Skip to content

Commit acfb658

Browse files
authored
Merge pull request #210149 from weznagwama/doco-changes
Doco changes
2 parents 12af7fa + c67a4f1 commit acfb658

File tree

10 files changed

+68
-24
lines changed

10 files changed

+68
-24
lines changed
106 KB
Loading
Loading
72.2 KB
Loading
90.6 KB
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,20 @@ This article describes how to onboard an Amazon Web Services (AWS) account on Pe
1818
> [!NOTE]
1919
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2020
21+
## Explanation
22+
23+
There are several moving parts across AWS and Azure, which are required to be configured before onboarding.
24+
25+
* An Azure AD OIDC App
26+
* An AWS OIDC account
27+
* An (optional) AWS Master account
28+
* An (optional) AWS Central logging account
29+
* An AWS OIDC role
30+
* An AWS Cross Account role assumed by OIDC role
31+
32+
33+
<!-- diagram from gargi -->
34+
2135
## Onboard an AWS account
2236

2337
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:
@@ -99,15 +113,15 @@ This article describes how to onboard an Amazon Web Services (AWS) account on Pe
99113

100114
Select **Enable AWS SSO checkbox**, if the AWS account access is configured through AWS SSO.
101115

102-
Choose from 3 options to manage AWS accounts.
116+
Choose from three options to manage AWS accounts.
103117

104118
#### Option 1: Automatically manage
105119

106-
Choose this option to automatically detect and add to monitored account list, without additional configuration. Steps to detect list of accounts and onboard for collection:
120+
Choose this option to automatically detect and add to the monitored account list, without extra configuration. Steps to detect list of accounts and onboard for collection:
107121

108122
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
109123
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
110-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
124+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
111125

112126
Any current or future accounts found get onboarded automatically.
113127

@@ -159,7 +173,7 @@ This option detects all AWS accounts that are accessible through OIDC role acces
159173

160174
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
161175
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
162-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
176+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
163177
- Click Verify and Save.
164178
- Navigate to newly create Data Collector row under AWSdata collectors.
165179
- Click on Status column when the row has “Pending” status

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,14 @@ This article describes how to onboard a Microsoft Azure subscription or subscrip
1818
> [!NOTE]
1919
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2020
21+
## Explanation
22+
23+
The Permissions Management service is built on Azure, and given you're onboarding your Azure subscriptions to be monitored and managed, setup is simple with few moving parts to configure. Below is what is required to configure onboarding:
24+
25+
* When your tenant is onboarded, an application is created in the tenant.
26+
* This app requires 'reader' permissions on the subscriptions
27+
* For controller functionality, the app requires 'User Access Administrator' to create and implement right-size roles
28+
2129
## Prerequisites
2230

2331
To add Permissions Management to your Azure AD tenant:
@@ -34,23 +42,24 @@ To add Permissions Management to your Azure AD tenant:
3442

3543
### 1. Add Azure subscription details
3644

37-
Choose from 3 options to manage Azure subscriptions.
45+
Choose from three options to manage Azure subscriptions.
3846

3947
#### Option 1: Automatically manage
4048

41-
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
49+
This option allows subscriptions to be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found will be onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
4250

43-
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope.
51+
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
4452

4553
1. In the EPM portal, left-click the cog on the top right-hand side.
4654
1. Navigate to data collectors tab
4755
1. Ensure 'Azure' is selected
4856
1. Click ‘Create Configuration’
4957
1. For onboarding mode, select ‘Automatically Manage’
5058

51-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
59+
> [!NOTE]
60+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. This can be performed manually in the Entra console, or programatically with PowerShell or the Azure CLI.
5261
53-
Lastly, Click ‘Verify Now & Save’
62+
- Once complete, Click ‘Verify Now & Save’
5463

5564
To view status of onboarding after saving the configuration:
5665

@@ -61,13 +70,13 @@ To view status of onboarding after saving the configuration:
6170

6271
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
6372

64-
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
73+
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for the subscription.
6574
1. In the EPM portal, click the cog on the top right-hand side.
6675
1. Navigate to data collectors tab
6776
1. Ensure 'Azure' is selected
6877
1. Click ‘Create Configuration’
6978
1. Select ‘Enter Authorization Systems’
70-
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
79+
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to nine extra times, putting a single subscription ID into each respective input box.
7180
1. Once you have input all of the desired subscriptions, click next
7281
1. Click ‘Verify Now & Save’
7382
1. Once the access to read and collect data is verified, collection will begin.
@@ -90,9 +99,10 @@ This option detects all subscriptions that are accessible by the Cloud Infrastru
9099
1. Click ‘Create Configuration’
91100
1. For onboarding mode, select ‘Automatically Manage’
92101

93-
The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
102+
> [!NOTE]
103+
> The steps listed on the screen outline how to create the role assignment for the Cloud Infrastructure Entitlements Management application. You can do this manually in the Entra console, or programatically with PowerShell or the Azure CLI.
94104
95-
Lastly, Click ‘Verify Now & Save’
105+
- Once complete, Click ‘Verify Now & Save’
96106

97107
To view status of onboarding after saving the configuration:
98108

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-enable-tenant.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ This article describes how to enable Permissions Management in your organization
1818
> [!NOTE]
1919
> To complete this task, you must have *global administrator* permissions as a user in that tenant. You can't enable Permissions Management as a user from other tenant who has signed in via B2B or via Azure Lighthouse.
2020
21+
:::image type="content" source="media/onboard-enable-tenant/dashboard.png" alt-text="A preview of what the permissions management dashboard looks like." lightbox="media/onboard-enable-tenant/dashboard.png":::
22+
2123
## Prerequisites
2224

2325
To enable Permissions Management in your organization:

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,20 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
1818
> [!NOTE]
1919
> A *global administrator* or *super admin* (an admin for all authorization system types) can perform the tasks in this article after the global administrator has initially completed the steps provided in [Enable Permissions Management on your Azure Active Directory tenant](onboard-enable-tenant.md).
2020
21+
## Explanation
22+
23+
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
24+
25+
<!-- Diagram from Gargi-->
26+
27+
There are several moving parts across GCP and Azure, which are required to be configured before onboarding.
28+
29+
* An Azure AD OIDC App
30+
* A Workload Identity in GCP
31+
* OAuth2 confidential client grants utilized
32+
* A GCP service account with permissions to collect
33+
34+
2135
## Onboard a GCP project
2236

2337
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches:
@@ -37,22 +51,21 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
3751
> [!NOTE]
3852
> 1. To confirm that the app was created, open **App registrations** in Azure and, on the **All applications** tab, locate your app.
3953
> 1. Select the app name to open the **Expose an API** page. The **Application ID URI** displayed in the **Overview** page is the *audience value* used while making an OIDC connection with your GCP account.
40-
41-
1. Return to Permissions Management, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
54+
> 1. Return to the Permissions Management window, and in the **Permissions Management Onboarding - Azure AD OIDC App Creation**, select **Next**.
4255
4356
### 2. Set up a GCP OIDC project.
4457

4558
Choose from 3 options to manage GCP projects.
4659

4760
#### Option 1: Automatically manage
4861

49-
This option allows projects to be automatically detected and monitored without additional configuration. Steps to detect list of projects and onboard for collection:
62+
The automatically manage option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
5063

5164
Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
5265

53-
Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI.
66+
Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programatically with the gcloud CLI.
5467

55-
Once this has been configured, click next, then 'Verify Now & Save'.
68+
Once everything has been configured, click next, then 'Verify Now & Save'.
5669

5770
Any current or future projects found get onboarded automatically.
5871

@@ -81,7 +94,7 @@ To view status of onboarding after saving the configuration:
8194
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
8295

8396
- Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
84-
- Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI
97+
- Once done, the steps are listed in the screen to do configure manually in the GPC console, or programatically with the gcloud CLI
8598
- Click Next
8699
- Click 'Verify Now & Save'
87100
- Navigate to newly create Data Collector row under GCP data collectors
@@ -108,7 +121,7 @@ This option detects all projects that are accessible by the Cloud Infrastructure
108121
109122
The **Welcome to Permissions Management GCP onboarding** screen appears, displaying steps you must complete to onboard your GCP project.
110123

111-
### 5. Paste the environment vars from the Permissions Management portal.
124+
### 5. Paste the environmental variables from the Permissions Management portal.
112125

113126
1. Return to Permissions Management and select **Copy export variables**.
114127
1. In the GCP Onboarding shell editor, paste the variables you copied, and then press **Enter**.

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ ms.author: kenwith
1515

1616
## Overview
1717

18-
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multi-cloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
18+
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
1919

2020
Permissions Management detects, automatically right-sizes, and continuously monitors unused and excessive permissions.
2121

2222
Organizations have to consider permissions management as a central piece of their Zero Trust security to implement least privilege access across their entire infrastructure:
2323

24-
- Organizations are increasingly adopting multi-cloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
24+
- Organizations are increasingly adopting multicloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
2525
- With the proliferation of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
2626
- IT security teams are under increased pressure to ensure access to their expanding cloud estate is secure and compliant.
2727
- The inconsistency of cloud providers' native access management models makes it even more complex for Security and Identity to manage permissions and enforce least privilege access policies across their entire environment.
@@ -32,8 +32,9 @@ Organizations have to consider permissions management as a central piece of thei
3232

3333
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
3434

35-
Permissions Management has been designed in such a way that we recommended your organization sequentially 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally cannot action what is yet to be discovered, likewise you cannot continually evaluate what is yet to be remediated.
35+
Permissions Management has been designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't action what is yet to be discovered, likewise you can't continually evaluate what is yet to be remediated.
3636

37+
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Use case for Permissions Management." lightbox="media/overview/discover-remediate-monitor.png":::
3738

3839
### Discover
3940

@@ -64,7 +65,7 @@ Permissions Management deepens Zero Trust security strategies by augmenting the
6465
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
6566
- Unify access policies across infrastructure as a service (IaaS) platforms: Implement consistent security policies across your cloud infrastructure.
6667

67-
Once your organization has explored and implemented the discover, remediation and monitor phases, you have established one of the core pillars of a modern zero-trust security strategy.
68+
Once your organization has explored and implemented the discover, remediation and monitor phases, you've established one of the core pillars of a modern zero-trust security strategy.
6869

6970
## Next steps
7071

articles/active-directory/cloud-infrastructure-entitlement-management/ui-dashboard.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ ms.author: kenwith
1616

1717
Permissions Management provides a summary of key statistics and data about your authorization system regularly. This information is available for Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
1818

19+
:::image type="content" source="media/ui-dashboard/ui-dashboard.png" alt-text="An example of the Permissions Management dashboard, highlighting key statistics to investigate." lightbox="media/ui-dashboard/ui-dashboard.png":::
20+
1921
## View metrics related to avoidable risk
2022

2123
The data provided by Permissions Management includes metrics related to avoidable risk. These metrics allow the Permissions Management administrator to identify areas where they can reduce risks related to the principle of least permissions.
@@ -74,6 +76,8 @@ The Permissions Management **Dashboard** displays the following information:
7476

7577
## The PCI heat map
7678

79+
:::image type="content" source="media/ui-dashboard/pci-heat-map.png" alt-text="An example of the PCI heatmap showing hundreds of identities which require investigation." lightbox="media/ui-dashboard/pci-heat-map.png":::
80+
7781
The **Permission Creep Index** heat map shows the incurred risk of users with access to high-risk permissions, and provides information about:
7882

7983
- Users who were given access to high-risk permissions but aren't actively using them. *High-risk permissions* include the ability to modify or delete information in the authorization system.

0 commit comments

Comments
 (0)