Your organization just successfully passed a penetration test that assessed the robustness of your environment and found that your Conditional Access policies are configured correctly. Following the test, you want to ensure that no unexpected changes will take place in your Conditional Access policies. You’re particularly concerned that policies could be disabled or modified in ways that could leave your organization vulnerable to attacks.