Browsers are difficult Please wait, loading your map...
Control devices securityM365 securityhardening servicesSecure endpoints : 10%of breaches involvedransomeware. (Verizon2021 DBIR)Endpoint managementintuneSecure O365 appMicrosoft Defender forEndpointSecure access : 25%attacks are reusingstolen credentials(verizon 2021 DBIR) -34% of data breaches in2018 involved internalactors (Verizon).Secure connectionMFAAzure conditionnalaccess policiesBlock legacyauthenticationprotocolsSecure AuthorizationAdministrators rolesThird party applicationsAzure AD applicationpermissionsOffice 365 serviceaccounts permissionsTeams apps permissionsTemporaryadministrator accessGuest accessSecure documentssharing : 23% of databreaches are caused byhuman error (IBM)Onedrive / Sharepointsharing optionsSharing linksconfigurationsSites permissionsTeams sharing optionsData loss prevention(DLP)Azure informationprotectionO365 DLP rulesProtection againstunauthorized  e-mailsforwardingGuest accessSecure e-mailing  :36% of successfulldatabreach startedwith a phishing(verizon 2021 DBIR)Protect against knowncommercial spamsProtect against "displayname" impersonnationattacksProtect against "e-mailaddress impersonnationattacks" and phishersdetecttionSPFSecureemailingservicesDKIMDMARCProtection againstunknown maliciousURLs in e-mailsProtection againstunknown attachmentsin e-mails.Portection againstunknown commercialspamProtection against virusProtection againstpotentially dangerousexecutableHelping users to reportphishingProtection againstunauthorized  e-mailsforwardingNon-repudiation ofactions : M365 andAzure AD logs are kept90 days. This is notenought since  theaverage time to identifya breach in 2020 was228 days (IBM)Inspect audit logs andmanage logs retentionExchange audit logsCloud SaaS SIEMmanaged by OppidumSecurityAzure AD audit logsCloud SaaS SIEMmanaged by OppidumSecurityM365 Audit logsCloud SaaS SIEMmanaged by OppidumSecurityIncident response : Theaverage time to containa breach was 80 days(IBM)Detecting an attacksSecurity dashboardsO365 security alertsalertsusers feedbacksScoping an attacksAzure AD audit logsO365 audit logsExchange audit logsData  searchStopping an attackAzure AD disablingusersSender blacklistingURL blacklistingMass deletion ofmalicious e-mailsManagement of falsepositives

Created using MindMup.com