Microsoft Entra customer considerations under DORA
Note
This information is not legal, financial, or professional advice and shouldn't be viewed as a complete statement of, nor the actions necessary to comply with, the requirements of the law. It is provided for informational purposes only.
The Digital Operational Resilience Act (DORA) is a regulatory framework established by the European Union, aimed at fortifying the operational resilience of the financial services sector amidst the rapidly evolving landscape of Information and Communication Technology (ICT) risks. Regulated entities can consider incorporating Microsoft Entra features and capabilities into their frameworks, policies, and plans to align with certain requirements under DORA.
While Microsoft Entra ID offers controls that can help meet certain DORA requirements and provides modern identity and access management (IAM) capabilities, relying solely on an IAM platform isn't sufficient for protecting financial entity data. It's important to review this article and all DORA requirements to establish a comprehensive digital operational resilience program. For official DORA resources, visit the official European Insurance and Occupational Pensions Authority website.
Microsoft Entra and DORA
Microsoft Entra, consisting of Microsoft Entra ID (formerly Azure Active Directory) and other Microsoft Entra capabilities is an enterprise identity service that can help secure applications, systems, and resources in support of DORA compliance efforts. Microsoft Entra ID underpins Microsoft enterprise offerings such as Microsoft 365, Azure, and Dynamics 365, improves overall security and identity protection and can play a crucial role in aligning with the broader ICT risk management requirements under DORA.
Regulated entities can consider incorporating Microsoft Entra capabilities into their frameworks, policies, and plans to align with certain requirements under DORA:
- ICT risk management framework
- ICT business continuity policy
- ICT response and recovery plans
Each of the aforementioned items may encompass various strategies, policies, procedures, ICT protocols, and tools that financial entities are required to implement. The above list shouldn't be considered exhaustive.
Further, an internal governance and control framework that ensures effective and prudent management of ICT risk is critical to mitigating the risks that DORA seeks to address. Where such a framework is supported through use of Microsoft Entra controls, there should be regular evaluation of the controls and other risk mitigations for the supported workloads, with particular attention to those that are integral to the delivery of financial services.
Microsoft Entra guidance for customers in scope of DORA
Microsoft Entra's geographically distributed architecture combines extensive monitoring, automated rerouting, failover, and recovery capabilities to deliver continuous high availability and performance. Microsoft also takes a comprehensive approach to security incident management, supplier management, and vulnerability management.
Microsoft Entra ID functionality may assist financial entities in meeting their DORA compliance obligations. The following table outlines Microsoft features, capabilities, and service offerings along with related guidance and a nonexhaustive list of examples of DORA articles for consideration as part of a comprehensive digital operational resilience program.
The articles referenced in the table below provide guidance to financial entities on how Microsoft Entra ID can be configured and operationalized in a way to promote effective Identity and Access Management (IAM) best practices as part of their DORA compliance obligations.
Note
For brevity, we have referred to the RTS on ICT risk management framework and on simplified ICT risk management framework (Ref. JC 2023 86) as “RTS on ICT risk management frameworks”.
Microsoft feature, capability or service offering | Guidance for customer consideration | Example DORA articles for customer consideration |
---|---|---|
Multiple Microsoft Entra ID capabilities enable organizations to build resilience into identity and access management. | Financial entities can enhance resilience in systems protected by Microsoft Entra ID, by following the recommendations included and referenced in the following article: |
DORA Act:
|
Microsoft Entra Backup Authentication system | Financial Entities can consider the Microsoft Entra backup authentication system, which increases authentication resilience if there's an outage. Financial entities can take steps to help ensure that users can authenticate using the backup authentication system in the event of an outage, such as:
|
DORA Act:
|
Microsoft Entra Continuous Access Evaluation | Financial entities can consider usage of Continuous Access Evaluation (CAE), which allows Microsoft Entra ID to issue longer-lived tokens while enabling applications to revoke access and force reauthentication only when needed. The net result of this pattern is fewer calls to acquire tokens, which means that the end-to-end flow is more resilient. To use CAE, both the service and the client must be CAE-capable. Therefore, financial entities can consider these implementation steps to update code to use CAE-enabled APIs, ensure that compatible versions of Microsoft Office native applications are used and optimize reauthentication prompts. |
DORA Act:
|
Microsoft hybrid authentication architecture options | Financial entities that require a hybrid authentication architecture can consider the resilience of mechanisms for hybrid authentication, including on-premises dependencies and potential points of failure.
|
DORA Act:
|
Multiple Microsoft Entra ID capabilities enable organizations to tighten their tenant security posture. | Financial entities can deploy critical recommended actions:
|
DORA Act:
|
Single sign-on (SSO) for enterprise applications in Microsoft Entra ID helps assure the benefits of credential policies, threat detection, auditing, logging, and other features add to those applications. | Financial entities can configure applications to use Microsoft Entra ID as their identity provider in order to benefit from credential policies, threat detection, auditing, logging, and other features that can help to adequately protect and monitor applications. Follow application management recommendations to help ensure that applications are secured, governed, monitored, and cleaned up. |
DORA Act:
RTS on ICT risk management frameworks:
|
Multifactor authentication in Microsoft Entra ID requires two or more authentication methods to increase security. | Financial entities can implement multifactor authentication (MFA) in Microsoft Entra ID to help substantially reduce the risk of unauthorized access and ensure the security of ICT systems:
|
DORA Act:
RTS on ICT risk management frameworks:
|
Conditional Access in Microsoft Entra ID is Microsoft's Zero Trust policy engine taking signals from various sources into account when enforcing policy decisions. | Financial entities can implement the following controls within Conditional Access, for all users:
We also recommend that financial entities review and consider recommended policies in our Conditional Access deployment guidance. Implementing the above controls for privileged accounts can be considered a critical requirement, as these accounts can have a severe impact to the security and functioning of Microsoft Entra ID. |
DORA Act:
RTS on ICT risk management frameworks:
|
Privileged Identity Management (PIM) is a service in Microsoft Entra ID that enables you to manage, control, and monitor access to important resources in your organization. | Robust security controls can be implemented for privileged roles to help prevent accidental or malicious Microsoft Entra ID availability, misconfiguration and/or data loss:
|
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft Entra ID provides role-based access controls (RBAC), including both built-in roles and custom roles. | Financial entities can follow the principle of least privilege to limit access to what is required for legitimate and approved functions and activities, helping to minimize the potential impact of a security breach. As part of a least privilege strategy, we recommend financial entities follow best practices for Microsoft Entra roles. |
DORA Act:
RTS on ICT risk management frameworks:
|
Protected actions in Microsoft Entra ID are permissions that have been assigned Conditional Access policies. When a user attempts to perform a protected action, they must first satisfy the Conditional Access policies assigned to the required permissions. | To help increase the number of administrative actions that are within the scope of protected actions and reduce the risk of tenant lockout, follow best practices for protected actions in Microsoft Entra ID. To help protect against accidental or malicious hard deletions of some soft-deleted directory objects from the recycle bin and permanent data loss, you can add a protected action for the following permission: Microsoft.directory/deletedItems/delete This deletion applies to users, Microsoft 365 groups, and applications. |
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft Entra ID supports numerous activity log integration options for storage or analysis, to help meet troubleshooting, long-term storage or monitoring goals. | Financial entities can select and implement an activity log integration approach that enables continuous analysis and monitoring, and a sufficient data retention period:
|
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft Identity Secure Score indicates how aligned an organization is with certain Microsoft recommendations for security. | Financial entities can regularly review Microsoft Identity Secure Score to measure and track identity security posture and plan identity security improvements. Microsoft also offers numerous services – such as the Microsoft Zero Trust Workshop that can help organizations assess their Microsoft Entra tenant security posture, as detailed elsewhere in this table. |
DORA Act:
RTS on ICT risk management frameworks:
|
The Microsoft Entra recommendations feature helps to ensure tenant security and health via monitoring and email alerting. | Financial entities can check Microsoft Entra recommendations regularly to ensure awareness of any new recommendations as these can help identify opportunities to implement best practices and optimize configurations for Microsoft Entra ID-related features. | DORA Act:
RTS on ICT risk management frameworks:
|
Azure Workbooks for Microsoft Entra ID provides a visual representation of tenant data, enabling querying and visualization for a number of identity management scenarios. | Financial entities can select and regularly review workbook templates in Microsoft Entra ID that can help monitor the security and functioning of relevant Microsoft Entra ID use-cases. As examples of current Microsoft Entra public workbook templates that may help:
|
DORA Act:
|
Microsoft Graph provides API-based access to Microsoft Entra ID and a number of Microsoft 365 services. | To help reduce the attack surface of an application and the impact of a security breach, financial entities can follow the principle of least privilege when building, assigning access to and auditing Microsoft identity platform-integrated application. | DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft365DSC enable automated tenant configuration management. Microsoft365DSC supports certain Microsoft Entra ID configurations. | To record certain Microsoft Entra ID configuration settings and track changes, financial entities can consider automated configuration management tools such as Microsoft365DSC. Manual documentation may be required for any configuration settings that aren't available via API. |
DORA Act:
|
Microsoft Entra ID Protection helps organizations detect, investigate, and remediate identity-based risks. | To help detect, investigate and remediate identity-based risks (including anomalous activities), financial entities can consider a service such as Microsoft Entra ID Protection. Financial entities deploying Microsoft Entra ID Protection can integrate the service with Conditional Access in Microsoft Entra ID for automated remediation, and Security Information and Event Management (SIEM) tools such as Microsoft Sentinel for archive, further investigation, and correlation. Both human and workload identities can be within the scope of these protections. We recommend that enterprise defense tools are used to coordinate detection, prevention, investigation, and response. For example, Microsoft Defender XDR helps security teams protect and detect their organizations by using information from other Microsoft security products, including Microsoft Entra ID Protection. |
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft Entra ID recoverability features including soft delete and Microsoft Graph APIs for many different resource types (example: Conditional Access Graph APIs). | Financial entities can incorporate recoverability best practices into recovery procedures and ICT business continuity tests (or similar activities), including but not limited to:
The frequency of the above steps can be determined by the financial entity based on the criticality of information held within Microsoft Entra ID, considering any timeframes specified by DORA. |
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft resources that provide information and training resources related to vulnerabilities, cyber threats, ICT-related incidents, and security-related product functionality. | Financial entities can routinely review, track, and act upon these resources provided by Microsoft related to vulnerabilities and cyber threats that may include: Financial entities can develop ICT security awareness programmes that incorporate Microsoft Entra ID training for relevant staff that may include:
Note that some of the above resources cover a range of Microsoft Security products and technologies. They aren't limited to Microsoft Entra. |
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft Entra ID Governance is an identity governance solution that enables organizations to improve productivity, strengthen security and more easily meet compliance and regulatory requirements. | Financial entities can consider the deployment of an Identity Governance solution to control access management rights. Microsoft Entra ID Governance includes the following capabilities that can help apply the principle of least privilege to Microsoft Entra ID-protected resources:
|
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft resources that provide guidance related to Microsoft Entra ID security operations and incident response. | Financial entities can review and consider operationalizing Microsoft Entra ID security operations and incident response guidance, including but not limited to:
|
DORA Act:
|
Resources that provide information related to (and potentially related to) Microsoft Entra ID availability | Financial entities can routinely review, track, and consider information included in these articles and sites:
Note that some of the above resources cover a range of Microsoft Security products and technologies. They aren't limited to Microsoft Entra. |
DORA Act:
RTS on ICT risk management frameworks:
|
Microsoft service offerings that can help organizations assess their Microsoft Entra tenant security posture as part of digital operational resilience testing | The digital operational resilience testing program deployed by a financial entity may comprise a number of assessments, tools, and methodologies, including but not limited to:
Financial entities can regularly perform such assessments, at a frequency in line with current DORA requirements. |
DORA Act:
|
Resources that provide information related to Microsoft Entra changes | Financial entities can routinely track and consider information included in the articles and sites below. Actions taken by financial entities may include, for example, regression testing and updates to digital operational resilience-related processes and tests.
|
DORA Act:
RTS on ICT risk management frameworks:
|
Resources that provide information related to Penetration Testing and Microsoft Entra ID | Financial entities wishing to perform penetration tests against their Microsoft Cloud may consider the rules of engagement listed in this article: Financial entities may consider the above rules of engagements within the context of this European Supervisory Authorities (ESA) report:
|
DORA Act:
RTS on ICT risk management frameworks:
|
Resources related to the enablement, enforcement, and management of encryption and cryptographic controls when transmitting data to or from Microsoft Entra ID. | For security reasons, Microsoft Entra ID will soon stop supporting Transport Layer Security (TLS) protocols and ciphers prior to TLS 1.2 and is rolling out support for TLS 1.3. Financial entities may consider the following steps to help ensure usage and management of suitable encryption and cryptographic controls:
|
RTS on ICT risk management frameworks:
RTS on ICT risk management frameworks:
|
Resources related to Microsoft Entra ID capacity and performance characteristics | Financial entities may consider reviewing and keeping track of the following documentation to understand certain Microsoft Entra ID capacity and performance characteristics:
|
RTS on ICT risk management frameworks:
RTS on ICT risk management frameworks:
|
Global Secure Access is Microsoft Security Service Microsoft Edge (SSE) solution | Financial Services can implement controls to protect access to public internet and private networks using Global Secure Access | RTS on ICT risk management frameworks:
|
Resources related to acquisition, development, and maintenance of applications | Financial Services may include the following aspects as part of acquiring, or building new applications:
|
RTS on ICT risk management frameworks:
|