ASD's Blueprint for Secure Cloud

Identity governance

This section describes the design decisions associated with identity governance for system(s) built using ASD's Blueprint for Secure Cloud.

Estimated reading time: 3 minutes

Identity governance encompasses:

  • Entitlement management - the management of access to resources
  • Access reviews - the audit and maintenance of ongoing access
  • Lifecycle workflows - the onboarding, offboarding and moves of users
  • Privileged Identity Management (PIM) - the just-in-time access management of privileged roles

Identity governance has a significant role to play in implementing the principle of least privilege; enhancing security and mitigating risks by ensuring users are only accessing the resources relevant to their responsibilities, and nothing more. The Information Security Manual (ISM), Guidelines for Personnel Security, Access to systems and their resources has several controls relevant to identity governance.

Entitlement management

Entitlement management is largely focussed on the use of access packages, where administrators create catalogs of resources (like SharePoint sites, Teams, groups or applications) that are presented to select users or guests, and then lifecycle-managed with expiration and access review workflows.

Access packages are particularly useful for managing access to the common resources associated with the various divisions and user-types within an organisation.

Access reviews

Access reviews enable the audit and maintenance of group memberships, access to applications, and role assignments. Access reviews help mitigate the dangling access often associated with user’s access requirements changing over time.

1: While access reviews for Teams, groups and applications are performed via the Entra Identity Governance portal page, access reviews for roles are performed via the Entra PIM portal page.

Access reviews for inactive users are subject to Microsoft Entra ID Governance license requirements and are not in implemented in the Blueprint.

Lifecycle workflows

Lifecycle workflows provide automation for the onboarding, offboarding and moves of users, and can integrate with an organisation’s other user management systems, like human resources and financial systems, to further streamline such processes.

Lifecycle workflows are subject to Microsoft Entra ID Governance license requirements and are not in implemented in the Blueprint.

Privileged Identity Management (PIM)

The use of PIM is discussed in more detail in the Role-Based Access Control design page.

Security & Governance

  • None identified

Design

Configuration

  • None identified

References

Do you have a suggestion on how the above page could be improved? Get in touch! ASD's Blueprint for Secure Cloud is an open source project, and we would love to get your input. Submit an issue on our GitHub, or send us an email at blueprint@asd.gov.au

Acknowledgement of Country icon

Acknowledgement of Country
We acknowledge the Traditional Owners and Custodians of Country throughout Australia and their continuing connections to land, sea and communities. We pay our respects to them, their cultures and their Elders; past, present and emerging. We also recognise Australia's First Peoples' enduring contribution to Australia's national security.

Authorised by the Australian Government, Canberra