disables BGP routing.
  3. This will ensure that traffic from Subnet B (which is a spoke PEERED with the HUB), goes through the firewall. Also, traffic from Subnet A – also goes through the Firewall.
azure hub spoke firewall
azure hub spoke firewall

The post Azure Hub Spoke Best Practices appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/azure-network-security/azure-hub-spoke-best-practices/feed/ 0 192
Container Networking Security on Azure https://azuresecurityarchitect.com/uncategorized/container-networking-security-on-azure/ https://azuresecurityarchitect.com/uncategorized/container-networking-security-on-azure/#respond Tue, 16 Apr 2024 00:41:50 +0000 https://azuresecurityarchitect.com/?p=185 For Containers to be assigned IP Addresses (in order to access Azure PaaS services – e.g. the storage service), one can use the Container network interface plugin

The post Container Networking Security on Azure appeared first on Azure Security Architect.

]]>
For Containers to be assigned IP Addresses (in order to access Azure PaaS services – e.g. the storage service), one can use the Container network interface plugin

The post Container Networking Security on Azure appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/uncategorized/container-networking-security-on-azure/feed/ 0 185
Access Reviews in Azure AD https://azuresecurityarchitect.com/azure-ad/access-reviews-in-azure-ad/ https://azuresecurityarchitect.com/azure-ad/access-reviews-in-azure-ad/#respond Tue, 16 Apr 2024 00:23:47 +0000 https://azuresecurityarchitect.com/?p=182 When you create access reviews for admin level users (e.g. global admin or password admin), you have a couple of options on how to deal with the review results. You […]

The post Access Reviews in Azure AD appeared first on Azure Security Architect.

]]>
When you create access reviews for admin level users (e.g. global admin or password admin), you have a couple of options on how to deal with the review results. You do not necessarily want to disable an admin user based on no-response. To that end, here are a couple of options

  • Auto Apply Results to Resource – ENABLE or DISABLE the resource (e.g. AD credentials)
  • If reviewers don’t respond (Send a confirmation request, Take Recommendations()

The post Access Reviews in Azure AD appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/azure-ad/access-reviews-in-azure-ad/feed/ 0 182
External Users and Active Directory https://azuresecurityarchitect.com/active-directory/external-users-and-active-directory/ https://azuresecurityarchitect.com/active-directory/external-users-and-active-directory/#respond Mon, 15 Apr 2024 15:16:53 +0000 https://azuresecurityarchitect.com/?p=158 Also read – 4 types of authentication What exactly are External USers from an AD perspective? External Users can be both your own corporate (remote) users, OR external partners. This […]

The post External Users and Active Directory appeared first on Azure Security Architect.

]]>
Also read – 4 types of authentication

What exactly are External USers from an AD perspective?

External Users can be both your own corporate (remote) users, OR external partners. This was confusing to me at first – but even your own corporate users can be external (remote login users)..

How do you authenticate external users?

A particular ZONE of the internal network is exposed via a Web Application Proxy (Reverse Proxy). Usually, this is the DMZ zone.

What about Kerberos? Don’t internal users need to be on the network to get a Kerberos ticket?

External Corporate users still get a Kerberos Ticket, even though they are not on the internal network. This magic is done by the Web Application Proxy.

 

The post External Users and Active Directory appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/active-directory/external-users-and-active-directory/feed/ 0 158
Azure Firewall – Stateful, Packet Inspection https://azuresecurityarchitect.com/azure-security-ecosystem/azure-firewall-stateful-packet-inspection/ https://azuresecurityarchitect.com/azure-security-ecosystem/azure-firewall-stateful-packet-inspection/#respond Mon, 15 Apr 2024 14:38:25 +0000 https://azuresecurityarchitect.com/?p=177 What is needed to deploy an Azure Firewall? Azure Firewall requires it’s own empty subnet and an unused IP address space. You will need to create an address space, if […]

The post Azure Firewall – Stateful, Packet Inspection appeared first on Azure Security Architect.

]]>
What is needed to deploy an Azure Firewall?

Azure Firewall requires it’s own empty subnet and an unused IP address space. You will need to create an address space, if one isn’t available.

Do I also need NSGs?

No. Once an Azure Firewall is in place, no NSGs are needed.

Do I also need ASGs?

No. An Application Security Group is a grouped set of azure resources that can be referenced via a common set of NSGs rules.

Do I also Azure Policy?

No. These are different from Firewalls – these are more around Governance.

The post Azure Firewall – Stateful, Packet Inspection appeared first on Azure Security Architect.

]]>
https://azuresecurityarchitect.com/azure-security-ecosystem/azure-firewall-stateful-packet-inspection/feed/ 0 177