

Once the group is created members need to be added as well. (0) First, set up designed approvers and the privileged access management policyįirst the global admin needs to set up a privileged access management group for authorizing privileged tasks within the Microsoft 365 admin center. The approval workflow can be enumerated in following steps: Removing the dependency on having a set of privileged accounts with standing access.Providing Just-Enough-Access (JEA) to specific tasks, coupled with Just-In-Time access so access is only allowed for a specific period of time.Requiring users to elevate permissions to execute tasks that may expose sensitive data.Therefore, Zero Standing Access, combined with access governance, can be an effective deterrent to misuse of privileged access by: It’s based on the principle of Zero Standing Access, which means users who need privileged access, must request permissions for access, and once received it is just-in-time and just-enough access to perform the job at hand. Privileged access management in Office 365 goes beyond traditional access control capabilities by enabling access governance more granularly for specific tasks. To understand how it works – read further below.

Therefore, we are excited to announce that we are extending the security rigor that Microsoft uses for data center access, to enable customers to enforce Zero Standing Access for privileged admin access within your organization, with privileged access management in Office 365, which is generally available today. We believe that operating on the principle of zero standing access with just in time and just enough access to perform a privileged task is key to effectively manage accounts with privileged access. In fact, Microsoft goes a step further than traditional PAM solutions by eliminating standing privileged access to your data within your organization. Microsoft operates on this principle for data center access, or also known as service provider access to customer content, through Lockbox and Customer Lockbox. One way to address these risks and complexities is to operate on the principle of Zero Standing Access, which means users do not have privileges by default, and when permissions are provided, it’s at the bare minimum with just enough access to perform the specific task. On top of this, organizations are constantly evolving (acquisitions, divestitures, entering new markets, ect.) – making it challenging to monitor and manage privileged accounts and respond to various compliance requirements regarding privileged access to sensitive data at scale. Therefore, privileged accounts commonly become lucrative attack vectors for both internal and external attackers. In fact, it’s estimated that 80% of security beaches involve privileged credentials 1. Such high privileges can be misused to create fake accounts, grant excessive permissions, exfiltrate sensitive data, cause damage to infrastructure, wipe out or hold data for ransom, and set rules and policies that make it extremely hard to detect and restore state back.

Having privileged access to an application is all that’s needed to execute commands with malicious intent to inflict damage to or exfiltrate data from an organization.
