Summary
In this chapter, we covered the areas of PIM. This included creating just-in-time administrator access with PIM and how to create break-glass or emergency-access accounts. Since these accounts provide elevated privileges within our company, it is very important to manage and govern these administrator accounts to protect against internal and external threats. Internal users with elevated access privileges have the potential to expose information that they are not authorized to access. We discussed how to do this through access reviews and by analyzing the audit history and reports for PIM. In the next chapter, we will further discuss how to analyze and investigate sign-in logs and elevated-risk users within Azure AD.