Skip to content

Portfolio of Identity Engineering projects for Microsoft Entra ID. Focus on Automation (Graph API), Zero Trust Architecture, and Governance (PIM/Entitlement Management). SC-300 Aligned.

Notifications You must be signed in to change notification settings

Jaasuni/Entra_Identity_Engineering

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Entra Identity Engineering Portfolio

Repository Owner: Jason Wiggins
Role: Senior Identity & Endpoint Security Engineer
Focus: Zero Trust Architecture, Automated Governance, and Disaster Recovery.

🌟 Project Overview

This repository contains production-ready Infrastructure-as-Code (IaC) artifacts for managing Microsoft Entra ID (formerly Azure AD). It demonstrates a "Security-First" approach to identity management, moving away from manual portal clicks to automated, version-controlled configurations.


📂 Repository Contents & Projects

1. Disaster Recovery & Automation

2. Zero Trust Identity Perimeter

  • Objective: Complete design and implementation of a resilient identity perimeter.
  • Documentation: Zero-Trust-Architecture.md
  • Status: Deployed (Report-Only Mode).

3. Identity Governance (JIT Access)

  • Objective: Implementation of Least Privilege using Privileged Identity Management (PIM).
  • Documentation: Identity-Governance-PIM.md
  • Feature: Just-In-Time (JIT) activation for administrative roles with audit trails.

4. Guest Lifecycle Management (B2B)

  • Objective: Automated governance for external vendors to prevent "Guest Sprawl."
  • Documentation: Identity-Governance-B2B.md
  • Tech: Entitlement Management, Access Packages, Self-Service Approvals.

5. Workload Identity & API Security

6. Advanced Authentication Architecture

  • Objective: Prevention of AiTM (Adversary-in-the-Middle) attacks on administrative identities.
  • Documentation: Phishing-Resistant-MFA.md
  • Tech: Conditional Access Authentication Strengths, FIDO2/Passkeys, Graph API.

🛡️ Deep Dive: Zero Trust Identity Perimeter Implementation

1. Executive Summary

This project established a resilient identity perimeter for an M365 tenant, aligning with Microsoft Zero Trust principles ("Verify Explicitly"). The implementation enforces phishing-resistant authentication for high-privilege roles while mitigating the risk of tenant lockout through a redundant emergency access strategy.

2. Architecture & Configuration

2.1 Emergency Access ("Break Glass") Strategy

Objective: Ensure tenant recovery capabilities during identity service outages.

  • Accounts: 2x Cloud-only accounts (svc-backup01...) provisioning via PIM.
  • Role Assignment: Global Administrator (Active/Permanent).
  • Authentication: FIDO2 Security Keys (Hardware-bound).
  • Exclusion Logic: Managed via security group Sec-BreakGlass-Exclusion.

2.2 Network Perimeter (Geo-Blocking)

Objective: Reduce attack surface by restricting authentication attempts to trusted geographies.

  • Policy: Block-Untrusted-Locations
  • Conditions: Block access from high-risk regions; Allow Corporate HQ (1.2.3.4/32).
  • Safety Mode: Report-Only.

2.3 Phishing-Resistant Administration

Objective: Mitigate "MFA Fatigue" and "Adversary-in-the-Middle" (AiTM) attacks.

  • Policy: CA-002-RequirePhishingResistant-Admins
  • Grant Control: Require Phishing-Resistant MFA (FIDO2 / CBA).
  • Target Roles: Global Admin, Security Admin.

3. Feature Showcase: Phishing-Resistant MFA

This module demonstrates the transition from standard MFA (Push Notifications) to high-assurance credentials to stop modern identity attacks.

3.1 Infrastructure as Code

The policy configuration was exported via Microsoft Graph to ensure version control and disaster recovery capability.

3.2 Automated Validation

Policy enforcement state is verified programmatically using the Microsoft Graph PowerShell SDK to prevent configuration drift.

3.3 Validation & Auditing

Evidence of secure deployment state (Report-Only) and successful API connection.

Zero_Trust_Policies png Graph_API_Audit png

About

Portfolio of Identity Engineering projects for Microsoft Entra ID. Focus on Automation (Graph API), Zero Trust Architecture, and Governance (PIM/Entitlement Management). SC-300 Aligned.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published