cloud-project

Project 11: Organization Case Study 4

CyberPreacher Edition

Summary

This project implements enterprise identity and security controls for Cyber Corporation following an acquisition. The objectives include: restricting device limits to 10 per user, enabling multi-factor authentication for all users, configuring self-service password reset, requiring admin approval for application consent, restricting guest invitations to admins only, implementing Privileged Identity Management with time-limited role access, syncing the acquired Montero forest to Entra ID without establishing domain trusts, and fixing group-based role assignments to meet least privilege requirements.

Compamy Overview

Cyber Corporation is a consulting company in Montreal.

Cyber recently acquired a Vancouver-based company named Montero, Inc.

Existing Environment. Cyber Environment

The on-premises network of Cyber contains an Active Directory Domain Services (AD DS) forest named cyber.com.

Cyber has a Microsoft 365 E5 subscription. The subscription contains a verified domain that syncs with the cyber.com AD DS domain by using Entra ID Connect.

Cyber has an Azure Active Directory (Entra ID) tenant named cyber.com. The tenant has Security defaults disabled.

The tenant contains the users shown in the following table.

Name Role
User1 None
User2 None
User3 User administrator
User4 Privileged role administrator
User5 Identity Governance Administrator

The tenant contains the groups shown in the following table.

Name Type Membership type Owner Members
IT_Group1 Security Assigned None All users in the IT department
cyberUsers Security Assigned None User1, User2

Existing Environment. montero Environment

Montero has an AD DS forest named montero.com

Existing Environment. Problem Statements

Cyber identifies the following issues:

Requirements. Planned Changes -

Cyber plans to implement the following changes:

Requirements. Technical Requirements

Cyber identifies the following technical requirements:

Soltion

Recreate the Existing Environment before you proceed

Exercise 1: Configure Device Settings

Task: Increase Device Limit to 10

  1. Navigate to Entra ID (Entra ID)
    • Sign in to the Azure Portal.
    • Search for and select Microsoft Entra ID.
  2. Open Device Settings
    • In the left menu, under Manage, select Devices.
    • Select Device settings.
  3. Configure Limit
    • Locate Maximum number of devices per user.
    • Change the value to 10.
    • Click Save.

Exercise 2: Configure External Collaboration

Task: Restrict Guest Invitations

  1. Navigate to External Identities
    • In Microsoft Entra ID, select External Identities from the left menu.
    • Select External collaboration settings.
  2. Modify Guest Invite Settings
    • Under Guest invite settings, select Only users assigned to specific admin roles can invite guest users.
    • Click Save.

Exercise 3: Configure Identity Protection and MFA

Task 1: Configure MFA Registration Policy

  1. Navigate to Identity Protection
    • Search for Identity Protection in the Azure Portal.
  2. Configure MFA Registration
    • Under Protection, select MFA registration policy.
    • Assignments: Select All users.
    • Controls: Ensure Require Entra ID MFA registration is selected.
    • Enforce Policy: Toggle to On.
    • Click Save.

Task 2: Configure Risk Policies (Remediate Security Risks)

  1. User Risk Policy
    • In Identity Protection, select User risk policy.
    • Assignments: Select All users.
    • User risk: Set to High.
    • Controls: Select Block access or Allow access > Require password change.
    • Enforce Policy: On.
    • Click Save.
  2. Sign-in Risk Policy
    • Select Sign-in risk policy.
    • Assignments: Select All users.
    • Sign-in risk: Set to Medium and above.
    • Controls: Select Allow access > Require multi-factor authentication.
    • Enforce Policy: On.
    • Click Save.

Exercise 4: Configure Self-Service Password Reset (SSPR)

Task: Enable SSPR and Configure Methods

  1. Navigate to Password Reset
    • In Microsoft Entra ID, select Password reset.
  2. Enable SSPR
    • In Properties, select All (or specific groups if testing).
    • Click Save.
  3. Configure Authentication Methods
    • Select Authentication methods.
    • Set Number of methods required to reset to 1.
    • Select the following methods:
      • Email
      • Mobile phone
      • Security questions
      • Mobile app notification (Microsoft Authenticator)
      • Mobile app code (Microsoft Authenticator)
    • Click Save.

Task: Require Admin Approval for Apps

  1. Navigate to Enterprise Applications
    • Search for Enterprise applications in the Azure Portal.
  2. Configure Consent Settings
    • Under Security, select Consent and permissions.
    • Select User consent settings.
    • Select Do not allow user consent. (This forces admin approval).
    • Under Admin consent settings, ensure Users can request admin consent to apps they are unable to consent to is set to Yes.
    • Click Save.

Exercise 6: Configure Privileged Identity Management (PIM)

Task: Configure User Administrator Role

  1. Navigate to PIM
    • Search for Privileged Identity Management.
    • Select Microsoft Entra roles.
  2. Configure Role Settings
    • Select Roles.
    • Search for User Administrator.
    • Click on the role, then select Settings (or “Role settings” in the top bar).
    • Click Edit.
  3. Set Assignment Rules
    • Under Assignment, ensure Allow permanent eligible assignment is unchecked.
    • Set Maximum duration to 1 year.
    • Under Activation, ensure Require approval to activate is selected.
    • Click Update.
  4. Assign Role
    • Go back to Roles > User Administrator.
    • Click Add assignments.
    • Select User3.
    • Click Next.
    • Ensure Assignment type is Eligible.
    • Set the duration to end in 1 year.
    • Click Assign.

Exercise 7: Fix Group Role Assignment

Task: Recreate IT_Group1 for Role Assignment

Note: Existing Security Groups cannot be modified to allow role assignment after creation. You must recreate the group.

  1. Create New Group
    • In Microsoft Entra ID, go to Groups.
    • Click New group.
    • Group type: Security.
    • Group name: IT_Group1_New.
    • Entra ID roles can be assigned to the group: Switch to Yes.
    • Membership type: Assigned.
    • Add members from the IT department.
    • Click Create.
  2. Assign Role
    • Go to Roles and administrators.
    • Search for Device Administrators.
    • Click Add assignments.
    • Select IT_Group1_New.
    • Click Add.

Exercise 8: Sync montero Environment

Task: Configure Entra ID Connect for montero

  1. Prepare montero Server
    • Log in to a server in the montero.com forest.
  2. Install Entra ID Connect
    • Download and install Entra ID Connect.
    • Select Custom installation.
  3. Connect to Entra ID
    • Enter credentials for the cyber.com Entra ID tenant (Global Administrator).
  4. Connect to Directories
    • Add the montero.com forest.
    • Important: Do NOT configure a trust between cyber.com (on-prem) and montero.com. Entra ID Connect can sync multiple untrusted forests to a single tenant.
  5. Configure Sync
    • Proceed with default filtering or configure as needed.
    • Enable Password Hash Synchronization (recommended for “Users currently use only passwords” issue, to allow cloud auth).
    • Complete the installation.

Exercise 9: Access Reviews

Task: Configure Access Review for Package1

  1. Navigate to Identity Governance
    • Search for Identity Governance.
  2. Create Access Review
    • Go to Entitlement management > Access packages.
    • Select Package1.
    • Select Access reviews.

Note: Delete all resources once project is completed to prevent unnecessary charges.

Side Task: Share screenshots on LinkedIn showing attack visualization and include hashtags #cloudprojectwithcyberpreacher and #CPwCP. Share your experience and learnings from this SOC lab.