You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/steps-secure-identity.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: security
8
8
ms.subservice: security-fundamentals
9
9
ms.topic: conceptual
10
10
ms.workload: identity
11
-
ms.date: 10/28/2019
11
+
ms.date: 01/29/2020
12
12
ms.author: martinco
13
13
---
14
14
@@ -23,8 +23,8 @@ This checklist will help you quickly deploy critical recommended actions to prot
23
23
* Strengthen your credentials.
24
24
* Reduce your attack surface area.
25
25
* Automate threat response.
26
-
*Increase your awareness of auditing and monitoring.
27
-
* Enable more predictable and complete end-user security with self-help.
26
+
*Utilize cloud intelligence.
27
+
* Enable end-user self-service.
28
28
29
29
Make sure you keep track of which features and steps are complete while reading this checklist.
30
30
@@ -111,7 +111,7 @@ Using the assume breach mentality, you should reduce the impact of compromised u
111
111
112
112
It’s important to understand the various [Azure AD application consent experiences](https://docs.microsoft.com/azure/active-directory/develop/application-consent-experience), the [types of permissions and consent](https://docs.microsoft.com/azure/active-directory/develop/v2-permissions-and-consent), and their implications on your organization’s security posture. By default, all users in Azure AD can grant applications that leverage the Microsoft identity platform to access your organization’s data. While allowing users to consent by themselves does allow users to easily acquire useful applications that integrate with Microsoft 365, Azure and other services, it can represent a risk if not used and monitored carefully.
113
113
114
-
Microsoft recommends [disabling future user consent operations](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-removing-user-access#i-want-to-disable-all-future-user-consent-operations-to-any-application) to help reduce your surface area and mitigate this risk. If end-user consent is disabled, previous consent grants will still be honored but all future consent operations must be performed by an administrator. Admin consent can be requested by users through an integrated [admin consent request workflow](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-admin-consent-workflow) or through your own support processes. Before disabling this functionality, it's recommended you review your audit log to understand which applications users are consenting to and plan the change accordingly. For applications you wish to allow all users to access, consider [granting consent on behalf of all users](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent), making sure users who have not yet consented individually will be able to access the app. If you do not want these applications to be available to all users in all scenarios, use [application assignment](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-assigning-users-and-groups) and [conditional access](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) to restrict user access to apps.
114
+
Microsoft recommends [disabling future user consent operations](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-removing-user-access#i-want-to-disable-all-future-user-consent-operations-to-any-application) to help reduce your surface area and mitigate this risk. If end-user consent is disabled, previous consent grants will still be honored but all future consent operations must be performed by an administrator. Admin consent can be requested by users through an integrated [admin consent request workflow](https://docs.microsoft.com/azure/active-directory/manage-apps/configure-admin-consent-workflow) or through your own support processes. Before disabling end-user consent, use our [recommendations](https://docs.microsoft.com/azure/active-directory/manage-apps/manage-consent-requests) to plan this change in your organization. For applications you wish to allow all users to access, consider [granting consent on behalf of all users](https://docs.microsoft.com/azure/active-directory/develop/v2-admin-consent), making sure users who have not yet consented individually will be able to access the app. If you do not want these applications to be available to all users in all scenarios, use [application assignment](https://docs.microsoft.com/azure/active-directory/manage-apps/methods-for-assigning-users-and-groups) and [conditional access](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) to restrict user access to apps.
115
115
116
116
Make sure users can request admin approval for new applications to reduce user friction, minimize support volume, and prevent users from signing up for applications using non-Azure AD credentials. Once you regulate your consent operations, administrators should audit app and consented permissions on a regular basis.
117
117
@@ -147,7 +147,7 @@ Sign-in risk is the likelihood someone other than the account owner is attemptin
147
147
148
148

149
149
150
-
## Step 4 - Increase your awareness
150
+
## Step 4 - Utilize cloud intelligence
151
151
152
152
Auditing and logging of security-related events and related alerts are essential components of an efficient protection strategy. Security logs and reports provide you with an electronic record of suspicious activities and help you detect patterns that may indicate attempted or successful external penetration of the network, and internal attacks. You can use auditing to monitor user activity, document regulatory compliance, do forensic analysis, and more. Alerts provide notifications of security events.
153
153
@@ -200,7 +200,7 @@ There are many aspects to a secure Identity infrastructure, but this five-step c
200
200
* Strengthen your credentials.
201
201
* Reduce your attack surface area.
202
202
* Automate threat response.
203
-
*Increase your awareness of auditing and monitoring.
203
+
*Utilize cloud intelligence.
204
204
* Enable more predictable and complete end-user security with self-help.
205
205
206
206
We appreciate how seriously you take Identity Security and hope this document is a useful roadmap to a more secure posture for your organization.
0 commit comments