Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1173 |
| Revision | 4 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | Authentication hardening |
| Topic | Multi-factor authentication |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
The control requires that multi-factor authentication be configured for all remote access connections and all non-console administrative interfaces, including access to code repositories and Cloud management interfaces, to mitigate brute-force attacks on privileged accounts. Implementation should enforce MFA through a Conditional Access policy in the Microsoft Entra admin center to ensure all sign-ins to privileged resources require MFA.1
For Maturity Level 3, the CA grant must use Require authentication strength → Phishing-resistant MFA — restricting privileged access to FIDO2 security keys, Windows Hello for Business (hardware TPM), certificate-based authentication, or device-bound passkeys only. Push notifications, SMS OTP, and OATH tokens do not satisfy the ML3 requirement for privileged accounts.23
When combined with Privileged Identity Management (PIM), MFA can be required at activation time for eligible role assignments, providing just-in-time access with phishing-resistant authentication as the activation gate.4
Not provided in source documentation.
[!NOTE] The Conditional Access policy will be created in the Entra ID Portal to require multifactor authentication for all users accessing all resources. It will be configured to enforce MFA as a mandatory access control across the environment.
For Maturity Level 3: instead of the Require multifactor authentication grant, select Require authentication strength and choose Phishing-resistant MFA. This restricts acceptable methods to FIDO2 keys, Windows Hello for Business, certificate-based authentication, and device-bound passkeys.3
[!NOTE] The policy can be adjusted later to enforce MFA in all real-time sign-ins as needed. 6
Require phishing-resistant MFA for administrators describes the Conditional Access template for enforcing phishing-resistant MFA on admin directory roles Require phishing-resistant MFA for administrators
Authentication strengths in Conditional Access — Microsoft Learn ↩ ↩2
What is Microsoft Entra Privileged Identity Management? — Microsoft Learn ↩
Step 1. Increase sign-in security for hybrid workers with MFA — Microsoft Learn ↩ ↩2
Require compliant device, Entra hybrid joined device, or MFA for all users — Microsoft Learn ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7 ↩8 ↩9 ↩10 ↩11 ↩12 ↩13 ↩14