top of page
Search


Securing Microsoft Business Premium Part 03: Authorization Best Practices from Zero Trust to Complete Access Control
In Part 02 , we explored authentication , the process of verifying user identities—ensuring users are who they claim to be. Today we’ll build on that by diving into authorization—the process of determining what authenticated users are allowed. While authentication is a foundational element of any organization’s identity and access management strategy, secure identity verification alone isn’t sufficient. Authorization completes the picture by assigning the correct permissions

Sebastian F. Markdanner
Mar 19, 202510 min read


God Mode with a Timer: Using Logic Apps to Restrict Elevated Access in Entra
In my last post I covered how to monitor the GOD Mode in Azure (Coined by the great John Savill ). While visibility and monitoring are great capabilities, there’s a big issue: the permanent nature of the access. - Let's fix that! The way Elevated Access currently works, there’s no built-in way to manage, or restrict it—not through PIM for time- and approval-based access, not with access reviews, and not with entitlement management either. Once access is enabled for a user,

Sebastian F. Markdanner
Mar 3, 20258 min read


Unlocking Microsoft Entra’s Elevated Access Logs: Better Security, Better Insights
Elevating access to manage Azure subscriptions is a valuable tool for administrators, particularly when dealing with unknown or orphaned subscriptions. However, with no built-in restrictions on when or how long this access can be used , monitoring these events is critical to maintaining security and accountability. Global administrators occasionally need to enable Elevated Access in Microsoft Entra to manage Azure subscriptions, but without proper oversight, this level of a

Sebastian F. Markdanner
Feb 18, 202513 min read
bottom of page
