What’s New: Azure Sentinel: Zero Trust (TIC3.0) Workbook

Published 05-05-2021 08:00 AM 6,579 Views
Microsoft

Mapping technology to Zero Trust frameworks is a challenge in many industries. We need to change our thinking in security assessment as the cloud evolves at the speed of innovation and growth, which often challenges our security requirements. We need a method to map Zero Trust approaches to technology while measuring change over time like a muscle.

 

Azure Sentinel: Zero Trust (TIC 3.0) WorkbookAzure Sentinel: Zero Trust (TIC 3.0) Workbook

The Azure Sentinel: Zero Trust (TIC3.0) Workbook provides an automated visualization of Zero Trust principles cross walked to the Trusted Internet Connections framework. This workbook leverages the full breadth of Microsoft security offerings across Azure, Office 365, Teams, Intune, Windows Virtual Desktop, and many more. This workbook enables Implementers, SecOps Analysts, Assessors, Security & Compliance Decision Makers, and MSSPs to gain situational awareness for cloud workloads' security posture. The workbook features 76+ control cards aligned to the TIC 3.0 security capabilities with selectable GUI buttons for navigation. This workbook is designed to augment staffing through automation, artificial intelligence, machine learning, query/alerting generation, visualizations, tailored recommendations, and respective documentation references.

 

Use Cases

There are several use cases for the Azure Sentinel Zero Trust (TIC 3.0) Workbook depending on user roles and requirements. The graphic below shows how a Security Engineer can leverage the workbook to review controls, evaluate tool efficiency, explore events, and investigate configurations. There are also several additional use cases where this workbook will be helpful:

Roles

  • Implementers: Build/Design
  • SecOps: Alert/Automation Building
  • Assessors: Audit, Compliance, Assessment
  • Security & Compliance Decision Makers: Situational Awareness
  • MSSP: Consultants, Managed Service

Mappings

  • Framework to Requirement to Microsoft Technology

Visualization

  • Hundreds of Visualizations, Recommendations, Queries

Time-Bound

  • Measure Posture Over Time for Maturity

Time-Saving

  • Aggregation & Analysis
  • Capabilities Assessment
  • Navigation
  • Documentation
  • Compliance Mapping
  • Query/Alert Generation

 

Security Engineer Use CaseSecurity Engineer Use Case

Is Zero Trust Equivalent to TIC 3.0?

No, Zero Trust is a best practice model and TIC 3.0 is a security initiative. Zero Trust is widely defined around core principles whereas TIC 3.0 has specific capabilities and requirements. This workbook demonstrates the overlap of Zero Trust Principles with TIC 3.0 Capabilities. The Azure Sentinel Zero Trust (TIC 3.0) Workbook demonstrates best practice guidance, but Microsoft does not guarantee nor imply compliance. All TIC requirements, validations, and controls are governed by the Cybersecurity & Infrastructure Security Agency. This workbook provides visibility and situational awareness for security capabilities delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user and some panels may require additional configurations for operation. Recommendations do not imply coverage of respective controls as they are often one of several courses of action for approaching requirements which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective requirements.

 

 

Deploying the Workbook

It is recommended that you have the log sources listed above to get the full benefit of the Zero Trust (TIC3.0) Workbook, but the workbook will deploy regardless of your available log sources. Follow the steps below to enable the workbook:

Requirements: Azure Sentinel Workspace and Security Reader rights.

1) From the Azure portal, navigate to Azure Sentinel

2) Select Workbooks > Templates

3) Search Zero Trust and select Save to add to My Workbooks

 

Microsoft Offerings Overlay to TIC CapabilitiesMicrosoft Offerings Overlay to TIC Capabilities

Navigating the Workbook

The Legend Panel provides a helpful reference for navigating the workbook with respective colors, features, and reference indicators.

 

Navigating The WorkbookNavigating The Workbook

The Guide Toggle is available in the top left of the workbook. This toggle allows you to view panels such as recommendations and guides, which will help you first access the workbook but can be hidden once you’ve grasped respective concepts.

 

Guide ToggleGuide Toggle

The Resource Parameter Options provide configuration options to sort control cards by Subscription, Workspace, and Time Range. The Parameter Options are beneficial for Managed Security Service Providers (MSSP) or large enterprises that leverage Azure Lighthouse for visibility into multiple workspaces. It facilitates assessment from both the aggregate and individual workspace perspectives. Time range selectors allow options for daily, monthly, quarterly, and even custom time range visibility.

 

Resource Parameter OptionsResource Parameter Options

The Azure Sentinel Zero Trust (TIC3.0) Workbook displays each control in a Capability Card. The Capability Card provides respective control details to understand requirements, view your data, adjust SIEM queries, export artifacts, onboard Microsoft controls, navigate configuration blades, access reference materials, and view correlated compliance frameworks.

 

Capability CardCapability Card

While using Microsoft offerings for the Zero Trust (TIC3.0) Workbook is recommended, it’s not a set requirement as customers often rely on many security providers and solutions. Below is a use-case example for adjusting a Control Card to include third-party tooling. The default KQL query provides a framework for target data, and it is readily adjusted with the desired customer controls/solutions.

 

3rd Party Tool Use Case3rd Party Tool Use Case

Get Started with Azure Sentinel and Learn More About Zero Trust with Microsoft

Below are additional resources for learning more about Zero Trust (TIC3.0) with Microsoft. Bookmark the Security blog to keep up with our expert coverage on security matters and follow us at @MSFTSecurity or visit our website for the latest news and cybersecurity updates.

Disclaimer

The Azure Sentinel Zero Trust (TIC 3.0) Workbook demonstrates best practice guidance, but Microsoft does not guarantee nor imply compliance. All TIC requirements, validations, and controls are governed by the  Cybersecurity & Infrastructure Security Agency. This workbook provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user, and some panels may require additional configurations and query modification for operation. Recommendations do not imply coverage of respective controls as they are often one of several courses of action for approaching requirements which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective control requirements.

 

 

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2315195%22%20slang%3D%22en-US%22%3EWhat%E2%80%99s%20New%3A%20Azure%20Sentinel%3A%20Zero%20Trust%20(TIC3.0)%20Workbook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2315195%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3EMapping%20technology%20to%20Zero%20Trust%20frameworks%20is%20a%20challenge%20in%20many%20industries.%20We%20need%20to%20change%20our%20thinking%20in%20security%20assessment%20as%20the%20cloud%20evolves%20at%20the%20speed%20of%20innovation%20and%20growth%2C%20which%20often%20challenges%20our%20security%20requirements.%20We%20need%20a%20method%20to%20map%20Zero%20Trust%20approaches%20to%20technology%20while%20measuring%20change%20over%20time%20like%20a%20muscle.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Zero%20Trust%20OV2.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277363i86BFBC39C6712020%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Zero%20Trust%20OV2.gif%22%20alt%3D%22Azure%20Sentinel%3A%20Zero%20Trust%20(TIC%203.0)%20Workbook%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAzure%20Sentinel%3A%20Zero%20Trust%20(TIC%203.0)%20Workbook%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3EThe%20Azure%20Sentinel%3A%20Zero%20Trust%20(TIC3.0)%20Workbook%20provides%20an%20automated%20visualization%20of%20Zero%20Trust%20principles%20cross%20walked%20to%20the%20Trusted%20Internet%20Connections%20framework.%20This%20workbook%20leverages%20the%20full%20breadth%20of%20Microsoft%20security%20offerings%20across%20Azure%2C%20Office%20365%2C%20Teams%2C%20Intune%2C%20Windows%20Virtual%20Desktop%2C%20and%20many%20more.%20This%20workbook%20enables%20Implementers%2C%20SecOps%20Analysts%2C%20Assessors%2C%20Security%20%26amp%3B%20Compliance%20Decision%20Makers%2C%20and%20MSSPs%20to%20gain%20situational%20awareness%20for%20cloud%20workloads'%20security%20posture.%20The%20workbook%20features%2076%2B%20control%20cards%20aligned%20to%20the%20TIC%203.0%20security%20capabilities%20with%20selectable%20GUI%20buttons%20for%20navigation.%20This%20workbook%20is%20designed%20to%20augment%20staffing%20through%20automation%2C%20artificial%20intelligence%2C%20machine%20learning%2C%20query%2Falerting%20generation%2C%20visualizations%2C%20tailored%20recommendations%2C%20and%20respective%20documentation%20references.%20%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-231392757%22%20id%3D%22toc-hId-230433898%22%3E%3CSTRONG%3EUse%20Cases%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3EThere%20are%20several%20use%20cases%20for%20the%20Azure%20Sentinel%20Zero%20Trust%20(TIC%203.0)%20Workbook%20depending%20on%20user%20roles%20and%20requirements.%20The%20graphic%20below%20shows%20how%20a%20Security%20Engineer%20can%20leverage%20the%20workbook%20to%20review%20controls%2C%20evaluate%20tool%20efficiency%2C%20explore%20events%2C%20and%20investigate%20configurations.%20There%20are%20also%20several%20additional%20use%20cases%20where%20this%20workbook%20will%20be%20helpful%3A%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERoles%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CEM%3EImplementers%3A%20%3C%2FEM%3EBuild%2FDesign%3C%2FLI%3E%0A%3CLI%3E%3CEM%3ESecOps%3A%20%3C%2FEM%3EAlert%2FAutomation%20Building%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EAssessors%3A%3C%2FEM%3E%20Audit%2C%20Compliance%2C%20Assessment%3C%2FLI%3E%0A%3CLI%3E%3CEM%3ESecurity%20%26amp%3B%20Compliance%20Decision%20Makers%3A%20%3C%2FEM%3ESituational%20Awareness%3C%2FLI%3E%0A%3CLI%3E%3CEM%3EMSSP%3A%20%3C%2FEM%3EConsultants%2C%20Managed%20Service%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EMappings%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EFramework%20to%20Requirement%20to%20Microsoft%20Technology%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EVisualization%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EHundreds%20of%20Visualizations%2C%20Recommendations%2C%20Queries%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3ETime-Bound%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EMeasure%20Posture%20Over%20Time%20for%20Maturity%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3ETime-Saving%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAggregation%20%26amp%3B%20Analysis%3C%2FLI%3E%0A%3CLI%3ECapabilities%20Assessment%3C%2FLI%3E%0A%3CLI%3ENavigation%3C%2FLI%3E%0A%3CLI%3EDocumentation%3C%2FLI%3E%0A%3CLI%3ECompliance%20Mapping%3C%2FLI%3E%0A%3CLI%3EQuery%2FAlert%20Generation%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJBanasik_1-1619969973734.png%22%20style%3D%22width%3A%20738px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277365i3F3EE5B93D7A2486%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJBanasik_1-1619969973734.png%22%20alt%3D%22Security%20Engineer%20Use%20Case%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ESecurity%20Engineer%20Use%20Case%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--1576061706%22%20id%3D%22toc-hId--1577020565%22%3E%3CSTRONG%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3EIs%20Zero%20Trust%20Equivalent%20to%20TIC%203.0%3F%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3ENo%2C%20Zero%20Trust%20is%20a%20best%20practice%20model%20and%20TIC%203.0%20is%20a%20security%20initiative.%20Zero%20Trust%20is%20widely%20defined%20around%20core%20principles%20whereas%20TIC%203.0%20has%20specific%20capabilities%20and%20requirements.%20This%20workbook%20demonstrates%20the%20overlap%20of%20Zero%20Trust%20Principles%20with%20TIC%203.0%20Capabilities.%20The%20Azure%20Sentinel%20Zero%20Trust%20(TIC%203.0)%20Workbook%20demonstrates%20best%20practice%20guidance%2C%20but%20Microsoft%20does%20not%20guarantee%20nor%20imply%20compliance.%20All%20TIC%20requirements%2C%20validations%2C%20and%20controls%20are%20governed%20by%20the%20%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cisa.gov%2Ftrusted-internet-connections%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3ECybersecurity%20%26amp%3B%20Infrastructure%20Security%20Agency%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3E.%20This%20workbook%20provides%20visibility%20and%20situational%20awareness%20for%20security%20capabilities%20delivered%20with%20Microsoft%20technologies%20in%20predominantly%20cloud-based%20environments.%20Customer%20experience%20will%20vary%20by%20user%20and%20some%20panels%20may%20require%20additional%20configurations%20for%20operation.%20Recommendations%20do%20not%20imply%20coverage%20of%20respective%20controls%20as%20they%20are%20often%20one%20of%20several%20courses%20of%20action%20for%20approaching%20requirements%20which%20is%20unique%20to%20each%20customer.%20Recommendations%20should%20be%20considered%20a%20starting%20point%20for%20planning%20full%20or%20partial%20coverage%20of%20respective%20requirements.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3C%2FSPAN%3E%3C%2FP%3E%3CDIV%20class%3D%22video-embed-center%20video-embed%22%3E%3CIFRAME%20class%3D%22embedly-embed%22%20src%3D%22https%3A%2F%2Fcdn.embedly.com%2Fwidgets%2Fmedia.html%3Fsrc%3Dhttps%253A%252F%252Fwww.youtube.com%252Fembed%252FRpDas8fXzdU%26amp%3Bdisplay_name%3DYouTube%26amp%3Burl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253DRpDas8fXzdU%26amp%3Bimage%3Dhttp%253A%252F%252Fi.ytimg.com%252Fvi%252FRpDas8fXzdU%252Fhqdefault.jpg%26amp%3Bkey%3Db0d40caa4f094c68be7c29880b16f56e%26amp%3Btype%3Dtext%252Fhtml%26amp%3Bschema%3Dyoutube%22%20width%3D%22400%22%20height%3D%22225%22%20scrolling%3D%22no%22%20title%3D%22YouTube%20embed%22%20frameborder%3D%220%22%20allow%3D%22autoplay%3B%20fullscreen%22%20allowfullscreen%3D%22true%22%3E%3C%2FIFRAME%3E%3C%2FDIV%3E%3CP%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId-911451127%22%20id%3D%22toc-hId-910492268%22%3E%3CSTRONG%3EDeploying%20the%20Workbook%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3EIt%20is%20recommended%20that%20you%20have%20the%20log%20sources%20listed%20above%20to%20get%20the%20full%20benefit%20of%20the%20Zero%20Trust%20(TIC3.0)%20Workbook%2C%20but%20the%20workbook%20will%20deploy%20regardless%20of%20your%20available%20log%20sources.%20Follow%20the%20steps%20below%20to%20enable%20the%20workbook%3A%3C%2FP%3E%0A%3CP%3ERequirements%3A%20Azure%20Sentinel%20Workspace%20and%20Security%20Reader%20rights.%3C%2FP%3E%0A%3CP%3E1)%20From%20the%20%3CA%20href%3D%22https%3A%2F%2Fportal.azure.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAzure%20portal%3C%2FA%3E%2C%20navigate%20to%20%3CSTRONG%3EAzure%20Sentinel%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E2)%20Select%20%3CSTRONG%3EWorkbooks%20%26gt%3B%20Templates%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E3)%20Search%20%3CEM%3EZero%20Trust%3C%2FEM%3E%20and%20select%20%3CSTRONG%3ESave%20%3C%2FSTRONG%3Eto%20add%20to%20%3CSTRONG%3EMy%20Workbooks%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJBanasik_2-1619970040856.png%22%20style%3D%22width%3A%20637px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277366i956229301DBC9DC8%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJBanasik_2-1619970040856.png%22%20alt%3D%22Microsoft%20Offerings%20Overlay%20to%20TIC%20Capabilities%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EMicrosoft%20Offerings%20Overlay%20to%20TIC%20Capabilities%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH4%20id%3D%22toc-hId--896003336%22%20id%3D%22toc-hId--896962195%22%3E%3CSTRONG%3ENavigating%20the%20Workbook%3C%2FSTRONG%3E%3C%2FH4%3E%0A%3CP%3EThe%20%3CEM%3ELegend%20Panel%3C%2FEM%3E%20provides%20a%20helpful%20reference%20for%20navigating%20the%20workbook%20with%20respective%20colors%2C%20features%2C%20and%20reference%20indicators.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJBanasik_3-1619970114737.png%22%20style%3D%22width%3A%20738px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277367iA3C7A08A5CC5E8DB%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJBanasik_3-1619970114737.png%22%20alt%3D%22Navigating%20The%20Workbook%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ENavigating%20The%20Workbook%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20%3CEM%3EGuide%20Toggle%3C%2FEM%3E%20is%20available%20in%20the%20top%20left%20of%20the%20workbook.%20This%20toggle%20allows%20you%20to%20view%20panels%20such%20as%20recommendations%20and%20guides%2C%20which%20will%20help%20you%20first%20access%20the%20workbook%20but%20can%20be%20hidden%20once%20you%E2%80%99ve%20grasped%20respective%20concepts.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Guide.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277368iBBF18F60080E0DBC%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Guide.gif%22%20alt%3D%22Guide%20Toggle%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EGuide%20Toggle%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fazure-monitor%2Fvisualize%2Fworkbooks-parameters%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CEM%3EResource%20Parameter%20Options%3C%2FEM%3E%3C%2FA%3E%20provide%20configuration%20options%20to%20sort%20control%20cards%20by%20Subscription%2C%20Workspace%2C%20and%20Time%20Range.%20The%20Parameter%20Options%20are%20beneficial%20for%20Managed%20Security%20Service%20Providers%20(MSSP)%20or%20large%20enterprises%20that%20leverage%20Azure%20Lighthouse%20for%20visibility%20into%20multiple%20workspaces.%20It%20facilitates%20assessment%20from%20both%20the%20aggregate%20and%20individual%20workspace%20perspectives.%20Time%20range%20selectors%20allow%20options%20for%20daily%2C%20monthly%2C%20quarterly%2C%20and%20even%20custom%20time%20range%20visibility.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Parameters.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277369iF7C9DF341A7A8F71%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Parameters.gif%22%20alt%3D%22Resource%20Parameter%20Options%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EResource%20Parameter%20Options%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20Azure%20Sentinel%20Zero%20Trust%20(TIC3.0)%20Workbook%20displays%20each%20control%20in%20a%20%3CEM%3ECapability%20Card%3C%2FEM%3E.%20The%20%3CEM%3ECapability%20Card%3C%2FEM%3E%20provides%20respective%20control%20details%20to%20understand%20requirements%2C%20view%20your%20data%2C%20adjust%20SIEM%20queries%2C%20export%20artifacts%2C%20onboard%20Microsoft%20controls%2C%20navigate%20configuration%20blades%2C%20access%20reference%20materials%2C%20and%20view%20correlated%20compliance%20frameworks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJBanasik_0-1619970309336.png%22%20style%3D%22width%3A%20738px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277371iA04C022EF60CC129%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJBanasik_0-1619970309336.png%22%20alt%3D%22Capability%20Card%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ECapability%20Card%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EWhile%20using%20Microsoft%20offerings%20for%20the%20Zero%20Trust%20(TIC3.0)%20Workbook%20is%20recommended%2C%20it%E2%80%99s%20not%20a%20set%20requirement%20as%20customers%20often%20rely%20on%20many%20security%20providers%20and%20solutions.%20Below%20is%20a%20use-case%20example%20for%20adjusting%20a%20Control%20Card%20to%20include%20third-party%20tooling.%20The%20default%20KQL%20query%20provides%20a%20framework%20for%20target%20data%2C%20and%20it%20is%20readily%20adjusted%20with%20the%20desired%20customer%20controls%2Fsolutions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJBanasik_1-1619970376549.png%22%20style%3D%22width%3A%20738px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F277372iE4EBA269B9E3DC88%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJBanasik_1-1619970376549.png%22%20alt%3D%223rd%20Party%20Tool%20Use%20Case%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3E3rd%20Party%20Tool%20Use%20Case%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--906506440%22%20id%3D%22toc-hId--907465299%22%3E%3CSTRONG%3EGet%20Started%20with%20Azure%20Sentinel%20and%20Learn%20More%20About%20Zero%20Trust%20with%20Microsoft%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EBelow%20are%20additional%20resources%20for%20learning%20more%20about%20Zero%20Trust%20(TIC3.0)%20with%20Microsoft.%20Bookmark%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20blog%3C%2FA%3E%20to%20keep%20up%20with%20our%20expert%20coverage%20on%20security%20matters%20and%20follow%20us%20at%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2F%40MSFTSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%40MSFTSecurity%3C%2FA%3E%20or%20visit%20our%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ewebsite%3C%2FA%3E%20for%20the%20latest%20news%20and%20cybersecurity%20updates.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EGet%20Started%20with%20Azure%20Sentinel%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsentinel%2Ftutorial-monitor-your-data%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ETutorial%3A%20Visualize%20and%20Monitor%20your%20Data%20with%20Workbooks%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fzero-trust%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Zero%20Trust%20Model%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fsecurity%2Fzero-trust%2F%3FWT.mc_id%3DPortal-fx%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EZero%20Trust%20Deployment%20Center%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F03%2F31%2Fzero-trust-7-adoption-strategies-from-security-leaders%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EZero%20Trust%3A%207%20Adoption%20Strategies%20from%20Security%20Leaders%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fvideoplayer%2Fembed%2FRE4J3ms%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Zero%20Trust%20Video%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CEM%3E%3CSTRONG%3EDisclaimer%3C%2FSTRONG%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EThe%20Azure%20Sentinel%20Zero%20Trust%20(TIC%203.0)%20Workbook%20demonstrates%20best%20practice%20guidance%2C%20but%20Microsoft%20does%20not%20guarantee%20nor%20imply%20compliance.%20All%20TIC%20requirements%2C%20validations%2C%20and%20controls%20are%20governed%20by%20the%20%26nbsp%3B%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cisa.gov%2Ftrusted-internet-connections%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ECybersecurity%20%26amp%3B%20Infrastructure%20Security%20Agency%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%20This%20workbook%20provides%20visibility%20and%20situational%20awareness%20for%20control%20requirements%20delivered%20with%20Microsoft%20technologies%20in%20predominantly%20cloud-based%20environments.%20Customer%20experience%20will%20vary%20by%20user%2C%20and%20some%20panels%20may%20require%20additional%20configurations%20and%20query%20modification%20for%20operation.%20Recommendations%20do%20not%20imply%20coverage%20of%20respective%20controls%20as%20they%20are%20often%20one%20of%20several%20courses%20of%20action%20for%20approaching%20requirements%20which%20is%20unique%20to%20each%20customer.%20Recommendations%20should%20be%20considered%20a%20starting%20point%20for%20planning%20full%20or%20partial%20coverage%20of%20respective%20control%20requirements.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2315195%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3EThe%20Azure%20Sentinel%3A%20Zero%20Trust%20(TIC3.0)%20Workbook%20provides%20an%20automated%20visualization%20of%20Zero%20Trust%20principles%20cross%20walked%20to%20the%20Trusted%20Internet%20Connections%20framework.%20Compliance%20isn%E2%80%99t%20just%20an%20annual%20requirement%2C%20and%20organizations%20must%20monitor%20configurations%20over%20time%20like%20a%20muscle.%20This%20workbook%20leverages%20the%20full%20breadth%20of%20Microsoft%20security%20offerings%20across%20Azure%2C%20Office%20365%2C%20Teams%2C%20Intune%2C%20Windows%20Virtual%20Desktop%2C%20and%20many%20more.%20This%20workbook%20enables%20Implementers%2C%20SecOps%20Analysts%2C%20Assessors%2C%20Security%20%26amp%3B%20Compliance%20Decision%20Makers%2C%20and%20MSSPs%20to%20gain%20situational%20awareness%20for%20cloud%20workloads'%20security%20posture.%20The%20workbook%20features%2076%2B%20control%20cards%20aligned%20to%20the%20TIC%203.0%20security%20capabilities%20with%20selectable%20GUI%20buttons%20for%20navigation.%20This%20workbook%20is%20designed%20to%20augment%20staffing%20through%20automation%2C%20artificial%20intelligence%2C%20machine%20learning%2C%20query%2Falerting%20generation%2C%20visualizations%2C%20tailored%20recommendations%2C%20and%20respective%20documentation%20references.%20%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2315195%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EZero%20Trust%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎May 02 2021 08:56 AM
Updated by: