Cloud services pose new challenges. Traditionally, users do the following:

  • Only access the organization's resources inside the organization's network perimeter
  • Only access the organization's services, which are hosted on the organization's hardware

With cloud services, enterprise mobility, bring-your-own-device objectives, and the consumerization of IT, all that has changed.  Users are accessing a variety of services from a multitude of vendors from both company-owned and personal devices. Identity is the new security perimeter for companies since it is the ultimate key to access.

From a cloud service perspective, identity defines who users are, what permissions they have, and what they can do with these permissions. With that, ...

Get Microsoft 365 Certified Fundamentals MS-900 Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.