{"id":792,"date":"2026-03-30T11:44:00","date_gmt":"2026-03-30T11:44:00","guid":{"rendered":"https:\/\/cloudfirst.in\/insight\/?p=792"},"modified":"2026-03-31T11:54:30","modified_gmt":"2026-03-31T11:54:30","slug":"microsoft-entra-id-and-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/cloudfirst.in\/insight\/microsoft-entra-id-and-zero-trust-architecture\/","title":{"rendered":"Microsoft Entra ID and Zero Trust Architecture: A Complete Technical Guide for Indian Enterprises"},"content":{"rendered":"\n<p>Traditional network security was built on a simple assumption: trust everything inside the corporate perimeter, block everything outside it. That assumption collapsed the moment corporate data moved to the cloud, employees started working from home, and contractors began accessing internal systems from personal devices. The perimeter-based model does not work when there is no perimeter.<\/p>\n\n\n\n<p>Zero Trust replaces that assumption with a different one: trust nothing by default, verify everything explicitly, and enforce least privilege access at every layer. In Microsoft&#8217;s ecosystem, the implementation of Zero Trust runs through Microsoft Entra ID \u2014 the identity platform that underpins <a href=\"https:\/\/cloudfirst.in\/microsoft-office-365.php\" data-type=\"link\" data-id=\"https:\/\/cloudfirst.in\/microsoft-office-365.php\">Microsoft 365<\/a>, <a href=\"https:\/\/cloudfirst.in\/microsoft-azure.php\">Azure<\/a>, and every access decision in between.<\/p>\n\n\n\n<p>This guide covers the full Entra ID and Zero Trust architecture stack for Indian enterprises: Conditional Access design, Privileged Identity Management, identity lifecycle governance, Microsoft Intune endpoint management, and how each layer maps onto the DPDP Act&#8217;s requirements for reasonable security safeguards. It is written for IT admins and security leads who want to move from a basic M365 deployment to a genuinely hardened, Zero Trust identity architecture.<\/p>\n\n\n\n<p><strong>Licence note: <\/strong>Several features in this guide require Microsoft Entra ID P1 (included in M365 Business Premium and E3) or Entra ID P2 (included in M365 E5). The licence requirement is noted in each section. Microsoft&#8217;s new M365 E7 tier (launching May 2026 at approximately \u20b98,250\/user\/month) bundles the full Entra Suite, Copilot, and E5 security \u2014 relevant context for Indian enterprises approaching EA renewal.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Zero Trust Foundations: The Three Principles in Practice<\/h2>\n\n\n\n<p>Zero Trust is defined by three principles. Understanding what each one means operationally \u2014 not just conceptually \u2014 is the prerequisite for designing any implementation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Verify Explicitly<\/h3>\n\n\n\n<p>Every access request must be authenticated and authorised based on all available data points \u2014 identity, location, device health, service or workload, data classification, and anomaly detection. The fact that a user is inside the corporate network, connected to the VPN, or has authenticated once today is not sufficient. Each resource access is evaluated independently.<\/p>\n\n\n\n<p><strong>Zero Trust principle: <\/strong>In Microsoft 365, Verify Explicitly is implemented through Conditional Access policies that evaluate real-time signals \u2014 sign-in risk, device compliance, location, and MFA status \u2014 before granting access to each resource.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use Least Privilege Access<\/h3>\n\n\n\n<p>Users, services, and devices should have only the minimum access required to perform their function, for only as long as they need it. This applies to user accounts (no standing Global Admin access), service accounts (scoped API permissions rather than blanket admin roles), and external identities (time-limited guest access rather than permanent membership).<\/p>\n\n\n\n<p><strong>Zero Trust principle: <\/strong>Least privilege in M365 is implemented through role-based access control in Entra ID, Privileged Identity Management for just-in-time privileged access, and access reviews that revoke permissions that are no longer needed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Assume Breach<\/h3>\n\n\n\n<p>Design your architecture as if an attacker has already gained a foothold \u2014 because in a statistically significant proportion of enterprise environments, they have. This means limiting blast radius through network segmentation, ensuring all activity is logged and monitored, and designing for detection and response rather than just prevention.<\/p>\n\n\n\n<p><strong>Zero Trust principle: <\/strong>Assume Breach in M365 is implemented through Microsoft Defender for Identity and Defender for Office 365 (threat detection), Microsoft Sentinel or Defender XDR (SIEM and response), and unified audit logging in Microsoft Purview (forensic trail).<\/p>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>Indian enterprises are disproportionately targeted by credential-based attacks \u2014 phishing, password spraying, and business email compromise. Microsoft&#8217;s 2025 Digital Defense Report noted that Indian organisations experienced a 40% increase in identity-based attacks year-over-year. Zero Trust architecture, specifically the Verify Explicitly principle implemented through Conditional Access and MFA, is the most effective defence against these attacks. An organisation that has enforced MFA through Conditional Access eliminates over 99% of credential-based account compromises.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Conditional Access: Designing the Policy Engine<\/h2>\n\n\n\n<p>Conditional Access is the heart of Zero Trust in Microsoft 365. It is the policy engine that evaluates every access request against a set of conditions and grants, blocks, or challenges access based on the result. Getting Conditional Access design right is the single highest-leverage security investment an Indian enterprise can make in its Microsoft 365 environment.<\/p>\n\n\n\n<p>Conditional Access is available with Entra ID P1 (M365 Business Premium, E3, and above).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Signal-Decision-Enforcement Model<\/h3>\n\n\n\n<p>Conditional Access works in three stages. First, it collects signals: who is the user, what role do they have, what device are they on, is the device compliant, what is their sign-in risk score, what location are they accessing from, what application are they trying to reach? Second, it evaluates these signals against your policies. Third, it enforces the decision \u2014 grant access, block access, grant access with conditions (require MFA, require compliant device, require password change).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Building a Conditional Access Policy Stack<\/h3>\n\n\n\n<p>Do not start with a single monolithic policy. Build a stack of targeted policies, each addressing a specific risk scenario. A well-designed CA policy stack for an Indian enterprise covers these scenarios as a minimum:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Policy 1 \u2014 Require MFA for all users: <\/strong>The baseline. All users, all cloud apps, all locations. Exclude break-glass emergency accounts. This is the single most impactful security control in M365.<\/li>\n\n\n\n<li><strong>Policy 2 \u2014 Require MFA for all administrators: <\/strong>A separate, stricter policy for any user holding an admin role. Configure this to require phishing-resistant MFA (passkey or FIDO2 hardware key) rather than standard authenticator app MFA.<\/li>\n\n\n\n<li><strong>Policy 3 \u2014 Block legacy authentication: <\/strong>Block all access via legacy authentication protocols (Basic Auth, SMTP AUTH, POP3, IMAP) that bypass MFA. This eliminates credential stuffing via legacy protocol attacks.<\/li>\n\n\n\n<li><strong>Policy 4 \u2014 Require compliant device for sensitive apps: <\/strong>For SharePoint, Exchange, and Teams \u2014 require that the accessing device is enrolled in Intune and compliant with your device compliance policy. Block access from unmanaged personal devices to these applications.<\/li>\n\n\n\n<li><strong>Policy 5 \u2014 High sign-in risk requires MFA step-up: <\/strong>For sign-ins that Entra ID Protection flags as high risk (atypical location, impossible travel, known malicious IP), require immediate MFA re-authentication. Block access for users with high user risk until password is reset.<\/li>\n\n\n\n<li><strong>Policy 6 \u2014 Restrict admin console access to trusted locations: <\/strong>Microsoft 365 Admin Centre, Entra Admin Centre, and Azure portal access should be restricted to corporate IP ranges or Azure AD-joined managed devices. Admin operations from unknown locations should be blocked by default.<\/li>\n\n\n\n<li><strong>Policy 7 \u2014 Guest and external user controls: <\/strong>External users (B2B guests) should require MFA on every sign-in, cannot bypass device compliance requirements, and should be limited to specific applications (not given broad tenant access).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Policy Design Best Practices<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Always create policies in Report-Only mode first. Run for 5\u20137 days, review the What-If tool output and sign-in logs, confirm there are no unintended blocks before switching to enforcement mode.<\/li>\n\n\n\n<li>Maintain two break-glass accounts excluded from all Conditional Access policies. These are emergency-only accounts \u2014 hardware key protected, stored in a vault \u2014 used only if a policy misconfiguration locks out all other admins.<\/li>\n\n\n\n<li>Use named locations to define your corporate IP ranges, VPN egress IPs, and trusted branch office locations. Reference these in policies to differentiate on-network versus off-network access.<\/li>\n\n\n\n<li>Avoid the &#8216;All Users&#8217; and &#8216;All Cloud Apps&#8217; combination in block policies without exclusions. A policy that blocks all users from all apps with no exclusions has locked out every user in your tenant \u2014 including the admin trying to fix the mistake.<\/li>\n\n\n\n<li>Monitor Conditional Access policy impact in Entra Admin Centre \u2192 Monitoring \u2192 Sign-in logs \u2192 filter by Conditional Access status. Review weekly for unexpected blocks and policy gaps.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>Indian enterprises with hybrid work patterns \u2014 employees in offices, at home, at client sites, and traveling domestically \u2014 need named location policies that are flexible enough to not constantly block legitimate access while being strict enough to catch genuine anomalies. A practical approach: require MFA for all locations (non-negotiable), require compliant device for sensitive applications (apply to all locations), and reserve IP-based restrictions for admin console access only. This provides strong security without creating a productivity burden for highly mobile teams.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Entra ID Protection: Risk-Based Access Decisions<\/h2>\n\n\n\n<p>Entra ID Protection (formerly Azure AD Identity Protection) is a machine learning-powered risk detection engine that analyses every sign-in and user behaviour across Microsoft&#8217;s global threat intelligence network. It assigns risk scores to sign-ins and users, which Conditional Access policies can use to make real-time access decisions.<\/p>\n\n\n\n<p>Entra ID Protection is available with Entra ID P2 (M365 E5 and above).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sign-In Risk vs. User Risk<\/h3>\n\n\n\n<p><strong>Sign-in risk <\/strong>is the probability that a specific sign-in was not performed by the account owner. High sign-in risk signals include: atypical travel (sign-in from Mumbai 2 hours after a sign-in from Bangalore \u2014 physically impossible), sign-in from anonymous IP (Tor exit nodes, known proxy services), malware-linked IP addresses, and unfamiliar sign-in properties (new device, new location, new browser).<\/p>\n\n\n\n<p><strong>User risk <\/strong>is the probability that a user account itself has been compromised \u2014 based on leaked credential intelligence (Microsoft monitors the dark web for credential dumps), unusual account activity patterns, and aggregated sign-in risk events over time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configuring Risk-Based Conditional Access<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a sign-in risk policy: when sign-in risk is Medium or High, require MFA. When sign-in risk is High, block access entirely and require IT investigation before re-enabling. This is your first line of automated response to active attack attempts.<\/li>\n\n\n\n<li>Create a user risk policy: when user risk is High (indicating possible account compromise), block access and require a secure password reset before the user can sign in again. Route the high-risk user alert to your security team immediately.<\/li>\n\n\n\n<li>Review the Entra ID Protection risk report weekly: Entra Admin Centre \u2192 Protection \u2192 Risky sign-ins. Investigate any High risk sign-ins that were not automatically blocked \u2014 these represent cases where an attacker may have authenticated successfully.<\/li>\n\n\n\n<li>Enable the Risky User report alerts: configure email notifications to route to your IT security team whenever a user is flagged as High risk. Do not rely on the weekly review cycle alone \u2014 High risk user alerts should trigger same-day investigation.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>Entra ID Protection&#8217;s leaked credential detection is particularly relevant for Indian enterprises where employees frequently reuse passwords across personal and corporate accounts. When a credential dump surfaces on the dark web containing an employee&#8217;s work email and password, Entra ID Protection flags the account as High user risk before the attacker has had a chance to use it. This is one of the most underutilised security capabilities in the Microsoft E5 stack \u2014 and it requires no configuration beyond enabling the risk policies.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Privileged Identity Management: Eliminating Standing Privileged Access<\/h2>\n\n\n\n<p>Privileged Identity Management (PIM) is the feature that eliminates the single biggest identity risk in most Microsoft 365 tenants: administrators who have Global Admin or other high-privilege roles assigned permanently, 24 hours a day, 7 days a week \u2014 whether they are using those privileges or not.<\/p>\n\n\n\n<p>A permanently assigned Global Admin account is a standing high-value target. If that account is compromised \u2014 via phishing, credential stuffing, or session token theft \u2014 the attacker has immediate, unrestricted access to everything in the tenant. PIM replaces permanent role assignment with just-in-time (JIT) access: an admin must request elevation to a privileged role, provide a justification, potentially receive approval, and is granted the role for a defined time window (typically 1\u20138 hours) after which it expires automatically.<\/p>\n\n\n\n<p>PIM is available with Entra ID P2 (M365 E5 and above).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Role Assignment Models in PIM<\/h3>\n\n\n\n<p><strong>Eligible assignment <\/strong>(the PIM model): The user is eligible for the role but does not hold it. When they need elevated access, they activate the role in PIM, provide a justification, potentially receive manager or IT approval, and are granted the role for a limited time. This is the correct model for all privileged roles.<\/p>\n\n\n\n<p><strong>Active assignment <\/strong>(the traditional model): The user permanently holds the role. This should be reserved only for break-glass emergency accounts that cannot go through a PIM activation process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Implementing PIM for Microsoft 365<\/h3>\n\n\n\n<p><strong>Admin path: <\/strong><em>Entra Admin Centre \u2192 Identity Governance \u2192 Privileged Identity Management \u2192 Microsoft Entra roles \u2192 Roles.<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Start with Global Administrator. Review the current assignment list and convert all permanently assigned Global Admins to eligible assignments. The only permanent Active assignments should be 2\u20133 break-glass emergency accounts.<\/li>\n\n\n\n<li>Work through the high-priority roles in order: Global Admin \u2192 Privileged Role Administrator \u2192 Exchange Administrator \u2192 SharePoint Administrator \u2192 Security Administrator \u2192 Conditional Access Administrator.<\/li>\n\n\n\n<li>Configure role settings for each PIM role: set maximum activation duration (2\u20134 hours is appropriate for most roles), require justification on activation, require MFA on activation (even if the user already has an active MFA session), and require approval for Global Admin activation specifically.<\/li>\n\n\n\n<li>Enable PIM alerts: configure notifications for when a role is activated, when a role is assigned outside PIM (someone bypassing the process), and when a role assignment is about to expire without renewal.<\/li>\n\n\n\n<li>Conduct access reviews quarterly for all PIM-eligible role assignments. Users who have never activated a role in 90 days should have their eligibility removed \u2014 if they needed it, they would have used it.<\/li>\n<\/ul>\n\n\n\n<p><strong>\u26a0&nbsp; Watch out: <\/strong><em>PIM activation requires Entra ID P2. If you are on M365 E3, PIM is not included. Consider adding the Entra ID P2 licence for your IT admin and security team accounts specifically \u2014 you do not need P2 for all users, only for users who will hold or request privileged roles.<\/em><\/p>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>Indian enterprises where multiple IT team members share credentials (a common practice in environments that have grown organically without formal governance) must address this before implementing PIM. PIM&#8217;s audit trail and justification requirements only work when each admin has an individual account. Shared credentials make it impossible to attribute actions to a specific individual \u2014 a significant compliance gap under both the DPDP Act (which requires accountability for personal data access) and any internal audit framework.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Identity Lifecycle Governance: Joiners, Movers, and Leavers<\/h2>\n\n\n\n<p>The identity lifecycle \u2014 provisioning accounts when people join, updating them when people move between roles, and deprovisioning them when people leave \u2014 is the operational foundation of Zero Trust. No Conditional Access policy or PIM configuration compensates for accounts that exist beyond their purpose or that carry permissions from a previous role.<\/p>\n\n\n\n<p>Identity lifecycle governance in Entra ID spans three capabilities: HR-driven provisioning, access packages, and access reviews. Together they automate the joiner-mover-leaver process and ensure access is continuously right-sized to current role requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">HR-Driven Provisioning<\/h3>\n\n\n\n<p>Microsoft Entra ID supports automatic user provisioning from HR systems \u2014 SAP SuccessFactors, Workday, and any HRMS with a SCIM-compatible API. When an employee is added to the HR system, their Entra ID account is created automatically, assigned to the correct group and licence, and given the appropriate access package. When they leave, their account is automatically disabled and deprovisioned.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If your organisation uses an HRMS with a SCIM API, configure Entra ID provisioning: Entra Admin Centre \u2192 Applications \u2192 Enterprise applications \u2192 [your HRMS] \u2192 Provisioning.<\/li>\n\n\n\n<li>For Indian enterprises using local HRMS solutions (Keka, Darwinbox, greytHR) that may not have native Entra integration, configure a lightweight sync via Microsoft Logic Apps or a custom SCIM bridge.<\/li>\n\n\n\n<li>Define the attribute mapping: what fields from your HRMS (department, job title, location, cost centre) map to Entra ID attributes that drive group membership and licence assignment?<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Access Packages<\/h3>\n\n\n\n<p>Access packages (part of Entra ID Governance, available with Entra ID P2) are bundles of resources \u2014 group memberships, application access, SharePoint site access \u2014 that can be requested by users and approved by managers, with time-limited access and automatic expiry.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create access packages for common role-based access bundles: a &#8216;Finance User&#8217; package that grants access to the Finance SharePoint site, the Finance Teams channel, and the Finance group membership. A &#8216;Sales User&#8217; package that grants CRM access, Sales Shared Drive access, and the Sales distribution list.<\/li>\n\n\n\n<li>Configure access policies within each package: who can request it, who approves the request, what is the maximum access duration, and what happens when access expires (automatic removal or review required).<\/li>\n\n\n\n<li>Use access packages for external user (B2B) access: rather than giving guests direct group membership, grant them time-limited access to specific packages. When the package expires, their access is automatically removed.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Access Reviews<\/h3>\n\n\n\n<p>Access reviews are periodic automated checks that ask managers or resource owners to confirm whether their direct reports still need specific access. They are the mechanism that catches permissions accumulation \u2014 users who have changed roles but retained access from previous positions.<\/p>\n\n\n\n<p><strong>Admin path: <\/strong><em>Entra Admin Centre \u2192 Identity Governance \u2192 Access reviews \u2192 New access review.<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create quarterly access reviews for all privileged Entra ID roles: &#8216;Does this user still need the Exchange Administrator role?&#8217;<\/li>\n\n\n\n<li>Create semi-annual access reviews for high-sensitivity group memberships: Finance group, HR group, Executive group \u2014 does each current member still belong?<\/li>\n\n\n\n<li>Create annual access reviews for all guest (B2B) users in the tenant: for each external guest, a sponsor or resource owner confirms whether they still need access. Guests whose access is not confirmed are automatically removed.<\/li>\n\n\n\n<li>Configure access reviews to be self-review (user confirms their own need) or manager review, depending on the sensitivity of the resource. For privileged roles, always require manager or IT security approval \u2014 self-review is not appropriate.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>India&#8217;s IT attrition rate of approximately 25% means the mover and leaver processes in the identity lifecycle are high-frequency events in most Indian enterprises. An employee who changes roles from Sales to Product carries Sales group membership, CRM access, and Sales Shared Drive access into their new role if no mover process triggers access removal. Six months later, they have access to two departments&#8217; worth of data with no business justification. Quarterly access reviews are the scalable solution \u2014 they catch this accumulation systematically across the entire organisation.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. Microsoft Intune: Zero Trust Endpoint Management<\/h2>\n\n\n\n<p>Zero Trust&#8217;s Verify Explicitly principle requires that device health is a real-time input to every access decision. If you cannot verify that a device is enrolled, encrypted, running current OS patches, and free of detected malware, you cannot make a trustworthy access decision based on device compliance. Microsoft Intune is the device management platform that generates the device health signals that Conditional Access policies consume.<\/p>\n\n\n\n<p>Intune is included in M365 Business Premium, E3, and E5.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enrolment Strategy<\/h3>\n\n\n\n<p>Device enrolment in Intune can follow several models depending on whether devices are corporate-owned or personal (BYOD).<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Corporate Windows devices: <\/strong>Enrol via Windows Autopilot \u2014 devices are configured automatically from a blank state during first-time setup, joining Entra ID and Intune without manual IT intervention. This is the correct model for new device procurement.<\/li>\n\n\n\n<li><strong>Existing corporate Windows devices: <\/strong>Enrol via Group Policy or Configuration Manager co-management for devices already joined to on-premise Active Directory.<\/li>\n\n\n\n<li><strong>Corporate iOS and Android: <\/strong>Enrol as supervised devices via Apple Business Manager (iOS) or Android Enterprise (Android). Full device management with corporate-owned policies.<\/li>\n\n\n\n<li><strong>Personal Android (BYOD): <\/strong>Enrol as Android Enterprise Work Profile \u2014 creates an isolated work container on the personal device. Corporate apps and data are separated from personal apps. IT can wipe the work profile without touching personal data.<\/li>\n\n\n\n<li><strong>Personal iOS (BYOD): <\/strong>Use Intune App Protection Policies (MAM without enrolment) \u2014 manage only the M365 apps on the device without enrolling the device itself. Enforces copy\/paste restrictions, prevents saving to personal storage, and allows selective wipe of corporate data only.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance Policies<\/h3>\n\n\n\n<p>Compliance policies define what &#8216;compliant&#8217; means for each device type. A device that meets the compliance policy criteria generates a compliant status in Entra ID that Conditional Access policies can require for access to sensitive applications.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows compliance: require BitLocker encryption, minimum OS version, Windows Defender Antivirus active and current, no detected malware, screen lock with PIN\/password.<\/li>\n\n\n\n<li>iOS\/iPadOS compliance: require minimum OS version, device passcode, block jailbroken devices.<\/li>\n\n\n\n<li>Android compliance: require minimum OS version, device PIN, block rooted devices, require Google Play Protect.<\/li>\n<\/ul>\n\n\n\n<p><strong>Admin path: <\/strong><em>Intune Admin Centre (endpoint.microsoft.com) \u2192 Devices \u2192 Compliance policies \u2192 Create policy. Select platform \u2192 configure requirements \u2192 assign to All Devices or specific groups.<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configuration Profiles<\/h3>\n\n\n\n<p>Configuration profiles push security settings to enrolled devices \u2014 enforcing settings that users cannot change, regardless of their preferences.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows: configure BitLocker encryption (if not already enabled), Windows Update for Business (enforce patch deadlines), Windows Defender settings, and disable USB mass storage for devices accessing sensitive data.<\/li>\n\n\n\n<li>iOS\/Android: configure Wi-Fi and VPN profiles, email account configuration (Exchange ActiveSync or modern auth), and app restrictions.<\/li>\n\n\n\n<li>Deploy the Microsoft Tunnel VPN configuration via Intune for devices that need access to on-premise resources \u2014 this provides a managed, per-app VPN that routes only corporate traffic through the tunnel.<\/li>\n<\/ul>\n\n\n\n<p><strong>\ud83c\uddee\ud83c\uddf3&nbsp; India Context: <\/strong><em>Indian enterprises managing a mix of corporate devices and personal BYOD devices face a practical challenge: enforcing Intune enrolment for BYOD will encounter user resistance, particularly from senior employees and contractors who do not want IT management on their personal phones. The Android Work Profile and iOS MAM (App Protection Policy) models solve this \u2014 they give IT the control it needs (selective wipe, copy\/paste restrictions, data isolation) without giving IT visibility into personal apps, photos, or data. Communicating this distinction to users before rolling out BYOD management significantly reduces resistance.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">7. DPDP Act Alignment in Your Zero Trust Architecture<\/h2>\n\n\n\n<p>The Digital Personal Data Protection Act creates security requirements that map directly onto the Zero Trust architecture components in this guide. This section maps each DPDP obligation to the specific Entra ID and M365 control that addresses it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reasonable Security Safeguards \u2014 Section 8(5) DPDP Act<\/h3>\n\n\n\n<p>The DPDP Act requires Data Fiduciaries to implement reasonable security safeguards to prevent personal data breaches. The following controls together constitute a defensible &#8216;reasonable safeguards&#8217; posture for personal data processed in Microsoft 365:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>MFA enforced via Conditional Access for all users \u2014 addresses credential-based account compromise, the leading cause of personal data breaches in cloud environments.<\/li>\n\n\n\n<li>Device compliance required for access to personal data repositories (SharePoint HR site, Exchange mailboxes containing customer data) \u2014 ensures personal data is only accessed from managed, secured devices.<\/li>\n\n\n\n<li>Entra ID Protection with High user risk blocking \u2014 automated response to compromised credential indicators, reducing the window between credential compromise and account takeover.<\/li>\n\n\n\n<li>Microsoft Purview audit logging enabled with 180-day retention \u2014 provides the forensic trail for incident investigation and meets CERT-In&#8217;s log retention requirement.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Data Breach Notification \u2014 Expected 72-Hour Standard<\/h3>\n\n\n\n<p>The DPDP Act is expected to require notification to the Data Protection Board within 72 hours of becoming aware of a personal data breach. Your Zero Trust architecture should support breach detection, containment, and notification within this window.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure Entra ID Protection high-risk user alerts to route to your incident response team immediately \u2014 not in the weekly report cycle.<\/li>\n\n\n\n<li>Configure Microsoft Defender for Office 365 alerts for phishing email delivery, malware detection, and suspicious inbox rule creation (a common post-compromise persistence technique) to trigger immediate SOC review.<\/li>\n\n\n\n<li>Document a breach notification runbook that maps from incident detection to DPDP notification \u2014 who makes the determination, what evidence is collected, and what is the notification process. This runbook should be tested annually.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Data Processor Obligations \u2014 Microsoft as Data Processor<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Accept Microsoft&#8217;s Data Processing Amendment in the M365 Admin Centre: Admin Centre \u2192 Billing \u2192 Your Products \u2192 Microsoft 365 \u2192 Data Protection. This formalises Microsoft&#8217;s Data Processor obligations under DPDP.<\/li>\n\n\n\n<li>Review Microsoft&#8217;s sub-processor list (available in the Microsoft Trust Centre) annually \u2014 the DPDP Act requires Data Fiduciaries to maintain oversight of their Data Processors&#8217; sub-processor relationships.<\/li>\n\n\n\n<li>For Entra ID specifically: Microsoft processes identity data (usernames, authentication events, risk signals) as part of the Entra ID service. This processing is covered by the DPA. Ensure your privacy notice discloses identity data processing via Microsoft Entra.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Implementation Roadmap: Zero Trust Maturity Phases<\/h2>\n\n\n\n<p>Zero Trust is not a project \u2014 it is a maturity progression. The following phased roadmap structures the implementation in order of impact and prerequisite dependencies.<\/p>\n\n\n\n<p><strong>PHASE 1 \u2014 IDENTITY BASELINE (MONTH 1)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enable Security Defaults or create baseline Conditional Access policies (require MFA for all users, block legacy authentication)<\/li>\n\n\n\n<li>Reduce Global Admin accounts to 2\u20133 break-glass accounts; convert all others to eligible assignments in PIM<\/li>\n\n\n\n<li>Enable Entra ID Protection risk policies: block High sign-in risk, block High user risk<\/li>\n\n\n\n<li>Enable unified audit logging in Microsoft Purview<\/li>\n\n\n\n<li>Accept Microsoft&#8217;s Data Processing Amendment<\/li>\n<\/ul>\n\n\n\n<p><strong>PHASE 2 \u2014 DEVICE TRUST (MONTH 2\u20133)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deploy Microsoft Intune and enrol all corporate Windows devices via Autopilot or Group Policy<\/li>\n\n\n\n<li>Configure compliance policies for Windows, iOS, and Android<\/li>\n\n\n\n<li>Deploy App Protection Policies for BYOD iOS and Android devices<\/li>\n\n\n\n<li>Create Conditional Access policy requiring compliant device for SharePoint and Exchange<\/li>\n\n\n\n<li>Deploy Endpoint Verification and enable device-based Conditional Access<\/li>\n<\/ul>\n\n\n\n<p><strong>PHASE 3 \u2014 IDENTITY GOVERNANCE (MONTH 3\u20134)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configure access reviews for all privileged roles (quarterly) and all guest users (annual)<\/li>\n\n\n\n<li>Create access packages for the 5 most common role-based access bundles<\/li>\n\n\n\n<li>Enable HR-driven provisioning if your HRMS supports SCIM<\/li>\n\n\n\n<li>Implement PIM for all remaining privileged roles beyond Global Admin<\/li>\n\n\n\n<li>Configure named locations and refine Conditional Access policies for location-based controls<\/li>\n<\/ul>\n\n\n\n<p><strong>PHASE 4 \u2014 CONTINUOUS IMPROVEMENT (ONGOING)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review Conditional Access policy impact monthly in sign-in logs<\/li>\n\n\n\n<li>Review Entra ID Protection risky sign-in and risky user reports weekly<\/li>\n\n\n\n<li>Conduct PIM access reviews quarterly; remove eligible assignments for roles not activated in 90 days<\/li>\n\n\n\n<li>Run access reviews for all high-sensitivity group memberships semi-annually<\/li>\n\n\n\n<li>Review Secure Score monthly and action the top 3 recommendations<\/li>\n\n\n\n<li>Conduct annual tabletop exercise simulating a high-risk identity incident<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Identity Is the New Perimeter<\/h2>\n\n\n\n<p>The shift to Zero Trust is fundamentally a shift in how you think about trust. The old model trusted the network \u2014 anyone inside the firewall was assumed safe. The new model trusts the identity \u2014 but only after continuously verifying it against device health, location, behaviour, and risk signals.<\/p>\n\n\n\n<p>Microsoft Entra ID, Conditional Access, PIM, Identity Protection, Intune, and identity governance are the components of that new trust model. None of them is individually sufficient. A Conditional Access policy that requires MFA but does not check device compliance can still be satisfied by an attacker using a compromised credential from a malware-infected unmanaged device. The architecture works when the components work together \u2014 each layer reducing the attack surface that the previous layer does not fully close.<\/p>\n\n\n\n<p>For Indian enterprises, the urgency of this architecture is compounded by three factors that are specific to the Indian context: the country&#8217;s elevated identity attack surface, the DPDP Act&#8217;s explicit requirement for reasonable security safeguards, and the hybrid-work patterns that make network-based perimeter security particularly ineffective. An identity that can be stolen from anywhere must be protected by controls that work everywhere.<\/p>\n\n\n\n<p>The implementation roadmap in this guide structures the work into four phases. Phase 1 \u2014 identity baseline \u2014 can be completed in 30 days and closes the majority of the risk. Each subsequent phase adds depth rather than correcting fundamentals. Start with Phase 1 this week. The question is not whether your organisation will face an identity-based attack \u2014 the data makes clear that it will. The question is whether your architecture is ready for it when it comes.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditional network security was built on a simple assumption: trust everything inside the corporate perimeter, block everything outside it. That assumption collapsed the moment corporate data moved to the cloud,&hellip;<\/p>\n","protected":false},"author":1,"featured_media":793,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123,93],"tags":[],"class_list":["post-792","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-cloud","category-office-365"],"_links":{"self":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts\/792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/comments?post=792"}],"version-history":[{"count":1,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts\/792\/revisions"}],"predecessor-version":[{"id":794,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/posts\/792\/revisions\/794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/media\/793"}],"wp:attachment":[{"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/media?parent=792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/categories?post=792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudfirst.in\/insight\/wp-json\/wp\/v2\/tags?post=792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}