Reading Time: 7 minutes5 Introduction I’ve been working with a customer recently assisting with sorting out their privileged access and assisting them with their adoption of PIM (Privileged Identity Manager) Whilst I’d argue that PIM is not essential to secure you access to Entra, it is, in my view good practice and reduces the attack surface. You can use […]
Continue reading