Never Trust, Always Verify: Analysis of Zero Trust Best Practices for Conditional Access

This study examines the effectiveness of Microsoft Entra's Conditional Access policies in thwarting adversarial bypass attempts, particularly in light of vulnerabilities exposed by recent high-profile breaches, such as those involving the Lapsus$ hacking group.
By
Glenn Andal
September 26, 2024

All papers are copyrighted. No re-posting of papers is permitted

470x382_Research_Paper_gray.jpg