Scroll Top

What You Should Know About Creating Your Own Conditional Access Policies

Conditional Access Policies

 

Your ability to create your own conditional access policies depends on the capabilities provided by the platform you are using. In most cases, you should have flexibility to define policies that align with your organization’s security requirements. However, the extent of customization and the features available are dictated by the platform you use.

“Granular security controls aren’t available on every cloud platform. If this is a priority for you, you need to keep that in mind as you choose where to host your data.” Chris Power, CEO of Power Consulting

If you need features beyond what your platform offers, you may consider combining your identity and access management (IAM) solution with external tools or developing custom logic through APIs. For example, integrating a security information and event management (SIEM) system can add richer data sources for access decisions.

However, this process can become just as time and resource-intensive as it sounds. So, it’s best to keep each conditional access policy as straightforward as possible before you consider extensive customization.

That’s why this article will begin with the basics of creating your conditional access policies. Then, we’ll explore your options if you need more granular access controls than your system can offer by default.

What is Conditional Access?

Conditional access is a feature in identity and access management systems designed to strengthen security by managing how users access resources. It applies policies based on predefined conditions to determine whether access to a resource should be granted or denied.

Choosing whether or not to grant access based on predefined criteria is a highly effective security strategy. For instance, the most common conditional access policy is multi-factor authentication (MFA) and research shows that enabling it decreases the risk of account compromise by 99.22% across all accounts and by 98.56% for accounts with leaked credentials.

Further Reduce Your Sign-In Risks With a SOC-2 Compliant Server

Store Your Data With Us

 

How to Create a Custom Conditional Access Policy [Based on Your Platform]

Most platforms offer predefined templates and allow you to create custom rules using their specific frameworks. Usually, you can find rules that suit your needs in these templates. Here is what you need to do based on each platform.

 

Microsoft Azure (Microsoft Entra ID)
  1. Go to the Microsoft Entra Admin Center.
  2. Navigate to Security > Conditional Access.
  3. Click New Policy to start defining your policy.
  4. Specify conditions such as user groups, device states, or locations.
  5. Set access controls like requiring multi-factor authentication or restricting access.
  6. Test the policy using the What If tool to see its impact.
  7. Enable the policy and monitor its performance in the Sign-In Logs.
AWS Identity and Access Management (IAM)
  1. Open the AWS Management Console.
  2. Navigate to IAM > Policies.
  3. Choose Create Policy and use the visual editor or JSON format.
  4. Define conditions such as IP address, tags, or device compliance.
  5. Assign the policy to users, groups, or roles.
  6. Test the policy by simulating it using IAM Policy Simulator.
Okta
  1. Sign in to the Okta Admin Console.
  2. Go to Security > Policies.
  3. Select an existing policy or create a new one.
  4. Define access rules using conditions like device trust, geolocation, or risk levels.
  5. Apply the policy to specific apps or groups.
  6. Test the policy in a non-production environment before enabling it.
Google Workspace
  1. Go to the Admin Console in Google Workspace.
  2. Navigate to Security > Context-Aware Access.
  3. Create an access level by defining conditions such as device type or IP ranges.
  4. Assign the access level to apps in App Access Control.
  5. Review the policy with test users to ensure it works as intended.
  6. Deploy the policy and monitor it using the Admin Audit Log.
Cisco Duo
  1. Open the Duo Admin Panel.
  2. Navigate to Policies > Custom Policies.
  3. Create a new policy and define conditions like location, device health, or user groups.
  4. Apply the policy to applications or user roles.
  5. Use Duo’s Policy Testing Mode to validate its behavior.
  6. Enable the policy and review its effectiveness in the Access Logs.

 

What to Do if Your Predefined Templates Aren’t Enough For Your Conditional Access Policies

Custom Policy Creation

Custom policy creation involves defining rules from scratch rather than relying on predefined templates. Some platforms provide tools like visual editors or JSON interfaces to help create these policies.

However, please note that platforms that cater to smaller businesses may limit the sophistication of their conditional access features for simplicity’s sake. For instance, Microsoft Entra ID supports a broad range of conditions, but simpler platforms like Google Workspace lack support for advanced customization.

API Integration

Some platforms allow integration with APIs for even more granular policy control. This option is ideal if your use case requires external signals or dynamic conditions that aren’t natively supported. Check if your platform supports conditional API access. Use these APIs to script and automate policy creation and incorporate external data sources or advanced logic.

However, exercise extreme precaution when you create your APIs. Gartner®’s May 2024 Market Guide for API Protection notes that API breaches can lead to at least 10 times more leaked data than typical security breaches.

Third-Party Tools

Third-party tools can enhance conditional access capabilities by providing additional signals or functionalities, such as device health checks, compliance verification, or advanced threat detection.

Explore integrations supported by your IAM platform (e.g., integrating Cisco Duo with Microsoft Entra ID). Configure your policies to include conditions based on the insights or data provided by these tools.

Security Information and Event Management (SIEM) Data

SIEM platforms provide real-time insights into user and system activity, which can be used to enhance conditional access policies with dynamic, risk-based decisions. Integrate your IAM platform with your SIEM solution. Then, configure conditional access policies to act on specific risk signals, such as anomalous logins or flagged user behaviors.

 

Conditional Access Policy

 

Scripting or Programmatic Extensions

If your platform supports scripting or extensions, you can programmatically add logic that is not available through standard interfaces. This is especially useful for organizations with highly specific security needs.

Leverage scripting tools (e.g., PowerShell) to write advanced rules. Automate the deployment and management of these policies across your environment.

Risks of Extensive Customization to Keep in Mind

1. Overlapping or Conflicting Policies

Multiple custom policies may inadvertently overlap or conflict. These issues may create gaps in access control or deny legitimate users access to needed resources. Regularly review and test policies to ensure they complement rather than contradict one another. Platforms with policy evaluation tools can help identify potential conflicts.

2. Performance Impact

Highly complex policies can slow down access evaluation, particularly if they rely on external signals or dynamic inputs. This can lead to delays in user authentication or access denial in high-traffic scenarios. Balance customization with performance. Avoid unnecessary complexity by using only the conditions and signals critical to your security.

3. Higher Administrative Overhead

Custom policies require more maintenance than predefined templates. Regular updates, testing, and documentation are necessary to ensure they remain effective and aligned with organizational needs. So, be sure to allocate sufficient administrative resources to monitor, test, and refine custom policies regularly.

 

Learn More About Protecting Your IT Systems

4. Cost Implications

Some advanced customization features, such as API integration or dynamic risk signals, may require premium licenses or add-on services, leading to higher costs. Evaluate the cost-benefit ratio of extensive customization and ensure the value added justifies the expense.

5. Audit Challenges

Highly customized policies can complicate audits and compliance reporting. Lack of standardization may make it harder to demonstrate adherence to regulations. Maintain clear documentation of all policies, including their purpose, conditions, and controls. Use platform tools for logging and reporting to simplify compliance efforts.

6. Human Error

35% of security breaches are caused by internal employees, and the majority of these incidents are the result of a simple error, not malicious intent. Using custom access policies increases your organization’s risks of such errors.

That’s because extensive customization increases the likelihood of misconfiguration, such as forgetting to account for edge cases or creating overly permissive rules that weaken security. Follow a strict review process for policy changes, including peer reviews or approvals. Use platform-specific best practices and built-in validation tools to minimize errors.

Ask Our Expert Consultants About Your Options

By partnering with Power Consulting, you gain access to a team of experts dedicated to enhancing your organization’s security posture. We understand that each business has unique needs, and we tailor our services to provide the most effective solutions.

To learn more about how Power Consulting can assist you in implementing robust conditional access policies and other cybersecurity measures, visit our website or contact us directly for a consultation.

This will close in 0 seconds