Field note
Cyber Essentials MFA Cloud Auto-Fail
MFA problems usually hide in the gaps between policy intent and tenant reality - broad exclusions, awkward guest access, old admin habits, and emergency accounts that nobody really monitors.
There is no polite version of this one.
The current Cyber Essentials position is that cloud service authentication must always use MFA, and IASME has already highlighted an auto-fail policy for not implementing MFA where it is available. For Microsoft 365 environments, that moves MFA out of the "security improvement" bucket and into the "basic pass condition" bucket.
That is the right call. Too many tenants still rely on half-finished coverage, a pile of exclusions, or the assumption that "admins definitely have MFA". Usually they do, until someone checks the service accounts, the emergency accounts, guest access, or the old policy nobody wanted to touch.
Where Microsoft 365 MFA usually goes wrong
The obvious problem is missing enforcement. The less obvious problem is enforcement that looks broad but is full of carve-outs.
Common examples:
| Gap | Why it matters |
|---|---|
| Broad Conditional Access exclusions | A good-looking policy can still leave whole groups outside enforcement |
| Admin portals not treated as high priority | The accounts with the most power need the least ambiguity |
| Guest access assumptions | External users can still become a weak point if trust settings are not understood |
| Legacy policy sprawl | Older CA policies can overlap badly and create strange results |
| Emergency accounts without controls | Break-glass is fine. Break-glass plus zero monitoring is not fine |
One practical rule helps here: if you cannot explain why an exclusion exists in one sentence, it probably should not be there.
What a clean MFA review looks like
For Microsoft 365, I would review these five things first:
- A baseline policy that targets all users and all resources, or a clearly equivalent design.
- Separate attention on administrative access, including Microsoft admin portals.
- Authentication methods allowed in the tenant.
- Guest and external access behaviour.
- Emergency account handling, including alerting and ownership.
This is where a lot of teams lose time. They review registration, but not enforcement. Or they review enforcement, but not targeting. Or they review targeting, but ignore the fact that a single exclusion group now contains half the company because it was convenient six months ago.
Evidence that actually helps
If you are preparing for assessment or just trying to be sane about the tenant, keep evidence that answers specific questions:
| Question | Evidence |
|---|---|
| Are users required to do MFA? | Conditional Access policy export or screenshots showing scope and grant controls |
| Are admin paths covered? | Separate policy or documented coverage for admin portals and privileged roles |
| Are there exclusions? | Named exclusion list with owner and reason |
| Are methods controlled? | Authentication methods policy |
| Are emergency accounts governed? | Account list, storage method, alerting process, and review notes |
If all you have is one screenshot of a policy name, you do not really have evidence yet.
The Microsoft 365 angle people forget
Conditional Access is powerful, but it is also very easy to misread. Multiple policies can apply at once, and all applicable policies must be satisfied. That means a tenant can look protected while still behaving unexpectedly for a specific app, user type, or access path.
So do one live test with a normal user and one with a privileged admin. Do not just inspect the policy. Validate the experience.
That bit feels boring, but it is usually where the confidence comes from.
References
Related notes
20 Apr 2026 · 3 min
Cyber Essentials v3.3: Cloud Services Scope for Microsoft 365 Teams
Related: cyber essentials plus, microsoft 365, cloud services.
02 Apr 2026 · 3 min
Microsoft-Managed Conditional Access Policies: Useful, but Still Needs Ownership
Related: conditional access, entra id, microsoft 365.
15 Jan 2026 · 4 min
MFA in Microsoft 365: Security Defaults, Conditional Access or Per-User MFA?
Related: mfa, entra id, conditional access.
Need help mapping this to your own tenant, controls, or assessment timeline?