Skip to content

Commit e9fe20a

Browse files
committed
Fixing blocking errors from PR review.
1 parent 03b62c1 commit e9fe20a

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,8 @@ The dashboard leverages the Permission Creep Index, which is a single and unifie
8585

8686
2. View data about the activity in your authorization system
8787

88-
1. [View user data on the PCI heat map](../cloud-infrastructure-entitlement-management/product-dashboard.md#view-user-data-on-the-pci-heat-map). **Note:** The higher the PCI, the higher the risk.
88+
1. [View user data on the PCI heat map](../cloud-infrastructure-entitlement-management/product-dashboard.md#view-user-data-on-the-pci-heat-map). [!Note]
89+
The higher the PCI, the higher the risk.
8990

9091
2. [View information about users, roles, resources, and PCI trends](../cloud-infrastructure-entitlement-management/product-dashboard.md#view-information-about-users-roles-resources-and-pci-trends)
9192
3. [View identity findings](../cloud-infrastructure-entitlement-management/product-dashboard.md#view-identity-findings)
@@ -109,7 +110,7 @@ Right-size excessive and/or unused permissions in only a few clicks. Avoid any e
109110

110111
There are two facets to removing unused permissions: least privilege policy creation (remediation) and permissions-on-demand. With remediation, an administrator can create policies that remove unused permissions (also known as right-sizing permissions) to achieve least privilege across their multicloud environment.
111112

112-
1. [Manage roles/policies and permissions requests using the Remediation dashboard](../cloud-infrastructure-entitlement-management/ui-remediation.md).
113+
- [Manage roles/policies and permissions requests using the Remediation dashboard](../cloud-infrastructure-entitlement-management/ui-remediation.md).
113114

114115
The dashboard includes six subtabs:
115116

@@ -146,7 +147,7 @@ There are two facets to removing unused permissions: least privilege policy crea
146147

147148
Prevent data breaches caused by misuse and malicious exploitation of permissions with anomaly and outlier detection that alerts on any suspicious activity. Permissions Management continuously updates your Permission Creep Index and flags any incident, then immediately informs you with alerts via email. To further support rapid investigation and remediation, you can generate context-rich forensic reports around identities, actions, and resources.
148149

149-
1. Use queries to view information about user access with the **Audit** dashboard in Permissions Management. You can get an overview of queries a Permissions Management user has created to review how users access their authorization systems and accounts. The following options display at the top of the **Audit** dashboard:
150+
- Use queries to view information about user access with the **Audit** dashboard in Permissions Management. You can get an overview of queries a Permissions Management user has created to review how users access their authorization systems and accounts. The following options display at the top of the **Audit** dashboard:
150151
- A tab for each existing query. Select the tab to see details about the query.
151152
- **New Query**: Select the tab to create a new query.
152153
- **New tab (+)**: Select the tab to add a **New Query** tab.
@@ -161,7 +162,7 @@ Prevent data breaches caused by misuse and malicious exploitation of permissions
161162

162163
Use the **Activity triggers** dashboard to view information and set alerts and triggers.
163164

164-
2. Set activity alerts and triggers
165+
- Set activity alerts and triggers
165166

166167
Our customizable machine learning-powered anomaly and outlier detection alerts will notify you of any suspicious activity such as deviations in usage profiles or abnormal access times. Alerts can be used to alert on permissions usage, access to resources, indicators of compromise, insider threats, or to track previous incidents.
167168

@@ -180,25 +181,25 @@ Use the **Activity triggers** dashboard to view information and set alerts and t
180181

181182
Example: Any activity done by root:
182183

183-
![Diagram, Any activity done by root user in AWS](media/permissions-management-trial-playbook/custom-alerts-1.png)
184+
![Diagram, Any activity done by root user in AWS.](media/permissions-management-trial-playbook/custom-alerts-1.png)
184185

185186
Alert for monitoring any direct Azure role assignment
186187

187-
![Diagram, Alert for monitoring any direct Azure role assignment done by anyone other than Admin user](media/permissions-management-trial-playbook/custom-alerts-2.png)
188+
![Diagram, Alert for monitoring any direct Azure role assignment done by anyone other than Admin user.](media/permissions-management-trial-playbook/custom-alerts-2.png)
188189

189190
- Access to critical sensitive resources
190191

191192
Example: Alert for monitoring any action on Azure resources
192193

193-
![Diagram, Alert for monitoring any action on Azure resources](media/permissions-management-trial-playbook/custom-alerts-3.png)
194+
![Diagram, Alert for monitoring any action on Azure resources.](media/permissions-management-trial-playbook/custom-alerts-3.png)
194195

195196
- Use of break glass accounts like root in AWS, global admin in Azure AD accessing subscriptions, etc.
196197

197198
Example: BreakGlass users should be used for emergency access only.
198199

199-
![Diagram, Example of break glass account users used for emergency access only](media/permissions-management-trial-playbook/custom-alerts-4.png)
200+
![Diagram, Example of break glass account users used for emergency access only.](media/permissions-management-trial-playbook/custom-alerts-4.png)
200201

201-
3. Create and view reports
202+
- Create and view reports
202203

203204
To support rapid remediation, you can set up security reports to be delivered at custom intervals. Permissions Management has various types of system report types available that capture specific sets of data by cloud infrastructure (AWS, Azure, GCP), by account/subscription/project, and more. Reports are fully customizable and can be delivered via email at pre-configured intervals.
204205

0 commit comments

Comments
 (0)