A mid-sized company is moving to a Zero-Trust security model in Azure. Currently, they rely on perimeter security but lack identity-based access controls, making them vulnerable to unauthorized access and insider threats. Their new Zero-Trust strategy focuses on:
For all the resources in this lab, we are using the East US region.
In this lab, you will complete the following exercises:
Bulk import of users
Task 1 - Bulk operations for creating users with a .csv file
- In the Microsoft Entra ID menu, first open Identity, then select Users and then select All users.
On the Users All users tile, select the Bulk operations drop-down arrow and then Bulk create.
Selecting Bulk create will open a new tile. This tile provides a Download link to a template file that you will edit to populate with your user information and upload to add the bulk creation of users.
Select Download to download the .csv file.
The .csv template provides you with the fields included with the user profile. This includes the required username, display name, and initial password. You can also complete optional fields, such as Department and Usage location, at this time. The following screenshot is an example of how you can complete the .csvfile:
Bulk import using csv file entry
You can modify this file to add users in bulk. Note that you do not need to fill out all the field. As per the sample data provide, you mainly need to add the name and username information.
A sample CSV has been provided in the Lab_Files folder – SC300BulkUser.csv. Open Notepad. Inside the lab environment, select the START button and type Notepad. Open the SC300BulkUser.csv file Change the enter your domain name to the domain of your Azure lab environment. Save the file.
On the Bulk create users dialog, select the file folder icon on step 3.
Path to the Allfiles/Labs/Lab1 folder and select SC300BulkUser.csv file.
Select Open.
You will be notified that the file uploaded successfully. Choose Submit to add the users.
On the left pane, select groups and create new group.
Name the group Management, and add the previously added users to this group and create the group.
After the users have been created, you will be prompted that the creation has succeeded. Close the Bulk create users tile and the new users will be populated in the list of Users
Navigate to Azure portal.
In the search bar at the top of the portal, type “Entra ID” and select it from the search results.
Under Manage select Security.
Under Protect, select Conditional Access.
Click + Create New Policy, name it Zero-Trust Access Control.
Navigate to Azure portal.
In the search bar at the top of the portal, type “Entra ID” and select it from the search results.
Under Manage select Security.
Under Protect, select Conditional Access.
Click + Create New Policy, name it MFA to Admin Portal.
Rule 1: Allow HTTP/HTTPS traffic from trusted corporate IP ranges.
Rule 2: Deny SSH/RDP access from unknown sources.
Rule 3: Restrict communication between public and private subnets unless explicitly allowed.
SigninLogs
| where RiskLevel != "None"
| order by TimeGenerated desc
Outcome: By following these steps, you successfully implemented a Zero-Trust Architecture in Azure, securing identity access and network traffic. The organization now has a robust identity-based security model, protecting against unauthorized access and insider threats.
Side Task: Once done, take a screenshot of the completed task and upload on LinkedIn including the Hashtag #cloudprojectwithcyberpreacher #CPwCP while sharing your experiences around the project.
Note: Ensure to delete every resources created during this project, to ensure cost management.