Home
%3CLINGO-SUB%20id%3D%22lingo-sub-566488%22%20slang%3D%22en-US%22%3EDevelop%20a%20risk%20management%20strategy%20for%20your%20Azure%20AD%20application%20migration%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-566488%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3E%3CEM%3EGreetings%2C%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3EThis%20is%20Sue%20Bohn%2C%20director%20of%20program%20management%20for%20Identity%20and%20Access%20Management.%26nbsp%3B%20I%E2%80%99m%20excited%20to%20introduce%20the%20next%20entry%20in%20our%20Voice%20of%20the%20Partner%20blog%20series.%20Our%20partners%20are%20Microsoft%20365%20experts%20with%20in-depth%20experience%20to%20help%20customers%20implement%20Microsoft%20solutions.%20In%20this%20series%2C%20our%20partners%20will%20share%20insights%20and%20best%20practices%20for%20securing%20your%20identities%20and%20getting%20the%20most%20out%20of%20Azure%20Active%20Directory%20(Azure%20AD).%20If%20you%20haven%E2%80%99t%20already%2C%20please%20check%20out%20our%20%3C%2FEM%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2FFive-tips-to-improve-the-migration-process-to-Azure-Active%2Fba-p%2F445364%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CEM%3Elast%20post%20from%20Patriot%E2%80%99s%20Consulting%3C%2FEM%3E%3C%2FA%3E%3CSPAN%3E%3CEM%3E%2C%20which%20provides%20five%20useful%20tips%20that%20will%20help%20you%20with%20your%20migration%20to%20Azure%20AD.%26nbsp%3B%26nbsp%3B%3C%2FEM%3E%3C%2FSPAN%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3EToday%E2%80%99s%20post%20is%20from%20%3C%2FEM%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fedgile.com%252F%26amp%3Bdata%3D04%257C01%257CChen.Xie%2540microsoft.com%257C59f8313132a54b040f3408d6e08772ee%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C636943269695285847%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C-1%26amp%3Bsdata%3DSnx%252BnE%252Br%252B0hS00aDR45BGKRh%252F5r%252BUzNuRHSm%252BQIApwE%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3E%3CEM%3EEdgile%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%3E%3CEM%3E%2C%20a%20partner%20that%20focuses%20on%20identity%20and%20access%20management%20and%20risk%20management%20solutions.%20We%E2%80%99ve%20invited%20Bob%20Moore%20and%20Marvin%20Tansley%20from%20Edgile%20to%20share%20advice%20on%20developing%20a%20risk%20management-based%20strategy%20to%20guide%20how%20you%20migrate%20your%20apps%20to%20Azure%20AD.%20Bob%20and%20Marvin%20have%20a%20strong%20point%20of%20view%20about%20why%20so%20many%20security%20initiatives%20don%E2%80%99t%20meet%20the%20desired%20goals%2C%20along%20with%20practical%20suggestions%20on%20how%20to%20improve%20your%20success%20rate.%20I%20really%20appreciate%20their%20strong%20emphasis%20on%20understanding%20risk%20controls%20and%20prioritization.%20I%20hope%20you%20find%20this%20post%20as%20valuable%20as%20I%20did!%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CFONT%20size%3D%225%22%3EThe%20path%20to%20passwordless%20is%20about%20more%20than%20technology%3C%2FFONT%3E%3CBR%20%2F%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EIf%20you%E2%80%99re%20like%20many%20of%20our%20customers%2C%20your%20goal%20when%20it%20comes%20to%20securing%20identities%20is%20to%20migrate%20to%20passwordless%20authentication.%20Passwords%20are%20frustrating%20for%20users%20and%20ineffective%20at%20securing%20data%20but%20eliminating%20them%20is%20no%20easy%20task.%20You%20need%20to%20lock%20in%20superior%20authentication%20mechanisms%20for%20application%20access%2C%20such%20as%20behavioral%20analytics%2C%20multi-factor%20authentication%20(MFA)%2C%20and%20biometrics.%20Access%20controls%20and%20policies%20must%20be%20the%20same%20between%20your%20on-premises%20and%20cloud%20environments.%20Additionally%2C%20you%20have%20a%20massive%20number%20of%20applications%20of%20different%20ages%20and%20origins.%20Many%20of%20the%20applications%E2%80%94older%20and%20brittle%20third-party%20applications%20as%20well%20as%20legacy%20apps%20that%20don%E2%80%99t%20use%20claims-based%20authentication%20(i.e.%20SAML%20%2F%20OAuth2)%E2%80%94%20aggressively%20resist%20modernization%20attempts.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETechnology%20challenges%20are%20real%20and%20always%20take%20time%20to%20address%2C%20but%20business%20decisions%20and%20process%20often%20compound%20issues.%20Many%20organizations%20don%E2%80%99t%20understand%20all%20the%20apps%20that%20are%20used%20in%20the%20organization%2C%20and%20far%20too%20often%2C%20applications%20are%20modernized%20based%20on%20which%20line-of-business%20managers%20show%20up%2C%20rather%20than%20what%20makes%20sense%20for%20the%20overall%20enterprise.%20A%20migration%20strategy%20can%20help%20you%20sidestep%20some%20of%20these%20issues%20and%20move%20your%20enterprise%20to%20a%20more%20secure%20posture%20faster.%20Based%20on%20our%20years%20working%20with%20customers%20with%20similar%20challenges%2C%20we%E2%80%99ve%20identified%20the%20following%20steps%20that%20you%20can%20apply%20to%20your%20app%20migration%20initiatives%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EInventory%20your%20apps%3C%2FLI%3E%0A%3CLI%3EDefine%20business%20impact%3C%2FLI%3E%0A%3CLI%3EApply%20security%20controls%3C%2FLI%3E%0A%3CLI%3EImplement%20a%20connected%20security%20system%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CFONT%20size%3D%225%22%3EInventory%20your%20apps%3C%2FFONT%3E%3CBR%20%2F%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EBefore%20you%20begin%20migrating%20your%20software-as-a-service%20(SaaS)%20apps%20to%20Azure%20AD%2C%20understand%20all%20the%20apps%20used%20in%20your%20organization%20and%20the%20risks%20associated%20with%20each%20one.%20This%20way%2C%20you%20can%20prioritize%20which%20apps%20to%20modernize%20first%20and%20%3C%2FSPAN%3Emake%20smart%20decisions%20about%20which%20security%20controls%20are%20required%20to%20secure%20each%20app.%20We%20typically%20start%20by%20interviewing%20key%20personnel%20throughout%20the%20organization.%20The%20interview%20process%20will%20uncover%20a%20list%20of%20applications%20and%20help%20you%20define%20the%20business%20impact%20of%20each.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CFONT%20size%3D%225%22%3EDefine%20business%20impact%3C%2FFONT%3E%3CBR%20%2F%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EOnce%20you%E2%80%99ve%20accounted%20for%20every%20app%20used%20in%20your%20company%E2%80%94including%20little-used%20older%20apps%20that%20still%20need%20to%20be%20in%20place%E2%80%94%20answer%20the%20following%20questions%20for%20each%20one%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EWhat%20types%20of%20sensitive%20data%26nbsp%3B(PCI%2C%20PII%2C%20PHI%2C%20Financial%2C%20Intellectual%20property)%20does%20the%20app%20access%3F%3C%2FLI%3E%0A%3CLI%3EHow%20much%20revenue%20is%20associated%20with%20the%20app%3F%3C%2FLI%3E%0A%3CLI%3EWhat%20is%20the%20impact%20to%20the%20business%20when%20employees%2Fpartners%2Fcustomers%20are%20denied%20access%20to%20the%20app%3F%3C%2FLI%3E%0A%3CLI%3EWho%20needs%20to%20access%20the%20app%3F%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EThe%20answers%20to%20these%20questions%20help%20you%20determine%20each%20app%E2%80%99s%20impact%20to%20the%20organization%20and%20its%20risk%20relative%20to%20other%20apps.%20You%20can%20then%20group%20them%20into%20three%20categories%3A%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EHigh%20Business%20Impact%20(HBI)%3C%2FLI%3E%0A%3CLI%3EMedium%20Business%20Impact%20(MBI)%3C%2FLI%3E%0A%3CLI%3ELow%20Business%20Impact%20(LBI).%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20929px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F117360i65943CA72A9CA124%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Edgile%20Microsoft%20Blog%20Graphic%20_%20May24th%20(1).png%22%20title%3D%22Edgile%20Microsoft%20Blog%20Graphic%20_%20May24th%20(1).png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EAfter%20you%20have%20a%20clear%20understanding%20of%20the%20business%20impact%20of%20your%20apps%2C%20you%20can%20begin%20planning%20your%20migration.%20Consider%20the%20costs%20and%20time%20to%20migrate%20each%20app%2C%20but%20as%20much%20as%20possible%20prioritize%20your%20high%20business%20impact%20apps%20first.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%3EApply%20security%20controls%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3EAfter%20you%E2%80%99ve%20prioritized%20your%20app%20migration%20plan%2C%20next%20step%20is%20to%20determine%20the%20controls%20to%20apply%20to%20each%20app.%20This%20requires%20a%20balance%20between%20simple%20user%20experience%20and%20security.%20For%20example%2C%20you%20may%20want%20to%20add%20more%20controls%20to%20an%20app%20that%20accesses%20privileged%20data%20and%20fewer%20controls%20to%20low%20business%20impact%20app.%20One%20of%20the%20biggest%20risks%20to%20enterprises%20is%20users%20with%20over-privileged%20access%20across%20the%20enterprise%2C%20so%20it%E2%80%99s%20also%20important%20to%20enable%20automated%20provisioning%20and%20de-provisioning.%20We%20also%20recommend%20that%20you%20turn%20on%20MFA%20across%20all%20your%20apps.%20Other%20examples%20of%20critical%20controls%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20style%3D%22font-weight%3A%20400%3B%22%3ERisk-based%20conditional%20access%3C%2FLI%3E%0A%3CLI%20style%3D%22font-weight%3A%20400%3B%22%3EAccess%20approval%20workflows%3C%2FLI%3E%0A%3CLI%20style%3D%22font-weight%3A%20400%3B%22%3EAccess%20re-certification%3C%2FLI%3E%0A%3CLI%20style%3D%22font-weight%3A%20400%3B%22%3EPrivileged%20access%20management%3C%2FLI%3E%0A%3CLI%20style%3D%22font-weight%3A%20400%3B%22%3EInformation%20protections%20vs%20classification%20and%20rights%20management%3C%2FLI%3E%0A%3CLI%20style%3D%22font-weight%3A%20400%3B%22%3EData%20scanning%20across%20on-premises%20and%20cloud%3C%2FLI%3E%0A%3CLI%20style%3D%22font-weight%3A%20400%3B%22%3EPolicy%20enforcement%20by%20monitoring%2C%20alerting%20and%20reporting%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%E2%80%9CEdgile%20modernized%20identity%20systems%20and%20processes%20and%20created%20the%20bridge%20to%20a%20fully%20enabled%20Azure%20security%20implementation%20across%20the%20enterprise.%E2%80%9D%3C%2FP%3E%0A%3CP%20style%3D%22text-align%3A%20center%3B%22%3E%E2%80%94%20Mike%20Nobile%2C%20Chief%20Information%20Security%20Officer%2C%20Alcoa%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%3E%3CFONT%20size%3D%225%22%3EImplement%20a%20connected%20security%20system%3C%2FFONT%3E%3CBR%20%2F%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ESafeguarding%20your%20apps%20requires%20that%20you%20have%20a%20full%20view%20of%20all%20the%20risk%20factors.%20You%20need%20to%20understand%20the%20state%20of%20the%20device%2C%20the%20user%2C%20and%20the%20network%2C%20among%20other%20risk%20factors.%20Switching%20between%20several%20best-of-class%20technologies%20makes%20it%20incredibly%20challenging%20to%20get%20a%20view%20across%20the%20entire%20session.%20We%20recommend%20that%20you%20try%20to%20consolidate%20your%20security%20solutions%20as%20much%20as%20possible%20under%20a%20single%20vendor.%20Microsoft%20365%2C%20which%20offers%20a%20connected%20security%20platform%20across%20on-premises%2C%20cloud%2C%20endpoints%2C%20and%20identities%2C%20is%20a%20great%20example%20of%20a%20solution%20that%20lets%20you%20look%20at%20multiple%20angles.%20Think%20of%20it%20like%20your%20car.%20You%20know%20that%20if%20you%20get%20in%20an%20accident%20and%20slam%20on%20the%20breaks%2C%20the%20airbag%20will%20automatically%20respond%20because%20it%E2%80%99s%20a%20connected%20system.%20You%20feel%20safer%20because%20it%20was%20manufactured%20to%20work%20together.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EOur%20client%20T-Mobile%20benefited%20from%20this%20approach.%20%E2%80%9CMicrosoft%20and%20Edgile%20helped%20bring%20our%20identity%20and%20access%20security%20and%20compliance%20to%20a%20higher%20level.%20As%20a%20team%2C%20they%20demonstrated%20the%20value%20of%20M365%20to%20T-Mobile%20by%20providing%20a%20strategy%2C%20implementation%20roadmap%2C%20and%20resources%20that%20demonstrated%20to%20senior%20management%20why%20EM%2BS%20E5%20was%20well%20worth%20the%20investment.%20As%20a%20result%20of%20our%20E5%20implementation%2C%20risk-based%20conditional%20access%20has%20decreased%20our%20user%20and%20sign-on%20risk%20while%20simultaneously%20lowering%20user%20friction.%22%20%E2%80%94Koveh%20Tavakkol%2C%20Senior%20Manager%20Cybersecurity%2C%20T-Mobile%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EUpdating%20your%20apps%20for%20a%20passwordless%20future%20is%20a%20big%20endeavor.%20We%20hope%20our%20risk%20management%20recommendations%20will%20ease%20some%20of%20the%20burden%20and%20allow%20you%20to%20achieve%20more%20of%20your%20goals.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ELearn%20more%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3EI%20hope%20you%20will%20be%20able%20to%20apply%20some%20of%20Edgile%E2%80%99s%20recommendations%20to%20your%20own%20migration%20plans.%20You%20can%20expect%20another%20partner%20story%20in%20the%20next%20month.%20In%20the%20meantime%20checkout%20out%20the%20%3C%2FEM%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FAzure-Active-Directory-Identity%2FFive-tips-to-improve-the-migration-process-to-Azure-Active%2Fba-p%2F445364%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CEM%3EVoice%20of%20the%20Partners%20series%3C%2FEM%3E%3C%2FA%3E%3CSPAN%3E%3CEM%3E%20for%20more%20real-world%20experiences%20with%20Microsoft%20365%20Identity%20and%20Access%20solutions.%20%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3ERead%20%3C%2FEM%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2Fcontent-type%2Fvoice-of-the-customer%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3EVoice%20of%20the%20Customer%3C%2FEM%3E%3C%2FA%3E%3CSPAN%3E%3CEM%3E%20series.%20%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3E%3CEM%3EFind%20how%20%3C%2FEM%3E%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Factive-directory%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3EAzure%20AD%20can%20help%20you%20enhance%20your%20security%20and%20simplify%20access.%3C%2FEM%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fpartnerships%2Ffind-a-partner%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3ELeverage%20our%20partners%20for%20help%3C%2FEM%3E%3C%2FA%3E%3CSPAN%3E%3CEM%3E%20with%20an%20implementation.%20%3C%2FEM%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-566488%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20partner%2C%20Edgile%2C%20shares%20advice%20on%20developing%20a%20risk%20management-based%20strategy%20to%20guide%20how%20you%20migrate%20your%20apps%20to%20Azure%20AD%3CEM%3E.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-566488%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Active%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20and%20Access%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Greetings,

This is Sue Bohn, director of program management for Identity and Access Management.  I’m excited to introduce the next entry in our Voice of the Partner blog series. Our partners are Microsoft 365 experts with in-depth experience to help customers implement Microsoft solutions. In this series, our partners will share insights and best practices for securing your identities and getting the most out of Azure Active Directory (Azure AD). If you haven’t already, please check out our last post from Patriot’s Consulting, which provides five useful tips that will help you with your migration to Azure AD.   

 

Today’s post is from Edgile, a partner that focuses on identity and access management and risk management solutions. We’ve invited Bob Moore and Marvin Tansley from Edgile to share advice on developing a risk management-based strategy to guide how you migrate your apps to Azure AD. Bob and Marvin have a strong point of view about why so many security initiatives don’t meet the desired goals, along with practical suggestions on how to improve your success rate. I really appreciate their strong emphasis on understanding risk controls and prioritization. I hope you find this post as valuable as I did!

 

The path to passwordless is about more than technology

If you’re like many of our customers, your goal when it comes to securing identities is to migrate to passwordless authentication. Passwords are frustrating for users and ineffective at securing data but eliminating them is no easy task. You need to lock in superior authentication mechanisms for application access, such as behavioral analytics, multi-factor authentication (MFA), and biometrics. Access controls and policies must be the same between your on-premises and cloud environments. Additionally, you have a massive number of applications of different ages and origins. Many of the applications—older and brittle third-party applications as well as legacy apps that don’t use claims-based authentication (i.e. SAML / OAuth2)— aggressively resist modernization attempts.

 

Technology challenges are real and always take time to address, but business decisions and process often compound issues. Many organizations don’t understand all the apps that are used in the organization, and far too often, applications are modernized based on which line-of-business managers show up, rather than what makes sense for the overall enterprise. A migration strategy can help you sidestep some of these issues and move your enterprise to a more secure posture faster. Based on our years working with customers with similar challenges, we’ve identified the following steps that you can apply to your app migration initiatives:

  • Inventory your apps
  • Define business impact
  • Apply security controls
  • Implement a connected security system

Inventory your apps

Before you begin migrating your software-as-a-service (SaaS) apps to Azure AD, understand all the apps used in your organization and the risks associated with each one. This way, you can prioritize which apps to modernize first and make smart decisions about which security controls are required to secure each app. We typically start by interviewing key personnel throughout the organization. The interview process will uncover a list of applications and help you define the business impact of each.

 

Define business impact

Once you’ve accounted for every app used in your company—including little-used older apps that still need to be in place— answer the following questions for each one:

  • What types of sensitive data (PCI, PII, PHI, Financial, Intellectual property) does the app access?
  • How much revenue is associated with the app?
  • What is the impact to the business when employees/partners/customers are denied access to the app?
  • Who needs to access the app?

The answers to these questions help you determine each app’s impact to the organization and its risk relative to other apps. You can then group them into three categories:

  • High Business Impact (HBI)
  • Medium Business Impact (MBI)
  • Low Business Impact (LBI).

Edgile Microsoft Blog Graphic _ May24th (1).png



After you have a clear understanding of the business impact of your apps, you can begin planning your migration. Consider the costs and time to migrate each app, but as much as possible prioritize your high business impact apps first.

 

Apply security controls

After you’ve prioritized your app migration plan, next step is to determine the controls to apply to each app. This requires a balance between simple user experience and security. For example, you may want to add more controls to an app that accesses privileged data and fewer controls to low business impact app. One of the biggest risks to enterprises is users with over-privileged access across the enterprise, so it’s also important to enable automated provisioning and de-provisioning. We also recommend that you turn on MFA across all your apps. Other examples of critical controls:

 

  • Risk-based conditional access
  • Access approval workflows
  • Access re-certification
  • Privileged access management
  • Information protections vs classification and rights management
  • Data scanning across on-premises and cloud
  • Policy enforcement by monitoring, alerting and reporting

 

“Edgile modernized identity systems and processes and created the bridge to a fully enabled Azure security implementation across the enterprise.”

— Mike Nobile, Chief Information Security Officer, Alcoa

 

Implement a connected security system

Safeguarding your apps requires that you have a full view of all the risk factors. You need to understand the state of the device, the user, and the network, among other risk factors. Switching between several best-of-class technologies makes it incredibly challenging to get a view across the entire session. We recommend that you try to consolidate your security solutions as much as possible under a single vendor. Microsoft 365, which offers a connected security platform across on-premises, cloud, endpoints, and identities, is a great example of a solution that lets you look at multiple angles. Think of it like your car. You know that if you get in an accident and slam on the breaks, the airbag will automatically respond because it’s a connected system. You feel safer because it was manufactured to work together.

 

Our client T-Mobile benefited from this approach. “Microsoft and Edgile helped bring our identity and access security and compliance to a higher level. As a team, they demonstrated the value of M365 to T-Mobile by providing a strategy, implementation roadmap, and resources that demonstrated to senior management why EM+S E5 was well worth the investment. As a result of our E5 implementation, risk-based conditional access has decreased our user and sign-on risk while simultaneously lowering user friction." —Koveh Tavakkol, Senior Manager Cybersecurity, T-Mobile

 

Updating your apps for a passwordless future is a big endeavor. We hope our risk management recommendations will ease some of the burden and allow you to achieve more of your goals.

 

Learn more

I hope you will be able to apply some of Edgile’s recommendations to your own migration plans. You can expect another partner story in the next month. In the meantime checkout out the Voice of the Partners series for more real-world experiences with Microsoft 365 Identity and Access solutions.

 

Read Voice of the Customer series.

 

Find how Azure AD can help you enhance your security and simplify access.

Leverage our partners for help with an implementation.