You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-aws.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,14 +20,14 @@ This article describes how to onboard an Amazon Web Services (AWS) account on Pe
20
20
21
21
## Explanation
22
22
23
-
There are several moving parts across AWS and Azure which are required to be configured before onboarding.
24
-
25
-
1. An AAD OIDC App
26
-
1. An AWS OIDC account
27
-
1. An (optional) AWS Master account
28
-
1. An (optional) AWS Central logging account
29
-
1. An AWS OIDC role
30
-
1. An AWS Cross Account role assumed by OIDC role
23
+
There are several moving parts across AWS and Azure, which are required to be configured before onboarding.
24
+
25
+
* An Azure AD OIDC App
26
+
* An AWS OIDC account
27
+
* An (optional) AWS Master account
28
+
* An (optional) AWS Central logging account
29
+
* An AWS OIDC role
30
+
* An AWS Cross Account role assumed by OIDC role
31
31
32
32
33
33
<!-- diagram from gargi -->
@@ -113,15 +113,15 @@ There are several moving parts across AWS and Azure which are required to be con
113
113
114
114
Select **Enable AWS SSO checkbox**, if the AWS account access is configured through AWS SSO.
115
115
116
-
Choose from 3 options to manage AWS accounts.
116
+
Choose from three options to manage AWS accounts.
117
117
118
118
#### Option 1: Automatically manage
119
119
120
-
Choose this option to automatically detect and add to monitored account list, without additional configuration. Steps to detect list of accounts and onboard for collection:
120
+
Choose this option to automatically detect and add to the monitored account list, without extra configuration. Steps to detect list of accounts and onboard for collection:
121
121
122
122
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
123
123
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
124
-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
124
+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
125
125
126
126
Any current or future accounts found get onboarded automatically.
127
127
@@ -173,7 +173,7 @@ This option detects all AWS accounts that are accessible through OIDC role acces
173
173
174
174
- Deploy Master account CFT (Cloudformation template) which creates organization account role that grants permission to OIDC role created earlier to list accounts, OUs and SCPs.
175
175
- If AWS SSO is enabled, organization account CFT also adds policy needed to collect AWS SSO configuration details.
176
-
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. This creates a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
176
+
- Deploy Member account CFT in all the accounts that need to be monitored by Entra Permissions Management. These actions create a cross account role that trusts the OIDC role created earlier. The SecurityAudit policy is attached to the role created for data collection.
177
177
- Click Verify and Save.
178
178
- Navigate to newly create Data Collector row under AWSdata collectors.
179
179
- Click on Status column when the row has “Pending” status
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-azure.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,11 +20,11 @@ This article describes how to onboard a Microsoft Azure subscription or subscrip
20
20
21
21
## Explanation
22
22
23
-
Given that Permissions Management is hosted on Azure and you are onboarding your Azure subscriptions to be monitored and managed, setup is simple with few moving parts to configure. Below is what is required to configure onboarding:
23
+
The Permissions Management service is built on Azure, and given you're onboarding your Azure subscriptions to be monitored and managed, setup is simple with few moving parts to configure. Below is what is required to configure onboarding:
24
24
25
-
1. When your tenant is onboarded, an application is created in the tenant.
26
-
1. This app requires 'reader' permissions on the subscriptions
27
-
1. For controller functionality, the app requires 'User Access Administrator' to create and implement right-size roles
25
+
* When your tenant is onboarded, an application is created in the tenant.
26
+
* This app requires 'reader' permissions on the subscriptions
27
+
* For controller functionality, the app requires 'User Access Administrator' to create and implement right-size roles
28
28
29
29
## Prerequisites
30
30
@@ -42,11 +42,11 @@ To add Permissions Management to your Azure AD tenant:
42
42
43
43
### 1. Add Azure subscription details
44
44
45
-
Choose from 3 options to manage Azure subscriptions.
45
+
Choose from three options to manage Azure subscriptions.
46
46
47
47
#### Option 1: Automatically manage
48
48
49
-
This option allows subscriptions to be automatically detected and monitored without extra configuration.A key benefit of automatic management is that any current or future subscriptions found get onboarded automatically. Steps to detect list of subscriptions and onboard for collection:
49
+
This option allows subscriptions to be automatically detected and monitored without further work required. A key benefit of automatic management is that any current or future subscriptions found will be onboarded automatically. The steps to detect a list of subscriptions and onboard for collection are as follows:
50
50
51
51
- Firstly, grant Reader role to Cloud Infrastructure Entitlement Management application at management group or subscription scope. To do this:
52
52
@@ -70,13 +70,13 @@ To view status of onboarding after saving the configuration:
70
70
71
71
You have the ability to specify only certain subscriptions to manage and monitor with MEPM (up to 10 per collector). Follow the steps below to configure these subscriptions to be monitored:
72
72
73
-
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for this subscription.
73
+
1. For each subscription you wish to manage, ensure that the ‘Reader’ role has been granted to Cloud Infrastructure Entitlement Management application for the subscription.
74
74
1. In the EPM portal, click the cog on the top right-hand side.
75
75
1. Navigate to data collectors tab
76
76
1. Ensure 'Azure' is selected
77
77
1. Click ‘Create Configuration’
78
78
1. Select ‘Enter Authorization Systems’
79
-
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to 9 additional times, putting a single subscription ID into each respective input box.
79
+
1. Under the Subscription IDs section, enter a desired subscription ID into the input box. Click the “+” up to nine extra times, putting a single subscription ID into each respective input box.
80
80
1. Once you have input all of the desired subscriptions, click next
81
81
1. Click ‘Verify Now & Save’
82
82
1. Once the access to read and collect data is verified, collection will begin.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/onboard-gcp.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,16 +20,16 @@ This article describes how to onboard a Google Cloud Platform (GCP) project on P
20
20
21
21
## Explanation
22
22
23
-
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, somewhat analogous to a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
23
+
For GCP, permissions management is scoped to a *GCP project*. A GCP project is a logical collection of your resources in GCP, like a subscription in Azure, albeit with further configurations you can perform such as application registrations and OIDC configurations.
24
24
25
25
<!-- Diagram from Gargi-->
26
26
27
27
There are several moving parts across GCP and Azure, which are required to be configured before onboarding.
28
28
29
-
1. An AAD OIDC App
30
-
1. An Workload Identity in GCP
31
-
1. OAuth2 confidential client grant utilized
32
-
1. A GCP service account with permissions to collect
29
+
* An Azure AD OIDC App
30
+
* A Workload Identity in GCP
31
+
* OAuth2 confidential client grants utilized
32
+
* A GCP service account with permissions to collect
33
33
34
34
35
35
## Onboard a GCP project
@@ -59,11 +59,11 @@ Choose from 3 options to manage GCP projects.
59
59
60
60
#### Option 1: Automatically manage
61
61
62
-
This option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
62
+
The automatically manage option allows projects to be automatically detected and monitored without extra configuration. Steps to detect list of projects and onboard for collection:
63
63
64
64
Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope.
65
65
66
-
Once done, the steps are listed in the screen to do configure this manually in the GPC console, or programatically with the gcloud CLI.
66
+
Once done, the steps are listed in the screen, which shows how to further configure in the GPC console, or programatically with the gcloud CLI.
67
67
68
68
Once everything has been configured, click next, then 'Verify Now & Save'.
69
69
@@ -94,7 +94,7 @@ To view status of onboarding after saving the configuration:
94
94
This option detects all projects that are accessible by the Cloud Infrastructure Entitlement Management application.
95
95
96
96
- Firstly, grant Viewer and Security Reviewer role to service account created in previous step at organization, folder or project scope
97
-
- Once done, the steps are listed in the screen to do this manually in the GPC console, or programatically with the gcloud CLI
97
+
- Once done, the steps are listed in the screen to do configure manually in the GPC console, or programatically with the gcloud CLI
98
98
- Click Next
99
99
- Click 'Verify Now & Save'
100
100
- Navigate to newly create Data Collector row under GCP data collectors
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,13 +15,13 @@ ms.author: kenwith
15
15
16
16
## Overview
17
17
18
-
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multi-cloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
18
+
Permissions Management is a cloud infrastructure entitlement management (CIEM) solution that provides comprehensive visibility into permissions assigned to all identities. For example, over-privileged workload and user identities, actions, and resources across multicloud infrastructures in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP).
19
19
20
20
Permissions Management detects, automatically right-sizes, and continuously monitors unused and excessive permissions.
21
21
22
22
Organizations have to consider permissions management as a central piece of their Zero Trust security to implement least privilege access across their entire infrastructure:
23
23
24
-
- Organizations are increasingly adopting multi-cloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
24
+
- Organizations are increasingly adopting multicloud strategy and are struggling with the lack of visibility and the increasing complexity of managing access permissions.
25
25
- With the proliferation of identities and cloud services, the number of high-risk cloud permissions is exploding, expanding the attack surface for organizations.
26
26
- IT security teams are under increased pressure to ensure access to their expanding cloud estate is secure and compliant.
27
27
- The inconsistency of cloud providers' native access management models makes it even more complex for Security and Identity to manage permissions and enforce least privilege access policies across their entire environment.
@@ -32,7 +32,7 @@ Organizations have to consider permissions management as a central piece of thei
32
32
33
33
Permissions Management allows customers to address three key use cases: *discover*, *remediate*, and *monitor*.
34
34
35
-
Permissions Management has been designed in such a way that we recommended your organization sequentially 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally cannot action what is yet to be discovered, likewise you cannot continually evaluate what is yet to be remediated.
35
+
Permissions Management has been designed in such a way that we recommended you 'step-through' each of the below phases in order to gain insights into permissions across the organization. This is because you generally can't action what is yet to be discovered, likewise you can't continually evaluate what is yet to be remediated.
36
36
37
37
:::image type="content" source="media/overview/discover-remediate-monitor.png" alt-text="Use case for Permissions Management." lightbox="media/overview/discover-remediate-monitor.png":::
38
38
@@ -65,7 +65,7 @@ Permissions Management deepens Zero Trust security strategies by augmenting the
65
65
- Automate least privilege access: Use access analytics to ensure identities have the right permissions, at the right time.
66
66
- Unify access policies across infrastructure as a service (IaaS) platforms: Implement consistent security policies across your cloud infrastructure.
67
67
68
-
Once your organization has explored and implemented the discover, remediation and monitor phases, you have established one of the core pillars of a modern zero-trust security strategy.
68
+
Once your organization has explored and implemented the discover, remediation and monitor phases, you've established one of the core pillars of a modern zero-trust security strategy.
0 commit comments