Do your Conditional Access policies actually protect you?
Conditional Access is often the most consequential identity control in a Microsoft environment. Policies that look correct can have exclusions, or control gaps that leave accounts exposed.
Are your Conditional Access policies working as intended?
Conditional Access is your primary Zero Trust policy engine, yet most organisations underestimate its complexity. What starts as a handful of policies quickly grows into a layered set of rules, exclusions, and dependencies that interact in ways that are difficult to predict. Without deliberate structure, policies can conflict, leave gaps, or be bypassed entirely. We review your Conditional Access configuration and report on its current state, identifying where your defence in depth is holding and where it is not. For organisations that want to go further, our Conditional Access Policy testing toolkit can simulate identity, device, and network signals to validate your policies end-to-end.

What a well-architected CA framework looks like
Every review is measured against what we consider the gold standard for Conditional Access. These are the principles we aim to achieve for every organisation.
Enables the business, never blocks it
Every vector is covered
Structured, measurable, and repeatable
of Conditional Access environments we review have at least one critical misconfiguration in exclusion group management
What we review
A technical review that goes beyond policy count to coverage, enforcement, and risk.
- Policy coverage across all user populations (members, guests, external users, service accounts)
- Exclusion groups (a common and underestimated attack vector)
- Device identity and compliance posture (managed devices, hybrid join, Intune compliance)
- Edge device and shared device challenges (Surface Hubs, Teams Phones, Microsoft Defender App, Azure AVDs)
- Lateral movement analysis across identity and device trust boundaries
- Identity at the perimeter (how Conditional Access enforces Zero Trust at every access point)
- Sign-in risk and user risk policy configuration
- MFA strength requirements and authentication method policy
- Named locations and trusted IP configuration
- Break-glass account access and emergency access design
- Report-only vs enforcement mode (many policies left in report-only indefinitely)
- Session controls (token lifetime, sign-in frequency, persistent browser)
The exclusion problem
Exclusion groups in Conditional Access policies are a significant security risk. Groups grow over time, often without regular review. Accounts accumulate in exclusion groups for troubleshooting reasons and are never removed.
An attacker who compromises an account in an exclusion group bypasses the policies that group is excluded from, regardless of how well those policies are otherwise configured. We review every exclusion group in every policy and assess the risk of each exclusion.
What we commonly find
Patterns we see repeatedly across Conditional Access reviews in Australian organisations.
Overprivileged exclusions
Stale legacy policies
MFA and device trust gaps
Break-glass without monitoring
Overly permissive MAM policies
Lack of controls for administrators
What you receive
A findings report you can act on, not a compliance checklist.
- Complete policy inventory and documentation
- Gap analysis against your preferred framework (NIST, ISM, ASD Essential Eight, SOCI)
- Risk-ranked findings (Critical, High, Medium, Low)
- Remediation recommendations for each finding
- Reference policy framework aligned to your requirements
- Full visibility on your current state and policy posture
- High-level CISO briefing deck explaining your current risk

Common questions
Find out what your Conditional Access policies are actually doing
A one-week review can surface years of policy drift.
