Summary
This chapter introduced you to the principles of PIM, entitlement management, and access reviews. You explored the steps to diligently plan your PIM configuration and configure and assign roles to your users and resources with the principle of least privilege applied. You also learned how to make users eligible for privileged access roles to gain JIT access, how to assign permanent access to privileged roles when required, and how to remove this access when it’s no longer required.
After that, you looked at the various monitoring capabilities of PIM, which enable you to be appropriately informed regarding your PIM configuration and ensure that access is granted only when it is required.
You also examined access packages to collate features and settings to be targeted to groups of users and control lifecycle and access reviews to check users’ access permissions to ensure they are appropriate and remove stale access permissions.
In the next chapter, you...