
Privileged Identity & Access Management
Objectives
Challenges
The organization had no control over privileged accounts and access.
Administrators had used their user accounts for administrative tasks.
People had overprivileged roles
There was no review process of roles and rights assignment
Results
achieved
Implementation of Privilege Identity Management using Microsoft's Entra ID.
Development of an RBAC group concept for administrators and IT team.
Implementation of the Least Privilege and Just in Time principles.
Establishment of review processes
Setting up a monitoring system including logging.
Enormous security gain through separation of user and admin accounts.
Categories
Cybersecurity, IAM
Date
3 months, 2025
Client
Industrial company (international, approx. 1,600 employees)
Privileged Identity & Access Management
Objectives
Challenges
The organization had no control over privileged accounts and access.
Administrators had used their user accounts for administrative tasks.
People had overprivileged roles
There was no review process of roles and rights assignment
Results
achieved
Implementation of Privilege Identity Management using Microsoft's Entra ID.
Development of an RBAC group concept for administrators and IT team.
Implementation of the Least Privilege and Just in Time principles.
Establishment of review processes
Setting up a monitoring system including logging.
Enormous security gain through separation of user and admin accounts.
Categories
Cybersecurity, IAM
Date
3 months, 2025
Client
Industrial company (international, approx. 1,600 employees)
Privileged Identity & Access Management
Objectives
Challenges
The organization had no control over privileged accounts and access.
Administrators had used their user accounts for administrative tasks.
People had overprivileged roles
There was no review process of roles and rights assignment
Results
achieved
Implementation of Privilege Identity Management using Microsoft's Entra ID.
Development of an RBAC group concept for administrators and IT team.
Implementation of the Least Privilege and Just in Time principles.
Establishment of review processes
Setting up a monitoring system including logging.
Enormous security gain through separation of user and admin accounts.
Categories
Cybersecurity, IAM
Date
3 months, 2025
Client
Industrial company (international, approx. 1,600 employees)