%3CLINGO-SUB%20id%3D%22lingo-sub-2111184%22%20slang%3D%22en-US%22%3EWhat's%20New%3A%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20Workbook%20in%20Public%20Preview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2111184%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20provides%20a%20mechanism%20for%20viewing%20log%20queries%20aligned%20to%20CMMC%20controls%20across%20the%20Azure%20cloud%20including%20Microsoft%20security%20offerings%2C%20Office%20365%2C%20Teams%2C%20Intune%2C%20Windows%20Virtual%20Desktop%20and%20many%20more.%20This%20workbook%20enables%20Security%20Architects%2C%20Engineers%2C%20SecOps%20Analysts%2C%20Managers%2C%20and%20IT%20Pros%20to%20gain%20situational%20awareness%20for%20the%20security%20posture%20of%20cloud%20workloads.%20There%20are%20also%20recommendations%20for%20selecting%2C%20designing%2C%20deploying%2C%20and%20configuring%20Microsoft%20offerings%20for%20alignment%20with%20respective%20CMMC%20requirements%26nbsp%3Band%20practices.%26nbsp%3BThe%20workbook%20features%20250%2B%20control%20cards%20aligned%20to%20the%2017%20CMMC%20control%20families%20across%20all%205%20maturity%20levels%20with%20selectable%20GUI%20buttons%20for%20navigation.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture1.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251366iC4466F8116616BC3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture1.gif%22%20alt%3D%22Picture1.gif%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20workbook%20helps%20you%20to%20gain%20better%20visibility%20into%20your%20cloud%20architecture%20from%20security%20perspective%20while%20reinforcing%20CMMC%20principles%20for%20building%20cybersecurity%20critical%20thinking%20skills.%20The%20workbook%20consolidates%20multiple%20log%20sources%20from%20your%20Azure%20environment%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAzure%20Active%20Directory%3C%2FLI%3E%0A%3CLI%3EAzure%20Active%20Directory%20Identity%20Protection%3C%2FLI%3E%0A%3CLI%3EAzure%20Activity%3C%2FLI%3E%0A%3CLI%3EAzure%20DDoS%20Protection%3C%2FLI%3E%0A%3CLI%3EAzure%20Firewall%3C%2FLI%3E%0A%3CLI%3EAzure%20Information%20Protection%3C%2FLI%3E%0A%3CLI%3EAzure%20Security%20Center%3C%2FLI%3E%0A%3CLI%3ECommon%20Event%20Format%3C%2FLI%3E%0A%3CLI%3EDNS%3C%2FLI%3E%0A%3CLI%3EIntune%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20365%20Defender%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Cloud%20App%20Security%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20for%20Identity%3C%2FLI%3E%0A%3CLI%3EOffice%20365%3C%2FLI%3E%0A%3CLI%3ESecurity%20Events%3C%2FLI%3E%0A%3CLI%3ESyslog%3C%2FLI%3E%0A%3CLI%3EThreat%20Intelligence%20Platforms%3C%2FLI%3E%0A%3CLI%3EWindows%20Firewall%3C%2FLI%3E%0A%3CLI%3ETeams%3C%2FLI%3E%0A%3CLI%3EUser%20Entity%20Behavior%20Analytics%3C%2FLI%3E%0A%3CLI%3EWindows%20Virtual%20Desktop%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EDeploying%20the%20Workbook%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIt%20is%20recommended%20that%20you%20have%20the%20log%20sources%20listed%20above%20to%20get%20the%20full%20benefit%20of%20the%20CMMC%20Workbook%2C%20but%20the%20workbook%20will%20deploy%20regardless%20of%20your%20available%20log%20sources.%20Follow%20the%20steps%20below%20to%20enable%20the%20workbook%3A%3C%2FP%3E%0A%3CP%3ERequirements%3A%20Azure%20Sentinel%20Workspace%20and%20Security%20Reader%20rights.%3C%2FP%3E%0A%3CP%3E1)%20From%20the%20%3CA%20href%3D%22https%3A%2F%2Fportal.azure.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAzure%20portal%3C%2FA%3E%2C%20navigate%20to%20%3CSTRONG%3EAzure%20Sentinel%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E2)%20Select%20%3CSTRONG%3EWorkbooks%20%26gt%3B%20Templates%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E3)%20Search%20%3CEM%3ECMMC%3C%2FEM%3E%20and%20select%20%3CSTRONG%3ESave%20%3C%2FSTRONG%3Eto%20add%20to%20%3CSTRONG%3EMy%20Workbooks%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENavigating%20the%20Workbook%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20%3CEM%3ELegend%20Panel%3C%2FEM%3E%20provides%20a%20helpful%20reference%20for%20navigating%20the%20workbook%20with%20respective%20colors%2C%20features%2C%20and%20reference%20indicators.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_0-1612275386839.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251370i48347596A46FEB1D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_0-1612275386839.png%22%20alt%3D%22TJ_Banasik_0-1612275386839.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%3CEM%3EGuide%20Toggle%3C%2FEM%3E%20is%20available%20in%20the%20top%20left%20of%20the%20workbook.%20This%20toggle%20allows%20you%20to%20view%20panels%20such%20as%20architectural%20recommendations%20and%20guides%20which%20will%20be%20helpful%20when%20you%20first%20access%20the%20workbook%20but%20can%20be%20hidden%20once%20you%E2%80%99ve%20grasped%20respective%20concepts.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture2.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251373i2A5B32CE1D3E8502%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture2.gif%22%20alt%3D%22Picture2.gif%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%3CEM%3EControl%20Family%20Ribbon%3C%2FEM%3E%20provides%20a%20mechanism%20for%20navigating%20to%20the%20desired%20control%20family.%20Selecting%20a%20control%20family%20will%20display%20%3CEM%3EControl%20Cards%3C%2FEM%3E%20in%20the%20respective%20Control%20Family.%20The%20%3CEM%3EMaturity%20Level%20Ribbon%3C%2FEM%3E%20drills%20down%20further%20to%20the%20desired%20control%20maturity%20level.%20You%20can%20view%20an%20index%20of%20controls%20in%20the%20workbook%20if%20you%20have%20the%20%3CEM%3EGuide%20Toggle%3C%2FEM%3E%20enabled.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_1-1612275499355.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251374i71313F8019608638%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_1-1612275499355.png%22%20alt%3D%22TJ_Banasik_1-1612275499355.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUse%20Cases%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThere%20are%20several%20use%20cases%20for%20the%20Azure%20Sentinel%20CMMC%20Workbook%20depending%20on%20user%20roles%20and%20requirements.%20The%20graphic%20below%20shows%20how%20a%20cloud%20security%20architect%20can%20leverage%20the%20workbook%20to%20review%20requirements%2C%20reference%20documentation%2C%20make%20configurations%2C%20and%20export%20artifacts.%20There%20are%20also%20several%20additional%20use%20cases%20where%20this%20workbook%20will%20be%20helpful%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3ESecurity%20Architect%3A%20%3C%2FSTRONG%3EBuild%2Fdesign%20a%20cloud%20security%20architecture%20to%20compliance%20requirements.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESecOps%20Analyst%3A%3C%2FSTRONG%3E%20Review%20activity%20in%20query%2C%20configure%20alerts%2C%20deploy%20SOAR%20automation.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EIT%20Pro%3A%3C%2FSTRONG%3E%20Identify%20performance%20issues%2C%20investigate%20issues%2C%20set%20alerts%20for%20remediation%20monitoring.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESecurity%20Engineer%3A%3C%2FSTRONG%3E%20Assess%20security%20controls%2C%20review%20alerting%20thresholds%2C%20adjust%20configurations.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESecurity%20Manager%3A%3C%2FSTRONG%3E%20Review%20requirements%2C%20analyze%20reporting%2C%20evaluate%20capabilities%2C%20adjust%20accordingly.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EConfigurations%20%26amp%3B%20Troubleshooting%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIt%E2%80%99s%20important%20to%20note%20that%20this%20workbook%20provides%20visibility%20and%20situational%20awareness%20for%20control%20requirements%20delivered%20with%20Microsoft%20technologies%20in%20predominantly%20cloud-based%20environments.%20Customer%20experience%20will%20vary%20by%20user%20and%20some%20panels%20may%20require%20additional%20configurations%20and%20query%20modification%20for%20operation.%20It%E2%80%99s%20unlikely%20that%20all%20250%2B%20panels%20will%20populate%20data%2C%20but%20this%20is%20expected%20as%20panels%20without%20data%20highlight%20respective%20areas%20for%20evaluation%20in%20maturing%20cybersecurity%20capabilities.%20%3CEM%3EControl%20Cards%3C%2FEM%3E%20without%20data%20will%20display%20the%20custom%20error%20message%20below.%20Most%20issues%20are%20resolved%20by%20confirming%20licensing%2Favailability%2Fhealth%20of%20the%20log%20source%2C%20confirming%20the%20log%20source%20is%20connected%20to%20the%20Sentinel%20workspace%2C%20and%20adjusting%20time%20thresholds%20for%20larger%20data%20sets.%20Ultimately%20this%20workbook%20is%20customer-controlled%20content%2C%20so%20panels%20are%20configurable%20per%20customer%20requirements.%20You%20can%20edit%2Fadjust%20Control%20Card%20queries%20as%20follows%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3ECMMC%20Workbook%3C%2FSTRONG%3E%20%26gt%3B%20%3CSTRONG%3EEdit%3C%2FSTRONG%3E%20%26gt%3B%20%3CSTRONG%3EEdit%20Panel%3C%2FSTRONG%3E%20%26gt%3B%20Adjust%20Panel%20KQL%20Query%20%26gt%3B%20%3CSTRONG%3ESave%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_2-1612275586429.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251376iEE80E657E484AE58%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_2-1612275586429.png%22%20alt%3D%22TJ_Banasik_2-1612275586429.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1196277800%22%20id%3D%22toc-hId-1970993564%22%3E%3CSTRONG%3EMicrosoft%20Blog%20Posts%20on%20CMMC%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--611176663%22%20id%3D%22toc-hId-163539101%22%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EBelow%20are%20additional%20resources%20for%20learning%20more%20about%20CMMC%20in%20the%20cloud%20with%20Microsoft.%20Let%20us%20know%20if%20there%20are%20additional%20government%20compliance%20frameworks%20we%20can%20help%20with.%20Bookmark%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20blog%3C%2FA%3E%20to%20keep%20up%20with%20our%20expert%20coverage%20on%20security%20matters%20and%20follow%20us%20at%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2F%40MSFTSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%40MSFTSecurity%3C%2FA%3E%20or%20visit%20our%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ewebsite%3C%2FA%3E%20for%20the%20latest%20news%20and%20updates%20on%20cybersecurity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpublic-sector-blog%2Fmicrosoft-cmmc-acceleration-program-update-january-2021%2Fba-p%2F2033499%22%20target%3D%22_blank%22%3EMicrosoft%20CMMC%20Acceleration%20Program%20Update%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpublic-sector-blog%2Fazure-sentinel-cybersecurity-maturity-model-certification-cmmc%2Fba-p%2F2110524%22%20target%3D%22_blank%22%3EMicrosoft%20Public%20Sector%20Blog%3A%20Azure%20Sentinel%20CMMC%20Workbook%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EDisclaimer%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20demonstrates%20best%20practice%20guidance%2C%20but%20Microsoft%20does%20not%20guarantee%20nor%20imply%20compliance.%20All%20accreditation%20requirements%20and%20decisions%20are%20governed%20by%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cmmcab.org%2Fc3pao-lp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ECMMC%20Accreditation%20Body%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%20This%20workbook%20provides%20visibility%20and%20situational%20awareness%20for%20control%20requirements%20delivered%20with%20Microsoft%20technologies%20in%20predominantly%20cloud-based%20environments.%20Customer%20experience%20will%20vary%20by%20user%20and%20some%20panels%20may%20require%20additional%20configurations%20and%20query%20modification%20for%20operation.%20Recommendations%20do%20not%20imply%20coverage%20of%20respective%20controls%20as%20they%20are%20often%20one%20of%20several%20courses%20of%20action%20for%20approaching%20requirements%20which%20is%20unique%20to%20each%20customer.%20Recommendations%20should%20be%20considered%20a%20starting%20point%20for%20planning%20full%20or%20partial%20coverage%20of%20respective%20control%20requirements.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2111184%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20provides%20a%20mechanism%20for%20viewing%20log%20queries%20aligned%20to%20CMMC%20controls%20across%20the%20Azure%20cloud%20including%20Microsoft%20security%20offerings%2C%20Office%20365%2C%20Teams%2C%20Intune%2C%20Windows%20Virtual%20Desktop%20and%20many%20more.%20This%20workbook%20enables%20Security%20Architects%2C%20Engineers%2C%20SecOps%20Analysts%2C%20Managers%2C%20and%20IT%20Pros%20to%20gain%20situational%20awareness%20for%20the%20security%20posture%20of%20cloud%20workloads.%20There%20are%20also%20recommendations%20for%20selecting%2C%20designing%2C%20deploying%2C%20and%20configuring%20Microsoft%20offerings%20for%20alignment%20with%20respective%20CMMC%20requirements%26nbsp%3Band%20practices.%26nbsp%3BThe%20workbook%20features%20250%2B%20control%20cards%20aligned%20to%20the%2017%20CMMC%20control%20families%20across%20all%205%20maturity%20levels%20with%20selectable%20GUI%20buttons%20for%20navigation.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture1.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251365i0E5DC59FA2116FE5%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture1.gif%22%20alt%3D%22CMMC%20Workbook%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3ECMMC%20Workbook%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2111184%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECMMC%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPublic%20Sector%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%20%26amp%3B%20Compliance%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESIEM%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

The Azure Sentinel CMMC Workbook provides a mechanism for viewing log queries aligned to CMMC controls across the Azure cloud including Microsoft security offerings, Office 365, Teams, Intune, Windows Virtual Desktop and many more. This workbook enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective CMMC requirements and practices. The workbook features 250+ control cards aligned to the 17 CMMC control families across all 5 maturity levels with selectable GUI buttons for navigation.

 

Picture1.gif

 

The workbook helps you to gain better visibility into your cloud architecture from security perspective while reinforcing CMMC principles for building cybersecurity critical thinking skills. The workbook consolidates multiple log sources from your Azure environment:

  • Azure Active Directory
  • Azure Active Directory Identity Protection
  • Azure Activity
  • Azure DDoS Protection
  • Azure Firewall
  • Azure Information Protection
  • Azure Security Center
  • Common Event Format
  • DNS
  • Intune
  • Microsoft 365 Defender
  • Microsoft Cloud App Security
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Identity
  • Office 365
  • Security Events
  • Syslog
  • Threat Intelligence Platforms
  • Windows Firewall
  • Teams
  • User Entity Behavior Analytics
  • Windows Virtual Desktop

Deploying the Workbook

It is recommended that you have the log sources listed above to get the full benefit of the CMMC Workbook, but the workbook will deploy regardless of your available log sources. Follow the steps below to enable the workbook:

Requirements: Azure Sentinel Workspace and Security Reader rights.

1) From the Azure portal, navigate to Azure Sentinel

2) Select Workbooks > Templates

3) Search CMMC and select Save to add to My Workbooks

 

Navigating the Workbook

The Legend Panel provides a helpful reference for navigating the workbook with respective colors, features, and reference indicators.

 

TJ_Banasik_0-1612275386839.png

 

The Guide Toggle is available in the top left of the workbook. This toggle allows you to view panels such as architectural recommendations and guides which will be helpful when you first access the workbook but can be hidden once you’ve grasped respective concepts.

 

Picture2.gif

 

The Control Family Ribbon provides a mechanism for navigating to the desired control family. Selecting a control family will display Control Cards in the respective Control Family. The Maturity Level Ribbon drills down further to the desired control maturity level. You can view an index of controls in the workbook if you have the Guide Toggle enabled.

 

TJ_Banasik_1-1612275499355.png

 

Use Cases

There are several use cases for the Azure Sentinel CMMC Workbook depending on user roles and requirements. The graphic below shows how a cloud security architect can leverage the workbook to review requirements, reference documentation, make configurations, and export artifacts. There are also several additional use cases where this workbook will be helpful:

  • Security Architect: Build/design a cloud security architecture to compliance requirements.
  • SecOps Analyst: Review activity in query, configure alerts, deploy SOAR automation.
  • IT Pro: Identify performance issues, investigate issues, set alerts for remediation monitoring.
  • Security Engineer: Assess security controls, review alerting thresholds, adjust configurations.
  • Security Manager: Review requirements, analyze reporting, evaluate capabilities, adjust accordingly.

Configurations & Troubleshooting

It’s important to note that this workbook provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user and some panels may require additional configurations and query modification for operation. It’s unlikely that all 250+ panels will populate data, but this is expected as panels without data highlight respective areas for evaluation in maturing cybersecurity capabilities. Control Cards without data will display the custom error message below. Most issues are resolved by confirming licensing/availability/health of the log source, confirming the log source is connected to the Sentinel workspace, and adjusting time thresholds for larger data sets. Ultimately this workbook is customer-controlled content, so panels are configurable per customer requirements. You can edit/adjust Control Card queries as follows:

 

  • CMMC Workbook > Edit > Edit Panel > Adjust Panel KQL Query > Save

TJ_Banasik_2-1612275586429.png

 

Microsoft Blog Posts on CMMC

 

Below are additional resources for learning more about CMMC in the cloud with Microsoft. Let us know if there are additional government compliance frameworks we can help with. Bookmark the Security blog to keep up with our expert coverage on security matters and follow us at @MSFTSecurity or visit our website for the latest news and updates on cybersecurity.

 

 

Disclaimer

The Azure Sentinel CMMC Workbook demonstrates best practice guidance, but Microsoft does not guarantee nor imply compliance. All accreditation requirements and decisions are governed by the CMMC Accreditation Body. This workbook provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user and some panels may require additional configurations and query modification for operation. Recommendations do not imply coverage of respective controls as they are often one of several courses of action for approaching requirements which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective control requirements.