03-03-2020, 03:29 PM
PIM, PAM, MIM, MAM… Check out our guide to identity acronyms
<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/03/pim-pam-mim-mam-check-out-our-guide-to-identity-acronyms.jpg" width="2000" height="1333" title="" alt="" /></div><div><div><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/03/pim-pam-mim-mam-check-out-our-guide-to-identity-acronyms.jpg" class="ff-og-image-inserted"></div>
<p>As a security advisor working with one to three Chief Information Security Officers (CISOs) each week, the topic of identity comes up often. These are smart people who have often been in industry for decades. They have their own vocabulary of acronyms that only security professionals know such as DDoS, CEH, CERT, RAT, and 0-Day (if you don’t know one or several of these terms, I encourage you to look them up to build your vocabulary), but they often find themselves confused by Microsoft’s own set of acronyms.</p>
<p>This is the first in a blog series that aims to lessen some confusion around identity by sharing with you some of the terms used at Microsoft. Terms like MFA, PIM, PAM, MIM, MAM, MDM, and a few others. What do they mean and how do they relate to each other?</p>
<h3>Multi-Factor Authentication or MFA</h3>
<p>Let’s start with what identity means to Microsoft. Identity is the ability to clearly and without doubt ensure the identification of a person, device, location, or application. This is done by establishing trust verification and identity verification using what Microsoft calls <a href="https://en.wikipedia.org/wiki/Multi-factor_authentication" target="_blank" rel="noopener noreferrer"><strong>Multi-Factor Authentication or MFA</strong></a>. This is a combination of capabilities that allow the entity to establish trust and verify who or what they are.</p>
<p>MFA is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: something the user and only the user knows (such as a password or PIN), something the user and only the user has (such as a mobile device or FIDO key), and something the user and only the user is (a biometric such as a fingerprint or iris scan).</p>
<p>Microsoft does this with technologies such as <a href="https://azure.microsoft.com/en-us/services/active-directory/" target="_blank" rel="noopener noreferrer">Azure Active Directory (Azure AD)</a> in the cloud combined with Windows Hello. Azure AD is Microsoft’s identity and access management solution. <a href="https://www.microsoft.com/en-us/windows/windows-hello" target="_blank" rel="noopener noreferrer">Windows Hello</a> is a Windows capability that allows a user to verify who they are with an image, a pin, or other biometric. The person’s identity is stored via an encrypted hash in the cloud, so it’s never shared in the clear (unencrypted). A cryptographic hash is a checksum that allows someone to proof that they know the original input (e.g., a password) and that the input (e.g., a document) has not been modified.</p>
<h3>Privileged Identity Management or PIM</h3>
<p>What is <a href="https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure" target="_blank" rel="noopener noreferrer"><strong>Privileged Identity Management or PIM</strong></a>? Organizations use PIM to assign, activate, and approve privileged identities in Azure AD. PIM provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions to sensitive resources.</p>
<p>Key features of PIM include:</p>
<ul>
<li>Just-in-time privileged access to Azure AD and Azure resources.</li>
<li>Time-bound access to resources.</li>
<li>An approval process to activate privileged roles.</li>
<li>MFA enforcement.</li>
<li>Justification to understand why users activate.</li>
<li>Notifications when roles are activated.</li>
<li>Access reviews and internal and external audit history.</li>
</ul>
<h3>Privileged Access Management or PAM</h3>
<p>What is <a href="https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services" target="_blank" rel="noopener noreferrer"><strong>Privileged Access Management or PAM</strong></a>? Often confused with PIM, PAM is a capability to help organizations manage identities for existing on-premises Active Directory environments. PAM is an instance of PIM that is accessed using Microsoft Identity Manager or MIM. Confused? Let me explain.</p>
<p>PAM helps organizations solve a few problems including:</p>
<ul>
<li>Making it harder for attackers to penetrate a network and obtain privileged account access.</li>
<li>Adding protection to privileged groups that control access to domain-joined computers and the applications on those computers.</li>
<li>Providing monitoring, visibility, and fine-grained controls so organizations can see who their privileged admins are and what they are doing.</li>
</ul>
<p>PAM gives organizations more insight into how admin accounts are being used in the environment.</p>
<h3>Microsoft Identity Manager or MIM</h3>
<p>But I also mentioned MIM… What is this? <a href="https://docs.microsoft.com/en-us/microsoft-identity-manager/microsoft-identity-manager-2016" target="_blank" rel="noopener noreferrer"><strong>Microsoft Identity Manager or MIM</strong></a> helps organizations manage the users, credentials, policies, and access within their organizations and hybrid environments. With MIM, organizations can simplify identity lifecycle management with automated workflows, business rules, and easy integration with heterogenous platforms across the datacenter. MIM enables Active Directory to have the right users and access rights for on-premises apps. Azure AD Connect can then make those users and permissions available in Azure AD for Office 365 and cloud-hosted apps.</p>
<p>OK, so now we know that:</p>
<ul>
<li>PIM is a capability to help companies manage identities in Azure AD.</li>
<li>PAM is an on-premises capability to manage identities in Active Directory.</li>
<li>MIM helps organizations manage users, credentials, policies, and on-premises access.</li>
</ul>
<h3>Mobile Application Management or MAM</h3>
<p>What’s left… Oh yes: <a href="https://docs.microsoft.com/en-us/intune/apps/app-management" target="_blank" rel="noopener noreferrer"><strong>Mobile Application Management or MAM</strong></a>. MAM is important because if organizations can only manage identities—but not the apps then they miss a key aspect of protecting data. MAM is connected to a Microsoft capability called <a href="https://www.microsoft.com/en-us/microsoft-365/enterprise-mobility-security/microsoft-intune" target="_blank" rel="noopener noreferrer">Microsoft Intune</a> and is a suite of management features to publish, push, configure, secure, monitor, and update mobile apps for users.</p>
<p>MAM works with or without enrollment of the device, which means organizations can protect sensitive data on almost any device using MAM-WE (without enrollment). If organizations enable MFA, they can verify the user on the device. MAM also helps manage that apps the trusted user or entity can access. If you add in the <strong>Mobile Device Management or MDM</strong> feature of Intune, you can force enrollment of devices and then use MAM to manage the apps.</p>
<p>It’s well known that Microsoft has a lot of acronyms. This is the first in a series of blog posts aimed to assist you in navigating the acronym forest created by companies and industry. The Microsoft Platform includes a powerful set of capabilities to help encourage users to make the right decisions and gives security leadership, like you, the ability to manage and monitor identities and control access to critical files and network assets.</p>
</div>
https://www.sickgaming.net/blog/2020/02/...-acronyms/
<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/03/pim-pam-mim-mam-check-out-our-guide-to-identity-acronyms.jpg" width="2000" height="1333" title="" alt="" /></div><div><div><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/03/pim-pam-mim-mam-check-out-our-guide-to-identity-acronyms.jpg" class="ff-og-image-inserted"></div>
<p>As a security advisor working with one to three Chief Information Security Officers (CISOs) each week, the topic of identity comes up often. These are smart people who have often been in industry for decades. They have their own vocabulary of acronyms that only security professionals know such as DDoS, CEH, CERT, RAT, and 0-Day (if you don’t know one or several of these terms, I encourage you to look them up to build your vocabulary), but they often find themselves confused by Microsoft’s own set of acronyms.</p>
<p>This is the first in a blog series that aims to lessen some confusion around identity by sharing with you some of the terms used at Microsoft. Terms like MFA, PIM, PAM, MIM, MAM, MDM, and a few others. What do they mean and how do they relate to each other?</p>
<h3>Multi-Factor Authentication or MFA</h3>
<p>Let’s start with what identity means to Microsoft. Identity is the ability to clearly and without doubt ensure the identification of a person, device, location, or application. This is done by establishing trust verification and identity verification using what Microsoft calls <a href="https://en.wikipedia.org/wiki/Multi-factor_authentication" target="_blank" rel="noopener noreferrer"><strong>Multi-Factor Authentication or MFA</strong></a>. This is a combination of capabilities that allow the entity to establish trust and verify who or what they are.</p>
<p>MFA is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: something the user and only the user knows (such as a password or PIN), something the user and only the user has (such as a mobile device or FIDO key), and something the user and only the user is (a biometric such as a fingerprint or iris scan).</p>
<p>Microsoft does this with technologies such as <a href="https://azure.microsoft.com/en-us/services/active-directory/" target="_blank" rel="noopener noreferrer">Azure Active Directory (Azure AD)</a> in the cloud combined with Windows Hello. Azure AD is Microsoft’s identity and access management solution. <a href="https://www.microsoft.com/en-us/windows/windows-hello" target="_blank" rel="noopener noreferrer">Windows Hello</a> is a Windows capability that allows a user to verify who they are with an image, a pin, or other biometric. The person’s identity is stored via an encrypted hash in the cloud, so it’s never shared in the clear (unencrypted). A cryptographic hash is a checksum that allows someone to proof that they know the original input (e.g., a password) and that the input (e.g., a document) has not been modified.</p>
<h3>Privileged Identity Management or PIM</h3>
<p>What is <a href="https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure" target="_blank" rel="noopener noreferrer"><strong>Privileged Identity Management or PIM</strong></a>? Organizations use PIM to assign, activate, and approve privileged identities in Azure AD. PIM provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions to sensitive resources.</p>
<p>Key features of PIM include:</p>
<ul>
<li>Just-in-time privileged access to Azure AD and Azure resources.</li>
<li>Time-bound access to resources.</li>
<li>An approval process to activate privileged roles.</li>
<li>MFA enforcement.</li>
<li>Justification to understand why users activate.</li>
<li>Notifications when roles are activated.</li>
<li>Access reviews and internal and external audit history.</li>
</ul>
<h3>Privileged Access Management or PAM</h3>
<p>What is <a href="https://docs.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services" target="_blank" rel="noopener noreferrer"><strong>Privileged Access Management or PAM</strong></a>? Often confused with PIM, PAM is a capability to help organizations manage identities for existing on-premises Active Directory environments. PAM is an instance of PIM that is accessed using Microsoft Identity Manager or MIM. Confused? Let me explain.</p>
<p>PAM helps organizations solve a few problems including:</p>
<ul>
<li>Making it harder for attackers to penetrate a network and obtain privileged account access.</li>
<li>Adding protection to privileged groups that control access to domain-joined computers and the applications on those computers.</li>
<li>Providing monitoring, visibility, and fine-grained controls so organizations can see who their privileged admins are and what they are doing.</li>
</ul>
<p>PAM gives organizations more insight into how admin accounts are being used in the environment.</p>
<h3>Microsoft Identity Manager or MIM</h3>
<p>But I also mentioned MIM… What is this? <a href="https://docs.microsoft.com/en-us/microsoft-identity-manager/microsoft-identity-manager-2016" target="_blank" rel="noopener noreferrer"><strong>Microsoft Identity Manager or MIM</strong></a> helps organizations manage the users, credentials, policies, and access within their organizations and hybrid environments. With MIM, organizations can simplify identity lifecycle management with automated workflows, business rules, and easy integration with heterogenous platforms across the datacenter. MIM enables Active Directory to have the right users and access rights for on-premises apps. Azure AD Connect can then make those users and permissions available in Azure AD for Office 365 and cloud-hosted apps.</p>
<p>OK, so now we know that:</p>
<ul>
<li>PIM is a capability to help companies manage identities in Azure AD.</li>
<li>PAM is an on-premises capability to manage identities in Active Directory.</li>
<li>MIM helps organizations manage users, credentials, policies, and on-premises access.</li>
</ul>
<h3>Mobile Application Management or MAM</h3>
<p>What’s left… Oh yes: <a href="https://docs.microsoft.com/en-us/intune/apps/app-management" target="_blank" rel="noopener noreferrer"><strong>Mobile Application Management or MAM</strong></a>. MAM is important because if organizations can only manage identities—but not the apps then they miss a key aspect of protecting data. MAM is connected to a Microsoft capability called <a href="https://www.microsoft.com/en-us/microsoft-365/enterprise-mobility-security/microsoft-intune" target="_blank" rel="noopener noreferrer">Microsoft Intune</a> and is a suite of management features to publish, push, configure, secure, monitor, and update mobile apps for users.</p>
<p>MAM works with or without enrollment of the device, which means organizations can protect sensitive data on almost any device using MAM-WE (without enrollment). If organizations enable MFA, they can verify the user on the device. MAM also helps manage that apps the trusted user or entity can access. If you add in the <strong>Mobile Device Management or MDM</strong> feature of Intune, you can force enrollment of devices and then use MAM to manage the apps.</p>
<p>It’s well known that Microsoft has a lot of acronyms. This is the first in a series of blog posts aimed to assist you in navigating the acronym forest created by companies and industry. The Microsoft Platform includes a powerful set of capabilities to help encourage users to make the right decisions and gives security leadership, like you, the ability to manage and monitor identities and control access to critical files and network assets.</p>
</div>
https://www.sickgaming.net/blog/2020/02/...-acronyms/