Skip to content

Commit 17b264e

Browse files
Merge pull request #225975 from v-edmckillop/patch-103
Update 1-secure-access-posture.md
2 parents 43b01a2 + 8751fa6 commit 17b264e

File tree

1 file changed

+49
-45
lines changed

1 file changed

+49
-45
lines changed
Lines changed: 49 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -1,94 +1,98 @@
11
---
2-
title: Determine your security posture for external collaboration with Azure Active Directory
3-
description: Before you can execute an external access security plan, you must determine what you are trying to achieve.
2+
title: Determine your security posture for external access with Azure Active Directory
3+
description: Learn about governance of external access and assessing collaboration needs, by scenario
44
services: active-directory
5-
author: janicericketts
5+
author: jricketts
66
manager: martinco
77
ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 08/19/2022
11+
ms.date: 02/03/2023
1212
ms.author: jricketts
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Determine your security posture for external access
18+
# Determine your security posture for external access with Azure Active Directory
1919

20-
As you consider governing external access, you’ll need to assess the security and collaboration needs for your organization overall, and within each scenario. At the organizational level, consider the amount of control you need your IT team to have over day-to-day collaboration. Organizations in regulated industries may require more IT control. For example, a defense contractor may be required to positively identify and document each external user, their access, and the removal of access. This requirement may be on all access, or on specific scenarios or workloads. On the other end of the spectrum, a consulting firm may generally allow end users to determine the external users they need to collaborate with, within certain IT guard rails.
20+
As you consider the governance of external access, assess your organization's security and collaboration needs, by scenario. You can start with the level of control the IT team has over the day-to-day collaboration of end users. Organizations in highly regulated industries might require more IT team control. For example, defense contractors can have a requirement to positively identify and document external users, their access, and access removal: all access, scenario-based, or workloads. Consulting agencies can use certain features to allow end users to determine the external users they collaborate with.
2121

22-
![IT versus end-user control of collaboration](media/secure-external-access/1-overall-control.png)
22+
![Bar graph of the span from full IT team control, to end-user self service.](media/secure-external-access/1-overall-control.png)
2323

24-
> [!NOTE]
25-
> Overly tight control on collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as too onerous, end users tend to go around IT provided systems to get their jobs done, by for example emailing unsecured documents.
26-
27-
## Think in terms of scenarios
24+
> [!NOTE]
25+
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels. An example is end users sending unsecured documents by email.
2826
29-
In many cases IT can delegate partner access, at least in some scenarios, while providing guard rails for security. The IT guard rails can be help ensure that intellectual property stays secure, while empowering employees to collaborate with partners to get work done.
27+
## Scenario-based planning
3028

31-
As you consider the scenarios within your organization, assess the need for employee versus business partner access to resources. A bank may have compliance needs that restrict access to certain resources, like user account information, to a small group of internal employees. Conversely, the same bank may enable delegated access for partners working on a marketing campaign.
29+
IT teams can delegate partner access to empower employees to collaborate with partners. This delegation can occur while maintaining sufficient security to protect intellectual property.
3230

33-
![continuum of governance per scenario](media\secure-external-access\1-scenarios.png)
31+
Compile and assess your organizations scenarios to help assess employee versus business partner access to resources. Financial institutions might have compliance standards that restrict employee access to resources such as account information. Conversely, the same institutions can enable delegated partner access for projects such as marketing campaigns.
3432

35-
In each scenario, consider
33+
![Diagram of a balance of IT team goverened access to partner self-service.](media/secure-external-access/1-scenarios.png)
3634

37-
* the sensitivity of the information at risk
35+
### Scenario considerations
3836

39-
* whether you need to restrict what partners can see about other users
37+
Use the following list to help measure the level of access control.
4038

41-
* the cost of a breach vs the weight of centralized control and end-user friction
39+
* Information sensitivity, and associated risk of its exposure
40+
* Partner access to information about other end users
41+
* The cost of a breach versus the overhead of centralized control and end-user friction
4242

43-
You may also start with centrally managed controls to meet compliance targets and delegate control to end users over time. All access management models may simultaneously coexist within an organization.
43+
Organizations can start with highly managed controls to meet compliance targets, and then delegate some control to end users, over time. There can be simultaneous access-management models in an organization.
4444

45-
The use of [partner managed credentials](../external-identities/what-is-b2b.md) provides your organization with an essential signal that terminates access to your resources once the external user has lost access to the resources of their own company.
45+
> [!NOTE]
46+
> Partner-managed credentials are a method to signal the termination of access to resources, when an external user loses access to resources in their own company. Learn more: [B2B collaboration overview](../external-identities/what-is-b2b.md)
4647
47-
## Goals of securing external access
48+
## External-access security goals
4849

49-
The goals of IT-governed and delegated access differ.
50+
The goals of IT-governed and delegated access differ. The primary goals of IT-governed access are:
5051

51-
**The primary goals of IT-governed access are to:**
52+
* Meet governance, regulatory, and compliance (GRC) targets
53+
* High level of control over partner access to information about end users, groups, and other partners
5254

53-
* Meet governance, regulatory, and compliance (GRC) targets.
55+
The primary goals of delegating access are:
5456

55-
* Tightly control partner access and what partners can see about member users, groups, and other partners.
57+
* Enable business owners to determine collaboration partners, with security constraints
58+
* Enable partners to request access, based on rules defined by business owners
5659

57-
**The primary goals of delegating access are to:**
60+
### Common goals
5861

59-
* Enable business owners to govern who they collaborate with, within IT constraints.
62+
#### Control access to applications, data, and content
6063

61-
* Enable business partners to request access based on rules defined by business owners.
64+
Levels of control can be accomplished through various methods, depending on your version of Azure AD and Microsoft 365.
6265

63-
Whichever you enact for your organization and scenarios you'll need to:
66+
* [Azure AD plans and pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing)
67+
* [Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
6468

65-
* **Control access to applications, data, and content**. This can be accomplished through a variety of methods, depending on your versions of [Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing) and [Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
69+
#### Reduce attack surface
6670

67-
* **Reduce the attack surface**. [Privileged identity management](../privileged-identity-management/pim-configure.md), [data loss prevention (DLP),](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) and [encryption capabilities](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) reduce the attack surface.
71+
* [What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md) - manage, control, and monitor access to resources in Azure AD, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune
72+
* [Data loss prevention in Exchange Server](/exchange/policy-and-compliance/data-loss-prevention/data-loss-prevention?view=exchserver-2019&preserve-view=true)
6873

69-
* **Regularly review activity and audit log to confirm compliance**. IT can delegate access decisions to business owners through entitlement management while access reviews provide a way to periodically confirm continued access. Automated data classification with sensitivity labels helps to automate encryption of sensitive content making it easy for employee end users to comply.
74+
#### Confirm compliance with activity and audit log reviews
7075

71-
## Next steps
76+
IT teams can delegate access decisions to business owners through entitlement management, while access reviews help confirm continued access. You can use automated data classification with sensitivity labels to automate the encryption of sensitive content, easing compliance for end users.
7277

73-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
78+
## Next steps
7479

75-
1. [Determine your security posture for external access](1-secure-access-posture.md) (You are here.)
80+
See the following articles to learn more about securing external access to resources. We recommend you follow the listed order.
7681

77-
2. [Discover your current state](2-secure-access-current-state.md)
82+
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md) (You're here)
7883

79-
3. [Create a governance plan](3-secure-access-plan.md)
84+
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
8085

81-
4. [Use groups for security](4-secure-access-groups.md)
86+
3. [Create a security plan for external access](3-secure-access-plan.md)
8287

83-
5. [Transition to Azure AD B2B](5-secure-access-b2b.md)
88+
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
8489

85-
6. [Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
90+
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
8691

87-
7. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
92+
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
8893

89-
8. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
94+
7. [Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
9095

91-
9. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
92-
96+
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
9397

94-
98+
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive with Azure AD](9-secure-access-teams-sharepoint.md)

0 commit comments

Comments
 (0)