Professional Documents
Culture Documents
BEST PRACTICES
EVERWORK
GAME STUDIO PRESENTATION TEMPLATE
SIGN IN RISK POLICIES
When a user signs-in with Risky behavior, you can
BLOCK access or REQUIRE Multi-factor
Authentication.
Examples include:
ü Leaked credentials
ü Impossible Travel
ü Suspicious email forwarding
ü New Country
ü Account labeled Risky by an Administrator
Ø ( Global Admin, Security Admin, etc.)
USER RISK POLICIES
Ø When a User is Identified as Risky, you can choose to either
explicitly BLOCK access or REQUIRE a password change.
v The Azure-Samples Github Repo contains sample Policies that you can test and deploy
AUDITING & MONITORING
ü Enable auditing and monitoring of Azure AD activity to detect
and respond to security threats.
ü Using Azure roles also helps to promote best practices for security and
compliance, as it allows organizations to implement least privilege, which
grants users only the permissions they need to perform their job functions.
This can help to reduce the risk of unauthorized access, data breaches, and
other security incidents
ROLE EXAMPLE
Ø roleName == Display Name of Role
Ø Has full access to all resources within a subscription or resource Ø Can create and manage resources but cannot grant
group, including the ability to delegate access to others. access to others.
AZURE AD /AZURE ROLES
reader Billing Reader
Ø Can view existing resources, but cannot make any changes. Ø Can view billing information for a subscription but
cannot make any changes.
AZURE AD /AZURE ROLES
You should regularly review the following Roles and assignments:
v Global Administrator
v User Administrator
v Privileged Authentication Administrator
v Conditional Access Administrator
v Security Administrator
v All Microsoft 365 and Dynamics Service Administration roles
AZURE AD /AZURE ROLES
Ø There is a difference between Azure Roles and Azure AD Roles.
Ø In addition to the built-in roles, administrators can create custom roles that
meet the specific needs of their organization.
WHICH USERS SHOULD HAVE ACCESS TO WHAT ARE USERS DOING WITH THAT ACCESS?
WHICH RESOURCES?
Ø SOLUTION: Access Policies, RBAC
Ø SOLUTION: RBAC, Security Groups
ARE THERE EFFECTIVE ORGANIZATIONAL CAN AUDITORS VERIFY THAT THE CONTROLS
CONTROLS FOR MANAGING ACCESS? ARE WORKING?