Do your Conditional Access policies actually protect you?
Conditional Access is often the most consequential identity control in a Microsoft environment. Policies that look correct can have exclusions, or control gaps that leave accounts exposed.
Are your Conditional Access policies working as intended?
Conditional Access is your primary Zero Trust policy engine, yet most organisations underestimate its complexity. What starts as a handful of policies quickly grows into a layered set of rules, exclusions, and dependencies that interact in ways that are difficult to predict. Without deliberate structure, policies can conflict, leave gaps, or be bypassed entirely. We review your Conditional Access configuration and report on its current state, identifying where your defence in depth is holding and where it is not. For organisations that want to go further, our Conditional Access Policy testing toolkit can simulate identity, device, and network signals to validate your policies end-to-end.

What a well-architected CA framework looks like
Every review is measured against what we consider the gold standard for Conditional Access. These are the principles we aim to achieve for every organisation.
Enables the business, never blocks it
Every vector is covered
Structured, measurable, and repeatable

of Conditional Access environments we review have at least one critical misconfiguration in exclusion group management
What we review
A technical review that goes beyond policy count to coverage, enforcement, and risk.
- Policy coverage across all user populations (members, guests, external users, service accounts)
- Exclusion groups (a common and underestimated attack vector)
- Device identity and compliance posture (managed devices, hybrid join, Intune compliance)
- Edge device and shared device challenges (Surface Hubs, Teams Phones, Microsoft Defender App, Azure AVDs)
- Lateral movement analysis across identity and device trust boundaries
- Identity at the perimeter (how Conditional Access enforces Zero Trust at every access point)
- Sign-in risk and user risk policy configuration
- MFA strength requirements and authentication method policy
- Named locations and trusted IP configuration
- Break-glass account access and emergency access design
- Report-only vs enforcement mode (many policies left in report-only indefinitely)
- Session controls (token lifetime, sign-in frequency, persistent browser)
The exclusion problem
Exclusion groups in Conditional Access policies are a significant security risk. Groups grow over time, often without regular review. Accounts accumulate in exclusion groups for troubleshooting reasons and are never removed.
An attacker who compromises an account in an exclusion group bypasses the policies that group is excluded from, regardless of how well those policies are otherwise configured. We review every exclusion group in every policy and assess the risk of each exclusion.
What we commonly find
Patterns we see repeatedly across Conditional Access reviews in Australian organisations.
Overprivileged exclusions
Stale legacy policies
MFA and device trust gaps
Break-glass without monitoring
Overly permissive MAM policies
Lack of controls for administrators
What you receive
A findings report you can act on, not a compliance checklist.
- Complete policy inventory and documentation
- Gap analysis against your preferred framework (NIST, ISM, ASD Essential Eight, SOCI)
- Risk-ranked findings (Critical, High, Medium, Low)
- Remediation recommendations for each finding
- Reference policy framework aligned to your requirements
- Full visibility on your current state and policy posture
- High-level CISO briefing deck explaining your current risk

Common questions
See the attack path before the attacker does.
Conditional Access policies are only as strong as the assumptions they're built on. SuiteAuth doesn't just test individual signals — it chains them together to reveal the full attack path an adversary would follow to bypass your controls and reach critical resources.
The result is a visual, step-by-step breakdown of every path through your policy stack — from initial access to blast radius. Run it before and after policy changes to validate remediation with deterministic evidence, not assumptions.
Proprietary engine — built on years of Conditional Access research and real-world bypass discovery. This is the tooling behind our findings.
Signal Emulation
SuiteAuth reconstructs the exact combination of identity, device, network, and authentication signals your policies evaluate — replicating what an attacker would present at the gate.
Policy Traversal
Each Conditional Access policy is exercised against the emulated signals. SuiteAuth maps which policies grant, block, or silently fall through — exposing logic gaps no audit tool can catch.
Blast Radius Analysis
For every validated bypass, SuiteAuth calculates the downstream impact — which resources are reachable, what data is exposed, and how far lateral movement extends from a single policy gap.
Before & After Validation
Replay the same attack path after remediation. SuiteAuth gives you deterministic proof that your policy change closed the gap — evidence your board and auditors can rely on.

Microsoft Cloud Security Partner
Modern 42 is a recognised Microsoft Solutions Partner for Security with the Identity and Access Management designation. Verify on Microsoft
Let’s talk about your identity challenges
No pitch decks. No pressure. Just a straightforward conversation about where you are, where you need to be, and how we can help you get there.
- Understand your current identity posture
- Identify quick wins and critical gaps
- Get actionable recommendations — no strings attached
Free 30 min discussion
No commitment required
Book a time that works for you. We’ll come prepared with initial observations about your industry and common identity challenges.