General
This check verifies whether Conditional Access policies are in place to protect against Device Code Flow authentication.
Rationale
Device Code Flow authentication exists to allow devices where username and password authentication doesn't work — such as Smart TVs and IoT devices — a way to sign in to Microsoft 365. However, there are known cases where cybercriminals abuse this feature to gain and/or maintain access to an account.
By default, Attic creates a conditional access policy in report-only mode. This provides visibility into the use of Device Code Flow authentication, allows legitimate use to be identified and excluded, before placing the policy in blocking mode.
Attic Fix
A fix is available for this check! It will be offered through a ticket in Attic, after which you can accept it.
Manual instructions
Follow these steps to adjust the setting:
- Open the Entra admin center via https://entra.microsoft.com
- Go to Protection > Conditional Access > Policies
- Click New Policy
- Under Assignments, select Users or workload identities
- Under Include, select All users
- Under Target resources > Resources (formerly cloud apps) > Include: select All resources
- Under Conditions > Authentication flows set Configure to Yes
- Select Device code flow
- Click Done
- Under Access controls > Grant, select Block access. Click Select
- Confirm the settings and set Enable Policy to Report-Only
- Click Create to enable the policy
Comments
0 comments
Please sign in to leave a comment.