Skip to content

Commit c67a4f1

Browse files
author
Tristan Desktop
committed
Requested changes added
1 parent 5aac8e4 commit c67a4f1

File tree

5 files changed

+32
-32
lines changed

5 files changed

+32
-32
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,14 @@ This article describes how to onboard an Amazon Web Services (AWS) account on Pe
2020
2121
## Explanation
2222

23-
There are several moving parts across AWS and Azure which are required to be configured before onboarding.
24-
25-
1. An AAD OIDC App
26-
1. An AWS OIDC account
27-
1. An (optional) AWS Master account
28-
1. An (optional) AWS Central logging account
29-
1. An AWS OIDC role
30-
1. An AWS Cross Account role assumed by OIDC role
23+
There are several moving parts across AWS and Azure, which are required to be configured before onboarding.
24+
25+
* An Azure AD OIDC App
26+
* An AWS OIDC account
27+
* An (optional) AWS Master account
28+
* An (optional) AWS Central logging account
29+
* An AWS OIDC role
30+
* An AWS Cross Account role assumed by OIDC role
3131

3232

3333
<!-- diagram from gargi -->
@@ -113,15 +113,15 @@ There are several moving parts across AWS and Azure which are required to be con
113113

114114
Select **Enable AWS SSO checkbox**, if the AWS account access is configured through AWS SSO.
115115

116-
Choose from 3 options to manage AWS accounts.
116+
Choose from three options to manage AWS accounts.
117117

118118
#### Option 1: Automatically manage
119119

120-
Choose this option to automatically detect and add to monitored account list, without additional configuration. Steps to detect list of accounts and onboard for collection:
120+
Choose this option to automatically detect and add to the monitored account list, without extra configuration. Steps to detect list of accounts and onboard for collection:
121121

122122
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
123123
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
124-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
124+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
125125

126126
Any current or future accounts found get onboarded automatically.
127127

@@ -173,7 +173,7 @@ This option detects all AWS accounts that are accessible through OIDC role acces
173173

174174
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
175175
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
176-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
176+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
177177
- Click Verify and Save.
178178
- Navigate to newly create Data Collector row under AWSdata collectors.
179179
- Click on Status column when the row has “Pending” status

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ This article describes how to onboard a Microsoft Azure subscription or subscrip
2020
2121
## Explanation
2222

23-
Given that Permissions Management is hosted on Azure and you are onboarding your Azure subscriptions to be monitored and managed, setup is simple with few moving parts to configure. Below is what is required to configure onboarding:
23+
The Permissions Management service is built on Azure, and given you're onboarding your Azure subscriptions to be monitored and managed, setup is simple with few moving parts to configure. Below is what is required to configure onboarding:
2424

25-
1. When your tenant is onboarded, an application is created in the tenant.
26-
1. This app requires 'reader' permissions on the subscriptions
27-
1. For controller functionality, the app requires 'User Access Administrator' to create and implement right-size roles
25+
* When your tenant is onboarded, an application is created in the tenant.
26+
* This app requires 'reader' permissions on the subscriptions
27+
* For controller functionality, the app requires 'User Access Administrator' to create and implement right-size roles
2828

2929
## Prerequisites
3030

@@ -42,11 +42,11 @@ To add Permissions Management to your Azure AD tenant:
4242

4343
### 1. Add Azure subscription details
4444

45-
Choose from 3 options to manage Azure subscriptions.
45+
Choose from three options to manage Azure subscriptions.
4646

4747
#### Option 1: Automatically manage
4848

49-
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
49+
This option allows subscriptions to be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found will be onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
5050

5151
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
5252

@@ -70,13 +70,13 @@ To view status of onboarding after saving the configuration:
7070

7171
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
7272

73-
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
73+
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for the subscription.
7474
1. In the EPM portal, click the cog on the top right-hand side.
7575
1. Navigate to data collectors tab
7676
1. Ensure 'Azure' is selected
7777
1. Click ‘Create Configuration’
7878
1. Select ‘Enter Authorization Systems’
79-
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
79+
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to nine extra times, putting a single subscription ID into each respective input box.
8080
1. Once you have input all of the desired subscriptions, click next
8181
1. Click ‘Verify Now & Save’
8282
1. Once the access to read and collect data is verified, collection will begin.

articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,16 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
2020
2121
## Explanation
2222

23-
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, somewhat analogous to a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
23+
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
2424

2525
<!-- Diagram from Gargi-->
2626

2727
There are several moving parts across GCP and Azure, which are required to be configured before onboarding.
2828

29-
1. An AAD OIDC App
30-
1. An Workload Identity in GCP
31-
1. OAuth2 confidential client grant utilized
32-
1. A GCP service account with permissions to collect
29+
* An Azure AD OIDC App
30+
* A Workload Identity in GCP
31+
* OAuth2 confidential client grants utilized
32+
* A GCP service account with permissions to collect
3333

3434

3535
## Onboard a GCP project
@@ -59,11 +59,11 @@ Choose from 3 options to manage GCP projects.
5959

6060
#### Option 1: Automatically manage
6161

62-
This option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
62+
The automatically manage option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
6363

6464
Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
6565

66-
Once done, the steps are listed in the screen to do configure this manually in the GPC console, or programatically with the gcloud CLI.
66+
Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programatically with the gcloud CLI.
6767

6868
Once everything has been configured, click next, then 'Verify Now & Save'.
6969

@@ -94,7 +94,7 @@ To view status of onboarding after saving the configuration:
9494
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
9595

9696
- Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
97-
- Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI
97+
- Once done, the steps are listed in the screen to do configure manually in the GPC console, or programatically with the gcloud CLI
9898
- Click Next
9999
- Click 'Verify Now & Save'
100100
- Navigate to newly create Data Collector row under GCP data collectors

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,13 @@ ms.author: kenwith
1515

1616
## Overview
1717

18-
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multi-cloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
18+
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
1919

2020
Permissions Management detects, automatically right-sizes, and continuously monitors unused and excessive permissions.
2121

2222
Organizations have to consider permissions management as a central piece of their Zero Trust security to implement least privilege access across their entire infrastructure:
2323

24-
- Organizations are increasingly adopting multi-cloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
24+
- Organizations are increasingly adopting multicloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
2525
- With the proliferation of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
2626
- IT security teams are under increased pressure to ensure access to their expanding cloud estate is secure and compliant.
2727
- The inconsistency of cloud providers' native access management models makes it even more complex for Security and Identity to manage permissions and enforce least privilege access policies across their entire environment.
@@ -32,7 +32,7 @@ Organizations have to consider permissions management as a central piece of thei
3232

3333
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
3434

35-
Permissions Management has been designed in such a way that we recommended your organization sequentially 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally cannot action what is yet to be discovered, likewise you cannot continually evaluate what is yet to be remediated.
35+
Permissions Management has been designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't action what is yet to be discovered, likewise you can't continually evaluate what is yet to be remediated.
3636

3737
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Use case for Permissions Management." lightbox="media/overview/discover-remediate-monitor.png":::
3838

@@ -65,7 +65,7 @@ Permissions Management deepens Zero Trust security strategies by augmenting the
6565
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
6666
- Unify access policies across infrastructure as a service (IaaS) platforms: Implement consistent security policies across your cloud infrastructure.
6767

68-
Once your organization has explored and implemented the discover, remediation and monitor phases, you have established one of the core pillars of a modern zero-trust security strategy.
68+
Once your organization has explored and implemented the discover, remediation and monitor phases, you've established one of the core pillars of a modern zero-trust security strategy.
6969

7070
## Next steps
7171

0 commit comments

Comments
 (0)