Microsoft has been published a very interesting article about protecting elevated-privilege accounts internally. It's a summary about implementing a secure high-risk environment (HRE) which is accessible by SAW only and supported by a dedicated team (SAS).
๐ https://www.microsoft.com/insidetrack/blog/improving-security-by-protecting-elevated-privilege-accounts-at-microsoft/?WT.mc_id=AZ-MVP-5003945
Insights about SAW usage at Microsoft will be shared:
"Each administrator has a single device, a SAW, where they have a hosted virtual machine (VM) to perform their administrative duties and a corporate VM for productivity work like email, Microsoft Office products, and web browsing."
In my opinion, the following (high-level) key aspects are really important to consider for own strategies and implementation to protect privileged identities and access:
๐ Identify sensitive and high risk assets and privileges
๐ฆธ Consistent implementation of least privilege and JIT access
โ๏ธ End-to-end supply chain for DevOps and SAW management
๐ Automation for scaled and standardized deployment for SAWs
โจ๏ธ Provide "secure keyboard" for critical administrative tasks
โ Restrict access to SAW devices by enforcing CA Device Filters
๐งโ๐ป Consider to include developers in a different security approach
I've started to write a blog post series about my approach to secure privileged access in Azure AD which could help you get started your journey to protect administrators:
๐ก๏ธ Securing privileged user access with Azure AD Conditional Access and Identity Governance:
https://www.cloud-architekt.net/securing-privileged-access-conditionalaccess-governance/
๐ Automated Lifecycle Workflows for Privileged Identities with Azure AD Identity Governance:
https://www.cloud-architekt.net/manage-privileged-identities-with-azuread-identity-governance/
๐ More resources related to this topic: