Skip to content

Commit

Permalink
update
Browse files Browse the repository at this point in the history
  • Loading branch information
x907 committed Jul 22, 2024
1 parent 88dca2f commit 65aa599
Showing 1 changed file with 3 additions and 55 deletions.
58 changes: 3 additions & 55 deletions MNIAC Presentation/IAM MNIAC Presentation.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,16 +58,14 @@
- Examples of policies: Location-based access, device compliance, risk-based access.
- Technical demonstration of Conditional Access setup and enforcement.

**Case Study:** Implementation of Conditional Access in a Zero Trust architecture, focusing on policy configurations and enforcement [source](https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/overview).

**Talking Points:**

- **Conditional Access Policies:** Define and enforce security policies based on user conditions.
- **Examples of Policies:**
- **Location-based access:** Restricts access based on geographical location.
- **Device compliance:** Ensures only compliant devices can access resources.
- **Risk-based access:** Assesses the risk level of sign-in attempts and enforces additional controls.
- **Technical Demo:** Demonstrate the setup and enforcement of Conditional Access policies. If you have time maybe at the end.
- **Technical Demo:** Demonstrate the setup and enforcement of Conditional Access policies. (Live)
- Conditional Access ensures secure conditions for accessing resources, enhancing overall security.

---
Expand Down Expand Up @@ -100,57 +98,7 @@ Deploying MFA secures access and protects against unauthorized access. Next, let

---

## Slide 5: Automation in IAM

**Title:** Automation in IAM

**Background:** Diagram showing automated workflows in IAM.

**Main Content:**
- Streamlining access provisioning, de-provisioning, and lifecycle management.
- Tools: PowerShell, Azure Logic Apps, Microsoft Identity Manager (MIM).
- Example: Automating user onboarding and offboarding.

**Talking Points:**

- **Streamlining Processes:** Automation reduces manual workload, minimizes errors, and ensures consistent access controls.
- **Key Tools:**
- **PowerShell:** Automates Windows tasks, including user management.
- **Azure Logic Apps:** Automates workflows, integrates applications/services.
- **Microsoft Identity Manager (MIM):** Manages identity lifecycles.
- **Example:** Efficiently create accounts, assign roles, and provision resources with automation.
- **Technical Details:** PowerShell scripts for onboarding/offboarding.

Automation in IAM enhances efficiency and security. Next, we'll discuss advanced threat protection with Microsoft Defender.

---

## Slide 6: Advanced Threat Protection with Microsoft Defender

**Title:** Advanced Threat Protection with Microsoft Defender

**Background:** Diagram showing threat detection and response workflow.

**Main Content:**
- Integration of IAM with Microsoft Defender for Identity.
- Real-time threat detection: Monitoring suspicious activities and alerts.
- Technical setup and configuration of advanced threat protection.

**Talking Points:**

- **Integration with Microsoft Defender for Identity:** Enhances security by monitoring and managing identity-related events.
- **Real-time Threat Detection:** Uses advanced analytics and machine learning to detect suspicious activities and respond quickly.
- **Technical Setup:**
- **Provisioning:** Deploy sensors on domain controllers.
- **Configuration:** Define suspicious activities and set alerts.
- **Integration:** Ensure coverage with Azure AD and other tools.
- **Monitoring:** Regularly review alerts and adjust detection rules.

Integrating IAM with Microsoft Defender provides robust protection against identity-based threats. Next, we'll discuss IAM governance and compliance.

---

## Slide 7: IAM Governance and Compliance
## Slide 5: IAM Governance and Compliance

**Title:** IAM Governance and Compliance

Expand Down Expand Up @@ -180,7 +128,7 @@ IAM governance and compliance protect sensitive data and meet regulatory require

---

## Slide 8: Future Trends in IAM
## Slide 6: Future Trends in IAM

**Title:** Future Trends in IAM

Expand Down

0 comments on commit 65aa599

Please sign in to comment.