πŸ›‘οΈ Essential 8 Guide

Implementation guidance for Australian Essential Eight controls in Microsoft environments - ISM controls with PSPF mappings

About
HOME ← ISM-1683
ISM-1686 β†’

Credentials for break glass accounts, local administrator accounts and service accounts are long, unique, unpredictable and managed.

Property Value
ISM Control ISM-1685
Revision 2
Updated Jun-23
Guideline Not provided
Section Authentication hardening
Topic Setting credentials for built-in Administrator accounts, break glass accounts, local administrator accounts and service accounts
Essential Eight ML2, ML3
PSPF Levels NC, OS, P, S, TS

Summary

Establish break-glass emergency access accounts with randomly generated passwords and a physical FIDO2 key for phishing-resistant MFA to ensure secure, auditable access during outages. Monitor sign-in and audit logs and validate accounts regularly to maintain accountability and incident readiness.12

Justification

Emergency access (break-glass) accounts represent the highest-privilege, lowest-frequency-use credential class. Their security requirements differ from regular admin accounts in three ways:

1. Why FIDO2 rather than TOTP/push:

2. Why cloud-only (not federated):

If an on-premises AD or federation service is unavailable (the primary outage scenario for break-glass use), federated or synced accounts cannot authenticate. Cloud-only accounts authenticate directly against Entra ID.

3. Monitoring requirements:

Any sign-in from a break-glass account β€” successful or failed β€” is a security event requiring immediate investigation. Key Entra ID Protection signals to monitor:

Signal Why critical
Leaked credentials Immediately grants king-of-the-castle access
Impossible travel / atypical location Emergency accounts are rarely (if ever) used
Anonymous or malicious IP Attacker concealment technique
Authentication method or role change High-impact configuration event
CA policy blocked sign-in (error 53003) May indicate misconfigured exclusions

Design Decision

[!NOTE] The Emergency Access Accounts will be created in Microsoft Entra ID with randomly generated passwords and a FIDO2 passkey for MFA provided. They will be configured as cloud-only accounts with a Global Administrator role to ensure break-glass capability during outages.

Prerequisites

Implementation Steps

Create break-glass emergency access accounts with random passwords and FIDO2 MFA

  1. Create emergency access accounts: Provision two cloud-only accounts (EmergencyAccess01@contoso.onmicrosoft.com, BreakGlass02@contoso.onmicrosoft.com) with the Global Administrator role in Microsoft Entra ID; ensure accounts are not federated or synchronized from on-premises AD; use descriptive names that clearly identify their purpose.21

  2. Secure credentials with dual control: Generate strong, randomly generated passwords of at least 32 characters configured to never expire; implement dual control by splitting credentials into multiple parts stored in separate secure physical locations, accessible only with multi-person approval.1

  3. Configure passwordless authentication with MFA: Configure emergency access accounts to use passwordless authentication, preferably FIDO2 passkeys; or use certificate-based authentication if PKI is in place; require phishing-resistant MFA for all emergency accounts.2

  4. Configure Conditional Access exclusions: Exclude at least one emergency account from all Conditional Access policies and MFA requirements to guarantee access during service disruptions; optionally secure the second account with FIDO2 security keys stored in secure locations.2

  5. Enable monitoring and alerting: Configure Azure Monitor or Microsoft Sentinel to analyze sign-in and audit logs; create real-time alerts triggering on any emergency account authentication or configuration change; establish incident response procedures requiring immediate security team notification and justification documentation for all emergency account usage.2

  6. Establish testing and maintenance procedures: Test emergency account access quarterly; rotate credentials every 90 days or immediately following personnel changes affecting authorized users; train authorized administrators on break-glass procedures including credential retrieval and incident documentation; maintain written runbooks documenting the complete emergency access process for compliance and operational readiness.2

The following FIDO2 security keys are attested with Microsoft Entra ID and commonly deployed in Australian enterprise and government environments. Each model’s AAGUID is published in the Microsoft Entra FIDO2 hardware vendor attestation list.3

Brand / Model USB NFC Bio Example AAGUID Notes
YubiKey 5 NFC (Yubico) βœ… βœ… ❌ fa2b99dc-9e39-4257-8f92-4a30d23c4118 Most widely deployed enterprise FIDO2 key. Multi-protocol (FIDO2, Smart Card, OTP). Recommended first choice.
YubiKey 5C NFC (Yubico) βœ… USB-C βœ… ❌ 2fc0579f-8113-47ea-b116-bb5a8db9202a USB-C variant suited for modern laptops and tablets.
Security Key NFC by Yubico β€” Enterprise Edition (Yubico) βœ… βœ… ❌ ed042a3a-4b22-4455-bb69-a267b652ae7e FIDO2-only (no Smart Card/OTP). Lower cost; Enterprise Profile AAGUID available for simplified org management.
YubiKey Bio Series β€” Multi-protocol Edition (Yubico) βœ… ❌ βœ… fingerprint 90636e1f-ef82-43bf-bdcf-5255f139d12f Biometric fingerprint instead of PIN. FIDO2 + Smart Card. Recommended for high-assurance or no-PIN-entry policy.
YubiKey 5 FIPS Series with NFC (Yubico) βœ… βœ… ❌ fcc0118f-cd45-435b-8da1-9782b2da0715 FIPS 140-2 validated; required by some government and defence-sector security frameworks.
Google Titan Security Key v2 (Google) βœ… βœ… ❌ 42b4fb4a-2866-43b2-9bf7-6c6669c2e5d3 Cost-effective FIDO2-only key; single AAGUID simplifies attestation configuration.
HID Crescendo Key V3 (HID Global) βœ… βœ… ❌ 7991798a-a7f3-487f-98c0-3faf7a458a04 Enterprise smart card + FIDO2. Common where physical and logical access convergence on a single form factor is required.
Feitian ePass FIDO2-NFC (Feitian) βœ… βœ… ❌ ee041bce-25e5-4cdb-8f86-897fd6418464 Cost-effective enterprise option; widely available in Australia for fleet deployments.
Feitian BioPass FIDO2 Plus (Feitian) βœ… ❌ βœ… fingerprint b6ede29c-3772-412c-8a78-539c1f4c62d2 Biometric + FIDO2; cost-effective alternative to YubiKey Bio for fingerprint-policy requirements.

[!NOTE] A single hardware model typically has multiple AAGUIDs across firmware versions, enterprise profile variants, and product revisions. When restricting by AAGUID, add all relevant AAGUIDs for the intended product family \u2014 the YubiKey 5 NFC family alone has 10+ distinct AAGUIDs. Always verify against the Microsoft Entra FIDO2 hardware vendor attestation list before finalising the approved list.3

Restricting FIDO2 Keys by Brand or Model (Device Attestation)

Microsoft Entra ID supports AAGUID-based restriction of FIDO2 security keys using Custom Authentication Strengths in Conditional Access. This allows organisations to enforce that only pre-approved key models (e.g., YubiKey 5 NFC only, or YubiKey + HID Crescendo) can satisfy FIDO2 authentication \u2014 preventing the use of unvetted consumer-grade or unapproved devices.

Step 1 \u2014 Enable attestation enforcement for passkeys (FIDO2)

Attestation must be enabled before AAGUID filtering takes effect. Without enforced attestation, Entra ID accepts any FIDO2-compliant key regardless of AAGUID.

  1. In the Microsoft Entra admin center, browse to Authentication methods > Policies > Passkeys (FIDO2).3
  2. Set Enforce attestation to Yes and save.

Keys registered after this point must have a FIDO Alliance MDS-validated attestation chain. Previously registered keys without a valid attestation will no longer satisfy authentication.

Step 2 \u2014 Create a custom Authentication Strength with approved AAGUIDs

  1. Browse to Entra ID > Authentication methods > Authentication strengths.3
  2. Select New authentication strength; provide a name (e.g., Approved FIDO2 Keys \u2014 [Organisation]).
  3. Select Passkeys (FIDO2) as the allowed method.
  4. Select Advanced options > Add AAGUID.
  5. Enter each AAGUID for every approved key model and firmware variant. For a YubiKey-only policy, add all AAGUIDs for the chosen product lines from the Microsoft Entra attestation list.
  6. Select Save, then Next, then Create.3

[!TIP] YubiKey Enterprise Program: YubiKey 5 Series and Security Key Series keys purchased through the YubiEnterprise Subscription can be provisioned with an Enterprise Profile AAGUID \u2014 a single organisation-specific AAGUID assigned to an entire batch. This dramatically simplifies AAGUID management: instead of tracking 10+ AAGUIDs per product line, you manage one. Enterprise Profile variants appear in the Microsoft Entra attestation list with (Enterprise Profile) in the description. HID Crescendo similarly offers an enterprise/managed profile variant.

Step 3 \u2014 Apply the custom strength to Conditional Access policies

  1. Navigate to Entra ID > Security > Conditional Access > Policies and open the relevant CA policy.
  2. Under Grant, select Require authentication strength and choose the custom strength (e.g., Approved FIDO2 Keys \u2014 [Organisation]) instead of the built-in Phishing-resistant MFA strength.
  3. Save and enable the policy. Users presenting a key whose AAGUID is not in the approved list receive CA error 53003 (authentication strength not satisfied).3

[!WARNING] Before enforcing, verify that all currently registered FIDO2 keys for emergency accounts are in the approved AAGUID list, or re-register them with an approved key. A user whose registered key AAGUID is not in the list will be completely blocked.

HOME ← ISM-1683
ISM-1686 β†’