From asi
Configures Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control, covering signal-based design, device compliance, risk-based authentication, and NIST integration.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based policy design, device compliance requirements, risk-based authentication, named locations, session controls, and integration with NIST SP 1800-35 zero trust architecture.
Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control, including signal-based design, device compliance, risk-based authentication, named locations, and session controls.
Configures Microsoft Entra ID (Azure AD) conditional access policies for zero-trust access control, covering signal-based design, device compliance, risk-based auth, named locations, session controls, and NIST SP 1800-35 integration.
Audits Microsoft Entra ID (Azure AD) configurations for risky authentication policies, permissive roles, stale accounts, conditional access gaps, and guest risks using PowerShell, Graph API, ScoutSuite.
Share bugs, ideas, or general feedback.
Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based policy design, device compliance requirements, risk-based authentication, named locations, session controls, and integration with NIST SP 1800-35 zero trust architecture.
| Control | NIST 800-53 | Description |
|---|---|---|
| Account Management | AC-2 | Lifecycle management |
| Access Enforcement | AC-3 | Policy-based access control |
| Least Privilege | AC-6 | Minimum necessary permissions |
| Audit Logging | AU-3 | Authentication and access events |
| Identification | IA-2 | User and service identification |