Microsoft Entra Permissions Management has one mission; to provide a single platform to manage permissions for any identity or resource – users and workloads – across Microsoft Azure, Amazon Web Services (AWS) and Google Cloud Platform (GCP). Entra Permissions Management continuously monitors
activity and behaviour to identify and assess risks and provide visibility.
As more services move to the cloud, users and workloads continue to accumulate permissions over time. Increasing identities and resources to manage, paired with inconsistent access management models across different public clouds, create greater complexity and a lack of visibility for IT and security teams. Left unused and unmonitored, these permissions become prime targets for attackers or risk areas for human error.
- The background of Microsoft Entra Permissions Management
- The Microsoft Entra Product family
- What constitutes an Identity?
- Technical and Operational Challenges
- An Overview of the Microsoft Entra Permissions Management Portal
- Persona Based Use Cases
- Configuration Security (CIS) Best Practices
CWSI’s Delivery of Microsoft Entra Permissions Management.
Step 1- Engage. CWSI will establish and configure your trial instance. Once the ID is verified on your Azure AD tenant, Microsoft Entra Permissions Management will start to gather credentials and environment details to set up and run your sample application. Within a few hours of onboarding, Entra Permissions Management will generate a comprehensive Permissions Analytics Report to identify your organisation’s areas of greatest risk, with actionable insights to begin remediation and secure your environment.
Step 2- Review. From the data gathered, CWSI will generate reports through the system and provide an initial review of the findings. From the review, we will build a plan to lead the next steps. Elements such as Internal Risk, Partner Access, Machine ID and Keys are reviewed. A target security score is assigned, with projects identified to achieve this. Each customer’s plan is unique to their environment.
Step 3- Support. Once the priority risks have been mitigated, CWSI will help you create a plan to bring a more structured administration program into production as part of a DevSecOps approach. Typically, we will provide a continued escalation and planning program to ensure long term compliance.