feat(m365): add entra_conditional_access_policy_block_elevated_insider_risk security check#10234
Merged
danibarranqueroo merged 11 commits intomasterfrom Mar 30, 2026
Conversation
…r_risk security check Add new security check entra_conditional_access_policy_block_elevated_insider_risk for m365 provider. Includes check implementation, metadata, and unit tests.
Contributor
|
✅ All necessary |
39ba037 to
dccfcf2
Compare
Contributor
|
✅ Conflict Markers Resolved All conflict markers have been successfully resolved in this pull request. |
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## master #10234 +/- ##
===========================================
+ Coverage 66.14% 87.90% +21.76%
===========================================
Files 105 123 +18
Lines 7029 5176 -1853
===========================================
- Hits 4649 4550 -99
+ Misses 2380 626 -1754
Flags with carried forward coverage won't be shown. Click here to find out more.
🚀 New features to boost your workflow:
|
Contributor
🔒 Container Security ScanImage: 📊 Vulnerability Summary
4 package(s) affected
|
…-policy-block-elevated-insider-risk
danibarranqueroo
approved these changes
Mar 30, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Context
Users flagged with an elevated insider risk by Microsoft Purview Adaptive Protection may be compromised or acting maliciously. Without a Conditional Access policy that blocks their access, these high-risk insiders retain full access to all cloud applications, enabling data exfiltration, unauthorized modifications, and lateral movement across the organization's environment.
Description
This check verifies that at least one enabled Conditional Access policy blocks access to all cloud applications for users with an elevated insider risk level (as classified by Microsoft Purview Insider Risk Management). The check evaluates each CA policy for the correct combination of target scope (
Allcloud apps), insider risk condition (elevated), and grant control (block). Policies in report-only mode are flagged as non-compliant. Remediation involves creating a CA policy in the Entra admin center that blocks access for elevated-risk users across all cloud apps, with Adaptive Protection configured in Microsoft Purview.Steps to review
prowler/providers/m365/services/entra/entra_conditional_access_policy_block_elevated_insider_risk/prowler/compliance/m365/to ensure the check is correctly mapped to relevant requirementspoetry run pytest tests/providers/m365/services/entra/entra_conditional_access_policy_block_elevated_insider_risk/ -vRelated Issues
https://prowlerpro.atlassian.net/browse/PROWLER-1150
Checklist
Community Checklist
SDK/CLI
License
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.