Summary
In this chapter, you learned how to implement identity governance using Azure AD PIM and Azure AD PIM access reviews. The information in this chapter has equipped you with the skills needed to reduce the risks associated with compromised privileged identity and stale access. This helps to reduce the blast radius in the event of an identity security breach.
In the next chapter, we will begin to cover the concept of network perimeter security in Azure.