Welcome to 2023.
After the pandemic upended how we work, study, play, and handle our lives, we discover ourselves extra linked than ever, with extra handy entry to an ever-wider vary of on-line instruments and experiences. However as our world digital footprint continues to develop, so does the chance of cyberthreats. And now, financial uncertainty is difficult the very assets organizations must defend in opposition to escalating assaults.
As the primary line of protection, identification has turn out to be the brand new battleground. That is evident from the large quantity of assaults that we intercept at Microsoft.1 For instance, we stop 1,287 password assaults each second, or greater than 111 million a day. This previous 12 months, password breach replay assaults grew to five.8 billion monthly, whereas phishing assaults rose to 31 million monthly and password spray assaults soared to 5 million monthly.

Determine 1: Progress in password-related assaults between 2018 and 2022.
Clearly, dangerous actors aren’t standing nonetheless. So, neither can we.
As organizations search for alternatives to do extra with much less, they’re little question contemplating how safety groups can contribute. With that in thoughts, I’d prefer to share 5 identification priorities for 2023 that may repay in methods you possibly can truly measure:
- Shield in opposition to identification compromise utilizing a “Protection in Depth” strategy.
- Modernize identification safety to do extra with much less.
- Shield entry holistically by configuring identification and community entry options to work collectively.
- Simplify and automate identification governance.
- Confirm distant customers in a less expensive, sooner, extra reliable means.
By adopting the most recent identification improvements, you possibly can higher shield each your digital property and your price range.
1. Shield in opposition to identification compromise utilizing a “Protection in Depth” strategy
Whereas credential assaults are nonetheless devastatingly efficient, cybercriminals are additionally escalating in methods which might be a lot more durable to detect; for instance, bypassing fundamental multifactor authentication and manipulating customers into giving up their credentials or second components. They’re additionally infiltrating organizations by their suppliers, scouring GitHub repositories for credentials embedded in code, and stealing tokens. Essentially the most refined and well-funded attackers are even making an attempt to take over the infrastructure that points tokens.
Defending consumer accounts is vital however now not sufficient. You now should shield each layer of your identification ecosystem, together with non-human or workload identities, plus the infrastructure that gives, shops, and manages all of your identities. Your finest wager is a Protection in Depth strategy that requires shut collaboration between your safety operations middle (SOC) and identification groups:
- Safety posture administration: Monitoring your group’s identification methods and figuring out misconfigurations, vulnerabilities, and lacking or dangerous insurance policies and controls.
- Actual-time safety and remediation with identification: Imposing Conditional Entry insurance policies primarily based on threat aggregated from a number of sources on any suspicious exercise associated to consumer accounts within the listing.
- Id risk detection and investigation: Analyzing alerts from all corners of your digital property to disclose anomalous patterns too delicate for any particular person device or workforce to detect.
To help your Protection in Depth strategy, Microsoft offers unified, customizable experiences throughout Microsoft Entra, Microsoft Defender for Id, and Microsoft Sentinel.
Step one you possibly can take—and your finest return on funding—is to activate multifactor authentication, a characteristic included with each subscription to Microsoft Azure Energetic Listing (Azure AD), a part of Microsoft Entra.2 In our expertise, of all accounts compromised in a single month, greater than 99.9 p.c didn’t use multifactor authentication. Using phishing-resistant multifactor authentication strategies reminiscent of Home windows Hey, FIDO 2 safety keys and passkeys, and certificate-based authentication (CBA) will additional scale back your threat. We additionally suggest blocking legacy authentication, as a result of much less safe protocols like POP and IMAP can’t implement multifactor authentication.3
The place to start out: Study extra about Azure AD and Microsoft Defender.
2. Modernize identification safety to do extra with much less
It might be tempting to stay with legacy applied sciences once they’re examined, acquainted, and do an okay job for now, like an previous automotive that manages to get you to and from work even with the engine warning gentle flashing. Chances are you’ll be understandably frightened about enterprise disruption and the price of transitioning from previous to new, however “patchwork quilts” of rigid and poorly built-in applied sciences are costly to take care of and depart gaps in your defenses. And since cybercriminals proceed to innovate their ways, your threat will solely improve.
Trendy, cloud-native identification options reminiscent of Microsoft Entra are extra resilient, extra scalable, and safer in opposition to fashionable threats. They’re additionally higher outfitted to accommodate the speedy adjustments to merchandise, companies, and enterprise processes essential to compete in right now’s unpredictable enterprise atmosphere. You possibly can considerably improve enterprise agility, higher fortify your atmosphere in opposition to future threats, and lower your expenses by making the most of the superior, built-in options out there in Microsoft Entra.
Modernization is much less daunting when you break it down into well-defined, time-bound initiatives with clear advantages. Begin by migrating off of Energetic Listing Federation Companies (AD FS) to simplify your atmosphere and retire these on-premises servers (if CBA has been a blocker for you, it’s now out there in Microsoft Entra).4 Subsequent, join pre-integrated purposes to Azure AD to realize benefits reminiscent of single sign-on.5 Lastly, stock your safety atmosphere, consolidate any redundant instruments to scale back your administration burden, and apply your subscription financial savings to different priorities.
The place to start out: For those who’re utilizing AD FS, discover the advantages of modernizing identification and entry capabilities.
3. Shield entry holistically by configuring identification and community entry options to work collectively.
As any sports activities fan is aware of, extremely expert defenders are far more practical once they talk and work collectively. You possibly can strengthen your general safety posture by integrating instruments that at the moment function in silos. For instance, many organizations make use of community entry options that acknowledge device- and network-related dangers and stop dangerous actors from crossing the community to compromise on-premises and legacy web-based purposes. However many of those instruments lack in-depth identification consciousness, which might weaken your safe entry posture.
Making use of a Zero Belief strategy means explicitly verifying each entry request utilizing each out there sign. You may get essentially the most detailed image of session threat by combining the whole lot the community entry answer is aware of concerning the community and system with the whole lot the identification answer is aware of concerning the consumer session.
In case your community entry vendor is a part of the Microsoft Safe Hybrid Entry program, you possibly can combine their answer with Azure AD.6 This manner, the on-premises purposes and customized or legacy web-based apps you’re defending along with your community entry answer additionally acquire most of the identical advantages that pre-integrated apps get pleasure from.7
The place to start out: Learn to combine your community entry answer with Azure AD.
4. Simplify and automate identification governance
Safety consciousness and mitigation efforts usually concentrate on defending your group from exterior threats, reminiscent of hackers using stolen or simply guessed credentials. However threats may be inner, too. For instance, customers are likely to accumulate entry to apps and assets they now not want. Equally, organizations generally overlook to take away entry granted to exterior collaborators when initiatives or contracts finish. Organizations even uncover still-active accounts of former staff that retain entry to vital assets.
That is the place identification governance is available in. As a result of governance helps to scale back inner threat—whether or not from easy neglect or precise malfeasance—it’s vital for organizations of each dimension, geography, and trade. Microsoft Entra Id Governance is an entire identification governance answer that helps you adjust to regulatory necessities whereas rising worker productiveness by real-time, self-service, and workflow-based entitlements. It extends capabilities already out there in Azure AD by including Lifecycle Workflows, separation of duties, and cloud provisioning to on-premises apps. As a result of it’s cloud-delivered, Microsoft Entra Id Governance scales to advanced cloud and hybrid environments, in contrast to conventional on-premises identification governance level options.
If you have already got an identification governance answer in place, you’ll lower your expenses, scale back complexity, and shut safety gaps by consolidating a number of level options and adopting an answer that grows with you.
The place to start out: Study extra concerning the Microsoft Entra Id Governance Preview and attempt it without spending a dime right now.
5. Confirm distant customers in a less expensive, sooner, extra reliable means
Id verification for patrons and staff is a big expense for a lot of organizations. When folks apply for varsity admissions, loans, and jobs, a number of time goes into the handbook assortment and verification of paperwork to show age, citizenship, revenue, abilities, skilled expertise, and extra. For those who acquire and retailer such info in a centralized database, then you definately’re answerable for the whole lot it takes to completely safe and shield it. This not solely creates threat for you, however it additionally creates threat in your staff or prospects—they naturally need management over who accesses their private info and the way it will get used.
Verifiable credentials introduce the idea of a per-claim belief authority. The belief authority populates a credential with a declare about you that you could retailer digitally. For instance, a mortgage officer can verify your present employment by requesting digital credentials issued by your employer and verifying them in actual time. Our standards-based implementation, Microsoft Entra Verified ID, helps organizations scale back the burden of identification verification and simplify processes reminiscent of new worker onboarding. Since we launched it in August 2022, prospects worldwide have already began utilizing it to streamline verification processes.
Verified ID is at the moment out there to all Azure AD prospects at no further cost. You need to use APIs to create customized apps with easy and privacy-respecting identification verification in-built.8
The place to start out: Study extra about Verified ID.
Microsoft may help you safe extra with much less
As you kick off the brand new 12 months, the methods outlined on this weblog may help you navigate robust choices on the place to focus your energies and tips on how to empower your group to do extra with much less. Our suggestions come from serving hundreds of shoppers, collaborating with the trade, and defending the digital financial system from ever-evolving threats. We look ahead to persevering with our partnership with you—from day-to-day interactions to joint deployment planning to direct suggestions that informs our technique. As all the time, we stay dedicated to constructing the merchandise and instruments that you must defend your group all through 2023 and past.
Study extra about Microsoft Entra.
To study extra about Microsoft Safety options, go to our web site. Bookmark the Safety weblog to maintain up with our professional protection on safety issues. Additionally, observe us at @MSFTSecurity for the most recent information and updates on cybersecurity.
1Your Pa$$phrase doesn’t matter, Alex Weinert. July 9, 2019.
2The way it works: Azure AD Multi-Issue Authentication, Microsoft. August 25, 2022.
3New instruments to dam legacy authentication in your group, Alex Weinert. March 12, 2020.
4Overview of Azure AD certificate-based authentication, Microsoft. October 18, 2022.
5What’s single sign-on in Azure Energetic Listing? Microsoft. December 7, 2022.
6Safe hybrid entry by Azure AD associate integrations, Microsoft. July 8, 2022.
7Advantages of migrating app authentication to Azure AD, Microsoft. December 15, 2022.
8Request Service REST API, Microsoft. September 4, 2022.
