πŸ” Part 6 β€” Identity & Access Design

Where Real Security Actually Begins

Most teams think security = network.

It’s not.

In cloud, identity is the primary security boundary

πŸ”₯ First Principle

Assume network is already compromised β€” control access through identity

This is the foundation of:


❌ The Most Common Mistake

Teams do:

Because:

β€œIt’s inside the VNet, so it’s safe”

πŸ‘‰ This thinking is dangerous in cloud


🧠 Start With These 4 Questions

1. Who needs access?

2. What level of access?

3. For how long?

4. Under what conditions?


πŸ”· Core Identity Components

1. Microsoft Entra ID (Tenant Level)

This is your identity backbone


2. RBAC (Role-Based Access Control)

Defines who can do what

Example Roles

Where applied/Scope?

πŸ”₯ Golden Rule

Assign roles to groups β€” never directly to users


3. PIM (Privileged Identity Management)

Controls privileged access

Instead of:

Use:

For Example:

Cloud Admin:


4. Conditional Access

Defines when and how access is allowed

Example Policies


5. Managed Identities

Identity for applications (no credentials)

Example

πŸ‘‰ No passwords needed


6. Service Principals

Identity for automation/tools

Example


πŸ” Zero Trust Model

Principles

What this means

Real-World Design

Admin Access

Developer Access

Application Access

External Access


⚠️ Common Mistakes

❌ Direct user role assignments

πŸ‘‰ leads to chaos

❌ Over-permission

  • Owner everywhere
  • Contributor everywhere

❌ No PIM

πŸ‘‰ permanent admin risk


❌ Hardcoded secrets

πŸ‘‰ major security risk

❌ Ignoring identity logs

πŸ‘‰ no visibility


🧠 Architect Thinking

You don’t ask:

β€œWho needs access?”

You ask:

β€œWhat is the minimum access required, under what conditions, for how long?”

Identity is the new perimeter β€” design it like your primary security control


πŸ” How It Connects

Layer Role
Network Controls traffic
Identity Controls access
Policy Enforces compliance

What Comes Next

Now we move into:

πŸ›‘οΈ Security & Governance (Policy, Defender, Compliance)

Because:

  • Identity controls access
  • Governance controls behavior

β¬… Back to Series Home β¬… Back to: Network Design ➑ Next: Security & Governance ➑