One Step Beyond Enables Organizations to Implement Microsoft Solutions
One Step Beyond enables organizations to deploy a comprehensive Global Secure Access (GSA) Proof of Value, combining Microsoft Entra Internet Access and Microsoft Entra Private Access solutions for a secure, identity-centric access to both internet and private network resources, while adhering to Zero Trust principles – realizing the benefits of a “secure access for any identity, from anywhere, to any app, AI, or resource”.
Outcomes
- Enhanced security: Comprehensive protection of users and resources, built on the Zero Trust model.
- Optimal performance: Reduced latency for critical services like Microsoft 365.
- Simplified management: Unified management of connectivity and security tools.
- Infrastructure modernization: Replacement of legacy VPN and Proxy.
- Cost reduction: Consolidating multiple services saves on security and access management expenses.
- Improved user experience: Eliminates complexities associated with traditional VPNs.
Timeline
Assessment and Planning – 1 week
Understand the current architecture and define the objectives for a successful Global Secure Access Proof of Value.
Key Activities:
- IAM analysis (Microsoft 365 access, identities, usage, devices, Conditional Access).
- Network environment analysis (network, segmentation, external/internal access).
- Web filtering and security policy assessment.
- Stakeholder meetings to align on security, compliance, and access requirements.
Outputs:
- Microsoft 365 Access Design document.
- Internet Access Design document.
- Private Access Design document.
Configuration and Implementation – 2 weeks
Deployment of Global Secure Access (GSA) solutions for private and internet access.
Key Activities:
- Web Content Filtering: enabling internet traffic forwarding, creating security policies.
- Microsoft Traffic Profile Configuration for Exchange Online, SharePoint, OneDrive.
- Private Access Configuration: setting up connectors, per-app access, PIM integration.
- Kerberos Authentication (SSO).
Outputs:
- Internet Access Implementation document.
- Private Access Implementation document.
Testing and Validation – 2 weeks
Validation of security policies, user access integrity, and system performance.
Key Activities:
- Web Content Filtering Testing.
- Microsoft and Internet Traffic Profile Testing.
- GSA Private Access Testing.
- Secure Access Testing via Conditional Access & PIM.
- SSO and DNS Testing.
Outputs:
Documentation and Final Approval – 1 week
Finalization of documentation and final validation.
Key Activities:
- Configuration documentation: GSA, Internet Access, and Private Access configurations.
- Test and performance results.
- Stakeholder review and validation of documentation.
Outputs:
- Final documentation.
- Administrator and user guides.
- Approval sign-off and transition to operational support.
Customer Commitment
To ensure project success, the customer’s commitment is required in several key areas:
- Defining clear objectives and success metrics.
- Ensuring availability of resources and key stakeholders throughout the project.
- Providing necessary access to systems, infrastructure, and personnel.
- Adhering to change management processes for a smooth deployment.
- Committing to ongoing support and feedback.