Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1380 |
| Revision | 5 |
| Updated | Sep-21 |
| Guideline | Not provided |
| Section | System administration |
| Topic | Separate privileged operating environments |
| Essential Eight | ML1, ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Deploy a Conditional Access policy that blocks cloud administrators unless they are from a trusted known IP address range, enforcing separation of privileged administration from untrusted networks. This approach reduces the attack surface by ensuring privileged access is only possible from approved, monitored environments and supports MFA/device-compliance requirements for privileged tasks.12
Privileged Identity Management (PIM) complements the separation of environments by eliminating permanently active privileged role assignments. Roles are granted as eligible only, activated on demand with a maximum duration (e.g., 1 hour), and optionally require approval. This enforces just-in-time (JIT) privileged access from the dedicated privileged environment.3
Emergency (break-glass) accounts must be maintained as cloud-only Global Administrator accounts excluded from all Conditional Access policies. Two accounts should exist, each protected by a different FIDO2 hardware security key, with sign-in alerts configured in Entra ID to trigger an alert on any break-glass sign-in.1
[!NOTE] The Conditional Access Policy will be deployed to block cloud administrators unless they are from a trusted known IP address range. The separation of privileged operating environments described in ISM-1380 will be reinforced by the policy.
Identify cloud administrator accounts to scope the policy to privileged sign-ins. 1
Define a trusted IP range as a named location to restrict sign-ins to cloud admin portals. 2
Create and enforce a Conditional Access policy that blocks sign-ins from locations outside the trusted IP range and requires MFA and device compliance for access to cloud management interfaces. 1
Create an emergency break-glass exception group to bypass the policy in critical situations. 1
Deploy the policy using the recommended tooling (Intune Settings Catalog approach or Azure AD CA) and apply to the defined group of cloud administrators. 1
Validate implementation and monitor sign-in activity and policy enforcement. Verify that sign-ins from trusted IP addresses succeed and from non-trusted IPs are blocked; review Conditional Access logs for sign-in events and alerts. 1
[!NOTE] Emergency break-glass accounts should be excluded from the policy and managed separately to ensure access remains possible in extreme cases. 1
Where permanent administrative role assignments exist, replace them with eligible assignments in Microsoft Entra Privileged Identity Management:3
Emergency accounts must be available even if the primary identity infrastructure fails:1
.onmicrosoft.com domain (no on-premises sync, no federation dependency).[!NOTE] Monitoring of break-glass account sign-ins must be in place before the accounts are created. A sign-in from these accounts is a high-severity event and should trigger an immediate investigation response.
ASD Blueprint provides service provisioning considerations for secure admin onboarding and zero-trust alignment with Intune and conditional access ASD Blueprint: Service provisioning considerations
Privileged access: Strategy describes strategic initiatives for end-to-end session security, identity governance, and rapid threat response for privileged access Privileged access: Strategy
Administrator protection (preview — rollout deferred) provides options to enable admin elevation controls via Intune Settings Catalog, CSP policies, Group Policy, and Windows Security Settings Administrator protection (preview)
Best practices for all isolation architectures offers guidance on conditional access policies and zero-trust design for isolated admin environments Best practices for all isolation architectures
Essential Eight restrict administrative privileges describes separation of privileged and unprivileged environments and least-privilege administration concepts Essential Eight restrict administrative privileges
Security rapid modernization plan outlines admin workstations deployment and rapid modernization to reduce privileged access risk Security rapid modernization plan
Manage emergency access accounts in Microsoft Entra ID covers the configuration, testing, and monitoring of break-glass accounts Manage emergency access accounts in Microsoft Entra ID
Plan a Privileged Identity Management deployment covers eligible assignment configuration, activation settings, approval workflows, and auditing requirements Plan a Privileged Identity Management deployment
Privileged access deployment — Microsoft Learn ↩ ↩2 ↩3 ↩4 ↩5 ↩6 ↩7 ↩8 ↩9 ↩10 ↩11 ↩12 ↩13 ↩14 ↩15
Best practices for all isolation architectures — Microsoft Learn ↩ ↩2 ↩3 ↩4
Privileged access — Azure MCSB v2 (Privileged access) ↩ ↩2 ↩3
Legacy privileged access guidance (archived) — Microsoft Learn ↩
ASD Blueprint: Service provisioning considerations (ASD Blueprint for Secure Cloud) ↩