Chase Olson
Chase Olson

System Administrator

Systems Engineer

Network Engineer

Cloud Engineer

Cyber Security

0

No products in the cart.

Chase Olson

System Administrator

Systems Engineer

Network Engineer

Cloud Engineer

Cyber Security

Microsoft Privileged Identity Management (PIM) Implementation

  • Project Lead Chase Olson
  • Client Celestica
  • Date Sep 2024 - Nov 2024
  • Coffee Consumed 175 Cups

Led the implementation of Microsoft Privileged Identity Management (PIM) to enhance security, control privileged access, and reduce the risk of unauthorized access for a client.

  • PIM Strategy Development: Developed a PIM strategy to secure privileged roles in Azure AD and Microsoft 365, minimizing standing admin privileges and shifting to just-in-time (JIT) access to reduce risks.
  • Policy and Role Management: Configured PIM policies to grant high-level access only when necessary and for a limited time. Set up approval workflows, multi-factor authentication (MFA), and notifications to monitor elevated access.
  • Just-in-Time Access: Implemented JIT access for Azure AD and Microsoft 365 roles, allowing users to request privileges only when needed. Reduced the number of standing admins, lowering risks of misuse or compromised credentials.
  • Role-Based Access Control (RBAC): Established RBAC policies to ensure access was granted based on specific roles, supporting the principle of least privilege.
  • Auditing and Monitoring: Configured auditing and alerts within PIM to track access requests and activities. Set up automated alerts for abnormal activity to ensure real-time monitoring of privileged roles.
  • Training and Awareness: Delivered training for IT teams on using PIM, including requesting, approving, and managing access. Educated users on the importance of limiting privileged accounts for better security.
  • Compliance and Reporting: Enabled reporting to track role activations and access, ensuring compliance with regulations and internal policies. Provided auditors with logs detailing privileged access activities.
  • Improved Security: Strengthened security by reducing permanent privileged accounts, increasing visibility into access requests, and ensuring only authorized personnel accessed sensitive resources.