Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings
| Property | Value |
|---|---|
| ISM Control | ISM-1685 |
| Revision | 2 |
| Updated | Jun-23 |
| Guideline | Not provided |
| Section | Authentication hardening |
| Topic | Setting credentials for built-in Administrator accounts, break glass accounts, local administrator accounts and service accounts |
| Essential Eight | ML2, ML3 |
| PSPF Levels | NC, OS, P, S, TS |
Establish break-glass emergency access accounts with randomly generated passwords and a physical FIDO2 key for phishing-resistant MFA to ensure secure, auditable access during outages. Monitor sign-in and audit logs and validate accounts regularly to maintain accountability and incident readiness.12
Emergency access (break-glass) accounts represent the highest-privilege, lowest-frequency-use credential class. Their security requirements differ from regular admin accounts in three ways:
1. Why FIDO2 rather than TOTP/push:
2. Why cloud-only (not federated):
If an on-premises AD or federation service is unavailable (the primary outage scenario for break-glass use), federated or synced accounts cannot authenticate. Cloud-only accounts authenticate directly against Entra ID.
3. Monitoring requirements:
Any sign-in from a break-glass account β successful or failed β is a security event requiring immediate investigation. Key Entra ID Protection signals to monitor:
| Signal | Why critical |
|---|---|
| Leaked credentials | Immediately grants king-of-the-castle access |
| Impossible travel / atypical location | Emergency accounts are rarely (if ever) used |
| Anonymous or malicious IP | Attacker concealment technique |
| Authentication method or role change | High-impact configuration event |
| CA policy blocked sign-in (error 53003) | May indicate misconfigured exclusions |
[!NOTE] The Emergency Access Accounts will be created in Microsoft Entra ID with randomly generated passwords and a FIDO2 passkey for MFA provided. They will be configured as cloud-only accounts with a Global Administrator role to ensure break-glass capability during outages.
Create emergency access accounts: Provision two cloud-only accounts (EmergencyAccess01@contoso.onmicrosoft.com, BreakGlass02@contoso.onmicrosoft.com) with the Global Administrator role in Microsoft Entra ID; ensure accounts are not federated or synchronized from on-premises AD; use descriptive names that clearly identify their purpose.21
Secure credentials with dual control: Generate strong, randomly generated passwords of at least 32 characters configured to never expire; implement dual control by splitting credentials into multiple parts stored in separate secure physical locations, accessible only with multi-person approval.1
Configure passwordless authentication with MFA: Configure emergency access accounts to use passwordless authentication, preferably FIDO2 passkeys; or use certificate-based authentication if PKI is in place; require phishing-resistant MFA for all emergency accounts.2
Configure Conditional Access exclusions: Exclude at least one emergency account from all Conditional Access policies and MFA requirements to guarantee access during service disruptions; optionally secure the second account with FIDO2 security keys stored in secure locations.2
Enable monitoring and alerting: Configure Azure Monitor or Microsoft Sentinel to analyze sign-in and audit logs; create real-time alerts triggering on any emergency account authentication or configuration change; establish incident response procedures requiring immediate security team notification and justification documentation for all emergency account usage.2
Establish testing and maintenance procedures: Test emergency account access quarterly; rotate credentials every 90 days or immediately following personnel changes affecting authorized users; train authorized administrators on break-glass procedures including credential retrieval and incident documentation; maintain written runbooks documenting the complete emergency access process for compliance and operational readiness.2
The following FIDO2 security keys are attested with Microsoft Entra ID and commonly deployed in Australian enterprise and government environments. Each modelβs AAGUID is published in the Microsoft Entra FIDO2 hardware vendor attestation list.3
| Brand / Model | USB | NFC | Bio | Example AAGUID | Notes |
|---|---|---|---|---|---|
| YubiKey 5 NFC (Yubico) | β | β | β | fa2b99dc-9e39-4257-8f92-4a30d23c4118 |
Most widely deployed enterprise FIDO2 key. Multi-protocol (FIDO2, Smart Card, OTP). Recommended first choice. |
| YubiKey 5C NFC (Yubico) | β USB-C | β | β | 2fc0579f-8113-47ea-b116-bb5a8db9202a |
USB-C variant suited for modern laptops and tablets. |
| Security Key NFC by Yubico β Enterprise Edition (Yubico) | β | β | β | ed042a3a-4b22-4455-bb69-a267b652ae7e |
FIDO2-only (no Smart Card/OTP). Lower cost; Enterprise Profile AAGUID available for simplified org management. |
| YubiKey Bio Series β Multi-protocol Edition (Yubico) | β | β | β fingerprint | 90636e1f-ef82-43bf-bdcf-5255f139d12f |
Biometric fingerprint instead of PIN. FIDO2 + Smart Card. Recommended for high-assurance or no-PIN-entry policy. |
| YubiKey 5 FIPS Series with NFC (Yubico) | β | β | β | fcc0118f-cd45-435b-8da1-9782b2da0715 |
FIPS 140-2 validated; required by some government and defence-sector security frameworks. |
| Google Titan Security Key v2 (Google) | β | β | β | 42b4fb4a-2866-43b2-9bf7-6c6669c2e5d3 |
Cost-effective FIDO2-only key; single AAGUID simplifies attestation configuration. |
| HID Crescendo Key V3 (HID Global) | β | β | β | 7991798a-a7f3-487f-98c0-3faf7a458a04 |
Enterprise smart card + FIDO2. Common where physical and logical access convergence on a single form factor is required. |
| Feitian ePass FIDO2-NFC (Feitian) | β | β | β | ee041bce-25e5-4cdb-8f86-897fd6418464 |
Cost-effective enterprise option; widely available in Australia for fleet deployments. |
| Feitian BioPass FIDO2 Plus (Feitian) | β | β | β fingerprint | b6ede29c-3772-412c-8a78-539c1f4c62d2 |
Biometric + FIDO2; cost-effective alternative to YubiKey Bio for fingerprint-policy requirements. |
[!NOTE] A single hardware model typically has multiple AAGUIDs across firmware versions, enterprise profile variants, and product revisions. When restricting by AAGUID, add all relevant AAGUIDs for the intended product family \u2014 the YubiKey 5 NFC family alone has 10+ distinct AAGUIDs. Always verify against the Microsoft Entra FIDO2 hardware vendor attestation list before finalising the approved list.3
Microsoft Entra ID supports AAGUID-based restriction of FIDO2 security keys using Custom Authentication Strengths in Conditional Access. This allows organisations to enforce that only pre-approved key models (e.g., YubiKey 5 NFC only, or YubiKey + HID Crescendo) can satisfy FIDO2 authentication \u2014 preventing the use of unvetted consumer-grade or unapproved devices.
Attestation must be enabled before AAGUID filtering takes effect. Without enforced attestation, Entra ID accepts any FIDO2-compliant key regardless of AAGUID.
Keys registered after this point must have a FIDO Alliance MDS-validated attestation chain. Previously registered keys without a valid attestation will no longer satisfy authentication.
Approved FIDO2 Keys \u2014 [Organisation]).[!TIP] YubiKey Enterprise Program: YubiKey 5 Series and Security Key Series keys purchased through the YubiEnterprise Subscription can be provisioned with an Enterprise Profile AAGUID \u2014 a single organisation-specific AAGUID assigned to an entire batch. This dramatically simplifies AAGUID management: instead of tracking 10+ AAGUIDs per product line, you manage one. Enterprise Profile variants appear in the Microsoft Entra attestation list with
(Enterprise Profile)in the description. HID Crescendo similarly offers an enterprise/managed profile variant.
Approved FIDO2 Keys \u2014 [Organisation]) instead of the built-in Phishing-resistant MFA strength.[!WARNING] Before enforcing, verify that all currently registered FIDO2 keys for emergency accounts are in the approved AAGUID list, or re-register them with an approved key. A user whose registered key AAGUID is not in the list will be completely blocked.
Local Administrator Password Solution provides per-device random local admin passwords rotated and stored with restricted ACLs for secure local admin management Local Administrator Password Solution
Deploy Windows LAPS policy with Microsoft Intune guides how to enforce Windows LAPS to rotate strong, unique local admin passwords across devices in Zero Trust environments Deploy Windows LAPS policy with Microsoft Intune
ASD Blueprint: Restrict administrative privileges outlines essential eight guidance on limiting break-glass and admin privileges to reduce risk ASD Blueprint: Restrict administrative privileges
Managing service accounts (ML2) highlights long, unique, unpredictable credentials for service accounts and OS-driven password management (gMSAs) Managing service accounts (ML2)