Hello Najam ul Saqib,
Welcome to the Microsoft Q&A and thank you for posting your questions here.
I understand that you would like to know how you can have more control on my users having access to client's tenant.
Regarding your questions:
How to have more control on my users having access to client's tenant?
To have more control over your consultants’ access to the client’s tenant, you can implement the following measures:
- Use Azure AD Conditional Access to enforce policies that require consultants to meet certain conditions before accessing resources. This can include multi-factor authentication (MFA), device compliance, and location-based restrictions.
- Implement PIM to manage, control, and monitor access within Azure AD. This allows you to provide just-in-time privileged access to Azure resources and enforce approval workflows.
Can someone tell me what are the available options to have more access to what users do?
To gain more visibility into what users are doing, consider these options:
- Set up Azure Monitor to collect and analyze logs from your consultants’ activities. This can help you detect and respond to suspicious activities.
- Use Azure Security Center to get a unified view of security across your Azure environment. It provides advanced threat protection and security recommendations.
Create a VM for the consultants in org's Azure tenant and ask them to use that for connecting with client's environment -- I have no idea how fruitful can this be, but this can def be costly.
Creating VMs for consultants in your Azure tenant can provide a controlled environment for accessing the client’s resources. This approach can be effective but may incur higher costs and benefits include:
- You can enforce security policies and configurations on the VMs.
- Consultants’ activities are isolated from their personal devices, reducing the risk of data leakage.
Use external identities and connect the client's environment using B2B connection with org's environment -- again very little knowledge in this area but the research that I have done so far shows that it only connects the Entra and does not give access to the Azure portal resources, right?
Using Azure AD B2B to connect with the client’s environment can be a secure way to manage external users. However, it’s important to understand its limitations:
- B2B collaboration allows you to invite external users to your directory and assign them roles. While it doesn’t directly grant access to Azure resources, you can manage their permissions through Azure AD roles and resource-specific roles.
- You can apply conditional access policies to B2B users to ensure they meet your security requirements.
About UEM solution (not intune) so that can be utilized as well.
Since your organization has a Unified Endpoint Management (UEM) solution, you can leverage it to enforce security policies on consultants’ devices:
- Make sure that consultants’ devices comply with your security policies before granting access to the client’s environment.
- Use UEM to manage and monitor consultants’ devices, ensuring they adhere to your security standards.
In summary here is my recommendations:
- Consider combining VMs with B2B collaboration and conditional access policies to create a layered security approach.
- Conduct regular security audits and reviews of access logs to ensure compliance and detect any anomalies.
- Provide training to consultants on security best practices and the importance of adhering to your organization’s policies.
I hope this is helpful! Do not hesitate to let me know if you have any other questions.
Please don't forget to close up the thread here by upvoting and accept it as an answer if it is helpful.