Skip to content

My Faber Security

Security, Compliance, and Identity blogs, focusing on Microsoft Security offerings.

  • My Faber Security
  • Blog

Category Archives: identity

MSSPs and Identity: Q&A

Follow-up to the previous blog post to answer common questions on MSSPs and Identity

Posted byAngelica FaberFebruary 7, 2023February 8, 2023Posted inendpoint, identity, sentinelTags:Azure, cybersecurity, Defender, identity, MDC, Microsoft, security, sentinel4 Comments on MSSPs and Identity: Q&A

MSSPs and Identity

Identity configuration recommendations for MSSPs.

Posted byAngelica FaberJanuary 11, 2023February 15, 2023Posted inDefenderForCloud, endpoint, identity, sentinelTags:cybersecurity, identity, Microsoft, security, sentinel4 Comments on MSSPs and Identity

Review any “Don’t know” reviewees prior to the end of an access review

Steps to create access reviews that meet strict compliance requirements by allowing auditors to review any “Don’t know” reviewees prior to the end of a review.

Posted byAngelica FaberOctober 7, 2022Posted inidentityTags:access reviews, Azure, cybersecurity, identity, identity governance, Microsoft, securityLeave a comment on Review any “Don’t know” reviewees prior to the end of an access review

My adventures (so far) with verifiable credentials.

Sharing my initial experience with verifiable credentials.

Posted byAngelica FaberMay 27, 2022June 2, 2022Posted inidentityTags:AAD, authentication, Azure, cybersecurity, DID, identity, Microsoft, security, VerifiableCredentialsLeave a comment on My adventures (so far) with verifiable credentials.

No, really, you don’t need that access

CloudKnox initial setup and the incredible value it brings to organizations and the security professionals working hard to keep them secure.

Posted byAngelica FaberApril 29, 2022June 12, 2022Posted incloudknox, identityTags:AAD, Azure, CIEM, cloudknox, cybersecurity, identity, Microsoft, securityLeave a comment on No, really, you don’t need that access

Cross-tenant workload identities with a single secret

You can have cross-tenant workload identities authenticating using the secret or certificate from their home tenant.

Posted byAngelica FaberApril 7, 2022April 7, 2022Posted inidentityTags:AAD, authentication, Azure, cybersecurity, identity, IdP, Microsoft, securityLeave a comment on Cross-tenant workload identities with a single secret

Joiners – Movers – Leavers (JML) Part 4

An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.

Posted byAngelica FaberDecember 21, 2021December 21, 2021Posted inidentityTags:AAD, Azure, cybersecurity, identity, identity governance, Microsoft, security2 Comments on Joiners – Movers – Leavers (JML) Part 4

Joiners – Movers – Leavers (JML) Part 3

An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.

Posted byAngelica FaberDecember 21, 2021October 3, 2022Posted inidentityTags:AAD, Azure, cybersecurity, identity, identity governance, IdP, Microsoft, security2 Comments on Joiners – Movers – Leavers (JML) Part 3

Joiners – Movers – Leavers (JML) Part 2

An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.

Posted byAngelica FaberDecember 21, 2021October 3, 2022Posted inidentityTags:AAD, Azure, cybersecurity, identity, identity governance, Microsoft, security2 Comments on Joiners – Movers – Leavers (JML) Part 2

Joiners – Movers – Leavers (JML) Part 1

An overview of the Joiners-Movers-Leavers process and how it can be implemented using Microsoft Azure Active Directory.

Posted byAngelica FaberDecember 21, 2021Posted inidentityTags:AAD, Azure, cybersecurity, identity, identity governance, Microsoft, security4 Comments on Joiners – Movers – Leavers (JML) Part 1

Posts navigation

1 2 3 Older posts
My Faber Security, Blog at WordPress.com.
  • Follow Following
    • My Faber Security
    • Join 37 other followers
    • Already have a WordPress.com account? Log in now.
    • My Faber Security
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar