An Azure AD Conditional Access Policy to block CorpServiceAccounts accessing applications outside of Office 365 and Microsoft Azure Management.

Suggested name:
CA8{XX}-CorpServiceAccounts-AttackSurfaceReduction-AllApps-ExceptO365AndAzure-Block

Assignments

Users

Users and groups  
Include users CA-Persona-CorpServiceAccounts
Exclude users Break-glass (emergency access) accounts

Cloud apps or actions

Cloud apps  
Include All cloud apps
Exclude
  • Office 365
  • Microsoft Azure Management

Access controls

Block Access
No additional control selection

References

https://learn.microsoft.com/en-us/azure/architecture/guide/security/conditional-access-architecture https://learn.microsoft.com/en-us/azure/architecture/guide/security/conditional-access-framework https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/concept-conditional-access-policy-common