Managed Red Tenant
glueckkanja AG
Managed Red Tenant
glueckkanja AG
Managed Red Tenant
glueckkanja AG
Secure privileged identities and PAWs in isolated cloud tenant, based on Zero Trust and EAM principl
Overview:
Our Managed Red Tenant offering delivers maximum protection for administrative users and their endpoints through an isolated, cloud-native security environment. Designed to prevent lateral movement and privilege escalation, this solution addresses key vulnerabilities exploited by ransomware and advanced persistent threats. Based on Microsoft’s Enterprise Access Model (EAM) and Zero Trust principles, it combines proven blueprints across Workplace, Azure, and Security to provide scalable protection for critical administrative identities.
Administrative users and their devices are prime targets for attackers. In many organizations, users with extensive privileges work on regular endpoints, leaving the door wide open for lateral movement attacks.
With Managed Red Tenant, we establish a secure and scalable environment to separate privileged roles from operational IT and protect administrative endpoints:
-
Fully cloud-based admin infrastructure within Microsoft 365 and Azure
-
Based on Microsoft’s Enterprise Access Model (EAM) and Zero Trust
-
Combines proven blueprints from our Workplace, Azure, and Security practice
-
Includes Privileged Admin Workstations (PAW) and configuration-as-code
-
Managed for full transparency and traceability
-
Built and maintained by our experienced managed services team
Benefits at a glance:
-
Prevents lateral movement and privilege escalation
-
Hardens administrative access using PAWs
-
Aligned with Zero Trust and Microsoft EAM
-
Secure, scalable cloud-based architecture
-
Continuous policy management and improvement via DevOps
-
Full transparency through configuration-as-code
What building blocks we offer our Managed Red Tenant customers:
Lateral Movement Defense
Ransomware attackers aim for administrative access. Our solution isolates critical roles and protects endpoints from being used as launchpads for attacks across the organization.
Privileged Admin Workstation (PAW)
Highly sensitive roles such as Global Administrators receive dedicated hardware and a "Clean Keyboard" approach. This ensures full isolation from regular IT use and maximum control plane protection.
Zero Trust & Enterprise Access Model
All privileged access is aligned with Microsoft’s Enterprise Access Model, strictly segmented by role and security level. Regular endpoints are excluded from admin tasks.
Configuration as Code & DevOps Framework
Our entire Red Tenant setup, including policy definitions, hardened baselines, and access rules, is managed “as code.” This ensures complete traceability of changes and enables continuous improvements through automated pipelines.