Skip to content

Commit c662953

Browse files
Update steps-secure-identity.md
1 parent cf9e0cf commit c662953

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/security/fundamentals/steps-secure-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 10/28/2019
11+
ms.date: 01/29/2020
1212
ms.author: martinco
1313
---
1414

@@ -23,8 +23,8 @@ This checklist will help you quickly deploy critical recommended actions to prot
2323
* Strengthen your credentials.
2424
* Reduce your attack surface area.
2525
* Automate threat response.
26-
* Increase your awareness of auditing and monitoring.
27-
* Enable more predictable and complete end-user security with self-help.
26+
* Utilize cloud intelligence.
27+
* Enable end-user self-service.
2828

2929
Make sure you keep track of which features and steps are complete while reading this checklist.
3030

@@ -111,7 +111,7 @@ Using the assume breach mentality, you should reduce the impact of compromised u
111111

112112
It’s important to understand the various [Azure AD application consent experiences](https://docs.microsoft.com/azure/active-directory/develop/application-consent-experience), the [types of permissions and consent](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent), and their implications on your organization’s security posture. By default, all users in Azure AD can grant applications that leverage the Microsoft identity platform to access your organization’s data. While allowing users to consent by themselves does allow users to easily acquire useful applications that integrate with Microsoft 365, Azure and other services, it can represent a risk if not used and monitored carefully.
113113

114-
Microsoft recommends [disabling future user consent operations](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-removing-user-access#i-want-to-disable-all-future-user-consent-operations-to-any-application) to help reduce your surface area and mitigate this risk. If end-user consent is disabled, previous consent grants will still be honored but all future consent operations must be performed by an administrator. Admin consent can be requested by users through an integrated [admin consent request workflow](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-admin-consent-workflow) or through your own support processes. Before disabling this functionality, it's recommended you review your audit log to understand which applications users are consenting to and plan the change accordingly. For applications you wish to allow all users to access, consider [granting consent on behalf of all users](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent), making sure users who have not yet consented individually will be able to access the app. If you do not want these applications to be available to all users in all scenarios, use [application assignment](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-assigning-users-and-groups) and [conditional access](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) to restrict user access to apps.
114+
Microsoft recommends [disabling future user consent operations](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-removing-user-access#i-want-to-disable-all-future-user-consent-operations-to-any-application) to help reduce your surface area and mitigate this risk. If end-user consent is disabled, previous consent grants will still be honored but all future consent operations must be performed by an administrator. Admin consent can be requested by users through an integrated [admin consent request workflow](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-admin-consent-workflow) or through your own support processes. Before disabling end-user consent, use our [recommendations](https://docs.microsoft.com/azure/active-directory/manage-apps/manage-consent-requests) to plan this change in your organization. For applications you wish to allow all users to access, consider [granting consent on behalf of all users](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent), making sure users who have not yet consented individually will be able to access the app. If you do not want these applications to be available to all users in all scenarios, use [application assignment](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-assigning-users-and-groups) and [conditional access](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) to restrict user access to apps.
115115

116116
Make sure users can request admin approval for new applications to reduce user friction, minimize support volume, and prevent users from signing up for applications using non-Azure AD credentials. Once you regulate your consent operations, administrators should audit app and consented permissions on a regular basis.
117117

@@ -147,7 +147,7 @@ Sign-in risk is the likelihood someone other than the account owner is attemptin
147147

148148
![Sign in from anonymous IPs](./media/steps-secure-identity/azure-ad-sec-steps2.png)
149149

150-
## Step 4 - Increase your awareness
150+
## Step 4 - Utilize cloud intelligence
151151

152152
Auditing and logging of security-related events and related alerts are essential components of an efficient protection strategy. Security logs and reports provide you with an electronic record of suspicious activities and help you detect patterns that may indicate attempted or successful external penetration of the network, and internal attacks. You can use auditing to monitor user activity, document regulatory compliance, do forensic analysis, and more. Alerts provide notifications of security events.
153153

@@ -200,7 +200,7 @@ There are many aspects to a secure Identity infrastructure, but this five-step c
200200
* Strengthen your credentials.
201201
* Reduce your attack surface area.
202202
* Automate threat response.
203-
* Increase your awareness of auditing and monitoring.
203+
* Utilize cloud intelligence.
204204
* Enable more predictable and complete end-user security with self-help.
205205

206206
We appreciate how seriously you take Identity Security and hope this document is a useful roadmap to a more secure posture for your organization.

0 commit comments

Comments
 (0)