Why Privileged Identity Management Falls Short [5 Key PIM Mistakes]

Поділитися
Вставка
  • Опубліковано 11 січ 2025
  • Are your Microsoft 365 Privileged Identity Management (PIM) settings leaving you exposed? Discover the 5 common mistakes that could be putting your organisation at risk-and how to fix them.
    In this video, we dive into Microsoft Privileged Identity Management (PIM) to uncover critical misconfigurations that could compromise your security. As a Microsoft Security Partner of the Year, we’ve identified recurring issues, including:
    ✅ The limitations of MFA settings you might not know.
    🔒 Why Conditional Access with Authentication Context is essential.
    ⚙️ Common misuses of approval processes for role activation.
    🛠 The risks of ignoring PIM for groups.
    🚨 How to avoid lockouts with break-glass accounts.
    Learn actionable tips to reinforce your identity security, prevent token theft, and implement well-architected Conditional Access policies.
    🔗 Want more insights on Microsoft 365 security?
    👉 Subscribe to our channel for expert guidance and best practices.
    📢 Share your thoughts or questions in the comments below!
    Website: www.threatscap...
    Linkedin: / 942506
    Email Address : info@threatscape.com

КОМЕНТАРІ • 5

  • @patrick__007
    @patrick__007 Місяць тому +2

    Really helpful! We have planned to implement PIM next week! 🎉

  • @st3v3nwh1t3j
    @st3v3nwh1t3j Місяць тому

    Great content, as per your usual 🙂 I'd add that you can use role-assignable groups to help protect against the last issue discussed about using PIM for groups.

  • @patrickhorne3045
    @patrickhorne3045 Місяць тому

    Valid point about the Emergency Access accounts and excluding them not only from CA policies but also making them permanent GA, but why would you make "other administrators" the approvers for privilege roles? In my mind I would make department or team managers the approvers, if you need to elevate to GA, your team lead (who might not be technical themselves) would still want justification and maybe a change number to approve your request but do they need to hold an admin role themselves? or have I missed something?

  • @patrick__007
    @patrick__007 Місяць тому

    Configured the Group to be activated by using an Authentication Context. Therefor I've created an Authentication Context in Entra, Conditional Access policy pointed to that Authentication Context, PIM group and force to use 2FA. The result is that while activating the group no 2FA is enforced..