Entra.News - Your weekly dose of Microsoft Entra
Entra.Chat
The New Control Plane for Microsoft Entra Tenant Governance
0:00
-49:13

The New Control Plane for Microsoft Entra Tenant Governance

Inside Microsoft's Tenant Governance: What Every Entra Admin Needs to Know

Microsoft had 7 million internal tenants and almost lost control of their environment and your org might be facing the same problem at a smaller scale. In this episode, we sit down with Jeff Staiman, PM Area Lead for Tenant Governance at Microsoft, to break down the feature born from the Midnight Blizzard attack. We cover discovery, drift detection, governance relationships, secure tenant creation, licensing, and exactly where admins should start.


What Can Your AI Applications Access?

Organizations are investing heavily in AI-powered applications and agents, but many are discovering they lack the operational visibility and governance discipline needed to scale AI confidently and securely.

With continuous visibility into Entra ID applications, permissions, OAuth access, secrets, certificates, and application ownership, ENow App Governance Accelerator can:

  • Reduce uncertainty around what SaaS apps can access

  • Accelerate application reviews and approval processes

  • Strengthen operational trust across security and leadership teams

  • Prevent unmanaged application growth from becoming operational risk

  • Enable lean IT teams to support AI expansion at scale

  • Demonstrate governance maturity required for enterprise AI adoption

Request a Demo + Free Trial


While most admins focus on securing their primary production environment, many organizations are sitting on hundreds of “test” or “shadow” tenants that were created by users with a simple Azure subscription. These unmanaged environments often lack proper security bars and can become entry points for sophisticated attackers.

The Wake-Up Call: Midnight Blizzard

The urgency for these new features was fueled by the 2024 Midnight Blizzard attack. In that instance, attackers compromised a legacy test tenant and used its old access rights to move laterally into Microsoft’s core environment. This highlighted a critical gap: securing one tenant isn’t enough if you don’t even know how many other tenants are connected to your organization.

Three Things You’ll Learn in This Episode:

  1. Automatic Discovery of the “Unknown”: Jeff explains how the Related Tenants feature uses signals like B2B sign-in logs, multi-tenant app consents, and billing relationships to automatically find every tenant connected to your corporate identity.

  2. Configuration Drift Monitoring: You can now define a “Golden Configuration” for your tenants. The service monitors over 200 resource types across Entra, Intune, Teams, and Exchange every six hours, alerting you the moment a security setting is weakened.

  3. The “Three-Step” Handshake: To prevent accidental or malicious takeovers, Microsoft has implemented a rigorous trust process. If two tenants don’t share a billing relationship, the governed tenant must explicitly invite the governing tenant before any control can be established.

A New Approach to Licensing

Something many admins will find surprising is the licensing model. Unlike many Entra features that require a license for every user, Tenant Governance is licensed based on the number of admins interacting with the features. This makes it far more accessible for organizations trying to secure a massive multi-tenant estate without a massive budget.

Why you should listen: Jeff dives deep into how Microsoft managed its own 7 million internal tenants and shares the roadmap for future discovery signals, including using Global Secure Access network telemetry to find tenants being accessed from corporate devices.

Whether you are managing a merger or just trying to clean up years of “test” environments, this episode provides the blueprint for moving from manual, one-tenant-at-a-time management to a deterministic, automated security posture.

Subscribe with your favorite podcast player or watch on YouTube 👇


About Jeff Staiman

Jeff Stammen is the PM Area Lead for Tenant Governance within the Identity and Access Management (IAM) team at Microsoft. A true company veteran of 31 years, Jeff originally joined Microsoft managing engineering compensation and famously architected Microsoft's core engineering leveling framework (Levels 59–61) directly from requirements delivered by Steve Ballmer. Today, he leads engineering and product efforts to secure multi-tenant cloud ecosystems at massive scale.

LinkedIn - https://www.linkedin.com/in/jeffstaiman/


🔗 Related Links


📗 Chapters

00:00 Intro

00:18 Introducing Jeff Stammen

00:41 Jeff’s 31-Year Journey at Microsoft

01:25 The Midnight Blizzard Hack That Started It All

05:07 Tenant Governance: What It Is and Why It Exists

07:12 Where Should Admins Start?

09:57 Configuration Snapshots and Baselines

13:02 The M365 DSC Connection

15:18 What Resources Should You Monitor?

17:07 How Drift Detection Works

19:49 Multi-Tenant Monitoring Strategy

20:02 Related Tenants: Discovering Your Unknown Exposure

20:39 Licensing: Basic vs Premium Explained

22:48 Quotas and Resource Limits

24:27 Governance Relationships and Cross-Tenant Role Assignments

28:26 Two-Step vs Three-Step Governance Flow

31:15 Discovery Signals and Blind Spots

35:17 Tenant Restrictions: A Related Feature Worth Knowing

36:40 Secure Tenant Creation

38:10 Governance Policy Templates

40:01 Licensing Across Multiple Tenants

43:43 Final Recommendations: Where to Start Today

47:54 Wrap Up


Podcast Apps

🎙️ Entra.Chat - https://entra.chat

🎧 Apple Podcast → https://entra.chat/apple

📺 YouTube → https://entra.chat/youtube

📺 Spotify → https://entra.chat/spotify

🎧 Overcast → https://entra.chat/overcast

🎧 Pocketcast → https://entra.chat/pocketcast

🎧 Others → https://entra.chat/rss


Merill’s socials

📺 YouTube → youtube.com/@merillx

👔 LinkedIn → linkedin.com/in/merill

🐤 Twitter → twitter.com/merill

🕺 TikTok → tiktok.com/@merillf

🦋 Bluesky → bsky.app/profile/merill.net

🐘 Mastodon → infosec.exchange/@merill

🧵 Threads → threads.net/@merillf

🤖 GitHub → github.com/merill

Discussion about this episode

User's avatar

Ready for more?