Speaker

Thomas Naunheim

Thomas Naunheim

Microsoft MVP | Cyber Security Architect @glueckkanja AG

Koblenz, Germany

Actions

Thomas Naunheim is a Cyber Security Architect at glueckkanja AG and a Microsoft MVP from Koblenz, Germany.
His principal focus is on identity and security solutions in Microsoft Azure and Microsoft Entra.
Thomas shares his experience and research with the community as a blogger at “cloud-architekt.net”,
and he is a speaker at conferences and co-author of the "Entra ID Attack & Defense Playbook”.
He is a member of the "Azure Meetup Bonn" and “Cloud Identity Summit” organization team and is also co-host of the podcast "Cloud Inspires".

Badges

  • Most Active Speaker 2022
  • Microsoft MVP

Area of Expertise

  • Information & Communications Technology

Topics

  • Azure AD
  • Azure AD B2C
  • Microsoft Azure
  • Azure Active Directory
  • Azure PaaS
  • Azure Key Vault
  • Infrastructure as Code
  • Cloud & Infrastructure
  • Cloud Native Infrastructure
  • Secure Infrastructure
  • Microsoft Entra
  • Microsoft Entra ID
  • Microsoft Defender for Cloud
  • Microsoft Sentinel
  • Privileged Identity & Access
  • Enterprise Access Model

Sessions

Taking Control of Your Cloud’s Control Planeen

Microsoft introduced the Enterprise Access Model, as an evolution of ESAE, in December 2020. Core principles (e.g., tiered administration) have not been changed but the practical implementation can be still a challenge for many organizations and is much different between cloud and on-premises infrastructure. However, the concept should be an important part of your privileged access strategy to avoid unauthorized pathways which leads to lateral movements and also applies for cloud administration.

In this session, I will share my experiences in designing, managing and monitoring privileged access based on Enterprise Access Model. We will look at a practical approach to design a classification model for tiered administration. The real-world challenges in adopting the privileged access design in enterprise environments and current technical limitations will be one the topics in this talk. We will also discuss some fundamental design questions, for example using a dedicated tenant to host an administrative environment (”Red Tenant”) for privileged assets. Integration of security operations to identify breach of tiered administration and practical guidance on daily operations will be covered in the live demos.

Zero Trust - Zero Gap? Spotlight on (new) uncovered aspects of your CA designen

Conditional Access is the heart of Microsoft's Zero Trust implementation as its policy enforcement engine and Microsoft introduces constantly new features to cover more and more use cases and integrations. This includes granular conditions and controls for specific authentication methods, restricted sessions and authentication flows but also new capabilities to re-trigger a policy evaluation.

In this session, we will discuss the latest features and their use cases and also challenges that you may not address in your current ruleset. Starting from automation for deployment, exclusion handling and gap monitoring, up to missing strong policy design to prevent rogue devices or protect privileged users.

Fantastic tokens in Microsoft Entra ID and how to protect them...en

Post-authentication attacks are on the rise and offer attackers the opportunity to satisfy strong security controls (such as MFA or compliant device requirements). Token artifacts take the essential role in the process of verifying identity of the user and obtaining an access to resources in Microsoft Entra. Therefore, it's important to consider token theft scenarios which allow to steal those artifacts and use them elsewhere.

Monitoring of anomaly and threat signals to enforce re-authentication but also timely response to policy violations are just a few defense aspects which should apply to your ITDR and Security Operations.

In this session, I will give an overview about the different types of token artifacts and how to protect them from token replay attacks.

- How and when does TPM help us to protect keys?
- Which detection sources and signals are important?
- What type of tokens are particularly vulnerable?
- Why Continuous Access Evaluation becomes an essential part for tackling abuse of tokens?

Empowering Identity Threat Detection & Response with Microsoft Securityende

Identities are still one of the main attack scenarios and many different threats and attack techniques will be used to gain credentials and access. Microsoft security products offers many capabilities to detect those threats and risks on identities by using built-in ML-based signals but also implementing custom detections.

But which integrations between the individual products (such as Microsoft Defender XDR, Sentinel and Entra ID Protection) are essential? How can you take advantage of "User and Entity Behavior Analytics" to detect suspicious activities? Which practical use cases and solutions are available to fine-tune or enrich built-in detections?

In this talk, I would like to give a practical view on the implementation of the Microsoft Security stack for Identity Threat Detection & Response with notes from the field. This will cover also advanced multi-stage attack scenarios and custom detections.

Protect Your Privileged Identities and DevOps Pipelines In Microsoft Azure!en

Privileged identities but also DevOps pipelines with privileged access needs particular attention in a cloud environment.

Over the last years Microsoft releases many design principles, best practices and security concepts for securing privileged access in Microsoft Azure.

This includes the new "Enterprise Access Model" (as evolution from the AD tier model) but also best practices from the Cloud Adoption Framework (CAF) to design identity and access for Azure workloads and management.

In my session I will speak about security considerations and solution approaches from my research work. This includes answers to the following questions:

- Which key points should be included in desgning a secure foundation for privileged identities?
- How can I prevent privilege escalation by implementing a well-designed and delegated Azure RBAC model?
- Which aspects should be considered in securing privileged Azure DevOps release pipelines?

EntraOps: Deploying and Managing Conditional Access at Scaleen

Conditional Access is an essential component of "Azure Active Directory" and assumes the role of the "Zero Trust Policy Engine" in Microsoft 365 environments.

Therefore, configuration management of the policies has become a critical and important part for Identity Administrators and Security Operations.

Microsoft Graph API offers programmatic access to Conditional Access which is the foundation to configure policies "as code".

In this session we will do a walkthrough of automation solutions to manage deployment and operations of Conditional Access at scale across the DevOps lifecycle.
During the hands-on demos we will discuss my PoC project "AADOps" which shows the capabilities in automation and lifeycle management by using Azure DevOps (Repos and CI/CD pipelines), PowerShell and Microsoft Graph.

1. Overview of Microsoft Graph & Conditional Access
- Existing automation and workflow solutions
- Considerations of "Policies as Code"

2. Introduction of "AADOps" project
- Advantages of "IdentityOps" approach
- Security design and RBAC of Azure DevOps project

3. Coding & deployment of policies
- Plan and code policies in "Azure Repos"
- Defined policy templates and variables
- Governance by automated validation and approval workflow
- Pull/Push Pipeline to manage desired state
- Safe rollout of policies across intra- and inter-tenant stages

4. Operationalization of policies in Azure AD management
- Operational Insights and Exclusion Management
- Security Monitoring of Policy management

Azure Governance Best Practices and Enterprise-Scaleen

In the past, Microsoft published many documentations and white papers for the adoption of Azure in enterprise environments. This includes Cloud Adoption Framework (CAF) and the Well-Architected Framework. Alongside of an overview of those whitepapers, we will show some hands-on demos to manage your cloud environment. In particular, Azure Policy, Defender for Cloud and Azure Advisor will help you to enforce your policies across compliance and security. In this session, we like also to introduce you to the "Enterprise-scale" architecture, and some of the included aspects, considerations, or approaches. A particular focus will be on security best practices with Entra ID and RBAC. Protecting DevOps pipelines and designing a delegated role model will be one of the topics as well.

Topics of this session:
- Cloud Adopting Framework
- Well-Architected Framework
- Azure Policy and Defender for Cloud
- Azure Advisory

- Overview and requirements of Azure Landing Zones
- Deployment of Enterprise-Scale reference implementation
- Policy-driven governance ("Azure Policy")
- Critical design areas and core principals of securing Azure environments

Securing and monitoring your Azure AD identitiesen

Azure Active Directory is one of the keys for implementing a "Zero Trust" approach. The perimeter is moving from network to identity (as the new control plane).

During my session I will talk about several aspects to secure and monitor hybrid identities and (cloud-only) privileged accounts.

The session includes overview, recommendation and considerations of the following topics:

- Plan, draft and test Conditional Access Policies
- Automated response to address user and sign-in risk with Azure AD Identity protection
- Detect suspicious user activities and protect cloud app sessions with MCAS
- Auditing and insights of accounts and (suspicious) authentication attempts with Azure Sentinel

Introduction and Security Recommendations of Azure Enterprise-scale Architectureende

In the past, Microsoft published many documentations and white papers for the adoption of Azure in enterprise environments. One of the key source is the Cloud Adoption Framework (CAF).

In the session, I like to give an overview of the „Enterprise-Scale“ reference architecture. This enables you to build landing zone(s) that represents the strategic design path and follows design principles of critical design for shared services (e.g. identity, network,..).

Furthermore, it includes learnings from previous engineering engagements and provide architecture design pattern from Microsoft.

Various reference implementations allows to deploy (modular) templates depending on customer needs such as kind of connectivity (cloud-only, Hub/Spoke, vWAN).

You will learn more about implementation of the "Enterprise-scale" architecture, and some of the included aspects, considerations or approaches.
A particular focus will be on security best practices:

- Overview and requirements of Azure Landing Zones
- Deployment of Enterprise-Scale reference implementation
- Policy-driven governance ("AzOps")
- Critical design areas and core principals of securing Azure environments with Azure AD

Level 300 Session
including Hands-On Demo

Delegated and secured management of Azure environments with Microsoft Entraende

Most organizations have implemented (internal or customer) Azure workloads in the same Microsoft Entra ID tenant environment as their corporate production environment for Microsoft 365 and other SaaS solutions. Delegate access and managing separated Azure environments in a single-tenant environment could be challenging.

In this context, various other questions come to mind:
Which aspects should be considered in securing identities or access as part of privileged DevOps pipeline and assigned permissions to Azure Resources? How can I delegate or separate objects such as service principals or test users within one Azure AD tenant? When should I start to isolate my resources in multiple tenants and what are the disadvantages?

Microsoft implemented new features and published white papers that address this need recently. In my session we will go into details about the subjects:

- Microsoft Entra ID Tenant Boundary and multi tenant scenarios
- Limitations and differences of Azure and Entra ID RBAC delegation
- Custom Azure RABC roles and scopes (UX and RBAC-as-Code)
- Delegated permissions on level of Administrative Units
- Approval process to gain scoped access to Entra ID objects
- Azure PIM Privileged Access Groups for Azure DevOps roles

Level 300 session
including Live-Demos

Hybrid identity design and security considerations in Microsoft Entraende

Azure Active Directory is the core identity service of Azure- and Microsoft 365. Many companies around the world connected Active Directory to Microsoft's cloud-based IAM service for synchronization and authentication of identities.
During the session I will talk about design and security considerations in a hybrid Azure AD environment.
What approaches could be used in securing hybrid identity components (Azure AD Connect, PTA,...) or delegate administrative permissions?
This session includes also some hands-on demos (e.g. hardening of default tenant settings or identity protection) and notes from the field.

Level 300 Session
including Hands-on Demo

Securing your privileged identity and access in Microsoft Entraende

Privileged accounts and access needs particular attention alongside of the regular protection of user accounts in Microsoft Entra. Over the last years Microsoft releases many design principles, best practices and security concepts for securing privileged access in Microsoft Azure (such as "Enterprise Access Model" as evolution of the ESAE approach).

In my session I will speak about the latest aspects, considerations and solution approaches to protecting privileged identities and access in Microsoft Azure:

- Customizing and Designing of Azure and Entra ID RBAC concept
(Custom roles, security considerations of built-in roles)
- Adoption of Enterprise Access Model in Microsoft Entra
- Reduce the exposure time of privileges (Identity Governance)
- Managed Access Package for Privileged Access Groups and Roles
- Protecting privileged accounts with advanced Conditional Access and MFA (including passwordless options)
- Access to Azure resources from a secure admin workstation

Level 300 session (including hands-on/live demos and notes from the field)

Manage and Secure Your Customer Identities with Azure AD B2C!ende

Microsoft’s Azure AD B2C enables companies and organizations to manage identities and access of customers in the cloud. It’s built on the strong foundation of Azure AD and the powerful identity engine “Microsoft Identity Experience Framework”. Developers are able to easily integrate apps based on the Microsoft Identity platform and customize the B2C tenant (e.g. branding of UI) .

In this session I will talk about architecture and operation-related topics:

- Architecture of Azure AD B2C
- Use cases and examples of CIAM solutions
- Design and configuration of B2C tenant
- Configuration of User flows (Built-in)
- Deployment of Custom Policies
- Auditing and Monitoring
- Securing local user accounts in B2C

This session includes hands-on and experiences from the field. It aims to reach a wide audience, including DevOps to get an overview of use cases and implementation of Microsoft's identity platform in B2C scenarios.

Deep Dive into Microsoft Entra Conditional Accessen

Conditional Access Policies in Microsoft Entra allows to empower users to be productive wherever and whenever but also protect the organization's assets. It's an essential component of the identity-driven security approach in Azure Active Directory. It also plays an important role as "Policy Engine" in Zero Trust implementations to "always verify" access by context and control.

Deep integration with Azure AD Identity Protection, Microsoft Cloud App Security but also 3rd Party allows extension of conditions and controls.

In this session we will do a walkthrough including hands-on demos, known limitations and notes from the field:

1. Overview of Conditional Access Policies
- Security Defaults vs. Custom Policies
- Principals of Signal, Decision and Enforcement

2. Design and Implementation
- Naming Convention
- Policies As Code
- Management of Exclusions

3. Common use cases and policies

4. Extension of Conditions and Controls
- User and Sign-In Risk with Azure Identity Protection
- App Control to Microsoft Cloud App Security

5. Monitoring and Reporting
- Insights and Workbooks
- Azure Sentinel

Avoid privilege escalation of pipelines in Azure DevOps!en

Automated deployment of cloud infrastructure by using Azure Pipelines and definition of "infrastructure as code" in Azure Repos has become popular in many organization.

But this also requires to implement security and compliance settings to protect privileged assets which will be used to automate your cloud environment.

Security considerations, such as privilege escalation paths, needs to be considered across various related RBAC systems in Azure AD, Azure and Azure DevOps.

In my session I will speak about security considerations and solution approaches from my research work. This includes answers to the following questions:

- Which key points should be considered to secure and manage privileged access to Azure DevOps organization?
- How can I prevent and detect abuse of service principals and connections in privileged pipelines?
- Which aspects should be considered in securing privileged Azure DevOps release pipelines?
- What benefits offers the usage of self-hosted agent for isolation and security in Azure Resource deployment?

Demystify Microsoft Entra ID workload identities en

Identities of apps and services (workloads) are gaining privileged access and are used on a wide scale (especially in DevOps or large high-automated environments).
Attack techniques (for example, in case of NOBELIUM attacks) has shown that service principals will be used for initial and persistent access (to create a "backdoor" in Microsoft Entra ID).
Securing credentials, limit and detecting suspicious access or managing lifecycle of workload identities can be a challenge.

Security concepts of privileged user account can not be (fully) applied to non-human identities and would be limited applicable.
Strictly monitoring and classification of this types of identities are often neglected in the past.

In this session, I like to give an overview about the different types of workload identities, common (sensitive) use cases and how attacks or abuse can be mitigated of the different phases in the lifecycle.

- What is a workload identity?
- Different types of workload identities in Entra ID
- Common and real-world use cases
- Management of lifecycle and visibility
- Securing delegated management by Entra ID RBAC
- Monitoring and detection to prevent privilege escalation
- Securing access and protection of workload identities
(by Entra Conditional Access and Identity Protection)

Effective measures to improve your identity security posture in Microsoft Entraende

Microsoft Entra ID has become an essential part of the "Identity & Access Management" in many organizations. Critical business applications and cloud services are integrated to Microsoft's cloud-based identity platform but also components to support hybrid identity scenarios in Active Directory (on-premises) have been implemented.

On the other hand, the "new control plane" is a growing target for cybercriminals. Microsoft Entra offers many security features and integration to other (Microsoft) security solutions to protect (hybrid) identities. But what are security considerations that should be considered in the design and implementation of a modern identity infrastructure? How can you track posture management changes and their impact in your environment?

In this session, I will talk and demonstrate a few usual examples of "misconfiguration" or weak implementations regarding the following four subject areas:

- Identity Security Posture and usual misconfiguration of security-related tenant settings
- Weakness in Conditional Access Policy Designs and risks of Token replay attacks
- Privileged Identity and Access in Microsoft Entra ID and "overlooked" privileged access paths
- App Integration and abuse by overprivileged workload identities

Control Plane under Control: Securing Privileged Access by Microsoft Enterprise Access Modelen

Over the last years, Microsoft has released many design principles, best practices and security concepts for securing privileged access in a Microsoft Cloud environment. This includes also the "Enterprise Access Model" as an evolution of the previously known (Active Directory) ESAE approach.

But what are real-world experiences and examples of implementing those reference architecture? Which security controls should be applied? Who and what should be defined as "Tier0" or "Control Plane"? Which privilege escalation paths should be considered even in a tiered administration model?

In this demo-drive session, I will share my learnings and practical approach to identify, protect and monitor the high-privileged assets in Microsoft Entra. We will go through related features and monitoring capabilities but also limitations to implement a tiered administration model in a cloud environment. In addition, I will show insights of my free commmunity tool "EntraOps" which allows to automate classification and protection of privileged assets in your environment.

Workplace Ninjas Norway 2025Sessionize EventUpcoming

June 2025 Oslo, Norway

Experts Live Netherlands 2025Sessionize EventUpcoming

June 2025 Nieuwegein, The Netherlands

Experts Live Germany 2025Sessionize Event

April 2025 Leipzig, Germany

YellowHatSessionize Event

March 2025 Amsterdam, The Netherlands

Hybrid Identity Protection Conference

November 2024 New Orleans, Louisiana, United States

The Experts Conference

October 2024 Dallas, Texas, United States

Workplace Ninja Summit 2024Sessionize Event

September 2024 Luzern, Switzerland

CloudLand 2024

June 2024 Brühl, Germany

Experts Live Netherlands 2024Sessionize Event

June 2024 Nieuwegein, The Netherlands

Azure user group NorwayUser groupSessionize Event

April 2024 Oslo, Norway

Cloud Technology Townhall Tallinn 2024Sessionize Event

February 2024 Tallinn, Estonia

Azure Saturday Hamburg 2024Sessionize Event

January 2024 Hamburg, Germany

Dev-Cloud Conference '23Sessionize Event

November 2023 Köln, Germany

The Experts Conference

September 2023 Atlanta, Georgia, United States

Experts Live Germany 2023Sessionize Event

June 2023 Erfurt, Germany

Data Saturday Rheinland 2023Sessionize Event

June 2023 Sankt Augustin, Germany

Experts Live Netherlands 2023Sessionize Event

May 2023 's-Hertogenbosch, The Netherlands

Hybrid Identity Protection Germany

October 2022 Frankfurt am Main, Germany

WorkPlace Ninja Summit 2022Sessionize Event

September 2022 Luzern, Switzerland

Experts Live GermanySessionize Event

September 2022 Erfurt, Germany

Scottish Summit 2022Sessionize Event

June 2022 Glasgow, United Kingdom

OWASP Frankfurt

May 2022 Frankfurt am Main, Germany

aMS Berlin - 19.05.2022Sessionize Event

May 2022 Berlin, Germany

Global Azure Bootcamp Cologne 2022Sessionize Event

May 2022 Köln, Germany

Limerick DotNet-Azure User Group - 2022 Virtual SessionsUser groupSessionize Event

January 2022

mc2mc December Event

December 2021

Azure Developer Community Day 2021 (hybrid Edition)Sessionize Event

December 2021 Munich, Germany

Hybrid Identity Protection Conference

December 2021 Hoboken, New Jersey, United States

aMS Germany - 16-11-2021Sessionize Event

November 2021 Aachen, Germany

Nordic Virtual Summit Second EditionSessionize Event

November 2021

WorkPlace Ninja Virtual Edition 2021Sessionize Event

August 2021

Global Azure 2021Sessionize Event

April 2021

CollabDays Bremen 2021Sessionize Event

March 2021

Virtual Scottish Summit 2021Sessionize Event

February 2021

Azure Saturday Hamburg 2021Sessionize Event

February 2021

aMS Germany - 1/12/2020Sessionize Event

December 2020 Aachen, Germany

Microsoft 365 Virtual MarathonSessionize Event

May 2020

Global Azure Bootcamp Cologne 2020Sessionize Event

April 2020 Bergisch Gladbach, Germany

cim lingen 2019: Design und Security eines hybriden Azure Active Directory

Viele Unternehmen weltweit haben ihr lokales Active Directory mit Microsoft’s cloud-basierenden IAM-Serviceverbunden, um Identitäten zu synchronisieren und Authentifizierungen durchzuführen. Während meiner Session werde ich auf einige Design-aber auch Sicherheitsthemen eingehen, die bei einer Implementierung von hybriden Azure AD-Umgebung betrachtet werden sollten.Welche Ansätze können genutzt werden, um Azure AD Connect abzusichern oder Privilegierte Rollen zu designen? Wieso sollten u.U. privilegierte Konten im on-Premises-und Cloud-Umfeld getrennt werden? Welche Angriffsszenarien gibt es bei hybriden Identitäten? In der Session werden auch Live-Demos (z.B. Härtung der standardmäßigen Tenant-Einstellungen sowie die Konfiguration von Notfallkonten) gezeigt.

September 2019 Lingen, Germany

Glasgow Azure User Group Meetup: Hybrid identity design and security considerations in Azure AD

During the session I like to talk about design and security considerations in an hybrid Azure AD environment. What approaches could be used in securing Azure AD Connect or designing privileged identities? This session includes also some hands-on demos (e.g. default tenant settings and configuration of emergency access accounts).

August 2019 Glasgow, United Kingdom

Azure Meetup Bonn: Azure AD Security - Absichern und Überwachen von Azure AD Benutzerkonten

Second part of the "Azure Active Directory" meetup talk at Azure Bonn:
- Plan, draft and test Conditional Access Policies
- Automated response to address user and sign-in risk with Azure AD Identity protection
- Protecting privileged accounts with Azure AD PIM
- Concepts of securing privileged access
- Auditing and insights of accounts and (suspicious) authentication attempts

August 2019 Bonn, Germany

Azure Meetup Bonn: Azure AD Security - Implementierung einer sicheren Cloud Authentifizierung

• Design and Architecture of Azure AD
• Hybrid identity considerations
• Management of user accounts

May 2019 Bonn, Germany

.NET User Group Koblenz: Azure Workshop

- Azure DevOps mit CI/CD Pipelines
- Infrastructure-As-Code mit Azure Resource Manager Templates
- Azure Monitoring & Logging mit Application Insights, Log Analytics und Azure Monitor

April 2019 Koblenz, Germany

Thomas Naunheim

Microsoft MVP | Cyber Security Architect @glueckkanja AG

Koblenz, Germany

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.