Lesson 33 of 60 intermediate

Identity Security: MFA, SSO, IAM

Why identity is the new perimeter

Open interactive version (quiz + challenge)

Real-world analogy

Identity is your passport. MFA is the fingerprint check at the border. SSO is showing the passport once to enter a whole country (not one per city). IAM is the visa policy deciding what you can do where.

What is it?

Identity security is the modern ‘perimeter’ of enterprise IT. Most breaches now begin with a stolen or weak credential, not with firewall penetration. Mastering this lesson is mandatory for every IT role — not just security.

Real-world relevance

An executive clicks a phishing link, enters credentials on a fake page. Password is stolen. Because their account has FIDO2-based MFA plus Conditional Access, the attacker can’t log in — sign-in logs show blocked attempts from abroad. SOC resets credentials, investigates, moves on. No breach.

Key points

Code example

// Entra Conditional Access pattern (high level)

Policy: "Require MFA for All Users"
  Target:  All users (exclude break-glass accounts)
  Apps:    All cloud apps
  Conditions: any sign-in
  Control: Require MFA

Policy: "Block legacy authentication"
  Target:  All users
  Apps:    All
  Conditions: client apps = legacy auth
  Control: Block

Policy: "Require compliant device for email"
  Target:  All users
  Apps:    Office 365 Exchange Online
  Conditions: platforms = iOS, Android, Windows, macOS
  Control: Require device compliance

Policy: "High-risk sign-in -> block or force password change"
  Target:  All users
  Conditions: sign-in risk = High
  Control: Block access + require password change

Break-glass accounts: 2 accounts, strong unique passwords,
hardware MFA, EXCLUDED from all CA policies, stored offline.

Line-by-line walkthrough

  1. 1. Conditional Access example block
  2. 2. Policy 1 — require MFA all users
  3. 3. Target scope
  4. 4. Apps scope
  5. 5. Conditions
  6. 6. Control
  7. 7. Blank separator
  8. 8. Policy 2 — block legacy auth
  9. 9. Target
  10. 10. Apps
  11. 11. Conditions
  12. 12. Control
  13. 13. Blank separator
  14. 14. Policy 3 — require compliant device for email
  15. 15. Scope and platforms
  16. 16. Control
  17. 17. Blank separator
  18. 18. Policy 4 — block high-risk sign-ins
  19. 19. Conditions
  20. 20. Control
  21. 21. Blank separator
  22. 22. Break-glass account note

Spot the bug

Company rolls out Conditional Access requiring MFA for ALL accounts, including admins. No break-glass exceptions configured.
Need a hint?
Why is this dangerous?
Show answer
If MFA infrastructure fails (identity provider outage, MFA app offline), nobody can log in — including admins — so recovery is impossible. Always maintain 2 break-glass accounts with strong unique passwords, hardware MFA stored offline, excluded from standard CA policies, tightly monitored for usage.

Explain like I'm 5

Passwords alone are like a lock with a paper key. MFA adds a fingerprint. SSO means one real ID card unlocks every door you’re allowed. IAM decides which doors that is.

Fun fact

Microsoft has reported that enabling MFA blocks over 99% of automated account-compromise attempts. One checkbox, massively disproportionate impact — which is why ‘turn on MFA’ is the single most common senior recommendation to any organization.

Hands-on challenge

Audit your personal accounts: is MFA on every critical one (email, bank, password manager, cloud)? Prefer authenticator app or hardware key over SMS. Note which accounts you upgraded.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp