Privileged access

 PA-1: Separate and limit highly privileged/administrative users

Feature: Local Admin Accounts

Description: Service has the concept of a local administrative account.

Feature notes: Avoid the usage of local authentication methods or accounts, these should be disabled wherever possible. Instead use Azure AD to authenticate where possible.

Configuration Guidance: If not required for routine administrative operations, disable or restrict any local admin accounts for only emergency use.

PA-7: Follow just enough administration (least privilege) principle

Feature: Azure RBAC for Data Plane

Description: Azure Role-Based Access Control (Azure RBAC) can be used to managed access to service's data plane actions.

Configuration Guidance: Use Azure role-based access control (Azure RBAC) for controlling access to Azure API Management. Azure API Management relies on Azure role-based access control to enable fine-grained access management for API Management services and entities (for example, APIs and policies).

PA-8: Determine access process for cloud provider support

Feature: Customer Lockbox

Description: Customer Lockbox can be used for Microsoft support access.

Configuration Guidance: In support scenarios where Microsoft needs to access your data, use Customer Lockbox to review, then approve or reject each of Microsoft's data access requests.


cisco certification malaysia

Comments

Popular posts from this blog

Azure built-in roles for tables

Explore Dataflows Gen2 in Microsoft Fabric

Select and configure an appropriate method for access to Azure Blobs