What approach should you use to establish just-in-time access for virtual machines in Azure while minimizing administrative workload?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Enhance your cybersecurity skills with the Microsoft Security Operations Analyst (SC-200) Exam. Explore topics with multiple choice questions and detailed explanations. Prepare effectively and become a certified Security Operations Analyst!

The correct choice for establishing just-in-time access for virtual machines in Azure while minimizing administrative workload is Azure AD Privileged Identity Management (PIM). PIM is specifically designed to manage, control, and monitor access within Azure Active Directory. It enables the assignment of just-in-time access to roles, thereby reducing administrative overhead by allowing users to activate roles only when necessary instead of granting permanent access. This on-demand access not only minimizes the risk of overexposure but also ensures that roles are only active when needed.

Utilizing Azure PIM assists in automating the approval and notification processes regarding access requests, further alleviating the administrative burden. Additionally, it tracks and logs activities related to role elevations, providing transparency and compliance with security policies. This makes PIM an ideal tool for organizations that require a balance between accessibility for users and security for resources.

In contrast, Azure Policy is primarily used to enforce specific rules and effects on resources in your Azure environment, ensuring compliance with organizational standards, but it does not specifically manage user access to resources. Azure Bastion is a platform service meant for secure and seamless RDP and SSH connectivity to virtual machines directly in the Azure portal, but it does not pertain to access management or just-in-time access. Azure Front

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy