Governed “revoke sessions” for compromised users: ticket triggers, Autom Mate executes
Cloud identity incidents often stall at the same point: the service desk can identify a compromised user quickly, but the actual containment steps (block sign-in, revoke sessions, reset auth methods, notify stakeholders, document evidence) are scattered across portals and scripts.
Worse: blocking sign-in alone doesn’t necessarily terminate existing sessions—you often need an explicit “revoke sessions” step to cut off active tokens. (learn.microsoft.com) This is exactly the kind of workflow where AI can suggest actions, but you still need a deterministic execution layer with approvals, policy checks, and audit.
This topic proposes Autom Mate as the execution + control layer between AI/ITSM and Entra ID, so containment is fast and governed.
The real problem (what breaks in practice)
- Analysts see “suspicious sign-in / risky user / token theft suspected” and open an ITSM incident.
- The playbook is known, but execution is manual and inconsistent:
- Someone blocks sign-in but forgets to revoke sessions.
- Someone revokes sessions but doesn’t capture evidence in the ticket.
- Someone resets MFA methods without confirming the user’s manager approval.
- AI copilots can draft steps, but AI taking direct action in identity systems is risky (wrong user, wrong tenant, wrong scope, no rollback story).
Microsoft’s own guidance highlights that session tokens can remain valid and that revoking access requires specific actions beyond “disable user.” (learn.microsoft.com)
Proposed end-to-end workflow (Autom Mate-run, ITSM-governed)
1) Trigger
- **Tricident moves to state
Containment Requested(or a custom field likesecurity_action = revoke_sessions). - Autom Mate trigger type: Event/API trigger (ticket webhook)
2) Validation (context + policy checks)
Autom Mate performs deterministic checks before any action:
- Validate the target identity:
- UPN format, tenant domain allowlist
- Confirm user exists in Entra
- Validate ticket context:
- Incident category = “Security / Account Compromise”
- Required fields present (requestor, affected user, justification)
- Policy gate:
- If user is in “Privileged Admin” group → require Security approval + on-call notification
- Ifcount → route to a different playbook (avoid breaking automations)
Autom Mate supports data validation + conditional branching to enforce these gates.
3) Approval (human or rule-based)
- Approval path:
- Standard users: Security on-call approval in Microsoft Teams
- Privileged uead dual approval
- Autom Mate execution: Use an approval step integrated with Teams, then continue only on explicit approval.
4) Deterministic execution across systems (Autom Mate is the execution layer)
Once approved, Autom Mate executes a fixed, auditable sequence:
-
ServiceNow (Autom Mate library)
- Add work note: “Containment started by Autom Mate; awaiting Entra actions.”
- Set incident to
In Progress / Containment
-
Microsoft Entra ID (REST/HTTP/Webhook action)
- Block sign-in (or disable account per your policy)
- Revoke sessions (explicit step to invalidate active sessions) (learn.microsoft.com)
-
Notifications (Autom Mate library)
- Post to Teams channel: “User contained; sessions revoked; next steps: device check / mailbox review.”
-
ServiceNow (Autom Mate library)
- Update incident with:
tions taken- Correlation IDs from Graph calls
- Next-step checklist
- Update incident with:
5) Logging / audit
- Ation, inputs/outputs, and execution status in its monitoring/logging layer.
- If you run Autom Mate on-prem, you can keep logs in your environment (e.g., Elasticsearch-backed logging).
6) Exception handling / rollback
Autom Mate error handling should be explicit:
- If Graph call fails (429/5xx): retry with backoff, then escalate to on-call with the exact failure payload.
- If “block sign-in” succeeded but “revoke sessions” failed:
- Keep incy Security
- Add a work note: “Partial containment; sessions may still be active.”
Autom Mate supports error handling, retries, fallback actions, and alerting.
Why this is an AI governance issue (not just automation)
- AI is great at deciding “this looks like token theft,” but it’s probabilistic.
- Identity actions are high-impact and must be deterministic:
- correct user
- correct tenant
- correct sequence
- approvals captured
- audit trail preserved
Positioning:
- ** containment
- Autom Mate: enforces policy + approvals, then executes the approved runbook across systems with logs and exception handling
Two mini examples
Mini example 1: “User still has Teams access after block sign-in”
- Trigger: ServiceNow incident tagged
teams-still-active - Autom Mate run:
- Validate user + ticket
- Approval (Security)
- Execute: revoke sessions + force password reset workflow (if your policy allows)
- Update ticket with action timestamps
(Blocking sign-in alone may not end active sessions; revocation is a distinct step.) (learn.microsoft.com)
Mini example 2: “Risky user flagged → contain within 5 minutes, but with guardrails”
- Trigger: SIEM creates ServiceNow incident
- Autom Mate run:
- If user is privileged → require dual approval
- If standard user and risk is ‘high’ → single approval + immediate revoke sessions
- Post status to Teams + keep ticket synchronized
Discussion questions
-
In your org, should “revoke sessions” be auto-approved for standard users when the incident is created by the SOC/SIEM, or always require a human click?
-
What’s your preferred rollback stance: do you ever auto-unblock after a time window, or only via explicit change/approval?