Home Cyber Security News Microsoft Cuts High-Privilege Access to Bolster Microsoft 365 Security

Microsoft Cuts High-Privilege Access to Bolster Microsoft 365 Security

0

Microsoft has made substantial progress in enterprise security through its Secure Future Initiative (SFI), with a special emphasis on removing high-privileged access (HPA) from all Microsoft 365 apps.

The SFI’s “Protect Tenants and Isolate Production Systems” pillar orchestrates a company-wide effort to strengthen cybersecurity.

At its core, the strategy targets scenarios where applications or services had previously been able to access broad swathes of customer content by impersonating users without proper user context.

Initiative Accelerates Move to Least Privilege

HPA, as defined by Microsoft, arises when applications or services in a service-to-service (S2S) architecture can operate with excessive access essentially acting as any user in the system and retrieving sensitive data through APIs without explicit user authentication.

For example, if Application B reads customer data directly from Application A’s storage in the absence of user context, this is considered high-privileged behavior.

This model, while sometimes expedient, exposes organizations to increased risks if credentials are mishandled or if any involved service is compromised.

The impact could be severe: attackers might assume any user’s identity and gain access to confidential business information.

Recognizing the security implications, Microsoft has embarked on a broad review of all Microsoft 365 application interactions, particularly their S2S engagements with critical resource providers.

The company emphasizes the need for robust least privilege enforcement, ensuring applications are granted only the permissions absolutely necessary to perform their intended functions no more, no less.

This applies equally to scenarios in which applications are operating both on behalf of individual users and independently.

Cross-Company Effort

Central to Microsoft’s strategy is an “assume breach” security posture, underpinning a series of technical interventions.

The company first audited all S2S relationships and deprecated legacy authentication protocols that enabled high-privileged patterns.

Microsoft then enforced new authentication standards, systematically eliminating HPA situations and imposing granular permission models across its internal 365 environment.

For instance, if an application must access SharePoint data, it now receives only highly specific permissions such as ‘Sites.Selected’ as opposed to broad-scope access like ‘Sites.Read.All’.

This technical overhaul often required substantial refactoring and platform re-engineering to maintain support for critical business scenarios while shrinking the attack surface.

This cross-functional campaign drew upon the expertise of over 200 engineers and resulted in the mitigation of more than 1,000 high-privilege application scenarios.

According to the Report, Microsoft has also instituted advanced monitoring systems to continuously identify and report any re-emergence of high-privilege access within the 365 suite, reinforcing the company’s commitment to operational security.

Microsoft encourages its enterprise customers to adopt similar security best practices, leveraging native capabilities within the Microsoft 365 ecosystem.

These include auditing all third-party and internal applications that possess data access, revoking unused or excessive permissions, and moving to the Microsoft Entra identity platform’s consent framework which mandates explicit human consent for access to customer data.

The company further recommends using delegated permissions so applications act strictly within the boundaries of authenticated user access, and instituting regular audits to maintain least privilege principles throughout the development lifecycle.

With this initiative, Microsoft sets a new benchmark for secure cloud application interactions, aiming to protect customer environments from emerging threats by enforcing rigorous least privilege access across its flagship productivity platform.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version