You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md
+18-4Lines changed: 18 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,20 @@ This article describes how to onboard an Amazon Web Services (AWS) account on Pe
18
18
> [!NOTE]
19
19
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20
20
21
+
## Explanation
22
+
23
+
There are several moving parts across AWS and Azure, which are required to be configured before onboarding.
24
+
25
+
* An Azure AD OIDC App
26
+
* An AWS OIDC account
27
+
* An (optional) AWS Master account
28
+
* An (optional) AWS Central logging account
29
+
* An AWS OIDC role
30
+
* An AWS Cross Account role assumed by OIDC role
31
+
32
+
33
+
<!-- diagram from gargi -->
34
+
21
35
## Onboard an AWS account
22
36
23
37
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:
@@ -99,15 +113,15 @@ This article describes how to onboard an Amazon Web Services (AWS) account on Pe
99
113
100
114
Select **Enable AWS SSO checkbox**, if the AWS account access is configured through AWS SSO.
101
115
102
-
Choose from 3 options to manage AWS accounts.
116
+
Choose from three options to manage AWS accounts.
103
117
104
118
#### Option 1: Automatically manage
105
119
106
-
Choose this option to automatically detect and add to monitored account list, without additional configuration. Steps to detect list of accounts and onboard for collection:
120
+
Choose this option to automatically detect and add to the monitored account list, without extra configuration. Steps to detect list of accounts and onboard for collection:
107
121
108
122
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
109
123
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
110
-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
124
+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
111
125
112
126
Any current or future accounts found get onboarded automatically.
113
127
@@ -159,7 +173,7 @@ This option detects all AWS accounts that are accessible through OIDC role acces
159
173
160
174
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
161
175
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
162
-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
176
+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
163
177
- Click Verify and Save.
164
178
- Navigate to newly create Data Collector row under AWSdata collectors.
165
179
- Click on Status column when the row has “Pending” status
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+19-9Lines changed: 19 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,14 @@ This article describes how to onboard a Microsoft Azure subscription or subscrip
18
18
> [!NOTE]
19
19
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20
20
21
+
## Explanation
22
+
23
+
The Permissions Management service is built on Azure, and given you're onboarding your Azure subscriptions to be monitored and managed, setup is simple with few moving parts to configure. Below is what is required to configure onboarding:
24
+
25
+
* When your tenant is onboarded, an application is created in the tenant.
26
+
* This app requires 'reader' permissions on the subscriptions
27
+
* For controller functionality, the app requires 'User Access Administrator' to create and implement right-size roles
28
+
21
29
## Prerequisites
22
30
23
31
To add Permissions Management to your Azure AD tenant:
@@ -34,23 +42,24 @@ To add Permissions Management to your Azure AD tenant:
34
42
35
43
### 1. Add Azure subscription details
36
44
37
-
Choose from 3 options to manage Azure subscriptions.
45
+
Choose from three options to manage Azure subscriptions.
38
46
39
47
#### Option 1: Automatically manage
40
48
41
-
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
49
+
This option allows subscriptions to be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found will be onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
42
50
43
-
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
51
+
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
44
52
45
53
1. In the EPM portal, left-click the cog on the top right-hand side.
46
54
1. Navigate to data collectors tab
47
55
1. Ensure 'Azure' is selected
48
56
1. Click ‘Create Configuration’
49
57
1. For onboarding mode, select ‘Automatically Manage’
50
58
51
-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
59
+
> [!NOTE]
60
+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
52
61
53
-
Lastly, Click ‘Verify Now & Save’
62
+
- Once complete, Click ‘Verify Now & Save’
54
63
55
64
To view status of onboarding after saving the configuration:
56
65
@@ -61,13 +70,13 @@ To view status of onboarding after saving the configuration:
61
70
62
71
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
63
72
64
-
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
73
+
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for the subscription.
65
74
1. In the EPM portal, click the cog on the top right-hand side.
66
75
1. Navigate to data collectors tab
67
76
1. Ensure 'Azure' is selected
68
77
1. Click ‘Create Configuration’
69
78
1. Select ‘Enter Authorization Systems’
70
-
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
79
+
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to nine extra times, putting a single subscription ID into each respective input box.
71
80
1. Once you have input all of the desired subscriptions, click next
72
81
1. Click ‘Verify Now & Save’
73
82
1. Once the access to read and collect data is verified, collection will begin.
@@ -90,9 +99,10 @@ This option detects all subscriptions that are accessible by the Cloud Infrastru
90
99
1. Click ‘Create Configuration’
91
100
1. For onboarding mode, select ‘Automatically Manage’
92
101
93
-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
102
+
> [!NOTE]
103
+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
94
104
95
-
Lastly, Click ‘Verify Now & Save’
105
+
- Once complete, Click ‘Verify Now & Save’
96
106
97
107
To view status of onboarding after saving the configuration:
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,8 @@ This article describes how to enable Permissions Management in your organization
18
18
> [!NOTE]
19
19
> To complete this task, you must have *global administrator* permissions as a user in that tenant. You can't enable Permissions Management as a user from other tenant who has signed in via B2B or via Azure Lighthouse.
20
20
21
+
:::image type="content" source="media/onboard-enable-tenant/dashboard.png" alt-text="A preview of what the permissions management dashboard looks like." lightbox="media/onboard-enable-tenant/dashboard.png":::
22
+
21
23
## Prerequisites
22
24
23
25
To enable Permissions Management in your organization:
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md
+20-7Lines changed: 20 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,20 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
18
18
> [!NOTE]
19
19
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
20
20
21
+
## Explanation
22
+
23
+
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
24
+
25
+
<!-- Diagram from Gargi-->
26
+
27
+
There are several moving parts across GCP and Azure, which are required to be configured before onboarding.
28
+
29
+
* An Azure AD OIDC App
30
+
* A Workload Identity in GCP
31
+
* OAuth2 confidential client grants utilized
32
+
* A GCP service account with permissions to collect
33
+
34
+
21
35
## Onboard a GCP project
22
36
23
37
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:
@@ -37,22 +51,21 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
37
51
> [!NOTE]
38
52
> 1. To confirm that the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
39
53
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your GCP account.
40
-
41
-
1. Return to Permissions Management, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
54
+
> 1. Return to the Permissions Management window, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
42
55
43
56
### 2. Set up a GCP OIDC project.
44
57
45
58
Choose from 3 options to manage GCP projects.
46
59
47
60
#### Option 1: Automatically manage
48
61
49
-
This option allows projects to be automatically detected and monitored without additional configuration. Steps to detect list of projects and onboard for collection:
62
+
The automatically manage option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
50
63
51
64
Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
52
65
53
-
Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI.
66
+
Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programatically with the gcloud CLI.
54
67
55
-
Once this has been configured, click next, then 'Verify Now & Save'.
68
+
Once everything has been configured, click next, then 'Verify Now & Save'.
56
69
57
70
Any current or future projects found get onboarded automatically.
58
71
@@ -81,7 +94,7 @@ To view status of onboarding after saving the configuration:
81
94
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
82
95
83
96
- Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
84
-
- Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI
97
+
- Once done, the steps are listed in the screen to do configure manually in the GPC console, or programatically with the gcloud CLI
85
98
- Click Next
86
99
- Click 'Verify Now & Save'
87
100
- Navigate to newly create Data Collector row under GCP data collectors
@@ -108,7 +121,7 @@ This option detects all projects that are accessible by the Cloud Infrastructure
108
121
109
122
The **Welcome to Permissions Management GCP onboarding** screen appears, displaying steps you must complete to onboard your GCP project.
110
123
111
-
### 5. Paste the environment vars from the Permissions Management portal.
124
+
### 5. Paste the environmental variables from the Permissions Management portal.
112
125
113
126
1. Return to Permissions Management and select **Copy export variables**.
114
127
1. In the GCP Onboarding shell editor, paste the variables you copied, and then press **Enter**.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/overview.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,13 +15,13 @@ ms.author: kenwith
15
15
16
16
## Overview
17
17
18
-
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multi-cloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
18
+
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
19
19
20
20
Permissions Management detects, automatically right-sizes, and continuously monitors unused and excessive permissions.
21
21
22
22
Organizations have to consider permissions management as a central piece of their Zero Trust security to implement least privilege access across their entire infrastructure:
23
23
24
-
- Organizations are increasingly adopting multi-cloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
24
+
- Organizations are increasingly adopting multicloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
25
25
- With the proliferation of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
26
26
- IT security teams are under increased pressure to ensure access to their expanding cloud estate is secure and compliant.
27
27
- The inconsistency of cloud providers' native access management models makes it even more complex for Security and Identity to manage permissions and enforce least privilege access policies across their entire environment.
@@ -32,8 +32,9 @@ Organizations have to consider permissions management as a central piece of thei
32
32
33
33
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
34
34
35
-
Permissions Management has been designed in such a way that we recommended your organization sequentially 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally cannot action what is yet to be discovered, likewise you cannot continually evaluate what is yet to be remediated.
35
+
Permissions Management has been designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't action what is yet to be discovered, likewise you can't continually evaluate what is yet to be remediated.
36
36
37
+
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Use case for Permissions Management." lightbox="media/overview/discover-remediate-monitor.png":::
37
38
38
39
### Discover
39
40
@@ -64,7 +65,7 @@ Permissions Management deepens Zero Trust security strategies by augmenting the
64
65
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
65
66
- Unify access policies across infrastructure as a service (IaaS) platforms: Implement consistent security policies across your cloud infrastructure.
66
67
67
-
Once your organization has explored and implemented the discover, remediation and monitor phases, you have established one of the core pillars of a modern zero-trust security strategy.
68
+
Once your organization has explored and implemented the discover, remediation and monitor phases, you've established one of the core pillars of a modern zero-trust security strategy.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/ui-dashboard.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,8 @@ ms.author: kenwith
16
16
17
17
Permissions Management provides a summary of key statistics and data about your authorization system regularly. This information is available for Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
18
18
19
+
:::image type="content" source="media/ui-dashboard/ui-dashboard.png" alt-text="An example of the Permissions Management dashboard, highlighting key statistics to investigate." lightbox="media/ui-dashboard/ui-dashboard.png":::
20
+
19
21
## View metrics related to avoidable risk
20
22
21
23
The data provided by Permissions Management includes metrics related to avoidable risk. These metrics allow the Permissions Management administrator to identify areas where they can reduce risks related to the principle of least permissions.
@@ -74,6 +76,8 @@ The Permissions Management **Dashboard** displays the following information:
74
76
75
77
## The PCI heat map
76
78
79
+
:::image type="content" source="media/ui-dashboard/pci-heat-map.png" alt-text="An example of the PCI heatmap showing hundreds of identities which require investigation." lightbox="media/ui-dashboard/pci-heat-map.png":::
80
+
77
81
The **Permission Creep Index** heat map shows the incurred risk of users with access to high-risk permissions, and provides information about:
78
82
79
83
- Users who were given access to high-risk permissions but aren't actively using them. *High-risk permissions* include the ability to modify or delete information in the authorization system.
0 commit comments