{"id":25337,"date":"2025-02-24T16:16:30","date_gmt":"2025-02-24T21:16:30","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25337"},"modified":"2025-03-28T02:22:57","modified_gmt":"2025-03-28T06:22:57","slug":"ai-identity-security","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/","title":{"rendered":"MFA &#038; Conditional Access: The AI security essentials MSPs can&#8217;t ignore"},"content":{"rendered":"<p>Identity and access management (IAM) has moved to the front lines of AI readiness.<\/p>\n<p>As more businesses explore <a href=\"https:\/\/info.sherweb.com\/microsoft-365-copilot-guide-for-msp.html?_gl=1*12bzzzw*_gcl_au*MTgzNTcwMDc5NC4xNzQxMjI4NjA1\">Microsoft Copilot<\/a> and other AI-integrated platforms, MSPs are under pressure to ensure client environments are ready, before those tools go live. That means tightening controls around who can access data, how AI interacts with business systems, and whether existing policies are strong enough to support Copilot without putting sensitive information at risk.<\/p>\n<p>Weak authentication, outdated access controls and inconsistent governance policies often go unnoticed, until AI brings them to the surface. Tools like Copilot increase visibility into long-standing security gaps, especially around permissions and data access.<\/p>\n<p>This is where MSPs can lead. By guiding clients to enforce multi-factor authentication, apply conditional access, and automate identity reviews, providers strengthen trust and create a secure foundation for AI adoption at scale.<\/p>\n<p>In this blog, we\u2019ll break down how to:<\/p>\n<ul>\n<li>Strengthen AI access controls with MFA.<\/li>\n<li>Use conditional access to reduce identity risk.<\/li>\n<li>Prevent permission creep with automated reviews.<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><strong data-start=\"333\" data-end=\"386\">Start building your MSP security strategy for AI: <\/strong><\/p>\n<blockquote>\n<h2 style=\"text-align: center;\"><a href=\"https:\/\/info.sherweb.com\/ai-cybersecurity-guide-msps\" target=\"_new\" rel=\"noopener\" data-start=\"386\" data-end=\"477\">Download the AI Cybersecurity Guide<\/a><\/h2>\n<\/blockquote>\n<p style=\"text-align: center;\">to secure your clients from day one.<\/p>\n<p>Let\u2019s dig into the identity-first strategies MSPs need to build secure, Copilot-ready environments.<\/p>\n<h2>Why Identity and Access Management (IAM) is essential for secure AI adoption<\/h2>\n<p>AI tools like <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/copilot\/\">Microsoft Copilot<\/a> interact with sensitive business data\u2014files, messages, calendars, financials\u2014based on the user\u2019s permissions. If access controls aren\u2019t clearly defined, AI can surface information that was never intended to be shared. The risk isn\u2019t always malicious. It can be as simple as an employee asking Copilot a question and receiving data they weren\u2019t meant to access.<\/p>\n<p>IAM ensures AI tools only access the right data, under the right conditions, making it a core pillar of secure adoption.<\/p>\n<ul>\n<li>81% of breaches stem from weak or stolen credentials (<a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/?cmp=knc:ggl:ac:ent:ea:na:8888855284_ds_cid_71700000082349844_ds_agid_58700006959928987&amp;utm_term=verizon%20security%20breach&amp;utm_medium=cpc&amp;utm_source=google&amp;utm_campaign=GGL_BND_Security_Phrase&amp;utm_content=Enterprise&amp;gad_source=1&amp;gclid=CjwKCAjw7pO_BhAlEiwA4pMQvMFL_AuWx9s9UWqLuJJlCkMSCh7HHcUP8U3C3JqmMNlO77dvzXQSaRoCMkMQAvD_BwE&amp;gclsrc=aw.ds\">Verizon Data Breach Report 2024<\/a>).<\/li>\n<li>AI-powered phishing attacks are up 126% YoY, highlighting growing identity-based threats (<a href=\"https:\/\/www.darktrace.com\/blog\/darktrace-releases-annual-2024-threat-insights\">Darktrace Threat Report 2024<\/a>).<\/li>\n<\/ul>\n<p>For MSPs, the path forward is clear: strengthen IAM with Multi-Factor Authentication, Conditional Access and automated access reviews to help clients <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/microsoft-365-security\/\">adopt AI confidently and securely<\/a>.<\/p>\n<h2>Why MFA Is non-negotiable for AI-Ready environments<\/h2>\n<p>As businesses adopt tools like Microsoft Copilot, securing user access becomes even more critical. Without <a href=\"https:\/\/www.sherweb.com\/blog\/security\/multi-factor-authentication\/\">Multi-Factor Authentication (MFA)<\/a>, organizations risk exposing sensitive data to unauthorized users, whether through stolen credentials, misconfigured permissions or insider misuse.<\/p>\n<p>AI systems handle large volumes of business-critical information. That means one compromised account\u2014external or internal\u2014can trigger a serious data exposure event.<\/p>\n<p>MFA helps MSPs protect Copilot and other AI-enabled systems by:<\/p>\n<ul>\n<li>Adding a second layer of identity verification, even if passwords are stolen.<\/li>\n<li>Ensuring that only authorized users can access data-rich AI environments.<\/li>\n<li>Supporting compliance requirements in regulated industries.<\/li>\n<li>Reducing the likelihood of insider misuse or accidental data sharing.<\/li>\n<\/ul>\n<p>MFA adoption has been proven to <a href=\"https:\/\/learn.microsoft.com\/en-us\/partner-center\/security\/security-at-your-organization\">block up to 99.9% of identity-based attacks<\/a>, but only when enforced consistently across all applications.<\/p>\n<h3><span style=\"color: #000000;\">MFA best practices for MSPs implementing AI tools<\/span><\/h3>\n<p>To <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/msp-security-strategy-for-ai\/\">fully protect client environments<\/a> using AI tools like Copilot, MSPs should apply consistent MFA strategies across every connected workload. These best practices strengthen identity security and help prevent unauthorized access across sensitive systems:<\/p>\n<ul>\n<li>Enforce MFA for all AI-related logins (including Copilot, <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/\">Microsoft Entra<\/a>, and <a href=\"https:\/\/www.sherweb.com\/infrastructure\/microsoft-azure\/\">Azure<\/a>).<\/li>\n<li>Use <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/policy-admin-phish-resistant-mfa\">phishing-resistant methods<\/a> like hardware tokens or biometric authentication.<\/li>\n<li>Apply strict MFA policies to privileged users and API\/service accounts.<\/li>\n<li>Combine MFA with risk-based authentication to flag unusual login behavior.<\/li>\n<\/ul>\n<p>Microsoft Entra\u2019s adaptive MFA triggers additional authentication only when user behavior suggests elevated risk, reducing friction without compromising security.<\/p>\n<h2>Using Conditional Access to control AI access points<\/h2>\n<p>MFA is essential, but it\u2019s only part of the equation. Even with strong authentication in place, organizations still face serious risks, especially when users access AI tools like Microsoft Copilot from untrusted devices, unfamiliar locations, or with more permissions than they actually need.<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/overview\">Conditional Access<\/a> allows MSPs to set adaptive policies based on user behavior, risk level, and device health, ensuring that only trusted users can interact with AI tools under the right conditions.<\/p>\n<p>It doesn\u2019t just block external attackers. It helps reduce internal risks, too\u2014like accidental data exposure by employees with excessive privileges or misconfigured roles.<\/p>\n<h2>How MSPs can use Conditional Access to secure AI workflows<\/h2>\n<ul>\n<li><strong>Restrict access from untrusted devices<\/strong><br \/>\nEnsure Copilot and other tools can\u2019t be accessed from unmanaged or non-compliant endpoints.<\/li>\n<li><strong>Apply location-based access policies<\/strong><br \/>\nAutomatically block or challenge logins from high-risk geographies.<\/li>\n<li><strong>Limit AI permissions by role<\/strong><br \/>\nEnsure only authorized users can interact with sensitive data through Copilot.<\/li>\n<li><strong>Require compliance posture checks<\/strong><br \/>\nPrevent access to AI tools unless the device or app meets defined security standards.<\/li>\n<\/ul>\n<p>With Microsoft Entra Conditional Access, MSPs can create access rules based on device health, user risk and app sensitivity, protecting AI workflows from both external threats and internal missteps.<\/p>\n<h2>Automating access reviews to prevent AI security blind spots<\/h2>\n<p>Access control isn\u2019t set-it-and-forget-it, especially when it comes to AI. Over time, employees change roles, gain unnecessary privileges and accumulate forgotten AI tool permissions. That drift can quietly introduce new risks.<\/p>\n<h3><span style=\"color: #000000;\">How MSPs can use automated access reviews for AI security<\/span><\/h3>\n<ul>\n<li>Run <strong>quarterly AI access audits<\/strong> \u2192 Remove stale, unused accounts.<\/li>\n<li>Monitor <strong>privilege escalation<\/strong> \u2192 Detect unauthorized role changes in AI-powered environments.<\/li>\n<li>Integrate <strong>access review tools with Microsoft Entra<\/strong> \u2192 Automate deprovisioning of inactive AI accounts.<\/li>\n<li>Use <strong>AI-driven behavioral analytics<\/strong> \u2192 Identify unusual access patterns and respond in real time.<\/li>\n<\/ul>\n<p>Microsoft Entra ID Governance automates AI access reviews, helping MSPs enforce zero-trust security principles at scale.<\/p>\n<h2>Essential identity security strategies for AI-Driven MSPs<\/h2>\n<p><iframe loading=\"lazy\" title=\"AI Security Readiness I What about data breaches?\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/B4n0qiIV8jI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<h2>Protecting Microsoft Copilot with identity-first strategies<\/h2>\n<p>Microsoft Copilot\u2019s integration with Microsoft 365 makes it a powerful tool, but also a potential risk if identity controls aren\u2019t properly configured.<\/p>\n<ul>\n<li>If an unauthorized user gains access, Copilot can pull confidential information from shared files.<\/li>\n<li>If data sensitivity labels aren\u2019t applied, AI may generate insights from privileged client records<\/li>\n<li>Without Conditional Access and Role-Based Permissions, employees can unintentionally expose data.<\/li>\n<\/ul>\n<p>Copilot is only as secure as the access policies around it. That\u2019s why MSPs must guide clients to build identity-first environments before enabling AI features.<\/p>\n<h2>AI identity security is an opportunity, not just a risk<\/h2>\n<p>AI security isn\u2019t just about stopping attacks, it\u2019s about enabling secure adoption. MSPs who <strong>implement identity-first AI security strategies<\/strong> will:<\/p>\n<ul>\n<li><strong>Strengthen client trust<\/strong> by securing AI-driven workflows.<\/li>\n<li><strong>Unlock new revenue streams<\/strong> through AI security services.<\/li>\n<li><strong>Future-proof their MSP business<\/strong> against evolving AI threats.<\/li>\n<\/ul>\n<p><strong>Want to take AI security to the next level?<\/strong> Sherweb helps MSPs simplify AI adoption with expert support, training, and hands-on security solutions. Learn how top MSPs are securing AI with Microsoft\u2019s best tools and Sherweb\u2019s enablement resources.<\/p>\n<p><strong>AI identity security is non-negotiable.<\/strong><\/p>\n<p style=\"text-align: center;\"><a class=\"my-button\" href=\"https:\/\/info.sherweb.com\/ai-cybersecurity-guide-msps\">Download Your AI Cybersecurity Guide Now!<\/a><\/p>\n<p style=\"text-align: center;\">\n<style>\n  <!--a.my-button{ background-color: #ed573c; color: #fff; font-family: Tahoma; font-size: 15px; font-weight: 800; font-style: normal; text-decoration: none; padding: 14px 15px; border: 0px solid #000; border-radius: 10px; display: inline-block; box-shadow: 0px 0px 10px 0px #2D2D2D; } a.my-button:hover{ background-color: #ef7363; } a.my-button:active{ transform: scale(0.95); }--><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\"><\/span><br \/><\/style><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity and access management (IAM) has moved to the front lines of AI readiness. As more busine","protected":false},"author":177,"featured_media":25339,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[751],"tags":[1071,1098,1072,717,921],"class_list":["post-25337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office-365","tag-ai","tag-ai-readiness","tag-copilot","tag-microsoft-365","tag-microsoft-365-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure AI adoption: MFA &amp; Conditional Access for MSPs | Sherweb<\/title>\n<meta name=\"description\" content=\"Strengthen AI identity security. Learn how MSPs can protect Copilot and M365 with MFA, Conditional Access, and smarter access controls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure AI adoption: MFA &amp; Conditional Access for MSPs | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Strengthen AI identity security. Learn how MSPs can protect Copilot and M365 with MFA, Conditional Access, and smarter access controls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-24T21:16:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-28T06:22:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\"},\"headline\":\"MFA &#038; Conditional Access: The AI security essentials MSPs can&#8217;t ignore\",\"datePublished\":\"2025-02-24T21:16:30+00:00\",\"dateModified\":\"2025-03-28T06:22:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/\"},\"wordCount\":1135,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg\",\"keywords\":[\"AI\",\"AI Readiness\",\"Copilot\",\"Microsoft 365\",\"Microsoft 365 security\"],\"articleSection\":[\"Microsoft 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/\",\"url\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/\",\"name\":\"Secure AI adoption: MFA & Conditional Access for MSPs | Sherweb\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg\",\"datePublished\":\"2025-02-24T21:16:30+00:00\",\"dateModified\":\"2025-03-28T06:22:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\"},\"description\":\"Strengthen AI identity security. Learn how MSPs can protect Copilot and M365 with MFA, Conditional Access, and smarter access controls.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage\",\"url\":\"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg\",\"contentUrl\":\"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg\",\"width\":2400,\"height\":920,\"caption\":\"AI identity security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sherweb.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Ecosystem\",\"item\":\"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft 365\",\"item\":\"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/office-365\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MFA &#038; Conditional Access: The AI security essentials MSPs can&#8217;t ignore\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\",\"url\":\"https:\/\/www.sherweb.com\/blog\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/the-sherweb-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure AI adoption: MFA & Conditional Access for MSPs | Sherweb","description":"Strengthen AI identity security. Learn how MSPs can protect Copilot and M365 with MFA, Conditional Access, and smarter access controls.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/","og_locale":"en_US","og_type":"article","og_title":"Secure AI adoption: MFA & Conditional Access for MSPs | Sherweb","og_description":"Strengthen AI identity security. Learn how MSPs can protect Copilot and M365 with MFA, Conditional Access, and smarter access controls.","og_url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2025-02-24T21:16:30+00:00","article_modified_time":"2025-03-28T06:22:57+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"MFA &#038; Conditional Access: The AI security essentials MSPs can&#8217;t ignore","datePublished":"2025-02-24T21:16:30+00:00","dateModified":"2025-03-28T06:22:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/"},"wordCount":1135,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg","keywords":["AI","AI Readiness","Copilot","Microsoft 365","Microsoft 365 security"],"articleSection":["Microsoft 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/","url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/","name":"Secure AI adoption: MFA & Conditional Access for MSPs | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg","datePublished":"2025-02-24T21:16:30+00:00","dateModified":"2025-03-28T06:22:57+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Strengthen AI identity security. Learn how MSPs can protect Copilot and M365 with MFA, Conditional Access, and smarter access controls.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Cybersecurity-for-AI-blog-2-1200x480-1.jpg","width":2400,"height":920,"caption":"AI identity security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/ai-identity-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Ecosystem","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/"},{"@type":"ListItem","position":3,"name":"Microsoft 365","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/office-365\/"},{"@type":"ListItem","position":4,"name":"MFA &#038; Conditional Access: The AI security essentials MSPs can&#8217;t ignore"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["AI","AI Readiness","Copilot","Microsoft 365","Microsoft 365 security"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=25337"}],"version-history":[{"count":3,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25337\/revisions"}],"predecessor-version":[{"id":25342,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25337\/revisions\/25342"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/25339"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=25337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=25337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=25337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}