{"id":18362,"date":"2022-08-03T14:21:16","date_gmt":"2022-08-03T13:21:16","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=18362"},"modified":"2022-08-03T14:21:22","modified_gmt":"2022-08-03T13:21:22","slug":"ms365-101-manage-azure-ad-b2b-guest-identities","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/","title":{"rendered":"MS365 101: Manage Azure AD B2B Guest Identities"},"content":{"rendered":"\n<h1 style=\"text-align: justify;\">The use of &#8220;guest&#8221; identities to facilitate collaboration externally<\/h1>\n<h2>\u00a0<\/h2>\n<h2 style=\"text-align: justify;\">The need for collaboration externally entails risks for companies<\/h2>\n<p style=\"text-align: justify;\">Companies have always <strong>needed to collaborate<\/strong> with each other by sharing resources and exchanging data. To do this, their collaborators must be able to <strong>interact securely <\/strong>with users outside their environment.<\/p>\n<p style=\"text-align: justify;\">Several<strong> use cases<\/strong> can be applied, including <strong>time-bound collaboration with partners<\/strong>, external service providers, suppliers or B2B customers.<\/p>\n<p style=\"text-align: justify;\">Additionally, it is common to observe<strong> continuous collaboration between subsidiaries<\/strong> of the same group that have access to the resources and data of the company whilst not necessarily requiring to share the same Information Systems.<\/p>\n<p style=\"text-align: justify;\">Historically, collaboration could be achieved in several ways. However, collaboration also comes with certain disadvantages:<\/p>\n<ul style=\"text-align: justify;\">\n<li>By <strong>successive exchange of emails<\/strong> &#8211; which can be inefficient and can result in a loss of control of the data exchanged;<\/li>\n<li>By <strong>using solutions dedicated<\/strong> to share documents with third parties &#8211; which can be costly and unsuitable from a user experience point of view;<\/li>\n<li>By <strong>creating a new identity in legacy systems<\/strong> (Active Directory, etc.), and by providing third-party entities with a means to access the company&#8217;s IS (VPN, virtual machines, physical machines, etc.) &#8211; which can significantly increase the company&#8217;s attack surface.<\/li>\n<\/ul>\n<h2>\u00a0<\/h2>\n<h2 style=\"text-align: justify;\">Microsoft introduced Azure AD B2B to address the need for collaboration<\/h2>\n<p style=\"text-align: justify;\">Today, using Azure AD B2B allows two or more entities to <strong>collaborate within the host company&#8217;s Azure tenant<\/strong>. \u00a0Shared resources can be apps, documents, SharePoint sites, OneDrive, or Teams teams.<\/p>\n<p style=\"text-align: justify;\">In effect, the Azure B2B solution allows an external user to <strong>access the host company tenant through their regular account by<\/strong> creating a &#8220;guest&#8221; identity within the company&#8217;s Azure Active Directory (AAD).<\/p>\n<p style=\"text-align: justify;\">The &#8220;client&#8221; tenant then fully or partially trusts the &#8220;external&#8221; tenant for authentication via a token exchange mechanism.<\/p>\n<p style=\"text-align: justify;\">There are three native possibilities for creating a &#8220;guest&#8221; identity:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Directly from the <strong>Azure portal<\/strong>;<\/li>\n<li>Via <strong>document sharing<\/strong> on OneDrive\/SharePoint\/Teams;<\/li>\n<li>Through the use of the<strong> GRAPH API.<\/strong><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p><em><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18366 size-full aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1.png\" alt=\"\" width=\"4150\" height=\"2385\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1.png 4150w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1-332x191.png 332w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1-68x39.png 68w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1-120x70.png 120w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1-768x441.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1-1536x883.png 1536w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image1-2048x1177.png 2048w\" sizes=\"auto, (max-width: 4150px) 100vw, 4150px\" \/><\/em><\/p>\n<p style=\"text-align: center;\"><em>Figure 1 &#8211; Native Operation: Authentication and Identity Creation<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">At the level of the host tenant, the owner can choose to authorize the sharing of data to external users while also being able to administer guest accounts (creation, deactivation, deletion etc.).<\/p>\n<p style=\"text-align: justify;\">A direct benefit of this solution is the <strong>ease of use<\/strong> for users who are familiar with Microsoft environments.<\/p>\n<p style=\"text-align: justify;\">The second advantage is the<strong> cost of the solution<\/strong>. A &#8220;guest&#8221; identity has a licensing cost whereby up to a ceiling of 50,000 &#8220;guest&#8221; identities, their license is free. Beyond this and depending on the company&#8217;s subscriptions, a license may cost between \u20ac0.003 and \u20ac0.015 \/ month \/ user, which is then added on to a fixed fee of \u20ac0.029 for each multi-factor authentication attempt. This pricing policy is out of step with the usual price of an M365 license, which is between \u20ac10 and \u20ac50 \/ month \/ user depending on the license plan.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">However, Azure AD B2B has a default configuration that is too open, which creates risks for the company<\/h2>\n<p style=\"text-align: justify;\">Azure AD B2B introduces several factors that can lead to <strong>risk<\/strong>:<\/p>\n<ul style=\"text-align: justify;\">\n<li>The <strong>creation of<\/strong> guest identities is very simple and uncontrolled (no identity manager, no traceability, no restrictions etc.);<\/li>\n<li>The <strong>number of<\/strong> guest identities may increase in an uncontrolled manner, which makes managing their lifecycles difficult.<\/li>\n<li>The company does <strong>not control the security<\/strong> of the initial holder of the &#8220;guest&#8221; identity;<\/li>\n<li>No <strong>conditional access rules<\/strong> are set up by default (no strong authentication, no restriction of access to the Azure A D portal, etc.);<\/li>\n<li>The &#8220;guest&#8221; identity <strong>has access to the Azure AD attributes<\/strong> of other users.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">These factors create risks for the company&#8217;s data since the &#8220;guest&#8221; identity may have rights to a significant number of documents and information about its host owner.<\/p>\n<p style=\"text-align: justify;\">We can consider two triggering events for the different threat scenarios:<\/p>\n<ul style=\"text-align: justify;\">\n<li>A <strong>malicious<\/strong> &#8220;guest&#8221; identity;<\/li>\n<li>A &#8220;guest&#8221; identity <strong>compromised<\/strong> by an attacker.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">An attacker would then have the opportunity to:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Retrieve confidential data <\/strong>that the identity has access to;<\/li>\n<li><strong>Destroy all data<\/strong> accessible by this identity;<\/li>\n<li><strong>Compromise AD<\/strong> by assigning roles to this identity;<\/li>\n<li><strong>Perform social engineering<\/strong> through their access to all user data.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">Depending on the level of maturity of the company and the willingness to hedge risk, it is necessary to implement a number of measures<\/h1>\n<h2>\u00a0<\/h2>\n<h2 style=\"text-align: justify;\">To get started: harden the default configuration<\/h2>\n<h4>\u00a0<\/h4>\n<h4 style=\"text-align: justify;\">Master the means to add &#8220;guest&#8221; identities on the tenant<\/h4>\n<p style=\"text-align: justify;\">The first step is to <strong>cut off access to the Azure portal<\/strong> to non-administrator employees of the company so that it is no longer a vector for creating &#8220;invited&#8221; identities.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18370 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen1.png\" alt=\"\" width=\"1595\" height=\"761\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen1.png 1595w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen1-400x191.png 400w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen1-71x34.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen1-768x366.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen1-1536x733.png 1536w\" sizes=\"auto, (max-width: 1595px) 100vw, 1595px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2 &#8211; Restricting access to the Azure AD console<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">It should be noted that it is also possible <strong>to restrict the population who can invite external users to collaborate<\/strong>. However, this will not be applicable to all companies &#8211; especially those wishing to decentralize the management of this population. The idea of restricting this population forces the creation of a service dedicated to the creation of these identities. This goes against the very principle of this service, which is to leave it in the hands of the user.<\/p>\n<p style=\"text-align: justify;\">Finally, there is a feature to<strong> apply constraints to the email addresses of &#8220;guest&#8221; identities<\/strong>, via white-listing or domain name blacklisting. However, before embarking on this action, it is necessary to consider the complexity of its implementation and the potential low level of associated risk reduction.<\/p>\n<h4>\u00a0<\/h4>\n<h4 style=\"text-align: justify;\">Restrict what these identities can access<\/h4>\n<p style=\"text-align: justify;\">It is also possible <strong>to restrict what can be accessed<\/strong> by the invited identities, so that they are unable to retrieve a large volume of information on the host tenant.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18374 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen3.png\" alt=\"\" width=\"1603\" height=\"647\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen3.png 1603w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen3-437x176.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen3-71x29.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen3-768x310.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen3-1536x620.png 1536w\" sizes=\"auto, (max-width: 1603px) 100vw, 1603px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3 &#8211; Restrict access for &#8220;guest&#8221; identities<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Strengthen authentication and access control of &#8220;guest&#8221; identities<\/h2>\n<p style=\"text-align: justify;\">The <strong>multi-factor authentication (MFA)<\/strong> mechanism for a &#8220;guest&#8221; identity is almost native and reduces the risk of spoofing by an attacker. It is also possible to set up a <strong>conditional access policy<\/strong> that specifically targets these &#8220;guest&#8221; identities.<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18372 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen2.png\" alt=\"\" width=\"1063\" height=\"446\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen2.png 1063w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen2-437x183.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen2-71x30.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Screen2-768x322.png 768w\" sizes=\"auto, (max-width: 1063px) 100vw, 1063px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4 &#8211; Multi-Factor Authentication<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">However, challenges can still complicate this operation and need to be considered:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Managing <strong>change management<\/strong> on these &#8220;guest&#8221; populations remains complex to perform, even if user onboarding operations are simple and carefully guided.<\/li>\n<li>Managing <strong>second-factor reset processes<\/strong> in the event of loss or theft can be costly and complex if left unchecked.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Educate users about risks and best collaboration practices<\/h2>\n<p style=\"text-align: justify;\">The major complexity of the Azure AD B2B solution is <strong>the lack of a mechanism for managing &#8220;guest&#8221; identities<\/strong>. Users are therefore the <strong>main actors<\/strong> of the management strategy and must be informed at the right level by emphasizing:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Collaboration <strong>best practices<\/strong>: when should they use the solution, how to create a guest, and more;<\/li>\n<li><strong>Proper management of their access<\/strong>: they must be removed as soon as possible in order to avoid subsequent illegitimate access;<\/li>\n<li><strong>Disabling identities when they are no longer in use<\/strong>, especially for service providers\/partners, ensuring that the documents produced are not lost.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Protect the data that guests can access<\/h2>\n<p style=\"text-align: justify;\">We must also not forget to protect the data to which a legitimate guest can have access to, which gives rise to several measures:<\/p>\n<ul style=\"text-align: justify;\">\n<li>It is possible to set up constraints for &#8220;guest&#8221; identities via <strong>conditional access rules <\/strong>that include: mandatory use of thin clients (web clients), the prohibition of data downloading, constraints on the terminals to be used, etc.<\/li>\n<li>If the company has deployed the Azure Identity Protection (AIP) classification tool, an alternate solution is to <strong>create a privacy label<\/strong> that encrypts the data for &#8220;guest&#8221; identities. This label can also be used to restrict certain actions for this population: modification restriction (via associated permissions), download restriction (via a DLP rule), etc.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Moving a step further, a <strong>Cloud Access Security Broker<\/strong> (such as Microsoft&#8217;s MS Defender for Cloud Apps) can enable the implementation of advanced and targeted rules, such as preventing uploads to specific Sharepoint spaces as an example.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Managing the Lifecycle of Guest Identities: 3 Scenarios to Consider<\/h2>\n<p style=\"text-align: justify;\">As mentioned earlier, the key topic is <strong>managing the lifecycle of &#8220;guest&#8221; identities<\/strong> i.e., the creation, deletion, and review of access. As such, there are 3 scenarios to be considered. These scenarios depend on the desired <strong>risk coverage<\/strong>, <strong>the level of maturity <\/strong>of identity and access management, and the <strong>cost of implementing<\/strong> the scenario.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18368 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2.png\" alt=\"\" width=\"4457\" height=\"2512\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2.png 4457w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2-339x191.png 339w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2-768x433.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2-1536x866.png 1536w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2-2048x1154.png 2048w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/08\/Image2-800x450.png 800w\" sizes=\"auto, (max-width: 4457px) 100vw, 4457px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5 &#8211; Guest Identity Lifecycle Management Scenarios<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Scenario 1 &#8211; Stay pragmatic on a budget: use native tools and configurations<\/h3>\n<p style=\"text-align: justify;\">In this scenario, the company <strong>creates a certain group typology for \u201cExternal\u201d groups<\/strong>, and therefore to the creation of guests. The distinction can be made by the use of language by the group. For example: all external groups must start with &#8220;X_&#8221;.<\/p>\n<p style=\"text-align: justify;\">It can thus carry out checks more easily on this limited perimeter of groups.<\/p>\n<p style=\"text-align: justify;\">The main prerequisite is <strong>to block the addition of &#8220;guest&#8221; identities to \u201cInternal\u201d groups. <\/strong>This is possible in two ways:<\/p>\n<ul style=\"text-align: justify;\">\n<li>If the company has deployed the AIP classification tool on SharePoint and Teams spaces: a <strong>dedicated label<\/strong> can be used to prevent external sharing on these spaces. For example, the creation of an &#8220;Indull&#8221; label that blocks sharing with &#8220;guest&#8221; identities; \u00a0&#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/sensitivity-labels-teams-groups-sites?view=o365-worldwide\">LINK<\/a><\/li>\n<li><strong>Via a PowerShell script: <\/strong>block sharing with &#8220;guest&#8221; identities for &#8220;Internal&#8221; groups by identifying them via classifications. &#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/solutions\/per-group-guest-access?view=o365-worldwide\">LINK<\/a><\/li>\n<\/ul>\n<h4 style=\"text-align: justify;\">Creating a &#8220;guest&#8221; identity<\/h4>\n<p style=\"text-align: justify;\">The only way to create a &#8220;guest&#8221; identity is to add<strong> them as external users to &#8220;External&#8221; group types.<\/strong><\/p>\n<p style=\"text-align: justify;\">If the company needs to give its tenant access to a subsidiary or an entire entity, it is possible to regularly synchronize their AD or Azure AD, and thus create their identities as a &#8220;guest&#8221; in the tenant of the company.<\/p>\n<h4 style=\"text-align: justify;\">Deleting a &#8220;guest&#8221; identity<\/h4>\n<p style=\"text-align: justify;\">The process of deleting identities is simple through the <strong>deletion of inactive &#8220;guest&#8221; identities. <\/strong>For example, using a PowerShell script based on the frequency of &#8220;Sign-In Activity&#8221;. Alternatively, it is also possible to remove &#8220;guest&#8221; identities that do not have access to any group via a PowerShell script.<\/p>\n<h4 style=\"text-align: justify;\">Review of &#8220;guest&#8221; access<\/h4>\n<p style=\"text-align: justify;\">It is possible <strong>to expire access for &#8220;guest&#8221; identities<\/strong> on SharePoint groups or OneDrives after 60 days. Note that the owner of the SharePoint or OneDrive group will be notified of the expiration 21 days beforehand.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18348 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture7.png\" alt=\"\" width=\"1027\" height=\"372\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture7.png 1027w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture7-437x158.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture7-71x26.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture7-768x278.png 768w\" sizes=\"auto, (max-width: 1027px) 100vw, 1027px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6 &#8211; Guest Access Expiration<\/em><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">Finally, it is possible to use the &#8220;Guest Access Review&#8221; feature for external groups. It should be noted, however, that this feature requires advanced licenses (AAD P2) assigned to the users who carry out the reviews i.e. all the owners of the groups (normally a small number).<\/p>\n<p style=\"text-align: justify;\"><strong>This scenario is an efficient way that reduces guest risk, maintains a near-native solution, and doesn\u2019t require too much investment.<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<h3 style=\"text-align: justify;\">Scenario 2 &#8211; To go further in the level of security: develop a guest management application<\/h3>\n<p style=\"text-align: justify;\">In this second scenario, the company wants to <strong>have complete control over the lifecycle management of &#8220;guest&#8221; identities<\/strong>. To do this, the company <strong>creates an application<\/strong> (for example by using Power App) to manage this lifecycle, making it the single point of creation and deletion.<\/p>\n<p style=\"text-align: justify;\">Once this lifecycle is in place, it is necessary to set the SharePoint sharing setting to &#8220;Existing guest only&#8221; mode, allowing only content to be shared with &#8220;guest&#8221; identities that already exist in the Azure AD tenant. This prevents the creation of new identities through this vector.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18350 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture8.png\" alt=\"\" width=\"1048\" height=\"585\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture8.png 1048w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture8-342x191.png 342w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture8-71x39.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture8-768x429.png 768w\" sizes=\"auto, (max-width: 1048px) 100vw, 1048px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7 &#8211; Restricting Sharing Opportunities<\/em><\/p>\n<h4 style=\"text-align: justify;\">Creating a &#8220;guest&#8221; identity<\/h4>\n<p style=\"text-align: justify;\">In this scenario, users <strong>use the dedicated application to create the &#8220;guest&#8221; identities<\/strong> by entering an end date. The user then designates the owner of the identity created.<\/p>\n<h4 style=\"text-align: justify;\">Deleting an &#8220;invite&#8221; identity<\/h4>\n<p style=\"text-align: justify;\">To delete identities, it is possible <strong>to trigger an automatic workflow<\/strong> before the end date by asking the owner of the identity in question whether to delete it or extend its end date. It should be noted that if the owner has left the company without making the change of ownership, consideration can be given to reassigning the guest to his or her supervisor.<\/p>\n<h4 style=\"text-align: justify;\">Review of &#8220;guest&#8221; access<\/h4>\n<p style=\"text-align: justify;\">With this type of &#8220;in-house&#8221; application, it is complicated to go much further in the management of the lifecycle &#8211; especially when it comes to access review.<\/p>\n<p style=\"text-align: justify;\">It is still possible, as in Scenario 1, to expire guest access or to use the &#8220;Guest Access review&#8221; feature (with the same constraints as stated above).<\/p>\n<p style=\"text-align: justify;\">To go further, we can also consider the use of third-party tools such as IDECSI or Sharegate that make it possible to manage these access journals automatically and intuitively.<\/p>\n<p style=\"text-align: justify;\"><strong>This scenario changes the native behavior and enables better control of the lifecycle, but at a significant blow with regard to the deployment and the management of the change to be implemented.<\/strong><\/p>\n<h3 style=\"text-align: justify;\">Scenario 2&#8242; &#8211; Integrating &#8220;guest&#8221; identities into traditional IAM processes<\/h3>\n<p style=\"text-align: justify;\">The last scenario to consider is a variant of the previous scenario, where the company still wants to have control over the lifecycle management of &#8220;guest&#8221; identities. In this case, the company can<strong> integrate &#8220;guest&#8221; identity management into its identity and access management (IAM) tools<\/strong> in the same way as &#8220;external&#8221; identities.<\/p>\n<p style=\"text-align: justify;\">The IAM tool then becomes the <strong>authoritarian source<\/strong> for this type of population and its management is done directly there.<\/p>\n<p style=\"text-align: justify;\">In this scenario, as in the previous one, you must also set the SharePoint sharing setting to &#8220;Existing guest only&#8221; mode.<\/p>\n<h4 style=\"text-align: justify;\">Creating a &#8220;guest&#8221; identity<\/h4>\n<p style=\"text-align: justify;\">Identities are created on external <strong>creation forms<\/strong> from IAM tools by choosing the &#8220;guest&#8221; type for the identity. The &#8220;guest&#8221; identity can then be provisioned automatically in the Azure AD by IAM tools.<\/p>\n<h4 style=\"text-align: justify;\">Deleting a &#8220;guest&#8221; identity<\/h4>\n<p style=\"text-align: justify;\">The removal of the identity is also <strong>done by the IAM tool<\/strong> according to the positioned end date and the workflows already defined.<\/p>\n<h4 style=\"text-align: justify;\">Reviews of &#8220;guest&#8221; access<\/h4>\n<p style=\"text-align: justify;\">In the event that the company&#8217;s IAM tools are used to manage rights on Sharepoint spaces, it is possible to use the <strong>access review capabilities of these tools<\/strong> to review access to sensitive resources for which &#8220;guest&#8221; identities have access.<\/p>\n<p style=\"text-align: justify;\">Alternatively, a second option is to use access governance features via IAM solutions, such as Sailpoint OneIdentity, or via dedicated Identity and Access Governance solutions, such as Brainwave or Varonis. We can imagine retrieving the rights assigned directly in the Azure AD and having them verified to the owners of the resources through these tools.<\/p>\n<p style=\"text-align: justify;\"><strong>This scenario is a variant of Scenario 2, which allows the most mature companies in identity and access management to capitalize on existing tools and processes.<\/strong><\/p>\n<h2>\u00a0<\/h2>\n<h2 style=\"text-align: justify;\">Finally, do not neglect the surveillance of this exposed population<\/h2>\n<p style=\"text-align: justify;\">It is useful to build a form of <strong>adapted reporting using KPIs and dashboards<\/strong>. A pool of information is available natively in the Azure AD (date of last connection, activity on the tenant as well as on Office 365 via the &#8220;unified audit logs&#8221;). This information can be interacted with via visualization tools, like Power Bi, for the generation of dashboards.<\/p>\n<p style=\"text-align: justify;\">Secondly, it is important to <strong>monitor the activities of these particularly exposed populations<\/strong>. Two levels of detection can be set up depending on monitoring capabilities:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Implement <strong>native DLP rules<\/strong> or <strong>classic alert scenarios<\/strong> in the Microsoft console: some alert scenarios are preconfigured, such as mass deletion of documents, elevation of privilege etc.<\/li>\n<li>Implement<strong> advanced DLP rules<\/strong> and detection scenarios or specific thresholds for guests<strong> with the support of the company&#8217;s SOC<\/strong>. For example, the data download threshold allowed for a guest may be lower than the threshold allowed for an intern.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">We can imagine the use of the <strong>Azure AD Identity Protection<\/strong> module to trigger alerts for guests with a high level of risk.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">In conclusion, AAD B2B greatly facilitates collaboration, but its configuration needs to be hardened to reduce the level of risk induced by the solution<\/h1>\n<p style=\"text-align: justify;\">AAD B2B greatly <strong>simplifies<\/strong> collaboration with users outside the company, but entails risks<strong> related to the default operation<\/strong> of the solution. To control these risks, it is necessary to <strong>reduce <\/strong>the level of open access, and <strong>to control the lifecycle of these identities<\/strong> at a deeper level, depending on the potential level of investment that is planned. Finally, it is necessary to focus on <strong>monitoring<\/strong> via native tools or tools used by the company given the high exposure of these populations.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The use of &#8220;guest&#8221; identities to facilitate collaboration externally \u00a0 The need for collaboration externally entails risks for companies Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must&#8230;<\/p>\n","protected":false},"author":1293,"featured_media":18352,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,3977],"tags":[3359,3679,4098,2827,4099],"coauthors":[2864,4096,4097],"class_list":["post-18362","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-focus","tag-azure-en","tag-azure-ad-en","tag-collaboration-2","tag-identity","tag-o365-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MS365 101: Manage Azure AD B2B Guest Identities - RiskInsight<\/title>\n<meta name=\"description\" content=\"Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must be able to interact securely with users outside their environment. Several use cases can be applied, including time-bound collaboration with partners, external service providers, suppliers or B2B customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MS365 101: Manage Azure AD B2B Guest Identities - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must be able to interact securely with users outside their environment. Several use cases can be applied, including time-bound collaboration with partners, external service providers, suppliers or B2B customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-03T13:21:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-03T13:21:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"808\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jules Haddad, Sebastien Corradini, Valentin Picard\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jules Haddad, Sebastien Corradini, Valentin Picard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/\"},\"author\":{\"name\":\"Jules Haddad\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/79fa33a34533fef878e5a74fbce6f961\"},\"headline\":\"MS365 101: Manage Azure AD B2B Guest Identities\",\"datePublished\":\"2022-08-03T13:21:16+00:00\",\"dateModified\":\"2022-08-03T13:21:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/\"},\"wordCount\":2667,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg\",\"keywords\":[\"Azure\",\"Azure AD\",\"Collaboration\",\"identity\",\"O365\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/\",\"name\":\"MS365 101: Manage Azure AD B2B Guest Identities - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg\",\"datePublished\":\"2022-08-03T13:21:16+00:00\",\"dateModified\":\"2022-08-03T13:21:22+00:00\",\"description\":\"Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must be able to interact securely with users outside their environment. Several use cases can be applied, including time-bound collaboration with partners, external service providers, suppliers or B2B customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg\",\"width\":808,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MS365 101: Manage Azure AD B2B Guest Identities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/79fa33a34533fef878e5a74fbce6f961\",\"name\":\"Jules Haddad\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/jules-haddad\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MS365 101: Manage Azure AD B2B Guest Identities - RiskInsight","description":"Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must be able to interact securely with users outside their environment. Several use cases can be applied, including time-bound collaboration with partners, external service providers, suppliers or B2B customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/","og_locale":"en_US","og_type":"article","og_title":"MS365 101: Manage Azure AD B2B Guest Identities - RiskInsight","og_description":"Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must be able to interact securely with users outside their environment. Several use cases can be applied, including time-bound collaboration with partners, external service providers, suppliers or B2B customers.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/","og_site_name":"RiskInsight","article_published_time":"2022-08-03T13:21:16+00:00","article_modified_time":"2022-08-03T13:21:22+00:00","og_image":[{"width":808,"height":540,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg","type":"image\/jpeg"}],"author":"Jules Haddad, Sebastien Corradini, Valentin Picard","twitter_misc":{"Written by":"Jules Haddad, Sebastien Corradini, Valentin Picard","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/"},"author":{"name":"Jules Haddad","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/79fa33a34533fef878e5a74fbce6f961"},"headline":"MS365 101: Manage Azure AD B2B Guest Identities","datePublished":"2022-08-03T13:21:16+00:00","dateModified":"2022-08-03T13:21:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/"},"wordCount":2667,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg","keywords":["Azure","Azure AD","Collaboration","identity","O365"],"articleSection":["Cloud &amp; Next-Gen IT Security","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/","name":"MS365 101: Manage Azure AD B2B Guest Identities - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg","datePublished":"2022-08-03T13:21:16+00:00","dateModified":"2022-08-03T13:21:22+00:00","description":"Companies have always needed to collaborate with each other by sharing resources and exchanging data. To do this, their collaborators must be able to interact securely with users outside their environment. Several use cases can be applied, including time-bound collaboration with partners, external service providers, suppliers or B2B customers.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2022\/07\/Picture1.jpg","width":808,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2022\/08\/ms365-101-manage-azure-ad-b2b-guest-identities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"MS365 101: Manage Azure AD B2B Guest Identities"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/79fa33a34533fef878e5a74fbce6f961","name":"Jules Haddad","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/jules-haddad\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/18362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1293"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=18362"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/18362\/revisions"}],"predecessor-version":[{"id":18376,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/18362\/revisions\/18376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/18352"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=18362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=18362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=18362"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=18362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}