Back to Browse

Security Framework Compliance: Conditional Access Policies

61 views
Dec 14, 2025
33:47

Conditional Access & Compliance: Essential Eight Meets ISO27001, NIST & SMB1001 In this deep dive, we explore how Conditional Access policies in Microsoft 365 can be strategically aligned with the Essential Eight mitigation strategies while also mapping across global compliance frameworks like ISO27001, NIST, and SMB1001. ✅ Learn how to: - Set up MFA policies, including phishing-resistant configurations - Implement MAM (Mobile Application Management) for secure access - Configure User Risk and Sign-in Risk policies - Decode the language of compliance across frameworks and see how they overlap in practical terms Whether you're an IT admin, security architect, or compliance lead, this video shows how to turn Conditional Access into a powerful tool for cyber resilience and regulatory alignment. Perfect for organisations using Microsoft 365 Business Premium or higher and aiming to meet Essential Eight maturity levels while staying audit-ready across multiple standards. Introduction - 00:00 MFA Overview - 00:45 Frameworks - 01:52 MFA M1 Policy - 07:00 MFA M2-3 Policy - 12:43 CA Admin Policy - 15:12 User and Sign in Risk Policy - 20:06 MAM (Mobile Application Manager) - 24:18 Outro - 32:04 Essential 8 Controls - https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping NIST Framework - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-4.pdf Microsoft E8 MFA M1 - https://learn.microsoft.com/en-us/compliance/anz/e8-mfa-maturity-level-1 Microsoft E8 MFA M2 - https://learn.microsoft.com/en-us/compliance/anz/e8-mfa-maturity-level-2 #Microsoft #Essential8 #cybersecurity #nist #microsoft365

Download

0 formats

No download links available.

Security Framework Compliance: Conditional Access Policies | NatokHD