Skip to content

Commit 4dd7bee

Browse files
authored
Update 1-secure-access-posture.md
1 parent 13c3ebc commit 4dd7bee

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/active-directory/fundamentals/1-secure-access-posture.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,22 +15,22 @@ ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Determine your security posture for external access
18+
# Determine your security posture for external access with Azure Active Directory
1919

20-
As you consider governing external access, you’ll need to assess the security and collaboration needs for your organization overall, and within each scenario. At the organizational level, consider the amount of control you need your IT team to have over day-to-day collaboration. Organizations in regulated industries may require more IT control. For example, a defense contractor may be required to positively identify and document each external user, their access, and the removal of access. This requirement may be on all access, or on specific scenarios or workloads. On the other end of the spectrum, a consulting firm may generally allow end users to determine the external users they need to collaborate with, within certain IT guard rails.
20+
As you consider the governance of external access, assess your organization's security and collaboration needs, by scenario. You can start with the level of control the IT team has over the day-to-day collaboration of end users. Organizations in highly regulated industries might require more IT team control. For example, defense contractors can have a requirement to positively identify and document external users, their access, and access removal: all access, scenario-based, or workloads. By using certain security features, consulting agencies can allow end users to determine the external users they collaborate with.
2121

22-
![IT versus end-user control of collaboration](media/secure-external-access/1-overall-control.png)
22+
![Bar graph of the span from full IT team control, to end-user self service.](media/secure-external-access/1-overall-control.png)
2323

24-
> [!NOTE]
25-
> Overly tight control on collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as too onerous, end users tend to go around IT provided systems to get their jobs done, by for example emailing unsecured documents.
24+
> [!NOTE]
25+
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels to get their jobs done. An example is end users sending unsecured documents by email.
2626
2727
## Think in terms of scenarios
2828

2929
In many cases IT can delegate partner access, at least in some scenarios, while providing guard rails for security. The IT guard rails can be help ensure that intellectual property stays secure, while empowering employees to collaborate with partners to get work done.
3030

3131
As you consider the scenarios within your organization, assess the need for employee versus business partner access to resources. A bank may have compliance needs that restrict access to certain resources, like user account information, to a small group of internal employees. Conversely, the same bank may enable delegated access for partners working on a marketing campaign.
3232

33-
![continuum of governance per scenario](media\secure-external-access\1-scenarios.png)
33+
![continuum of governance per scenario](media/secure-external-access/1-scenarios.png)
3434

3535
In each scenario, consider
3636

0 commit comments

Comments
 (0)