Why Privileged Access Needs Extra Protection
Administrator accounts are the highest-value targets for attackers. If compromised, they can control entire subscriptions or tenants.
Traditional practice often gave admins standing (permanent) access, which creates risk even when not in use.
Privileged Identity Management (PIM) in Entra ID reduces this risk by granting elevated permissions only when needed and for a limited duration.
Core Features of PIM
-
Just-in-Time (JIT) Access
-
Admin roles are not permanent.
-
A user must “activate” the role when they need it.
-
Access expires automatically after a set duration.
-
Approval Workflows
-
Role activation may require approval from a designated manager or security officer.
-
Multi-Factor Authentication (MFA)
-
PIM can enforce MFA at activation time, adding another security layer.
-
Access Reviews
-
Regularly check if users still need certain roles.
-
Prevents role creep (users collecting roles they no longer need).
-
Audit and Alerts
-
Every role activation is logged.
-
Alerts for suspicious or excessive use of admin rights.
Example Workflow
-
A cloud engineer needs to make a change to a production VNet.
-
Normally, they have only a Reader role.
-
When required, they request activation of Network Contributor role via PIM.
-
Their manager approves the request.
-
Engineer completes the task, role expires after 2 hours.
-
An audit trail records the event.
Confusion Buster
-
PIM vs RBAC:
-
RBAC = defines who can have what role.
-
PIM = manages when and how those roles are used.
-
-
PIM vs Conditional Access:
-
CA = controls access to resources based on conditions.
-
PIM = controls administrative role usage.
-
Example Exam Scenario
A company wants to:
-
Minimize standing admin privileges.
-
Ensure high-level approvals before critical changes.
-
Maintain a full audit trail of elevated access.
Correct design: Enable PIM with JIT access and approval workflows.
Exam Tips
-
“Temporary elevation of admin privileges” → PIM with JIT.
-
“Ensure approvals before role activation” → PIM workflows.
-
“Review admin access regularly” → Access Reviews in PIM.
-
“Enforce MFA for privileged role usage” → PIM requirement.
What to Expect in the Exam
-
Direct Q: “Which Entra ID feature provides just-in-time access for admin roles?” → PIM.
-
Scenario Q: “Company wants to reduce risk by minimizing permanent admin accounts.” → PIM.
-
Trick Q: “PIM and RBAC are the same.” → False (RBAC defines, PIM manages usage).