technological Preventive Protect

A.8.2 Privileged Access Rights

M365 Admin Path: Microsoft Entra admin center > Identity governance > Privileged Identity Management

Evidence Source: Microsoft Graph - Directory Roles, PIM

What is this control?

ISO 27001 control A.8.2 Privileged Access Rights ensures that access to privileged roles across Microsoft Entra ID, Microsoft 365, and Azure is strictly controlled through a unified Zero Trust framework. The control implements deny-by-default principles, least privilege, and just-in-time access activation via PIM. All privileged roles are eligible-only with no standing access, require strong MFA re-authentication for activation, include mandatory business justification logging, and are time-bound with automatic expiration.

How to implement in Microsoft 365

Implement A.8.2 by enabling Privileged Identity Management in Microsoft Entra ID for all high-impact roles including Global Administrator, Exchange Admin, and SharePoint Admin. Remove all permanent role assignments and convert users to eligible status requiring activation when needed. Configure activation requirements including MFA, business justification or change ticket, and time limits of 4-8 hours.

Enable approval workflows for critical roles like Global Administrator requiring manager or owner approval before activation. Schedule quarterly or biannual access reviews in PIM with managers periodically re-certifying user role eligibility.

What an auditor looks for

Auditors will verify PIM is enabled for all privileged roles. They will check that privileged roles are eligible only and not permanent. Auditors will review audit logs showing activation history with justification and timestamps.

They will verify Conditional Access policies requiring MFA for all administrators with 100% coverage. Auditors will check access review configuration and evidence of recent review cycles. They will verify audit logs demonstrating role activation includes re-authentication via MFA and time-bound access is enforced with automatic expiration.

M365 capabilities that implement this control

Entra ID CIS Hardening (Identity) Foundation

CIS M365 v6.0.1 Entra ID hardening: guest access, consent, group creation, app registration, PIM approval, device join

Conditional Access - Admins Foundation

Conditional Access policies for administrators (enhanced MFA, risk-based CA, session controls, location restrictions)

Privileged Identity Management Endpoint

Entra ID PIM for just-in-time privileged access, cloud-only accounts, access reviews

Workload Identity Governance Endpoint

Discover, remediate, and govern non-human identities including service principals, managed identities, and workload identity federation

Privileged Access Management Info Gov

Microsoft Purview Privileged Access Management