Secure Identities and Access Workshop Delivery Guide 4 July 2022



Download 1.16 Mb.
Page20/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   16   17   18   19   20   21   22   23   ...   37
Secure Identities and Access
Application Discovery Discussion
After the application discovery, you will have a high-level view of the applications used within the customer's organization. You will then try to discover additional applications by analyzing and discussing the answers from the 02 - Secure Identities and Access - Customer Questionnaire.docx questionnaire.

Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 2 Hrs.


  1. Design and Planning

    1. Azure AD Application Management




This activity is the central focus of this workshop, and everything is articulated around it. Discuss all other topics with this in mind and articulate by example the Identity Fundamentals discussing with AD FS migration in mind in order to be able to achieve this goal.
This activity is divided up into the following two parts:
Azure AD Application Management Overview
Explain how Azure AD Application Management can help the customer simplify how they manage their applications by providing a single identity system for their cloud and on-premises applications.
Azure AD Application Management Application Classification and Prioritization
Then, work together with the customer to discuss their current application management strategy and how Azure AD can help them create a more secure and simplified strategy. Finally, help the customer start classifying and prioritizing their applications using the results from the Application Discovery activity as input.


Objectives

The objectives for this activity are to present an overview of Azure AD Application Management and complete the classification and prioritization of the applications discovered as part of this engagement, particularly the following:

  • Deliver the 09 - Secure Identities and Access - Azure AD Application Management.pptx presentation.

  • Classify and prioritize applications as part of the 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet.

  • Update the Azure AD Application management deployment plan slides within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation, adding selected high priority applications that can be migrated to Azure AD.

  • Define and agree with the customer on next steps in terms of follow-up activities and/or engagements and document these as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Format

Can be delivered as an onsite or online workshop.
Customer resources

  • Security Team
Delivery resources

  • Security Architect

  • Engagement Manager
Supporting materials

  • 02 - Secure Identities and Access - Customer Questionnaire.docx

  • 09 - Secure Identities and Access - Azure AD Application Management.pptx

  • 98 - Secure Identities and Access - Design Decision Points.xlsx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Preparation

The delivery resource will need to familiarize themself with:

  • 09 - Secure Identities and Access - Azure AD Application Management.pptx

  • 98 - Secure Identities and Access - Design Decision Points.xlsx

  • 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx
Pre-requisites

The activities outlined in section 10 Engagement Setup and Reporting must be completed prior to starting this activity.
Deliverables

The deliverables of the module are defined as:

  • Applications classified and prioritized as part of 98 - Secure Identities and Access - Design Decision Points.xlsx.

  • Updated Azure AD Application management slide within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation, with a selection of high priority applications that can be integrated with Azure AD.

  • Next steps defined and agreed upon with the customer (follow-up engagements) and documented as part of the next steps in the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Guidance

Deliver the activity by presenting the 09 - Secure Identities and Access - Azure AD Application Management.pptx presentation. Then, using the 98 - Secure Identities and Access - Design Decision Points.xlsx spreadsheet, help the customer start the application classification and prioritization process.



  • Azure AD Application Management Overview – 60 minutes

    • Deliver the activity by presenting the 09 - Secure Identities and Access - Azure AD Application Management.pptx presentation.

    • When presenting, be concise and stick to the facts.

    • Allow the customer to draw their own conclusions.

    • Make sure you reserve some time for Q&A.

  • Azure AD Application Management Application Classification and Prioritization – 60 minutes

    • Using the completed 02 - Secure Identities and Access - Customer Questionnaire.docx and the output from the Application Discovery as input, discuss and help the customer classify and prioritize their applications, documenting the results in 98 - Secure Identities and Access - Design Decision Points.xlsx.

    • Update the Azure AD Application management slide within the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation, adding a selection of high priority applications that can be integrated with Azure AD.

  • Make sure that you discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 2 Hrs.



    1. Download 1.16 Mb.

      Share with your friends:
1   ...   16   17   18   19   20   21   22   23   ...   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page