SlideShare a Scribd company logo
Securing your identity infrastructure
Digital transformation roadmap
Jan 1, 2020
Scope requirements
for Work-from-
Anywhere
transformation
initiative
Secure Budget
for V1 Pilots
90 day pilots:
BYOD, 1-day-WFH,
remote meetings
Evaluate
learnings and
scope V2 Pilots
Secure Budget
for V2 Pilots
120 day
pilots with
select teams
Develop training
and internal PR
Complete
Work-from-
Anywhere rollout
Begin
team-by-team
rollouts
Jun 1, 2022
Digital transformation roadmap
Jan 1, 2020 Jun 1, 2022
Apr 1, 2020
Scope requirements
for Work-from-
Anywhere
transformation
initiative
Secure Budget
for V1 Pilots
90 day pilots:
BYOD, 1-day-WFH,
remote meetings
Evaluate
learnings and
scope V2 Pilots
Secure Budget
for V2 Pilots
120 day
pilots with
select teams
Develop training
and internal PR
Begin
team-by-team
rollouts
Complete
Work-from-
Anywhere rollout
“We have seen two years’
worth of digital
transformation in two
months.“
Satya Nadella Microsoft CEO
Bring your own devices and IoT
Explosion of cloud apps
Expanding Perimeters
Explosion of signal
Composite apps & public restful APIs
Employees, partners, customers, bots
Old World vs. Current World
Zero Trust
A modern approach to security
which treats every access
attempt as if it’s originating
from an untrusted network
Never Trust, Always Verify
Zero Trust principles and holistic security strategy
Verify explicitly
Zero Trust across the esate
Visibility, Analytics,
Automation
Real-time
policy evaluation
Organization
policies
Zero Trust architecture
5 steps to securing your identity infrastructure.pptx
1. Strengthen your credentials
2. Reduce your attack surface area
3. Automate threat response
4. Utilize cloud intelligence
5. Empower end users with self-service
AKA.MS/SECURITYSTEPS
Helping you
build a strong
identity
foundation
Start with a strong identity foundation in the
cloud
Azure Active Directory – the world’s largest cloud identity service
Secure access to all applications with single sign on
HR systems
Apps and data
Cloud apps
On-premises perimeter-based networks
Azure AD
App delivery controllers
& networks
Azure AD
App Proxy
Active Directory
single sign-on
External users
Winning strategy 1
Strengthen your credentials
230% Increase in password spray attacks this year
Nearly 1 in 3 of all attacks on enterprises involve phishing
attacker-driven sign-ins
detected in August 2020
5.8B
high-risk enterprise sign-in
attempts flagged in August 2020
9M
compromised accounts
detected in August 2020
2M
* Chart shows impact of COVID-19 themed attacks across the world by file count (as of April 7, 2020) /
Source Microsoft Threat Intelligence
Verify identities with strong authentication
Good: Password +
(Preview)
Better: Password +
(Preview)
(Preview)
Best
Bad: Password
123456
qwerty
password
iloveyou
Password1
Deploy the most secure, usable & cost-effective methods
5 steps to securing your identity infrastructure.pptx
Winning
strategies for
strengthening
your credentials
• Enable MFA for all your admins (if you still haven’t)
• Deploy strong authentication for all users
• Start your passwordless journey
• Block legacy authentication
Winning strategy 2
Reduce your attack surface
Protect identities with Conditional Access and
multifactor authentication
Require MFA
Allow access
Application
User and location Device
Real-time risk
Limit access
Password reset
Monitor access
Signals Verify every access attempt Access apps and data
# admins with highest levels of privileges over time
Risks with Privileged Access
Number
of
permissions
Time
Admin #1
Admin #2
Admin #3
Secure and compliant by default, governed by the principle of Zero Standing
Access, with Just-in-Time & Just-Enough-Access
What you want - Least Privileged Access
Number
of
permissions
Time
Admin #1
Admin #2
Admin #3
Password Admin 1 hr Security Admin 2 hrs Global Admin .5hr
Admin #1
Password Admin 1 hr
Admin #3
Global Admin .5 hr
Access
reviewed &
revised
Job changes
Ongoing auditing
& reporting
Access rights
provisioned
Requests
additional
access
User onboarded
Azure AD entitlement management
Winning
strategies for
reducing your
attack surface
• Enable timebound just-in-time (JIT) access via
Privileged Identity Management if you haven’t
• Block invalid authentication points via Conditional
Access
• Perform lifecycle management via Entitlement
Management
• Periodically recertify privileged users via Access
Reviews
• Require admins to elevate permissions when needed
for sensitive apps
Winning strategy 3
Automate threat response
Identity Protection intelligently detects and responds to compromise
Continuously improving to prevent attack
Automatedremediation
Policy enforcement
Improved machine
learning
MoreMicrosoft ecosystem
innovation
Extended threat
intelligence
Risk assessment
Investigation
Real time session risk
Microsoft Graph API and Security Graph,
Logic apps
MCAS, Azure ATP
Azure AD · Identity Protection · Risk types
Users with leaked
credentials
Sign-ins from anonymous
IP addresses
Impossible travel to
atypical locations
Sign-ins from
infected devices
Sign-ins from IP addresses
with suspicious activity
Sign-ins from
unfamiliar locations
New risk alerts are added as new threats emerge
?
Winning
strategies for
automating
threat response
• Require MFA or block risky sign-ins via Conditional
Access
• Enforce secured password change or block risky users
via Conditional Access
Winning strategy 4
Utilize cloud intelligence
Actionable insights in Azure AD
Identity Protection
Privileged Identity
Management
Workbook analytics:
 CA insights
 Legacy authentication
workbook
 Access package
activity
Azure Sentinel
integration
Winning
strategies for
utilizing cloud
intelligence
• Watch for alerts emails - Privileged Identity
Management activation and Identity Protection
• Check your identity secure score
• Monitor your Azure AD audit and sign-in logs
• Strengthen your Conditional Access policies and
Privileged Identity Management via insight reporting
• Create dashboards with Azure AD workbooks
Winning strategy 5
Empower end users with self-service
Improve productivity with self-service tools
Single sign-on (SSO)
Self-serve password reset
Application launching portal
My sign-ins · Users can report unusual sign-ins
Looks unfamiliar?
This wasn’t me
Security
info
Provide oversight for which
users have access to what
resources
Prompts users to ensure
their access is limited to the
resources they need
Applies to employees
and guest users
Winning
strategies for
end user self-
service
• Empower users with self-service password reset and
group / application access
• Maintain access compliance with Azure AD access
reviews
• Create access packages via Entitlement Management
• Train users how to self-report risky sign-ins and verify
their Security contact information
5 winning strategies
Enable self-help for more predictable
and complete end user security
Increase your awareness with
auditing and monitor security alerts
Automate threat response
Reduce your attack surface
Strengthen your credentials
Blocking legacy authentication
reduces compromise by 67%.
Implementing risk policies
reduces compromise by 96%
Attackers escape detection inside a victim’s
network for a median of 101 days. (Source: FireEye)
60% of enterprises experienced social
engineering attacks in 2016. (Source: Agari)
MFA reduces compromise by 99.99%
Thank you

More Related Content

PPTX
Zero trust deck 2020
PPTX
ciso-workshop-3-identity-protection.pptx
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PPTX
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PPTX
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
PPTX
Securing your Azure Identity Infrastructure
Zero trust deck 2020
ciso-workshop-3-identity-protection.pptx
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
3 Modern Security - Secure identities to reach zero trust with AAD
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
Securing your Azure Identity Infrastructure

Similar to 5 steps to securing your identity infrastructure.pptx (20)

PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PPTX
20171207 we are moving to the cloud what about security
PPTX
20180120 spsbre - we are moving to the cloud what about security
PDF
Securely logging to Microsoft 365
PPTX
Azure Fundamentals Part 3
 
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PDF
Microsoft 365 Security and Compliance
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPTX
Identity and Security in the Cloud
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
PPTX
MS. Cybersecurity Reference Architecture
PDF
December 2019 Microsoft 365 Need to Know Webinar
PDF
Microsoft 365 Security Overview
PPTX
EMS Diagram Click Through Web
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PDF
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
PDF
Learn how to protect against and recover from data breaches in Office 365
PPTX
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
PDF
MSFT Cloud Architecture Information Protection
PPTX
Presentation for information security & hacking
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
20171207 we are moving to the cloud what about security
20180120 spsbre - we are moving to the cloud what about security
Securely logging to Microsoft 365
Azure Fundamentals Part 3
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Microsoft 365 Security and Compliance
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Identity and Security in the Cloud
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
MS. Cybersecurity Reference Architecture
December 2019 Microsoft 365 Need to Know Webinar
Microsoft 365 Security Overview
EMS Diagram Click Through Web
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
Learn how to protect against and recover from data breaches in Office 365
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...
MSFT Cloud Architecture Information Protection
Presentation for information security & hacking
Ad

Recently uploaded (20)

PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPT
Introduction Database Management System for Course Database
PPTX
history of c programming in notes for students .pptx
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
System and Network Administraation Chapter 3
PDF
Digital Strategies for Manufacturing Companies
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Transform Your Business with a Software ERP System
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Digital Systems & Binary Numbers (comprehensive )
Reimagine Home Health with the Power of Agentic AI​
VVF-Customer-Presentation2025-Ver1.9.pptx
Upgrade and Innovation Strategies for SAP ERP Customers
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Introduction Database Management System for Course Database
history of c programming in notes for students .pptx
Softaken Excel to vCard Converter Software.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
2025 Textile ERP Trends: SAP, Odoo & Oracle
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Adobe Illustrator 28.6 Crack My Vision of Vector Design
System and Network Administraation Chapter 3
Digital Strategies for Manufacturing Companies
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Transform Your Business with a Software ERP System
CHAPTER 2 - PM Management and IT Context
Digital Systems & Binary Numbers (comprehensive )
Ad

5 steps to securing your identity infrastructure.pptx

  • 1. Securing your identity infrastructure
  • 2. Digital transformation roadmap Jan 1, 2020 Scope requirements for Work-from- Anywhere transformation initiative Secure Budget for V1 Pilots 90 day pilots: BYOD, 1-day-WFH, remote meetings Evaluate learnings and scope V2 Pilots Secure Budget for V2 Pilots 120 day pilots with select teams Develop training and internal PR Complete Work-from- Anywhere rollout Begin team-by-team rollouts Jun 1, 2022
  • 3. Digital transformation roadmap Jan 1, 2020 Jun 1, 2022 Apr 1, 2020 Scope requirements for Work-from- Anywhere transformation initiative Secure Budget for V1 Pilots 90 day pilots: BYOD, 1-day-WFH, remote meetings Evaluate learnings and scope V2 Pilots Secure Budget for V2 Pilots 120 day pilots with select teams Develop training and internal PR Begin team-by-team rollouts Complete Work-from- Anywhere rollout “We have seen two years’ worth of digital transformation in two months.“ Satya Nadella Microsoft CEO
  • 4. Bring your own devices and IoT Explosion of cloud apps Expanding Perimeters Explosion of signal Composite apps & public restful APIs Employees, partners, customers, bots Old World vs. Current World
  • 5. Zero Trust A modern approach to security which treats every access attempt as if it’s originating from an untrusted network Never Trust, Always Verify
  • 6. Zero Trust principles and holistic security strategy Verify explicitly
  • 7. Zero Trust across the esate Visibility, Analytics, Automation Real-time policy evaluation Organization policies Zero Trust architecture
  • 9. 1. Strengthen your credentials 2. Reduce your attack surface area 3. Automate threat response 4. Utilize cloud intelligence 5. Empower end users with self-service AKA.MS/SECURITYSTEPS Helping you build a strong identity foundation
  • 10. Start with a strong identity foundation in the cloud
  • 11. Azure Active Directory – the world’s largest cloud identity service
  • 12. Secure access to all applications with single sign on HR systems Apps and data Cloud apps On-premises perimeter-based networks Azure AD App delivery controllers & networks Azure AD App Proxy Active Directory single sign-on External users
  • 13. Winning strategy 1 Strengthen your credentials
  • 14. 230% Increase in password spray attacks this year Nearly 1 in 3 of all attacks on enterprises involve phishing attacker-driven sign-ins detected in August 2020 5.8B high-risk enterprise sign-in attempts flagged in August 2020 9M compromised accounts detected in August 2020 2M * Chart shows impact of COVID-19 themed attacks across the world by file count (as of April 7, 2020) / Source Microsoft Threat Intelligence
  • 15. Verify identities with strong authentication
  • 16. Good: Password + (Preview) Better: Password + (Preview) (Preview) Best Bad: Password 123456 qwerty password iloveyou Password1 Deploy the most secure, usable & cost-effective methods
  • 18. Winning strategies for strengthening your credentials • Enable MFA for all your admins (if you still haven’t) • Deploy strong authentication for all users • Start your passwordless journey • Block legacy authentication
  • 19. Winning strategy 2 Reduce your attack surface
  • 20. Protect identities with Conditional Access and multifactor authentication Require MFA Allow access Application User and location Device Real-time risk Limit access Password reset Monitor access Signals Verify every access attempt Access apps and data
  • 21. # admins with highest levels of privileges over time Risks with Privileged Access Number of permissions Time Admin #1 Admin #2 Admin #3
  • 22. Secure and compliant by default, governed by the principle of Zero Standing Access, with Just-in-Time & Just-Enough-Access What you want - Least Privileged Access Number of permissions Time Admin #1 Admin #2 Admin #3 Password Admin 1 hr Security Admin 2 hrs Global Admin .5hr Admin #1 Password Admin 1 hr Admin #3 Global Admin .5 hr
  • 23. Access reviewed & revised Job changes Ongoing auditing & reporting Access rights provisioned Requests additional access User onboarded Azure AD entitlement management
  • 24. Winning strategies for reducing your attack surface • Enable timebound just-in-time (JIT) access via Privileged Identity Management if you haven’t • Block invalid authentication points via Conditional Access • Perform lifecycle management via Entitlement Management • Periodically recertify privileged users via Access Reviews • Require admins to elevate permissions when needed for sensitive apps
  • 25. Winning strategy 3 Automate threat response
  • 26. Identity Protection intelligently detects and responds to compromise Continuously improving to prevent attack Automatedremediation Policy enforcement Improved machine learning MoreMicrosoft ecosystem innovation Extended threat intelligence Risk assessment Investigation Real time session risk Microsoft Graph API and Security Graph, Logic apps MCAS, Azure ATP
  • 27. Azure AD · Identity Protection · Risk types Users with leaked credentials Sign-ins from anonymous IP addresses Impossible travel to atypical locations Sign-ins from infected devices Sign-ins from IP addresses with suspicious activity Sign-ins from unfamiliar locations New risk alerts are added as new threats emerge ?
  • 28. Winning strategies for automating threat response • Require MFA or block risky sign-ins via Conditional Access • Enforce secured password change or block risky users via Conditional Access
  • 29. Winning strategy 4 Utilize cloud intelligence
  • 30. Actionable insights in Azure AD Identity Protection Privileged Identity Management Workbook analytics:  CA insights  Legacy authentication workbook  Access package activity
  • 32. Winning strategies for utilizing cloud intelligence • Watch for alerts emails - Privileged Identity Management activation and Identity Protection • Check your identity secure score • Monitor your Azure AD audit and sign-in logs • Strengthen your Conditional Access policies and Privileged Identity Management via insight reporting • Create dashboards with Azure AD workbooks
  • 33. Winning strategy 5 Empower end users with self-service
  • 34. Improve productivity with self-service tools Single sign-on (SSO) Self-serve password reset Application launching portal
  • 35. My sign-ins · Users can report unusual sign-ins Looks unfamiliar? This wasn’t me Security info
  • 36. Provide oversight for which users have access to what resources Prompts users to ensure their access is limited to the resources they need Applies to employees and guest users
  • 37. Winning strategies for end user self- service • Empower users with self-service password reset and group / application access • Maintain access compliance with Azure AD access reviews • Create access packages via Entitlement Management • Train users how to self-report risky sign-ins and verify their Security contact information
  • 38. 5 winning strategies Enable self-help for more predictable and complete end user security Increase your awareness with auditing and monitor security alerts Automate threat response Reduce your attack surface Strengthen your credentials Blocking legacy authentication reduces compromise by 67%. Implementing risk policies reduces compromise by 96% Attackers escape detection inside a victim’s network for a median of 101 days. (Source: FireEye) 60% of enterprises experienced social engineering attacks in 2016. (Source: Agari) MFA reduces compromise by 99.99%