This curriculum spans the equivalent of a multi-workshop technical engagement, covering the design, implementation, and operationalization of identity management across hybrid and cloud environments, comparable to the scope of an internal capability build for large-scale cloud migration.
Module 1: Assessing On-Premises Identity Infrastructure for Cloud Readiness
- Inventory and classify existing identity stores (e.g., Active Directory, LDAP, HRIS) to determine synchronization requirements and data ownership.
- Evaluate legacy application dependencies on NTLM or Kerberos to identify authentication protocol compatibility issues with cloud services.
- Map identity attributes across systems to resolve schema mismatches between on-premises directories and cloud identity providers.
- Assess the maturity of identity lifecycle processes (joiner-mover-leaver) to determine automation feasibility in the cloud.
- Identify privileged accounts with static credentials in on-prem systems that require immediate remediation before migration.
- Conduct access certification reviews on legacy roles to eliminate orphaned or over-provisioned accounts prior to migration.
Module 2: Designing Hybrid Identity Architecture
- Select between password hash sync, pass-through authentication, and federation based on single sign-on requirements and on-premises connectivity constraints.
- Deploy and configure Azure AD Connect with filtering rules to exclude test or service accounts from synchronization.
- Implement certificate-based authentication for federation servers to prevent token-signing key exposure in shared environments.
- Configure DNS and SSL bindings for AD FS proxies to ensure secure external access without exposing internal infrastructure.
- Plan for high availability of synchronization agents across multiple servers to prevent identity outages during migration.
- Integrate identity resolution logic to handle duplicate user objects arising from mergers or multi-forest environments.
Module 3: Implementing Cloud Identity Governance
- Define role-based access control (RBAC) hierarchies in Azure AD or AWS IAM that mirror organizational reporting lines and segregation of duties.
- Configure access reviews for cloud applications with quarterly recertification cycles and escalation paths for non-response.
- Deploy entitlement management workflows to enforce approval chains for high-risk application access requests.
- Implement dynamic group membership rules based on attributes (department, cost center, employment type) to automate group provisioning.
- Integrate identity governance tools with ticketing systems (e.g., ServiceNow) to align access requests with change management processes.
- Set up audit alerts for governance violations, such as users assigned to multiple privileged roles or access requests from unmanaged devices.
Module 4: Securing Cloud Authentication and Access
- Enforce conditional access policies requiring MFA for administrative roles and external collaboration scenarios.
- Configure named location policies to restrict access from high-risk geographies or untrusted IP ranges.
- Implement device compliance policies requiring Intune enrollment before granting access to sensitive applications.
- Disable legacy authentication protocols (e.g., IMAP, SMTP) and monitor for fallback attempts in sign-in logs.
- Deploy risk-based conditional access using identity protection signals to block or require step-up authentication for suspicious logins.
- Rotate and manage service principal secrets and certificates using automated rotation schedules and least privilege permissions.
Module 5: Migrating and Managing Application Access
- Register legacy on-prem applications in the cloud identity provider using application proxies with preauthentication and URL translation.
- Convert static application roles to cloud-native app roles in Azure AD or AWS SSO to enable centralized access governance.
- Migrate SAML 1.1-based applications to SAML 2.0 or OIDC to ensure compatibility with modern identity providers.
- Implement just-in-time access for third-party SaaS applications using automated provisioning via SCIM.
- Map external identity providers (e.g., partner ADFS) to B2B collaboration directories with attribute filtering and access restrictions.
- Monitor application sign-in failures to detect misconfigured reply URLs or certificate expiration in federated apps.
Module 6: Operationalizing Identity Monitoring and Incident Response
- Configure SIEM integration to forward identity logs (sign-ins, directory audits) with parsing rules for anomaly detection.
- Establish baseline sign-in patterns by user, location, and device to detect deviations indicating compromised accounts.
- Define automated response playbooks for high-risk events, such as disabling user accounts after multiple failed MFA attempts.
- Conduct quarterly access log reviews to validate conditional access policy effectiveness and identify policy gaps.
- Implement role-templated alerting for changes to highly privileged groups (e.g., Global Administrators, Enterprise Admins).
- Perform forensic analysis on sign-in logs using IP geolocation and device fingerprinting after suspected credential theft.
Module 7: Ensuring Compliance and Audit Readiness
- Map identity controls to regulatory frameworks (e.g., GDPR, HIPAA, SOX) to document compliance evidence for auditors.
- Enable audit log retention policies that meet legal hold requirements without exceeding storage cost thresholds.
- Generate access certification reports showing reviewer names, dates, and justification comments for access approvals.
- Restrict administrative access to audit logs using PIM and just-in-time elevation to prevent tampering.
- Validate that all privileged role assignments are justified and documented in access governance systems.
- Coordinate with internal audit to conduct penetration testing of identity workflows, including MFA bypass and token replay scenarios.
Module 8: Scaling and Optimizing Identity Operations
- Automate user provisioning workflows using PowerShell or Graph API to reduce manual errors in bulk onboarding.
- Implement self-service password reset with multiple authentication methods while maintaining security for high-risk users.
- Optimize synchronization performance by adjusting delta sync intervals and filtering out unused OUs or attributes.
- Consolidate identity data sources to reduce synchronization complexity and improve data accuracy across hybrid environments.
- Establish SLAs for identity ticket resolution and track performance against operational KPIs (e.g., mean time to provision).
- Conduct capacity planning for identity services to handle peak loads during mergers, acquisitions, or large-scale migrations.