SlideShare ist ein Scribd-Unternehmen logo
1 von 32
@m365blr #M365BLR
@m365blr #M365BLR
@m365blr #M365BLR
Thank You Sponsors!
@m365blr #M365BLR
A One Day
Virtual Event
• Hands on sessions by experts and community leaders
• Deep-dive into Microsoft 365 Services
• Focus on
• Microsoft Teams
• SharePoint
Win exiting prizes!
LENOVO TAB M10 ECHO DOT 4th
GEN
• Microsoft Power Platform
EVENT T-SHIRTS
@m365blr #M365BLR
SPEAKERS PANEL
Secure your M365 resources
using Azure AD Identity
governance
Track Number : 2
10:05 AM -10:50 AM IST Vignesh Ganesan
Enterprise Cloud Architect & Technology Strategist
Session No.1
@m365blr #M365BLR
Secure your M365
resources using Azure AD
Identity governance
@m365blr #M365BLR
About Me
@m365blr #M365BLR
Azure AD -A complete IAM solution
@m365blr #M365BLR
Azure AD DS
B2B
collaboration
Azure AD B2C
Azure AD offers depth and breadth
Identity and access management for employees, partners, and customers
Dynamic
groups
Self-service
capabilities
Azure AD
Connect
Conditional
access
Microsoft
Authenticator—
password-less
access
Azure AD Join
MDM-auto
enrollment/
Enterprise State
Roaming
Security
reporting
Identity
protection
Privileged
identity
management
HR App
integration
Access
reviews
Connect
health
Remote access
to on-premises
apps
Addition of
custom cloud
apps
Access
panel/MyApps
Provisioning/
deprovisioning
Group-based
licensing
Multi-factor
authentication
Office 365
App Launcher
SSO to
SaaS
@m365blr #M365BLR
Introduction to Azure AD Identity
Governance
Who has / should have access
to which resources?
What are they doing
with that access?
Are there effective
organizational controls for
managing access?
Can auditors verify that
the controls are working?
Productivity
Security
Timely access to the
right resources
The right people have the
right access to resources
@m365blr #M365BLR
Governance is a journey ,not a destination
Identity lifecycle
facilities collaboration
Access lifecycle
provides seamless and
efficient access
Privileged access lifecycle
addresses risks inherent in
administration
@m365blr #M365BLR
Case study
A company named Vignesh Ganesan is using Office 365 and collaborating with other
organizations to share data on a campaign
Challenges
• Recent audit discovered too many users had standing privileged access
• Legal regulations require users to sign a Non-disclosure agreement
before having access
• Need to streamline the process of getting resources and permissions
assigned to users
• No control over external user’s lifecycle, will like more visibility on guest
activity
@m365blr #M365BLR
We will be focusing about these 4 diff solutions today
Azure AD
Privileged
Identity
Management
Azure AD
Terms of use
Azure AD
Entitlement
Management
Azure AD
Access
reviews
Everything that I’ll be discussing about today needs an Azure AD P2 license !
@m365blr #M365BLR
Challenge 1:
Recent audit discovered too many users had standing privileged access
@m365blr #M365BLR
Privileged Identity Management (PIM)
Ensure admins have the right access
Discover privileged roles (Azure AD ,Office 365 &Azure)
Reduce attack surface-reduce risk
Role activation “Just In Time”
Audit reports for compliance
@m365blr #M365BLR
Challenge 2:
Legal regulations require users to sign a Non-disclosure agreement before
having access
@m365blr #M365BLR
• Configure a terms of use by uploading a
PDF document(s) for each necessary
language
• Target to users, groups or applications
using conditional access
• Enforce acceptance of terms for users in
scope
• Audit events show who accepted / which
terms / when
Terms of Use
Simple method to present information to end users and requiring
their consent after authentication and prior to getting access
@m365blr #M365BLR
Terms of Use
Common reasons : End user experience:
@m365blr #M365BLR
Terms of use deployment
• Terms of use in multiple languages
• Conditional Access policy to enforce per user ,per device, on all/certain apps
• User reads and consents
• Review reports and audit logs
@m365blr #M365BLR
Challenge 3:
Need to streamline the process of getting resources and permissions
assigned to users
@m365blr #M365BLR
Azure AD Entitlement Management
Catalogs of named access rights across resources that a user can be granted
access to , through a request / approval process
@m365blr #M365BLR
Challenge 4:
No control over external user’s lifecycle, will like more visibility on guest
activity
@m365blr #M365BLR
Azure AD Access Reviews
• Provide oversight for which users have
access to what resources
• Prompts users to ensure their access is
limited to the resources they need
• Applies to employees and guest users
Marketing Operations
@m365blr #M365BLR
Access Reviews
Provide oversight for which
users have access to what
resources
Prompts users to ensure
their access is limited to the
resources they need
Applies to employees
and guest users
@m365blr #M365BLR
Access reviews scenarios
@m365blr #M365BLR
Azure AD Access Reviews
Recertify : attest and audit continued access
• Review Office 365 group members, security group members ,
and users assigned to applications
• Optionally, scope the reviews to just guests
• Select reviewers from the resource
Group owners
Members review their own access
Select other specific individuals
@m365blr #M365BLR
Access Reviews process
• Identify resource where users have access
• Identify the business owner for confirming user’s access
• Business owners review access on a regular basis
• Reviewers can line-item deny users' access, or give justification
• Upon completion of the review, access is removed for denied users
• Results are retained for subsequent use in auditor investigation
@m365blr #M365BLR
Session takeaways
• Azure AD can help address Identity governance requirements
• Create access reviews and gain better control of the user lifecycle
• Go-do: discover privileged account in your tenant and convert them to eligible
• Ensure that all your compliance requirements using Azure AD
@m365blr #M365BLR
The power of Azure AD Identity governance
Azure AD
Privileged
Identity
Management
Azure AD
Terms of use
Azure AD
Entitlement
Management
Azure AD
Access
reviews
• Govern the identity lifecycle
• Govern access lifecycle
• Secure privileged access for administration
• Meet compliance requirements
@m365blr #M365BLR
Ref
• https://docs.microsoft.com/en-us/azure/active-directory/governance/
• https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-
management/pim-configure
• https://docs.microsoft.com/en-us/azure/active-directory/conditional-
access/terms-of-use
• https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement-
management-overview
• https://docs.microsoft.com/en-us/azure/active-directory/governance/access-
reviews-overview
• https://azure.microsoft.com/en-in/pricing/details/active-directory/#pricing
@m365blr #M365BLR
Feedback
https://bit.ly/feedback-m365saturday2021blr
@m365blr #M365BLR
SPEAKERS PANEL
People Powered Workspace
using Microsoft Viva
Track Number: 2
Session Time : 10:55 AM to 11:40 AM
Sathish Nadarajan
Solution Architect
Next Session
@m365blr #M365BLR
Thank you
Don’t forget to participate in the Quiz at the end and
receive exciting prizes

Weitere ähnliche Inhalte

Was ist angesagt?

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 

Was ist angesagt? (20)

48. Azure Active Directory - Part 1
48. Azure Active Directory - Part 148. Azure Active Directory - Part 1
48. Azure Active Directory - Part 1
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Microsoft Defender for Endpoint
Microsoft Defender for EndpointMicrosoft Defender for Endpoint
Microsoft Defender for Endpoint
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Azure information protection
Azure information protectionAzure information protection
Azure information protection
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity Management
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Azure Governance
Azure GovernanceAzure Governance
Azure Governance
 

Ähnlich wie Secure your M365 resources using Azure AD Identity Governance

Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
WSO2
 

Ähnlich wie Secure your M365 resources using Azure AD Identity Governance (20)

Global azure virtual 2021 - Azure Lighthouse
Global azure virtual 2021 - Azure LighthouseGlobal azure virtual 2021 - Azure Lighthouse
Global azure virtual 2021 - Azure Lighthouse
 
Explore RBAC and PIM in M365
Explore RBAC and PIM in M365Explore RBAC and PIM in M365
Explore RBAC and PIM in M365
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
IdentityDays2022 - Gestion des privilèges sur le Cloud Microsoft
IdentityDays2022 - Gestion des privilèges sur le Cloud MicrosoftIdentityDays2022 - Gestion des privilèges sur le Cloud Microsoft
IdentityDays2022 - Gestion des privilèges sur le Cloud Microsoft
 
Getting started with microsoft azure in 30 mins
Getting started with microsoft azure in 30 minsGetting started with microsoft azure in 30 mins
Getting started with microsoft azure in 30 mins
 
TechDays Finland 2020: Azuren tietoturva haltuun!
TechDays Finland 2020: Azuren tietoturva haltuun!TechDays Finland 2020: Azuren tietoturva haltuun!
TechDays Finland 2020: Azuren tietoturva haltuun!
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
 
Purview Days 2023 - Graph Notifications - A better way to process M365 Audit ...
Purview Days 2023 - Graph Notifications - A better way to process M365 Audit ...Purview Days 2023 - Graph Notifications - A better way to process M365 Audit ...
Purview Days 2023 - Graph Notifications - A better way to process M365 Audit ...
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
M365VM22-Johnny Lopez - Teams Connect Overview.pptx
M365VM22-Johnny Lopez - Teams Connect Overview.pptxM365VM22-Johnny Lopez - Teams Connect Overview.pptx
M365VM22-Johnny Lopez - Teams Connect Overview.pptx
 
Supporting third-party access and sharing in Microsoft Teams - Teams Day Onli...
Supporting third-party access and sharing in Microsoft Teams - Teams Day Onli...Supporting third-party access and sharing in Microsoft Teams - Teams Day Onli...
Supporting third-party access and sharing in Microsoft Teams - Teams Day Onli...
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
 
Multi-Tenant Identity and Azure Resource Governance - ReBUILD 2019
Multi-Tenant Identity and Azure Resource Governance - ReBUILD 2019Multi-Tenant Identity and Azure Resource Governance - ReBUILD 2019
Multi-Tenant Identity and Azure Resource Governance - ReBUILD 2019
 
How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?
 
Azure Saturday: External Collaboration With Azure AD B2B
Azure Saturday:  External Collaboration With Azure AD B2BAzure Saturday:  External Collaboration With Azure AD B2B
Azure Saturday: External Collaboration With Azure AD B2B
 
2 speed it powered by microsoft azure
2 speed it powered by microsoft azure2 speed it powered by microsoft azure
2 speed it powered by microsoft azure
 
Administering power platform deployment planning
Administering power platform deployment planningAdministering power platform deployment planning
Administering power platform deployment planning
 
June 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know WebinarJune 2022 CIAOPS Need to Know Webinar
June 2022 CIAOPS Need to Know Webinar
 

Mehr von Vignesh Ganesan I Microsoft MVP

Mehr von Vignesh Ganesan I Microsoft MVP (20)

Getting your enterprise ready for Microsoft 365 Copilot
Getting your enterprise ready for Microsoft 365 CopilotGetting your enterprise ready for Microsoft 365 Copilot
Getting your enterprise ready for Microsoft 365 Copilot
 
How to use Advanced eDiscovery for Microsoft Teams
How to use Advanced eDiscovery for Microsoft TeamsHow to use Advanced eDiscovery for Microsoft Teams
How to use Advanced eDiscovery for Microsoft Teams
 
Advanced eDiscovery with Microsoft Teams
Advanced eDiscovery with  Microsoft TeamsAdvanced eDiscovery with  Microsoft Teams
Advanced eDiscovery with Microsoft Teams
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory
 
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...What's new in Security and Compliance in SharePoint , OneDrive for Business &...
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
 
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
Introduction to Microsoft 365 bookings and how to use bookings app in Teams f...
 
Skype for business to Microsoft Teams- Guidance for a successful upgrade
Skype for business to Microsoft Teams- Guidance for a successful upgradeSkype for business to Microsoft Teams- Guidance for a successful upgrade
Skype for business to Microsoft Teams- Guidance for a successful upgrade
 
Live events in Microsoft Teams , Yammer and Stream- When to use what
Live events in Microsoft Teams , Yammer and Stream- When to use whatLive events in Microsoft Teams , Yammer and Stream- When to use what
Live events in Microsoft Teams , Yammer and Stream- When to use what
 
What's new in Microsoft Teams
What's new in Microsoft Teams What's new in Microsoft Teams
What's new in Microsoft Teams
 
What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx What's new and what's next in SharePoint Development for Enterprise & SPFx
What's new and what's next in SharePoint Development for Enterprise & SPFx
 
Building solutions with SPFx that work across SharePoint and Teams
Building solutions with SPFx that work across SharePoint and TeamsBuilding solutions with SPFx that work across SharePoint and Teams
Building solutions with SPFx that work across SharePoint and Teams
 
Getting started with Microsoft Search
Getting started with Microsoft Search Getting started with Microsoft Search
Getting started with Microsoft Search
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?
 
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
Introduction to Microsoft Kaizala And How to Empower Your Mobile Workforce us...
 
How to succesfully drive Office 365 adpotion in your organization ?
How to succesfully drive Office 365 adpotion in your organization ?How to succesfully drive Office 365 adpotion in your organization ?
How to succesfully drive Office 365 adpotion in your organization ?
 
Overview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public PreviewOverview of SharePoint Server 2019 Public Preview
Overview of SharePoint Server 2019 Public Preview
 
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
SharePoint Saturday Bangalore -Overview of SharePoint Server 2019
 
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
Accelerate your journey to the cloud using the Microsoft SharePoint Migration...
 
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
Part 2 -Deep Dive into the new features of Sharepoint Online and OneDrive for...
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Secure your M365 resources using Azure AD Identity Governance

  • 3. @m365blr #M365BLR A One Day Virtual Event • Hands on sessions by experts and community leaders • Deep-dive into Microsoft 365 Services • Focus on • Microsoft Teams • SharePoint Win exiting prizes! LENOVO TAB M10 ECHO DOT 4th GEN • Microsoft Power Platform EVENT T-SHIRTS
  • 4. @m365blr #M365BLR SPEAKERS PANEL Secure your M365 resources using Azure AD Identity governance Track Number : 2 10:05 AM -10:50 AM IST Vignesh Ganesan Enterprise Cloud Architect & Technology Strategist Session No.1
  • 5. @m365blr #M365BLR Secure your M365 resources using Azure AD Identity governance
  • 7. @m365blr #M365BLR Azure AD -A complete IAM solution
  • 8. @m365blr #M365BLR Azure AD DS B2B collaboration Azure AD B2C Azure AD offers depth and breadth Identity and access management for employees, partners, and customers Dynamic groups Self-service capabilities Azure AD Connect Conditional access Microsoft Authenticator— password-less access Azure AD Join MDM-auto enrollment/ Enterprise State Roaming Security reporting Identity protection Privileged identity management HR App integration Access reviews Connect health Remote access to on-premises apps Addition of custom cloud apps Access panel/MyApps Provisioning/ deprovisioning Group-based licensing Multi-factor authentication Office 365 App Launcher SSO to SaaS
  • 9. @m365blr #M365BLR Introduction to Azure AD Identity Governance Who has / should have access to which resources? What are they doing with that access? Are there effective organizational controls for managing access? Can auditors verify that the controls are working? Productivity Security Timely access to the right resources The right people have the right access to resources
  • 10. @m365blr #M365BLR Governance is a journey ,not a destination Identity lifecycle facilities collaboration Access lifecycle provides seamless and efficient access Privileged access lifecycle addresses risks inherent in administration
  • 11. @m365blr #M365BLR Case study A company named Vignesh Ganesan is using Office 365 and collaborating with other organizations to share data on a campaign Challenges • Recent audit discovered too many users had standing privileged access • Legal regulations require users to sign a Non-disclosure agreement before having access • Need to streamline the process of getting resources and permissions assigned to users • No control over external user’s lifecycle, will like more visibility on guest activity
  • 12. @m365blr #M365BLR We will be focusing about these 4 diff solutions today Azure AD Privileged Identity Management Azure AD Terms of use Azure AD Entitlement Management Azure AD Access reviews Everything that I’ll be discussing about today needs an Azure AD P2 license !
  • 13. @m365blr #M365BLR Challenge 1: Recent audit discovered too many users had standing privileged access
  • 14. @m365blr #M365BLR Privileged Identity Management (PIM) Ensure admins have the right access Discover privileged roles (Azure AD ,Office 365 &Azure) Reduce attack surface-reduce risk Role activation “Just In Time” Audit reports for compliance
  • 15. @m365blr #M365BLR Challenge 2: Legal regulations require users to sign a Non-disclosure agreement before having access
  • 16. @m365blr #M365BLR • Configure a terms of use by uploading a PDF document(s) for each necessary language • Target to users, groups or applications using conditional access • Enforce acceptance of terms for users in scope • Audit events show who accepted / which terms / when Terms of Use Simple method to present information to end users and requiring their consent after authentication and prior to getting access
  • 17. @m365blr #M365BLR Terms of Use Common reasons : End user experience:
  • 18. @m365blr #M365BLR Terms of use deployment • Terms of use in multiple languages • Conditional Access policy to enforce per user ,per device, on all/certain apps • User reads and consents • Review reports and audit logs
  • 19. @m365blr #M365BLR Challenge 3: Need to streamline the process of getting resources and permissions assigned to users
  • 20. @m365blr #M365BLR Azure AD Entitlement Management Catalogs of named access rights across resources that a user can be granted access to , through a request / approval process
  • 21. @m365blr #M365BLR Challenge 4: No control over external user’s lifecycle, will like more visibility on guest activity
  • 22. @m365blr #M365BLR Azure AD Access Reviews • Provide oversight for which users have access to what resources • Prompts users to ensure their access is limited to the resources they need • Applies to employees and guest users Marketing Operations
  • 23. @m365blr #M365BLR Access Reviews Provide oversight for which users have access to what resources Prompts users to ensure their access is limited to the resources they need Applies to employees and guest users
  • 25. @m365blr #M365BLR Azure AD Access Reviews Recertify : attest and audit continued access • Review Office 365 group members, security group members , and users assigned to applications • Optionally, scope the reviews to just guests • Select reviewers from the resource Group owners Members review their own access Select other specific individuals
  • 26. @m365blr #M365BLR Access Reviews process • Identify resource where users have access • Identify the business owner for confirming user’s access • Business owners review access on a regular basis • Reviewers can line-item deny users' access, or give justification • Upon completion of the review, access is removed for denied users • Results are retained for subsequent use in auditor investigation
  • 27. @m365blr #M365BLR Session takeaways • Azure AD can help address Identity governance requirements • Create access reviews and gain better control of the user lifecycle • Go-do: discover privileged account in your tenant and convert them to eligible • Ensure that all your compliance requirements using Azure AD
  • 28. @m365blr #M365BLR The power of Azure AD Identity governance Azure AD Privileged Identity Management Azure AD Terms of use Azure AD Entitlement Management Azure AD Access reviews • Govern the identity lifecycle • Govern access lifecycle • Secure privileged access for administration • Meet compliance requirements
  • 29. @m365blr #M365BLR Ref • https://docs.microsoft.com/en-us/azure/active-directory/governance/ • https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity- management/pim-configure • https://docs.microsoft.com/en-us/azure/active-directory/conditional- access/terms-of-use • https://docs.microsoft.com/en-us/azure/active-directory/governance/entitlement- management-overview • https://docs.microsoft.com/en-us/azure/active-directory/governance/access- reviews-overview • https://azure.microsoft.com/en-in/pricing/details/active-directory/#pricing
  • 31. @m365blr #M365BLR SPEAKERS PANEL People Powered Workspace using Microsoft Viva Track Number: 2 Session Time : 10:55 AM to 11:40 AM Sathish Nadarajan Solution Architect Next Session
  • 32. @m365blr #M365BLR Thank you Don’t forget to participate in the Quiz at the end and receive exciting prizes

Hinweis der Redaktion

  1. All this and more for less $$$ than Okta
  2. Talk Track: Azure AD is your universal platform – which means, helping you manage and secure identities and access to all applications, for any user from any location or device, with just one set of credentials With Azure AD as the control plane to manage all of your digital estate you are able to automatically block attacks through adaptive security policies and protect your identities and data in the cloud At the same time, you are also improving the experience for all of your users. You are letting your employees work the way they want, enabling better collaboration with your business partners, and facilitating more direct and personalized relationships with all of your customers.
  3. Talk Track: Azure AD is your universal platform – which means, helping you manage and secure identities and access to all applications, for any user from any location or device, with just one set of credentials With Azure AD as the control plane to manage all of your digital estate you are able to automatically block attacks through adaptive security policies and protect your identities and data in the cloud At the same time, you are also improving the experience for all of your users. You are letting your employees work the way they want, enabling better collaboration with your business partners, and facilitating more direct and personalized relationships with all of your customers.
  4. What about admin accounts? You don’t want privileged accounts to have unnecessary access to critical apps and infrastructure as it can put your organization at risk. Use our discovery tools to see how many admins and roles are in your system in Azure AD. Switch to a Least Privilege access model that only gives access when needed, using automated tools and alerts. 
  5. Talk Track: Azure AD is your universal platform – which means, helping you manage and secure identities and access to all applications, for any user from any location or device, with just one set of credentials With Azure AD as the control plane to manage all of your digital estate you are able to automatically block attacks through adaptive security policies and protect your identities and data in the cloud At the same time, you are also improving the experience for all of your users. You are letting your employees work the way they want, enabling better collaboration with your business partners, and facilitating more direct and personalized relationships with all of your customers.
  6. Talk Track: Azure AD is your universal platform – which means, helping you manage and secure identities and access to all applications, for any user from any location or device, with just one set of credentials With Azure AD as the control plane to manage all of your digital estate you are able to automatically block attacks through adaptive security policies and protect your identities and data in the cloud At the same time, you are also improving the experience for all of your users. You are letting your employees work the way they want, enabling better collaboration with your business partners, and facilitating more direct and personalized relationships with all of your customers.
  7. Implement Azure AD access reviews With Azure AD access reviews, you can manage access package and group memberships, access to enterprise applications, and privileged role assignments to make sure you maintain a security standard. Regular oversight by the users themselves, resource owners, and other reviewers ensure that users don't retain access for extended periods of time when they no longer need it.