Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1302571%22%20slang%3D%22en-US%22%3EA%20Journey%20to%20Holistic%20Cloud%20Protection%20with%20the%20Microsoft%20365%20Security%20Stack%20Part%204%20-%20Apps%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1302571%22%20slang%3D%22en-US%22%3E%3CP%3EFor%20our%20third%20stop%20on%20the%20journey%20to%20holistic%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack%20we%20will%20be%20discussing%20%3CSTRONG%3EApplication%20%3C%2FSTRONG%3Esecurity.%26nbsp%3B%20%3CEM%3EFor%20anyone%20new%20joining%20us%20on%20this%20journey%20please%20ensure%20you%20check%20out%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpremier-field-engineering%2Fa-journey-to-holistic-cloud-protection-with-the-microsoft-365%2Fba-p%2F1147793%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CEM%3EPart%20I%3A%20Overview%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%2C%20%26nbsp%3B%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpremier-field-engineering%2Fa-journey-to-holistic-cloud-protection-with-the-microsoft-365%2Fba-p%2F1191669%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CEM%3EPart%20II%3A%20Identity%20Security%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%20and%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpremier-field-engineering%2Fa-journey-to-holistic-cloud-protection-with-the-microsoft-365%2Fba-p%2F1264557%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3E%3CEM%3EPart%20III%3A%20Device%20Security%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%20to%20get%20caught%20up%20prior%20to%20reading%20Part%20IV%3A%20Application%20Security%20which%20will%20be%20discussed%20during%20this%20article.%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20technology%20advances%20at%20light%20speed%20so%20does%20the%20transition%20from%20corporate%20provided%20devices%20to%20using%20your%20personal%20device%20as%20your%20work%20device.%26nbsp%3B%20Managing%20the%20use%20of%20corporate%20accounts%20through%20applications%20on%20personal%20devices%20has%20become%20a%20significant%20security%20concern.%26nbsp%3B%20Along%20the%20same%20lines%20we%20have%20individuals%20using%20their%20work%20accounts%20to%20authenticate%20with%20potentially%20non-approved%20cloud%20apps%20that%20then%20gain%20access%20through%20acceptance%20of%20permissions%20to%20corporate%20data.%26nbsp%3B%20During%20this%20article%20we%20will%20focus%20on%20increasing%20the%20security%20posture%20around%20application%20security%20from%20unmanaged%20personal%20devices%20and%20discovering%20what%20cloud%20apps%20are%20being%20provided%20access%20to%20corporate%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMicrosoft%20Endpoint%20Manager%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%3EWhat%20are%20the%20approved%20protected%20apps%20used%20for%20corporate%20access%20to%20cloud%20resources%3F%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%3EHow%20do%20you%20separate%20corporate%20data%20from%20personal%20data%3F%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CEM%3EHow%20do%20you%20apply%20security%20baselines%20to%20a%20device%20you%20don%E2%80%99t%20own%20or%20manage%3F%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20above%20are%20frequently%20asked%20questions%20that%20organizations%20must%20consider%20when%20seeking%20to%20increase%20their%20overall%20security%20posture%20while%20also%20maintaining%20a%20productive%20and%20accessible%20work%20environment.%26nbsp%3B%20These%20concerns%20can%20be%20remedied%20by%20using%20a%20combination%20of%20Microsoft%20Endpoint%20Manger%20application%20protection%20polices%20and%20integration%20with%20Azure%20AD%20conditional%20access.%26nbsp%3B%20As%20a%20result%20of%20using%20both%20you%20can%20provide%20a%20standardized%20method%20of%20access%20to%20corporate%20data%2C%20ensure%20data%20protection%2C%20and%20ultimately%20allow%20individuals%20to%20use%20their%20personal%20devices%20rather%20than%20have%20a%20second%20corporate%20device.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIssue%20%231%3A%20%3C%2FSTRONG%3E-%20%3CSTRONG%3EUnmanaged%20device%20where%20corporate%20data%20mingles%20with%20personal%20data%3C%2FSTRONG%3E%20%E2%80%93%20Allowing%20individuals%20to%20use%20a%20personal%20device%20can%20drastically%20reduce%20cost%20by%20removing%20device%20purchasing%2C%20maintenance%20and%20potential%20replacement.%26nbsp%3B%20At%20the%20same%20time%20you%20don%E2%80%99t%20want%20corporate%20data%20being%20backed%20up%20to%20personal%20cloud%20storage%2C%20downloaded%20locally%20or%20intermingled%20with%20personal%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EApp%20Protection%20policies%3C%2FA%3E%20for%20iOS%20and%20Android%20allow%20us%20to%20containerize%20corporate%20data%20from%20personal%20along%20with%20providing%20a%20baseline%20of%20security%20settings%20against%20the%20applications%20rather%20than%20the%20device.%26nbsp%3B%20This%20allows%20us%20to%20manage%20the%20corporate%20data%20by%20targeting%20the%20corporate%20account%20created%20in%20the%20protected%20app%20on%20unmanaged%20personal%20devices%20and%20also%20on%20managed%20devices%20equally.%26nbsp%3B%20Available%20protected%20apps%20span%20through%20most%20Microsoft%20apps%20along%20with%20many%20third%20party%20apps%20like%20Adobe%20Reader%2C%20Zoom%20for%20Intune%2C%20Box%20EMM%2C%20and%20Nine%20Work%20for%20Intune.%26nbsp%3B%20You%20can%20even%20incorporate%20with%20your%20custom%20built%20apps%20using%20the%20publicly%20available%20Intune%20SDK.%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EData%3C%2FSTRONG%3E%20%3CSTRONG%3EProtection%3C%2FSTRONG%3E%3CUL%3E%0A%3CLI%3EBlock%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-android%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAndroid%20back%20up%3C%2FA%3E%20or%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-ios%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EiOS%20iTunes%20backup%3C%2FA%3E%20of%20the%20corporate%20account%3C%2FLI%3E%0A%3CLI%3ERestrict%20cut%2C%20copy%20and%20paste%20to%20a%20non-protected%20app%20account%3C%2FLI%3E%0A%3CLI%3ERestrict%20web%20content%20transfer%20unless%20through%20a%20managed%20browser%20(Microsoft%20Edge)%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EAccess%3C%2FSTRONG%3E%20%3CSTRONG%3ERequirements%3C%2FSTRONG%3E%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-ios%23access-requirements%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ERequire%20a%20PIN%3C%2FA%3E%20when%20access%20the%20protected%20app%20with%20corporate%20account%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-android%23access-requirements%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEnforce%20strength%20of%20the%20PIN%3C%2FA%3E%20used%20to%20access%20the%20protected%20app%20with%20corporate%20account%3C%2FLI%3E%0A%3CLI%3EDefine%20minutes%20of%20inactivity%20before%20recheck%20is%20required%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EConditional%3C%2FSTRONG%3E%20%3CSTRONG%3ELaunch%3C%2FSTRONG%3E%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-android%23conditional-launch%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDefine%20the%20maximum%20PIN%20attempts%3C%2FA%3E%20before%20PIN%20reset%20required%20or%20corporate%20data%20wipe%3C%2FLI%3E%0A%3CLI%3EDefine%20minimum%20app%20version%20before%20warning%20to%20update%20app%3C%2FLI%3E%0A%3CLI%3EDefine%20minimum%20app%20version%20before%20access%20to%20app%20is%20blocked%20or%20corporate%20data%20wipe%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIssue%20%232%3A%20%3C%2FSTRONG%3E-%20%3CSTRONG%3EAn%20employee%20is%20let%20go%E2%80%A6%20I%20need%20to%20wipe%20corporate%20data%E2%80%A6%20the%20device%20is%20offline%E2%80%A6%3C%2FSTRONG%3E%20-%20With%20mobile%20devices%20you%20have%20the%20option%20to%20send%20a%20wipe%20command%20to%20factory%20wipe%20the%20device%20(managed)%20or%20selective%20wipe%20(managed%2Funmanaged)%20to%20remove%20corporate%20data%20if%20the%20device%20is%20online%20to%20receive%20the%20wipe%20request.%26nbsp%3B%20The%20question%20then%20arises%2C%20what%20happens%20if%20the%20device%20is%20placed%20into%20airplane%20mode%20in%20an%20attempt%20to%20keep%20the%20data%20as%20long%20as%20possible%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20App%20Protection%20policies%20for%20iOS%20and%20Android%20have%20a%20unique%20conditional%20launch%20setting%20called%2C%20Offline%20Grace%20Period.%26nbsp%3B%20This%20setting%20only%20triggers%20when%20the%20application%20is%20unable%20to%20connect%20back%20to%20Endpoint%20manager%20to%20verify%20connectivity.%26nbsp%3B%20This%20setting%20ultimately%20ensures%20that%20access%20to%20the%20corporate%20data%20will%20be%20removed%20and%2For%20wiped%20from%20the%20device%20if%20it%20unable%20to%20connect%20for%20a%20specific%20time%20frame.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-ios%23conditional-launch%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffline%20grace%20period%20(mins)%3C%2FA%3E%20-%20When%20the%20time%20frame%20in%20minutes%20ends%20you%20can%20block%20access%20to%20the%20app%20which%20forces%20them%20out%20of%20it%2C%20even%20while%20actively%20using%20it%2C%20and%20requires%20the%20individual%20to%20re-enter%20the%20PIN%20or%20authenticate.%26nbsp%3B%20This%20ultimately%20forces%20them%20to%20reconnect%20to%20the%20internet%20to%20do%20so.%3C%2FLI%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-ios%23conditional-launch%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffline%20grace%20period%20(days)%3C%2FA%3E%20-%20When%20the%20time%20frame%20in%20days%20ends%20you%20can%20perform%20a%20selective%20wipe%20of%20all%20corporate%20accounts%20from%20the%20protected%20apps%20defined%20in%20the%20policy.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIssue%20%233%3C%2FSTRONG%3E%3A%20-%20%3CSTRONG%3EThere%20are%20too%20many%20email%20apps%20connecting%20with%20no%20standardization%E2%80%A6%3C%2FSTRONG%3E%20-%20With%20a%20mix%20of%20individuals%20using%20a%20native%20email%20apps%2C%20third%20party%20email%20apps%20or%20the%20Outlook%20app%E2%80%A6%20there%20really%20isn%E2%80%99t%20a%20standard%20in%20most%20organizations.%26nbsp%3B%20Each%20type%20of%20email%20app%20has%20its%20own%20security%20concerns%20like%20authentication%20(basic%20vs%20modern)%2C%20data%20separation%20(corporate%20vs%20personal)%2C%20or%20how%20to%20ensure%20data%20is%20removed%20remotely.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20By%20integrating%20your%20app%20protection%20policies%20with%20Azure%20AD%20Conditional%20Access%20you%20can%20enforce%20all%20connections%20to%20Exchange%20Online%20to%20go%20through%20an%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Factive-directory%2Fconditional-access%2Fconcept-conditional-access-grant%23require-approved-client-app%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eapproved%20app%3C%2FA%3E%20which%20is%20the%20Outlook%20app.%26nbsp%3B%20Once%20this%20is%20enabled%20you%20can%20then%20apply%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmem%2Fintune%2Fapps%2Fapp-protection-policy-settings-ios%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eapp%20protection%20policies%3C%2FA%3E%20to%20protect%20and%20govern%20the%20use%20of%20corporate%20data%20on%20the%20mobile%20devices.%26nbsp%3B%20This%20integration%20allows%20for%20standardization%20of%20email%20access%20using%20modern%20authentication%20along%20with%20applying%20a%20baseline%20of%20security%20settings%20against%20the%20Outlook%20app.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMicrosoft%20Cloud%20App%20Security%20(MCAS)%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3CP%3EVisibility%20and%20understanding%20around%20what%20cloud%20apps%20are%20being%20connected%20to%2C%20including%20those%20that%20are%20unknown%20or%20under%20no%20jurisdiction%20commonly%20known%20as%20Shadow%20IT%2C%20poses%20a%20significant%20security%20concern%20for%20many%20organizations.%26nbsp%3B%20Not%20knowing%20what%20you%20don%E2%80%99t%20know%20is%20no%20longer%20an%20excuse.%26nbsp%3B%20Using%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fwhat-is-cloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%20can%20address%20many%20security%20concerns%20including%20those%20specific%20to%20discovery%20of%20cloud%20apps%20being%20used%20within%20your%20corporate%20environment%2C%20determine%20which%20are%20sanctioned%20or%20banned%20and%20ultimately%20be%20alerted%20on%20specific%20scenarios%20involving%20cloud%20app%20activity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIssue%20%231%3A%20%3C%2FSTRONG%3E-%20%3CSTRONG%3EWhich%20cloud%20apps%20are%20safe%3F%20Which%20are%20risky%3F%26nbsp%3B%20There%20are%20too%20many%20to%20research%E2%80%A6%20%3C%2FSTRONG%3E-%20With%20an%20astronomical%20number%20of%20cloud%20apps%20available%20that%20are%20continuous%20changing%2C%20it%20is%20very%20difficult%20to%20be%20a%20security%2Fgovernance%20expert%20at%20them%20all.%26nbsp%3B%20When%20was%20the%20last%20time%20one%20of%20the%20apps%20was%20breached%3F%26nbsp%3B%20Which%20ones%20are%20compliant%20for%20your%20industries%20regulations%3F%26nbsp%3B%20Which%20ones%20don't%20have%20basic%20security%20requirements%20that%20you%20deem%20as%20mandatory%20for%20doing%20business%20with%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20Using%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Frisk-score%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECloud%20App%20Catalog%3C%2FA%3E%2C%20you%20are%20able%20to%20review%20over%2016%2C000%20cloud%20apps%20to%20determine%20whither%20they%20should%20be%20sanctioned%20or%20banned%20for%20corporate%20use.%26nbsp%3B%20Below%20you%20can%20see%20the%20information%20categories%20provided%20along%20with%20a%20small%20subset%20of%20verified%20information%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EGeneral%3A%3CUL%3E%0A%3CLI%3EFounded%20date%2C%26nbsp%3B%20disaster%20recovery%20plan%2C%20and%20link%20to%20terms%20of%20use%20plus%20privacy%20policy%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3ESecurity%3A%3CUL%3E%0A%3CLI%3ELast%20breach%2C%20penetration%20testing%2C%20data%20audit%20trail%2C%20allows%20MFA%2C%20and%20encryption%20protocol%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3ECompliance%3A%3CUL%3E%0A%3CLI%3EISO%2027001%2F27002%2F27017%2F27018%2C%20SOC%202%2F3%2C%20FINRA%2C%20HIPAA%2C%20FedRAMP%20and%20HITRUST%20CSF%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3CLI%3ELegal%3A%3CUL%3E%0A%3CLI%3EGDPR%2C%20DMCA%2C%20Data%20retention%20policy%20and%20Data%20ownership%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EIssue%20%232%3A%20%3C%2FSTRONG%3E-%20%3CSTRONG%3EHow%20to%20manage%20OAuth%20app%20permissions%20being%20accepted%20by%20individuals%3F%3C%2FSTRONG%3E%20-%20Remember%20the%20last%20time%20you%20downloaded%20a%20new%20app%20on%20your%20mobile%20device%2C%20and%20it%20asked%20for%20your%20permission%20to%20access%20your%20contacts%20and%20camera%3F%26nbsp%3B%20By%20default%20individuals%20in%20your%20organization%20can%20connect%20their%20Office%20365%20account%20to%20third%20party%20apps%20and%20accept%20the%20permission%20request%20so%20the%20app%20can%20be%20granted%20permission%20to%20read%2Fact%20in%20your%20Office%20365%20environment.%26nbsp%3B%20This%20means%20some%20app%20might%20be%20able%20to%20read%20emails%20of%20the%20individual%2C%20read%20their%20Office%20365%20user%20profile%20or%20even%20make%20changes%20in%20all%20of%20the%20SharePoint%20Online%20sites.%26nbsp%3B%20Pretty%20scary%20stuff%20right%3F!%3F!%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESolution%3A%26nbsp%3B%20%3C%2FSTRONG%3EFirst%20off%2C%20we%20need%20to%20stop%20the%20bleeding%20and%20block%20individuals%20from%20accepting%20OAuth%20app%20permissions%20on%20behalf%20of%20the%20organization.%26nbsp%3B%20This%20can%20be%20done%20by%20going%20into%20the%20Office%20365%20Admin%20Center%2C%20selecting%20Settings%20and%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fadmin%2Fmisc%2Fintegrated-apps%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Efinding%20Integrated%20Apps%3C%2FA%3E.%26nbsp%3B%20This%20feature%20needs%20to%20be%20unchecked%20which%20will%20prevent%20individuals%20in%20the%20future%20from%20accepting%20the%20app%20permissions%20on%20behalf%20of%20the%20organization%20and%20require%20an%20administrator%20to%20approve%20the%20app.%26nbsp%3B%20For%20all%20the%20damage%20already%20done%20up%20to%20this%20point%2C%20you%20can%20access%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fmanage-app-permissions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOAuth%20Apps%3C%2FA%3E%20section%20in%20Microsoft%20Cloud%20App%20Security%20to%20review%20which%20apps%20have%20been%20approved%2C%20what%20permissions%20were%20granted%20and%20ban%20the%20app%20if%20you%20want%20to%20block%20access%20using%20the%20corporate%20account%20going%20forward.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EIssue%20%233%3A%20%3C%2FSTRONG%3E-%20Need%20alerts%20for%20OAuth%20apps%20when%20specific%20scenarios%20occur%20-%20A%20new%20storage%20cloud%20app%20is%20released%2C%20and%20parts%20of%20the%20organization%20began%20using%20it%20without%20any%20concern%20for%20security%20or%20data%20protection%E2%80%A6%26nbsp%3B%20A%20productivity%20cloud%20app%20includes%20an%20additional%20concerning%20permission%20requirement%20in%20the%20latest%20release%E2%80%A6%20A%20new%20cloud%20app%20releases%2C%20but%20with%20a%20misleading%20name%20or%20description%E2%80%A6%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESolution%3C%2FSTRONG%3E%3A%20Utilizing%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fapp-permission-policy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOAuth%20app%20policies%3C%2FA%3E%20we%20can%20address%20these%20security%20concerns%20along%20with%20many%20others%20when%20it%20comes%20to%20discoverability%20of%20OAuth%20app%20connections%2C%20usage%20by%20the%20organization%20and%20allow%20for%20revoking%2Fbanning%20of%20the%20OAuth%20app%20permission%20if%20specific%20concerning%20scenarios%20arise.%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EAlerting%20or%20revoking%20if%20an%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fapp-permission-policy%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOAuth%20app%20permission%3C%2FA%3E%20is%20discovered%20that%20heightened%20permission%20level%20requirement%20or%20requires%20a%20specific%20permission%20you%20deem%20as%20unsafe.%3C%2FLI%3E%0A%3CLI%3EAlerting%20when%20a%20new%20or%20existing%20OAuth%20app%20permission%20is%20granted%20by%20a%20specific%20number%20of%20individuals.%3C%2FLI%3E%0A%3CLI%3EAlert%20based%20on%20telemetry%20from%20Microsoft%20Threat%20Intelligence%20related%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fapp-permission-policy%23oauth-app-anomaly-detection-policies%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOAuth%20app%20anomaly%20detection%3C%2FA%3E%20where%20there%20may%20be%20a%20misleading%20OAuth%20app%20name%2C%20publisher%E2%80%99s%20name%20or%20app%20consent%20where%20malicious%20attempts%20like%20a%20phishing%20campaign%20might%20exist.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20we%20get%20ready%20to%20look%20towards%20our%20next%20adventure%20in%20our%20journey%20to%20holistic%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack%E2%80%A6%20I%20want%20to%20reflect%20on%20the%20importance%20of%20application%20security.%26nbsp%3B%20Our%20security%20posture%20is%20only%20as%20good%20as%20what%20we%20can%20see%20and%20what%20we%20know.%26nbsp%3B%20Microsoft%20Cloud%20App%20Security%20provides%20extensive%20visibility%20into%20the%20unknown%20and%20provides%20actionable%20governance%20that%20can%20be%20applied%20when%20unsafe%20scenarios%20arise.%26nbsp%3B%20As%20more%20personal%20devices%20intertwine%20with%20corporate%20data%20we%20must%20also%20ensure%20that%20data%20separation%20exist%20and%20provide%20a%20baseline%20of%20security%20against%20devices%20that%20we%20are%20not%20able%20to%20manage%20from%20a%20device%20management%20standpoint.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThank%20you%20so%20much%20for%20joining%20me%20during%20this%20stop%20while%20we%20discussed%20application%20security.%26nbsp%3B%20Our%20next%20stop%20in%20this%20journey%20will%20be%20discussing%20%3CSTRONG%3EData%3C%2FSTRONG%3E%26nbsp%3B%3CSTRONG%3ESecurity%3C%2FSTRONG%3E%20and%20how%20to%20increase%20our%20security%20posture%20when%20creating%2C%20storing%20and%20sharing%20corporate%20data%20using%20the%20Microsoft%20365%20security%20stack.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1302571%22%20slang%3D%22en-US%22%3E%3CP%3EPart%204%20-%20Apps-%20Holistic%20cloud%20protection%20with%20the%20Microsoft%20365%20security%20stack%20blog%20series%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1302571%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EJamesKey%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

For our third stop on the journey to holistic cloud protection with the Microsoft 365 security stack we will be discussing Application security.  For anyone new joining us on this journey please ensure you check out Part I: Overview,  Part II: Identity Security and Part III: Device Security to get caught up prior to reading Part IV: Application Security which will be discussed during this article.

 

As technology advances at light speed so does the transition from corporate provided devices to using your personal device as your work device.  Managing the use of corporate accounts through applications on personal devices has become a significant security concern.  Along the same lines we have individuals using their work accounts to authenticate with potentially non-approved cloud apps that then gain access through acceptance of permissions to corporate data.  During this article we will focus on increasing the security posture around application security from unmanaged personal devices and discovering what cloud apps are being provided access to corporate data.

 

Microsoft Endpoint Manager:

What are the approved protected apps used for corporate access to cloud resources?

How do you separate corporate data from personal data?

How do you apply security baselines to a device you don’t own or manage?

 

The above are frequently asked questions that organizations must consider when seeking to increase their overall security posture while also maintaining a productive and accessible work environment.  These concerns can be remedied by using a combination of Microsoft Endpoint Manger application protection polices and integration with Azure AD conditional access.  As a result of using both you can provide a standardized method of access to corporate data, ensure data protection, and ultimately allow individuals to use their personal devices rather than have a second corporate device.

 

Issue #1: - Unmanaged device where corporate data mingles with personal data – Allowing individuals to use a personal device can drastically reduce cost by removing device purchasing, maintenance and potential replacement.  At the same time you don’t want corporate data being backed up to personal cloud storage, downloaded locally or intermingled with personal data.

 

Solution: App Protection policies for iOS and Android allow us to containerize corporate data from personal along with providing a baseline of security settings against the applications rather than the device.  This allows us to manage the corporate data by targeting the corporate account created in the protected app on unmanaged personal devices and also on managed devices equally.  Available protected apps span through most Microsoft apps along with many third party apps like Adobe Reader, Zoom for Intune, Box EMM, and Nine Work for Intune.  You can even incorporate with your custom built apps using the publicly available Intune SDK.

  • Data Protection
    • Block Android back up or iOS iTunes backup of the corporate account
    • Restrict cut, copy and paste to a non-protected app account
    • Restrict web content transfer unless through a managed browser (Microsoft Edge)
  • Access Requirements
    • Require a PIN when access the protected app with corporate account
    • Enforce strength of the PIN used to access the protected app with corporate account
    • Define minutes of inactivity before recheck is required
  • Conditional Launch
    • Define the maximum PIN attempts before PIN reset required or corporate data wipe
    • Define minimum app version before warning to update app
    • Define minimum app version before access to app is blocked or corporate data wipe

 

Issue #2: - An employee is let go… I need to wipe corporate data… the device is offline… - With mobile devices you have the option to send a wipe command to factory wipe the device (managed) or selective wipe (managed/unmanaged) to remove corporate data if the device is online to receive the wipe request.  The question then arises, what happens if the device is placed into airplane mode in an attempt to keep the data as long as possible?

 

Solution: App Protection policies for iOS and Android have a unique conditional launch setting called, Offline Grace Period.  This setting only triggers when the application is unable to connect back to Endpoint manager to verify connectivity.  This setting ultimately ensures that access to the corporate data will be removed and/or wiped from the device if it unable to connect for a specific time frame.

  1. Offline grace period (mins) - When the time frame in minutes ends you can block access to the app which forces them out of it, even while actively using it, and requires the individual to re-enter the PIN or authenticate.  This ultimately forces them to reconnect to the internet to do so.
  2. Offline grace period (days) - When the time frame in days ends you can perform a selective wipe of all corporate accounts from the protected apps defined in the policy.

 

Issue #3: - There are too many email apps connecting with no standardization… - With a mix of individuals using a native email apps, third party email apps or the Outlook app… there really isn’t a standard in most organizations.  Each type of email app has its own security concerns like authentication (basic vs modern), data separation (corporate vs personal), or how to ensure data is removed remotely.

 

Solution: By integrating your app protection policies with Azure AD Conditional Access you can enforce all connections to Exchange Online to go through an approved app which is the Outlook app.  Once this is enabled you can then apply the app protection policies to protect and govern the use of corporate data on the mobile devices.  This integration allows for standardization of email access using modern authentication along with applying a baseline of security settings against the Outlook app.

 

Microsoft Cloud App Security (MCAS):

Visibility and understanding around what cloud apps are being connected to, including those that are unknown or under no jurisdiction commonly known as Shadow IT, poses a significant security concern for many organizations.  Not knowing what you don’t know is no longer an excuse.  Using Microsoft Cloud App Security can address many security concerns including those specific to discovery of cloud apps being used within your corporate environment, determine which are sanctioned or banned and ultimately be alerted on specific scenarios involving cloud app activity.

 

Issue #1: - Which cloud apps are safe? Which are risky?  There are too many to research… - With an astronomical number of cloud apps available that are continuous changing, it is very difficult to be a security/governance expert at them all.  When was the last time one of the apps was breached?  Which ones are compliant for your industries regulations?  Which ones don't have basic security requirements that you deem as mandatory for doing business with?

 

Solution: Using the Cloud App Catalog, you are able to review over 16,000 cloud apps to determine whither they should be sanctioned or banned for corporate use.  Below you can see the information categories provided along with a small subset of verified information:

  • General:
    • Founded date,  disaster recovery plan, and link to terms of use plus privacy policy
  • Security:
    • Last breach, penetration testing, data audit trail, allows MFA, and encryption protocol
  • Compliance:
    • ISO 27001/27002/27017/27018, SOC 2/3, FINRA, HIPAA, FedRAMP and HITRUST CSF
  • Legal:
    • GDPR, DMCA, Data retention policy and Data ownership

Issue #2: - How to manage OAuth app permissions being accepted by individuals? - Remember the last time you downloaded a new app on your mobile device, and it asked for your permission to access your contacts and camera?  By default individuals in your organization can connect their Office 365 account to third party apps and accept the permission request so the app can be granted permission to read/act in your Office 365 environment.  This means some app might be able to read emails of the individual, read their Office 365 user profile or even make changes in all of the SharePoint Online sites.  Pretty scary stuff right?!?!?

 

Solution:  First off, we need to stop the bleeding and block individuals from accepting OAuth app permissions on behalf of the organization.  This can be done by going into the Office 365 Admin Center, selecting Settings and finding Integrated Apps.  This feature needs to be unchecked which will prevent individuals in the future from accepting the app permissions on behalf of the organization and require an administrator to approve the app.  For all the damage already done up to this point, you can access the OAuth Apps section in Microsoft Cloud App Security to review which apps have been approved, what permissions were granted and ban the app if you want to block access using the corporate account going forward.

 

Issue #3: - Need alerts for OAuth apps when specific scenarios occur - A new storage cloud app is released, and parts of the organization began using it without any concern for security or data protection…  A productivity cloud app includes an additional concerning permission requirement in the latest release… A new cloud app releases, but with a misleading name or description…

 

Solution: Utilizing OAuth app policies we can address these security concerns along with many others when it comes to discoverability of OAuth app connections, usage by the organization and allow for revoking/banning of the OAuth app permission if specific concerning scenarios arise.

  1. Alerting or revoking if an OAuth app permission is discovered that heightened permission level requirement or requires a specific permission you deem as unsafe.
  2. Alerting when a new or existing OAuth app permission is granted by a specific number of individuals.
  3. Alert based on telemetry from Microsoft Threat Intelligence related to OAuth app anomaly detection where there may be a misleading OAuth app name, publisher’s name or app consent where malicious attempts like a phishing campaign might exist.

 

As we get ready to look towards our next adventure in our journey to holistic cloud protection with the Microsoft 365 security stack… I want to reflect on the importance of application security.  Our security posture is only as good as what we can see and what we know.  Microsoft Cloud App Security provides extensive visibility into the unknown and provides actionable governance that can be applied when unsafe scenarios arise.  As more personal devices intertwine with corporate data we must also ensure that data separation exist and provide a baseline of security against devices that we are not able to manage from a device management standpoint.

 

Thank you so much for joining me during this stop while we discussed application security.  Our next stop in this journey will be discussing Data Security and how to increase our security posture when creating, storing and sharing corporate data using the Microsoft 365 security stack.