The Weakest Link Is Often in Your Pocket
Government IT teams spend enormous energy hardening servers, patching firewalls, and auditing cloud configurations. But increasingly, the most vulnerable endpoint is a smartphone that an employee uses to approve an MFA request on the way to a meeting. If that phone has been rooted or jailbroken, it may harbor malware, bypass OS security controls, or expose authentication credentials to theft - and without the right safeguards in place, your identity platform has no way of knowing.
Microsoft Entra ID, paired with Microsoft Intune device compliance policies and Microsoft Authenticator, gives state and local government organizations a practical and enforceable answer to this problem. Together, they create a defense-in-depth approach to Zero Trust that evaluates not just who is signing in, but from what device and in what state that device is.
What Is Device Compliance and Why Does It Matter for Zero Trust?
Zero Trust security is built on three core principles: verify explicitly, use least privilege access, and assume breach. The “verify explicitly” pillar is where device compliance lives. Rather than assuming a device is trustworthy because it sits behind the corporate perimeter, Zero Trust demands continuous verification of device health before granting access to any resource.
Microsoft Intune device compliance policies allow IT administrators to define rules that a managed device must satisfy before it is considered compliant. These rules can include:
- Requiring a PIN or biometric to unlock the device
- Requiring device encryption
- Enforcing a minimum OS version
- Requiring that the device is not rooted (Android) or jailbroken (iOS)
- Requiring a device threat level at or below a defined threshold
- Requiring Google Play Protect to be active and configured
When a device is evaluated against these policies, Intune sends the compliance result to Microsoft Entra ID. From there, Conditional Access policies use that compliance signal as a gate - only devices marked as compliant are allowed to complete the sign-in and access organizational resources. Devices that fail compliance are blocked, and the user receives guidance to remediate the issue through the Company Portal.
This is not a soft recommendation - it is a hard enforcement point at the identity layer, independent of what network the device is on.
Rooted and Jailbroken Devices: A Specific and Serious Threat
Rooting an Android device or jailbreaking an iPhone removes the operating system’s built-in security sandbox. These modifications give the device owner - or malicious software installed afterward - elevated privileges that can:
- Intercept authentication tokens and session cookies
- Disable app-level security checks
- Bypass platform encryption protections
- Allow side-loaded apps with no vetting or sandboxing
- Capture screen contents and keystrokes from other apps, including authenticator apps
For a government employee whose phone is registered for MFA or passwordless sign-in, a rooted device represents a direct path to credential theft and account compromise.
Intune’s Android compliance policy supports a Rooted devices - Block setting that marks any rooted Android device as non-compliant. On iOS, equivalent jailbreak detection prevents jailbroken devices from being marked compliant. Paired with a Conditional Access policy requiring device compliance, this means a rooted or jailbroken device is automatically blocked from accessing email, SharePoint, Teams, Azure resources, and any other Entra-protected application - before the user completes authentication.
For organizations that need even deeper signal, integrating a Mobile Threat Defense (MTD) partner with Intune adds real-time threat scoring that flags devices exhibiting suspicious behavior beyond OS modification alone.
Microsoft Authenticator: The Device-Bound Authentication Layer
Microsoft Authenticator is more than a one-time passcode generator. When properly configured, it becomes a device-bound, hardware-backed authentication credential that dramatically raises the bar for attackers.
Key capabilities relevant to government security posture include:
Phishing-Resistant Passkeys (FIDO2): Authenticator supports device-bound passkeys stored in hardware - the iOS Secure Enclave or Android Secure Element/TEE. The passkey never leaves the device, and authentication is backed by biometric or PIN. Attestation is verified through Apple’s App Attest service (iOS) and Google’s Play Integrity API (Android), confirming that the legitimate Authenticator app is creating the credential.
Number Matching for MFA Push Notifications: Number matching requires the user to enter a code displayed on the sign-in screen into the Authenticator app, stopping MFA fatigue attacks where an attacker floods a user with push notifications hoping for an accidental approval.
FIPS 140-Compliant Cryptography: This is a critical point for government agencies. Per NIST Special Publication 800-63B and Executive Order 14028, US government agencies are required to use FIPS 140 validated cryptography. Microsoft Authenticator meets this requirement:
- iOS: Authenticator uses Apple’s CoreCrypto module for FIPS 140-validated cryptography across all authentication methods - passkeys, MFA push, passwordless sign-in, and TOTP.
- Android: Authenticator uses the wolfSSL Inc. cryptographic module, achieving FIPS 140 Security Level 1 compliance for all Entra ID authentications.
Full details on Authenticator’s cryptographic capabilities are documented in the Microsoft Authenticator app overview. This means government organizations can deploy Authenticator knowing the underlying cryptography meets federal standards - without acquiring and distributing physical hardware tokens for every mobile user.
Why This Matters for Government
State and local government organizations operate in a uniquely challenging security environment. They manage highly sensitive data - tax records, law enforcement databases, social services case files, election infrastructure - while supporting a workforce that spans office workers, field staff, and hybrid employees using personal and agency-issued devices.
Several converging pressures make device compliance enforcement not just a best practice but a strategic necessity:
CISA Zero Trust Guidance: The Cybersecurity and Infrastructure Security Agency has published a Zero Trust Maturity Model that explicitly includes device health verification as a maturity dimension. Microsoft’s Zero Trust guidance and resources align directly with this model, providing government IT teams a clear, vendor-supported implementation path.
Executive Order 14028: Federal guidance on Improving the Nation’s Cybersecurity has influenced state and local procurement and security standards. Aligning with FIPS 140 requirements and phishing-resistant MFA is directly responsive to this guidance.
BYOD and Mobile Workforce Realities: Many government employees use personal devices for work tasks, particularly in field operations. A rooted or jailbroken personal phone used to approve MFA requests is indistinguishable from a compliant device without enforcement.
GCC Tenant Compatibility: For organizations in the Microsoft 365 Government Community Cloud (GCC), the tools described in this post - Microsoft Entra ID Conditional Access, Microsoft Intune device compliance policies, and Microsoft Authenticator - are fully available in GCC environments. GCC customers can implement the complete device compliance and rooted device protection stack without waiting for feature parity from commercial cloud.
The Risk of Not Acting: Credential-based attacks remain the leading initial access vector in government breach incidents. A phishing campaign that harvests an employee’s password is neutralized if that password cannot be used without a compliant, non-rooted device with a hardware-bound passkey. Device compliance turns identity into a multi-dimensional gate, not just a password check.
Getting Started: A Practical Path Forward
For government IT leaders ready to strengthen their Zero Trust posture with device compliance, a phased approach reduces risk and operational disruption:
- Inventory and enroll devices - Use Intune to enroll managed devices and enable the Company Portal for BYOD scenarios.
- Define compliance baselines - Create platform-specific compliance policies for Android and iOS that block rooted/jailbroken devices, enforce encryption, and set minimum OS versions. Reference: Create a compliance policy in Intune.
- Run Conditional Access in report-only mode - Before enforcing, use Conditional Access report-only mode to understand how the policy would have applied. This prevents accidental lockouts.
- Enable Authenticator with number matching and passkeys - Update the Authentication Methods policy in the Entra admin center to enable passkeys in Authenticator and enforce number matching for push MFA. Reference: Authentication methods policy.
- Enforce and monitor - Switch policies from report-only to enforcement and monitor compliance status in the Intune admin center and Entra sign-in logs.
The combination of Intune device compliance, rooted device blocking, and Microsoft Authenticator with FIPS 140-compliant hardware-bound passkeys gives state and local government organizations a layered, auditable, and CISA-aligned Zero Trust authentication story. Each authentication request is verified not just by what the user knows, but by the integrity of the device they are using - turning every sign-in into a continuous trust assessment.
For more information, explore the Microsoft Entra documentation hub and the Intune device compliance overview.
