Monitoring your AZURE IAM configuration and the policies is vital to have a secure setup. This recipe monitors several for rules and best practices recommended by GCP and industry leaders.
Guest Users in Use
Avoid creating guest users, as they are typically added outside your employee on-boarding/off-boarding process and could potentially be overlooked indefinitely leading to a potential vulnerability.
Help Us Improve!
If you have any suggestions to improve this checklist, please let us know by filling out