Which users should have access to which resources?
What are those users doing with that access?
Is there effective organizational control for managing access?
Can auditors verify that the controls are working?
Planning your access reviews deployment is essential to make sure you achieve your desired governance strategy for users in your organization.
Key benefits
The key benefits of enabling access reviews are:
Control collaboration: Access reviews allow you to manage access to all the resources your users need. When users share and collaborate, you can be assured that the information is among authorized users only.
Manage risk: Access reviews provide you with a way to review access to data and applications, which lowers the risk of data leakage and data spill. You gain the capability to regularly review external partners' access to corporate resources.
Address compliance and governance: With access reviews, you can govern and recertify the access lifecycle to groups, apps, and sites. You can control and track reviews for compliance or risk-sensitive applications specific to your organization.
Reduce cost: Access reviews are built in the cloud and natively work with cloud resources such as groups, applications, and access packages. Using access reviews is less costly than building your own tools or otherwise upgrading your on-premises tool set.
Training resources
The following videos help you learn about access reviews:
This feature requires Microsoft Entra ID Governance or Microsoft Entra Suite subscriptions, for your organization's users. Some capabilities, within this feature, may operate with a Microsoft Entra ID P2 subscription. For more information, see the articles of each capability for more details. To find the right license for your requirements, see Microsoft Entra ID Governance licensing fundamentals.
Note
To create a review of inactive users and with user-to-group affiliation recommendations requires a Microsoft Entra ID Governance license.
Plan the access reviews deployment project
Consider your organizational needs to determine the strategy for deploying access reviews in your environment.
Engage the right stakeholders
When technology projects fail, they typically do so because of mismatched expectations on impact, outcomes, and responsibilities. To avoid these pitfalls, ensure that you're engaging the right stakeholders and that project roles are clear.
For access reviews, you'll likely include representatives from the following teams within your organization:
IT administration manages your IT infrastructure and administers your cloud investments and software as a service (SaaS) apps. This team:
Reviews privileged access to infrastructure and apps, including Microsoft 365 and Microsoft Entra ID.
Schedules and runs access reviews on groups that are used to maintain exception lists or IT pilot projects to maintain up-to-date access lists.
Ensures that programmatic (scripted) access to resources through service principals is governed and reviewed.
Automate processes like user onboarding and offboarding, access requests, and access certifications.
Security teams ensure the plan meets the security requirements of your organization and enforces Zero Trust. This team:
Reduces risk and strengthens security
Enforces least privilege access to resources and applications
Uses tools to see a centralized authoritative source, of who has access to what, and for how long.
Development teams build and maintain applications for your organization. This team:
Controls who can access and manage components in SaaS, platform as a service (PaaS), and infrastructure as a service (IaaS) resources that comprise the developed solutions.
Manages groups that can access applications and tools for internal application development.
Requires privileged identities that have access to production software or solutions that are hosted for your customers.
Business units manage projects and own applications. This team:
Reviews and approves or denies access to groups and applications for internal and external users.
Schedules and does reviews to attest continued access for employees and external identities such as business partners.
Need employees to have access to the apps required for their work.
Permits departments to manage access for their users.
Corporate governance ensures that the organization follows internal policy and complies with regulations. This team:
Requests or schedules new access reviews.
Assesses processes and procedures for reviewing access, which includes documentation and record keeping for compliance.
Reviews results of past reviews for most critical resources.
Validates the right controls are in place to meet mandatory security and privacy policies.
Requires repeatable access processes that are easy to audit and report.
Note
For reviews that require manual evaluations, plan for adequate reviewers and review cycles that meet your policy and compliance needs. If review cycles are too frequent, or there are too few reviewers, quality might be lost and too many or too few people might have access. We recommend you establish clear responsibilities for the various stakeholders and departments engaged in the access reviews. All teams and individuals participating should understand their respective roles and obligations to uphold the principle of least privilege.
Plan communications
Communication is critical to the success of any new business process. Proactively communicate to users how and when their experience will change. Tell them how to gain support if they experience issues.
Communicate changes in accountability
Access reviews support shifting responsibility of reviewing and acting on continued access to business owners. Decoupling access decisions from the IT department drives more accurate access decisions. This shift is a cultural change in the resource owner's accountability and responsibility. Proactively communicate this change and ensure resource owners are trained and able to use the insights to make good decisions.
The IT department wants to stay in control for all infrastructure-related access decisions and privileged role assignments.
Customize email communication
When you schedule a review, you nominate users who do this review. These reviewers then receive an email notification of new reviews assigned to them and reminders before a review assigned to them expires.
The email sent to reviewers can be customized to include a short message that encourages them to act on the review. Use the extra text to:
Include a personal message to reviewers so they understand it's sent by your compliance or IT department.
Include a reference to internal information on what the expectations of the review are and extra reference or training material.
After you select Start review, reviewers will be directed to the My Access portal for group and application access reviews. The portal gives them an overview of all users who have access to the resource they're reviewing and system recommendations based on last sign-in and access information.
Plan a pilot
We encourage customers to initially pilot access reviews with a small group and target noncritical resources. Piloting can help you adjust processes and communications as needed. It can help you increase users' and reviewers' ability to meet security and compliance requirements.
In your pilot, we recommend that you:
Start with reviews where the results aren't automatically applied, and you can control the implications.
Ensure all users have valid email addresses listed in Microsoft Entra ID. Confirm that they receive email communication to take the appropriate action.
Document any access removed as a part of the pilot in case you need to quickly restore it.
Monitor audit logs to ensure all events are properly audited.
The administrative role required to create, manage, or read an access review depends on the type of resource whose membership is being reviewed. The following table denotes the roles required for each resource type.
Resource type
Create and manage access reviews (creators)
Read access review results
Group or application
Global Administrator
User Administrator
Identity Governance Administrator
Privileged Role Administrator (only does reviews for Microsoft Entra role-assignable groups)
The creator of the access review decides at the time of creation who will do the review. This setting can't be changed after the review is started. Reviewers are represented by:
Resource owners who are the business owners of the resource.
Individually selected delegates as chosen by the access reviews administrator.
Users who self-attest to their need for continued access.
Managers review their direct reports' access to the resource.
Note
When you select Resource owners or Managers, administrators designate fallback reviewers, who are contacted if the primary contact isn’t available.
When you create an access review, administrators can choose one or more reviewers. All reviewers can start and carry out a review by choosing users for continued access to a resource or removing them.
Components of an access review
Before you implement your access reviews, plan the types of reviews relevant to your organization. To do so, you need to make business decisions about what you want to review and the actions to take based on those reviews.
To create an access review policy, you must have the following information:
What are the resources to review?
Whose access is being reviewed?
How often should the review occur?
Who will do the review?
How will they be notified to review?
What are the timelines to be enforced for review?
What automatic actions should be enforced based on the review?
What happens if the reviewer doesn't respond in time?
What manual actions are taken as a result based on the review?
What communications should be sent based on the actions taken?
Example access review plan
Component
Value
Resources to review
Access to Microsoft Dynamics.
Review frequency
Monthly.
Who does the review
Dynamics business group Program Managers.
Notification
Email is sent at the start of a review to the alias Dynamics-Pms.
Include an encouraging custom message to reviewers to secure their buy-in.
Timeline
48 hours from notification.
Automatic actions
Remove access from any account that has no interactive sign-in within 90 days by removing the user from the Security group dynamics-access.
Perform actions if not reviewed within timeline.
Manual actions
Reviewers can do removals approval prior to automated action if desired.
Automate actions based on access reviews
You can choose to have access removal automated by setting the Auto apply results to resource option to Enable.
After the review is finished and has ended, users who weren't approved by the reviewer will be automatically removed from the resource or kept with continued access. Options could mean removing their group membership or their application assignment or revoking their right to elevate to a privileged role.
Take recommendations
Recommendations are displayed to reviewers as part of the reviewer experience and indicate a person's last sign-in to the tenant or last access to an application. This information helps reviewers make the right access decision. Selecting Take recommendations follows the access review's recommendations. At the end of an access review, the system applies these recommendations automatically to users for whom reviewers haven't responded.
Recommendations are based on the criteria in the access review. For example, if you configure the review to remove access with no interactive sign-in for 90 days, the recommendation is that all users who fit that criteria should be removed. Microsoft is continually working on enhancing recommendations.
Review guest user access
Use access reviews to review and clean up collaboration partners' identities from external organizations. Configuration of a per-partner review might satisfy compliance requirements.
External identities can be granted access to company resources. They can be:
Added to a group.
Invited to Teams.
Assigned to an enterprise application or access package.
Assigned a privileged role in Microsoft Entra ID or in an Azure subscription.
For more information, see sample script. The script shows where external identities invited into the tenant are used. You can see an external user's group membership, role assignments, and application assignments in Microsoft Entra ID. The script won't show any assignments outside of Microsoft Entra ID, for example, direct rights assignment to SharePoint resources, without the use of groups.
When you create an access review for groups or applications, you can choose to let the reviewer focus on All users or Guest users only. By selecting Guest users only, reviewers are given a focused list of external identities from Microsoft Entra business to business (B2B) that have access to the resource.
Important
This list won't include external members who have a userType of member. This list also won't include users invited outside of Microsoft Entra B2B collaboration. An example is those users who have access to shared content directly through SharePoint.
Plan access reviews for access packages
Access packages can vastly simplify your governance and access review strategy. An access package is a bundle of all the resources with the access a user needs to work on a project or do their task. For example, you might want to create an access package that includes all the applications that developers in your organization need, or all applications to which external users should have access. An administrator or delegated access package manager then groups the resources (groups or apps) and the roles the users need for those resources.
When you create an access package, you can create one or more access package policies that set conditions for which users can request an access package, what the approval process looks like, and how often a person would have to re-request access or have their access reviewed. Access reviews are configured while you create or edit those access package policies.
Select the Lifecycle tab and scroll down to access reviews.
Plan access reviews for groups
Besides access packages, reviewing group membership is the most effective way of governing access. Assign access to resources via Security groups or Microsoft 365 groups. Add users to those groups to gain access.
A single group can be granted access to all appropriate resources. You can assign the group access to individual resources or to an access package that groups applications and other resources. With this method, you can review access to the group rather than an individual's access to each application.
Group membership can be reviewed by:
Administrators.
Group owners.
Selected users who are delegated review capability when the review is created.
Members of the group who attest for themselves.
Managers who review their direct reports' access.
Group ownership
Group owners review membership because they're best qualified to know who needs access. Ownership of groups differs with the type of group:
Groups that are created in Microsoft 365 and Microsoft Entra ID have one or more well-defined owners. In most cases, these owners make perfect reviewers for their own groups as they know who should have access.
For example, Microsoft Teams uses Microsoft 365 Groups as the underlying authorization model to grant users access to resources that are in SharePoint, Exchange, OneNote, or other Microsoft 365 services. The creator of the team automatically becomes an owner and should be responsible for attesting to the membership of that group.
Groups created manually in the Microsoft Entra admin center or via scripting through Microsoft Graph might not necessarily have owners defined. Define them either through the Microsoft Entra admin center in the group's Owners section or via Microsoft Graph.
Groups that are synchronized from on-premises Active Directory can't have an owner in Microsoft Entra ID. When you create an access review for them, select individuals who are best suited to decide on membership in them.
Note
Define business policies that define how groups are created to ensure clear group ownership and accountability for regular review of membership.
Review membership of exclusion groups in Conditional Access policies
Access reviews can't change the membership of groups that you synchronize from on-premises AD with Microsoft Entra Connect. This restriction is because the source of authority for a group originating in AD is on-premises AD. To control access to AD group-based apps, use Microsoft Entra Cloud Sync group writeback.
Until you have migrated to Microsoft Entra groups with group writeback, you can still use access reviews to schedule and maintain regular reviews of existing on-premises groups. In this case, admins will then take action in the on-premises group after each review completes. This strategy keeps access reviews as the tool for all reviews.
You can use the results from an access review on on-premises groups and process them further, either by:
Downloading the CSV report from the access review and manually taking action.
For example, to retrieve results for a Windows Server AD-managed group, use this PowerShell sample script. The script outlines the required Microsoft Graph calls and exports the Windows Server AD PowerShell commands to carry out the changes.
Plan access reviews for applications
When you review everyone assigned to application, you're reviewing the users, including employees and external identities, who can authenticate to that application using their Microsoft Entra identity. Choose to review an application when you need to know who has access to a specific application, instead of an access package or a group.
Plan reviews for applications in the following scenarios when:
Users are granted direct access to the application (outside of a group or access package).
The application exposes critical or sensitive information.
The application has specific compliance requirements to which you must attest.
You suspect inappropriate access.
Before you create access reviews for an application, the application needs to be integrated with Microsoft Entra ID as an application in your tenant, with users assigned to the app roles, and the User assignment required? option on the application set to Yes. If it's set to No, all users in your directory, including external identities, can access the application and you can't review access to the application.
Access reviews can be for the members of a group or for users who were assigned to an application. Applications in Microsoft Entra ID don't necessarily have an owner, which is why the option for selecting the application owner as a reviewer isn't possible. You can further scope a review to review only guest users assigned to the application, rather than reviewing all access.
Plan review of Microsoft Entra ID and Azure resource roles
Privileged Identity Management simplifies how enterprises manage privileged access to resources in Microsoft Entra ID. Using PIM keeps the list of privileged roles in Microsoft Entra ID and Azure resources smaller. It also increases the overall security of the directory.
Access reviews allow reviewers to attest whether users still need to be in a role. Just like access reviews for access packages, reviews for Microsoft Entra roles and Azure resources are integrated into the PIM admin user experience.
Review the following role assignments regularly:
Global Administrator
User Administrator
Privileged Authentication Administrator
Conditional Access Administrator
Security Administrator
All Microsoft 365 and Dynamics Service administration roles
Roles that are reviewed include permanent and eligible assignments.
In the Reviewers section, select one or more people to review all the users. Or you can select Manager, to have a manager review the access of people they manage, or Members (self) to have the members review their own access.
Deploy access reviews
After you've prepared a strategy and a plan to review access for resources integrated with Microsoft Entra ID, deploy and manage reviews by using the following resources.
Review access packages
To reduce the risk of stale access, administrators can enable periodic reviews of users who have active assignments to an access package. Follow the instructions in the articles listed in the table.
Users who self-review and say they no longer need access aren't removed from the access package immediately. They're removed from the access package when the review ends or if an administrator stops the review.
Review groups and apps
Access needs to groups and applications for employees and guests likely change over time. To reduce the risk associated with stale access assignments, administrators can create access reviews for group members or application access. Follow the instructions in the articles listed in the table.
To interact with and manage reviewable resources, see Microsoft Graph API methods and role and application permission authorization checks. The access reviews methods in the Microsoft Graph API are available for both application and user contexts. When you run scripts in the application context, the account used to run the API (the service principle) must be granted the AccessReview.Read.All permission to query access reviews information.
Popular access reviews tasks to automate by using the Microsoft Graph API for access reviews are:
Create and start an access review.
Manually end an access review before its scheduled end.
List all running access reviews and their status.
See the history of a review series and the decisions and actions taken in each review.
Collect decisions from an access review.
Collect decisions from completed reviews where the reviewer made a different decision than what the system recommended.
When you create new Microsoft Graph API queries for automation, use Graph Explorer to build and explore your Microsoft Graph queries before you put them into scripts and code. This step can help you to quickly iterate your query so that you get exactly the results you're looking for, without changing the code of your script.
Monitor access reviews
Access reviews activities are recorded and available from the Microsoft Entra audit logs. You can filter the audit data on the category, activity type, and date range. Here's a sample query.
Once identity is deployed, proper governance using access reviews is necessary for a secure solution. Explore how to plan for and implement access reviews.
Using access reviews, you can control group membership and application access to meet governance, risk management, and compliance initiatives in your organization.
Planning for a successful access reviews campaign for a particular application starts with understanding how to model access for that application in Microsoft Entra ID.