This latest service offering from Azure AD empowers you to control, manage, and monitor access to critical resources in your organisation. This is inclusive of Microsoft Online Services (Office 365, Intune, etc.), as well as resources internal to Azure and Azure AD.
Why should I use PIM?
A common cause of data breaches, besides hacking, is ineffective access management. Reducing the number of individuals who have access to secure resources or information, should be a priority. This dramatically reduces the chance of an authorised user inadvertently impacting a sensitive asset, or of a malicious actor gaining access. PIM enables you to mitigate risks to assets.
How can we use PIM?The key capabilities of PIM are;
There are three types of roles that can be attributed within PIM.
As a Privileged Role Administrator, you can:
As an approver, you can:
As an eligible role user, you can:
Azure’s PIM service has vast administrative capabilities and is a service we use ourselves, in-house. It’s great for assigning time-bound admin access, ensuring that critical tasks are completed in a timely, manageable fashion. The auditing capabilities offer a transparent view of activities, which is vital for nailing down risk-reduction strategies. We recommend Azure’s PIM service to any organisation that doesn’t outsource Managed Services.
If you are interested in Azure for your organisation, then get in touch for a personalised quote!