Designing a security strategy for privileged activities
In terms of access life cycle, you should consider the access life cycle of your member users and your guest users, and especially your privileged users. These should be handled differently as the life cycle of member users is based on their employment within the company and the access that is required for the department or team that they belong to. Guest users are provided access based on a partnership and external collaboration trust relationship.
Privileged access reviews
Privileged user access should be regularly reviewed in a similar manner. Since these are elevated access assignments, the review of these should be done on a consistent basis as identified by the company. Unused and unnecessarily privileged assignments should be removed. Automated removal should also be configured for users that are no longer with the company or have changed departments within the company. In the next section, you will learn how entitlement...