From 2977a732547d21afe3febd41dbb880fcb24aaa4b Mon Sep 17 00:00:00 2001 From: Jorge Lopez <43187678+jorlopama@users.noreply.github.com> Date: Wed, 13 Nov 2024 20:48:05 -0500 Subject: [PATCH] updating SC --- Scenarios/success-criteria.md | 47 ++++++++-------------- website/docs/Scenarios/success-criteria.md | 6 +++ 2 files changed, 22 insertions(+), 31 deletions(-) diff --git a/Scenarios/success-criteria.md b/Scenarios/success-criteria.md index b9ff77c..a67158e 100644 --- a/Scenarios/success-criteria.md +++ b/Scenarios/success-criteria.md @@ -1,8 +1,3 @@ ---- -sidebar_position: 4 -title: Success Criteria ---- - # Success Criteria for Entra Suite POC > Checklist for Evaluating POC Success for Entra Suite @@ -15,32 +10,22 @@ title: Success Criteria * Entra Identity protection * Entra Verified ID -## Established criteria for success to guide future deployment decisions based on the following scenarios: - -### Enhanced workforce and guest lifecycle - -* Securely onboard employees using Entra Verified ID -* Use Entra ID Governance to create and grant access to applications using access packages -* Provide access to resources to external users (guests) using Access Packages with Entra Verified ID -* Setup Entra Identity Protection to monitor and protect accounts from risky sign-ins and user behavior -* Create CA policy to enforce access controls based on risk level, location and device - -### Modernize remote access - -* Deploy and configure Global Secure access client -* Setup Private access connector to extend access to any private recourse securely -* Publish an application using Entra Private Access (commonly a new or existing File share) -* Create necessary profiles and CA policies as desired -* Test users to connect to this private app without requiring a VPN solution - -### Govern internet access based on business needs - -* Deploy and configure Global Secure access client -* Create security profile and web content filtering including a baseline policy and proper samples -* Create a security profile that enabled users to access hacking web category -* Use Entra ID Governance to create access packages with groups resources that allows our scenario departments to access multiple security profiles with limited time -* Create proper conditional access policies to control and scope to groups of enforcement -* Confirm that traffic is appropriately granted with traffic logs with test users +## Established criteria for success based on the following scenarios + +| Scenario / Phase | Task / Features | Success Criteria | +|--------------------------------------------------------|-----------------------------------------|------------------------------------------------------------------------------------| +| **Enhanced workforce and guest user lifecycle** | Configure pre-requisites | Microsoft Entra Verified ID , Add trusted orgs , create catalog | +| | Create Access Packages | Create test Access packages | +| | Create sign-in risk-based CA policy | Create risk based policy | +| | Request access package | End user request access package | +| **Secure and govern access to all apps and resources** | Configure Global Access | Install Client, Setup connector server, Create security group | +| | Publish Application | Secure published application , validate access | +| **Govern internet access based on business needs** | Configure Global Access | Install Client, Setup connector server, Create security group | +| | Block Access with baseline profile | Create web filtering policy, Configure baseline security profile | +| | Allow Access to social networking sites | Create web filtering policy, Configure baseline security profile, Create CA policy | +| | Allow access to hacking sites | Create web filtering policy, Configure baseline security profile, Create CA policy | +| | Configure Access Governance | Configure Access Governance | +| | Test Users | Request social networking access, request hacing site access | ## Next Steps diff --git a/website/docs/Scenarios/success-criteria.md b/website/docs/Scenarios/success-criteria.md index e51eb2e..5834efc 100644 --- a/website/docs/Scenarios/success-criteria.md +++ b/website/docs/Scenarios/success-criteria.md @@ -31,3 +31,9 @@ title: Success Criteria | | Allow access to hacking sites | Create web filtering policy, Configure baseline security profile, Create CA policy | | | Configure Access Governance | Configure Access Governance | | | Test Users | Request social networking access, request hacing site access | + +## Next Steps + +* Compile a comprehensive report on POC results. +* Recommendations for full-scale implementation based on POC findings +* Outline a timeline and resource plan for deployment. \ No newline at end of file