Zero Trust Scorecard

Assess your Microsoft 365 and Entra ID environment against five Zero Trust pillars: identity, Conditional Access, privileged access, device security, and data protection. Identify the gaps that commonly undermine security posture — including whether your MFA strategy is phish-resistant.

Identity & MFA

How identities are secured — and whether MFA can withstand modern phishing attacks.

Phish-resistant = FIDO2 keys, Windows Hello for Business, passkeys, or certificate-based auth. Standard = push notifications, Authenticator OTP, SMS, or phone call.

Even with MFA enabled, standard methods can be bypassed by adversary-in-the-middle (AiTM) attacks and MFA fatigue.

Users who haven't registered MFA methods are not protected even when policies are enabled.

Conditional Access & authentication

Policies that govern how and when access is granted.

Legacy protocols (POP, IMAP, SMTP AUTH, older ActiveSync) bypass MFA entirely.

Entra ID Protection provides sign-in risk (suspicious login behaviour) and user risk (compromised credential detection) signals.

Privileged access & governance

How privileged roles are managed, scoped, and reviewed.

PIM provides just-in-time role activation instead of permanent standing assignments.

If Conditional Access or MFA locks out all admins, break-glass accounts are the recovery path.

E.g. Exchange Admin, SharePoint Admin, User Admin — rather than Global Admin for everything.

Device & endpoint

Device identity, management, and access restrictions.

E.g. web-only access, app protection policies, or blocking downloads on personal devices.

Data protection

Classification, labelling, and data loss prevention.

Microsoft Purview Information Protection sensitivity labels for classifying and protecting documents and emails.

Data Loss Prevention for Exchange, Teams, SharePoint, OneDrive, and endpoint.