standard
turbot/azure_cis

Pipeline: 2.2.3 Ensure that an exclusionary Device code flow policy is considered

Description

Conditional Access Policies can be used to prevent the Device code authentication flow. Device code flow should be permitted only for users that regularly perform duties that explicitly require the use of Device Code to authenticate, such as utilizing Azure with PowerShell.

Attackers use Device code flow in phishing attacks and, if successful, results in the attacker gaining access tokens and refresh tokens which are scoped to "user_impersonation", which can perform any action the user has permission to perform.

Remediation

From Azure Portal

Part 1 of 2 - Create the policy and enable it in Report-only mode.

  1. From Azure Home open the portal menu in the top left and select Microsoft Entra ID.
  2. Scroll down in the menu on the left and select Security.
  3. Select on the left side Conditional Access.
  4. Select Policies.
  5. Click the + New policy button, then:
  6. Provide a name for the policy.
  7. Under Assignments, select Users then:
  • Under Include, select All users.
  • Under Exclude, check Users and groups and only select emergency access accounts.
  1. Under Assignments, select Target resources then:
  • Under Include, select All cloud apps.
  • Leave Exclude blank unless you have a well defined exception.
  1. Under Conditions > Authentication Flows, set Configure to Yes then:
  • Select Device code flow.
  • Select Done.
  1. Under Access Controls > Grant, select Block Access.
  2. Set Enable policy to Report-only.
  3. Click Create.

Allow some time to pass to ensure the sign-in logs capture relevant conditional access events. These events will need to be reviewed to determine if additional considerations are necessary for your organization (e.g. many legitimate use cases of device code authentication are observed).

NOTE: The policy is not yet 'live,' since Report-only is being used to audit the effect of the policy.

Part 2 of 2 - Confirm that the policy is not blocking access that should be granted, then toggle to On.

  1. With your policy now in report-only mode, return to the Microsoft Entra blade and click on Sign-in logs.
  2. Review the recent sign-in events - click an event then review the event details (specifically the Report-only tab) to ensure:
  • The sign-in event you're reviewing occurred after turning on the policy in report-only mode.
  • The policy name from step 6 above is listed in the Policy Name column.
  • The Result column for the new policy shows that the policy was Not applied (indicating the device code authentication flow was not blocked).
  1. If the above conditions are present, navigate back to the policy name in Conditional Access and open it.
  2. Toggle the policy from Report-only to On.
  3. Click Save.

Default Value

This policy does not exist by default.

Run the pipeline

To run this pipeline from your terminal:

flowpipe pipeline run azure_cis.pipeline.cis_v300_2_2_3

Use this pipeline

To call this pipeline from your pipeline, use a step:

step "pipeline" "step_name" {
pipeline = azure_cis.pipeline.cis_v300_2_2_3
}

Params

NameTypeRequiredDescriptionDefault
database
connection.steampipe
YesDatabase connection string.connection.steampipe.default
notifier
notifier
YesThe name of the notifier to use for sending notification messages.notifier.default
notification_level
string
YesThe verbosity level of notification messages to send. Valid options are 'verbose', 'info', 'error'.info
approvers
list(notifier)
YesList of notifiers to be used for obtaining action/approval decisions.notifier.default

Outputs

This pipeline has no outputs.

Tags

folder = CIS v3.0.0/2 Identity/2.2 Conditional Access