Understanding Geographic-Based Access Controls
Geographic-based access controls are crucial for organizations looking to maintain compliance with international regulations or enhance security by removing some low hanging fruit. One specific use case is blocking access from OFAC sanctioned countries while allowing access from trusted locations.
Implementation Steps
1. Create a Report-Only Policy
First, create a policy in report-only mode to assess impact:
- Navigate to Azure Portal > Azure AD > Security > Conditional Access
- Create a new policy
- Configure the following settings: Users and groups: All users Cloud apps or actions: All cloud apps Conditions: Locations > Configure > Selected locations Access controls: Block access Enable policy: Report-only
2. Configure Location Conditions
Create a list of blocked locations:
- Under Conditions > Locations, select “Selected locations”
- Add locations corresponding to OFAC sanctioned countries
- You can find the current list at: https://ofac.treasury.gov/sanctions-programs-and-country-information
3. Monitor and Analyze
Before enforcing the policy:
- Enable audit logging
- Monitor sign-in logs for:
- Location data
- Policy hits
- False positives
- Review impact over a minimum period of time (days or weeks)
4. Policy Enforcement
Once confident in the policy:
- Change from “Report-only” to “On”
- Monitor for:
- User impact
- Help desk tickets
- Failed sign-in attempts
Best Practices
- Always test with report-only mode first
- Include exception groups for specific use cases: remember to exempt your break-glass accounts!
- Document all excluded locations and reasoning
- Regular review of OFAC countries list
- Maintain audit logs for compliance
Production Configuration Example
Name: Block OFAC Countries State: Enabled Conditions: Users: All Users Cloud apps: All cloud apps Locations: Include: Selected locations LocationList: [OFAC Sanctioned Countries] Access Controls: Grant: Block access Session Controls: None
Remember to implement this alongside other security controls like MFA and device compliance for a comprehensive security strategy.