The Identity Lifecycle Is Your Real Attack Surface
Most breaches do not start with a firewall. They start with a forgotten account. Oftentimes, we neglect to acknowledge that identities are the heartbeat of the user and the user can be exploited. Even if they are no longer with the organization. However, the same can also be said about those who still remain. As an organization, it is absolutely crucial that you recognize these phases and take the necessary precautions to prevent them from being used against you. The Joiner Welcome to the organization! We understand that you need tools and roles to do your job. Here: take Global Administrator, Admin access to your Entra Connect server, and the keys to your on-premise Exchange server. While we're at it, we will not govern this at all and give you free reign. Can you identify the issues in this statement? If so, then you'll know that more often than not, this happens in the wild. Not having a proper onboarding process can introduce over-permissions and give way to a whole slew of...