Skip to content

Commit 63c0376

Browse files
authored
Update service-accounts-govern-on-premises.md
1 parent 593cab7 commit 63c0376

File tree

1 file changed

+8
-12
lines changed

1 file changed

+8
-12
lines changed

articles/active-directory/fundamentals/service-accounts-govern-on-premises.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ When you create service accounts, consider the information in the following tabl
4545
| Ownership| Ensure there's an account owner who requests and assumes responsibility |
4646
| Scope| Define the scope, and anticipate usage duration|
4747
| Purpose| Create service accounts for one purpose |
48-
| Permissions | Apply the principle of least permission. To do so:<li>Don't assign permissions to built-in groups, such as administrators<li>Remove local machine permissions, where feasible<li>Tailor access, and use AD delegation for directory access<li>Use granular access permissions<li>Set account expiration and location restrictions on user-based service accounts |
48+
| Permissions | Apply the principle of least permission:<li>Don't assign permissions to built-in groups, such as administrators<li>Remove local machine permissions, where feasible<li>Tailor access, and use AD delegation for directory access<li>Use granular access permissions<li>Set account expiration and location restrictions on user-based service accounts |
4949
| Monitor and audit use| Monitor sign-in data, and ensure it matches the intended usage. Set alerts for anomalous usage. |
5050

5151
### User account restrictions
@@ -146,23 +146,19 @@ Consider the following restrictions, although some might not be relevant to your
146146
Schedule regular service account reviews, especially those classified Medium and High Risk. Reviews can include:
147147

148148
* Owner attestation of the need for the account, with justification of permissions and scopes
149-
* Privacy and security team reviews, that include upstream and downstream dependencies
149+
* Privacy and security team reviews that include upstream and downstream dependencies
150150
* Audit data review
151-
* Ensure it's used for its stated purpose
151+
* Ensure the account is used for its stated purpose
152152

153153
### Deprovision service accounts
154154

155-
In your deprovisioning process, first remove permissions and monitoring, and then remove the account, if appropriate.
155+
Deprovision service accounts at the following junctures:
156156

157-
You deprovision service accounts when:
157+
* Retirement of the script or application for which the service account was created
158+
* Retirement of the script or application function, for which the service account was used
159+
* Replacement of the service account for another
158160

159-
* The script or application that the service account was created for is retired.
160-
161-
* The function within the script or application, which the service account is used for (for example, access to a specific resource), is retired.
162-
163-
* The service account has been replaced with a different service account.
164-
165-
After you've removed all permissions, remove the account by doing the following:
161+
When deprovisioning, first remove permissions and monitoring, and then remove the account, if needed. To remove the account:
166162

167163
1. When the associated application or script is deprovisioned, monitor the sign-ins and resource access for the associated service accounts to be sure that they're not being used in another process. If you're sure it's no longer needed, go to next step.
168164

0 commit comments

Comments
 (0)