Azure IAM
About
Monitoring your AZURE IAM configuration and the policies is vital to have a secure setup. This recipe monitors several for rules and best practices recommended by GCP and industry leaders.
Security
Guest Users in Use
Avoid creating guest users, as they are typically added outside your employee on-boarding/off-boarding process and could potentially be overlooked indefinitely leading to a potential vulnerability.
Sources
https://www.cloudanix.com/recipelist/azure/azureiamaudit
Help Us Improve!
If you have any suggestions to improve this checklist, please let us know by filling out
this form.