Skip to content

Details

About Session:

The built-in roles in Azure Active Directory are not for everyone. They are over-privileged and configured so by default.

In this session, you will learn how to implement a role-based access (RBAC) model in Microsoft Defender. Using Azure native features such as Privileged Access Groups (PAGs), Privileged Identity Management (PIM), and Privileged Access Workstations (PAWs), we can solidify the access model towards the Defender features, thus making sure that everyone has a role following Principle of Least Privilege (PoLP) and are connecting to some of the most sensitive things in the security stack in a secure way.

Related topics

Cybersecurity
Cloud Computing
Microsoft Azure
Knowledge Sharing
Software Development

Sponsors

Jonah Andersson Tech

Jonah Andersson Tech

Jonah Andersson Tech by Jonah Andersson

You may also like