Security
From a security standpoint, governance may dictate several things, such as procedures for assigning or removing permissions to/from resources, types of approved authentication protocols, or how content is secured outside of an organization. In this section, we're going to look at the governance surrounding the following topics:
- Identity and authentication
- Sharing and access controls
- Classification
- Approved apps
Let's dive deeper into these areas.
Identity and authentication
As you're well aware, Azure AD identity is the security foundation for everything in the Microsoft 365 ecosystem. The Azure AD identity platform has five general identity models that govern how your organization's users are provisioned and authenticated. They are as follows:
- Cloud-only identity: User identities for Microsoft 365 services exist only in Azure AD. Users may have on-premises identities as well, but they are maintained separately....