Skip to content

Commit f6ba0f8

Browse files
authored
Update 3-secure-access-plan.md
1 parent 6008c38 commit f6ba0f8

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/active-directory/fundamentals/3-secure-access-plan.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ Before you create an external-access security plan, review the following two art
2626

2727
For your security plan, document the following information:
2828

29-
* Applications and resources to be grouped for access
29+
* Applications and resources grouped for access
3030
* Sign-in conditions for external users
3131
* Device state, sign-in location, client application requirements, user risk, etc.
3232
* Policies to determine timing for reviews and access removal
33-
* User populations to be grouped for similar experiences
33+
* User populations grouped for similar experiences
3434

3535
To implement the security plan, you can use Microsoft identity and access management policies, or another identity provider (IdP).
3636

@@ -50,14 +50,14 @@ See the following links to articles about resource grouping strategies:
5050
* Define access for external user application groups
5151
* [Overview: Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md)
5252

53-
Document the applications to be grouped. Considerations include:
53+
Document the grouped applications. Considerations include:
5454

5555
* **Risk profile** - assess the risk if a bad actor gains access to an application
56-
* Identify application as High, Medium, or Low risk. It's recommended you don't group High-risk with Low-risk.
56+
* Identify application as High, Medium, or Low risk. We recommend you don't group High-risk with Low-risk.
5757
* Document applications that can't be shared with external users
5858
* **Compliance frameworks** - determine compliance frameworks for apps
5959
* Identify access and review requirements
60-
* **Applications for roles or departments** - assess applications to be grouped for role, or department, access
60+
* **Applications for roles or departments** - assess applications grouped for role, or department, access
6161
* **Collaboration applications** - identify collaboration applications external users can access, such as Teams or SharePoint
6262
* For productivity applications, external users might have licenses, or you might provide access
6363

@@ -66,7 +66,7 @@ Document the following information for application and resource group access by
6666
* Descriptive group name, for example High_Risk_External_Access_Finance
6767
* Applications and resources in the group
6868
* Application and resource owners and their contact information
69-
* Access is controlled by the IT team, or is delegated to a business owner
69+
* The IT team controls access, or control is delegated to a business owner
7070
* Prerequisites for access: background check, training, etc.
7171
* Compliance requirements to access resources
7272
* Challenges, for example multi-factor authentication (MFA) for some resources
@@ -106,11 +106,11 @@ Use the following table to help assess policy to address risk.
106106
| Identity protection is High risk| Require user to change password |
107107
| Network location| To access confidential projects, require sign-in from an IP address range |
108108

109-
To use device state as policy input, the device is registered or joined to your tenant. To trust the device claims from the home tenant, configure cross-tenant access settings. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
109+
To use device state as policy input, register or join the device to your tenant. To trust the device claims from the home tenant, configure cross-tenant access settings. See, [Modify inbound access settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
110110

111111
You can use identity-protection risk policies. However, mitigate issues in the user home tenant. See, [Common Conditional Access policy: Sign-in risk-based multifactor authentication](../conditional-access/howto-conditional-access-policy-risk.md).
112112

113-
For network locations, you can restrict access to IP addresses ranges you own. Use this method if external partners access applications while at your location. See, [Conditional Access: Block access by location](../conditional-access/howto-conditional-access-policy-location.md)
113+
For network locations, you can restrict access to IP addresses ranges that you own. Use this method if external partners access applications while at your location. See, [Conditional Access: Block access by location](../conditional-access/howto-conditional-access-policy-location.md)
114114

115115
## Document access review policies
116116

@@ -120,7 +120,7 @@ Document policies that dictate when to review resource access, and remove accoun
120120
* Internal business policies and processes
121121
* User behavior
122122

123-
Generally, policies are customized, however consider the following parameters:
123+
Generally, organizations customize policy, however consider the following parameters:
124124

125125
* **Entitlement management access reviews**:
126126
* [Change lifecycle settings for an access package in entitlement management](../governance/entitlement-management-access-package-lifecycle-policy.md)
@@ -135,7 +135,7 @@ Generally, policies are customized, however consider the following parameters:
135135

136136
## Access control methods
137137

138-
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses. Learn more in the following entitlement managment section.
138+
Some features, for example entitlement management, are available with an Azure AD Premium 2 (P2) license. Microsoft 365 E5 and Office 365 E5 licenses include Azure AD P2 licenses. Learn more in the following entitlement management section.
139139

140140
> [!NOTE]
141141
> Licenses are for one user. Therefore users, administrators, and business owners can have delegated access control. This scenario can occur with Azure AD P2 or Microsoft 365 E5, and you don't have to enable licenses for all users. The first 50,000 external users are free. If you don't enable P2 licenses for other internal users, they can't use entitlement management.
@@ -148,7 +148,7 @@ Azure AD P2 and Microsoft 365 E5 have all the security and governance tools.
148148

149149
### Provision, sign-in, review access, and deprovision access
150150

151-
Entries in bold are recommended.
151+
Entries in bold are recommended actions.
152152

153153
| Feature| Provision external users| Enforce sign-in requirements| Review access| Deprovision access |
154154
| - | - | - | - | - |
@@ -159,7 +159,7 @@ Entries in bold are recommended.
159159

160160
### Resource access
161161

162-
Entries in bold are recommended.
162+
Entries in bold are recommended actions.
163163

164164
|Feature | App and resource access| SharePoint and OneDrive access| Teams access| Email and document security |
165165
| - |-|-|-|-|
@@ -170,15 +170,15 @@ Entries in bold are recommended.
170170

171171
### Entitlement management 
172172

173-
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations gramted access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
173+
Use entitlement management to provision and deprovision access to groups and teams, applications, and SharePoint sites. Define the connected organizations granted access, self-service requests, and approval workflows. To ensure access ends correctly, define expiration policies and access reviews for packages.
174174

175175
Learn more: [Create a new access package in entitlement management](../governance/entitlement-management-access-package-create.md)
176176

177177
## Governance with Azure AD P1, Microsoft 365, Office 365 E3
178178

179179
### Provision, sign-in, review access, and deprovision access
180180

181-
Items in bold are recommended.
181+
Items in bold are recommended actions.
182182

183183
|Feature | Provision external users| Enforce sign-in requirements| Review access| Deprovision access |
184184
| - |-|-|-|-|

0 commit comments

Comments
 (0)