You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/3-secure-access-plan.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,11 +26,11 @@ Before you create an external-access security plan, review the following two art
26
26
27
27
For your security plan, document the following information:
28
28
29
-
* Applications and resources to be grouped for access
29
+
* Applications and resources grouped for access
30
30
* Sign-in conditions for external users
31
31
* Device state, sign-in location, client application requirements, user risk, etc.
32
32
* Policies to determine timing for reviews and access removal
33
-
* User populations to be grouped for similar experiences
33
+
* User populations grouped for similar experiences
34
34
35
35
To implement the security plan, you can use Microsoft identity and access management policies, or another identity provider (IdP).
36
36
@@ -50,14 +50,14 @@ See the following links to articles about resource grouping strategies:
50
50
* Define access for external user application groups
51
51
*[Overview: Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md)
52
52
53
-
Document the applications to be grouped. Considerations include:
53
+
Document the grouped applications. Considerations include:
54
54
55
55
***Risk profile** - assess the risk if a bad actor gains access to an application
56
-
* Identify application as High, Medium, or Low risk. It's recommended you don't group High-risk with Low-risk.
56
+
* Identify application as High, Medium, or Low risk. We recommend you don't group High-risk with Low-risk.
57
57
* Document applications that can't be shared with external users
58
58
***Compliance frameworks** - determine compliance frameworks for apps
59
59
* Identify access and review requirements
60
-
***Applications for roles or departments** - assess applications to be grouped for role, or department, access
60
+
***Applications for roles or departments** - assess applications grouped for role, or department, access
61
61
***Collaboration applications** - identify collaboration applications external users can access, such as Teams or SharePoint
62
62
* For productivity applications, external users might have licenses, or you might provide access
63
63
@@ -66,7 +66,7 @@ Document the following information for application and resource group access by
66
66
* Descriptive group name, for example High_Risk_External_Access_Finance
67
67
* Applications and resources in the group
68
68
* Application and resource owners and their contact information
69
-
*Access is controlled by the IT team, or is delegated to a business owner
69
+
*The IT team controls access, or control is delegated to a business owner
70
70
* Prerequisites for access: background check, training, etc.
71
71
* Compliance requirements to access resources
72
72
* Challenges, for example multi-factor authentication (MFA) for some resources
@@ -106,11 +106,11 @@ Use the following table to help assess policy to address risk.
106
106
| Identity protection is High risk| Require user to change password |
107
107
| Network location| To access confidential projects, require sign-in from an IP address range |
108
108
109
-
To use device state as policy input, the device is registered or joined to your tenant. To trust the device claims from the home tenant, configure cross-tenant access settings. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
109
+
To use device state as policy input, register or join the device to your tenant. To trust the device claims from the home tenant, configure cross-tenant access settings. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
110
110
111
111
You can use identity-protection risk policies. However, mitigate issues in the user home tenant. See, [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md).
112
112
113
-
For network locations, you can restrict access to IP addresses ranges you own. Use this method if external partners access applications while at your location. See, [Conditional Access: Block access by location](../conditional-access/howto-conditional-access-policy-location.md)
113
+
For network locations, you can restrict access to IP addresses ranges that you own. Use this method if external partners access applications while at your location. See, [Conditional Access: Block access by location](../conditional-access/howto-conditional-access-policy-location.md)
114
114
115
115
## Document access review policies
116
116
@@ -120,7 +120,7 @@ Document policies that dictate when to review resource access, and remove accoun
120
120
* Internal business policies and processes
121
121
* User behavior
122
122
123
-
Generally, policies are customized, however consider the following parameters:
123
+
Generally, organizations customize policy, however consider the following parameters:
124
124
125
125
***Entitlement management access reviews**:
126
126
*[Change lifecycle settings for an access package in entitlement management](../governance/entitlement-management-access-package-lifecycle-policy.md)
@@ -135,7 +135,7 @@ Generally, policies are customized, however consider the following parameters:
135
135
136
136
## Access control methods
137
137
138
-
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses. Learn more in the following entitlement managment section.
138
+
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses. Learn more in the following entitlement management section.
139
139
140
140
> [!NOTE]
141
141
> Licenses are for one user. Therefore users, administrators, and business owners can have delegated access control. This scenario can occur with Azure AD P2 or Microsoft 365 E5, and you don't have to enable licenses for all users. The first 50,000 external users are free. If you don't enable P2 licenses for other internal users, they can't use entitlement management.
@@ -148,7 +148,7 @@ Azure AD P2 and Microsoft 365 E5 have all the security and governance tools.
148
148
149
149
### Provision, sign-in, review access, and deprovision access
@@ -159,7 +159,7 @@ Entries in bold are recommended.
159
159
160
160
### Resource access
161
161
162
-
Entries in bold are recommended.
162
+
Entries in bold are recommended actions.
163
163
164
164
|Feature | App and resource access| SharePoint and OneDrive access| Teams access| Email and document security |
165
165
| - |-|-|-|-|
@@ -170,15 +170,15 @@ Entries in bold are recommended.
170
170
171
171
### Entitlement management
172
172
173
-
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations gramted access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
173
+
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations granted access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
174
174
175
175
Learn more: [Create a new access package in entitlement management](../governance/entitlement-management-access-package-create.md)
176
176
177
177
## Governance with Azure AD P1, Microsoft 365, Office 365 E3
178
178
179
179
### Provision, sign-in, review access, and deprovision access
0 commit comments