Keynote - Cloudy Vision: How Cloud Integration Complicates Security

Attacking & Defending
the Microsoft Cloud
(Azure AD & Office 365)
Sean Metcalf
CTO
Trimarc
Mark Morowczynski
Principal Program Manager
Microsoft
Sean Metcalf
• Founder Trimarc (Trimarc.io), a professional services company that
helps organizations better secure their Microsoft platform, including
the Microsoft Cloud.
• Microsoft Certified Master (MCM) Directory Services
• Microsoft MVP
• Speaker: Black Hat, Blue Hat, BSides, DEF CON, DerbyCon,
Shakacon, Sp4rkCon, Troopers
• Security Consultant / Researcher
• AD Enthusiast - Own & Operate ADSecurity.org
(Microsoft platform security info)
Sean Metcalf
@Pyrotek3
sean@TrimarcSecurity.com
Mark Morowczynski
• Principal Program Manager, Identity Division at Microsoft
• Customer Experience (CXP) Team
• Azure Active Directory (AAD), Active Directory(AD), Active Directory
Federation Services (ADFS)
• SANS/GIAC-GSEC, GCIH, GCIA, GCCC, GCTI, GPEN, GWAPT,
GMOB, GCWN. CISSP&CCSP. MCSE
• Speaker-Microsoft Ignite, Microsoft Inspire, Microsoft Ready,
Microsoft MVP Summits, The Cloud Identity Summit, SANs
Security Summits and TechMentor
• AskPFEPlat Blog, Azure AD Identity Blog
Mark Morowczynski
@markmorow
Markmoro@microsoft.com
Some things start with
Twitter…
Why This Talk?
Some things start with
Twitter…
Why This Talk?
•“Sample Customer” Cloud On-boarding Process
•Attacker Recon
•Attacking the Cloud
•Defending the Cloud
•Go Do’s!
Agenda
• Company founded in 1808.
• Global company headquartered in Las Vegas, Nevada.
• Largest manufacturer & distributer of anvils in the world.
• 500k users in 140 countries (anvils are big business).
• Started thinking about moving all on-prem infrastructure to the
cloud (except manufacturing systems).
• Just hired a new visionary CIO…
Acme Corporation
About Acme
CIO
Acme Corporation
Priority #1:
We’re going to the cloud!
Wile E. Coyote
• Identity Architect
• Wants to fix all previous IAM mistakes. “This time let’s do it right!”
• Collaboration Architect
• On board but concerned what does this mean for future employment.
• Identity Engineering
• All scenarios must have 100% coverage to actually start the deployment
• Collaboration Engineering
• Looking for any reason to not have to change anything
• Security Engineering
• The answer is No. What was the question again?
• Desktop Engineering
• Not present
Acme Project Team Members
Acme Starts Moving to the Microsoft Cloud
• Acme signs up for Office 365, first workload is email
• Additional security features such as MFA prioritized
• Initial plan is to setup a pilot and then move the rest of the company
• Azure AD Connect is setup to sync all users and groups & enabled
password hash sync.
• A few pilot users in IT have their email moved over
• More meetings and discussions planned to flush out 100% use case
coverage.
• “What if they just got a new phone, are on a flight but the wifi is down. How
will they access their email?”
• Meanwhile…
Attacking The Cloud
Cloud Discovery
What can we find?
Cloud Recon
• Proofpoint (pphosted)
• Microsoft Office 365: DOMAIN-COM.mail.protection.outlook.com
• Cisco Email Security (iphmx)
• Message Labs
• Mimecast
• Google Apps (G Suite):
*.google OR *.googlemail.com
• FireEye (fireeyecloud.com)
• ForcePoint (mailcontrol.com)
Cloud Recon: DNS MX Records
MS = Microsoft Office 365
Google-Site-Verification = G Suite
Docusign = Docusign digital signatures
Adobe IDP
Amazonses = Amazon Simple Email
Facebook
Atlassian-* = Atlassian services
GlobalSign
AzureWebsites = Microsoft Azure
Dropbox
Cloud Recon: DNS TXT Records
• Office 365 (MS=7274734)
• Atlassian
• Cisco
• Citrix
• Docusign
• Dropbox
• Facebook
• Google Site
• Team Viewer
• WebEx
What do we know about Acme’s Cloud Config?
Cloud Recon: Acme DNS TXT Records
Cloud Recon: Acme DNS TXT Records
https://medium.com/@logicbomb_1/one-misconfig-jira-to-leak-them-all-including-nasa-and-hundreds-of-fortune-500-
companies-a70957ef03c7
No standard naming for FS.
Some are hosted in the cloud.
DNS query for:
• adfs
• auth
• fs
• okta
• ping
• sso
• sts
Cloud Recon: Federation
DEF CON 25 (July 2017)
Attacking Federation
https://www.cyberark.com/threat-research-blog/golden-saml-newly-discovered-attack-
technique-forges-authentication-cloud-apps/
Attacking Federation: Forging SAML Tokens
https://github.com/fireeye/adfspoof
Attacking Federation: ADFS Persistence
I Am ADFS and So Can You
https://www.troopers.de/troopers19/agenda/fpxwmn/
Attacking Federation: ADFS Persistence
I Am ADFS and So Can You
https://www.troopers.de/troopers19/agenda/fpxwmn/
• Protect federation servers (ADFS) like Domain
Controllers (Tier 0).
• Protect federation certificates.
• Consolidate and correlate federation server, AD, and
Azure AD logs to provide insight into user authentication
to Office 365 services.
• Correlate Federation token request with AD
authentication to ensure a user performed the complete
auth flow.
Federation Server Attack Detection & Defense
On-Prem: AD to Cloud Sync
• AD provides Single Sign On (SSO) to cloud services.
• Most organizations aren’t aware of all cloud services
active in their environment.
• Some directory sync tools synchronizes all users &
attributes to cloud services.
• Most sync engines only require AD user rights to send
user and group information to cloud service.
• If you have Office 365, you almost certainly have Azure
AD Connect synchronizing on-prem AD user to Azure AD.
On-Prem: AD to Cloud Sync
On-Prem: AD to Cloud Sync
On-Prem: AD to Cloud Sync Examples
• Adobe User Sync tool
• Atlassian Active Directory Attributes Sync
• Dropbox Active Directory Connector
• Duo Directory Sync
• Envoy Active Directory integration (PowerShell)
• Google Cloud Directory Sync
• Facebook Workplace Active Directory Sync
• Forcepoint (Websense) Directory Synchronization Client
• Mimecast Directory Sync Tool
• Proofpoint Essentials AD Sync Tool
• Rackspace Directory Sync (syncs passwords too!)
• Zoom AD Sync to Zoom
Attacking On-Prem Cloud Integration
DEF CON 25 (July 2017)
On-Prem: Acme’s Azure AD Connect
On-Prem: Acme’s Azure AD Connect
On-Prem: Acme’s Azure AD Connect
On-Prem: Acme’s Azure AD Connect
On-Prem: Acme’s Azure AD Connect
On-Prem: Acme’s Azure AD Connect Scenario
• Azure AD Connect service account is granted password hash sync
rights.
• AAD Connect runs on “AzureSync” which is in the Servers OU.
• The Servers OU has 2 GPOs applied:
• “Server Baseline Policy” GPO adds the Server Admins group (in the Groups
OU).
• “Server Config” GPO has 3 Server Tier groups with modify rights.
Attack Options:
• Compromise account that is a member of the Server Admins group
or any of the Server Tier groups.
• Compromise account delegated rights to modify groups in the
Groups OU.
AD Recon vs Azure AD Recon
On-Prem AD:
• AD user can enumerate all user accounts & admin
group membership with network access to a Domain
Controller.
Azure AD:
• Azure AD user can enumerate all user accounts &
admin group membership with access to Office 365
services (the internet by default).
• User enumeration* often possible without an account!
Azure AD User Enumeration
• Office 365 Authentication Page (Python) [Account Discovery]
• https://github.com/LMGsec/o365creeper
• OWA (Golang)
• https://github.com/busterb/msmailprobe
• ActiveSync (Python)
• https://bitbucket.org/grimhacker/office365userenum/src
• MSOnline/AzureAD PowerShell Module (PowerShell)
• https://github.com/nyxgeek/o365recon
Password Spraying Overview
“Winter2019”
“Spring2019”
Sleep x seconds/minutes
No account lockout since 1 password is used in authentication
attempt for each user in the list (typically all or just admins) then the
password spray tool pauses before moving onto the next password.
Password Spraying Overview
“Winter2019!”
“Spring2019!”
Sleep x seconds/minutes
No account lockout since 1 password is used in authentication
attempt for each user in the list (typically all or just admins) then the
password spray tool pauses before moving onto the next password.
Password Spraying Overview
“Summer2019”
“Fall2019”
Sleep x seconds/minutes
No account lockout since 1 password is used in authentication
attempt for each user in the list (typically all or just admins) then the
password spray tool pauses before moving onto the next password.
Attacking the Cloud: Password Spraying
• Ruler (Exchange) [Golang]
• https://github.com/sensepost/ruler/wiki/Brute-Force
• SprayingToolkit (Lync/Skype for Business/OWA) [Python]
• https://github.com/byt3bl33d3r/SprayingToolkit
• LyncSniper (Lync/Skype for Business) [PowerShell]
• https://github.com/mdsecresearch/LyncSniper
• MailSniper (OWA/EWS) [PowerShell]
• https://github.com/dafthack/MailSniper
Legacy Authentication enables O365 Password Spraying
Legacy = Outlook =<2010, POP, IMAP, SMTP, etc
Attacking the Cloud: Password Spraying
Attacking the Cloud: Password Spraying
Detecting Password Spraying
Azure AD Sign-in Logs require Azure AD Premium (P1 or P2)
Soon…
Detecting Password Spraying
*Azure AD Sign-in Logs
require Azure AD Premium
(P1 or P2)
Detecting Password Spraying
*Azure AD Sign-in Logs
require Azure AD Premium
(P1 or P2)
Detecting Password Spraying
Legacy Authentication
Attacking Cloud Administration
From On-Prem to Cloud Administration
Attacking Cloud Administration
Attacking Cloud Administration
https://www.bleepingcomputer.com/news/security/phishers-
target-office-365-admins-with-fake-admin-alerts/
Global Reader
From Global Admin to Global Reader
• Currently in Private Preview
• Provides read access to O365 services that Global
Admin can read/write.
• Enables accounts that “required” Global Admin to be
switched to read-only.
• Global Reader read-only access is still being
expanded to cover all O365 services.
Global Reader
Members have read-only
access to reports, alerts, and
can see all the configuration
and settings.
The primary difference
between Global Reader and
Security Reader is that an
Global Reader can
access configuration and
settings.
https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-compliance-center
• View-Only Retention
Management
• View-Only Manage Alerts
• View-Only Device Management
• View-Only IB Compliance
Management
• View-Only DLP Compliance
Management
• Security Reader
• Service Assurance View
• View-Only Audit Logs
• View-Only Record Management
• View-Only Recipients
Default roles assigned:
Workstation
Cloud Administration – Finding a Weakness
Cloud
Website
Web Browser
HTTP(S)
(DNS)
Attacking Cloud Administration: Token Theft
Attacking Cloud Administration: Token Theft
Cloud
Website
SSL/TLS
Decryption
Device
Attacker
Compromises
Device
Auth Auth
TokenToken
Token
Attacking Cloud Administration: Token Theft
Cloud
Website
SSL/TLS
Decryption
Device
Attacker
Compromises
Device
Auth Auth
TokenToken
Token
Attacking Cloud Administration: Token Theft
Cloud
Website
Evil Proxy
Auth Auth
TokenToken
Token
Attacking Cloud Administration: Token Theft
https://github.com/kgretzky/evilginx2
Password Reuse/Replay
SHA1
Password Reuse/Replay Detection
HaveIBeenPwned.com
Password Hash (of the AD Hash) Sync Enabled:
Users with Leaked Credential Report
• Illicit Consent Grant Attack (OAuth Espionage)
• Users fooled into granting permissions to an app that looks
like a familiar app.
• FireEye PwnAuth
• https://www.fireeye.com/blog/threat-research/2018/05/shining-a-
light-on-oauth-abuse-with-pwnauth.html
• MDSec Office 365 Toolkit
• https://www.mdsec.co.uk/2019/07/introducing-the-office-365-
attack-toolkit/
• Overprivileged Enterprise Apps with broad permissions.
Attacking the Cloud: App PrivEsc & Persistence
Illicit Consent Grant Attack: MDSec O365 Attack Toolkit
https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/
Illicit Consent Grant Attack: Pawn Storm
https://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open-
authentication-advanced-social-engineering-attacks/
Enterprise App Permissions
• Enterprise App (tenant-wide)
permissions can be granted by
Admins.
• Ideal persistence technique since app
permissions not reviewed like group
membership.
Enterprise App Permissions
Defending the Microsoft Cloud
• Admin Account Take Over
• Consent Abuse
• Breach Replay
• Phishing
• Password Spray
Common Attacks Recap
• Compromising ADFS or Azure
AD Connect
Live Look: Acme Project
Team
• Admin Account Take Over
• Consent Abuse
• Breach Replay
• Phishing
• Password Spray
Common Attacks Recap
• Compromising ADFS or Azure
AD Connect
• Defense: Treat as Tier 0
resource!
• Admin Accounts with MFA Sept 2017: 0.7%
• Admin Accounts with MFA Sept 2018: 1.7%
• Admin Accounts with MFA Aug 2019: 7.94%!
MFA Your ADMINS!
Admin Account Take Over Defense
• Good: Turn MFA on!
• Better: Conditional Access or Baseline Policy for Admins (Public Preview)
• Will change based on feedback
• Learn more at: https://aka.ms/aadbaseline
• Best: Azure AD Privilege Identity Management
• No standing admin access
• Admin access requires elevation + MFA
• Approval workflows and elevation scheduling
• Alerts on admin activity taking place outside of PIM
• Applies/Protect Azure Resources as well!
• Can buy Azure AD P2 license for just your admins
• https://aka.ms/deploymentplans
Protect Cloud Admin Accounts
• Standards-based Passwordless authentication
• WebAuthN and CTAP(Client To Authenticator Protocol) standards are
final
• Public/Private Key infrastructure
• Private keys are securely stored on the device
• Local gesture (e.g., biometric, PIN) required
• Data bound to a single device
FIDO2
Future Protection
• Edge, Firefox v67+
• Windows 10 1903 Update
• Global Administrator and
Authentication Methods
Admin
• Can scope roll out to Users
and Groups
• http://aka.ms/fido2docs
• Go try this in your test tenant!
Public Preview July 2019
FIDO2 in Azure AD
Audit Consented Permissions for All Apps
Audit Consented Permissions for All Apps
.Get-AzureADPSPermissions.ps1 | Export-Csv -Path "permissions.csv" -
NoTypeInformation
Review both:
• Delegated permissions (OAuth2PermissionGrants)
• Application permissions (AppRoleAssignments).
Review output, especially:
• consents that are of ConsentType of 'AllPrincipals’.
• discrete permissions that each delegated permission or application
has
• specific users that have consents granted. If high profile or high
impact users have inappropriate consents granted, you should
investigate further.
• ClientDisplayName for apps that seem suspicious.
Audit App Permissions with PowerShell
*Courtesy of Philippe Signoret
• Leaked Credential Reporting
• Dark Web, Law Enforcement, and Security Researchers
• When something catastrophic happens
• WannaCry, NotPetya
• Wired-The Untold Story Of Notpeya, The Most Devasting Cyberattack In History
• https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
• Understand How Password Hash Sync Works
• http://aka.ms/aadphs
• After enabling will see “NEW” leaks going forward
• Don’t “leak” one yourself “just to make sure it’s working”
Turn on Azure AD Connect Password Hash Sync
Breach Replay Defenses
Password Hash Sync Pro/Cons
Pro Con
Azure AD hash(SHA256) is completely different hash
then AD hash (MD4) (http://aka.ms/aadphs)
Security team doesn’t want
any hashes in the cloud
Leaked credential report of found clear text
username/passwords
End of list
Provides authentication method for environment if
catastrophic event happens to on-prem (WannaCry,
NotPetya)
Corporate resources can be used to recover
environment in catastrophic event (retention policies,
e-discovery, etc)
Can be used with User Risk Policies to automatically do
Password Reset to remediate the risk
You Can Enable Password Hash Sync
• Require Users to do MFA
• Authenticator App recommended. Better performance and less prompts
(behaves as authentication token broker)
• Per User MFA
• Will be prompted for MFA regardless of the application
• Conditional Access Policy better
• Location, App, etc
• Risk Based Policy Best
• Only prompt when Risk detected
• People will fall to Phishing no matter what so we must monitor..
Phishing Protection
Phishing Defenses
• Pull Logs from the Azure AD Graph API
• Initially was only integration point, we have better options
• Azure Event Hub
• Pre-Built Integration into Azure Monitor, will PUSH events to SIEM
• Splunk (docs)
• Sumo Logic (docs)
• IBM QRadar (docs)
• ArcSight (docs)
• SysLog (docs)
• Azure Log Analytics or Azure Sentinel
Monitor: Azure AD Logs
Phishing Defenses
• Alerts about common ADFS issues (cert expiring, missing updates,
performance, etc)
• Will also alert on bad Password Attempts and Risky IPs!
• ADFS 2016 or ADFS 2019 Turn On Smart Lockout
• https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout-
protection
Azure AD Connect Health with ADFS
ADFS Monitoring
• People choose “strong” but easily guessable passwords
• August2019! or Summer2019!
• https://aka.ms/passwordguidance
• NIST 800-63B
Modernize your password policy
Password Spray Defense
• Applies to on-prem
AD as well!
• https://aka.ms/deploypassword
protection
Azure AD Banned Password Policy
• Requirements
• Azure AD Premium (P1)
• DCs need to be 2012 or later
• No Domain or Forest functional level
requirement
• Sysvol needs to be using DFSR
(http://aka.ms/dfsrmig)
• Deploy in Audit Mode first
• Passwords are fuzzy matched,
substring matched & scored. Must be 5
or higher
• https://docs.microsoft.com/en-us/azure/active-
directory/authentication/concept-password-ban-bad
• After passwords have been changed,
look to extend password age
Azure AD Banned Password
• August 2018: 200k accounts compromised due to password spray
• May 2019: 133k accounts compromised due to password spray
• June 2019: 212k accounts compromised due to password spray
• July 2019: 122k accounts compromised due to password spray
• Federated with Azure AD/O365
• IDP is responsible for authentication, including legacy auth!
• https://aka.ms/PasswordSprayBestPractices
Nearly 100% of password spray attacks are using
legacy authentication
Legacy Authentication and Password Spray
• Disable services at the mailbox level
• https://docs.microsoft.com/en-
us/powershell/module/exchange/client-
access/set-casmailbox?view=exchange-ps
• Authentication Policies
• https://docs.microsoft.com/en-
us/exchange/clients-and-mobile-in-exchange-
online/disable-basic-authentication-in-
exchange-online
• Client IP Block
• https://docs.microsoft.com/en-
us/powershell/module/exchange/organization/s
et-organizationconfig?view=exchange-ps
Blocking Legacy Authentication in Exchange
• Authorization rules
• Very rich expressions using
ADFS claims language
• Happens after authentication
• Applies to ALL applications
behind Azure AD
Blocking Authorization in ADFS/Federation
• First, if you have users NOT using Legacy
Auth protocols.
• Block with Conditional Access
• Requires Azure AD P1
• Baseline Policy (Public Preview) as well
• Update Clients
• Only Service Accounts / Apps should
remain
• FYI, Basic Auth Support for EWS will be
decommissioned by October 2020
• Ensure you have coverage for all
device type scenarios (Question 7)
• https://techcommunity.microsoft.com/t5/Azure-Active-Directory-
Identity/Azure-AD-Mailbag-Conditional-Access-Q-amp-A/ba-p/566492
Blocking Legacy Auth in Azure AD
What’s Next? Assemble Your Team
❑Require MFA for all cloud admin accounts.
❑Configure PIM for all cloud admin accounts
❑Enable “Password Hash Sync” (Azure AD Connect).
❑Ensure all apps use Modern Authentication (ADAL) to connect to Office 365
services.
❑Enable user and admin activity logging in Office 365
(UnifiedAuditLogIngestionEnabled).
❑Enable mailbox activity auditing on all O365 mailboxes.
❑Conditional Access: Block Legacy Auth (for those that are not using it today!).
❑Integrate Azure AD Logs with your SIEM or use Azure Log Analytics or Azure
Sentinel
❑Deploy Azure AD Banned Password for your on-prem AD
❑Enable Azure AD Connect Health for ADFS and ADFS Smart Lockout
❑Ensure all users are registered for MFA.
Phase 1 Go Do Right Now Checklist
❑Enable self-service password reset (SSPR).
❑Enable MFA for all users via Conditional Access or Risk Based.
❑Disable Legacy Authentication Entirely via Conditional Access
❑FIDO for admin accounts
❑Follow admin account best practices for cloud admins
❑Audit consented permissions for apps & user access to apps.
❑Review App Permissions
❑Monitor App registrations.
❑Review the recommendations in Microsoft Secure Score and implement as
many as possible.
Phase 2 Go Do Soon Security Checklist
The Cloud Is Magic!
Conclusion
• Cloud is a new paradigm that requires special
attention (& resources).
•The cloud isn’t inherently secure.
•Security responsibilities are shared between
provider and customer.
•There are many security features and controls that
are available.
•Security controls need to be researched, tested, and
implemented.
•Security in the cloud may cost extra.
Conclusion
Questions?
Slides: Presentations.ADSecurity.org
Like our talk?
Please Submit an Evaluation
Sean Metcalf
@Pyrotek3
sean@TrimarcSecurity.com
Mark Morowczynski
@markmorow
Markmoro@microsoft.com
Conclusion
• One Misconfig (JIRA) to Leak Them All - Including NASA and Hundreds of
Fortune 500 Companies
• https://medium.com/@logicbomb_1/one-misconfig-jira-to-leak-them-all-including-
nasa-and-hundreds-of-fortune-500-companies-a70957ef03c7
• Golden SAML: Newly Discovered Attack Technique Forges Authentication
to Cloud Apps
• https://www.cyberark.com/threat-research-blog/golden-saml-newly-discovered-
attack-technique-forges-authentication-cloud-apps/
• I Am ADFS and So Can You (Troopers Conference Presentation 2019)
• https://www.troopers.de/troopers19/agenda/fpxwmn/
• ADFSpoof
• https://github.com/fireeye/ADFSpoof
• Hacking the Cloud - DEF CON 25 (July 2017) Presentation
• https://adsecurity.org/wp-content/uploads/2017/07/2017-DEFCON-
HackingTheCloud-SteereMetcalf-Final.pdf
• https://www.youtube.com/watch?v=LufXEPTlPak
References
• MS Mail Probe
• https://github.com/busterb/msmailprobe
• Office 365 UserEnum
• https://bitbucket.org/grimhacker/office365userenum/src
• O365 Creeper
• https://github.com/LMGsec/o365creeper
• LyncSmash
• https://github.com/nyxgeek/lyncsmash
• SprayingToolkit
• https://github.com/byt3bl33d3r/SprayingToolkit
• MailSniper
• https://github.com/dafthack/MailSniper
• Ruler
• https://github.com/sensepost/ruler/wiki/Brute-Force
• Evilginx2
• https://github.com/kgretzky/evilginx2
• HaveIBeenPwned.com
• MDSec Office 365 Toolkit
• https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/
• FireEye PwnAuth
• https://www.fireeye.com/blog/threat-research/2018/05/shining-a-light-on-oauth-abuse-with-pwnauth.html
References
• Azure AD Baseline Policies
• https://aka.ms/aadbaseline
• Azure AD Deployment Plans
• https://aka.ms/deploymentplans
• Azure AD FIDO2
• http://aka.ms/fido2docs
• Azure AD App Consent Script
• https://gist.github.com/psignoret/41793f8c6211d2df5051d77ca3728c09
• Azure AD Password Hash Sync
• http://aka.ms/aadphs
• Wired-The Untold Story Of Notpeya, The Most Devasting Cyberattack In History
• https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-
world/
References
• Azure AD Event Hub Integration
• Splunk (docs)
• Sumo Logic (docs)
• IBM QRadar (docs)
• ArcSight (docs)
• SysLog (docs)
• Microsoft Password Guidance
• https://aka.ms/passwordguidance
• NIST 800-63 Password Guidance
• https://pages.nist.gov/800-63-3/sp800-63b.html
• Azure AD Banned Password for Active Directory
• https://aka.ms/deploypasswordprotection
• Azure AD Banned Password Policy Scoring
• https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad
• FRS to DFSR Migration
• http://aka.ms/dfsrmig
References
• Password Spray Best Practices
• https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad
• Disable Legacy Protocols at the Mailbox
• https://docs.microsoft.com/en-us/powershell/module/exchange/client-access/set-
casmailbox?view=exchange-ps
• Exchange Authentication Policies
• https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/disable-basic-
authentication-in-exchange-online
• Exchange Client IP Block
• https://docs.microsoft.com/en-us/powershell/module/exchange/organization/set-
organizationconfig?view=exchange-ps
• Azure AD Conditional Access Q&A
• https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Mailbag-
Conditional-Access-Q-amp-A/ba-p/566492
• ADFS Smart Lockout
• https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Mailbag-
Conditional-Access-Q-amp-A/ba-p/566492
References
1 of 98

Recommended

ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti... by
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...CloudVillage
6.2K views25 slides
MozDef Workshop slide by
MozDef Workshop slideMozDef Workshop slide
MozDef Workshop slideCloudVillage
4.3K views61 slides
Phishing in the cloud era by
Phishing in the cloud eraPhishing in the cloud era
Phishing in the cloud eraCloudVillage
4.4K views33 slides
Scaling Security in the Cloud With Open Source by
Scaling Security in the Cloud With Open SourceScaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open SourceCloudVillage
4.1K views26 slides
Your Blacklist is Dead: Why the Future of Command and Control is the Cloud by
Your Blacklist is Dead: Why the Future of Command and Control is the CloudYour Blacklist is Dead: Why the Future of Command and Control is the Cloud
Your Blacklist is Dead: Why the Future of Command and Control is the CloudCloudVillage
4.2K views25 slides
Pragmatic Cloud Security Automation by
Pragmatic Cloud Security AutomationPragmatic Cloud Security Automation
Pragmatic Cloud Security AutomationCloudVillage
4.3K views51 slides

More Related Content

What's hot

Native cloud security monitoring by
Native cloud security monitoringNative cloud security monitoring
Native cloud security monitoringJohn Varghese
194 views45 slides
Build to Hack, Hack to Build by
Build to Hack, Hack to BuildBuild to Hack, Hack to Build
Build to Hack, Hack to BuildCloudVillage
4.6K views46 slides
Mining Malevolence: Cryptominers in the Cloud by
Mining Malevolence: Cryptominers in the CloudMining Malevolence: Cryptominers in the Cloud
Mining Malevolence: Cryptominers in the CloudCloudVillage
4.1K views40 slides
Of CORS thats a thing how CORS in the cloud still kills security by
Of CORS thats a thing how CORS in the cloud still kills securityOf CORS thats a thing how CORS in the cloud still kills security
Of CORS thats a thing how CORS in the cloud still kills securityJohn Varghese
351 views22 slides
EKS security best practices by
EKS security best practicesEKS security best practices
EKS security best practicesJohn Varghese
450 views9 slides
AWS temporary credentials challenges in prevention detection mitigation by
AWS temporary credentials   challenges in prevention detection mitigationAWS temporary credentials   challenges in prevention detection mitigation
AWS temporary credentials challenges in prevention detection mitigationJohn Varghese
302 views58 slides

What's hot(20)

Native cloud security monitoring by John Varghese
Native cloud security monitoringNative cloud security monitoring
Native cloud security monitoring
John Varghese194 views
Build to Hack, Hack to Build by CloudVillage
Build to Hack, Hack to BuildBuild to Hack, Hack to Build
Build to Hack, Hack to Build
CloudVillage4.6K views
Mining Malevolence: Cryptominers in the Cloud by CloudVillage
Mining Malevolence: Cryptominers in the CloudMining Malevolence: Cryptominers in the Cloud
Mining Malevolence: Cryptominers in the Cloud
CloudVillage4.1K views
Of CORS thats a thing how CORS in the cloud still kills security by John Varghese
Of CORS thats a thing how CORS in the cloud still kills securityOf CORS thats a thing how CORS in the cloud still kills security
Of CORS thats a thing how CORS in the cloud still kills security
John Varghese351 views
EKS security best practices by John Varghese
EKS security best practicesEKS security best practices
EKS security best practices
John Varghese450 views
AWS temporary credentials challenges in prevention detection mitigation by John Varghese
AWS temporary credentials   challenges in prevention detection mitigationAWS temporary credentials   challenges in prevention detection mitigation
AWS temporary credentials challenges in prevention detection mitigation
John Varghese302 views
AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321) by Amazon Web Services
AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321)AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321)
AWS re:Invent 2016: Cyber Resiliency – surviving the breach (SAC321)
AWS Security Strategy by Teri Radichel
AWS Security StrategyAWS Security Strategy
AWS Security Strategy
Teri Radichel1.5K views
(SEC202) Best Practices for Securely Leveraging the Cloud by Amazon Web Services
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud
Amazon Web Services8.1K views
Practical Guide to Securing Kubernetes by Lacework
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
Lacework2.8K views
Automated Intrusion Detection and Response on AWS by Teri Radichel
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
Teri Radichel618 views
Cloud Security At Netflix, October 2013 by Jay Zarfoss
Cloud Security At Netflix, October 2013Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013
Jay Zarfoss9.3K views
Grabbing Forensic Images from EC2/Rackspace by JP Bourget
Grabbing Forensic Images from EC2/RackspaceGrabbing Forensic Images from EC2/Rackspace
Grabbing Forensic Images from EC2/Rackspace
JP Bourget4.6K views
Are You Ready for a Cloud Pentest? by Teri Radichel
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
Teri Radichel1.5K views
Lacework | Top 10 Cloud Security Threats by Lacework
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
Lacework879 views
Serverless Security: What's Left to Protect? by Guy Podjarny
Serverless Security: What's Left to Protect?Serverless Security: What's Left to Protect?
Serverless Security: What's Left to Protect?
Guy Podjarny17.6K views
Incident Response on AWS - A Practical Look.pdf by Amazon Web Services
Incident Response on AWS - A Practical Look.pdfIncident Response on AWS - A Practical Look.pdf
Incident Response on AWS - A Practical Look.pdf
Amazon Web Services1.2K views
Cloud Application Security: Lessons Learned by Jason Chan
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
Jason Chan1.5K views

Similar to Keynote - Cloudy Vision: How Cloud Integration Complicates Security

Secret Management Architectures by
Secret Management Architectures Secret Management Architectures
Secret Management Architectures Stenio Ferreira
600 views30 slides
IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio... by
IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio...IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio...
IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio...George Grammatikos
21 views18 slides
Microsoft Azure News - 2018 October by
Microsoft Azure News - 2018 OctoberMicrosoft Azure News - 2018 October
Microsoft Azure News - 2018 OctoberDaniel Toomey
85 views28 slides
Office 365 - Attacks and References.pptx by
Office 365 - Attacks and References.pptxOffice 365 - Attacks and References.pptx
Office 365 - Attacks and References.pptxNaveenVarma Chintalapati
8 views28 slides
December 2022 Microsoft 365 Need to Know Webinar by
December 2022 Microsoft 365 Need to Know WebinarDecember 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know WebinarRobert Crane
1K views26 slides
Alex Magnay - Azure Infrastructure as Code with Hashicorp Terraform by
Alex Magnay - Azure Infrastructure as Code with Hashicorp TerraformAlex Magnay - Azure Infrastructure as Code with Hashicorp Terraform
Alex Magnay - Azure Infrastructure as Code with Hashicorp TerraformWinOps Conf
1.8K views49 slides

Similar to Keynote - Cloudy Vision: How Cloud Integration Complicates Security(20)

Secret Management Architectures by Stenio Ferreira
Secret Management Architectures Secret Management Architectures
Secret Management Architectures
Stenio Ferreira600 views
IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio... by George Grammatikos
IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio...IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio...
IT PRO | Connections 2020 : Introduction to Logic Apps and automation solutio...
Microsoft Azure News - 2018 October by Daniel Toomey
Microsoft Azure News - 2018 OctoberMicrosoft Azure News - 2018 October
Microsoft Azure News - 2018 October
Daniel Toomey85 views
December 2022 Microsoft 365 Need to Know Webinar by Robert Crane
December 2022 Microsoft 365 Need to Know WebinarDecember 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know Webinar
Robert Crane1K views
Alex Magnay - Azure Infrastructure as Code with Hashicorp Terraform by WinOps Conf
Alex Magnay - Azure Infrastructure as Code with Hashicorp TerraformAlex Magnay - Azure Infrastructure as Code with Hashicorp Terraform
Alex Magnay - Azure Infrastructure as Code with Hashicorp Terraform
WinOps Conf1.8K views
Microsoft Azure IaaS and Terraform by Alex Mags
Microsoft Azure IaaS and TerraformMicrosoft Azure IaaS and Terraform
Microsoft Azure IaaS and Terraform
Alex Mags990 views
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ... by Amazon Web Services
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
Amazon Web Services3.4K views
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory by Felipe Prado
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directoryDEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
DEF CON 24 - Sean Metcalf - beyond the mcse red teaming active directory
Felipe Prado147 views
Attacking ADFS Endpoints - DerbyCon by Karl Fosaaen
Attacking ADFS Endpoints - DerbyConAttacking ADFS Endpoints - DerbyCon
Attacking ADFS Endpoints - DerbyCon
Karl Fosaaen2.9K views
DEF CON 27 - DIRK JAN MOLLEMA - im in your cloud pwning your azure environment by Felipe Prado
DEF CON 27 - DIRK JAN MOLLEMA - im in your cloud pwning your azure environmentDEF CON 27 - DIRK JAN MOLLEMA - im in your cloud pwning your azure environment
DEF CON 27 - DIRK JAN MOLLEMA - im in your cloud pwning your azure environment
Felipe Prado91 views
Azure + DataStax Enterprise (DSE) Powers Office365 Per User Store by DataStax Academy
Azure + DataStax Enterprise (DSE) Powers Office365 Per User StoreAzure + DataStax Enterprise (DSE) Powers Office365 Per User Store
Azure + DataStax Enterprise (DSE) Powers Office365 Per User Store
DataStax Academy1.2K views
7 Things Testers Should Know About The Cloud with Bill Wilder & XBOSoft March... by XBOSoft
7 Things Testers Should Know About The Cloud with Bill Wilder & XBOSoft March...7 Things Testers Should Know About The Cloud with Bill Wilder & XBOSoft March...
7 Things Testers Should Know About The Cloud with Bill Wilder & XBOSoft March...
XBOSoft1.6K views
BSides SG Practical Red Teaming Workshop by Ajay Choudhary
BSides SG Practical Red Teaming WorkshopBSides SG Practical Red Teaming Workshop
BSides SG Practical Red Teaming Workshop
Ajay Choudhary673 views
Azure Infrastructure as Code and Hashicorp Terraform by Alex Mags
Azure Infrastructure as Code and Hashicorp TerraformAzure Infrastructure as Code and Hashicorp Terraform
Azure Infrastructure as Code and Hashicorp Terraform
Alex Mags869 views
Azure + DataStax Enterprise Powers Office 365 Per User Store by DataStax Academy
Azure + DataStax Enterprise Powers Office 365 Per User StoreAzure + DataStax Enterprise Powers Office 365 Per User Store
Azure + DataStax Enterprise Powers Office 365 Per User Store
DataStax Academy1.7K views
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture by CloudVillage
Using Splunk or ELK for Auditing AWS/GCP/Azure Security postureUsing Splunk or ELK for Auditing AWS/GCP/Azure Security posture
Using Splunk or ELK for Auditing AWS/GCP/Azure Security posture
CloudVillage5.5K views
Accelerating Application Development with Amazon Aurora (DAT312-R2) - AWS re:... by Amazon Web Services
Accelerating Application Development with Amazon Aurora (DAT312-R2) - AWS re:...Accelerating Application Development with Amazon Aurora (DAT312-R2) - AWS re:...
Accelerating Application Development with Amazon Aurora (DAT312-R2) - AWS re:...

Recently uploaded

DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 views21 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
385 views86 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
50 views69 slides
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
158 views20 slides
Future of AR - Facebook Presentation by
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook PresentationRob McCarty
62 views27 slides
"Surviving highload with Node.js", Andrii Shumada by
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
53 views29 slides

Recently uploaded(20)

DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue98 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li80 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue by ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue85 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue179 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 views

Keynote - Cloudy Vision: How Cloud Integration Complicates Security

  • 1. Attacking & Defending the Microsoft Cloud (Azure AD & Office 365) Sean Metcalf CTO Trimarc Mark Morowczynski Principal Program Manager Microsoft
  • 2. Sean Metcalf • Founder Trimarc (Trimarc.io), a professional services company that helps organizations better secure their Microsoft platform, including the Microsoft Cloud. • Microsoft Certified Master (MCM) Directory Services • Microsoft MVP • Speaker: Black Hat, Blue Hat, BSides, DEF CON, DerbyCon, Shakacon, Sp4rkCon, Troopers • Security Consultant / Researcher • AD Enthusiast - Own & Operate ADSecurity.org (Microsoft platform security info) Sean Metcalf @Pyrotek3 sean@TrimarcSecurity.com
  • 3. Mark Morowczynski • Principal Program Manager, Identity Division at Microsoft • Customer Experience (CXP) Team • Azure Active Directory (AAD), Active Directory(AD), Active Directory Federation Services (ADFS) • SANS/GIAC-GSEC, GCIH, GCIA, GCCC, GCTI, GPEN, GWAPT, GMOB, GCWN. CISSP&CCSP. MCSE • Speaker-Microsoft Ignite, Microsoft Inspire, Microsoft Ready, Microsoft MVP Summits, The Cloud Identity Summit, SANs Security Summits and TechMentor • AskPFEPlat Blog, Azure AD Identity Blog Mark Morowczynski @markmorow Markmoro@microsoft.com
  • 4. Some things start with Twitter… Why This Talk?
  • 5. Some things start with Twitter… Why This Talk?
  • 6. •“Sample Customer” Cloud On-boarding Process •Attacker Recon •Attacking the Cloud •Defending the Cloud •Go Do’s! Agenda
  • 7. • Company founded in 1808. • Global company headquartered in Las Vegas, Nevada. • Largest manufacturer & distributer of anvils in the world. • 500k users in 140 countries (anvils are big business). • Started thinking about moving all on-prem infrastructure to the cloud (except manufacturing systems). • Just hired a new visionary CIO… Acme Corporation About Acme
  • 8. CIO Acme Corporation Priority #1: We’re going to the cloud! Wile E. Coyote
  • 9. • Identity Architect • Wants to fix all previous IAM mistakes. “This time let’s do it right!” • Collaboration Architect • On board but concerned what does this mean for future employment. • Identity Engineering • All scenarios must have 100% coverage to actually start the deployment • Collaboration Engineering • Looking for any reason to not have to change anything • Security Engineering • The answer is No. What was the question again? • Desktop Engineering • Not present Acme Project Team Members
  • 10. Acme Starts Moving to the Microsoft Cloud • Acme signs up for Office 365, first workload is email • Additional security features such as MFA prioritized • Initial plan is to setup a pilot and then move the rest of the company • Azure AD Connect is setup to sync all users and groups & enabled password hash sync. • A few pilot users in IT have their email moved over • More meetings and discussions planned to flush out 100% use case coverage. • “What if they just got a new phone, are on a flight but the wifi is down. How will they access their email?” • Meanwhile…
  • 12. Cloud Discovery What can we find? Cloud Recon
  • 13. • Proofpoint (pphosted) • Microsoft Office 365: DOMAIN-COM.mail.protection.outlook.com • Cisco Email Security (iphmx) • Message Labs • Mimecast • Google Apps (G Suite): *.google OR *.googlemail.com • FireEye (fireeyecloud.com) • ForcePoint (mailcontrol.com) Cloud Recon: DNS MX Records
  • 14. MS = Microsoft Office 365 Google-Site-Verification = G Suite Docusign = Docusign digital signatures Adobe IDP Amazonses = Amazon Simple Email Facebook Atlassian-* = Atlassian services GlobalSign AzureWebsites = Microsoft Azure Dropbox Cloud Recon: DNS TXT Records
  • 15. • Office 365 (MS=7274734) • Atlassian • Cisco • Citrix • Docusign • Dropbox • Facebook • Google Site • Team Viewer • WebEx What do we know about Acme’s Cloud Config? Cloud Recon: Acme DNS TXT Records
  • 16. Cloud Recon: Acme DNS TXT Records https://medium.com/@logicbomb_1/one-misconfig-jira-to-leak-them-all-including-nasa-and-hundreds-of-fortune-500- companies-a70957ef03c7
  • 17. No standard naming for FS. Some are hosted in the cloud. DNS query for: • adfs • auth • fs • okta • ping • sso • sts Cloud Recon: Federation
  • 18. DEF CON 25 (July 2017) Attacking Federation
  • 20. Attacking Federation: ADFS Persistence I Am ADFS and So Can You https://www.troopers.de/troopers19/agenda/fpxwmn/
  • 21. Attacking Federation: ADFS Persistence I Am ADFS and So Can You https://www.troopers.de/troopers19/agenda/fpxwmn/
  • 22. • Protect federation servers (ADFS) like Domain Controllers (Tier 0). • Protect federation certificates. • Consolidate and correlate federation server, AD, and Azure AD logs to provide insight into user authentication to Office 365 services. • Correlate Federation token request with AD authentication to ensure a user performed the complete auth flow. Federation Server Attack Detection & Defense
  • 23. On-Prem: AD to Cloud Sync • AD provides Single Sign On (SSO) to cloud services. • Most organizations aren’t aware of all cloud services active in their environment. • Some directory sync tools synchronizes all users & attributes to cloud services. • Most sync engines only require AD user rights to send user and group information to cloud service. • If you have Office 365, you almost certainly have Azure AD Connect synchronizing on-prem AD user to Azure AD.
  • 24. On-Prem: AD to Cloud Sync
  • 25. On-Prem: AD to Cloud Sync
  • 26. On-Prem: AD to Cloud Sync Examples • Adobe User Sync tool • Atlassian Active Directory Attributes Sync • Dropbox Active Directory Connector • Duo Directory Sync • Envoy Active Directory integration (PowerShell) • Google Cloud Directory Sync • Facebook Workplace Active Directory Sync • Forcepoint (Websense) Directory Synchronization Client • Mimecast Directory Sync Tool • Proofpoint Essentials AD Sync Tool • Rackspace Directory Sync (syncs passwords too!) • Zoom AD Sync to Zoom
  • 27. Attacking On-Prem Cloud Integration DEF CON 25 (July 2017)
  • 33. On-Prem: Acme’s Azure AD Connect Scenario • Azure AD Connect service account is granted password hash sync rights. • AAD Connect runs on “AzureSync” which is in the Servers OU. • The Servers OU has 2 GPOs applied: • “Server Baseline Policy” GPO adds the Server Admins group (in the Groups OU). • “Server Config” GPO has 3 Server Tier groups with modify rights. Attack Options: • Compromise account that is a member of the Server Admins group or any of the Server Tier groups. • Compromise account delegated rights to modify groups in the Groups OU.
  • 34. AD Recon vs Azure AD Recon On-Prem AD: • AD user can enumerate all user accounts & admin group membership with network access to a Domain Controller. Azure AD: • Azure AD user can enumerate all user accounts & admin group membership with access to Office 365 services (the internet by default). • User enumeration* often possible without an account!
  • 35. Azure AD User Enumeration • Office 365 Authentication Page (Python) [Account Discovery] • https://github.com/LMGsec/o365creeper • OWA (Golang) • https://github.com/busterb/msmailprobe • ActiveSync (Python) • https://bitbucket.org/grimhacker/office365userenum/src • MSOnline/AzureAD PowerShell Module (PowerShell) • https://github.com/nyxgeek/o365recon
  • 36. Password Spraying Overview “Winter2019” “Spring2019” Sleep x seconds/minutes No account lockout since 1 password is used in authentication attempt for each user in the list (typically all or just admins) then the password spray tool pauses before moving onto the next password.
  • 37. Password Spraying Overview “Winter2019!” “Spring2019!” Sleep x seconds/minutes No account lockout since 1 password is used in authentication attempt for each user in the list (typically all or just admins) then the password spray tool pauses before moving onto the next password.
  • 38. Password Spraying Overview “Summer2019” “Fall2019” Sleep x seconds/minutes No account lockout since 1 password is used in authentication attempt for each user in the list (typically all or just admins) then the password spray tool pauses before moving onto the next password.
  • 39. Attacking the Cloud: Password Spraying • Ruler (Exchange) [Golang] • https://github.com/sensepost/ruler/wiki/Brute-Force • SprayingToolkit (Lync/Skype for Business/OWA) [Python] • https://github.com/byt3bl33d3r/SprayingToolkit • LyncSniper (Lync/Skype for Business) [PowerShell] • https://github.com/mdsecresearch/LyncSniper • MailSniper (OWA/EWS) [PowerShell] • https://github.com/dafthack/MailSniper Legacy Authentication enables O365 Password Spraying Legacy = Outlook =<2010, POP, IMAP, SMTP, etc
  • 40. Attacking the Cloud: Password Spraying
  • 41. Attacking the Cloud: Password Spraying
  • 42. Detecting Password Spraying Azure AD Sign-in Logs require Azure AD Premium (P1 or P2) Soon…
  • 43. Detecting Password Spraying *Azure AD Sign-in Logs require Azure AD Premium (P1 or P2)
  • 44. Detecting Password Spraying *Azure AD Sign-in Logs require Azure AD Premium (P1 or P2)
  • 47. From On-Prem to Cloud Administration
  • 50. Global Reader From Global Admin to Global Reader • Currently in Private Preview • Provides read access to O365 services that Global Admin can read/write. • Enables accounts that “required” Global Admin to be switched to read-only. • Global Reader read-only access is still being expanded to cover all O365 services.
  • 51. Global Reader Members have read-only access to reports, alerts, and can see all the configuration and settings. The primary difference between Global Reader and Security Reader is that an Global Reader can access configuration and settings. https://docs.microsoft.com/en-us/office365/securitycompliance/permissions-in-the-security-and-compliance-center • View-Only Retention Management • View-Only Manage Alerts • View-Only Device Management • View-Only IB Compliance Management • View-Only DLP Compliance Management • Security Reader • Service Assurance View • View-Only Audit Logs • View-Only Record Management • View-Only Recipients Default roles assigned:
  • 52. Workstation Cloud Administration – Finding a Weakness Cloud Website Web Browser HTTP(S) (DNS)
  • 57. Cloud Website Evil Proxy Auth Auth TokenToken Token Attacking Cloud Administration: Token Theft https://github.com/kgretzky/evilginx2
  • 59. Password Reuse/Replay Detection HaveIBeenPwned.com Password Hash (of the AD Hash) Sync Enabled: Users with Leaked Credential Report
  • 60. • Illicit Consent Grant Attack (OAuth Espionage) • Users fooled into granting permissions to an app that looks like a familiar app. • FireEye PwnAuth • https://www.fireeye.com/blog/threat-research/2018/05/shining-a- light-on-oauth-abuse-with-pwnauth.html • MDSec Office 365 Toolkit • https://www.mdsec.co.uk/2019/07/introducing-the-office-365- attack-toolkit/ • Overprivileged Enterprise Apps with broad permissions. Attacking the Cloud: App PrivEsc & Persistence
  • 61. Illicit Consent Grant Attack: MDSec O365 Attack Toolkit https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/
  • 62. Illicit Consent Grant Attack: Pawn Storm https://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-abuses-open- authentication-advanced-social-engineering-attacks/
  • 63. Enterprise App Permissions • Enterprise App (tenant-wide) permissions can be granted by Admins. • Ideal persistence technique since app permissions not reviewed like group membership.
  • 66. • Admin Account Take Over • Consent Abuse • Breach Replay • Phishing • Password Spray Common Attacks Recap • Compromising ADFS or Azure AD Connect Live Look: Acme Project Team
  • 67. • Admin Account Take Over • Consent Abuse • Breach Replay • Phishing • Password Spray Common Attacks Recap • Compromising ADFS or Azure AD Connect • Defense: Treat as Tier 0 resource!
  • 68. • Admin Accounts with MFA Sept 2017: 0.7% • Admin Accounts with MFA Sept 2018: 1.7% • Admin Accounts with MFA Aug 2019: 7.94%! MFA Your ADMINS! Admin Account Take Over Defense
  • 69. • Good: Turn MFA on! • Better: Conditional Access or Baseline Policy for Admins (Public Preview) • Will change based on feedback • Learn more at: https://aka.ms/aadbaseline • Best: Azure AD Privilege Identity Management • No standing admin access • Admin access requires elevation + MFA • Approval workflows and elevation scheduling • Alerts on admin activity taking place outside of PIM • Applies/Protect Azure Resources as well! • Can buy Azure AD P2 license for just your admins • https://aka.ms/deploymentplans Protect Cloud Admin Accounts
  • 70. • Standards-based Passwordless authentication • WebAuthN and CTAP(Client To Authenticator Protocol) standards are final • Public/Private Key infrastructure • Private keys are securely stored on the device • Local gesture (e.g., biometric, PIN) required • Data bound to a single device FIDO2 Future Protection
  • 71. • Edge, Firefox v67+ • Windows 10 1903 Update • Global Administrator and Authentication Methods Admin • Can scope roll out to Users and Groups • http://aka.ms/fido2docs • Go try this in your test tenant! Public Preview July 2019 FIDO2 in Azure AD
  • 74. .Get-AzureADPSPermissions.ps1 | Export-Csv -Path "permissions.csv" - NoTypeInformation Review both: • Delegated permissions (OAuth2PermissionGrants) • Application permissions (AppRoleAssignments). Review output, especially: • consents that are of ConsentType of 'AllPrincipals’. • discrete permissions that each delegated permission or application has • specific users that have consents granted. If high profile or high impact users have inappropriate consents granted, you should investigate further. • ClientDisplayName for apps that seem suspicious. Audit App Permissions with PowerShell *Courtesy of Philippe Signoret
  • 75. • Leaked Credential Reporting • Dark Web, Law Enforcement, and Security Researchers • When something catastrophic happens • WannaCry, NotPetya • Wired-The Untold Story Of Notpeya, The Most Devasting Cyberattack In History • https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/ • Understand How Password Hash Sync Works • http://aka.ms/aadphs • After enabling will see “NEW” leaks going forward • Don’t “leak” one yourself “just to make sure it’s working” Turn on Azure AD Connect Password Hash Sync Breach Replay Defenses
  • 76. Password Hash Sync Pro/Cons Pro Con Azure AD hash(SHA256) is completely different hash then AD hash (MD4) (http://aka.ms/aadphs) Security team doesn’t want any hashes in the cloud Leaked credential report of found clear text username/passwords End of list Provides authentication method for environment if catastrophic event happens to on-prem (WannaCry, NotPetya) Corporate resources can be used to recover environment in catastrophic event (retention policies, e-discovery, etc) Can be used with User Risk Policies to automatically do Password Reset to remediate the risk
  • 77. You Can Enable Password Hash Sync
  • 78. • Require Users to do MFA • Authenticator App recommended. Better performance and less prompts (behaves as authentication token broker) • Per User MFA • Will be prompted for MFA regardless of the application • Conditional Access Policy better • Location, App, etc • Risk Based Policy Best • Only prompt when Risk detected • People will fall to Phishing no matter what so we must monitor.. Phishing Protection Phishing Defenses
  • 79. • Pull Logs from the Azure AD Graph API • Initially was only integration point, we have better options • Azure Event Hub • Pre-Built Integration into Azure Monitor, will PUSH events to SIEM • Splunk (docs) • Sumo Logic (docs) • IBM QRadar (docs) • ArcSight (docs) • SysLog (docs) • Azure Log Analytics or Azure Sentinel Monitor: Azure AD Logs Phishing Defenses
  • 80. • Alerts about common ADFS issues (cert expiring, missing updates, performance, etc) • Will also alert on bad Password Attempts and Risky IPs! • ADFS 2016 or ADFS 2019 Turn On Smart Lockout • https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout- protection Azure AD Connect Health with ADFS ADFS Monitoring
  • 81. • People choose “strong” but easily guessable passwords • August2019! or Summer2019! • https://aka.ms/passwordguidance • NIST 800-63B Modernize your password policy Password Spray Defense
  • 82. • Applies to on-prem AD as well! • https://aka.ms/deploypassword protection Azure AD Banned Password Policy
  • 83. • Requirements • Azure AD Premium (P1) • DCs need to be 2012 or later • No Domain or Forest functional level requirement • Sysvol needs to be using DFSR (http://aka.ms/dfsrmig) • Deploy in Audit Mode first • Passwords are fuzzy matched, substring matched & scored. Must be 5 or higher • https://docs.microsoft.com/en-us/azure/active- directory/authentication/concept-password-ban-bad • After passwords have been changed, look to extend password age Azure AD Banned Password
  • 84. • August 2018: 200k accounts compromised due to password spray • May 2019: 133k accounts compromised due to password spray • June 2019: 212k accounts compromised due to password spray • July 2019: 122k accounts compromised due to password spray • Federated with Azure AD/O365 • IDP is responsible for authentication, including legacy auth! • https://aka.ms/PasswordSprayBestPractices Nearly 100% of password spray attacks are using legacy authentication Legacy Authentication and Password Spray
  • 85. • Disable services at the mailbox level • https://docs.microsoft.com/en- us/powershell/module/exchange/client- access/set-casmailbox?view=exchange-ps • Authentication Policies • https://docs.microsoft.com/en- us/exchange/clients-and-mobile-in-exchange- online/disable-basic-authentication-in- exchange-online • Client IP Block • https://docs.microsoft.com/en- us/powershell/module/exchange/organization/s et-organizationconfig?view=exchange-ps Blocking Legacy Authentication in Exchange
  • 86. • Authorization rules • Very rich expressions using ADFS claims language • Happens after authentication • Applies to ALL applications behind Azure AD Blocking Authorization in ADFS/Federation
  • 87. • First, if you have users NOT using Legacy Auth protocols. • Block with Conditional Access • Requires Azure AD P1 • Baseline Policy (Public Preview) as well • Update Clients • Only Service Accounts / Apps should remain • FYI, Basic Auth Support for EWS will be decommissioned by October 2020 • Ensure you have coverage for all device type scenarios (Question 7) • https://techcommunity.microsoft.com/t5/Azure-Active-Directory- Identity/Azure-AD-Mailbag-Conditional-Access-Q-amp-A/ba-p/566492 Blocking Legacy Auth in Azure AD
  • 89. ❑Require MFA for all cloud admin accounts. ❑Configure PIM for all cloud admin accounts ❑Enable “Password Hash Sync” (Azure AD Connect). ❑Ensure all apps use Modern Authentication (ADAL) to connect to Office 365 services. ❑Enable user and admin activity logging in Office 365 (UnifiedAuditLogIngestionEnabled). ❑Enable mailbox activity auditing on all O365 mailboxes. ❑Conditional Access: Block Legacy Auth (for those that are not using it today!). ❑Integrate Azure AD Logs with your SIEM or use Azure Log Analytics or Azure Sentinel ❑Deploy Azure AD Banned Password for your on-prem AD ❑Enable Azure AD Connect Health for ADFS and ADFS Smart Lockout ❑Ensure all users are registered for MFA. Phase 1 Go Do Right Now Checklist
  • 90. ❑Enable self-service password reset (SSPR). ❑Enable MFA for all users via Conditional Access or Risk Based. ❑Disable Legacy Authentication Entirely via Conditional Access ❑FIDO for admin accounts ❑Follow admin account best practices for cloud admins ❑Audit consented permissions for apps & user access to apps. ❑Review App Permissions ❑Monitor App registrations. ❑Review the recommendations in Microsoft Secure Score and implement as many as possible. Phase 2 Go Do Soon Security Checklist
  • 91. The Cloud Is Magic! Conclusion
  • 92. • Cloud is a new paradigm that requires special attention (& resources). •The cloud isn’t inherently secure. •Security responsibilities are shared between provider and customer. •There are many security features and controls that are available. •Security controls need to be researched, tested, and implemented. •Security in the cloud may cost extra. Conclusion
  • 93. Questions? Slides: Presentations.ADSecurity.org Like our talk? Please Submit an Evaluation Sean Metcalf @Pyrotek3 sean@TrimarcSecurity.com Mark Morowczynski @markmorow Markmoro@microsoft.com Conclusion
  • 94. • One Misconfig (JIRA) to Leak Them All - Including NASA and Hundreds of Fortune 500 Companies • https://medium.com/@logicbomb_1/one-misconfig-jira-to-leak-them-all-including- nasa-and-hundreds-of-fortune-500-companies-a70957ef03c7 • Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps • https://www.cyberark.com/threat-research-blog/golden-saml-newly-discovered- attack-technique-forges-authentication-cloud-apps/ • I Am ADFS and So Can You (Troopers Conference Presentation 2019) • https://www.troopers.de/troopers19/agenda/fpxwmn/ • ADFSpoof • https://github.com/fireeye/ADFSpoof • Hacking the Cloud - DEF CON 25 (July 2017) Presentation • https://adsecurity.org/wp-content/uploads/2017/07/2017-DEFCON- HackingTheCloud-SteereMetcalf-Final.pdf • https://www.youtube.com/watch?v=LufXEPTlPak References
  • 95. • MS Mail Probe • https://github.com/busterb/msmailprobe • Office 365 UserEnum • https://bitbucket.org/grimhacker/office365userenum/src • O365 Creeper • https://github.com/LMGsec/o365creeper • LyncSmash • https://github.com/nyxgeek/lyncsmash • SprayingToolkit • https://github.com/byt3bl33d3r/SprayingToolkit • MailSniper • https://github.com/dafthack/MailSniper • Ruler • https://github.com/sensepost/ruler/wiki/Brute-Force • Evilginx2 • https://github.com/kgretzky/evilginx2 • HaveIBeenPwned.com • MDSec Office 365 Toolkit • https://www.mdsec.co.uk/2019/07/introducing-the-office-365-attack-toolkit/ • FireEye PwnAuth • https://www.fireeye.com/blog/threat-research/2018/05/shining-a-light-on-oauth-abuse-with-pwnauth.html References
  • 96. • Azure AD Baseline Policies • https://aka.ms/aadbaseline • Azure AD Deployment Plans • https://aka.ms/deploymentplans • Azure AD FIDO2 • http://aka.ms/fido2docs • Azure AD App Consent Script • https://gist.github.com/psignoret/41793f8c6211d2df5051d77ca3728c09 • Azure AD Password Hash Sync • http://aka.ms/aadphs • Wired-The Untold Story Of Notpeya, The Most Devasting Cyberattack In History • https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the- world/ References
  • 97. • Azure AD Event Hub Integration • Splunk (docs) • Sumo Logic (docs) • IBM QRadar (docs) • ArcSight (docs) • SysLog (docs) • Microsoft Password Guidance • https://aka.ms/passwordguidance • NIST 800-63 Password Guidance • https://pages.nist.gov/800-63-3/sp800-63b.html • Azure AD Banned Password for Active Directory • https://aka.ms/deploypasswordprotection • Azure AD Banned Password Policy Scoring • https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad • FRS to DFSR Migration • http://aka.ms/dfsrmig References
  • 98. • Password Spray Best Practices • https://docs.microsoft.com/en-us/azure/active-directory/authentication/concept-password-ban-bad • Disable Legacy Protocols at the Mailbox • https://docs.microsoft.com/en-us/powershell/module/exchange/client-access/set- casmailbox?view=exchange-ps • Exchange Authentication Policies • https://docs.microsoft.com/en-us/exchange/clients-and-mobile-in-exchange-online/disable-basic- authentication-in-exchange-online • Exchange Client IP Block • https://docs.microsoft.com/en-us/powershell/module/exchange/organization/set- organizationconfig?view=exchange-ps • Azure AD Conditional Access Q&A • https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Mailbag- Conditional-Access-Q-amp-A/ba-p/566492 • ADFS Smart Lockout • https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Mailbag- Conditional-Access-Q-amp-A/ba-p/566492 References