Monitor assigned roles outside PIM and sent to MS Teams using OpenAI
Another big helper in implementing a Zero Trust environment is the use of Privileged Identity …
Continue ReadingAnother big helper in implementing a Zero Trust environment is the use of Privileged Identity …
Continue ReadingImplementing conditional access policies have a huge impact on your identities and organisation. …
Continue ReadingIn earlier posts I created several conditional access policies in an automated way. During the time …
Continue ReadingEmergency accounts are a fundamental part of any security strategy. They are used to access systems …
Continue ReadingIn earlier steps, I explained how to control identity and devices to connect to your environment. …
Continue ReadingThis is the 3rd step in the series Zero to Zero Trust in an automated way. In the previous steps, we …
Continue ReadingIdentities are the key to environments and must be configured as securely as possible. To achieve …
Continue ReadingNowadays a good cloud environment has strict security policies. Well-known policies are conditional …
Continue ReadingWelcome to the Zero to Zero Trust series automated and to this automation index. In this series, I …
Continue Reading