AI SecurityCyber Security

Agentic AI Security – Part 2: Threat Modeling

In my previous article, I discussed common threats linked to Agentic AI systems. If you haven’t read it yet, I recommend doing so first, as it provides important context for this post. https://www.rebeladmin.com/securing-agentic-ai-part1-threat-overview/ In this blog post, I’ll be discussing threat modeling for Agentic AI. As I mentioned in my previous post, many of the threats relevant…
Read more

Agentic AI Security – Part 1: Uncovering Hidden Threats

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

AI Security

Agentic AI Security – Part 1: Uncovering Hidden Threats

As we all know, AI is evolving at an incredible pace — sometimes it feels like we barely have time to catch our breath. The old ’10-year tech evolution cycle’ no longer applies; groundbreaking innovations are emerging faster than ever. One of the latest is Agentic AI. In fact, interest in the term ‘Agentic AI’ has skyrocketed, reaching its peak on Google search trends within just…
Read more

Agentic AI Security – Part 2: Threat Modeling

Cyber SecurityMicrosoft Entra IDMicrosoft Technologies

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)

Entra ID Entitlement Management access packages enable administrators to offer a self-service experience for users, granting access to groups, applications, and sites. With access packages, we can automate the processes of access assignment, reviews, and expiration for the aforementioned resources. Previously, I have written detailed blog posts explaining how to set up access packages. You can…
Read more

Agentic AI Security – Part 2: Threat Modeling

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

Cyber SecurityMicrosoft Entra ID

Step-by-Step Guide: Configure Entra ID lifecycle workflow to use Custom Security Attributes

In my previous blog post, I explained how to use Entra ID lifecycle workflow to trigger actions based on user attribute changes. You can find the step-by-step guide here: Configure Entra ID lifecycle workflow to trigger mover task on user profile changes. In that post, I used an attribute assigned to a set of users to define the workflow scope. Now, we can also use Custom Security Attributes…
Read more

Agentic AI Security – Part 2: Threat Modeling

Step-by-Step Guide : Process Entra ID Entitlement Management Access Package on-behalf of another user (preview)