1. Microsoft Learn. "What is Conditional Access in Azure Active Directory?". Microsoft Entra documentation. This document states
"Conditional Access policies at their simplest are if-then statements
if a user wants to access a resource
then they must complete an action... Common signals... include... User or group membership... Common decisions... include... Require multi-factor authentication." This directly supports using Conditional Access to require MFA for a specific group.
2. Microsoft Learn. "Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication". Microsoft Entra documentation. This tutorial provides a step-by-step guide on creating a Conditional Access policy. Step 4
"Create a Conditional Access policy
" explicitly shows how to select a specific user group under "Assignments" and then select "Require multi-factor authentication" under "Access controls."
3. Microsoft Learn. "What is Azure Policy?". Azure Governance documentation. This source clarifies that Azure Policy "evaluates resources in Azure by comparing the properties of those resources to business rules." This confirms its focus is on resource governance
not identity access.
4. Microsoft Learn. "Configure and enable risk policies". Microsoft Entra documentation. This document explains
"The user risk policy detects the probability that a user account is compromised and allows administrators to configure an automated response... such as... requiring a secure password change or requiring multi-factor authentication." This shows that user risk policies are triggered by risk
not just group membership.