Cybersecurity

InLigo’s Cybersecurity Framework: Identity and Access Management (IAM) with Microsoft 365 Solutions

Identity and Access Management (IAM) 

Inligo’s goal is to help protect your organization by securing access to the connected world for all of your users, apps, smart devices, and services. Furthermore, InLigo’s seamless user experience will protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience.

InLigo’s unified identity management will manage all your identities and access to all your apps in a central location, whether they are in the cloud or on-premises, to improve visibility and control.

Futhermore, InLigo’s simplified identity governance allows control access to apps and data for all users and admins efficiently with automated identity governance to ensure only authorized users have access.

InLigo can help guild you through the best practices in building out  Identity Management and Access Control. 

WHAT IS YOUR SECURITY SCORE?

Identity Management and Access Control 

Access to assets and associated facilities is limited to authorized activities and transactions.

InLigo’s Discovery Questions

  1. Are you using a model of least privilege for applications across the company?
  2. How are employees storing credentials across the organization?  
  3. What applications or portals are users accessing corporate data?  
  4. What apps contain business critical data?  
  5. Are users accessing corporate data from a personal device?  
  6. If a user leaves, how do you know they don’t have corporate data stored on their personal device?  
  7. Do users access email through their personal cell phone?  
  8. Are there business-critical pieces of data that would leave you exposed if a personal device was compromised?  
  9. What would be the cost to the company if this data was leaked?  
  10. Are we compliant if data is leaked to unmanaged applications?  
  11. Do you want your users to be able to access work data securely from anywhere at any time?  
  12. Do employees have access to corporate apps after they leave the company? How do you know if they do? 

Microsoft 365 Solution 

  1. Azure AD, Intune, Conditional Access  
  2. Users/Groups: Who do you want to scope this policy to? Is there anyone you want to exclude?  
  3. Applications: What applications does this policy apply to? Think of the apps that have the most sensitive data  
  4. Devices: Are there certain device platforms you want apply this policy to? Do you not want to grant access on a device that isn’t enrolled into Intune?  
  5. Locations: Is this user on my network? 

Business Case 

  • A customer has a financial document with critical business data. 
  • If that document was to be compromised the financial too to the company would be huge. 
  • Allow them to access te document in a browser, require MFA, and precent download. 

Action Items 

  1. Take your asset inventory you garnered earlier with the list of apps and their risk score.
  2. Create a Conditional Access Policy for the applications that have more restrictive controls with higher risk scores.