Data Governance and Protection Using Microsoft Purview
How to make the most out of the Microsoft licensing to secure your environment – Part 3 In this multi-part blog series, we are walking you through...
7 min read
Kevin Dillaway
:
Apr 25, 2023 10:15:00 AM
In this multi-part blog, we will walk through the best ways to take on the challenges around successfully implementing your M365 licensing while increasing your ability to secure the environment. Challenges include how to plan for the integration of the M365 product suite with existing processes to maximize the investment in the licensing that was purchased and being able to manage the amount of change that the M365 adoption can bring in a consumable way.
Previous sections of this blog series talked through the importance of Identity and Access Management (IAM) and protecting data throughout the environment. While it was mentioned in those blogs about dealing with external identities and sharing, this blog will dive deeper into some of the solutions that Microsoft brings to bear as part of M365 licensing. This part of the series goes back to those two topics and dives deep into what can be done to better manage the people from outside our organizations and the data that they may have access to.
Managing users that are coming in from outside the organization has always been an issue since there has been limited configuration and control available over how, when, and to what the user could connect. These are conditions that we need to establish even tighter with those external parties than we do with our internal users. The question is, how do we do that without generating huge amounts ot overhead and oversight? Unfortunately, the answer to that question is not universal, but will involve a combination of the following:
Azure Business to Business (Azure B2B) has been a foundational component of the external identity strategy for a significant time. The solution has morphed over the years to include new capabilities to better control and have visibility into what is happening with guest users. The basic process of Azure B2B is for an internal user to add an external user to an internal resource. When that happens, an invitation will be sent to the external user, and they will proceed by authenticating against the account that was shared with. This then creates an AAD object in the tenant that is designated as a “Guest.” This process has worked, but it is hard to centrally manage and audit. There are available options, though:
There are times when the users that need access to internal services and resources are from anywhere including public domains like Google, Twitter, Amazon, etc. Many times the users may number in the thousands and would not be manageable through the Azure B2B service. In these instances, Azure B2C provides a service to not only provide access to the internal resources, but also the segregation of those users from your internal directory. This allows for all of the users to get to what they need while maintaining a higher level of security and lowering overall risk for the internal environment. To find out more information around this solution and all the ways it can integrate into your existing CRM, IdP, and other solutions, go here: What is Azure Active Directory B2C? | Microsoft Learn. It is important to remember that Azure B2C is an additional service that will incur additional costs.
To make sure that both internal and external users are managed appropriately, Access Packages and Access Reviews should be leveraged as part of the user lifecycle. While this capability requires an Azure AD P2 license, it add the ability to automate and standardize the onboarding, offboarding, and review of users, their memberships, their roles, and their access across the environment. For external users, this can be leveraged to assign specific sets of permissions across resources such as applications, groups, Teams, and Sites. Once the packages are configured, Access reviews can then be assigned to make sure that membership to those access packages is correct. The solution also offers the ability to decide which packages are self service and which ones would require approval. More information can be found here: What is entitlement management? - Microsoft Entra | Microsoft Learn
Once the IAM component of the external access is architected and configured, the configuration or the external sharing must be addressed. The design of this is going to be based off the following:
In this series so far, we have covered how to start, tackling identity, dealing with data governance, and now handling external sharing and identities. Over the next few posts, we will cover:
In the official Part 4, we will tackle the ways to leverage Intune to manage endpoints for configuration, configuration, compliance, updates, and reporting. Stay tuned for part 4 of 7 coming out soon!
We are here to help! Please contact us if you would like to have a conversation about this at any time.
How to make the most out of the Microsoft licensing to secure your environment – Part 3 In this multi-part blog series, we are walking you through...
In this multi-part blog, we will help walk through the best ways to take on the challenges around successfully implementing your M365 licensing while...
On October 27th, our Senior Solutions Architect, Mary Harvey, led guests on a live webinar through an in-depth introduction to Power Apps Portals....