You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/permissions-management-trial-playbook.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,8 @@ The dashboard leverages the Permission Creep Index, which is a single and unifie
85
85
86
86
2. View data about the activity in your authorization system
87
87
88
-
1.[View user data on the PCI heat map](../cloud-infrastructure-entitlement-management/product-dashboard.md#view-user-data-on-the-pci-heat-map). **Note:** The higher the PCI, the higher the risk.
88
+
1.[View user data on the PCI heat map](../cloud-infrastructure-entitlement-management/product-dashboard.md#view-user-data-on-the-pci-heat-map). [!Note]
89
+
The higher the PCI, the higher the risk.
89
90
90
91
2.[View information about users, roles, resources, and PCI trends](../cloud-infrastructure-entitlement-management/product-dashboard.md#view-information-about-users-roles-resources-and-pci-trends)
@@ -109,7 +110,7 @@ Right-size excessive and/or unused permissions in only a few clicks. Avoid any e
109
110
110
111
There are two facets to removing unused permissions: least privilege policy creation (remediation) and permissions-on-demand. With remediation, an administrator can create policies that remove unused permissions (also known as right-sizing permissions) to achieve least privilege across their multicloud environment.
111
112
112
-
1.[Manage roles/policies and permissions requests using the Remediation dashboard](../cloud-infrastructure-entitlement-management/ui-remediation.md).
113
+
-[Manage roles/policies and permissions requests using the Remediation dashboard](../cloud-infrastructure-entitlement-management/ui-remediation.md).
113
114
114
115
The dashboard includes six subtabs:
115
116
@@ -146,7 +147,7 @@ There are two facets to removing unused permissions: least privilege policy crea
146
147
147
148
Prevent data breaches caused by misuse and malicious exploitation of permissions with anomaly and outlier detection that alerts on any suspicious activity. Permissions Management continuously updates your Permission Creep Index and flags any incident, then immediately informs you with alerts via email. To further support rapid investigation and remediation, you can generate context-rich forensic reports around identities, actions, and resources.
148
149
149
-
1. Use queries to view information about user access with the **Audit** dashboard in Permissions Management. You can get an overview of queries a Permissions Management user has created to review how users access their authorization systems and accounts. The following options display at the top of the **Audit** dashboard:
150
+
- Use queries to view information about user access with the **Audit** dashboard in Permissions Management. You can get an overview of queries a Permissions Management user has created to review how users access their authorization systems and accounts. The following options display at the top of the **Audit** dashboard:
150
151
- A tab for each existing query. Select the tab to see details about the query.
151
152
-**New Query**: Select the tab to create a new query.
152
153
-**New tab (+)**: Select the tab to add a **New Query** tab.
@@ -161,7 +162,7 @@ Prevent data breaches caused by misuse and malicious exploitation of permissions
161
162
162
163
Use the **Activity triggers** dashboard to view information and set alerts and triggers.
163
164
164
-
2. Set activity alerts and triggers
165
+
- Set activity alerts and triggers
165
166
166
167
Our customizable machine learning-powered anomaly and outlier detection alerts will notify you of any suspicious activity such as deviations in usage profiles or abnormal access times. Alerts can be used to alert on permissions usage, access to resources, indicators of compromise, insider threats, or to track previous incidents.
167
168
@@ -180,25 +181,25 @@ Use the **Activity triggers** dashboard to view information and set alerts and t
180
181
181
182
Example: Any activity done by root:
182
183
183
-

184
+

184
185
185
186
Alert for monitoring any direct Azure role assignment
186
187
187
-

188
+

188
189
189
190
- Access to critical sensitive resources
190
191
191
192
Example: Alert for monitoring any action on Azure resources
192
193
193
-

194
+

194
195
195
196
- Use of break glass accounts like root in AWS, global admin in Azure AD accessing subscriptions, etc.
196
197
197
198
Example: BreakGlass users should be used for emergency access only.
198
199
199
-

200
+

200
201
201
-
3. Create and view reports
202
+
- Create and view reports
202
203
203
204
To support rapid remediation, you can set up security reports to be delivered at custom intervals. Permissions Management has various types of system report types available that capture specific sets of data by cloud infrastructure (AWS, Azure, GCP), by account/subscription/project, and more. Reports are fully customizable and can be delivered via email at pre-configured intervals.
0 commit comments