Secure Identities and Access Workshop Delivery Guide 4 July 2022



Download 1.16 Mb.
Page19/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   15   16   17   18   19   20   21   22   ...   37
Secure Identities and Access
Validate License
The Azure AD Cloud App Discovery snapshot report functionality doesn’t require a M365 E5 license nor a full Microsoft Defender for Cloud App license.
The Azure AD Premium P1 license required to perform this workshop is sufficient.
Discovery capability differences for Defender for Cloud Apps and Azure AD | Microsoft Docs
Create Snapshot Report
To generate an app discovery report, web traffic log files from a firewall or proxy device must be uploaded to Cloud App Security as part of creating a snapshot report. Cloud App Security then parses and analyzes those files and will generate the app discovery report which you will use as part of the workshop.
It’s a good idea to ask the customer about the brand and model of their proxy or firewall as part of the pre-engagement call so you can verify if the device is supported by Cloud App Security or if you need to spend additional time using the custom log format option. It’s also useful to have the customer send you a sample log so you can make sure the import will be successful.
Use the following instructions to assist the customer with the import of firewall or proxy logs: https://docs.microsoft.com/en-us/cloud-app-security/create-snapshot-cloud-discovery-reports
Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 1 Hrs.


    1. Application Discovery Reporting and discussion




Use this activity of the Secure Identities and Access Workshop to work together with the customer to gather results from the tools used in the previous activity in order to start listing applications and to have a discussion about applications not discovered by the tools that need a plan for migration. Use the answers within 02 - Secure Identities and Access - Customer Questionnaire.docx to achieve this.


Objectives

The objective for this activity is to populate the 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet. Focus on the Azure AD Application Management tab with applications found during the discovery process. Start creating a prioritization list based on availability in the Azure AD App Gallery, usage, and easiness to migrate.
You will also have a discussion on applications based on the answers to the 02 - Secure Identities and Access - Customer Questionnaire.docx
Format

The activity can be delivered online but can also be delivered as an onsite workshop.
Customer resources

  • A representative from the customer’s Security Team and/or Application Team.
Delivery resources

  • Security Architect
Supporting materials

  • 98 - Secure Identities and Access - Design Decision Points.xlsx
Preparation

Prior to delivering the activity, the delivery resource leading the workshop will need to familiarize themself with:

  • The completed 02 - Secure Identities and Access - Customer Questionnaire.docx document.

  • The 04 - Secure Identities and Access - Application Discovery.pptx presentation content.
Pre-requisites

  • The activities outlined in 10.5 Application Discovery Presentation and 10.6 Application Discovery Setup must be completed prior to starting this activity.
Deliverables

The deliverables of the module are defined as:

  • Application discussion performed with the customer based on 02 - Secure Identities and Access - Customer Questionnaire.docx answers.

  • Meeting notes.

  • 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet – Azure AD Application Management tab completed with discovered applications. Exceptions are columns on business criticality, usage, expected life span, and categorization priority, which will be achieved during 11.1 Azure AD Application Management.

These deliverables will serve as input to the next steps.
Guidance

Deliver the activity using the results from activities 10.5 Application Discovery Presentation and 10.6 Application Discovery Setup.


The outcome is a list of applications discovered in the 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet – Azure AD Application Management tab. If time permits, you can start the application categorization and prioritization as part of this activity. You will then come back and complete the application categorization and prioritization as part of the Azure AD Application management activity.



Download 1.16 Mb.

Share with your friends:
1   ...   15   16   17   18   19   20   21   22   ...   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page