🛡️ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-0974
ISM-1380 →

Multi-factor authentication is used to authenticate privileged users of systems

Property Value
ISM Control ISM-1173
Revision 4
Updated Sep-21
Guideline Not provided
Section Authentication hardening
Topic Multi-factor authentication
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

The control requires that multi-factor authentication be configured for all remote access connections and all non-console administrative interfaces, including access to code repositories and Cloud management interfaces, to mitigate brute-force attacks on privileged accounts. Implementation should enforce MFA through a Conditional Access policy in the Microsoft Entra admin center to ensure all sign-ins to privileged resources require MFA.1

For Maturity Level 3, the CA grant must use Require authentication strength → Phishing-resistant MFA — restricting privileged access to FIDO2 security keys, Windows Hello for Business (hardware TPM), certificate-based authentication, or device-bound passkeys only. Push notifications, SMS OTP, and OATH tokens do not satisfy the ML3 requirement for privileged accounts.23

When combined with Privileged Identity Management (PIM), MFA can be required at activation time for eligible role assignments, providing just-in-time access with phishing-resistant authentication as the activation gate.4

Justification

Not provided in source documentation.

Design Decision

[!NOTE] The Conditional Access policy will be created in the Entra ID Portal to require multifactor authentication for all users accessing all resources. It will be configured to enforce MFA as a mandatory access control across the environment.

Prerequisites

Implementation Steps

Create a Conditional Access policy to require MFA in Entra ID Portal

  1. Sign in to the Microsoft Entra admin center as a Conditional Access Administrator.6
  2. Navigate to Entra ID > Conditional Access > Policies.6
  3. Select New policy.6
  4. Provide a meaningful name for the policy.6
  5. Under Assignments, select Users or workload identities.
    • Under Include, select All users.
    • Under Exclude:
      • Select Users and groups and choose your organization’s emergency access or break-glass accounts.
      • If you use hybrid identity solutions like Microsoft Entra Connect or Microsoft Entra Connect Cloud Sync, select Directory roles, then select Directory Synchronization Accounts.6
  6. Under Target resources > Resources (formerly cloud apps) > Include, select All resources (formerly ‘All cloud apps’).
    • If you must exclude specific applications from your policy, you can choose them from the Exclude tab under Select excluded cloud apps and choose Select.6
  7. Under Access controls > Grant.
    • Select Require multifactor authentication, Require device to be marked as compliant, and Require Microsoft Entra hybrid joined device.
    • For multiple controls, select Require one of the selected controls. 6

    For Maturity Level 3: instead of the Require multifactor authentication grant, select Require authentication strength and choose Phishing-resistant MFA. This restricts acceptable methods to FIDO2 keys, Windows Hello for Business, certificate-based authentication, and device-bound passkeys.3

  8. Confirm your settings and set Enable policy to Report-only.6
  9. Select Create to create to enable your policy. After confirming your settings using policy impact or report-only mode, move the Enable policy toggle from Report-only to On.6

[!NOTE] The policy can be adjusted later to enforce MFA in all real-time sign-ins as needed. 6

HOME ← ISM-0974
ISM-1380 →