%3CLINGO-SUB%20id%3D%22lingo-sub-1147793%22%20slang%3D%22en-US%22%3EA%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20-%20Part%201%20-%20Overview%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1147793%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWelcome%20everyone!%26nbsp%3B%20My%20name%20is%20James%20Key%20and%20I%E2%80%99ll%20be%20your%20guide%20as%20we%20take%20a%20journey%20through%20the%20possibilities%20of%20holistic%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack.%26nbsp%3B%20I%20am%20a%20Premier%20Field%20Engineer%20at%20Microsoft%20who%20specializes%20in%20Microsoft%20365%20security%20and%20compliance.%26nbsp%3B%20During%20my%20four%20years%20I%20have%20been%20blessed%20to%20work%20for%20an%20amazing%20organization%20and%20alongside%20a%20stellar%20group%20of%20colleagues.%26nbsp%3B%20My%20passion%20is%20security%20and%20compliance%2C%20so%20I%20joke%20constantly%20about%20having%20the%20best%20job%20in%20the%20world%20where%20I%20get%20paid%20to%20have%20fun%20each%20day.%26nbsp%3B%20Security%20at%20each%20organization%20is%20a%20unique%20puzzle%20where%20you%20have%20different%20technologies%2C%20infrastructure%2C%20people%20and%20processes%20that%20make%20implementing%20security%20like%20trying%20to%20solve%20a%20Rubik%20Cube.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20organizations%20continue%20to%20migrate%20to%20the%20cloud%20it%20is%20imperative%20that%20everyone%20understand%20how%20to%20provide%20modern%20security%20against%20constantly%20evolving%20threats.%26nbsp%3B%20Data%20stored%20in%20the%20cloud%20has%20become%20one%20of%20the%20most%20important%20assets%20of%20an%20organization%20and%20protecting%20it%20is%20key.%26nbsp%3B%20Malicious%20threats%20can%20come%20from%20many%20different%20sources%20and%20having%20a%20holistic%20approach%20will%20increase%20your%20overall%20security%20posture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDuring%20this%20six-part%20blog%20series%2C%20we%20will%20take%20a%20journey%20around%20how%20to%20protect%20your%20organization%20using%20the%20Microsoft%20365%20security%20stack%20as%20we%20deep%20dive%20into%20the%20four%20pillars%20of%20security%2C%20each%20with%20their%20own%20separate%20article.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20goal%20of%20this%20series%20is%20to%20provide%20a%20comprehensive%20security%20overview%20and%20show%20how%20the%20integration%20of%20security%20features%20within%20the%20Microsoft%20365%20security%20stack%20provide%20holistic%20security%20within%20the%20Microsoft%20eco-system%20and%20when%20interacting%20with%20third%20party%20solutions.%26nbsp%3B%20The%20four%20pillars%20that%20we%20will%20discuss%20are%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIdentity%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3EYour%20identity%20is%20how%20you%20are%20uniquely%20identified%20in%20your%20organization%20and%20ultimately%20how%20you%20authenticate%20to%20access%20your%20organization%E2%80%99s%20data.%26nbsp%3B%20An%20identity%20could%20be%20a%20member%20within%20your%20organization%20or%20a%20guest%20like%20a%20contractor%2Fvendor.%26nbsp%3B%20During%20the%20second%20article%20in%20this%20blog%20series%20we%20will%20focus%20on%20identity%20security%20and%20review%20the%20below%20topics%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EConditional%20Access%3CUL%3E%0A%3CLI%3EUsing%20conditional%20access%20we%20can%20enforce%20specific%20access%20conditions%20for%20corporate%20users%2C%20contractors%2C%20guests%2C%20company-owned%20devices%2C%20BYODs%20and%20more.%20Examples%20may%20be%20to%20enforce%20MFA%2C%20review%20of%20terms%20of%20use%2C%20block%20access%20from%20specific%20countries%20or%20give%20a%20limited%20browser%20only%20view%20when%20on%20a%20BYOD.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EPassword-less%20Authentication%3CUL%3E%0A%3CLI%3EGo%20beyond%20insecure%20passwords%20and%20enforce%20FIDO2%20authentication%20with%20security%20key%20tokens%20or%20using%20the%20Microsoft%20Authenticator%20app.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDevices%3A%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYour%20device%20is%20where%20you%20access%20your%20application%20and%20your%20data.%26nbsp%3B%20Whether%20this%20is%20a%20corporate-owned%20device%20or%20a%20personal%20device%3B%20there%20must%20be%20security%20in%20place%20to%20protect%20what%20is%20on%20that%20device.%26nbsp%3B%20During%20the%20third%20article%20in%20this%20blog%20series%20we%20will%20focus%20on%20device%20security%20and%20review%20the%20below%20topics%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EMicrosoft%20Endpoint%20Manager%3CUL%3E%0A%3CLI%3EUsing%20Endpoint%20Manager%20we%20can%20enroll%20devices%20into%20Intune%20for%20device%20management%20as%20a%20fully%20managed%20corporate%20device%20or%20as%20an%20enrolled%20work%20profile.%20This%20allows%20for%20management%20of%20the%20device%20security%20like%20BitLocker%20encryption%2C%20user%20restrictions%2C%20device%20compliance%2C%20and%20deployment%20of%20access%20resources%20needed%2C%20such%20as%20certificates%20or%20VPN%20profiles.%26nbsp%3B%20Remote%20management%20of%20the%20devices%20also%20allows%20for%20response%20actions%20like%20device%20wipe%2C%20corporate%20data%20only%20wipe%2C%20virus%20scan%20and%20passcode%20resets.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20ATP%3CUL%3E%0A%3CLI%3EUsing%20Microsoft%20Defender%20ATP%2C%20across%20Windows%20and%20macOS%2C%20we%20can%20extend%20the%20built-in%20Microsoft%20Defender%20Antivirus%20and%20provide%20first%20in%20class%20endpoint%20detection%20and%20response.%20Additionally%2C%20cloud%20machine%20learning%20and%20dynamic%20sandbox%20technology%20can%20be%20used%20to%20provide%20real-time%20protection%20against%20zero-day%20attacks%20as%20they%20launch%20on%20your%20desktop.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EApps%3A%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYour%20applications%20are%20where%20you%20interact%20with%20data.%26nbsp%3B%20This%20can%20be%20through%20platforms%20like%20Windows%2C%20Mac%2C%20iOS%20or%20Android%20devices%20while%20using%20applications%20like%20Office%20ProPlus%20or%20Microsoft%20Edge%20browser.%26nbsp%3B%20During%20the%20fourth%20article%20in%20this%20blog%20series%20we%20will%20focus%20on%20application%20security%20and%20review%20the%20below%20areas%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EMicrosoft%20Endpoint%20Manager%3CUL%3E%0A%3CLI%3EUsing%20Endpoint%20Manager%20we%20can%20enforce%20policies%20on%20applications%20when%20a%20corporate%20account%20is%20signed%20into%20them.%20This%20allows%20for%20a%20less%20restrictive%20security%20stance%20for%20BYODs%20where%20you%20don%E2%80%99t%20want%20to%20manage%20the%20device%2C%20but%20instead%20want%20to%20ensure%20you%20corporate%20data%20doesn%E2%80%99t%20get%20accessed%20or%20moved%20to%20an%20insecure%20area%20on%20a%20personal%20device.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Cloud%20App%20Security%3CUL%3E%0A%3CLI%3EUsing%20MCAS%20you%20can%20prevent%2Fblock%20integration%20with%20third-party%20apps%20that%20may%20be%20considered%20risky%20or%20non-sanctioned.%20Through%20these%20policies%2C%20we%20can%20also%20create%20remediation%20actions%20when%20specific%20apps%20are%20interacted%20with.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EData%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYour%20data%20is%20where%20you%20may%20have%20sensitive%20information%20related%20to%20individuals%20at%20your%20organization%2C%20confidential%20proprietary%20processes%2C%20or%20information%20related%20to%20your%20customers.%26nbsp%3B%20This%20data%20may%20be%20stored%20in%20the%20Office%20365%20cloud%2C%20on%20devices%20or%20shared%20with%20external%20users%20through%20third-party%20solutions.%26nbsp%3B%20During%20the%20fifth%20article%20in%20this%20blog%20series%20we%20will%20focus%20on%20data%20security%20and%20review%20the%20below%20areas%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EAzure%20Information%20Protection%3CUL%3E%0A%3CLI%3ESensitivity%20Labels%20(Unified%20AIP%20Labeling)%20provides%20persistent%20protection%20of%20files%20and%20emails%20so%20no%20matter%20where%20they%20go%20only%20the%20individuals%20that%20have%20the%20specific%20rights%20to%20access%20them%20can.%20AES%20256-bit%20encryption%20is%20used%20to%20enforce%20rights%20management%20both%20internal%20users%20and%20external%20users%20plus%20markings%20like%20watermarks%20can%20be%20applied%20based%20on%20content%20and%20document%20type.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Cloud%20App%20Security%3CUL%3E%0A%3CLI%3EUsing%20MCAS%20you%20can%20create%20policies%20that%20provide%20real-time%20scanning%20for%20sensitive%20information%2C%20monitor%20risky%20transferring%20of%20data%2C%20or%20monitor%20stale%20external%20sharing%20to%20take%20automated%20remediation%20actions.%20Remediation%20actions%20like%20notifications%20by%20email%2FSMS%2FPower%20Automate%20Flow%2C%20expire%20sign-in%20token%2C%20block%20sign-in%20or%20remove%20access%20to%20files%20from%20guests%20after%20a%20time%20period%20of%20inactivity.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAfter%20taking%20a%20deep%20dive%20into%20each%20of%20the%20four%20pillars%20of%20security%2C%20there%20will%20be%20a%20sixth%20conclusion%20article%20that%20showcases%20the%20integration%20of%20the%20Microsoft%20365%20security%20stack%20and%20how%20it%20provides%20increased%20security%20posture%20for%20both%20the%20Microsoft%20eco-system%20and%20when%20working%20with%20third-party%20solutions.%3C%2FP%3E%0A%3CP%3EWith%20that%20said%2C%20please%20ensure%20your%20seat%20belt%20is%20fastened%20tightly%20and%20get%20ready%20for%20an%20exciting%20journey%20into%20the%20holistic%20approach%20to%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack!%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1147793%22%20slang%3D%22en-US%22%3E%3CP%3EJoin%20the%20Holistic%20cloud%20protection%20with%20the%20M365%20security%20stack%20series%20overview%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1147793%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EJamesKey%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

 

Welcome everyone!  My name is James Key and I’ll be your guide as we take a journey through the possibilities of holistic cloud protection with the Microsoft 365 security stack.  I am a Premier Field Engineer at Microsoft who specializes in Microsoft 365 security and compliance.  During my four years I have been blessed to work for an amazing organization and alongside a stellar group of colleagues.  My passion is security and compliance, so I joke constantly about having the best job in the world where I get paid to have fun each day.  Security at each organization is a unique puzzle where you have different technologies, infrastructure, people and processes that make implementing security like trying to solve a Rubik Cube.

 

As organizations continue to migrate to the cloud it is imperative that everyone understand how to provide modern security against constantly evolving threats.  Data stored in the cloud has become one of the most important assets of an organization and protecting it is key.  Malicious threats can come from many different sources and having a holistic approach will increase your overall security posture.

 

During this six-part blog series, we will take a journey around how to protect your organization using the Microsoft 365 security stack as we deep dive into the four pillars of security, each with their own separate article.

 

The goal of this series is to provide a comprehensive security overview and show how the integration of security features within the Microsoft 365 security stack provide holistic security within the Microsoft eco-system and when interacting with third party solutions.  The four pillars that we will discuss are:

 

Identity (Click here for Part II of series):

Your identity is how you are uniquely identified in your organization and ultimately how you authenticate to access your organization’s data.  An identity could be a member within your organization or a guest like a contractor/vendor.  During the second article in this blog series we will focus on identity security and review the below topics:

  1. Conditional Access
    • Using conditional access we can enforce specific access conditions for corporate users, contractors, guests, company-owned devices, BYODs and more. Examples may be to enforce MFA, review of terms of use, block access from specific countries or give a limited browser only view when on a BYOD.
  2. Password-less Authentication
    • Go beyond insecure passwords and enforce FIDO2 authentication with security key tokens or using the Microsoft Authenticator app.

 

Devices: (Click here for Part III of the series)

Your device is where you access your application and your data.  Whether this is a corporate-owned device or a personal device; there must be security in place to protect what is on that device.  During the third article in this blog series we will focus on device security and review the below topics:

  1. Microsoft Endpoint Manager
    • Using Endpoint Manager we can enroll devices into Intune for device management as a fully managed corporate device or as an enrolled work profile. This allows for management of the device security like BitLocker encryption, user restrictions, device compliance, and deployment of access resources needed, such as certificates or VPN profiles.  Remote management of the devices also allows for response actions like device wipe, corporate data only wipe, virus scan and passcode resets.
  2. Microsoft Defender ATP
    • Using Microsoft Defender ATP, across Windows and macOS, we can extend the built-in Microsoft Defender Antivirus and provide first in class endpoint detection and response. Additionally, cloud machine learning and dynamic sandbox technology can be used to provide real-time protection against zero-day attacks as they launch on your desktop.

 

Apps: (Click here for Part IV of the series)

Your applications are where you interact with data.  This can be through platforms like Windows, Mac, iOS or Android devices while using applications like Office ProPlus or Microsoft Edge browser.  During the fourth article in this blog series we will focus on application security and review the below areas:

  1. Microsoft Endpoint Manager
    • Using Endpoint Manager we can enforce policies on applications when a corporate account is signed into them. This allows for a less restrictive security stance for BYODs where you don’t want to manage the device, but instead want to ensure you corporate data doesn’t get accessed or moved to an insecure area on a personal device.
  2. Microsoft Cloud App Security
    • Using MCAS you can prevent/block integration with third-party apps that may be considered risky or non-sanctioned. Through these policies, we can also create remediation actions when specific apps are interacted with.

 

Data: (Click here for Part V of the series)

Your data is where you may have sensitive information related to individuals at your organization, confidential proprietary processes, or information related to your customers.  This data may be stored in the Office 365 cloud, on devices or shared with external users through third-party solutions.  During the fifth article in this blog series we will focus on data security and review the below areas:

  1. Azure Information Protection
    • Sensitivity Labels (Unified AIP Labeling) provides persistent protection of files and emails so no matter where they go only the individuals that have the specific rights to access them can. AES 256-bit encryption is used to enforce rights management both internal users and external users plus markings like watermarks can be applied based on content and document type.
  2. Microsoft Cloud App Security
    • Using MCAS you can create policies that provide real-time scanning for sensitive information, monitor risky transferring of data, or monitor stale external sharing to take automated remediation actions. Remediation actions like notifications by email/SMS/Power Automate Flow, expire sign-in token, block sign-in or remove access to files from guests after a time period of inactivity.

 

After taking a deep dive into each of the four pillars of security, there will be a sixth conclusion article that showcases the integration of the Microsoft 365 security stack and how it provides increased security posture for both the Microsoft eco-system and when working with third-party solutions.

With that said, please ensure your seat belt is fastened tightly and get ready for an exciting journey into the holistic approach to cloud protection with the Microsoft 365 security stack!

 

1 Comment
Respected Contributor

Can you provide any information about how Confidential Computing resources will relate to the stack described in this series?