You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Determine your security posture for external access with Azure Active Directory
19
19
20
-
As you consider the governance of external access, assess your organization's security and collaboration needs, by scenario. You can start with the level of control the IT team has over the day-to-day collaboration of end users. Organizations in highly regulated industries might require more IT team control. For example, defense contractors can have a requirement to positively identify and document external users, their access, and access removal: all access, scenario-based, or workloads. By using certain security features, consulting agencies can allow end users to determine the external users they collaborate with.
20
+
As you consider the governance of external access, assess your organization's security and collaboration needs, by scenario. You can start with the level of control the IT team has over the day-to-day collaboration of end users. Organizations in highly regulated industries might require more IT team control. For example, defense contractors can have a requirement to positively identify and document external users, their access, and access removal: all access, scenario-based, or workloads. Consulting agencies can use certain features to allow end users to determine the external users they collaborate with.
21
21
22
22

23
23
@@ -40,7 +40,7 @@ Use the following list to help measure the level of access control.
40
40
* Partner access to information about other end users
41
41
* The cost of a breach versus the overhead of centralized control and end-user friction
42
42
43
-
Organizations can start with highly-managed controls to meet compliance targets, and then delegate some control to end users, over time. There can be simultaneous access-management models in an organization.
43
+
Organizations can start with highlymanaged controls to meet compliance targets, and then delegate some control to end users, over time. There can be simultaneous access-management models in an organization.
44
44
45
45
> [!NOTE]
46
46
> Partner-managed credentials are a method to signal the termination of access to resources, when an external user loses access to resources in their own company. Learn more: [B2B collaboration overview](../external-identities/what-is-b2b.md)
@@ -61,7 +61,7 @@ The primary goals of delegating access are:
61
61
62
62
#### Control access to applications, data, and content
63
63
64
-
This can be accomplished through a variety of methods, depending on your version of Azure AD and Microsoft 365.
64
+
Levels of control can be accomplished through various methods, depending on your version of Azure AD and Microsoft 365.
65
65
66
66
*[Azure AD plans and pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing)
0 commit comments