Skip to content

Commit 6008c38

Browse files
authored
Update 3-secure-access-plan.md
1 parent ee10f33 commit 6008c38

File tree

1 file changed

+38
-33
lines changed

1 file changed

+38
-33
lines changed

articles/active-directory/fundamentals/3-secure-access-plan.md

Lines changed: 38 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Create a security plan for external access to Azure Active Directory
2+
title: Create a security plan for external access to resources
33
description: Plan the security for external access to your organization's resources.
44
services: active-directory
55
author: gargi-sinha
@@ -15,57 +15,62 @@ ms.custom: "it-pro, seodec18"
1515
ms.collection: M365-identity-device-management
1616
---
1717

18-
# Create a security plan for external access
18+
# Create a security plan for external access to resources
1919

20-
Before you create an external-access security plan, ensure the following conditions are met.
20+
Before you create an external-access security plan, review the following two articles, which add context and information for the security plan.
2121

22-
* [Determine your security posture for external access](1-secure-access-posture.md)
22+
* [Determine your security posture for external access with Azure AD](1-secure-access-posture.md)
2323
* [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
2424

25+
## Security plan documentation
26+
2527
For your security plan, document the following information:
2628

2729
* Applications and resources to be grouped for access
2830
* Sign-in conditions for external users
29-
* Device state, sign-in location, client application requirements, and user risk
30-
* Policies that determine when to review and remove access
31-
* User populations to be grouped for a similar experience
31+
* Device state, sign-in location, client application requirements, user risk, etc.
32+
* Policies to determine timing for reviews and access removal
33+
* User populations to be grouped for similar experiences
3234

33-
After you document the information, use Microsoft identity and access management policies, or another identity provider (IdP) to implement the plan.
35+
To implement the security plan, you can use Microsoft identity and access management policies, or another identity provider (IdP).
3436

35-
## Resources to be grouped for access
37+
Learn more: [Identity and access management overview](/compliance/assurance/assurance-identity-and-access-management)
3638

37-
To group resources for access:
39+
## Use groups for access
3840

39-
* Microsoft Teams groups files, conversation threads, and other resources. Formulate an external access strategy for Microsoft Teams.
40-
* See, [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)
41-
* Use entitlement management access packages to create and delegate management of packages of applications, groups, teams, SharePoint sites, etc.
41+
See the following links to articles about resource grouping strategies:
42+
43+
* Microsoft Teams groups files, conversation threads, and other resources
44+
* Formulate an external access strategy for Teams
45+
* See, [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business with Azure AD](9-secure-access-teams-sharepoint.md)
46+
* Use entitlement management access packages to create and delegate package management of applications, groups, teams, SharePoint sites, etc.
4247
* [Create a new access package in entitlement management](../governance/entitlement-management-access-package-create.md)
4348
* Apply Conditional Access policies to up to 250 applications, with the same access requirements
4449
* [What is Conditional Access?](../conditional-access/overview.md)
45-
* Use Cross Tenant Access Settings Inbound Access to define access for application groups of external users
50+
* Define access for external user application groups
4651
* [Overview: Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md)
4752

4853
Document the applications to be grouped. Considerations include:
4954

50-
* **Risk profile** - Assess the risk if a bad actor gains access to an application.
51-
* Identify application as high, medium, or low risk. Avoid grouping high-risk with low-risk.
55+
* **Risk profile** - assess the risk if a bad actor gains access to an application
56+
* Identify application as High, Medium, or Low risk. It's recommended you don't group High-risk with Low-risk.
5257
* Document applications that can't be shared with external users
53-
* **Compliance frameworks** - Determine compliance frameworks for apps
58+
* **Compliance frameworks** - determine compliance frameworks for apps
5459
* Identify access and review requirements
55-
* **Applications for roles or departments** - Assess applications to be grouped for a role or department access
56-
* **Collaboration applications** - Identify collaboration applications external users can access, such as Teams and SharePoint
60+
* **Applications for roles or departments** - assess applications to be grouped for role, or department, access
61+
* **Collaboration applications** - identify collaboration applications external users can access, such as Teams or SharePoint
5762
* For productivity applications, external users might have licenses, or you might provide access
5863

59-
For application and resource group access by external users, document the following information:
64+
Document the following information for application and resource group access by external users.
6065

6166
* Descriptive group name, for example High_Risk_External_Access_Finance
6267
* Applications and resources in the group
63-
* Application and resource owners and contact information
64-
* Access is controlled by IT, or delegated to a business owner
68+
* Application and resource owners and their contact information
69+
* Access is controlled by the IT team, or is delegated to a business owner
6570
* Prerequisites for access: background check, training, etc.
6671
* Compliance requirements to access resources
6772
* Challenges, for example multi-factor authentication (MFA) for some resources
68-
* Cadence for reviews, by whom, and where it's documented
73+
* Cadence for reviews, by whom, and where results are documented
6974

7075
> [!TIP]
7176
> Use this type of governance plan for internal access.
@@ -82,7 +87,7 @@ Consider the following risk-based policies to trigger MFA.
8287

8388
* **Low** - MFA for some application sets
8489
* **Medium** - MFA when other risks are present
85-
* **High** - External users always use MFA
90+
* **High** - external users always use MFA
8691

8792
Learn more:
8893

@@ -98,12 +103,12 @@ Use the following table to help assess policy to address risk.
98103
| --- | --- |
99104
| Device| Require compliant devices |
100105
| Mobile apps| Require approved apps |
101-
| Identity protection is high risk| Require user to change password |
106+
| Identity protection is High risk| Require user to change password |
102107
| Network location| To access confidential projects, require sign-in from an IP address range |
103108

104-
To use device state as policy input, the device is registered or joined to your tenant. Configure cross-tenant access settings must be configured to trust the device claims from the home tenant. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
109+
To use device state as policy input, the device is registered or joined to your tenant. To trust the device claims from the home tenant, configure cross-tenant access settings. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
105110

106-
You can use identity-protection risk policies. However, mitigate issue in the user home tenant. See, [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md).
111+
You can use identity-protection risk policies. However, mitigate issues in the user home tenant. See, [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md).
107112

108113
For network locations, you can restrict access to IP addresses ranges you own. Use this method if external partners access applications while at your location. See, [Conditional Access: Block access by location](../conditional-access/howto-conditional-access-policy-location.md)
109114

@@ -115,13 +120,13 @@ Document policies that dictate when to review resource access, and remove accoun
115120
* Internal business policies and processes
116121
* User behavior
117122

118-
Your policies will be customized, however consider the following parameters:
123+
Generally, policies are customized, however consider the following parameters:
119124

120125
* **Entitlement management access reviews**:
121126
* [Change lifecycle settings for an access package in entitlement management](../governance/entitlement-management-access-package-lifecycle-policy.md)
122127
* [Create an access review of an access package in entitlement management](../governance/entitlement-management-access-reviews-create.md)
123128
* [Add a connected organization in entitlement management](../governance/entitlement-management-organization.md): group users from a partner and schedule reviews
124-
* **Microsoft 365 groups**:
129+
* **Microsoft 365 groups**
125130
* [Microsoft 365 group expiration policy](/microsoft-365/solutions/microsoft-365-groups-expiration-policy?view=o365-worldwide&preserve-view=true)
126131
* **Options**:
127132
* If external users don't use access packages or Microsoft 365 groups, determine when accounts become inactive or deleted
@@ -130,13 +135,13 @@ Your policies will be customized, however consider the following parameters:
130135

131136
## Access control methods
132137

133-
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses.
134-
135-
Other combinations of Microsoft 365, Office 365, and Azure AD have functionality to manage external users. See, [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
138+
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses. Learn more in the following entitlement managment section.
136139

137140
> [!NOTE]
138141
> Licenses are for one user. Therefore users, administrators, and business owners can have delegated access control. This scenario can occur with Azure AD P2 or Microsoft 365 E5, and you don't have to enable licenses for all users. The first 50,000 external users are free. If you don't enable P2 licenses for other internal users, they can't use entitlement management.
139142
143+
Other combinations of Microsoft 365, Office 365, and Azure AD have functionality to manage external users. See, [Microsoft 365 guidance for security & compliance](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance).
144+
140145
## Govern access with Azure AD P2 and Microsoft 365 or Office 365 E5
141146

142147
Azure AD P2 and Microsoft 365 E5 have all the security and governance tools.
@@ -165,7 +170,7 @@ Entries in bold are recommended.
165170

166171
### Entitlement management 
167172

168-
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations allowed access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
173+
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations gramted access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
169174

170175
Learn more: [Create a new access package in entitlement management](../governance/entitlement-management-access-package-create.md)
171176

0 commit comments

Comments
 (0)