Time
8 hours 33 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:00
Hello, Siberians. Welcome to this lesson on a giant e privilege identity management. Part one.
00:06
This lesson is part of the is that 500 Microsoft Azure security technologist costs
00:12
to keep it in simple. I refer to the Aggravation team going forward.
00:18
Some quick information on washing becoming in this lesson.
00:21
We'll start by looking at the vist associate edge to privilege. Identities on the best practices on managing those risks
00:29
wouldn't cover an overview off as I a deep team.
00:33
We'll look at our hole assignment. Walks with Team on, finally would discuss the features that are available in pain.
00:40
Let's get into this.
00:42
Let's start by discussing the risk to populate identities.
00:47
What is a privilege? Identity?
00:49
A privileged identity is one that, as administrative permissions to our azure environment.
00:55
In other words, they have more permissions than a typical user.
00:59
And they usually limited to a small number off I T administrators or business application owners.
01:06
As you can imagine, this identities are I value target for Attackers just because of the level of access that is granted to them,
01:15
and I, someone put it. If identity is the new perimeter than privileged identities at the perimeters, Count Julius.
01:23
If we fail to protect this privilege, identities on attacker can find an open door into critical systems and data on they could even take advantage of the credentials to move laterally within i environment.
01:36
You know how to deal with this risk? Compressive privilege. Identity protection requires access to be granted only two people that should have it
01:46
Onley when they needed the access. That is just in time at a level that access is needed. That is just enough
01:53
and for the duration that it needs the access. In other words, time bound.
01:59
Now, this miss sound like simple common sense
02:01
for marriage. Indies is an entirely different ballgame, especially if we're talking about managing these at scale for a large organization.
02:12
This is where a service like a giant deep team can help us. Let's see what ***
02:19
team is on a just service that helps us to manage privilege, administrative role assignment, toe a joy D on a jury sauces.
02:29
In order for us to be able to use a team,
02:30
there is one men requirement, and that is we needs toe have on assign as your Eddie Premium Peter licenses for user Stobie. Using this service
02:42
to get a clever understanding off our team can help us.
02:45
Let's check out some information on our ball assignment, walks with him.
02:50
Let's say an admin who called David wants to ensure that a user called Brenda can be assigned to the global ad. Mineral in majority
03:00
on the user, called Bradley, can be assigned to the subscription on a row whenever in its it,
03:06
David will foster need tohave team administrative privileges,
03:10
and it will needs toe on board the votes that it wants to protect into Pim
03:16
and in this case, the a giant global at Monroe on the edge of a saucepan of those will be embodied into Pim,
03:23
David can configure a time limit for the unbuttered rolls. As part of the configuration,
03:30
David can also make Brenda on Bradley eligible for the votes that in need access to
03:38
hell. Edible users can then request to take on Evo in Pim. Whenever they need access. Pin verifies their eligibility on Ghost Ron approval workflow. If configured
03:52
ive approval is granted, Pim Configures the required full assignment for the allowed time period
03:59
on the Good Friend is that once the time limit expires, team automatically removes the ball assignment.
04:05
Let's look at the features that we can configure in Pim.
04:10
The first feature is just in time access. This means that the user will needs to go to an activation process in order for them to be a science tree road that elevates their privilege.
04:20
Then we have time bound taxes,
04:24
which means that came allows us to limit the time periods that the user can be a sign straight bro.
04:29
And when the time is up, just as we automatically be removed from the roll Assignment by Pim Pim supports approval walk flows, which means that the configuration often approval process. When a user goes to activate a vote, for example, we can configure one or more users as approvals. Whenever a user goes toe, activate
04:47
the global administrator vote.
04:49
We can require for more factor. Authentication and justifications were provided. When a user goes to activate a vote,
04:57
justification is especially useful for internal and external audits scenarios. We can even required to get number to be provided as reference.
05:04
We can configure notifications to know which uses are activating, which rose in our environment. We can also configure shadowed access reviews to make sure that is an ongoing process to review whether access is to needed on toe automatically remove access that's no longer needed.
05:23
And finally, we can download the audit history for all the activities that are going on in team. Whether that's an activation requires whether that's the approval that's been granted or whether when the role is assigned and removed. So what types of those can we protect with pain?
05:40
First, we can protect all as you're a DeVos, and this includes building and custom roles,
05:46
so those, like Global Administrator on security administrator can be protected by as a a deep team.
05:53
This also includes Office 365 rows that I represented in our joy 80. So Rose like exchange administrator and SharePoint Administrator
06:02
team also supports all azure Jesus Rose on This includes butin and custom rose,
06:10
so those, like resource owner and contributor can be protected isn't team and this can be done across different scopes like management group subscription and resource group level.
06:20
However, we cannot protect classic. I just description Rose using team, so those like account administrators, service administrator encore administrators that are related to classic azure subscription cannot be embodied into Pim.
06:35
So here's a somebody off. What we covered in this lesson well started with a discussion off risk to privilege identities on best practices on managing those risks
06:46
with uncovered an overview off a joy deep team.
06:48
We looked at our full assignment, walks with team
06:51
and finally would discuss the features that are available in Pim.
06:57
Thanks very much for watching on. I'll see you in the next lesson where we'll continue our discussion off him.

Up Next

AZ-500: Microsoft Azure Security Technologies

In the AZ-500 Microsoft Azure Security Technologies training, students will learn the skills that are needed to pass the AZ-500 certification exam. All exam topics are covered as well as exam preparation strategies and hands-on practice.

Instructed By

Instructor Profile Image
David Okeyode
Cloud Security Architect
Instructor