{"id":114039,"date":"2022-05-31T06:00:00","date_gmt":"2022-05-31T13:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=114039"},"modified":"2023-11-15T10:43:44","modified_gmt":"2023-11-15T18:43:44","slug":"secure-access-for-a-connected-worldmeet-microsoft-entra","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/05\/31\/secure-access-for-a-connected-worldmeet-microsoft-entra\/","title":{"rendered":"Secure access for a connected world\u2014meet Microsoft Entra"},"content":{"rendered":"\n
What could the world achieve if we had trust in every digital experience and interaction?<\/p>\n\n\n\n
This question has inspired us to think differently about identity and access, and today, we\u2019re announcing our expanded vision for how we will help provide secure access for our connected world.<\/p>\n\n\n\n
Microsoft Entra<\/a><\/strong> is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Azure Active Directory (Azure AD), as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.<\/p>\n\n\n\n Technology has transformed our lives in amazing ways. It\u2019s reshaped how we interact with others, how we work, cultivate new skills, engage with brands, and take care of our health. It\u2019s redefined how we do business by creating entirely new ways of serving existing needs while improving the experience, quality, speed, and cost management.<\/p>\n\n\n\n Behind the scenes of all this innovation, millions and millions of connections happen every second between people, machines, apps, and devices so that they can share and access data. These interactions create exciting opportunities for how we engage with technology and with each other\u2014but they also create an ever-expanding attack surface with more and more vulnerabilities for people and data that need to be addressed.<\/p>\n\n\n\n It\u2019s become increasingly important\u2014and challenging\u2014for organizations to address these risks as they advance their digital initiatives. They need to remove barriers to innovation, without the fear of being compromised. They need to instill trust, not only in their digital experiences and services, but in every digital interaction that powers them\u2014every point of access between people, machines, microservices, and things.<\/p>\n\n\n\n When the world was simpler, controlling digital access was relatively straightforward. It was just a matter of setting up the perimeter and letting only the right people in.<\/p>\n\n\n\n But that\u2019s no longer sustainable. Organizations simply can\u2019t put up gates around everything\u2014their digital estates are growing, changing, and becoming boundaryless. It\u2019s virtually impossible to anticipate and address the unlimited number of access scenarios that can occur across an organization and its supply chain, especially when it includes third-party systems, platforms, applications, and devices outside the organization\u2019s control.<\/p>\n\n\n\n Identity is not just about directories, and access is not just about the network. Security challenges have become much broader, so we need broader solutions. We need to secure access for every customer, partner, and employee\u2014and for every microservice, sensor, network, device, and database.<\/p>\n\n\n\n And doing this needs to be simple. Organizations don\u2019t want to deal with incomplete and disjointed solutions that solve only one part of the problem, work in only a subset of environments, and require duct tape and bubble gum to work together. They need access decisions to be as granular as possible and to automatically adapt based on real-time assessment of risk. And they need this everywhere: on-premises, Azure AD, Amazon Web Services, Google Cloud Platform, apps, websites, devices, and whatever comes next.<\/p>\n\n\n\n This is our expanded vision for identity and access, and we will deliver it with our new product family, Microsoft Entra<\/a><\/strong>.<\/p>\n\n\n\n Video description: Vasu Jakkal, Corporate Vice President, Security, Compliance, Identity and Management, and Joy Chik, CVP of Identity, are unveiling Microsoft Entra, our new identity and access product family name, and are discussing the future of modern identity and access security.<\/p>\n\n\n\n To make this vision a reality, identity must evolve. Our interconnected world requires a flexible and agile model where people, organizations, apps, and even smart devices could confidently make real-time access decisions. We need to build upon and expand our capabilities to support all<\/em> the scenarios that our customers are facing.<\/p>\n\n\n\n Moving forward, we\u2019re expanding our identity and access solutions so that they can serve as a trust fabric for the entire<\/em> digital ecosystem\u2014now and long into the future.<\/p>\n\n\n\n Microsoft Entra will verify all types of identities and secure, manage, and govern their access to any resource. <\/strong>The new Microsoft Entra product family will:<\/p>\n\n\n\n This is an important step towards delivering a comprehensive set of products for identity and access needs, and we\u2019ll continue to expand the Microsoft Entra product family.<\/p>\n\n\n\n \u201cIdentity is one of the cornerstones of our cybersecurity for the future.\u201d<\/em><\/p> \u2014Thomas Mueller-Lynch, Service Owner Lead for Digital Identity, Siemens<\/a><\/p><\/blockquote>\n\n\n\n Microsoft Azure AD<\/strong><\/a>, our hero identity and access management product, will be part of the Microsoft Entra family, and all its capabilities that our customers know and love, such as Conditional Access<\/a> and passwordless authentication<\/a>, remain unchanged. Azure AD Extern<\/strong><\/a>a<\/a><\/strong>l Identities<\/strong><\/a> continues to be our identity solution for customers and partners under the Microsoft Entra family.<\/p>\n\n\n\n Additionally, we are adding new solutions and announcing several product innovations as part of the Entra family.<\/p>\n\n\n\n The adoption of multicloud has led to a massive increase in identities, permissions, and resources across public cloud platforms. Most identities are over-provisioned, expanding organizations\u2019 attack surface and increasing the risk of accidental or malicious permission misuse. Without visibility across cloud providers, or tools that provide a consistent experience, it\u2019s become incredibly challenging for identity and security teams to manage permissions and enforce the principle of least privilege across their entire digital estate.<\/p>\n\n\n\n With the acquisition of CloudKnox Security last year, we are now the first major cloud provider to offer a CIEM solution: Microsoft Entra Permissions Management<\/a><\/strong>. It provides comprehensive visibility into permissions for all identities (both user and workload), actions, and resources across multicloud infrastructures. Permissions Management helps detect, right-size, and monitor unused and excessive permissions, and mitigates the risk of data breaches by enforcing the principle of least privilege in Microsoft Azure, Amazon Web Services, and Google Cloud Platform. Microsoft Entra Permissions Management will be a standalone offering generally available worldwide this July 2022 and will be also integrated within the Microsoft Defender for Cloud dashboard, extending Defender for Cloud\u2019s protection with CIEM.<\/p>\n\n\n\n Additionally, with the preview of workload identity management<\/strong><\/a> in Microsoft Entra, customers can assign and secure identities for any app or service hosted in Azure AD by extending the reach of access control and risk detection capabilities.<\/p>\n\n\n\n At Microsoft, we deeply value, protect, and defend privacy<\/a>, and nowhere is privacy more important than your personal identity. After several years of working alongside the decentralized identity community, we\u2019re proud to announce a new product offering: Microsoft Entra Verified ID<\/strong><\/a>, based on decentralized identity standards. Verified ID implements the industry standards that make portable, self-owned identity possible. It represents our commitment to an open, trustworthy, interoperable, and standards-based decentralized identity future for individuals and organizations. Instead of granting broad consent to countless apps and services and spreading identity data across numerous providers, Verified ID allows individuals and organizations to decide what information they share, when they share it, with whom they share it, and\u2014when necessary\u2014take it back.<\/p>\n\n\n\n The potential scenarios for decentralized identity<\/a> are endless. When we can verify the credentials of an organization in less than a second, we can conduct business-to-business and business-to-customer transactions with greater efficiency and confidence. Conducting background checks becomes faster and more reliable when individuals can digitally store and share their education and certification credentials. Managing our health becomes less stressful when both doctor and patient can verify each other\u2019s identity and trust that their interactions are private and secure. Microsoft Entra Verified ID will be generally available in early August 2022.<\/p>\n\n\n\n \u201cWe thought, \u2018Wouldn\u2019t it be fantastic to take a world-leading technology like Microsoft Entra and implement Verified ID for employees in our own office environment?\u2019 We easily identified business opportunities where it would help us work more efficiently.\u201d<\/em><\/p> \u2014Chris Tate, Chief Executive Officer, Condatis<\/a><\/p><\/blockquote>\n\n\n\n Next, let\u2019s focus on Identity Governance for employees and partners. It\u2019s an enormous challenge for IT and security teams to provision new users and guest accounts and manage their access rights manually. This can have a negative impact on both IT and individual productivity. New employees often experience a slow ramp-up to full effectiveness while they wait for the access required for their jobs. Similar delays in granting necessary access to guest users undermine a smoothly functioning supply chain. Then, without formal or automated processes for reprovisioning or deactivating people’s accounts, their access rights may remain in place when they change roles or exit the organization.<\/p>\n\n\n\n Identity Governance<\/strong><\/a> addresses this with identity lifecycle management, which simplifies the processes for onboarding and offboarding users. Lifecycle workflows automate assigning and managing access rights, and monitoring and tracking access, as user attributes change. Lifecycle workflows in Identity Governance will enter public preview this July 2022.<\/p>\n\n\n\n \u201cWe were so reactive for so long with old technology, it was a struggle. [With Azure AD Identity Governance] we\u2019re finally able to be proactive, and we can field some of those complex requests from the business side of our organization.\u201d<\/em><\/p> \u2014Sally Harrison, Workplace Modernization Consultant, Mississippi Division of Medicaid<\/a><\/p><\/blockquote>\n\n\n\n Microsoft Entra embodies our vision for what modern secure access should be. Identity should be an entryway into a world of new possibilities, not a blockade restricting access, creating friction, and holding back innovation. We want people to explore, to collaborate, to experiment\u2014not because they are reckless, but because they are fearless.<\/p>\n\n\n\n Visit the Microsoft Entra<\/a> <\/strong>website to learn more about how Azure AD, Microsoft Entra Permissions Management, and Microsoft Entra Verified ID deliver secure access for our connected world. <\/p>\n\n\n\n To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity. <\/p>\n\n\n\nThe need for trust in a hyperconnected world <\/h2>\n\n\n\n
Our expanded vision for identity and access<\/h2>\n\n\n\n
<\/a><\/figure>\n\n\n\n
Making the vision a reality: Identity as a trust fabric<\/h2>\n\n\n\n
\n
Microsoft Entra at a glance<\/h2>\n\n\n\n
<\/figure>\n\n\n\n
Reduce access risk across clouds<\/h3>\n\n\n\n
Enable secure digital interactions that respect privacy<\/h3>\n\n\n\n
Automate critical Identity Governance scenarios<\/h3>\n\n\n\n
Create possibilities, not barriers<\/h2>\n\n\n\n