Consider the following compensating controls:
1. Implement Multi-Factor Authentication (MFA) MFA adds an extra layer of security by requiring something the user has (e.g., a phone or security key) in addition to their password. Enforce MFA for all privileged and standard accounts, preferably using phishing-resistant methods (e.g., FIDO2 keys or certificate-based authentication).
2. Enforce strong password policies Use a minimum of 14+ characters and enforce a mix of uppercase, lowercase, numbers, and special characters. Block common passwords by implementing a banned password list to prevent easily guessable passwords (e.g., through Entra ID Password Protection). Disable password hints and security questions that can be exploited.
3. Monitor and detect compromised passwords Use Entra ID Identity Protection to detect when passwords appear in known breaches. Use Microsoft Defender for Identity or UEBA solutions to detect unusual login behavior.
4. Require Just-in-Time and Least Privilege Access Ensure that administrative accounts operate in separate environments. Use Entra ID PIM to grant temporary admin rights instead of permanent roles.
5. Implement Passwordless Authentication Move towards passwordless authentication using FIDO2 security keys, Windows Hello for Business, or certificate-based authentication.
6. Regular Security Reviews & Audit Logging Enable and monitor Entra ID sign-in logs for anomalous activity. Enforce device compliance, known locations, or risk-based access decisions by using Entra ID Conditional Access
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
hth
Marcin