You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/1-secure-access-posture.md
+42-35Lines changed: 42 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: fundamentals
10
10
ms.topic: conceptual
11
-
ms.date: 02/01/2023
11
+
ms.date: 02/02/2023
12
12
ms.author: jricketts
13
13
ms.reviewer: ajburnle
14
14
ms.custom: "it-pro, seodec18"
@@ -22,70 +22,77 @@ As you consider the governance of external access, assess your organization's se
22
22

23
23
24
24
> [!NOTE]
25
-
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels to get their jobs done. An example is end users sending unsecured documents by email.
25
+
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels. An example is end users sending unsecured documents by email.
26
26
27
-
## Think in terms of scenarios
27
+
## Scenario-based planning
28
28
29
-
In many cases IT can delegate partner access, at least in some scenarios, while providing guard rails for security. The IT guard rails can be help ensure that intellectual property stays secure, while empowering employees to collaborate with partners to get work done.
29
+
IT teams can delegate partner access to empower employees to collaborate with partners. This delegation can occur while maintaining sufficient security to protect intellectual property.
30
30
31
-
As you consider the scenarios within your organization, assess the need for employee versus business partner access to resources. A bank may have compliance needs that restrict access to certain resources, like user account information, to a small group of internal employees. Conversely, the same bank may enable delegated access for partners working on a marketing campaign.
31
+
Compile and assess your organizations scenarios to help assess employee versus business partner access to resources. Financial institutions might have compliance standards that restrict employee access to resources such as account information. Conversely, the same institutions can enable delegated partner access for projects such as marketing campaigns.
32
32
33
-

33
+

34
34
35
-
In each scenario, consider
35
+
### Scenario considerations
36
36
37
-
* the sensitivity of the information at risk
37
+
Use the following list to help measure the level of access control.
38
38
39
-
* whether you need to restrict what partners can see about other users
39
+
* Information sensitivity, and associated risk of its exposure
40
+
* Partner access to information about other end users
41
+
* The cost of a breach versus the overhead of centralized control and end-user friction
40
42
41
-
* the cost of a breach vs the weight of centralized control and end-user friction
43
+
Organizations can start with highly-managed controls to meet compliance targets, and then delegate some control to end users, over time. There can be simultaneous access-management models in an organization.
42
44
43
-
You may also start with centrally managed controls to meet compliance targets and delegate control to end users over time. All access management models may simultaneously coexist within an organization.
45
+
> [!NOTE]
46
+
> Partner-managed credentials are a method to signal the termination of access to resources, when an external user loses access to resources in their own company. Learn more: [B2B collaboration overview](../external-identities/what-is-b2b.md)
44
47
45
-
The use of [partner managed credentials](../external-identities/what-is-b2b.md) provides your organization with an essential signal that terminates access to your resources once the external user has lost access to the resources of their own company.
48
+
## External-access security goals
46
49
47
-
## Goals of securing external access
50
+
The goals of IT-governed and delegated access differ. The primary goals of IT-governed access are:
48
51
49
-
The goals of IT-governed and delegated access differ.
52
+
* Meet governance, regulatory, and compliance (GRC) targets
53
+
* High level of control over partner access to information about end users, groups, and other partners
50
54
51
-
**The primary goals of IT-governed access are to:**
55
+
The primary goals of delegating access are:
52
56
53
-
* Meet governance, regulatory, and compliance (GRC) targets.
57
+
* Enable business owners to determine collaboration partners, with security constraints
58
+
* Enable partners to request access, based on rules defined by business owners
54
59
55
-
* Tightly control partner access and what partners can see about member users, groups, and other partners.
60
+
### Common goals
56
61
57
-
**The primary goals of delegating access are to:**
62
+
#### Control access to applications, data, and content
58
63
59
-
* Enable business owners to govern who they collaborate with, within IT constraints.
64
+
This can be accomplished through a variety of methods, depending on your version of Azure AD and Microsoft 365.
60
65
61
-
* Enable business partners to request access based on rules defined by business owners.
66
+
*[Azure AD plans and pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing)
Whichever you enact for your organization and scenarios you'll need to:
69
+
#### Reduce attack surface
64
70
65
-
***Control access to applications, data, and content**. This can be accomplished through a variety of methods, depending on your versions of [Azure AD](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing) and [Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
71
+
*[What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md) - manage, control, and monitor access to resources in Azure AD, Azure, and other Microsoft Online Services such as Microsoft 365 or Microsoft Intune
72
+
*[Data loss prevention in Exchange Server](/exchange/policy-and-compliance/data-loss-prevention/data-loss-prevention?view=exchserver-2019)
66
73
67
-
***Reduce the attack surface**. [Privileged identity management](../privileged-identity-management/pim-configure.md), [data loss prevention (DLP),](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) and [encryption capabilities](/exchange/security-and-compliance/data-loss-prevention/data-loss-prevention) reduce the attack surface.
74
+
#### Confirm compliance with activity and audit log reviews
68
75
69
-
***Regularly review activity and audit log to confirm compliance**. IT can delegate access decisions to business owners through entitlement management while access reviews provide a way to periodically confirm continued access. Automated data classification with sensitivity labels helps to automate encryption of sensitive content making it easy for employee end users to comply.
76
+
IT teams can delegate access decisions to business owners through entitlement management, while access reviews help confirm continued access. You can use automated data classification with sensitivity labels to automate the encryption of sensitive content, easing compliance for end users.
70
77
71
-
## Next steps
78
+
## Next steps
72
79
73
-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
80
+
See the following articles to learn more about securing external access to resources. We recommend you follow the listed order.
74
81
75
-
1.[Determine your security posture for external access](1-secure-access-posture.md) (You are here.)
82
+
1.[Determine your security posture for external access with Azure AD](1-secure-access-posture.md)
76
83
77
-
2.[Discover your current state](2-secure-access-current-state.md)
84
+
2.[Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
78
85
79
-
3.[Create a governance plan](3-secure-access-plan.md)
86
+
3.[Create a security plan for external access](3-secure-access-plan.md)
80
87
81
-
4.[Use groups for security](4-secure-access-groups.md)
88
+
4.[Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
82
89
83
-
5.[Transition to Azure AD B2B](5-secure-access-b2b.md)
90
+
5.[Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
84
91
85
-
6.[Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
92
+
6.[Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
86
93
87
-
7.[Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
94
+
7.[Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
88
95
89
-
8.[Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
96
+
8.[Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md) (You're here)
90
97
91
-
9.[Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
98
+
9.[Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business](9-secure-access-teams-sharepoint.md)
0 commit comments