Azure Sentinel Cybersecurity Maturity Model Certification (CMMC) Workbook

Published Feb 02 2021 07:00 AM 11.1K Views
Microsoft

The Azure Sentinel CMMC Workbook provides a mechanism for viewing log queries aligned to CMMC controls across the Azure cloud including Microsoft security offerings, Office 365, Teams, Intune, Windows Virtual Desktop and many more. This workbook enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective CMMC requirements and practices. The workbook features 250+ control cards aligned to the 17 CMMC control families across all 5 maturity levels with selectable GUI buttons for navigation.

 

Picture1.gif

 

The workbook helps you to gain better visibility into your cloud architecture from security perspective while reinforcing CMMC principles for building cybersecurity critical thinking skills. The workbook consolidates multiple log sources from your Azure environment:

  • Azure Active Directory
  • Azure Active Directory Identity Protection
  • Azure Activity
  • Azure DDoS Protection
  • Azure Firewall
  • Azure Information Protection
  • Azure Security Center
  • Common Event Format
  • DNS
  • Intune
  • Microsoft 365 Defender
  • Microsoft Cloud App Security
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Identity
  • Office 365
  • Security Events
  • Syslog
  • Threat Intelligence Platforms
  • Windows Firewall
  • Teams
  • User Entity Behavior Analytics
  • Windows Virtual Desktop

What is Cybersecurity Maturity Model Certification (CMMC)?

TJ_Banasik_1-1612221309399.png

 

The US Defense Industrial Base (DIB) is charged with implementing Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012. DFARS requires organizations supporting the Department of Defense (DoD) to implement NIST SP 800-171 and FedRAMP Moderate Impact level controls. DoD has mandated CMMC with periodic assessments because historic self-attestation audits haven’t met the desired impact. CMMC builds upon DFARS 7012 by verifying an organization’s readiness to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) such as International Traffic in Arms Regulation (ITAR) and Export Administration Regulations (EAR) export-controlled data.

 

CMMC extends beyond the parent organization into sub-contractors, partners, and suppliers. The framework is intended to enforce critical thinking approaches for comprehensive security. The CMMC framework specifies 5 levels of maturity measurement from Maturity Level 1 (Basic Cyber Hygiene) to Maturity Level 5 (Proactive & Advanced Cyber Practice). The Certification levels will be determined through audits from independent, third-party assessment organizations (C3PAO). Even if your organization doesn’t require CMMC compliance, the framework provides a useful maturity model assessment framework for building/improving cybersecurity resiliency.  

 

Deploying the Workbook

It is recommended that you have the log sources listed above to get the full benefit of the CMMC Workbook, but the workbook will deploy regardless of your available log sources. Follow the steps below to enable the workbook:

 

Requirements: Azure Sentinel Workspace and Security Reader rights.

1) From the Azure portal, navigate to Azure Sentinel

2) Select Workbooks > Templates

3) Search CMMC and select Save to add to My Workbooks

Navigating the Workbook

The Legend Panel provides a helpful reference for navigating the workbook with respective colors, features, and reference indicators.

 

 

TJ_Banasik_2-1612221309415.png

 

The Guide Toggle is available in the top left of the workbook. This toggle allows you to view panels such as architectural recommendations and guides which will be helpful when you first access the workbook but can be hidden once you’ve grasped respective concepts.

 

The Control Family Ribbon provides a mechanism for navigating to the desired control family. Selecting a control family will display Control Cards in the respective Control Family. The Maturity Level Ribbon drills down further to the desired control maturity level. You can view an index of controls in the workbook if you have the Guide Toggle enabled.

 

Pic2a.gif

 

For example, if you’re interested in viewing Incident Response controls, you can view the Control Family Index to view which controls are covered in the workbook.

 

TJ_Banasik_5-1612221310193.png

 

To drill down into a control of interest such as RM.4.149 (Update Threat Profiles/Adversary Tactics, Techniques, Procedures), select Risk & Recovery Management and Maturity Level 4 which populates all control cards available for that family in Maturity Level 4.

 

Picture3.gif

 

The Azure Sentinel CMMC Workbook displays each control in a Control Card. The Control Card provides respective control details to help you better understand the requirement, view your data, adjust SIEM queries, export artifacts, onboard Microsoft controls, navigate to respective configuration blades, access reference materials, and view correlated compliance frameworks.

 

TJ_Banasik_7-1612221310615.png

 

Use Cases

There are several use cases for the Azure Sentinel CMMC Workbook depending on user roles and requirements. The graphic below shows how a cloud security architect can leverage the workbook to review requirements, reference documentation, make configurations, and export artifacts. There are also several additional use cases where this workbook will be helpful:

  • Security Architect: Build/design a cloud security architecture to compliance requirements.
  • SecOps Analyst: Review activity in query, configure alerts, deploy SOAR automation.
  • IT Pro: Identify performance issues, investigate issues, set alerts for remediation monitoring.
  • Security Engineer: Assess security controls, review alerting thresholds, adjust configurations.
  • Security Manager: Review requirements, analyze reporting, evaluate capabilities, adjust accordingly.

 

TJ_Banasik_8-1612221310651.png

 

Configurations & Troubleshooting

It’s important to note that this workbook provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user and some panels may require additional configurations and query modification for operation. It’s unlikely that all 250+ panels will populate data, but this is expected as panels without data highlight respective areas for evaluation in maturing cybersecurity capabilities. Control Cards without data will display the custom error message below. Most issues are resolved by confirming licensing/availability/health of the log source, confirming the log source is connected to the Sentinel workspace, and adjusting time thresholds for larger data sets. Ultimately this workbook is customer-controlled content, so panels are configurable per customer requirements. You can edit/adjust Control Card queries as follows:

 

  • CMMC Workbook > Edit > Edit Panel > Adjust Panel KQL Query > Save

TJ_Banasik_9-1612221310653.png

 

While using the Microsoft security controls for the CMMC Workbook is recommended, it’s not a set requirement as customers often rely on a multitude of security providers and solutions. Below is a use-case example for adjusting a Control Card to include third party tooling. The default KQL query provides a framework for target data and it is readily adjusted with the desired customer controls/solutions.

 

TJ_Banasik_10-1612221310684.png

 

Microsoft Blog Posts on CMMC

Below are additional resources for learning more about CMMC in the cloud with Microsoft. Let us know if there are additional government compliance frameworks we can help with. Bookmark the Security blog to keep up with our expert coverage on security matters and follow us at @MSFTSecurity or visit our website for the latest news and updates on cybersecurity.

 

 

Disclaimer

The Azure Sentinel CMMC Workbook demonstrates best practice guidance, but Microsoft does not guarantee nor imply compliance. All accreditation requirements and decisions are governed by the CMMC Accreditation Body. This workbook provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user and some panels may require additional configurations and query modification for operation. Recommendations do not imply coverage of respective controls as they are often one of several courses of action for approaching requirements which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective control requirements.

1 Comment
Established Member

The Azure Sentinel CMMC Workbook is fantastic. I am reviewing all of the CMMC Guides and Models documentation and comparing it to the facilities that the CMMC Workbook assists you with. Great facility! 

%3CLINGO-SUB%20id%3D%22lingo-sub-2110524%22%20slang%3D%22en-US%22%3EAzure%20Sentinel%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20Workbook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2110524%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20provides%20a%20mechanism%20for%20viewing%20log%20queries%20aligned%20to%20CMMC%20controls%20across%20the%20Azure%20cloud%20including%20Microsoft%20security%20offerings%2C%20Office%20365%2C%20Teams%2C%20Intune%2C%20Windows%20Virtual%20Desktop%20and%20many%20more.%20This%20workbook%20enables%20Security%20Architects%2C%20Engineers%2C%20SecOps%20Analysts%2C%20Managers%2C%20and%20IT%20Pros%20to%20gain%20situational%20awareness%20for%20the%20security%20posture%20of%20cloud%20workloads.%20There%20are%20also%20recommendations%20for%20selecting%2C%20designing%2C%20deploying%2C%20and%20configuring%20Microsoft%20offerings%20for%20alignment%20with%20respective%20CMMC%20requirements%26nbsp%3Band%20practices.%26nbsp%3BThe%20workbook%20features%20250%2B%20control%20cards%20aligned%20to%20the%2017%20CMMC%20control%20families%20across%20all%205%20maturity%20levels%20with%20selectable%20GUI%20buttons%20for%20navigation.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture1.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251194i0964442E0370715A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture1.gif%22%20alt%3D%22Picture1.gif%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20workbook%20helps%20you%20to%20gain%20better%20visibility%20into%20your%20cloud%20architecture%20from%20security%20perspective%20while%20reinforcing%20CMMC%20principles%20for%20building%20cybersecurity%20critical%20thinking%20skills.%20The%20workbook%20consolidates%20multiple%20log%20sources%20from%20your%20Azure%20environment%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAzure%20Active%20Directory%3C%2FLI%3E%0A%3CLI%3EAzure%20Active%20Directory%20Identity%20Protection%3C%2FLI%3E%0A%3CLI%3EAzure%20Activity%3C%2FLI%3E%0A%3CLI%3EAzure%20DDoS%20Protection%3C%2FLI%3E%0A%3CLI%3EAzure%20Firewall%3C%2FLI%3E%0A%3CLI%3EAzure%20Information%20Protection%3C%2FLI%3E%0A%3CLI%3EAzure%20Security%20Center%3C%2FLI%3E%0A%3CLI%3ECommon%20Event%20Format%3C%2FLI%3E%0A%3CLI%3EDNS%3C%2FLI%3E%0A%3CLI%3EIntune%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20365%20Defender%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Cloud%20App%20Security%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FLI%3E%0A%3CLI%3EMicrosoft%20Defender%20for%20Identity%3C%2FLI%3E%0A%3CLI%3EOffice%20365%3C%2FLI%3E%0A%3CLI%3ESecurity%20Events%3C%2FLI%3E%0A%3CLI%3ESyslog%3C%2FLI%3E%0A%3CLI%3EThreat%20Intelligence%20Platforms%3C%2FLI%3E%0A%3CLI%3EWindows%20Firewall%3C%2FLI%3E%0A%3CLI%3ETeams%3C%2FLI%3E%0A%3CLI%3EUser%20Entity%20Behavior%20Analytics%3C%2FLI%3E%0A%3CLI%3EWindows%20Virtual%20Desktop%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3EWhat%20is%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%3F%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_1-1612221309399.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251155i2C993A9DE68BA269%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_1-1612221309399.png%22%20alt%3D%22TJ_Banasik_1-1612221309399.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20US%20Defense%20Industrial%20Base%20(DIB)%20is%20charged%20with%20implementing%20Defense%20Federal%20Acquisition%20Regulation%20Supplement%20(DFARS)%20252.204-7012.%20DFARS%20requires%20organizations%20supporting%20the%20Department%20of%20Defense%20(DoD)%20to%20implement%20NIST%20SP%20800-171%20and%20FedRAMP%20Moderate%20Impact%20level%20controls.%20DoD%20has%20mandated%20CMMC%20with%20periodic%20assessments%20because%20historic%20self-attestation%20audits%20haven%E2%80%99t%20met%20the%20desired%20impact.%20CMMC%20builds%20upon%20DFARS%207012%20by%20verifying%20an%20organization%E2%80%99s%20readiness%20to%20protect%20Federal%20Contract%20Information%20(FCI)%20and%20Controlled%20Unclassified%20Information%20(CUI)%20such%20as%20International%20Traffic%20in%20Arms%20Regulation%20(ITAR)%20and%20Export%20Administration%20Regulations%20(EAR)%20export-controlled%20data.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ECMMC%20extends%20beyond%20the%20parent%20organization%20into%20sub-contractors%2C%20partners%2C%20and%20suppliers.%20The%20framework%20is%20intended%20to%20enforce%20critical%20thinking%20approaches%20for%20comprehensive%20security.%20The%20CMMC%20framework%20specifies%205%20levels%20of%20maturity%20measurement%20from%20Maturity%20Level%201%20(Basic%20Cyber%20Hygiene)%20to%20Maturity%20Level%205%20(Proactive%20%26amp%3B%20Advanced%20Cyber%20Practice).%20The%20Certification%20levels%20will%20be%20determined%20through%20audits%20from%20independent%2C%20third-party%20assessment%20organizations%20(C3PAO).%20Even%20if%20your%20organization%20doesn%E2%80%99t%20require%20CMMC%20compliance%2C%20the%20framework%20provides%20a%20useful%20maturity%20model%20assessment%20framework%20for%20building%2Fimproving%20cybersecurity%20resiliency.%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDeploying%20the%20Workbook%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIt%20is%20recommended%20that%20you%20have%20the%20log%20sources%20listed%20above%20to%20get%20the%20full%20benefit%20of%20the%20CMMC%20Workbook%2C%20but%20the%20workbook%20will%20deploy%20regardless%20of%20your%20available%20log%20sources.%20Follow%20the%20steps%20below%20to%20enable%20the%20workbook%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERequirements%3A%20Azure%20Sentinel%20Workspace%20and%20Security%20Reader%20rights.%3C%2FP%3E%0A%3CP%3E1)%20From%20the%20%3CA%20href%3D%22https%3A%2F%2Fportal.azure.com%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAzure%20portal%3C%2FA%3E%2C%20navigate%20to%20%3CSTRONG%3EAzure%20Sentinel%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E2)%20Select%20%3CSTRONG%3EWorkbooks%20%26gt%3B%20Templates%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E3)%20Search%20%3CEM%3ECMMC%3C%2FEM%3E%20and%20select%20%3CSTRONG%3ESave%20%3C%2FSTRONG%3Eto%20add%20to%20%3CSTRONG%3EMy%20Workbooks%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ENavigating%20the%20Workbook%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThe%20%3CEM%3ELegend%20Panel%3C%2FEM%3E%20provides%20a%20helpful%20reference%20for%20navigating%20the%20workbook%20with%20respective%20colors%2C%20features%2C%20and%20reference%20indicators.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_2-1612221309415.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251156iA1DC8083375BCE3B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_2-1612221309415.png%22%20alt%3D%22TJ_Banasik_2-1612221309415.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%3CEM%3EGuide%20Toggle%3C%2FEM%3E%20is%20available%20in%20the%20top%20left%20of%20the%20workbook.%20This%20toggle%20allows%20you%20to%20view%20panels%20such%20as%20architectural%20recommendations%20and%20guides%20which%20will%20be%20helpful%20when%20you%20first%20access%20the%20workbook%20but%20can%20be%20hidden%20once%20you%E2%80%99ve%20grasped%20respective%20concepts.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%3CEM%3EControl%20Family%20Ribbon%3C%2FEM%3E%20provides%20a%20mechanism%20for%20navigating%20to%20the%20desired%20control%20family.%20Selecting%20a%20control%20family%20will%20display%20%3CEM%3EControl%20Cards%3C%2FEM%3E%20in%20the%20respective%20Control%20Family.%20The%20%3CEM%3EMaturity%20Level%20Ribbon%3C%2FEM%3E%20drills%20down%20further%20to%20the%20desired%20control%20maturity%20level.%20You%20can%20view%20an%20index%20of%20controls%20in%20the%20workbook%20if%20you%20have%20the%20%3CEM%3EGuide%20Toggle%3C%2FEM%3E%20enabled.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Pic2a.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251199i1DD2678C3B58E1D1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Pic2a.gif%22%20alt%3D%22Pic2a.gif%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20example%2C%20if%20you%E2%80%99re%20interested%20in%20viewing%20Incident%20Response%20controls%2C%20you%20can%20view%20the%20%3CEM%3EControl%20Family%20Index%3C%2FEM%3E%20to%20view%20which%20controls%20are%20covered%20in%20the%20workbook.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_5-1612221310193.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251159i652AFDBE30C6B199%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_5-1612221310193.png%22%20alt%3D%22TJ_Banasik_5-1612221310193.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20drill%20down%20into%20a%20control%20of%20interest%20such%20as%20%3CEM%3ERM.4.149%20(Update%20Threat%20Profiles%2FAdversary%20Tactics%2C%20Techniques%2C%20Procedures)%3C%2FEM%3E%2C%20select%20%3CEM%3ERisk%20%26amp%3B%20Recovery%20Management%3C%2FEM%3E%20and%20%3CEM%3EMaturity%20Level%204%3C%2FEM%3E%20which%20populates%20all%20control%20cards%20available%20for%20that%20family%20in%20Maturity%20Level%204.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture3.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251196iCDA02B3163D87DBA%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture3.gif%22%20alt%3D%22Picture3.gif%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20displays%20each%20control%20in%20a%20%3CEM%3EControl%20Card%3C%2FEM%3E.%20The%20%3CEM%3EControl%20Card%3C%2FEM%3E%20provides%20respective%20control%20details%20to%20help%20you%20better%20understand%20the%20requirement%2C%20view%20your%20data%2C%20adjust%20SIEM%20queries%2C%20export%20artifacts%2C%20onboard%20Microsoft%20controls%2C%20navigate%20to%20respective%20configuration%20blades%2C%20access%20reference%20materials%2C%20and%20view%20correlated%20compliance%20frameworks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_7-1612221310615.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251162i5A35806E663BF0A4%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_7-1612221310615.png%22%20alt%3D%22TJ_Banasik_7-1612221310615.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EUse%20Cases%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EThere%20are%20several%20use%20cases%20for%20the%20Azure%20Sentinel%20CMMC%20Workbook%20depending%20on%20user%20roles%20and%20requirements.%20The%20graphic%20below%20shows%20how%20a%20cloud%20security%20architect%20can%20leverage%20the%20workbook%20to%20review%20requirements%2C%20reference%20documentation%2C%20make%20configurations%2C%20and%20export%20artifacts.%20There%20are%20also%20several%20additional%20use%20cases%20where%20this%20workbook%20will%20be%20helpful%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3ESecurity%20Architect%3A%20%3C%2FSTRONG%3EBuild%2Fdesign%20a%20cloud%20security%20architecture%20to%20compliance%20requirements.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESecOps%20Analyst%3A%3C%2FSTRONG%3E%20Review%20activity%20in%20query%2C%20configure%20alerts%2C%20deploy%20SOAR%20automation.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EIT%20Pro%3A%3C%2FSTRONG%3E%20Identify%20performance%20issues%2C%20investigate%20issues%2C%20set%20alerts%20for%20remediation%20monitoring.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESecurity%20Engineer%3A%3C%2FSTRONG%3E%20Assess%20security%20controls%2C%20review%20alerting%20thresholds%2C%20adjust%20configurations.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3ESecurity%20Manager%3A%3C%2FSTRONG%3E%20Review%20requirements%2C%20analyze%20reporting%2C%20evaluate%20capabilities%2C%20adjust%20accordingly.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_8-1612221310651.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251163i9AD1E00C4DE0774D%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_8-1612221310651.png%22%20alt%3D%22TJ_Banasik_8-1612221310651.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EConfigurations%20%26amp%3B%20Troubleshooting%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EIt%E2%80%99s%20important%20to%20note%20that%20this%20workbook%20provides%20visibility%20and%20situational%20awareness%20for%20control%20requirements%20delivered%20with%20Microsoft%20technologies%20in%20predominantly%20cloud-based%20environments.%20Customer%20experience%20will%20vary%20by%20user%20and%20some%20panels%20may%20require%20additional%20configurations%20and%20query%20modification%20for%20operation.%20It%E2%80%99s%20unlikely%20that%20all%20250%2B%20panels%20will%20populate%20data%2C%20but%20this%20is%20expected%20as%20panels%20without%20data%20highlight%20respective%20areas%20for%20evaluation%20in%20maturing%20cybersecurity%20capabilities.%20%3CEM%3EControl%20Cards%3C%2FEM%3E%20without%20data%20will%20display%20the%20custom%20error%20message%20below.%20Most%20issues%20are%20resolved%20by%20confirming%20licensing%2Favailability%2Fhealth%20of%20the%20log%20source%2C%20confirming%20the%20log%20source%20is%20connected%20to%20the%20Sentinel%20workspace%2C%20and%20adjusting%20time%20thresholds%20for%20larger%20data%20sets.%20Ultimately%20this%20workbook%20is%20customer-controlled%20content%2C%20so%20panels%20are%20configurable%20per%20customer%20requirements.%20You%20can%20edit%2Fadjust%20Control%20Card%20queries%20as%20follows%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3ECMMC%20Workbook%3C%2FSTRONG%3E%20%26gt%3B%20%3CSTRONG%3EEdit%3C%2FSTRONG%3E%20%26gt%3B%20%3CSTRONG%3EEdit%20Panel%3C%2FSTRONG%3E%20%26gt%3B%20Adjust%20Panel%20KQL%20Query%20%26gt%3B%20%3CSTRONG%3ESave%3C%2FSTRONG%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_9-1612221310653.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251161iC93A84BE4B56F9EC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_9-1612221310653.png%22%20alt%3D%22TJ_Banasik_9-1612221310653.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20using%20the%20Microsoft%20security%20controls%20for%20the%20CMMC%20Workbook%20is%20recommended%2C%20it%E2%80%99s%20not%20a%20set%20requirement%20as%20customers%20often%20rely%20on%20a%20multitude%20of%20security%20providers%20and%20solutions.%20Below%20is%20a%20use-case%20example%20for%20adjusting%20a%20Control%20Card%20to%20include%20third%20party%20tooling.%20The%20default%20KQL%20query%20provides%20a%20framework%20for%20target%20data%20and%20it%20is%20readily%20adjusted%20with%20the%20desired%20customer%20controls%2Fsolutions.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TJ_Banasik_10-1612221310684.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251164iFC5363E737B9647B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TJ_Banasik_10-1612221310684.png%22%20alt%3D%22TJ_Banasik_10-1612221310684.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1970993715%22%20id%3D%22toc-hId-1970993715%22%20id%3D%22toc-hId-1970993715%22%20id%3D%22toc-hId-1970993715%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId-163539252%22%20id%3D%22toc-hId-163539252%22%20id%3D%22toc-hId-163539252%22%20id%3D%22toc-hId-163539252%22%3E%3CSTRONG%3EMicrosoft%20Blog%20Posts%20on%20CMMC%3C%2FSTRONG%3E%3C%2FH3%3E%0A%3CP%3EBelow%20are%20additional%20resources%20for%20learning%20more%20about%20CMMC%20in%20the%20cloud%20with%20Microsoft.%20Let%20us%20know%20if%20there%20are%20additional%20government%20compliance%20frameworks%20we%20can%20help%20with.%20Bookmark%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ESecurity%20blog%3C%2FA%3E%20to%20keep%20up%20with%20our%20expert%20coverage%20on%20security%20matters%20and%20follow%20us%20at%20%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2F%40MSFTSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%40MSFTSecurity%3C%2FA%3E%20or%20visit%20our%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ewebsite%3C%2FA%3E%20for%20the%20latest%20news%20and%20updates%20on%20cybersecurity.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fpublic-sector-blog%2Fmicrosoft-cmmc-acceleration-program-update-january-2021%2Fba-p%2F2033499%22%20target%3D%22_blank%22%3EMicrosoft%20CMMC%20Acceleration%20Program%20Update%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EDisclaimer%3C%2FEM%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20demonstrates%20best%20practice%20guidance%2C%20but%20Microsoft%20does%20not%20guarantee%20nor%20imply%20compliance.%20All%20accreditation%20requirements%20and%20decisions%20are%20governed%20by%20the%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.cmmcab.org%2Fc3pao-lp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CEM%3ECMMC%20Accreditation%20Body%3C%2FEM%3E%3C%2FA%3E%3CEM%3E.%20This%20workbook%20provides%20visibility%20and%20situational%20awareness%20for%20control%20requirements%20delivered%20with%20Microsoft%20technologies%20in%20predominantly%20cloud-based%20environments.%20Customer%20experience%20will%20vary%20by%20user%20and%20some%20panels%20may%20require%20additional%20configurations%20and%20query%20modification%20for%20operation.%20Recommendations%20do%20not%20imply%20coverage%20of%20respective%20controls%20as%20they%20are%20often%20one%20of%20several%20courses%20of%20action%20for%20approaching%20requirements%20which%20is%20unique%20to%20each%20customer.%20Recommendations%20should%20be%20considered%20a%20starting%20point%20for%20planning%20full%20or%20partial%20coverage%20of%20respective%20control%20requirements.%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2110524%22%20slang%3D%22en-US%22%3E%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Picture3.gif%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F251197iD562C9F3EBE6EC06%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Picture3.gif%22%20alt%3D%22Picture3.gif%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22paragraph%22%20style%3D%22margin%3A%200in%3B%20vertical-align%3A%20baseline%3B%22%3E%3CSPAN%20class%3D%22normaltextrun%22%3E%3CSPAN%20style%3D%22font-family%3A%20'Helvetica'%2Csans-serif%3B%22%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20provides%20a%20mechanism%20for%20viewing%20log%20queries%20aligned%20to%20CMMC%20controls%20across%20the%20Azure%20cloud%20including%20Microsoft%20security%20offerings%2C%20Office%20365%2C%20Teams%2C%20Intune%2C%20Windows%20Virtual%20Desktop%20and%20many%20more.%20This%20workbook%20enables%20Security%20Architects%2C%20Engineers%2C%20SecOps%20Analysts%2C%20Managers%2C%20and%20IT%20Pros%20to%20gain%20situational%20awareness%20for%20the%20security%20posture%20of%20cloud%20workloads.%20There%20are%20also%20recommendations%20for%20selecting%2C%20designing%2C%20deploying%2C%20and%20configuring%20Microsoft%20offerings%20for%20alignment%20with%20respective%20CMMC%20requirements%26nbsp%3Band%20practices.%26nbsp%3BThe%20workbook%20features%20250%2B%20control%20cards%20aligned%20to%20the%2017%20CMMC%20control%20families%20across%20all%205%20maturity%20levels%20with%20selectable%20GUI%20buttons%20for%20navigation.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2110524%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Government%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECMMC%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPublic%20Sector%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%20%26amp%3B%20Compliance%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2323851%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Sentinel%20Cybersecurity%20Maturity%20Model%20Certification%20(CMMC)%20Workbook%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2323851%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20Azure%20Sentinel%20CMMC%20Workbook%20is%20fantastic.%20I%20am%20reviewing%20all%20of%20the%20CMMC%20Guides%20and%20Models%20documentation%20and%20comparing%20it%20to%20the%20facilities%20that%20the%20CMMC%20Workbook%20assists%20you%20with.%20Great%20facility!%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Co-Authors
Version history
Last update:
‎Feb 01 2021 05:07 PM
Updated by: