Better safe than sorry - Emergency Access Jacked Up in Microsoft Entra ID

Book This Session

Overview

Emergency Access (EA) in public cloud is paramount. It's might be your last string of hope to get your Microsoft tenant back. Recently Microsoft has made changes to portal and command line tool access requiring strong authentication. Emergency Access accounts (a.k.a Break Glass accounts) were subject to this change also. Stories from around the world about lost tenant access are horrifying. You might end up battling with support for months. How many companies can afford to lose at least part of their business for months? Or even weeks? Emergency Access is your insurance, but only if it's done the right way. In this session I'll cover - What scenarios will get us locked out from tenant and when emergency access is to be used - How robust emergency access should be designed to cover all angles - How to monitor and secure these powerful accounts from credential abuse or privilege escalation - What processes are needed to create regarding emergency access - How to scale Emergency Access setup if company operations run on global scale We all hope we never need to use emergency access, the same way we hope that we never actually need a seat belt in action, but when we do need it, it's best to be prepared.