Security Zero Trust
Security Zero Trust
Security Zero Trust
p CONCEPT
Identity
Endpoints
Data
Applications
Infrastructure
Networks
p CONCEPT
Overview
Advanced deployment guide for Zero Trust with Microsoft 365 (requires sign-in)
` DEPLOY
Overview
Microsoft Copilot
c HOW-TO GUIDE
Azure IaaS
c HOW-TO GUIDE
Identity
Endpoints
Applications
Data
Infrastructure
Networks
Developer guidance
c HOW-TO GUIDE
c HOW-TO GUIDE
Data protection
What is Zero Trust?
Article • 04/12/2024
ノ Expand table
Principle Description
Verify explicitly Always authenticate and authorize based on all available data points.
Use least Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-
privilege access based adaptive policies, and data protection.
Assume breach Minimize blast radius and segment access. Verify end-to-end encryption and
use analytics to get visibility, drive threat detection, and improve defenses.
This is the core of Zero Trust. Instead of believing everything behind the corporate
firewall is safe, the Zero Trust model assumes breach and verifies each request as though
it originated from an uncontrolled network. Regardless of where the request originates
or what resource it accesses, the Zero Trust model teaches us to "never trust, always
verify."
Zero Trust is designed to adapt to the complexities of the modern environment that
embraces the mobile workforce and protects user accounts, devices, applications, and
data wherever they are located.
A Zero Trust approach should extend throughout the entire digital estate and serve as
an integrated security philosophy and end-to-end strategy.
With Zero Trust, you move away from a trust-by-default perspective to a trust-by-
exception one. An integrated capability to automatically manage those exceptions and
alerts is important so you can more easily find and detect threats, respond to them, and
prevent or block undesired events across your organization.
Zero Trust and the US Executive Order 14028 on
Cybersecurity
US executive order 14028, Improving the Nation's Cyber Security , directs federal
agencies on advancing security measures that drastically reduce the risk of successful
cyberattacks against the federal government's digital infrastructure. On January 26,
2022, the Office of Management and Budget (OMB) released the federal Zero Trust
strategy in memorandum 22-09 , in support of EO 14028.
Recommended training
ノ Expand table
Use this module to understand the Zero Trust approach and how it strengthens
the security infrastructure within your organization.
Start >
ノ Expand table
Use this module to learn about best practices that cybersecurity architects use and
some key best practice frameworks for Microsoft cybersecurity capabilities. You also
learn about the concept of Zero Trust, and how to get started with Zero Trust in your
organization.
Start >
Next steps
Use additional Zero Trust content based on a documentation set or the roles in your
organization.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Deployment for technology pillars for Apply Zero Trust protections IT teams and security
conceptual information and aligned with typical IT staff
deployment objectives technology areas.
Zero Trust for small businesses Apply Zero Trust principles Customers and partners
to small business customers. working with Microsoft
365 for business
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and IT
(RaMP) for project management of Zero Trust protection. implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
detailed design and deployment
guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security staff
and specializations solutions.
Develop using Zero Trust principles Apply Zero Trust protections Application developers
for application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for the roles in your organization.
ノ Expand table
Role Documentation set Helps you...
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Deployment for technology pillars for Apply Zero Trust protections
security team conceptual information and deployment aligned with typical IT
objectives technology areas.
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Related links
Zero Trust Overview -This video provides information about:
Zero Trust definition
Zero Trust principles
Zero Trust core concepts
Rapid modernization plan (RaMP) quick wins
Zero Trust - The Open Group -This video provides a perspective on Zero Trust
from a standards organization.
Feedback
Was this page helpful? Yes No
Zero Trust assessment and progress
tracking resources
Article • 04/15/2024
Zero Trust is a new security model that assumes breach and verifies each request as
though it originated from an uncontrolled network. Regardless of where the request
originates or what resource it accesses, the Zero Trust model teaches us to "never trust,
always verify."
As an IT architect or implementer, you can use the assessment and progress tracking
resources in this article to:
Assess your infrastructure’s readiness for Zero Trust, including discovering which
elements are already in place or can be easily strengthened or improved.
Track the progress of the necessary Zero Trust security improvements in your
environment for both business leaders and your IT departments.
A systematic way to track progress on objectives and their tasks, scoped to IT leads
and implementers.
Curation of the most relevant resources for adoption of Zero Trust including:
PowerPoint slides that are ready to present to business leaders.
Excel worksheets to assess your current status and to track progress.
Technical implementation guidance and user infographics.
This Zero Trust adoption guidance recommends building a Zero Trust strategy and
architecture through these business scenarios:
Each business scenario describes how to advance the required technical work through
each of the lifecycle phases (Define strategy, Plan, Ready, Adopt, and Govern and
manage), starting with building the business case.
For each business scenario, you can use the following progress tracking resources.
Easily understand the security enhancements for each business scenario and the level of
effort for the stages and objectives of the Plan phase.
For business scenario project leads, business leaders, and other stakeholders.
Track your progress through the stages and objectives of the Plan phase.
For business scenario project leads, business leaders, and other stakeholders.
Assign ownership and track your progress through the stages, objectives, and tasks of
the Plan phase.
See current status, security metrics, and recommendations for the adoption framework
business scenarios.
Assessment resources
To understand where your organization is on its Zero Trust journey, use these
assessment resources.
Recommended training
ノ Expand table
Use this module to understand the Zero Trust approach and how it strengthens
the security infrastructure within your organization.
Start >
ノ Expand table
Use this module to learn about best practices that cybersecurity architects use and
some key best practice frameworks for Microsoft cybersecurity capabilities. You also
learn about the concept of Zero Trust, and how to get started with Zero Trust in your
organization.
Start >
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Concepts and deployment objectives Apply Zero Trust protections IT teams and security
for general deployment guidance for aligned with technology staff
technology areas areas.
Zero Trust for small businesses Apply Zero Trust principles Customers and partners
to small business customers. working with Microsoft
365 for business
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and IT
(RaMP) for project management of Zero Trust protection. implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
detailed design and deployment
guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security staff
and specializations solutions.
Develop using Zero Trust principles Apply Zero Trust protections Application developers
for application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Concepts and deployment objectives for Apply Zero Trust protections
security team general deployment guidance for aligned with technology
technology areas areas.
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Feedback
Was this page helpful? Yes No
Zero Trust adoption framework
overview
Article • 04/12/2024
Zero Trust is security for digital business. Digital transformation requires updating
traditional security models because traditional security approaches don’t meet current
requirements for business agility, user experiences, and continuously evolving threats.
Organizations are implementing Zero Trust to address these challenges and enable the
new normal of working anywhere, with anyone, at any time.
However, shifting from a traditional security model to Zero Trust represents a significant
transformation that requires buy-in, adoption, and change management across an entire
organization. Updating a traditional security model to Zero Trust is a transformation that
takes time and requires buy-in, adoption, and change management across an entire
organization. Business leaders, technology leaders, security leaders, and security
practitioners all play critical parts in creating an agile Zero Trust security approach.
Many security architects and IT teams ask for help communicating to business leaders,
tracking progress, and driving adoption. This guidance helps security and technology
teams collaborate with business leaders on Zero Trust by providing:
Recommended Zero Trust objectives for business leaders across organizations.
A methodical and phased approach to implementing a Zero Trust architecture.
A systematic way to track progress, scoped to business leaders.
Curation of the most relevant resources for adoption of Zero Trust from slides that
are ready to present to business leaders to technical implementation guidance and
user infographics.
"Our goal is to help every organization strengthen its security capabilities through a
Zero Trust architecture built on our comprehensive solutions that span identity, security,
compliance, and device management across all clouds and platforms." –Satya Nadella,
executive chairman and CEO of Microsoft
Adopting a Zero Trust approach requires buy-in across the C-suite. As the threat
landscape expands, and critical attacks become more common, business leaders across
functional areas are increasingly concerned with the cybersecurity approach their
organization's take.
Zero Trust allows the entire C-suite and business to embrace a measurable business
outcome that is aligned to reducing threats and increasing productivity.
Zero Trust adds value to two predominant scenarios that are seen in the marketplace:
The following is a generalized view of the possible functions taken by various C-level
functions and how they align to an integrated vision of security using Zero Trust.
ノ Expand table
Chief Executive Responsible for the Zero Trust provides an integrated approach to
Officer (CEO) business security across all digital layers.
Chief Marketing Responsible for the Zero Trust allows for the rapid recovery from breach
Officer (CMO) marketing vision and and empowers the responsible reporting function
execution for a public-facing organization, allowing breaches
to be contained without reputational loss.
Chief Information Responsible for IT as a Zero Trust principles eliminate vertical security
Officer (CIO) whole solutions that aren't aligned to business outcomes
and enables Security as a Platform, which does align
to business outcomes.
Chief Information Responsible for Zero Trust principles provide a sufficient foundation
Security Officer security program for the organization to comply with various security
(CISO) implementation standards and enables the organization to secure
data, assets, and infrastructure.
Chief Technology Chief Architect in the Zero Trust helps with defensible technology
Officer (CTO) business alignment aligned to business outcomes. Using
Zero Trust, security is baked into every architecture.
Chief Operations Responsible for Zero Trust helps with operational governance; the
Officer (COO) operational execution "how to" of the security vision and the surfacing of
who did what and when. Both are aligned to
business outcomes.
Chief Financial Responsible for Zero Trust helps with the accountability of spend
Officer (CFO) governance and spend and the defensibility of spend; a measurable way of
gaining a risk-based measure against security and
Zero Trust spending aligned to business outcomes.
Zero Trust principles for the C-suite
Zero Trust is a strategy and architecture based on three principles.
ノ Expand table
Verify Always authenticate and This principle requires users to verify who they
explicitly authorize based on all available are, using more than one method, so that
data points, including user compromised accounts gained by hackers
identity, location, device health, aren't allowed to access your data and apps.
service or workload, data
classification, and anomalies. This approach also requires devices to be
recognized as being allowed to access the
environment and, ideally, to be managed and
healthy (not compromised by malware).
Use least Limit user access with just-in- This principle limits the blast radius of a
privileged time and just-enough-access potential breach so that if an account is
access (JIT/JEA), risk-based adaptive compromised, the potential damage is limited.
policies, and data protection to
help secure both data and For accounts with greater privileges, such as
productivity. administrator accounts, this involves using
capabilities that limit how much access these
accounts have and when they have access. It
also involves using higher-levels of risk-based
authentication policies for these accounts.
Assume Minimize blast radius and This principle assumes the likelihood that an
breach segment access. Verify end-to- attacker will gain access to an account, identity,
end encryption and use analytics endpoint, application, API, or other asset. To
to get visibility, drive threat respond, Microsoft protects all of the assets
detection, and improve accordingly to limit the damage.
defenses.
This principle also involves implementing tools
for ongoing threat detection and rapid
response. Ideally these tools have access to
signals integrated across your environment and
Principle Technical description Business description
Zero Trust requires taking an integrated approach across these areas and teams, which
is why it's so important to have buy-in across the C-suite and a well-orchestrated
strategy and plan across your organization.
ノ Expand table
Identities Human and non-human Anything human or machine based that is able
identities, including users, to sign in or use your services.
computers, and service
principals. Anything that can
authenticate.
Endpoints End user computing devices, The devices our users use to connect to your
including computers, laptops, services and operate on your data.
mobile phones, and tablets.
Apps Cloud or datacenter-based All apps that are used by your organization,
applications that require users including SaaS apps that you subscribe to and
to sign in and consume those other applications, whether in the cloud or on-
services or applications. premises.
Network LAN, WAN, wireless, or The network used to connect your users to the
internet connection, including services they need. This may be a corporate-run
mobile (such as 3G and 5G) or local area network (LAN), the wider network
even the coffee shop wireless encompassing access to your digital estate, or
network. the internet connections used by your workers
to connect.
When applying Zero Trust strategy across a digital estate, it’s less helpful to think about
tackling each of these domain areas independently. It’s not as if the identity team can
accomplish all the recommendations and then the Zero Trust focus can move to the
team that manages endpoints. Zero Trust strategy applies these functional areas
together to secure an area within a digital estate and then broaden the scope of the
protection across it.
For example, the identity team can only make so much progress in utilizing Microsoft
Entra Conditional Access policies before coordinating with the endpoints team to weave
together protection.
The following diagram integrates these functional areas into a unified Zero Trust
architecture.
Policy Optimization
Governance
Compliance
Data
Security Posture Assessment Emails & documents
Identities
Human
Non-human
Apps
Zero Trust Policies Network
SaaS
Evaluation Public
On-premises
Enforcement Private
Endpoints Infrastructure
Corporate Serverless
Personal Containers
IaaS
Threat Protection
Paas
Continuous Assessment
Internal Sites
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment JIT & Version Control
In the diagram:
Each of the functional areas are represented: Identities, Endpoints, Network, Data,
Apps, Infrastructure
Zero Trust integrates protection across all the functional areas through policies and
Policy Optimization.
Threat protection brings together signals across the organization in real-time to
provide visibility into attacks and to streamline remediation through automated
actions and incident response tracking.
The next section discusses how to get started on the Zero Trust journey. We’ll use the
Identities functional area as an example.
The Cloud Adoption Framework for Azure is a methodical process for introducing new
apps and services into an organization. The focus is primarily on a proven process an
organization can follow to introduce an app or service into the environment. The scale
motion is repeating the process for each app that is added to a digital estate.
Adoption of a Zero Trust strategy and architecture requires a different scope. It's about
introducing new security configurations across an entire digital estate. The scale motion
is two dimensional:
Taking a piece of the Zero Trust architecture, such as data protection, and scaling
out this protection across the entire digital estate.
Repeating the process with each additional piece of the Zero Trust architecture,
starting with strategic quick wins and foundational pieces, and then advancing to
more complex pieces.
Like the Cloud Adoption Framework for Azure, this Zero Trust adoption guidance
addresses the work through adoption scenarios as described in the next section.
The following diagram summarizes the differences between these two types of adoption
motions.
Cloud Adoption Framework for Azure Zero Trust adoption framework
Proven cloud adoption motion leading with business scenarios and justification.
Business readiness, team and role readiness, and technical readiness.
This Zero Trust adoption guidance uses the same lifecycle phases as the Cloud Adoption
Framework for Azure but adapted for Zero Trust.
Govern Manage
Track and measure the Use monitoring and
success of your detection technologies
deployment
Incrementally mature each
functional area
ノ Expand table
Lifecycle Description
phase
Define Build a business case focused on the outcomes most closely aligned with your
strategy organization’s risks and strategic goals.
Ready Create a multi-layer strategy for your Zero Trust deployment and prioritize
early actions based on business needs.
Identify adjustments to the prescriptive deployment guidance necessary for
your environment.
Business scenarios
This Zero Trust adoption guidance recommends building a Zero Trust strategy and
architecture through these business scenarios:
Each business scenario is described in an article that describes how to progress the
technical work through each of the lifecycle phases, starting with building the business
case. The most appropriate resources are provided along the way.
Each of these business scenarios breaks down the work of Zero Trust into manageable
pieces that can be implemented over four implementation stages. This helps you
prioritize, move forward, and track work as you move through the different layers of
implementing a Zero Trust architecture.
This guidance includes a PowerPoint slide deck with progress slides that you can use
to present the work and track your progress at a high level for business leaders and
other stakeholders. The slides include features that help you keep track of and present
progress to stakeholders. Here's an example.
This guidance also includes an Excel workbook with worksheets for each business
scenario that you can use to assign owners and track progress for each stage, objective,
and task. Here's an example.
Across the business scenarios, the implementation stages are roughly aligned so that
accomplishing the objectives of Stage 1 across the scenarios help keep your
organization progressing on all fronts together.
Each business scenario encompasses a different set of assets with different tools to take
inventory. Methodically, you begin with an inventory and classification of the assets for
each business scenario:
1. Asset Identification: What assets do you want to protect, such as identities, data,
apps, services, and infrastructure? You may use the functional areas called out
above as a guide of where to start. Asset identification forms part of your Define
strategy and Plan lifecycle phases. The Define strategy phase can articulate a
specific scenario, while the Plan phase documents the digital estate.
2. Asset Classification: How important is each one of the identified assets, such as
identities, business critical data, and human resources data? Asset classification is
part of the Ready phase where you begin to identify the protection strategy for
each asset.
3. Asset Management: How do you choose to protect (govern) and administer
(manage) these assets?
4. Asset Recovery: How do you recover from compromise or loss of control of an
asset (govern)?
Each business scenario recommends how to take inventory as well as how to protect the
assets and report on progress. While there's inevitably some overlap across the business
scenarios, this adoption guidance attempts to simplify as much as possible by
addressing asset types in predominantly one business scenario.
Tracking progress
Tracking your progress throughout the Zero Trust adoption process is crucial as it allows
your organization to monitor and measure strategic goals and objectives.
ISO/IEC 27001:2022
Information security, cybersecurity, and privacy protection
Information security management systems
Requirements
ISO 31000
Risk management
The requirements and guidelines in these standards are generic and can apply to any
organization. They provide a structured and comprehensive way for you to review and
gauge the risks that apply to your organization, as well as mitigations.
Identifying and understanding the specific risks that apply to your organization will help
you prioritize your most strategic objectives across the Zero Trust architecture.
In-product dashboards
Microsoft Security Exposure Management is a security solution that provides a unified
view of security posture across company assets and workloads. Within this tool, Security
Initiatives help you assess readiness and maturity in specific areas of security risk.
Security Initiatives take a proactive approach to managing security programs towards
specific risk or domain-related objectives.
Use the Zero Trust initiative to track your organization’s progress toward implementing
Zero Trust security. This initiative is aligned with this Microsoft Zero Trust adoption
framework, allowing you to track your progress with metrics aligned with business
scenarios. These metrics capture your resource coverage across prioritized actionable
recommendations to help security teams protect their organization. The initiative also
provides real-time data on your Zero Trust progress that can be shared with
stakeholders.
For more information about how to use the Zero Trust initiative within the Exposure
Management tool, see Rapidly modernize your security posture — Track and measure.
Additionally, several other portals and reports can assist you in creating an overview of
risk within your business, including:
For example, within Microsoft Defender XDR, the device inventory provides a clear view
into newly discovered devices in your network that aren't yet protected. At the top of
each Device inventory tab, you can see the total number of devices that aren't
onboarded. Here's an example.
For more information on using Microsoft Defender XDR to track your progress, see
Strengthen your security posture with Microsoft Defender XDR.
Note that the progress percentages provided by in-product tools might not be accurate
for organizations that aren't willing to implement all controls due to reasons such as:
ノ Expand table
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Progress tracking resource That helps you… Designed for…
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
For additional resources, see Zero Trust assessment and progress tracking resources.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Concepts and deployment objectives Apply Zero Trust IT teams and security staff
for general deployment guidance for protections aligned with
technology areas technology areas.
Zero Trust for small businesses Apply Zero Trust Customers and partners
principles to small working with Microsoft
Documentation set Helps you... Roles
Zero Trust Rapid Modernization Plan Quickly implement key Security architects and IT
(RaMP) for project management layers of Zero Trust implementers
guidance and checklists for easy wins protection.
Zero Trust deployment plan with Apply Zero Trust IT teams and security staff
Microsoft 365 for stepped and detailed protections to your
design and deployment guidance Microsoft 365 tenant.
Zero Trust for Microsoft Copilots for Apply Zero Trust IT teams and security staff
stepped and detailed design and protections to Microsoft
deployment guidance Copilots.
Zero Trust for Azure services for Apply Zero Trust IT teams and security staff
stepped and detailed design and protections to Azure
deployment guidance workloads and services.
Partner integration with Zero Trust for Apply Zero Trust Partner developers, IT
design guidance for technology areas protections to partner teams, and security staff
and specializations Microsoft cloud
solutions.
Develop using Zero Trust principles for Apply Zero Trust Application developers
application development design protections to your
guidance and best practices application.
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Customer or partner Zero Trust for small businesses Apply Zero Trust
for Microsoft 365 for principles to small
business business customers.
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management guidance layers of Zero Trust
IT implementer and checklists for easy wins protection.
Role Documentation set Helps you...
Member of an IT or Zero Trust deployment plan with Microsoft Apply Zero Trust
security team for 365 for stepped and detailed design and protections to your
Microsoft 365 deployment guidance for Microsoft 365 Microsoft 365 tenant.
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust
security team for stepped and detailed design and protections to Microsoft
Microsoft Copilots deployment guidance Copilots.
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust
security team for Azure and detailed design and deployment protections to Azure
services guidance workloads and services.
Partner developer or Partner integration with Zero Trust for Apply Zero Trust
member of an IT or design guidance for technology areas and protections to partner
security team specializations Microsoft cloud
solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust
application development design guidance protections to your
and best practices application.
Feedback
Was this page helpful? Yes No
Rapidly modernize your security posture
Article • 05/06/2024
As part of Zero Trust adoption guidance, this article describes the business scenario of
rapidly modernizing your security posture. Rather than focusing on the technical work
required to implement a Zero Trust architecture, this scenario focuses on how to
develop your strategy and priorities and then how to systematically implement your
priorities, piece by piece, while measuring and reporting your progress.
Security posture
Rapidly modernizing your security posture involves working within your organization,
especially leaders across your organization, to develop a strategy and a set of priorities
and objectives. You then identify the technical work necessary to achieve the objectives
and lead the various teams to accomplish them. The other business scenarios in this
adoption guidance are designed to help accelerate this technical work. Finally, a key part
of a strong security posture is the ability to communicate status, progress, and value to
business leaders.
Rapidly modernizing your security posture
Your priority of the technical work Your leadership to gain Your ability to
recommended within the business scenarios: buy-in to strategic communicate status,
technical projects and to progress, and value
· Secure remote and hybrid work lead these to completion
· Identify and protect sensitive business data
· Prevent or reduce damage from a breach
· Meet regulatory or compliance
requirements
ノ Expand table
Start here
Define strategy
Adopt Ready
As you build your organization’s capacity to deploy security configurations, you can
begin staggering their implementation. For example, after you’ve defined the strategy
and objectives for a business scenario, you can stagger the implementation of the
technical objectives. Here is an example.
Some business scenarios are broad, and you might want to prioritize specific elements
of the scenario to work on first. Or you can prioritize specific zones of your digital estate
for configuration deployment first.
One of the biggest challenges of adopting Zero Trust is gaining support and
contribution from leaders across your organization. This adoption guidance is designed
to help you communicate with them so you can gain organizational alignment, define
your strategic goals, and identify outcomes.
Defining security as a business-level imperative is the first step toward a modern and
scalable security approach.
ノ Expand table
Traditional protection Security is a responsibility shared among all levels of the business.
relies on security Accountability for security rests with the executive, while responsibility
specialists that are part is shared using the three Zero trust principles of Assume breach, Verify
of the IT team. Security explicitly, and Use least privilege access. A Zero Trust model moves
is an IT function. security from reactive (who did what and when based on logging) to
least privilege (based on just-in-time access to systems as needed). It
also implements architecture elements and security operations
capabilities to limit the damage from a breach.
The Zero Trust adoption overview article translates how Zero Trust applies to leadership
roles across many organizations. This article includes business descriptions of the Zero
Trust principles and a business translation of the technical areas included in a Zero Trust
architecture, including identities, devices, and app. These topics are good places to
begin conversations with your team of leaders. Be sure to probe and gain insights into
what motivates the leaders in your organization so you can more easily agree on
priorities and gain alignment and participation.
For this business scenario, rapidly modernizing your security posture, you do the work
of gaining alignment on the risks to your organization, your security strategy, and your
technical priorities. Ideally this helps you recruit funding and resources to do the work.
ノ Expand table
Chief Executive Fundamentally, the CEO is expected to maximize returns to the shareholders
Officer (CEO) within the law. To do this, the business must be empowered to achieve its
strategic goals and objectives, inclusive of the security strategy, in a
quantifiable way that enables evaluation of risks and costs. Business agility and
business execution should be empowered by the security posture.
Chief Marketing How the business is perceived both internally and externally relates to
Officer (CMO) employee and customer confidence. Breach readiness and security incident
communication strategy are vital to managing perception and opinions.
Chief The applications used by a mobile and hybrid workforce must be accessible
Information while securing the company's data. Security should be a measurable outcome
Officer (CIO) and aligned with IT strategy.
Chief Most best practice security standards and protocols require organizations to
Information continually improve the suitability, adequacy, and effectiveness of the
Security Officer information security management system. Modernizing the security posture
(CISO) allows for the evolution of business security policies and procedures which in
turn advance the overall security strategy within the business.
Chief The technology used to secure the business can't be constricted to what is
Technology achievable using previous datacenter thinking only. Complimentary
Officer (CTO) technologies that protect and enable business outcomes in a secure manner
must be adopted.
Chief Operations The business must be able to operate profitably before, during, and after an
Officer (COO) attack. Security posture must enable fault tolerance and recoverability to
prevent business outage.
Chief Financial The security posture must be a predictable cost with a measurable outcome,
Officer (CFO) like other business priorities.
Additionally, different parts of your organization will have different motivations and
incentives for doing this work. The following table summarizes some of these
motivations. Be sure to connect with your stakeholders to understand their motivations.
ノ Expand table
Area Motivations
Business To operate a business with a security posture that is integrated into business
needs needs and imperatives. This security posture aligns with business outcomes and
empowers the business attempting to implement security without creating
onerous operating friction.
IT needs A standardized security posture that caters for IT and Operational Technology
(OT) security requirements, defines and instruments security posture tools and
methodology, and provides predictable spend aligned to outcomes.
Business alignment can be achieved using one or both of the following approaches.
Take a risk-based approach in which you identify the top risks to your organization
and the mitigations that are most appropriate.
Create a defensive strategy, based on understanding where your digital assets are,
what they're composed of, and the relative risk profile based on exfiltration or loss
of access to your digital assets.
You can progress through this article using either approach. The technical objectives and
work described in the other business scenarios support both approaches.
Business alignment
Security posture
You can even take a risk-based approach to start (mitigating against your top risks) and
then transition to a defensive strategy to fill in the gaps. This section discusses how to
use both approaches to rapidly modernize your security posture.
Risk-based approach
Some organizations choose to prioritize work and measure progress against risk. Two
common tools for identifying risks include tabletop exercises and ISO standards.
These tabletop exercises are designed to help organizations walk through different risk
scenarios with the goal of evaluating the organization’s state of preparation. They're
each designed to be completed together with your team of stakeholders "in as little as
15 minutes."
These exercises guide participants through the process of a simulated incident and
require departments and teams to respond. The exercises help you evaluate your
preparedness in a cross-discipline manner.
These exercises are representative and inclusive of different business units, not just IT or
security. Consider working through and modifying the exercises, if needed, to ensure
they're relevant for your organization and include representation from different parts of
your organization, including marketing, executive leadership, and customer-facing roles
that could be impacted by the scenario.
The output of these exercises feed into your overall strategy and priorities. The output
helps you identify gaps and prioritize remediations. These priorities then inform your
work in the plan phase. These exercises can also help create urgency and investment
across your leadership team to mitigate the risks that you identify together.
Like the tabletop exercises, the output from this more formal review of your
organization’s risks feeds into your overall strategy and priorities. The output should
also help create urgency and investment across your teams to participate in
modernizing your security posture.
Defensive strategy
With a defensive strategy, you look across your digital estate to identify where your
digital assets are, what they're composed of, and the relative risk profile based on the
exfiltration or loss of access to your digital assets.
You prioritize defensive areas to focus on by taking each area and estimating the
potential damage to your business for these common types of incidents:
Data loss
Data leakage
Data breach
Data access loss
Compliance loss due to cyber incident
After you have identified the priority areas to defend, you can work systematically to
apply Zero Trust principles to these areas. You can also make a defensible case for the
funding and resources required to do this work.
Applications
Responsibility varies by type
Network controls
Operating system
Physical hosts
Physical datacenter
Microsoft Your organization
For more information, see Shared responsibility in the cloud in the Azure Security
Fundamentals library.
This can become part of your long-term strategy, starting with the acquisition of new
cloud-based apps as a motivation to retire legacy apps and servers that your
organization personally maintains.
Finally, raising the cost of an attack for attackers makes your organization more resilient
to cybersecurity risk. Beyond meeting specific regulatory requirements, your budget
spend should make it more expensive and difficult for an attacker to gain access to your
environment and perform activities such as data exfiltration or data destruction. In other
words, you reduce the return on investment (ROI) of attackers, causing them to possibly
move on to another organization.
Attackers are often categorized by level of sophistication and resources (such as existing
tools and experienced staff), from lowest to highest: amateur, organized crime, and
nation states.
The principles of Zero Trust help your organization identify and prioritize how best to
spend your security defense budget to raise the cost of an attack so you can defend
against all levels of attackers.
The following figure shows the qualitative relationship between your security defense
budget with Zero Trust principles and your defensive strength.
Defensive strength can rapidly increase when you implement and practice basic security
hygiene based on Zero Trust principles. Beyond the early gains, you get additional
defensive strength by implementing more advanced security measures. Higher
defensive strength provides protection against higher levels of attackers.
The following figure shows the qualitative relationship between your defensive strength
and the impact of the cost and ROI of an attacker.
As your defensive strength increases, the cost to the attacker increases and reduces the
ROI of the attack effort.
The attacker ROI model helps leaders understand that there are few absolutes. A
security posture is never considered perfect or impenetrable. However, there's a lot of
opportunity for your organization to be strategic and prioritize your budget and
resources. It’s additional incentive for your team of business leaders to work together to
protect your organization.
The following table lists common target outcomes to rapidly modernize your security
posture.
ノ Expand table
Objective Outcome
Governance Company assets, data, and apps need to be secured while adhering to
Objective Outcome
Prevention Access control and asset protection are aligned withing an integrated security
toolchain that includes all physical and digital assets.
Visibility The risk and security status of the organization must be measurable and visible to
multiple audience types. Predictable security outcomes should lead to predictable
spending outcomes.
Response SecOps roles and responsibilities are defined and implemented across the
organization, leadership, and operational business functions. Tools and processes
correlate security operations and security outcomes. Automation enables quick
incident detection and increases the ability of your implementation to respond
without manual intervention.
Plan phase
Adoption plans convert the aspirational goals of a Zero Trust strategy into an actionable
plan. Your collective teams can use the adoption plan to guide their technical efforts and
align these with your organization's business strategy.
ノ Expand table
If this staged approach works for your organization, you can use:
This downloadable PowerPoint slide deck to present and track your progress
through these stages and objectives for business leaders and other stakeholders.
Here's the slide for this business scenario.
This Excel workbook to assign owners and track your progress for these stages,
objectives, and their tasks. Here's the worksheet for this business scenario.
Stakeholder team
Your stakeholder team for this business scenario includes leaders across your
organization who are invested in your security posture and likely include the following
roles and responsibilities:
ノ Expand table
CISO Security and governance of identities, devices, and apps. Owns risk and
policy determination, tracking, and reporting.
Device management The strategy for protecting organization data on devices, including
architect managing devices.
App management lead Prioritization and tech requirements for app investments, including
bringing apps up to standards with modern authentication and
Microsoft Entra Conditional Access policies.
The PowerPoint slide deck of resources for this adoption content includes the
following slide with a stakeholder view that you can customize for your own
organization.
Stage 1
In Stage 1, you begin to understand your current security posture. You start the
conversations across your leadership team and organization to learn what Zero Trust is
and how it aligns with business strategy and objectives.
ノ Expand table
Tabletop exercises
Objectives for Resources
Stage 1
ISO standards
Capture your Assess your security posture with Microsoft Secure Score
initial Secure
Score status Understanding your initial Secure Score enables you to set quantifiable
security goals and measure progress over time. It also enables you to
recognize downward trends in your posture, facilitating justification for more
modern feature deployments.
Identify Check in with your compliance team to learn about the regulations your
regulatory organization is subject to. List the regulatory and governance frameworks and
requirements any audit findings or specific controls that must be met towards achieving
secure compliance status.
Set leadership Use the overview article as a resource to facilitate conversations with your
expectations leadership team on Zero Trust. It frames security as a business imperative and
defines zero trust specific to leadership roles. Use the progress slides in the
Business Scenarios section to present the work and track your progress at a
high level for business leaders and other stakeholders.
Stage 2
In Stage 2, you continue to detail your current security posture, including:
In this stage, you develop a response readiness plan for common types of attacks. This
plan includes how to respond to your users, your customers, and how to communicate
to the public if needed.
For each of the following scenarios, consider a tabletop exercise that documents the
current response to the loss of access to:
Be sure to include representatives of all roles that will be affected, including HR,
marketing, and relevant business groups.
In addition to developing readiness plans for common attacks, this exercise can help
gain support and investment across your organization for the work of implementing
mitigations.
When planning for breach readiness, you must understand the state of your physical
and digital assets. The first objective in this stage is to take inventory. Note that the
other business scenarios include taking inventory of the assets that are affected by the
scenario. These inventories and the status of the items become part of your security
posture.
For this business scenario, it's recommended that you create a list of all physical and
digital assets and services and LOB applications. Physical assets include endpoints
(mobile phones, PCs, and laptops), and servers (physical or virtual). Examples of digital
assets include services such as emails and retention data in Exchange Online, files and
records in SharePoint Online, SQL PaaS services, data lakes, files in on-premises file
servers or Azure File Shares. Consider using a Cloud Access Security Broker (CASB)
service such as Microsoft Defender for Cloud to expose the services used by users,
including shadow IT data locations.
Identities
Devices
Data
Apps
Infrastructure
Network
It might not be possible to develop a detailed list of assets and their status at this stage.
In some cases, this inventory relies on having tools installed, such as Microsoft Intune
and Defender for Cloud Apps. Simply begin the process. As you work through the other
business scenarios, these inventories will become more complete.
Rate your digital assets by content sensitivity and criticality. If you're unaware of
the locations of these assets, consider using Microsoft Purview to discover critical
data.
Keep an updated list of vulnerabilities that exist in your digital estate for all assets.
The following Zero Trust architecture diagram illustrates the relationship of these assets
to each other.
Policy Optimization
Governance
Compliance
Data
Security Posture Assessment Emails & documents
Identities
Human
Non-human
Apps
Zero Trust Policies Network
SaaS
Evaluation Public
On-premises
Enforcement Private
Endpoints Infrastructure
Corporate Serverless
Personal Containers
IaaS
Threat Protection
Paas
Continuous Assessment
Internal Sites
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment JIT & Version Control
ノ Expand table
Inventory your How do you manage IT asset inventory and documentation? (LinkedIn
digital estate article).
Implement basic Document the basic hygiene practices for your organization, including how
hygiene practices to measure success. Hygiene practices are cybersecurity practices that you
practice as a routine to mitigate online breaches. Many of these practices are
included in Stage 1 of other business scenarios. Some are included in later
stages.
Objectives for Resources
Stage 2
Update your As you work through the recommendations across business scenarios,
status for Secure update your status for Secure Score. The score is a measure of progress and
Score success that you can communicate across your organization.
Capture your If you’ve started using Microsoft Purview Compliance Manager to track your
status in regulatory compliance work, check back periodically to update your status.
Compliance Like Secure Score, this is a measure of progress and success that can be
Manager included as part of your security posture.
Stage 3
A security posture requires instrumentation to create visibility. You'll want to unify your
tools and methods into as few views or dashboards as possible for simplification. The
first objective in this stage is to visualize your security posture using audience-
appropriate dashboards.
For example:
Creating and maintaining role-specific views create transparency with the status of the
security posture with your stakeholders who are sharing the burden of security
management, from executive leaders through to incident responders.
Stage 3 also includes maturing the managing shadow IT and patching areas of hygiene.
ノ Expand table
Visualize your security The tracking progress section in the overview article provides several
posture using audience- examples.
appropriate dashboards
As you deploy and configure additional security capabilities, look for
additional audience-scoped views that are valuable for your
organization. For example, see Monitor Zero Trust (TIC 3.0) security
architectures with Microsoft Sentinel.
Document and manage This is a hygiene area you can mature in this stage if you’ve deployed
shadow IT using Defender for Cloud Apps. See Integrate SaaS apps for Zero Trust with
Defender for Cloud Apps Microsoft 365.
Develop a methodology This task within this business scenario isn't about how to patch and
for patching and update systems. Rather, it's about developing a methodology to
updating systems ensure patching and updating the various components of your digital
regularly and with time estate happens regularly with accountability, visibility, and good
sensitivity communication to all affected individuals. Look for opportunities to
automate this, where possible.
What are the best practices for patching and updating your IT
systems? (LinkedIn article)
Stage 4
The objectives of Stage 4 are about maturing your organization’s ability to prevent and
respond to attacks.
ノ Expand table
Continuously educate To help Microsoft customers deploy user training quickly, easily, and
users effectively, use the Microsoft Cybersecurity Awareness Kit ,
developed in partnership with Terranova Security.
You can use attack simulation training in the Microsoft Defender portal
to run realistic attack scenarios in your organization. These simulated
attacks can help you identify and find vulnerable users. See Get started
using Attack simulation training.
Objectives for Stage 4 Resources
Also see Microsoft 365 security tips infographic and Microsoft Entra
end-user rollout templates and materials .
Evolve your Integrating Microsoft Defender XDR into your security operations
organization’s security provides guidance for building and training your Security Operations
operations capability Center (SOC) team, including how to develop and formalize a process
for responding to incidents.
Continue to manage Develop a systematic way for your organization to evaluate and
risk manage risk on an ongoing basis. Revisit the tabletop exercises or ISO
standards to recalibrate where you are and what you have
accomplished.
Ready phase
The Ready phase for this business scenario is a bit different than for other business
scenarios. Rather than evaluating, testing, and piloting specific security capabilities or
configurations, the Ready phase for this scenario includes building your stakeholder
team and then working through each stage and objective with an agile approach.
The following table is an example of how this can work for the Identify risks to your
organization objective in Stage 1 of the Plan phase.
ノ Expand table
Ready Actions
task
Evaluate Decide what resources you'll use to evaluate risks and who should be included in the
activities. This evaluation can include using the tabletop exercises or the ISO
standards. Determine who in your organization should participate.
Test Using the resources you're targeting, review the recommended exercises with a small
set of your stakeholders to gauge your readiness to engage your fuller team of
stakeholders.
Pilot If you're using the tabletop exercises, try out one of the scenarios with the chosen
participants. Review the results and determine if you’re ready to proceed to the other
exercises. If you’re using the ISO standards, target a portion of the standard to pilot
the evaluation.
By taking an agile approach like this, you allow opportunities to adjust and optimize
your methodology and process. You also build confidence as you go.
Adopt phase
In the adopt phase, you incrementally implement your strategy and deployment plans
across functional areas. For this scenario, this involves accomplishing the objectives set
out across the four stages, or the objectives and stages you have customized for your
organization.
As you transition to the adopt phase for this scenario and the others, be sure to
communicate status, progress, and value.
Rapidly modernizing your security posture
Your priority of the technical work Your leadership to gain Your ability to
recommended within the business scenarios: buy-in to strategic communicate status,
technical projects and to progress, and value
· Secure remote and hybrid work lead these to completion
· Identify and protect sensitive business data
· Prevent or reduce damage from a breach
· Meet regulatory or compliance
requirements
The following table lists some example metrics you can use to track your team and
organization security posture.
ノ Expand table
Business enablement Security posture Security Security improvement
response
Use the Zero Trust initiative to track your organization’s progress toward implementing
Zero Trust security. This initiative is aligned with this Microsoft Zero Trust adoption
framework, allowing you to track your progress with metrics aligned with business
scenarios. These metrics capture your resource coverage across prioritized actionable
recommendations to help security teams protect their organization. The initiative also
provides real-time data on your Zero Trust progress that can be shared with
stakeholders.
Each metric includes insights that help teams understand the current state — providing
teams with recommendation details, identifying which assets are affected, and
measuring the impact on the overall Zero Trust maturity.
Zero Trust adoption is a team game that involves both security and IT operations teams
to be aligned and work together to prioritize changes that improve overall Zero Trust
maturity. At the metric and task level, you can share the recommendation with the
appropriate team and owner. The owner can then link directly to the admin experience
of the respective security control to configure and deploy the recommendation.
This Zero Trust adoption framework encourages you to take a risk-based approach
and/or a defensive strategy. With either of these approaches, you can target other
Security Initiatives within the exposure management tool, such as Ransomware
Protection or a specific threat initiative, and see your work accrue to Zero Trust maturity
in the Zero Trust initiative.
You can use the Zero Trust initiative together with this Zero Trust adoption framework.
The metrics and tasks within the initiative are organized by Zero Trust business scenario.
Next Steps
Zero Trust adoption framework overview
Secure remote and hybrid work
Identify and protect sensitive business data
Prevent or reduce business damage from a breach
Meet regulatory and compliance requirements
ノ Expand table
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
Progress tracking resource That helps you… Designed for…
For additional resources, see Zero Trust assessment and progress tracking resources.
Feedback
Was this page helpful? Yes No
Secure remote and hybrid work with
Zero Trust
Article • 04/24/2024
As part of Zero Trust adoption guidance, this article describes the business scenario of
securing remote and hybrid work. Note that securing your business data and
infrastructure are the topics of separate business scenarios and are not included in this
guidance.
The shift to a hybrid workstyle has been forcing organizations to rapidly adapt. Remote
employees are getting work done any way they can, such as using personal devices,
collaborating through cloud services, and sharing data outside the corporate network
perimeter. Hybrid employees work on both corporate and home networks, switching
between business and personal devices.
As employees’ home networks stretch the corporate network perimeter, with different
devices joining that network, security threats are both multiplying and becoming more
sophisticated while attack vectors evolve.
ノ Expand table
Traditional protection relies on A Zero Trust model combines policies, processes, and
network firewalls and virtual private technology to establish trust from cloud to edge,
networks (VPNs) to isolate and restrict irrespective of where users access your network.
corporate resources.
A Zero Trust model doesn’t presume any user identity or
Employees physically ‘badge in’ to the device is secure on any network. The approach mandates
office and use their user account and that you verify the user identity and device, and do so
password to sign in with their device. while continuously monitoring network, data, and
Both the user account and the device application security in the office, at home, and across
are trusted by default. devices.
The following diagram illustrates the shift from traditional protection with network
controls on the left (from limited known locations) to modern protection with Zero Trust
on the right (to unknown locations) in which protection is applied regardless of where
users and devices are located.
The guidance in this article walks through how to get started with and implement your
strategy for securing remote and hybrid work.
The following table provides reasons why business leaders across an organization
should invest in securing remote and hybrid work.
ノ Expand table
Chief Executive The business must be empowered to achieve its strategic goals and objectives,
Officer (CEO) irrespective of the employee's location. Business agility and business execution
shouldn't be constrained. The cost of a successful cyberattack can be a lot
more than the price of implementing security measures. In many cases,
compliance with cyber insurance requirements or standards or regional
regulations is required.
Chief Marketing How the business is perceived both internally and externally shouldn't be
Officer (CMO) restricted by devices or circumstances. Employee well-being is a high priority
Role Why securing remote and hybrid work is important
Chief The applications used by a mobile and hybrid workforce must be accessible
Information while securing the company's data. Security should be a measurable outcome
Officer (CIO) and aligned with IT strategy. User experience and productivity are important.
Chief A remote or hybrid work environment creates a larger surface area for security
Information breaches. The organization should still comply with security and data
Security Officer protection requirements, standards, and regulations as the environment
(CISO) expands.
Chief The technologies and processes used to support business innovation must be
Technology protected. SecOps and DevSecOps practices can reduce the impact of an
Officer (CTO) attack. Complimentary technologies that facilitate both remote work and the
adoption of cloud services in a secure manner must be adopted.
Chief As the workforce becomes mobile and uses a fixed office location less often,
Operations business assets need to stay secure and business risk must be managed. With
Officer (COO) accountability to the CEO for day-to-day business production, any interference
with operations or supply chain due to an attack will impact the bottom line.
Chief Financial Spending priorities are shifting from fixed to agile models. Fixed datacenter
Officer (CFO) investment and buildings are moving to cloud applications and users working
from home. The costs of implementing security features must be balanced with
risk and cost analyses.
In addition to the motivations for business leaders, many employees expect flexibility
and want to work from anywhere, anytime, and from any device.
This report emphasizes that the vast majority of successful cyberattacks can be
prevented by using basic security hygiene.
The adoption cycle for securing remote and
hybrid work
Securing remote and hybrid work with Zero Trust includes deploying security
protections that are basic and at the same time provide sophisticated protection.
Technically, this objective involves policy enforcement and monitoring for all access to
your organization’s resources with a full end-to-end lifecycle approach.
This article walks through this business scenario using the same lifecycle phases as the
Cloud Adoption Framework for Azure (Define strategy, Plan, Ready, Adopt, and Govern
and manage), but adapted for Zero Trust.
ノ Expand table
Read more about the Zero Trust adoption cycle in the Zero Trust adoption framework
overview.
The Define strategy phase is critical to define and formalize our efforts to address the
"Why?" of this scenario. In this phase, we understand the scenario through business, IT,
operational, and strategic perspectives.
This article suggests motivations and outcomes that are relevant to many organizations.
Use these suggestions to hone the strategy for your organization based on your unique
needs.
ノ Expand table
Area Motivations
IT needs A standardized identity platform that caters for human and non-human identity
requirements, removes the needs for VPNs, and provides remote management of
corporate and BYOD devices in a compliant manner while providing a seamless
and positive user experience.
Each one of these elements is the target of attackers and must be protected with the
"never trust, always verify" principle of Zero Trust.
The following table provides objectives and their outcomes for the secure remote and
hybrid work scenario.
ノ Expand table
Objective Outcome
Productivity Organizations want to extend productivity securely to users and their devices,
without restricting employee capabilities based on workforce location.
Safe access Company data and apps need to be accessed by the right employees in a secure
manner that guards company intellectual property and personal data.
Support end As organizations adopt a hybrid workforce mentality, employees need more
users application and platform capabilities for a secure and mobile work experience.
Increase The security of current or proposed work solutions needs to be increased to help
security organizations scale to mobile workforce requirements. The security capabilities
should equal or exceed what is achievable to the on-premises workforce.
Empower IT The IT team wants to secure the workplace, which starts with securing employee’s
user experience without unduly increasing the friction to users. Furthermore, the
IT team needs processes and visibility to support governance and to enable
detection and mitigation of cyberattacks.
Plan phase
Adoption plans convert the aspirational goals of a Zero Trust strategy into an actionable
plan. Your collective teams can use the adoption plan to guide their technical efforts and
align them with your organization's business strategy.
The motivations and outcomes you define, together with your business leaders and
teams, support the "Why?" for your organization. These become the North Star, or
guiding target, for your strategy. Next comes the technical planning to achieve the
motivations and objectives.
Use the following exercises to help you plan the implementation of your organization's
technology strategy. These exercises support Zero Trust adoption efforts by capturing
prioritized tasks. At the end of this process, you'll have a cloud adoption plan that maps
to the metrics and motivations defined in the cloud adoption strategy.
ノ Expand table
Exercise Description
Digital estate Take inventory of your digital estate: identities, devices, apps. Prioritize your
digital estate based on assumptions that align your organization's
motivations and business outcomes.
Initial Align your organization to a technical strategy and adoption plan. The
organizational strategy and plan are based on your organization’s objectives along with
alignment the priorities you identified within your inventory.
Technical skills Create a plan for addressing skills readiness gaps within your organization.
readiness plan
Cloud adoption Develop a cloud adoption plan to manage change across skills, the digital
plan estate, and your organization.
Technical adoption for securing remote and hybrid work involves taking a graduated
approach to ensuring Zero Trust principles are applied to identities, devices, and
applications by requiring that:
ノ Expand table
Verify and secure Register devices with Enroll devices in your Monitor device
every identity with Microsoft Entra ID device management configuration drift
strong authentication solution and apply
Implement Starting recommended security Implement
Integrate SaaS apps point Zero Trust protections passwordless
with Microsoft Entra identity and device authentication
ID for single sign-on access policies Allow only compliant and
trusted devices to access
All new applications Use Microsoft Entra data
use modern application proxy
authentication with on-premises
apps for single sign-
on
If this staged approach works for your organization, you can use:
This Excel workbook to assign owners and track your progress for these stages,
objectives, and their tasks. Here's the worksheet for this business scenario.
Irrespective of the size and complexity of your organization, the following actions apply:
Inventory users, endpoints, apps, data, and networks to understand the state of
security and estimate the level of effort required to transform the estate.
Document the goals and plan for incremental adoption based on priorities. An
example is to secure identities and Microsoft 365 services, followed by endpoints.
Next, secure apps and SaaS services using modern authentication methods and
segmentation capabilities provided by Conditional Access.
For the principle of using least privileged access, inventory how many accounts
have privileged access and reduce those to the least number of accounts possible.
Accounts that require privileged access should use just-in-time and just-enough-
access (JIT/JEA) to limit standing administration privileges. Should a breach occur,
accounts that are compromised are limited, which minimizes the blast radius.
Except for a "break glass" account, no standing admin access should be permitted
for highly privileged roles, which include application administration roles for
productivity services such as SharePoint, Exchange, and Teams.
1. Identities
2. Endpoints (devices)
3. Apps
4. Network
Protecting data is also important for securing remote and hybrid work. This topic is
addressed more thoroughly in Identify and protect sensitive business data.
This table summarizes roles that are recommended when building a sponsorship
program and project management hierarchy to determine and drive results.
ノ Expand table
Security Governance
Network Engineers
Network Implementers
Networking Governance
The PowerPoint slide deck of resources for this adoption content includes the
following slide with a stakeholder view that you can customize for your own
organization.
These resources include prescriptive guidance that you can use as recommended
starting points for your own organization. Adjust the recommendations based on your
priorities and requirements.
ノ Expand table
Resource Description
Rapid Modernization Plan This series of checklists enumerate the technical objectives of
(RaMP) checklist: Explicitly each security deployment area in priority order and documents
validate trust for all access the steps you'll need to take to achieving them. It also lists
requests project members who need to be involved for each area.
Zero Trust identity and device This solution guide recommends a set of identity and device
access configurations access policies that have been tested together. It includes:
Manage devices with Intune This solution guide walks through the phases of managing
devices, from actions that don’t require enrolling devices into
management to fully managing devices. These
recommendations are coordinated with the above resources.
PDF | Visio
Updated June 2022
MFA deployment plan This deployment guide shows you how to plan and implement
a Microsoft Entra multifactor authentication roll-out.
In addition to these resources, the following sections highlight resources for specific
tasks in the four stages previously defined.
Stage 1
ノ Expand table
Verify and secure every identity with What authentication and verification methods are
strong authentication available in Microsoft Entra ID?
Integrate SaaS apps with Microsoft Entra Add SaaS apps to Microsoft Entra ID and to the
ID for single sign-on scope of policies
New applications use modern Checklist—How are you managing the identity for
authentication your workload?
Stage 2
ノ Expand table
Implement Zero Trust identity and device access Protection levels for Zero Trust identity
policies for the Starting point protection level and device access configurations
Use Microsoft Entra application proxy with on- How to configure single sign-on to an
premises apps for single sign-on Application Proxy application
Stage 3
ノ Expand table
Enroll devices into management and apply Manage devices with Intune overview
recommended security protections
Zero Trust identity and device access
configurations
Allow only compliant and trusted devices to access data Set up compliance policies for devices
with Intune
Stage 4
ノ Expand table
Identities, Endpoints, Apps, and Networks are in the scope of this planning phase. Each
of these has a requirement to secure the existing estate and also plans to extend
security to new entities as they arrive as part of a larger onboarding process.
Secure remote and hybrid work solution planning considers that organizations have
existing identities that need to be secured, and new identities must be created that
adhere to security standards.
An adoption plan also includes training your staff to work in a new way to understand
what is required to support your organization, which can include:
Training administrators on new ways of working. Privileged access methods differ
from standing admin access and can raise friction initially until universal
acceptance is reached.
Equipping Helpdesk and IT personnel at all levels with the same benefits
realization message. Increasing security raises attacker friction, balanced by the
benefits of working securely. Ensure that this message is understood and
communicable at all levels.
Creating user adoption and training materials. Security is adopted pervasively as a
shared responsibility and the security benefits aligned to business goals must be
communicated to users. Ensure that user adoption for security is achieved to the
same level as user adoption for new technology.
For more information from the Cloud Adoption Framework, see the Plan for cloud
adoption.
Ready phase
This scenario (securing remote and hybrid work) evaluates and secures identities,
devices, and data over the networks that use them. Since the technologies may be
potentially disruptive, a staged approach is recommended, starting with small projects
offering quick wins that take advantage of your existing licensing and have minimal user
impact.
Begin by building a plan and then testing the plan. Then roll out new configurations and
capabilities incrementally. This provides the opportunity to improve on the plan while
lessons are learned. Be sure to develop a communication plan and announce changes as
you broaden your scope of deployment.
The following diagram illustrates the recommendation to start a project with a small
group to evaluate the changes. This small group can be members of your IT team or a
partner team that is invested in the outcome. Then, pilot the changes with a larger
group. While the illustration includes a third stage of full deployment, this is often
accomplished by gradually increasing the scope of the deployment until your whole
organization is covered.
Pilot
Evaluate
Full deployment
ノ Expand table
Pilot Stage 2: Identify the next 50-100 endpoints in the production environment
Full deployment Stage 3: Enroll the rest of the endpoints in larger increments
Securing identities starts with adopting MFA and segmenting access using Microsoft
Entra Conditional Access. These features support the principle of verifying explicitly but
require an incremental adoption process. Depending on the approach, the MFA
methodology may need to be rolled out and communicated to users before the switch-
on date, especially for an existing workforce used to using passwords only.
Depending on the MFA methodology, user buy-in may need to be sought to use
mobile application-based MFA, versus using a FIDO2 or other token-based
approach. This also applies to Windows Hello for Business.
Conditional Access policies can be complex regarding their evaluation and
decision-making criteria. This requires Conditional Access to be piloted and rolled
out incrementally across the app and user landscape.
Conditional Access may take into account the relative health and patch status of
the endpoint and the user's locations as conditional parameters. If endpoints are
required to be managed to qualify them to access an app or service as an access
condition, then endpoints need to be enrolled into management.
Modern apps that support modern authentication methods readily integrate with
MFA-based authentication and Conditional Access policies. Understanding the
number of applications and their authentication methods is critical.
As you plan and stage the layers of protection to build Zero Trust, take advantage of
resources provided by Microsoft. To secure remote and hybrid work, Microsoft provides
a Common Zero Trust identity and device access policies set. This is a set of policies that
are tested and known to work well together.
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
This policy set includes a Starting point protection level with minimal user impact. This
set of policies doesn't require enrolling devices into management. When you’re ready
and you’ve enrolled devices, you can then deploy the Enterprise level, which is
recommended for Zero Trust.
In addition to these protection levels, you can incrementally increase the scope of the
policies in the following ways:
Apply the scope of the policies to a small set of users to begin with and then
increase the scope of users included. User segmentation allows for risk mitigation
against service outage or user disruption as only targeted users or devices are
affected.
Start by adding Microsoft 365 apps and services to the scope of the policies. Then
advance to include other SaaS apps your organization uses. When you’re ready,
include apps you built in Azure or other cloud providers in the scope of the
policies.
Finally, don’t forget about your users. User adoption and communication are critical
when implementing security for identities, similar to the importance of the initial user
adoption of moving to Microsoft 365 from datacenter-based services. Single phase
approaches rarely succeed when implementing security services. Security initiatives
often fail due to increased friction for users if changes are disruptive and poorly
communicated and tested. This is where executive sponsorship of security initiatives
works best. When executives demonstrate support by adopting early in the deployment
stages, it's easier for users to follow.
To help with user education and adoption, Microsoft provides end-user rollout
templates and materials you can download. These include instructions for how you can
rebrand these and recommendations for sharing these with users. See
https://aka.ms/entratemplates .
Each technical area, such as a Conditional Access policy set, can be secured by enabling
functionality across the tenant. However, a wrongly configured policy can have far
reaching consequences. For example, a badly written Conditional Access policy may lock
all administrators out of a tenant.
The RAMP Checklist can be used to track your progress. It lists both planning and
implementation steps. The QA tenant is the test bed of the implementation actions as
they're performed for the first time.
The output of this stage should be a documented configuration that is built and tested
initially against the QA tenant with plans to then transition to adoption in the
production tenant where the changes are rolled out incrementally while new learnings
are applied to the plan.
As you roll out new configurations in your production environment, maintain consistent
user messaging and stay on top of how these changes affect your users. Implementing
security features may have a low technology impact, such as enabling just in time
access, but reciprocally have a high process impact, such as administrators needing to
request access to services via an approval workflow to perform their duties.
Similarly, device registration has a low impact on user experience, while implementing
Conditional Access based on device compliance and health requirements may have a
dramatic impact on the user base as users are unable to access services.
Testing each service to understand the impact of the service and planned change is
critical to success. Be aware that some impacts might not be fully apparent until you
begin piloting in production.
Adopt phase
In the adoption phase, you incrementally implement your strategy and deployment
plans across functional areas. The adopt phase is a larger implementation of the proof
of concept. The deployment plan is executed, and rollout occurs in successive waves,
based on user segmentation and the areas you are targeting across your digital estate.
Evaluate
Full deployment
Even though you have already tested the new configurations in a QA environment, be
sure your production deployment plans also document what you are testing and
evaluating and the acceptance criteria for measuring success at each stage. Ideally
choose a subset of low-impact users, endpoints, and apps to test on before broadening
the deployment. Following the same methodology, you learn from the success and
failures of the implementation and update the plans.
Note that some of the functionality that is deployed, even though targeted at a limited
audience, can have a service-wide impact. You can mitigate this impact by identifying
risks during QA testing and ensuring that a roll-back plan exists.
Security governance is an iterative process. For organizations with existing policies that
govern security across a digital estate, adopting a Zero Trust strategy provides the
incentive to evolve those policies. As security strategy and policies mature over time, so
do cloud governance processes and policies.
In the planning phase, new functionality was tested against a test tenant in which
management activities occurred. It's important to note that implementing the features
that support Zero Trust principles requires a different way of managing the resulting
end-state.
As Zero Trust addresses security risk in the environment, identity object lifecycle
management is no longer optional. Object attestation is a manifestation of object
lifecycle and drives accountability into the business and away from IT as the sole
custodian of the object lifecycle.
Zero Trust requires an increase of maturity in the resultant administration of the estate,
including how users and administrators interact with the rolled-out end-state. See the
following table as an example of potential changes.
ノ Expand table
Users User-based object attestation review Manage user and guest user access
with access reviews
Discusses other governance areas and tools that address several areas. Due to
different organizational needs, not all of the governance features called out in this
document are applicable to all organizations.
Next Steps
Zero Trust adoption framework overview
Rapidly modernize your security posture
Identify and protect sensitive business data
Prevent or reduce business damage from a breach
Meet regulatory and compliance requirements
ノ Expand table
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Progress tracking resource That helps you… Designed for…
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
For additional resources, see Zero Trust assessment and progress tracking resources.
Feedback
Was this page helpful? Yes No
Identify and protect sensitive business
data
Article • 04/24/2024
As part of Zero Trust adoption guidance, this article describes the business scenario of
safeguarding your most critical data assets. This scenario focuses on how to identify and
protect sensitive business data.
Digital transformation has led organizations to deal with increasing volumes of data.
However, external collaborators such as partners, vendors, and customers access much
of that shared data outside the corporate network. This shift has created a complex data
landscape, especially when you consider the proliferation of hybrid workforces and
cloud migrations, growing cyberthreats, evolving security, and changing regulatory
requirements around how data is governed and protected.
With hybrid work models, corporate assets and data are on the move. Your organization
needs to control wherever the data is stored and transferred on devices, inside apps,
and with partners. For modern-day security, however, you can no longer rely on
traditional network protection controls.
ノ Expand table
Traditional data protection with Modern data protection with Zero Trust
network controls
The following diagram illustrates the shift from traditional protection with network
controls on the left (from limited known locations) to modern protection with Zero Trust
on the right (to unknown locations) in which protection is applied regardless of where
users and devices are located.
to protection applied
directly to data
from perimeter
control of data
The guidance in this article walks through how to get started with and progress your
strategy for identifying and protecting sensitive data. If your organization is subject to
regulations that protect data, use the Meet regulatory and compliance requirements
article in this series to learn how to apply what you learn in this article to protecting data
that is regulated.
The following table provides reasons why business leaders across an organization
should invest in Zero Trust-based data protection.
ノ Expand table
Chief Executive Intellectual property is the backbone of many organizations’ business models.
Officer (CEO) Preventing it from leaking while allowing seamless collaboration with authorized
parties is essential to the business. In organizations dealing with customers’
Role Why protecting sensitive data is important
personally identifiable information (PII), the risk of leakage can result not only in
financial penalties but also damage the company's reputation. Finally, sensitive
business conversations (like mergers and acquisitions, business restructuring,
strategy, and legal matters) can seriously damage an organization if leaked.
Chief While traditional approaches for protecting information relied on limiting access
Information to it, protecting sensitive data adequately by using modern technologies
Officer (CIO) enables more flexible collaboration with external parties, as needed, without
increasing risk. Your IT departments can fulfill their mandate to ensure
productivity while minimizing risk.
Chief As the primary function of this role, securing sensitive business data is an
Information integral part of information security. This outcome directly affects the
Security organization’s larger cybersecurity strategy. Advanced security technology and
Officer (CISO) tools provide the ability to monitor data and prevent leakage and loss.
Chief Intellectual property can differentiate a successful business from a failing one.
Technology Protecting this data from oversharing, unauthorized access, and theft is key to
Officer (CTO) ensure future growth of the organization.
Chief Operations data, procedures, and production plans are a key strategic
Operations advantage to an organization. These plans can also reveal strategic
Officer (COO) vulnerabilities that can be exploited by competitors. Protecting this data from
theft, oversharing, and misuse is critical to the continued success of the
business.
Chief Financial Publicly traded companies have a duty to protect specific financial data before
Officer (CFO) it's made public. Other financial data can reveal plans and strategic strengths or
weaknesses. This data must all be protected to both ensure compliance with
existing regulations and maintain strategic advantages.
Chief Privacy A CPO is typically responsible for ensuring protection of personal data. In
Officer (CPO) organizations that deal with large amounts of customer personal data and
organizations operating in regions with strict privacy regulations, failure to
protect sensitive data can result in steep fines. These organizations also risk
losing customer trust as a consequence. CPOs must also prevent personal data
from being misused in ways that violate customer agreements or laws, which
can include improper sharing of the data within the organization and with
partners.
The adoption cycle for protecting critical
business data
This article walks through this business scenario using the same lifecycle phases as the
Cloud Adoption Framework for Azure—Define strategy, Plan, Ready, Adopt, and Govern
and manage—but adapted for Zero Trust.
ノ Expand table
Read more about the Zero Trust adoption cycle in the Zero Trust adoption framework
overview.
The Define strategy phase is critical to define and formalize our efforts – it formalizes
the “Why?” of this scenario. In this phase, you understand the scenario through
business, IT, operational and strategic perspectives. You define the outcomes against
which to measure success in the scenario, understanding that security is an incremental
and iterative journey.
This article suggests motivations and outcomes that are relevant to many organizations.
Use these suggestions to hone the strategy for your organization based on your unique
needs.
ノ Expand table
Area Motivations
Business needs To safeguard sensitive business data, especially when shared with partners.
Operational Implement data protection in a consistent and standard way, using automation
needs where possible.
Strategic needs Reduce the damage that an insider can cause (intentionally or unintentionally)
or by a bad actor who gains access to the environment.
Note that meeting regulatory requirements might be the primary driving motivation for
some organizations. If this is true for you, go ahead and add this to your organization
strategy and use this business scenario together with the Meet regulatory and
compliance requirements article in this series.
ノ Expand table
Objective Outcome
Productivity Users can easily collaborate on creating business data or perform their job
functions by using business data.
Safe access Access to data and apps is secured at the appropriate level. Highly sensitive data
requires stricter safeguards, but these protections shouldn't burden users who are
expected to contribute to or use this data.
Sensitive business data is limited to those in need of using it and you've put
controls in place to limit or discourage users from sharing or replicating this data
outside the intended usage group.
Support end Controls for securing data have been integrated into the overall Zero Trust
users architecture. These controls include single sign-on, multifactor authentication
(MFA), and Microsoft Entra Conditional Access, so that users aren't continually
challenged with authentication and authorization requests.
Users receive training on how to classify and share data securely. Users are
enabled to take control of their important data, allowing them to revoke access in
case of need, or track usage of the information after it has been shared.
Data protection policies are automated where possible to lessen the burden on
users.
Increase The addition of data protection across the digital estate protects these critical
security business assets and helps reduce the potential damage from a data breach.
Plan phase
Adoption plans convert the principles of Zero Trust strategy into an actionable plan.
Your collective teams can use the adoption plan to guide their technical efforts and align
them with your organization's business strategy.
The motivations and outcomes you define, together with your business leaders and
teams, support the “Why?” for your organization and become the North Star for your
strategy. Next comes the technical planning to achieve the objectives.
Technical adoption for identifying and protecting sensitive business data involves:
Protecting your sensitive business data also involves a few related activities, including:
ノ Expand table
Discover and Develop and test a Add protection to Extend labels and
identify sensitive classification schema specific labels protection to data in
business data (encryption and other SaaS apps, including
Apply labels to data protection settings) DLP
Discover non- across Microsoft 365
sanctioned SaaS Introduce automatic Extend automated
apps Introduce basic DLP and recommended classification to all
policies labeling in Office apps services
Encrypt network and services
communication Set up secure Microsoft Extend labels and
Teams for sharing data Extend DLP policies protection to data at-
internally and externally across Microsoft 365 rest in on-premises
with business partners services repositories
If this staged approach works for your organization, you can use:
This downloadable PowerPoint slide deck to present and track your progress
through these stages and objectives for business leaders and other stakeholders.
Here's the slide for this business scenario.
This Excel workbook to assign owners and track your progress for these stages,
objectives, and their tasks. Here's the worksheet for this business scenario.
First, take stock of where all your data resides, which can be as simple as listing the
apps and repositories with your data. After technologies like sensitivity labeling
have been deployed, you may discover other locations where sensitive data is
being stored. These locations are sometimes referred to as dark or grey IT.
It’s also helpful to estimate how much data you plan to inventory (the volume).
Throughout the recommended technical process, you use the tool set to discover
and identify business data. You’ll learn what kinds of data you have and where this
data resides across services and cloud apps, enabling you to correlate the
sensitivity of the data with the level of exposure of the locations in which it's
present.
For example, Microsoft Defender for Cloud Apps helps you identify SaaS apps you
might not have been aware of. The work of discovering where your sensitive data
resides begins in Stage 1 of the technical implementation and cascades through all
four stages.
Document the goals and plan for incremental adoption based on priorities.
The four stages recommended represent an incremental adoption plan. Adjust this
plan based on your organization’s priorities and the composition of your digital
estate. Be sure to take account of any timeline milestones or obligations for
completing this work.
Data
Apps
Endpoints
Network
Identities
This table summarizes roles that are recommended when building a sponsorship
program and project management hierarchy to determine and drive results.
ノ Expand table
Compliance Officers Map compliance requirements and risks to specific controls and
available technologies
Microsoft 365 Admins Implement changes to your Microsoft 365 tenant for OneDrive and
Protected Folders
User Education Team Ensure guidance for users reflects policy updates and provide
insights into user acceptance of the labeling taxonomy
The PowerPoint deck of resources for this adoption content includes the following
slide with a stakeholder view that you can customize for your own organization.
ノ Expand table
Resource Description
Deployment Acceleration Guide- Learn best practices from the Microsoft Customer
Information Protection and Data Loss Engagement teams. This guidance leads
Prevention organizations to maturity through a crawl, walk, run
model, which aligns with the recommended stages in
this adoption guidance.
RaMP checklist: Data protection Another resource for listing and prioritizing the
recommended work, including stakeholders.
Introduction to Microsoft Purview Data In this resource, you learn about DLP in Microsoft
Resource Description
Stage 1
The Stage 1 deployment objectives include the process of taking inventory of your data.
This includes identifying unsanctioned SaaS apps your organization uses to store,
process, and share data. You can either bring these unsanctioned apps into your app
management process and apply protections, or you can prevent your business data
from being used with these apps.
Starting with Microsoft 365, some of the primary tools you use to identify sensitive
information that needs to be protected are sensitive information types (SITs) and other
classifiers, including trainable classifiers and fingerprints. These identifiers help find
common sensitive data types, such as credit card numbers or governmental
identification numbers, and identifying sensitive documents and emails using machine
learning and other methods. You can also create custom SITs to identify data that is
unique to your environment, including using exact data matching to differentiate data
pertaining to specific people—for example, customer PII—that needs special protection.
When data is added to your Microsoft 365 environment or modified, it's automatically
analyzed for sensitive content using any SITs that are presently defined in your tenant.
You can use content explorer in the Microsoft Purview compliance portal to see any
occurrences of detected sensitive data across the environment. The results let you know
if you need to customize or tune the SITs for your environment for greater accuracy. The
results also give you a first picture of your data stock and your information protection
status. For example, if you're receiving too many false positives for a SIT, or not finding
known data, you can create custom copies of the standard SITs and modify them so they
work better for your environment. You can also refine these using exact data matching.
Additionally, you can use built-in trainable classifiers to identify documents that belong
to certain categories, such as contracts or freight documents. If you have specific classes
of documents you know you have to identify and potentially protect, you can use
samples in the Microsoft Purview compliance portal to train your own classifiers. These
samples can be used to discover the presence of other documents with similar patterns
of content.
In addition to the content explorer, organizations have access to the Content search
capability to produce custom searches for data in the environment, including using
advanced search criteria and custom filters.
The following table lists resources for discovering sensitive business data.
ノ Expand table
Resource Description
Deploy an information Introduces a framework, process, and capabilities you can use to
protection solution with accomplish your specific business objectives for information protection.
Microsoft 365 Purview
Sensitive information Start here to get started with sensitive information types. This library
types includes many articles for experimenting with and optimizing SITs.
Content explorer Scan your Microsoft 365 environment for the occurrence of SITs and
view the results in the content explorer tool.
Trainable classifiers Trainable classifiers allow you to bring samples of the type of content
you want to discover (seeding) and then let the machine learning
engine learn how to discover more of this data. You participate in the
classifier training by validating the results until the accuracy is
improved.
Exact data matching Exact data matching allows you to find sensitive data that matches
existing records—for example, your customers’ PII as recorded in your
line of business apps—which enables you to precisely target such data
with information protection policies, virtually eliminating false positives.
Resource Description
Content search Use Content search for advanced searches, including custom filters. You
can use keywords and Boolean search operators. You can also build
search queries using Keyword Query Language (KQL).
RaMP checklist: Data A checklist of implementation steps with step owners and links to
protection: Know your documentation.
data
Your organization likely subscribes to many SaaS apps, such as Salesforce or apps that
are specific to your industry. The SaaS apps that you know about and manage are
considered sanctioned. In later stages, you extend the data protection schema and DLP
policies you create with Microsoft 365 to protect data in these sanctioned SaaS apps.
However, at this stage it’s important to discover non-sanctioned SaaS apps that your
organization is using. This enables you to monitor traffic to and from these apps to
determine if your organization’s business data is being shared to these apps. If so, you
can bring these apps into management and apply protection to this data, starting with
enabling single sign-on with Microsoft Entra ID.
The tool for discovering SaaS apps that your organization uses is Microsoft Defender for
Cloud Apps.
ノ Expand table
Resource Description
Integrate SaaS apps This solution guide walks through the process of protecting SaaS apps
for Zero Trust with with Zero Trust principles. The first step in this solution includes adding
Microsoft 365 your SaaS apps to Microsoft Entra ID and to the scopes of policies. This
should be a priority.
Evaluate Microsoft This guide helps you get Microsoft Defender for Cloud Apps up and
Defender for Cloud running as quickly as possible. You can discover unsanctioned SaaS apps
Apps as early as the trial and pilot phases.
This objective is more of a check to be sure your network traffic is encrypted. Check in
with your networking team to make sure these recommendations are satisfied.
ノ Expand table
Resource Description
Secure networks with Zero Encrypt application backend traffic between virtual networks.
Trust-Objective 6: All
traffic is encrypted Encrypt traffic between on-premises and cloud.
Networking up (to the For network architects, this article helps put recommended
cloud)-One architect's networking concepts into perspective. Ed Fisher, Security &
viewpoint Compliance Architect at Microsoft, describes how to optimize your
network for cloud connectivity by avoiding the most common
pitfalls.
Stage 2
After you've taken inventory and discovered where your sensitive data resides, move on
to Stage 2 in which you develop a classification schema and begin to test this with your
organization data. This stage also includes identifying where data or projects require
increased protection.
When developing a classification schema, it’s tempting to create many categories and
levels. However, organizations that are most successful limit the number of classification
tiers to a small number, like 3-5. Fewer is better.
So, for example, many organizations are well-served by a three-tier model of protection
across data, devices, and identities. In this model, most data can be protected at a
baseline level. A smaller amount of data might require increased protection. Some
organizations have a very small amount of data that requires protection at much higher
levels. Examples include trade-secret data or data that is highly regulated due to the
extremely sensitive nature of the data or projects.
1 Baseline protection
2 Increased protection
If three tiers of protection work for your organization, this helps simplify how you
translate this to labels and the protection you apply to labels.
For this stage, develop your sensitivity labels and start using them across data in
Microsoft 365. Don’t worry about adding protection to the labels yet, that is preferably
done at a later stage once users have become familiar with the labels and have been
applying these without concerns regarding their constraints for some time. Adding
protection to labels is included in the next stage. However, it's recommended to also get
started with basic DLP policies. Finally, in this stage you apply specific protection to
projects or data sets that require highly sensitive protection.
ノ Expand table
Resource Description
ノ Expand table
Resource Description
Enable sensitivity labels Enable built-in labeling for supported Office files in SharePoint and
for Office files in OneDrive so that users can apply your sensitivity labels in Office for the
SharePoint and web.
OneDrive
Manage sensitivity Next, start introducing labels to users where they can see and apply
labels in Office apps them. When you've published sensitivity labels from the Microsoft
Purview compliance portal, they start to appear in Office apps for users
to classify and protect data as it's created or edited.
Apply labels to When you’re ready, include Microsoft Teams and Microsoft 365 groups
Microsoft Teams and into the scope of your labeling deployment.
Microsoft 365 groups
ノ Expand table
Resource Description
Set up secure teams for sharing data internally and externally with
business partners
If you've identified projects or data that require highly sensitive protection, these
resources describe how to set this up in Microsoft Teams. If the data is stored in
SharePoint without an associated team, use the instructions in these resources for
SharePoint settings.
ノ Expand table
Resource Description
Configure teams with Provides prescriptive recommendations for securing projects with
protection for highly highly sensitive data, including securing and managing guest access
sensitive data (your partners who might be collaborating with you on these projects).
Stage 3
In this stage, you continue to roll out the data classification schema you refined. You
also apply the protections you planned.
Once you add protection to a label (such as encryption and rights management):
All documents that newly receive the label include the protection.
Any document stored in SharePoint Online or OneDrive that received the label
before the protection was added has the protection applied when the document is
opened or downloaded.
Files at rest in the service or residing on a user’s computer don't receive the protection
that was added to the label AFTER these files received the label. In other words, if the
file was previously labeled and then you later add protection to the label, the protection
isn't applied to these files.
ノ Expand table
Resource Description
Learn about See this article for many ways you can configure specific labels to apply
sensitivity protection.
labels
It's recommended that you start with basic policies like “encrypt only” for emails,
and “all employees – full control” for documents. These policies provide strong
levels of protection while providing easy ways out for users when they find
situations in which the introduction of encryption causes compatibility problems
or conflicts with business requirements. You can incrementally tighten restrictions
later as you gain confidence and understanding in the way users need to
consume the sensitive data.
Common See this list of scenarios that are supported by sensitivity labels.
scenarios for
sensitivity
labels
ノ Expand table
Resource Description
Apply a sensitivity Automatically assign a label to files and emails when it matches conditions
label to content that you specify. It's recommended that you initially configure the labels to
automatically provide an interactive labeling recommendation to users. Once you
confirm these are generally accepted, switch them to automatically
applying the label.
ノ Expand table
Resource Description
Prevent Continue to use these steps to apply DLP across your Microsoft 365 environment,
data loss extending the policies to more locations and services and tightening the rule
actions by removing unnecessary exceptions.
ノ Expand table
Resource Description
Insider risk Get started with the recommended actions. You can begin by using policy
management templates to quickly get started, including data theft by departing users.
Stage 4
In this stage, you extend the protections you developed in Microsoft 365 to data in your
SaaS apps. You also transition to automation of as much of the data classification and
governance as possible.
ノ Expand table
Resource Description
Deploy information Using Microsoft Defender for Cloud Apps, you extend the classification
protection for SaaS apps schema you developed with Microsoft 365 capabilities to protect data
in your SaaS apps.
Extend automated classification
ノ Expand table
Resource Description
Apply a sensitivity label Continue to roll out the automated methods for applying labels to
to content automatically your data. Extend them to documents at-rest in SharePoint, OneDrive,
and Teams, and to emails being sent or received by users.
ノ Expand table
Resource Description
Microsoft 365 Scan data in on-premises repositories, including Microsoft Windows file
Purview shares and SharePoint Server. The information protection scanner can
Information inspect any files that Windows can index. If you've configured sensitivity
Protection Scanner labels to apply automatic classification, the scanner can label discovered
files to apply that classification, and optionally apply or remove protection.
ノ Expand table
Resource Description
Microsoft Purview Learn how to use the Microsoft Purview governance portal so your
data governance organization can find, understand, govern, and consume data sources.
documentation Tutorials, REST API reference, and other documentation show you how to
plan and configure your data repository where you can discover available
data sources and manage rights use.
Strategy and planning are aligned: As you draw up your plans for testing, piloting,
and rolling out data classification and protection capabilities across your digital
estate, be sure to revisit your strategy and objectives to ensure your plans are
aligned. This includes priority of data sets, goals for data protection, and target
milestones.
The plan is iterative: As you start to roll out your plan, you'll learn many things
about your environment and the capability set you're using. At each stage of your
roll-out, revisit your results compared to the objectives and fine tune the plans.
This can include revisiting earlier work to fine-tune policies, for example.
Training your staff and users is well-planned: From your administration staff to
helpdesk and your users, everybody is trained to be successful with their data
identification and protection responsibilities.
For more information from the Cloud Adoption Framework for Azure, see Plan for cloud
adoption.
Ready phase
Use the resources previously listed to prioritize your plan for identifying and protecting
sensitive data. The work of protecting sensitive business data represents one of the
layers in your multi-layer Zero Trust deployment strategy.
The staged approach recommended in this article includes cascading the work in a
methodical way across your digital estate. At this Ready phase, revisit these elements of
the plan to be sure everything is ready to go:
Data that is sensitive for your organization is well defined. You'll likely adjust these
definitions as you search for data and analyze the results.
You have a clear map of which data sets and apps to start with and a prioritized
plan for increasing the scope of your work until it encompasses your entire digital
estate.
Adjustments to the prescribed technical guidance that are appropriate for your
organization and environment have been identified and documented.
This list summarizes the high-level methodical process for doing this work:
Get to know the data classification capabilities such as sensitive information types,
trainable classifiers, sensitivity labels, and DLP policies.
Begin using these capabilities with data in Microsoft 365 services. This experience
helps you refine your schema.
Introduce classification into Office apps.
Move on to protection of data on devices by experimenting with and then rolling
out endpoint DLP.
Extend the capabilities you’ve refined within your Microsoft 365 estate to data in
cloud apps by using Defender for Cloud Apps.
Discover and apply protection to data on-premises using Microsoft Purview
Information Protection scanner
Use Microsoft Purview data governance to discover and protect data in cloud data
storage services, including Azure Blobs, Cosmos DB, SQL databases, and Amazon
Web Services S3 repositories.
Data Loss
Sensitivity Labels
Prevention
Public Microsoft Purview
Defender for Microsoft Purview
General Information Protection
Cloud Apps data governance
Scanner
Confidential
Trainable
... Cloud data
classifiers SaaS apps On-premises
storage services
As you finalize your adoption plans, be sure to revisit the Information Protection and
Data Loss Prevention Deployment Acceleration Guide to review the recommendations
and fine-tune your strategy.
Adopt phase
Governance of your organization’s data is an iterative process. By thoughtfully creating
your classification schema and rolling it out across your digital estate you have created a
foundation. Use the following exercises to help you start building your initial
governance plan for this foundation:
Microsoft Purview provides several capabilities to help you govern your data, including:
Retention policies
Mailbox retention and archive capabilities
Records management for more sophisticated retention and deletion policies and
schedules
See Govern your data with Microsoft Purview. Additionally, activity explorer gives you
visibility into what content has been discovered and labeled, and where that content is.
For SaaS apps, Microsoft Defender for Cloud Apps provides rich reporting for sensitive
data that is moving into and out of SaaS apps. See the many tutorials in the Microsoft
Defender for Cloud Apps content library.
Next Steps
Zero Trust adoption framework overview
Rapidly modernize your security posture
Secure remote and hybrid work
Prevent or reduce business damage from a breach
Meet regulatory and compliance requirements
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
For additional resources, see Zero Trust assessment and progress tracking resources.
Feedback
Was this page helpful? Yes No
Prevent or reduce business damage
from a breach
Article • 04/24/2024
As part of Zero Trust adoption guidance, this article describes the business scenario of
preventing or reducing business damage from a cybersecurity breach. This scenario
addresses the Assume breach Zero Trust guiding principle, which includes:
With hybrid IT infrastructure models, your organization’s assets and data are located on
both on-premises and in the cloud and bad actors can employ many different methods
to attack them. Your organization must be able to prevent these attacks as much as
possible and, when breached, minimize the damage of the attack.
Nearly two-thirds of organizations were breached in the past year, and it cost them
an average of $2.4 million per breach. – Forester, The 2021 State of Enterprise
Breaches (April 2022) .
With the cloud, bad actors don’t need to physically breach your private network
perimeter. They can attack your cloud-based digital assets from anywhere in the world.
Your organization’s health and reputation depend on your security strategy. With the
widespread adoption of cloud-based enterprise environments and the growth of the
mobile workforce, data footprints exist beyond the traditional boundaries of corporate
networks. This table summarizes key differences between traditional and modern threat
protection with Zero Trust.
ノ Expand table
Traditional protection relies on The Zero Trust model moves network defenses from static,
perimeter-based security, network-based perimeters to focus on users, devices, assets, and
where you trust everyone resources.
inside the private network.
Assume that a breach can and will happen. Security risks can
Perimeter networks can exist inside and outside your network, you're constantly under
include: attack, and a security incident can happen at any time. A
comprehensive and modern threat protection infrastructure can
- Little network segmentation provide timely attack detection and response.
or security perimeters and
open, flat networks. Minimize the blast radius of security incidents with layers of
- Minimal threat protection protection that, together, reduce the extent of the damage and
and static traffic filtering. how fast it can spread.
- Unencrypted internal traffic.
To reduce the impact of a significant incident, all the following are essential:
The guidance in this article walks through how you can get started on your strategy for
preventing and reducing damage from a breach. Two additional articles give you the
specifics of how to implement that strategy using:
The first step toward a robust security posture is determining how your organization is
vulnerable through risk assessment.
Reducing damage from a breach gives considerable energy to options during and post
breach, which allows your organization to recover quickly from an expected breach or
type of breach. These breach types and the readiness to recover are defined in
subsequent sections in this article.
Recognizing breach intent must be part of your breach preparation. All breaches have
an element of malice or criminal intent attached, however financially driven breaches
have the potential for much greater damage compared to "drive by" or opportunistic
breaches.
For more information on security posture and risk assessment, see Rapidly modernize
your security posture.
Mining
The mining industry is looking more towards the mine of the future where
Operational Technology (OT) systems use fewer manual processes. An example is
the use of Human Machine Interfaces (HMI) that leverage an application interface
to complete jobs and tasks within a processing plant. Because these HMIs are
designed as applications, the cyber security risks for this industry vertical can be
higher.
The threat no longer becomes one of loss of data or theft of company assets. The
threat becomes one of external actors who use identity theft to access critical
systems and interfere with production processes.
Retail
The major risks related to breach within the retail industry can arise when there are
multiple domains for multiple brands that live within the same tenant. The
complexities of managing on-premises or cloud-based identities can create
vulnerabilities.
Health Sector
The major risks within the health sector are data loss. The unauthorized disclosure
of confidential medical records may be a direct threat to data and information
privacy laws that are reserved for patients and clients alike and, based on local
regulations, can incur substantial penalties.
Government Sector
Government sector organizations pose the highest risks for information security.
Reputational damage, national security, and data loss are at stake. This is largely
why government organizations are required to subscribe to stricter standards such
as the National Institute of Standards and Technology (NIST) .
As part of your breach preparation and response, take advantage of Microsoft Defender
Threat Intelligence to search for and learn about the types of attacks and threat
vectors that are most relevant to your vertical.
Identities
Cyber security incidents typically begin with a credential theft of some sort. Credentials
may be stolen using a variety of methods:
Phishing
Password spray
Attacker tries a large list of possible passwords for a given account or set of
accounts. Possible passwords can be based on public data about a user, such as
birthdates in social media profiles.
In all these cases, skilling and education are essential for both users as the target of
phishing attacks and helpdesks as the target of vishing attacks. Helpdesks should have
protocols in place to authenticate requesting users before performing sensitive actions
on user accounts or permissions.
Devices
User devices are another way in for attackers, who typically rely on device compromise
to install malware such as viruses, spyware, ransomware, and other unwanted software
that installs without consent.
Attackers can also use the device's credentials to gain access to your applications and
data.
Network
Attackers can also use your networks to either impact your systems or determine
sensitive data. Common types of network attacks include:
Attacks that aim to overwhelm online services with traffic to make the service
inoperable.
Eavesdropping
An attacker intercepts network traffic and aims to obtain passwords, credit card
numbers, and other confidential information.
An attacker transmits malicious code instead of data values over a form or through
an API.
Cross site scripting
An attacker uses third-party web resources to run scripts in the victim’s web
browser.
The following table provides reasons why business leaders across an organization
should invest in preventing or reducing damage from a breach.
ノ Expand table
Chief Executive The business must be empowered to achieve its strategic goals and objectives,
Officer (CEO) irrespective of the cybersecurity climate. Business agility and business execution
shouldn’t be constrained because of an incident or breach. Business leaders
should understand that security is part of business imperatives and investment
in both breach prevention and breach preparedness is required to ensure
business continuity. The cost of a successful and destructive cyberattack can be
a lot more than the price of implementing security measures.
Chief How the business is perceived both internally and externally shouldn’t be
Marketing restricted based on a breach occurring or breach readiness. Learning how to
Officer (CMO) communicate breach readiness and messaging internally and externally in
response to a breach is a matter of preparation. A successful attack can become
public knowledge, potentially harming brand value, unless a breach
communication plan exists.
Chief The applications used by your organization must be resilient to attack while
Information securing your organization's data. Security should be a measurable outcome
Officer (CIO) and aligned with IT strategy. Breach prevention and breach management must
be aligned with data integrity, privacy, and availability.
Chief The incident response process hinges on the leadership and strategic guidance
Operations provided by this role. It's imperative that preventive and responsive actions are
Officer (COO) carried out as aligned to corporate strategy.
Chief Financial Breach preparation and mitigation are functions of budgeted security spend.
Officer (CFO) Financial systems must be robust and can survive a breach. Financial data must
be classified, secured, and backed up as a sensitive dataset.
A Zero Trust approach solves several security problems arising from security breaches.
You can emphasize the following benefits of a Zero Trust approach with your business
leaders.
ノ Expand table
Benefits Description
Ensure survival Depending on the nature or motivation of the attacker, a breach may be
designed to significantly impact or disrupt your organization’s ability to
perform normal business activities. Preparing for a breach significantly
improves the likelihood of your organization surviving a breach designed to
cripple or disable.
Control damage A breach that results in access to confidential data can have severe impacts,
to your such as damage to brand reputation, loss of sensitive intellectual property,
reputation disruption to customers, regulatory fines, and financial harm to your business.
Zero Trust security helps to reduce the attack area by continuously assessing,
monitoring, and analyzing your IT infrastructure both on-premises and in the
cloud. A Zero Trust architecture helps define policies that are updated
automatically when risks are identified.
Reduce blast Deploying a Zero Trust model can help minimize the impact of an external or
radius within insider breach. It enhances your organization’s ability to detect and respond to
your threats in real time and reduces the blast zone of attacks by restricting lateral
organization movement.
Demonstrate A Zero Trust approach allows triage alerts, correlation of additional threat
robust security signals, and remediation actions. Analyzing signals helps improve your posture
and risk posture by evaluating your security culture and identifying areas for improvement or
best practices. Any change in your network automatically triggers analysis for
potentially malicious activity. You gain complete visibility of all assets and
resources within your networks and how they’re performing, which results in a
significant overall reduction in risk exposure.
Benefits Description
Lower cyber To evaluate the cost of cyber insurance, you need a robust and well-defined
insurance security model and architecture. By implementing Zero Trust security, you
premiums have control, visibility, and governance with real-time analysis for protecting
your network and endpoints. Your security team can detect and overcome
gaps in your overall security posture and prove to insurers that you have
proactive strategies and systems. A Zero Trust approach also improves cyber-
resilience and may even help pay for itself by reducing insurance premiums.
Increase security Zero Trust deployments reduce manual efforts for your security team by
team efficiency automating routine tasks such as resource provisioning, access reviews, and
and morale attestation. As a result, you can empower your security teams with the time
and telemetry they need to detect, deter, and defeat the most critical attacks
and risks, both internally and externally, which in turn boosts IT and security
team morale.
For more information to share with business leaders, see the Minimize the impact of
internal or external bad actors e-book .
ノ Expand table
Define strategy Plan Ready Adopt Govern and
manage
Read more about the Zero Trust adoption cycle in the Zero Trust adoption framework
overview.
To prevent or reduce business damage from a breach, use the information in these
additional articles:
Note that the deployment recommendations for these two separate tracks require the
participation of separate groups of your IT department and the activities for each track
can be done in parallel.
Next Steps
For this business scenario:
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
For additional resources, see Zero Trust assessment and progress tracking resources.
Feedback
Was this page helpful? Yes No
Implement security breach prevention
and recovery infrastructure
Article • 04/24/2024
As part of Zero Trust adoption guidance, this article is part of the Prevent or reduce
business damage from a breach business scenario and describes how to protect your
organization from cyberattacks. This article focuses on how to deploy additional security
measures to prevent a breach and limit its spread and to create and test a business
continuity and disaster recovery (BCDR) infrastructure to more quickly recover from a
destructive breach.
For the elements of the Assume breach Zero Trust guiding principle:
Use analytics to get visibility, drive threat detection, and improve defenses
This article assumes that you have already modernized your security posture.
The following table is an accessible version of the illustration.
ノ Expand table
Read more about the Zero Trust adoption cycle in the Zero Trust adoption framework
overview.
For more information about the "Prevent or reduce business damage from a breach"
business scenario, see:
The overview
The additional elements of implementing threat protection and XDR
The Define strategy phase is critical to define and formalize our efforts – it formalizes
the "Why?" of this scenario. In this phase, you understand the scenario through
business, IT, operational and strategic perspectives. You define the outcomes against
which to measure success in the scenario, understanding that security is an incremental
and iterative journey.
This article suggests motivations and outcomes that are relevant to many organizations.
Use these suggestions to hone the strategy for your organization based on your unique
needs.
Motivations for implementing security breach prevention
and recovery infrastructure
The motivations for security breach prevention and recovery infrastructure are
straightforward, but different parts of your organization have different incentives for
doing this work. The following table summarizes some of these motivations.
ノ Expand table
Area Motivations
Business To operate your business with a posture of breach prevention and recovery as an
needs extension of security. Your business can recover from a breach containing damage
within one or more areas while continuing business as normal.
Strategic To incrementally raise the ability of your business to recover from breaches, which
needs can lower the return of investment to cyber attackers while increasing operating
resiliency. The Assume breach principle of Zero Trust forces you to plan for and
execute changes and updates to ensure business survival, minimize breaches, and
reduce breach recovery time.
ノ Expand table
Objective Outcome
Business Breach prevention and recovery practices result in minimal costs associated
outcomes with breaches and quick recovery of business processes.
Objective Outcome
Governance Breach prevention and recovery tools and systems are deployed and internal
processes are tested and ready for breaches.
Organizational Between security breach prevention and recovery and proactive threat
resilience protection, your organization can recover from an attack quickly and prevent
future attacks of its type.
Security Breach prevention and recovery are integrated into your overall security
requirements and policies.
Plan phase
Adoption plans convert the principles of Zero Trust strategy into an actionable plan.
Your collective teams can use the adoption plan to guide their technical efforts and align
them with your organization's business strategy.
The motivations and outcomes you define, together with your business leaders and
teams, support the "Why?" for your organization and become the North Star for your
strategy. Next comes the technical planning to achieve the objectives.
If this staged approach works for your organization, you can use:
This downloadable PowerPoint slide deck to present and track your progress
through these stages and objectives for business leaders and other stakeholders.
Here's the slide for this business scenario.
This Excel workbook to assign owners and track your progress for these stages,
objectives, and their tasks. Here's the worksheet for this business scenario.
A foundational step in the Zero Trust adoption lifecycle for every business scenario
includes taking inventory and determining the current state of your infrastructure. For
this business scenario, you need to collect information on your current:
Privileged identities
Networking
Insider risk management
Device patching
BCDR
This table summarizes roles that are recommended when building a sponsorship
program and project management hierarchy to determine and drive results.
ノ Expand table
Data Security
Network Architect Advise on and implement network security standards and practices
Compliance Officers Map compliance requirements and risks to specific controls and
available technologies and advise on insider risks to be detected and
managed
Security Governance Monitor to ensure compliance with defined policies and requirements
and/or IT Lead
The PowerPoint deck of resources for this adoption content includes the following
slide with a stakeholder view that you can customize for your own organization.
ノ Expand table
Resource Description
Module: Plan and implement privileged Learn how to use PIM to protect your data and
access resources.
Module: Design a solution for backup Learn how to select appropriate backup solutions and
and disaster recovery disaster recovery solutions for Azure workloads.
Module: Protect your on-premises Learn how to provide disaster recovery for your on-
infrastructure from disasters with Azure premises infrastructure by using Azure Site Recovery.
Site Recovery
Module: Protect your Azure Learn how to provide disaster recovery for your Azure
infrastructure with Azure Site Recovery infrastructure by customizing replication, failover, and
failback of Azure virtual machines.
Module: Design and implement network Learn how to design and implement network security
security solutions such as Azure DDoS, Network Security
Groups, Azure Firewall, and Web Application Firewall.
Module: Secure and isolate access to Learn how to use network security groups and service
Azure resources by using network endpoints to secure your virtual machines and Azure
security groups and service endpoints services from unauthorized network access.
Module: Windows Server update Learn how to use Windows Server Update Services to
management deploy operating system updates to computers on
your network.
Stage 1
The Stage 1 deployment objectives include locking down administrator and other
privileged access accounts, using Microsoft cloud products to back up critical business
data, and ensuring that all network traffic is encrypted.
Cybersecurity incidents typically begin with a credential theft of some sort. Attackers
discover the account name, which can be a well-known or easily discovered email
address, and then proceed to determine the password of the account. This type of
attack can be thwarted in most cases by multifactor authentication (MFA). However, the
Assume breach Zero Trust principle implies that an attacker can and will access your
network using an identity.
Once in your network, attackers try to elevate their level of privilege by compromising
accounts with more and more access. The goal is to compromise a privileged account
that has access to a wide swath of not only sensitive data, but to administrative settings
as well. Therefore, it's imperative that you prevent this level of access to attackers.
First, for hybrid identity organizations, you must ensure that administrator accounts or
accounts holding privileged roles that are used for cloud services aren’t synchronized
with and stored in on-premises Active Directory Domain Services (AD DS). If they're
stored on-premises and AD DS or Microsoft Entra Connect is compromised, an attacker
can have administrative control to your Microsoft cloud services. Review your
synchronization settings to prevent and test whether your cloud administrator accounts
are present in your AD DS.
All organizations with a Microsoft cloud subscription have a Microsoft Entra ID tenant
that contains cloud accounts, which include user and administrative accounts.
Administrators need to perform privileged operations in Microsoft Entra ID, Azure,
Microsoft 365, or SaaS apps.
The first step to protecting privileged accounts is to require strong passwords and MFA.
Additionally, pursuant to the Use least privilege access Zero Trust principle, use
Microsoft Entra PIM in your Microsoft Entra production environment to provide an
additional layer of protection. Microsoft Entra PIM provides time-based and approval-
based role activation to mitigate the risks of excessive, unnecessary, or misused access
permissions.
ノ Expand table
Resource Description
What is hybrid identity with Microsoft Get started with the documentation set for Microsoft
Entra ID? Entra ID Connect.
What is Microsoft Entra Privileged Get started with the documentation set for Microsoft
Identity Management? Entra PIM.
Resource Description
Plan a Microsoft Entra PIM deployment Step through the planning process for deploying PIM
for your privileged accounts.
Module: Plan and implement privileged Learn how to use PIM to protect your data and
access resources.
This objective is to create boundaries on your network so that intermediate analysis and
filtering can protect sensitive servers, applications, and data. Network segmentation can
occur for on-premises servers or in the cloud, for example, with virtual machines hosted
on virtual networks (VNets) in Azure IaaS.
ノ Expand table
Recommendations Resource
Use many ingress/egress cloud micro-perimeters with Secure networks with Zero Trust
some micro-segmentation.
Use multiple subnets and network security groups to host Apply Zero Trust principles to a
multiple tiers of an app and restrict traffic. spoke VNet in Azure
Azure Site Recovery is a native disaster recovery as a service (DRaaS) that offers ease of
deployment, cost effectiveness, and dependability. Deploy replication, failover, and
recovery processes through Site Recovery to help keep your applications running during
planned and unplanned outages, such as an outage based on a cyberattack.
Site Recovery service: Site Recovery helps ensure business continuity by keeping
business apps and workloads running during outages. Site Recovery replicates
workloads running on physical and virtual machines (VMs) from a primary site to a
secondary location. When an outage occurs at your primary site, you fail over to a
secondary location, and access apps from there. After the primary location is
running again, you can fail back to it.
Backup service: The Azure Backup service keeps your data safe and recoverable.
See the previous section for more information.
ノ Expand table
Resource Description
Module: Protect your on-premises Learn how to provide disaster recovery for your on-
infrastructure from disasters with premises infrastructure by using Azure Site Recovery.
Azure Site Recovery
Module: Protect your Azure Learn how to provide disaster recovery for your Azure
infrastructure with Azure Site infrastructure by customizing replication, failover, and
Recovery failback of Azure virtual machines.
This objective is more of a check to be sure your network traffic is encrypted. Check in
with your networking team to make sure these recommendations are satisfied.
ノ Expand table
Recommendations Resource
Encrypt application backend traffic between virtual networks. Secure networks with Zero
Trust-Objective 6: All
Encrypt traffic between on-premises and cloud. traffic is encrypted
Recommendations Resource
For network architects, this article helps put recommended Networking up (to the
networking concepts into perspective. Ed Fisher, Security & cloud)-One architect's
Compliance Architect at Microsoft, describes how to optimize your viewpoint
network for cloud connectivity by avoiding the most common
pitfalls.
Stage 2
The Stage 2 deployment objectives include segmenting your network to exercise better
control for traffic to sensitive resources, ensuring your servers and devices are patched
with updates in a timely manner, creating honeypot resources to deceive and distract
attackers, and beginning the management of your insider risks.
Microsoft offers Microsoft 365 Backup and Azure Backup for native backup and restore
functions.
Microsoft 365 Backup is a new offering (currently in preview) that backs up your
Microsoft 365 tenant data for Exchange, OneDrive, and SharePoint workloads at scale
and provides quick restores. Microsoft 365 Backup or applications built on top of the
Microsoft 365 Backup Storage platform deliver the following benefits regardless of the
size or scale of your tenant:
On-premises files, folders, system state, on-premises VMs (Hyper-V and VMware)
and other on-premises workloads.
Azure VMs or files, folders, and system state.
Azure Managed Disks
Azure Files shares
SQL Server in Azure VMs
SAP HANA databases in Azure VMs
Azure Database for PostgreSQL servers
Azure Blobs
ノ Expand table
Resource Description
Module: Design a solution for Learn how to select appropriate backup solutions and
backup and disaster recovery disaster recovery solutions for Azure workloads.
Overview of Microsoft 365 Backup Get started with the documentation set for Microsoft 365
Backup.
Overview of Azure Backup service Get started with the documentation set for Azure Backup.
Backup and restore plan to protect Learn how Azure Backup protects against a ransomware
against ransomware attack.
You can use Microsoft 365 Backup and Azure Backup as part of your BCDR solution.
You can also use incremental snapshots in Azure for forensic investigation after a
breach. Incremental snapshots are point-in-time backups for managed disks that, when
taken, consist only of the changes since the last snapshot. Snapshots allow you to
establish the last point in time before a breach occurred and restore it to that state.
Identity protection for the user accounts used to administer backups must use strong
authentication with MFA and should use PIM for JIT access. Also ensure that your
backup infrastructure is protected using secondary identities from another identity
provider, such as local identities or local system identities. These are known as break
glass accounts.
For example, if the cyberattack has compromised your Microsoft Entra ID tenant and
you're now locked out of using a Microsoft Entra ID administrator account to access
your backups, the backup infrastructure must allow for a sign-in that is separate from
the compromised Microsoft Entra ID tenant.
Implement a patching plan
A patching plan includes configuring automatic updating across all your entire
operating system estate so that patches are rolled out quickly to avoid attackers who
rely on unpatched systems as attack vectors.
ノ Expand table
Resource Description
Apply Zero Trust to Azure IaaS: Automate Configure automatic updates for Windows and Linux-
virtual machine updates based virtual machines.
Windows Update settings that you can Manage Windows Update settings for Windows 10
manage through Intune policy and Windows 11 with Microsoft Intune.
Also consider updates and patches needed by other devices, especially those that:
Provide security.
Examples include internet access routers, firewalls, packet filtering devices, and
other intermediate security analysis devices.
Your honeypot resources should reflect typical targets for attackers. For example:
User account names that imply administrator access but have no privileges beyond
the honeypot resources.
File share resources that have file names implying sensitive data, such as
CustomerDatabase.xlxs, but the data is fictional.
After deploying your honeypot resources, use your threat protection infrastructure to
monitor them and detect an attack early. Ideally the detection occurs before the attacker
has determined that the honeypot resources are fake and uses lateral transfer
techniques to live off the land, in which the attacker uses your own apps and tools to
attack your assets. During the attack on the honeypot resources, you can also collect
information about the attacker’s identity, methods, and motivations.
With the new deception capability in Microsoft Defender XDR, you can enable and
configure authentic-looking decoy accounts, hosts, and lures. The fake assets generated
by Defender XDR are then automatically deployed to specific clients. When an attacker
interacts with the decoys or lures, the deception capability raises high confidence alerts,
helping your security team's investigations and allowing them to observe an attacker's
methods and strategies.
Microsoft Purview Insider Risk Management helps you quickly identify, triage, and act on
potentially risky activity. By using logs from Microsoft 365 and Microsoft Graph, insider
risk management allows you to define specific policies to identify risk indicators.
Examples of internal risks from users include:
After identifying the risks, you can take action to mitigate these risks, and if necessary
open investigation cases and take appropriate legal action.
ノ Expand table
Resource Description
Module: Manage insider risk Learn about insider risk management and how Microsoft
in Microsoft Purview technologies can help you detect, investigate, and act on risky
activities in your organization.
Resource Description
Module: Implement Learn how to use Microsoft Purview Insider Risk Management to
Microsoft Purview Insider plan your insider risk solution, create insider risk management
Risk Management policies, and manage insider risk management alerts and cases.
Stage 3
In this stage, you extend your backup and site recovery scope to include all business
data and workloads, further your ability to prevent network-based attacks, and create a
more formal design and plan for your threat and BCDR response.
Once you're satisfied that Microsoft 365 Backup and Azure Backup is working for your
critical data and has been tested in recovery exercises, you can now extend it to include
all your business data.
Once you're satisfied that Azure Site Recovery is working for your critical data and has
been tested in recovery exercises, you can now extend it to include all your business
data.
Cloud applications that have opened endpoints to external environments, such as the
internet or on-premises, are at risk of attacks coming in from those environments. To
prevent these attacks, you must scan the traffic for malicious payloads or logic.
For more information, see Cloud native filtering and protection for known threats.
The consequences of a breach can run the spectrum of an attacker infecting devices
with malware, which might be detected and contained relatively easily, to ransomware
attacks in which the attacker has already exfiltrated, encrypted, or destroyed some or all
your organization’s sensitive data and is ransoming its exposure or restoration.
Therefore, it's important to include breaches and the possibility of a highly destructive
cyberattack in your BCDR planning. The same infrastructure that you would use to
continue your business operations in a crisis or after a natural disaster can and should
be used to recover from an attack.
If you already have a BCDR plan in place, review it to ensure that it includes the data,
devices, applications, and processes that could be impacted in a cyberattack.
If not, begin your planning process for general BCDR and include cyberattacks as a
source of crisis or disaster. Note that:
BC plans ensure that the business can function normally in the event of a crisis.
DR plans should include detailed procedures for recovering your IT systems and
processes to restore business operations. These plans should have an off-line
backup, such as on portable media stored in a location with physical security in
place. Attackers can hunt for these types of IT recovery plans in your on-premises
and cloud locations and destroy them as part of a ransomware attack. Because the
destruction of these plans will make it more costly for you to restore your business
operations, the attackers can demand more ransom.
Microsoft 365 Backup, Azure Backup, and Azure Site Recovery described in this article
are examples of BCDR technologies.
ノ Expand table
Resource Description
Module: Design a solution for Learn how to select appropriate backup solutions and
backup and disaster recovery disaster recovery solutions for Azure workloads.
Stage 4
In this stage, you further secure your network and ensure that your BCDR plan and
process works by practicing it for destructive cyberattack situations.
For more information, see Discontinue legacy network security technology, which
describes the types of network security technologies that you might no longer need.
To ensure that your business operations can quickly recover from a devastating
cyberattack, you should regularly practice your BCDR plan in conjunction with your
SecOps team. Consider performing BCDR practice for cyberattacks once a month or
quarter and when elements of your BCDR infrastructure change, such as the use of a
different backup product or method.
Strategy and planning are aligned: As you draw up your plans for testing, piloting,
and rolling out breach prevention and attack recovery capabilities across your
digital estate, be sure to revisit your strategy and objectives to ensure your plans
are aligned. This includes priority and target milestones of goals for breach
prevention and recovery.
The plan is iterative: As you start to roll out your plan, you'll learn many things
about your environment and the capability set you're using. At each stage of your
roll-out, revisit your results compared to the objectives and fine tune the plans. For
example, you can revisit earlier work to fine tune your policies.
Training your staff and users is well-planned: From your security architects to
your IT specialists for networking, devices, and BCDR, everybody has been trained
to be successful with their breach prevention and recovery responsibilities.
For more information from the Cloud Adoption Framework for Azure, see Plan for cloud
adoption.
Ready phase
Use the resources listed in this article to prioritize your plan. The work of implementing
breach prevention and recovery represents one of the layers in your multi-layer Zero
Trust deployment strategy.
The staged approach recommended in this article includes cascading breach prevention
and recovery work in a methodical way across your digital estate. At this phase, revisit
these elements of the plan to be sure everything is ready to go:
Use of Microsoft Entra PIM has been tested for administrator accounts and your IT
admins are trained to use it
Your networking infrastructure has been tested for data encryption as needed,
segmenting to filter access has been tested, and redundant legacy networking
technologies have been determined and tests run to ensure operation if they're
removed
Your system patching practices have been tested for successful installation of
updates and detection of failed updates
You have begun analysis of your insider risks and how to manage them
Your honeypot resources are deployed and have been tested along with your
threat protection infrastructure to detect access
Your BCDR infrastructure and practices have been tested on a subset of data
Adopt phase
Enabling Microsoft Entra PIM for all your administrator and other privileged
accounts
Implementing network traffic encryption, segmentation, and removal of legacy
systems
Deploying honeypot resources
Deploying your patch management infrastructure
Analyzing your insider risks and mapping them to Insider Risk Management
Deploying and practicing your BCDR infrastructure for critical data (Stage 1) or all
business data (Stage 3)
ノ Expand table
Objective Tasks
Track and Assign owners for critical actions and projects, such as IT admin education and
measure honeypot resource management, patch management, networking security, and
BCDR procedures.
Create actionable plans with dates for each action and project, and instrument
progress using reports and dashboards.
Iterate for - Survey networking infrastructure for additional legacy systems that can be
maturity removed.
Objective Tasks
Next Steps
For this business scenario:
ノ Expand table
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Progress tracking resource That helps you… Designed for…
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
For additional resources, see Zero Trust assessment and progress tracking resources.
Feedback
Was this page helpful? Yes No
Implement threat protection and XDR
Article • 04/24/2024
As part of Zero Trust adoption guidance, this article describes how to protect your
organization from cyberattacks and their possible resulting cost and reputation loss.
This article is part of the Prevent or reduce business damage from a breach business
scenario and focuses on how to create a threat protection and eXtended detection and
response (XDR) infrastructure to detect and thwart cyberattacks in progress and
minimize the business damage from a breach.
For the elements of the Assume breach Zero Trust guiding principle:
Use analytics to get visibility, drive threat detection, and improve defenses
This article assumes that you have already modernized your security posture.
The following table is an accessible version of the illustration.
ノ Expand table
Read more about the Zero Trust adoption cycle in the Zero Trust adoption framework
overview.
For more information about the "Prevent or reduce business damage from a breach"
business scenario, see:
The overview
The additional elements of implementing security breach prevention and recovery
infrastructure
The Define strategy phase is critical to define and formalize our efforts – it formalizes
the "Why?" of this scenario. In this phase, you understand the scenario through
business, IT, operational and strategic perspectives. You define the outcomes against
which to measure success in the scenario, understanding that security is an incremental
and iterative journey.
This article suggests motivations and outcomes that are relevant to many organizations.
Use these suggestions to hone the strategy for your organization based on your unique
needs.
Motivations for implementing threat protection and XDR
The motivations for implementing threat protection and XDR are straightforward, but
different parts of your organization have different incentives for doing this work. The
following table summarizes some of these motivations.
ノ Expand table
Area Motivations
IT needs To assist the Security Operations (SecOps) team in creating and maintaining an
integrated defense toolset to secure the assets important to the business.
Integration and reporting should occur across asset classes and technologies and
lower the effort required to provide predictable security outcomes.
Operational To keep your business processes operating through proactive detection and
needs response to attacks in real time.
Strategic Minimize attack damage and costs and maintain your organization’s reputation
needs with customers and partners.
ノ Expand table
Objective Outcome
Governance Threat protection and XDR tools are deployed and SecOps processes are
updated for the changing cybersecurity landscape, threats that are
encountered, and automation of incident response.
Organizational Between security breach prevention and recovery and proactive threat
resilience protection, your organization can recover from an attack quickly and prevent
Objective Outcome
Security Threat protection is integrated into your overall security requirements and
policies.
Plan phase
Adoption plans convert the principles of Zero Trust strategy into an actionable plan.
Your collective teams can use the adoption plan to guide their technical efforts and align
them with your organization's business strategy.
The motivations and outcomes you define, together with your business leaders and
teams, support the "Why?" for your organization and become the North Star for your
strategy. Next comes the technical planning to achieve the objectives.
Defining SecOps processes and procedures for incident response and recovery.
Implementing threat protection and XDR also involves a few related activities, including:
Using the XDR tools to monitor both your business critical and honeypot
resources, which you implemented in the security breach prevention and recovery
article to lure attackers into showing their presence before they can attack your
real resources.
Evolving your SecOps team to be aware of the latest attacks and their methods.
Many organizations can take a four-staged approach to these deployment objectives,
summarized in the following table.
ノ Expand table
Turn on XDR tools: Turn on Defender for Turn on Defender for Evolve SecOps as a
- Defender for Cloud IoT discipline in your
Endpoint organization
- Defender for Office Define internal Design a Microsoft
365 process for SecOps Sentinel workspace Leverage automation
- Microsoft Entra ID and ingest XDR to reduce load on your
Protection Monitor business signals SecOps analysts
- Defender for Identity critical and honeypot
- Defender for Cloud resources with XDR Proactively hunt for
Apps tools threats
Investigate and
respond to threats
using Microsoft
Defender XDR
If this staged approach works for your organization, you can use:
This downloadable PowerPoint slide deck to present and track your progress
through these stages and objectives for business leaders and other stakeholders.
Here's the slide for this business scenario.
This Excel workbook to assign owners and track your progress for these stages,
objectives, and their tasks. Here's the worksheet for this business scenario.
A foundational step in the Zero Trust adoption lifecycle for every business scenario
includes taking inventory and determining the current state of your SecOps team. For
this business scenario, you need to:
Inventory your current XDR tools, their integration, and the use of automation for
incident response.
Review your incident response and recovery procedures and processes.
Review the deployment of your honeypot resources.
Determine the readiness state of your security analysts and whether they need
additional skills training or development.
This table summarizes roles that are recommended when building a sponsorship
program and project management hierarchy to determine and drive results.
ノ Expand table
Security Architect Advise on incident response strategies and practices, XDR tools and
infrastructure, and SecOps team evolution
Security for IT lead Advise on, implement, and manage business critical and honeypot
resources
The PowerPoint deck of resources for this adoption content includes the following
slide with a stakeholder view that you can customize for your own organization.
Because Zero Trust assumes breach, you must prepare for a breach. Adopt a breach
response framework based on NIST , ISO 27001 , CIS , or MITRE to lower the
impact of a breach or cyberattack on your organization.
The following table includes several Microsoft training resources to help your security
teams gain skills.
ノ Expand table
Resource Description
Module: Mitigate incidents with Learn how the Microsoft Defender XDR portal provides a
Microsoft Defender XDR unified view of incidents and alerts from the Microsoft
Defender XDR family of products.
Learning Path: Mitigate threats using Analyze threat data across domains and rapidly remediate
Microsoft Defender XDR threats with built-in orchestration and automation in
Microsoft Defender XDR.
Module: Improve your reliability with Learn the fundamentals of efficient incident response and
modern operations practices: the Azure tools that make them possible.
Incident response
Module: Training: Security incident Learn about Microsoft Sentinel events and entities and
management in Microsoft Sentinel discover ways to resolve incidents.
Stage 1
The Stage 1 deployment objectives include enabling your primary Microsoft XDR tools
and the use of Microsoft Defender XDR, which integrates the signals from the tools into
a single portal, for incident response.
Start with the core suite of XDR tools to protect your organization from attacks on
devices, identities, and cloud-based applications.
ノ Expand table
Resource Description
Defender for A seamless integration into your Microsoft 365 or Office 365 subscription that
Office 365 protects against threats in email, links (URLS), attachments, and collaboration
tools.
Microsoft Entra Helps organizations detect, investigate, and remediate identity-based risks.
ID Protection These identity-based risks can be further fed into tools like Entra Conditional
Access to make access decisions or fed back to a security information and event
management (SIEM) tool for further investigation and correlation.
Resource Description
Defender for Leverages signals from both on-premises Active Directory and cloud identities
Identity to help you better identify, detect, and investigate advanced threats directed at
your organization.
Defender for Delivers full protection for SaaS applications, helping you monitor and protect
Cloud Apps your cloud app data.
Now that you have enabled the primary XDR tools, you can begin using Microsoft
Defender XDR and its portal to analyze alerts and incidents and perform incident
response on suspected cyberattacks.
ノ Expand table
Resource Description
Integrating Microsoft 365 Carefully plan your integration with your SecOps team to optimize
XDR into your security the day-to-day operations and lifecycle management of the tools
operations in the Microsoft Defender XDR.
Incident response with How to use Microsoft Defender XDR to analyze alerts and
Microsoft Defender XDR incidents and incorporate best practices into your SecOps
procedures and processes.
Investigate incidents with How to analyze the alerts that affect your network, understand
Microsoft Defender XDR what they mean, and collate the evidence so that you can devise
an effective remediation plan.
Module: Mitigate incidents Learn how the Microsoft Defender XDR portal provides a unified
with Microsoft Defender view of incidents and alerts from the Microsoft Defender XDR
XDR family of products.
Learning Path: Mitigate Analyze threat data across domains and rapidly remediate threats
threats using Microsoft with built-in orchestration and automation in Microsoft Defender
Defender XDR XDR.
Stage 2
In this stage, you enable additional XDR tools for Azure and on-premises resources,
create or update your SecOps processes and procedures for Microsoft threat protection
and XDR services, and monitor your business critical and honeypot resources to detect
cyber attackers early in the breach.
Turn on Microsoft Defender for Cloud
ノ Expand table
Resource Description
Microsoft Defender for Cloud Get started with the documentation set.
Security alerts and incidents for Use Microsoft Defender for Cloud Security to perform
Microsoft Defender for Cloud incident response for your Azure, hybrid cloud, and on-
premises workloads.
Module: Remediate security alerts Learn how to hunt for threats and remediate risks for your
using Microsoft Defender for Azure, hybrid cloud, and on-premises workloads.
Cloud
Learning Path: Mitigate threats Learn how to detect, investigate, and respond to advanced
using Microsoft Defender for threats on your Azure, hybrid cloud, and on-premises
Cloud workloads.
With the Microsoft XDR tools in place, ensure that their use is integrated into your
SecOps processes and procedures.
ノ Expand table
Resource Description
Incident response overview Proactively investigate and remediate active attack campaigns
on your organization.
Incident response planning Use this article as a checklist to prepare your SecOps team to
respond to cybersecurity incidents.
Common attack incident Use these articles for detailed guidance on common attack
response playbooks methods that malicious users employ every day.
Integrating Microsoft 365 XDR Carefully plan your integration with your SecOps team to
into your security operations optimize the day-to-day operations and lifecycle management
tools in the Microsoft Defender XDR.
Resource Description
Six Tabletop Exercises to Help Use these exercises provided by the Center for Internet Security
Prepare Your Cybersecurity (CIS) to prepare your SecOps team.
Team
Your deployed honeypot resources act as a target for cyber attackers and can be used to
detect their activities early before they move on to real targets and cause business
damage. Focus part of your threat detection and hunting on monitoring both your
business critical and honeypot resources.
ノ Expand table
Resource Description
Incident response with Use Microsoft Defender XDR to spot incidents with alerts that affect
Microsoft Defender XDR your business critical and honeypot resources.
Security alerts and Use Microsoft Defender for Cloud to search for alerts triggered by
incidents for Microsoft advanced detections for your business critical and honeypot
Defender for Cloud resources, such as Azure, hybrid cloud, and on-premises workloads.
Stage 3
In this stage, you enable Defender for IoT, integrate Microsoft Defender XDR with
Microsoft Sentinel, and then use the combined threat protection and XDR infrastructure
to proactively hunt for threats.
The Internet of Things (IoT) supports billions of connected devices that use both
operational technology (OT) and IoT networks. IoT/OT devices and networks are often
built using specialized protocols and might prioritize operational challenges over
security. Microsoft Defender for IoT is a unified security solution built specifically to
identify IoT and OT devices, vulnerabilities, and threats.
ノ Expand table
Resource Description
Microsoft Defender for IoT Get started with the documentation set.
Resource Description
Module: Introduction to Learn about Defender for IoT components and features and
Microsoft Defender for IoT how they support OT and IoT device security monitoring.
Learning Path: Enhance IoT Learn about security considerations that apply at each level of
solution security by using the IoT solution and the Azure services and tools that can be
Microsoft Defender for IoT configured to address security concerns from the ground up.
ノ Expand table
Resource Description
Implement Microsoft Sentinel and Get started with this solution documentation that also
Microsoft Defender XDR for Zero incorporates Zero Trust principles.
Trust
Module: Connect Microsoft Learn about the configuration options and data provided
Defender XDR to Microsoft Sentinel by Microsoft Sentinel connectors for Microsoft Defender
XDR.
Architect your Microsoft Sentinel Learn how to design and implement Microsoft Sentinel
workspace workspaces.
Ingest data sources and configure Learn how to configure data connectors for data ingestion
incident detection in Microsoft into your Microsoft Sentinel workspace.
Sentinel
Module: Connect data to Microsoft Get an overview of the available data connectors for
Sentinel using data connectors Microsoft Sentinel.
Now that your XDR and SIEM infrastructure is in place, your SecOps team can take the
initiative and proactively hunt for threats in progress in your environment instead of
acting reactively to attacks that have already caused damage.
ノ Expand table
Resource Description
Proactively hunt for threats with advanced Get started with the documentation set for threat
hunting in Microsoft Defender XDR hunting with Microsoft Defender XDR.
Hunt for threats with Microsoft Sentinel Get started with the documentation set for threat
hunting with Microsoft Sentinel.
Module: Threat hunting with Microsoft Learn to proactively identify threat behaviors by
Sentinel using Microsoft Sentinel queries.
Stage 4
In this stage, you evolve SecOps as a discipline in your organization and use the
capabilities of Microsoft Defender XDR and Microsoft Sentinel to automate incident
responses for known or previous attacks.
To evolve your SecOps team and discipline beyond the day-to-day tasks of incident
response and recovery, specialists or senior members should understand the larger
threat landscape and disseminate that knowledge throughout the team.
ノ Expand table
Resource Description
Threat analytics in Use the threat analytics dashboard in the Microsoft Defender XDR
Microsoft Defender portal (requires sign-in) for reports that are most relevant to your
XDR organization.
Microsoft Defender Use this built-in platform to streamline triage, incident response, threat
Threat Intelligence hunting, vulnerability management, and cyber threat intelligence analyst
(Defender TI) workflows when conducting threat infrastructure analysis and gathering
threat intelligence.
Microsoft Security Get the latest about security threats and new features and updates for
Blog Microsoft Defender XDR and Microsoft Sentinel.
Leverage automation to reduce load on your SecOps analysts
Use the capabilities of Microsoft Defender XDR and Microsoft Sentinel to automate
incident response to detect and recover from known and anticipated incidents and to
better focus your SecOps team on unanticipated attacks and new attack methods.
ノ Expand table
Resource Description
Automated investigation and response Get started with the Microsoft Defender XDR
in Microsoft Defender XDR documentation set.
Configure automated investigation and For attacks on devices, get started with the Microsoft
remediation capabilities Defender for Endpoint documentation set.
Automate threat response with Get started with the documentation set for using
playbooks in Microsoft Sentinel playbooks in Microsoft Sentinel.
Strategy and planning are aligned: As you draw up your plans for testing, piloting,
and rolling out threat protection and attack recovery capabilities across your on-
premises and cloud infrastructure, be sure to revisit your strategy and objectives to
ensure your plans are aligned. This includes priority and target milestones of goals
for attack detection and response and use of automation.
The plan is iterative: As you start to roll out your plan, you'll learn many things
about your XDR environment and the tools you're using. At each stage of your
roll-out, revisit your results compared to the objectives and fine tune the plans. For
example, this can include revisiting earlier work to fine tune procedures and
policies.
Training your SecOps staff is well-planned: From your security architects to your
frontline security analysts, everybody is trained to be successful with their threat
protection, detection, mitigation, and recovery responsibilities.
For more information from the Cloud Adoption Framework for Azure, see Plan for cloud
adoption.
Ready phase
Use the resources listed in this article to prioritize your plan. The work of implementing
threat protection and XDR represents one of the layers in your multi-layer Zero Trust
deployment strategy.
The staged approach recommended in this article includes cascading the threat
protection work in a methodical way across your digital estate. At this phase, revisit
these elements of the plan to be sure everything is ready to go:
Your SecOps team is informed that changes to their incident response processes
for Microsoft Defender XDR and Microsoft Sentinel are imminent
Your SecOps team is informed of documentation and training resources
Threat hunting procedures and guidelines and automation techniques are ready
for use by analysts
Your honeypot resources are in place
The planning phase demonstrated the gap between what you have and where you want
to be. Use this phase to implement and test XDR tools and their use. For example,
SecOps team leads can:
Enable and use XDR tools for Microsoft Defender XDR to perform incident
response on current attacks
Configure the integration of Microsoft Defender XDR and Microsoft Sentinel using
data connectors and workspaces
Define or refine the SecOps team procedures and processes
Explore and test threat hunting for proactive identification of threats and
automation to detect and recover from known attacks
Adopt phase
Microsoft recommends a cascading, iterative approach to implementing threat
protection and XDR. This allows you to refine your strategy and policies as you go to
increase the accuracy of the results. There’s no need to wait until one phase is complete
before beginning the next. Your results are more effective if you implement elements of
each stage if you iterate along the way.
Governance of your organization’s ability to detect attacks with a threat protection and
XDR infrastructure is an iterative process. By thoughtfully creating your implementation
plan and rolling it out across your SecOps team you have created a foundation. Use the
following tasks to help you start building your initial governance plan for this
foundation.
ノ Expand table
Objective Tasks
Track and Assign owners for critical actions and responsibilities such as incident response
measure procedures, threat intelligence gathering and dissemination, and automation
maintenance.
Create actionable plans with dates and schedules for each action.
Monitor and Manage security threats using Microsoft Defender XDR and Microsoft Sentinel,
detect using automation for common or previous attacks.
Objective Tasks
Iterate for Continually reassess risks and the cyberthreat landscape and make changes to
maturity SecOps procedures, responsibilities, policies, and priorities.
Next Steps
For this business scenario:
ノ Expand table
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Progress tracking resource That helps you… Designed for…
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
For additional resources, see Zero Trust assessment and progress tracking resources.
Feedback
Was this page helpful? Yes No
Meet regulatory and compliance
requirements
Article • 04/24/2024
As part of Zero Trust adoption guidance, this article describes the business scenario of
meeting regulatory and compliance requirements that might be applicable to your
organization.
The process of meeting regulatory and compliance requirements can be long, complex,
and tedious when not managed properly. This challenge has considerably increased the
workload of security, compliance, and regulations teams to achieve and prove
compliance, prepare for an audit, and put ongoing best practices into place.
ノ Expand table
Many organizations use various legacy solutions Unifying your security strategy and policy with
stitched together. These solutions often don’t a Zero Trust approach breaks down silos
work together seamlessly, exposing between IT teams and systems, enabling better
infrastructure gaps and increasing operational visibility and protection across the IT stack.
costs.
Natively integrated compliance solutions, such
Some independent "best of breed solutions" as those in Microsoft Purview, not only work
might even prevent compliance with certain together to support your compliance
regulations while they're used to meet another. requirements and those of a Zero Trust
approach, but they do it with full transparency,
One widespread example is the use of allowing each solution to leverage the benefits
encryption to ensure that authorized individuals of others, such as communication compliance
Traditional approaches to meeting Modern approach to meeting regulatory
regulatory and compliance requirements and compliance requirements with Zero
Trust
handle data securely. But most encryption leveraging sensitivity labels in content.
solutions make data opaque to services such as Integrated compliance solutions can provide
Data Loss Prevention (DLP), eDiscovery, or the required coverage with minimal tradeoffs,
archiving. Encryption prevents the organization such as encrypted content being transparently
from performing due diligence on actions processed by eDiscovery or DLP solutions.
performed by users that utilize encrypted data.
This result forces organizations to make hard Real-time visibility allows automatic discovery
and risky decisions, such as either banning all of assets, including critical assets and
use of file-level encryption for transfers of workloads, while compliance mandates can be
sensitive data or letting encrypted data go applied to these assets through classification
outside the organization uninspected. and sensitivity labeling.
The guidance in this article walks you through how to get started with Zero Trust as a
framework for meeting your regulatory and compliance requirements with an emphasis
on how to communicate and work with business leaders and teams across your
organization.
This article uses the same lifecycle phases as the Cloud Adoption Framework for Azure—
Define strategy, Plan, Ready, Adopt, and Govern and manage—but adapted for Zero
Trust.
The following table is an accessible version of the illustration.
ノ Expand table
The Define strategy phase is critical to defining and formalizing efforts to address the
"Why?" of this scenario. In this phase, you understand the scenario through regulatory,
business, IT, operational, and strategic perspectives.
You then define the outcomes against which to measure success in this scenario,
understanding that compliance is an incremental and iterative journey.
This article suggests motivations and outcomes that are relevant to many organizations.
Use these suggestions to hone the strategy for your organization based on your unique
needs.
ノ Expand table
Chief Executive Responsible for securing organizational strategy that is validated by external
Officer (CEO) auditing bodies. The CEO mostly reports to a board of directors who may
also evaluate the level of compliance with legislative requirements across the
organization and annual audit findings.
Chief Marketing Responsible for ensuring that confidential company information isn't
Officer (CMO) externally shared solely for marketing purposes.
Chief Information Is typically the information officer in the organization and will be held liable
Officer (CIO) to information regulators.
Chief Technology Responsible for maintaining regulatory compliance within the digital estate.
Officer (CTO)
Chief Information Responsible for the adoption and conformance to industry standards that
Security Officer provide controls directly related to information security compliance.
(CISO)
Chief Operations Ensures that company policies and procedures relating to information
Officer (COO) security, data privacy, and other regulatory practices are upheld on an
operational level.
Chief Financial Assesses financial drawbacks and advantages to compliance, such as cyber
Officer (CFO) insurance and tax compliance.
Chief Risk Officer Owns the Risk component of the Governance Risk and Compliance (GRC)
(CRO) framework within the organization. Mitigates threats to non-conformance
and compliance.
Different parts of your organization might have different motivations and incentives for
doing the work of regulatory and compliance requirements. The following table
summarizes some of these motivations. Be sure to connect with your stakeholders to
understand their motivations.
ノ Expand table
Area Motivations
Operational Implement policies, procedures, and work instructions that are referenced and
needs aligned to relevant industry standards and relevant compliance requirements.
Strategic Reduce the risk of infringing on national, regional, and local laws and the
needs potential financial and public reputational damages that can result from
infringements.
A strategy model that is often used within regulatory compliance is the governance
pyramid shown here.
This pyramid illustrates the different levels on which most organizations manage
information technology (IT) governance. From the top of the pyramid to the bottom,
these levels are legislation, standards, policies and procedures, and work instructions.
The top of the pyramid represents the most important level—legislation. At this level,
the variation between organizations is less because laws apply broadly to many
organizations, although national and business-specific regulations can apply only to
some companies and not others. The base of the pyramid, work instructions, represents
the area with the greatest variation and surface area of implementation across
organizations. This is the level that allows an organization to leverage technology to
fulfill the more important requirements for the higher levels.
The right side of the pyramid provides examples of scenarios where organizational
compliance can lead to positive business outcomes and benefits. Business relevance
creates more incentives for organizations to have a governance strategy.
The following table describes how the different governance levels on the left side of the
pyramid can provide the strategic business advantages on the right side.
ノ Expand table
Legislation and laws, considered collectively Passing legal audits can avoid fines and penalties
and builds consumer trust and brand loyalty.
Standards provide a reliable basis for Standards provide quality assurance through
people to share the same expectations various industry quality controls. Some
about a product or service certifications have cyber insurance benefits as well.
Policies and procedures document an Many manual processes related to governance can
organization’s day-to-day functions and be streamlined and automated.
operations
Work instructions describe how to perform The intricate details of manuals and instruction
a process based on the defined policies and documents can be streamlined by technology. This
procedures in detailed steps can greatly reduce human error and save time.
Organization-specific and govern the more intrinsic processes within the business.
4. Work instructions
Detailed controls that are highly technical and customized for organizations to
fulfill the policies and procedures.
There are several standards that add the most value to areas of the Zero Trust
architecture. Focusing attention on the following standards that apply to you will yield
more impact:
The Center for Internet Security (CIS) Benchmarks provide valuable guidance for
device management and endpoint management policies. CIS Benchmarks include
implementation guides for Microsoft 365 and Microsoft Azure. Organizations
across all industries and verticals use CIS benchmarks to assist them in achieving
security and compliance goals. especially those that operate in heavily regulated
environments.
National Institute of Standards and Technology (NIST) provides the NIST Special
Publication (NIST SP 800-63-4 ipd) Digital Identity Guidelines . These guidelines
provide technical requirements for federal agencies implementing digital identity
services and aren't intended to constrain the development or use of standards
outside of this purpose. It's important to note that these requirements are made to
enhance the existing protocols that form part of Zero Trust strategy. Both
government and public sector organizations particularly in the United States
subscribe to NIST, however publicly listed companies can also make use of the
guiding principles within the framework. NIST also provides help for implementing
a Zero Trust architecture in the publications included with NIST SP 1800-35 .
The newly revised ISO 27002:2022 standard is recommended for overall data
governance and information security. However, the Annexure A controls provide a
good foundation for creating a checklist of security controls, which can later be
converted into workable objectives.
Microsoft provides the Microsoft Purview Compliance Manager to help you plan and
track progress toward meetings standards that apply to your organization. Compliance
Manager can help you throughout your compliance journey, from taking inventory of
your data protection risks to managing the complexities of implementing controls,
staying current with regulations and certifications, and reporting to auditors.
The Data Protection Baseline template in Compliance Manager integrates 36 actions for
Zero Trust, aligned across the following control families:
These align strongly with the Zero Trust reference architecture, shown here.
Policy Optimization
Governance
Compliance
Data
Security Posture Assessment Emails & documents
Identities
Human
Non-human
Apps
Zero Trust Policies Network
SaaS
Evaluation Public
On-premises
Enforcement Private
Endpoints Infrastructure
Corporate Serverless
Personal Containers
IaaS
Threat Protection
Paas
Continuous Assessment
Internal Sites
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment JIT & Version Control
Plan phase
ノ Expand table
Identify regulatory Use content explorer in Extend data lifecycle Use Microsoft
requirements that Microsoft Purview to management policies Sentinel to build
apply to your identify data that is with automation. reports based on
organization. subject to regulation the unified audit
requirements and Set up partitioning and log to continuously
Use Compliance assess its risk and isolation controls using assess and
Manager to identify exposure. Define sensitivity labels, DLP, or inventory the
regulations that custom classifiers to information barriers if compliance status
might affect your adapt this capability to required by regulations. of your
business, assess your business needs. information.
compliance with the Expand information
high-level Assess requirements for protection policies by Continue using
requirements information protection, implementing container Compliance
Stage 1 Stage 2 Stage 3 Stage 4
If this staged approach works for your organization, you can use:
This downloadable PowerPoint slide deck to present and track your progress
through these stages and objectives for business leaders and other stakeholders.
Here's the slide for this business scenario.
This Excel workbook to assign owners and track your progress for these stages,
objectives, and their tasks. Here's the worksheet for this business scenario.
Stakeholder team
Your stakeholder team for this business scenario includes leaders across your
organization who are invested in your security posture and are likely to include the
following roles:
ノ Expand table
CISO Protection and governance of data assets and systems, such as risk
and policy determination and tracking and reporting.
Investigation and audit Investigation and reporting in cooperation with compliance and
roles protection leads.
Information protection Data classification and sensitive data identification, controls, and
manager remediation.
The PowerPoint slide deck of resources for this adoption content includes the
following slide with a stakeholder view that you can customize for your own
organization.
Stage 1
In Stage 1, you identify the regulations that apply to your organization and begin using
Compliance Manager. You also review regulations that apply to your organization.
ノ Expand table
Use Compliance Manager to assess Visit the Microsoft Purview compliance portal and
compliance and plan remediation for review all customer-managed improvement actions
identified gaps. relevant to your organization.
ノ Expand table
Regulation or standard Resources
Cybersecurity Maturity Model Certification Configure Microsoft Entra ID for CMMC compliance
(CMMC)
Executive Order on Improving the Nation’s Meet identity requirements of memorandum 22-09
Cybersecurity (EO 14028) with Microsoft Entra ID
North America Electric Reliability Key Compliance and Security Considerations for
Corporation (NERC) the Energy Industry
Stage 2
In Stage 2, you begin implementing controls for data that aren't already in place. More
guidance for planning and deploying information protection controls are in the Identify
and protect sensitive business data Zero Trust adoption guide.
ノ Expand table
Implement basic data governance Learn about retention policies & labels to retain or delete
and information protection policies
using retention and sensitivity labels. Learn about sensitivity labels
Implement communication policies (if Create and manage communication compliance policies
applicable).
Stage 3
In Stage 3, you begin to automate your data governance policies for retention and
deletion, including use of adaptive scopes.
This stage includes implementing controls for segregation and isolation. NIST, for
example, prescribes hosting projects in an isolated environment if these projects relate
to specific types of classified work for and with the United States government. In some
scenarios, financial services regulations require partitioning environments to prevent
employees of different parts of the business from communicating with each other.
ノ Expand table
Cross-tenant access
apps
Stage 4
The objectives in Stage 4 are about operationalizing this scenario by moving to a
continuous motion of evaluating the compliance of your assets to your applicable
regulations and standards.
ノ Expand table
Continuously assess and This article has identified every required tool and for this
inventory the compliance objective, you form a repeatable, iterative process that allows for
status of resources. continuous monitoring of resources and assets within the digital
estate.
Use Microsoft Sentinel to Use Microsoft Sentinel to build reports based on the Unified
build reports to measure Audit Log to assess and measure compliance and demonstrate
compliance. the effectiveness of controls.
Ready phase
Most compliance work happens through policy enforcement. You determine what
conditions must be met to achieve compliance and then create a policy or set of policies
to automate a set of controls. Policy enforcement with Zero Trust creates repeatable
verification for specific compliance controls being implemented. By building controls
into the operational technology that the organization interacts with every day, it
becomes a simpler task to achieve audit readiness.
During the Ready phase, you evaluate, test, and pilot the policies you are targeting to
be sure these activities achieve the intended results. Be sure these do not introduce new
risks. For this Zero Trust business scenario, it’s important to work with your stakeholders
who are implementing access controls, data protection, and other infrastructure
protections. For example, the recommendations for evaluating, testing, and piloting
policies to enable remote and hybrid work are different than the recommendations for
identifying and protecting sensitive data across your digital estate.
Example controls
Each pillar of Zero Trust can be mapped against specific controls within a regulatory or
standards framework.
Example 1
Zero Trust for Identity is mapped to Access Control Management within the Center for
Internet Security (CIS)) Benchmark, and to Annexure A.9.2.2 User Access Provisioning in
ISO 27001:2022.
Identities
Regulatory Requirements Technical elements
ISO 27001: 2022 Identity Provider
Annexure A.9.2.2 User access provisioning
Multifactor authentication
In this diagram, Access Control Management is defined in Annexure 9.2.2 of the ISO
27001 requirements standard, User Access Provisioning. The requirements for this
section are satisfied by requiring multifactor authentication.
The execution of each control, like the enforcement of Conditional Access policies, is
unique to each organization. Your organization’s risk profile along with an inventory of
assets should create an accurate surface area and scope of implementation.
Example 2
One of the more obvious correlations between Zero Trust architecture and industry
standards includes information classification. Annexure 8.2.1 from ISO 27001, dictates
that:
Data
Regulatory Requirements Technical elements
Microsoft Purview data
ISO 27001: 2022
classification service
Annexure 8.2.1 Classification of information
Sensitivity labels
(classify, label, encrypt)
Example 3
Annexure 8.1.1 In ISO 27001:2022 (Inventory of assets) requires that "any assets
associated with information and information processing facilities need to be identified
and managed over the lifecycle, and are always up to date."
The fulfillment of this control requirement can be achieved through the implementation
of Intune device management. This requirement provides a clear account of inventory
and reports the status of compliance for each device against defined company or
industry policies.
Devices
Regulatory Requirements Technical elements
ISO 27001: 2022 Microsoft Intune
Annexure 8.1.1 Inventory of assets
Device management
Compliance policies
For this control requirement, you use Microsoft Intune to manage devices, including
setting up compliance policies to report on the compliance of devices against the
policies you set. You can also use Conditional Access policies to require device
compliance during the authentication and authorization process.
Example 4
The most comprehensive example of a pillar of Zero Trust that has been mapped to
industry standards would be Threat intelligence and Incident response. The entire
Microsoft Defender and Microsoft Sentinel breadth of products become applicable in
this scenario to provide in-depth analysis and execution of threat intelligence and real-
time incident response.
Threat intelligence
Regulatory Requirements Technical elements
ISO 27001: 2022 Microsoft Defender XDR
Annexure A.5.7 Threat intelligence Microsoft Defender for Cloud
Microsoft Sentinel
In this diagram, Microsoft Sentinel together with Microsoft Defender tools provide
threat intelligence.
Adopt phase
In the adoption phase, you incrementally implement your technical plans across your
digital estate. You'll need to categorize the technical plans by area and work with the
corresponding teams to accomplish this phase.
For identity and device access, take a staged approach where you start with a small
number of users and devices and then gradually increase the deployment to include
your full environment. This is described in the Secure remote and hybrid work adoption
scenario. Here's an example.
Pilot
Evaluate
Full deployment
Adoption for protecting data involves cascading the work and iterating as you go to be
sure the policies you create are appropriately honed for your environment. This is
described in the Identify and protect sensitive business data adoption scenario. Here's
an example.
You can use content explorer to monitor the status of organizational compliance. For
data classification, content explorer provides a view of the landscape and spread of
sensitive information within your organization. From trainable classifiers to different
types of sensitive data—either through adaptive scopes or manually created sensitivity
labels—your administrators can see whether the prescribed sensitivity schema is being
applied correctly throughout the organization. This is also an opportunity to identify
specific areas of risk where sensitive information is consistently shared in Exchange,
SharePoint, and OneDrive. Here's an example.
By using the greater reporting functionality within the Microsoft Purview compliance
portal, you can create and quantify a macro-view of compliance. Here's an example.
The same thinking and process can be applied to Azure. Use Defender for Cloud-
Regulatory Compliance to determine a compliance score similar to the same score
provided in the Purview Compliance Manager. The score is aligned to multiple
regulatory standards and frameworks across various industry verticals. It's up to your
organization to understand which of these regulatory standards and frameworks apply
to the score. The status provided by this dashboard displays a constant real-time
assessment of passing versus failing assessments with each standard. Here's an example.
The Purview dashboards provide a broad assessment that can help inform your business
leaders and be used in departmental reporting, such as a quarterly review. On a more
operational note, you can leverage Microsoft Sentinel by creating a Log Analytics
workspace for unified audit log data. This workspace can be connected to your
Microsoft 365 data and provide insights on user activity. Here's an example.
This data is customizable and can be used in conjunction with the other dashboards to
contextualize the regulatory requirement specifically aligned to your organization’s
strategy, risk profile, goals, and objectives.
Next Steps
Zero Trust adoption framework overview
Rapidly modernize your security posture
Secure remote and hybrid work
Identify and protect sensitive business data
Prevent or reduce business damage from a breach
Adoption Scenario Plan Easily understand the security Business scenario project
Phase Grid downloadable enhancements for each business leads, business leaders,
Visio file or PDF scenario and the level of effort for the and other stakeholders.
stages and objectives of the Plan
phase.
Zero Trust adoption tracker Track your progress through the Business scenario project
downloadable PowerPoint stages and objectives of the Plan leads, business leaders,
slide deck phase. and other stakeholders.
Business scenario objectives Assign ownership and track your Business scenario project
and tasks downloadable progress through the stages, leads, IT leads, and IT
Excel workbook objectives, and tasks of the Plan implementers.
phase.
For additional resources, see Zero Trust assessment and progress tracking resources.
Feedback
Was this page helpful? Yes No
Zero Trust deployment for technology
pillars
Article • 04/12/2024
Because your organization might already have elements of Zero Trust protections
already in place, this documentation set provides conceptual information to get you
started and deployment plans and implementation recommendations for end-to-end
adherence to Zero Trust principles. Each article acts as a checklist of deployment
objectives with steps and links to more information.
You deploy Zero Trust principles across your IT infrastructure by implementing Zero
Trust controls and technologies across seven technology pillars. Six of these pillars are
signal sources, a control plane for enforcement, and a critical resource to be defended.
Across these is the pillar that collects those signals and provides visibility for security
incidents and automation and orchestration for responding to and mitigating
cybersecurity threats.
The following articles provide conceptual information and deployment objectives for
these seven technology pillars. Use these articles to assess your readiness and build a
deployment plan to apply Zero Trust principles.
ノ Expand table
Technology Description
pillar
Once an identity has been granted access to a resource, data can flow to a
variety of different endpoints (devices), from IoT devices to smartphones,
Endpoints
BYOD to partner-managed devices, and on-premises workloads to cloud-
hosted servers. This diversity creates a massive attack surface area. Monitor
and enforce device health and compliance for secure access.
Technology Description
pillar
[Ultimately, security teams are protecting data. Where possible, data should
remain safe even if it leaves the devices, apps, infrastructure, and networks the
Data
organization controls. Classify, label, and encrypt data, and restrict access
based on those attributes.
Applications and APIs provide the interface by which data is consumed. They
may be legacy on-premises workloads, lifted-and-shifted to cloud workloads,
Apps
or modern SaaS applications. Apply controls and technologies to discover
shadow IT, ensure appropriate in-app permissions, gate access based on real-
time analytics, monitor for abnormal behavior, control user actions, and
validate secure configuration options.
Recommended training
ノ Expand table
Training Establish the guiding principles and core components of Zero Trust
Use this learning path to understand the basics of applying Zero Trust principles to
the key technology pillars of identities, endpoints, application access, networks,
infrastructure, and data.
Start >
Additional Zero Trust resources
Use these additional Zero Trust resources based on a documentation set or roles in your
organization.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Zero Trust for small businesses Apply Zero Trust principles Customers and partners
to small business customers. working with Microsoft
365 for business
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and IT
(RaMP) for project management of Zero Trust protection. implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
detailed design and deployment
guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security staff
and specializations solutions.
Develop using Zero Trust principles Apply Zero Trust protections Application developers
for application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for the roles in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Feedback
Was this page helpful? Yes No
Securing identity with Zero Trust
Article • 04/12/2024
Background
Cloud applications and the mobile workforce have redefined the security perimeter.
Employees are bringing their own devices and working remotely. Data is being accessed
outside the corporate network and shared with external collaborators such as partners
and vendors. Corporate applications and data are moving from on-premises to hybrid
and cloud environments. Organizations can no longer rely on traditional network
controls for security. Controls need to move to where the data is: on devices, inside
apps, and with partners.
Identities, representing people, services, or IoT devices, are the common dominator
across today's many networks , endpoints , and applications . In the Zero Trust
security model, they function as a powerful, flexible, and granular way to control access
to data .
Once the identity has been verified, we can control that identity's access to resources
based on organization policies, on-going risk analysis, and other tools.
Before most organizations start the Zero Trust journey, their approach to identity
is problematic in that the on-premises identity provider is in use, no SSO is present
between cloud and on-premises apps, and visibility into identity risk is very
limited.
ノ Expand table
When implementing an end-to-end Zero Trust framework for identity, we recommend you focus
first on these initial deployment objectives:
II. Conditional Access policies gate access and provide remediation activities.
IV. Identities and access privileges are managed with identity governance.
V. User, device, location, and behavior is analyzed in real time to determine risk and
deliver ongoing protection.
VI. Integrate threat signals from other security solutions to improve detection, protection,
and response.
ノ Expand table
1. Choose an authentication option . Microsoft Entra ID provides you the best brute
force, DDoS, and password spray protection, but make the decision that's right for
your organization and your compliance needs.
2. Only bring the identities you absolutely need. For example, use going to the cloud
as an opportunity to leave behind service accounts that only make sense on-
premises. Leave on-premises privileged roles behind.
3. If your enterprise has more than 100,000 users, groups, and devices combined
build a high performance sync box that will keep your life cycle up to date.
Put Microsoft Entra ID in the path of every access request. This connects every user
and every app or resource through one identity control plane and provides
Microsoft Entra ID with the signal to make the best possible decisions about the
authentication/authorization risk. In addition, single sign-on and consistent policy
guardrails provide a better user experience and contribute to productivity gains.
Also make sure you do not have multiple IAM engines in your environment. Not only
does this diminish the amount of signal that Microsoft Entra ID sees, allowing bad actors
to live in the seams between the two IAM engines, it can also lead to poor user
experience and your business partners becoming the first doubters of your Zero Trust
strategy.
2. For Kerberos and form-based auth applications, integrate them using the
Microsoft Entra application proxy.
4. To help discover and migrate your apps off of ADFS and existing/older IAM
engines, review resources and tools.
5. Power push identities into your various cloud applications. This gives you a tighter
identity lifecycle integration within those apps.
Tip
1. Roll out Microsoft Entra multifactor authentication (P1). This is a foundational piece
of reducing user session risk. As users appear on new devices and from new
locations, being able to respond to an MFA challenge is one of the most direct
ways that your users can teach us that these are familiar devices/locations as they
move around the world (without having administrators parse individual signals).
2. Block legacy authentication. One of the most common attack vectors for malicious
actors is to use stolen/replayed credentials against legacy protocols, such as SMTP,
that cannot do modern security challenges.
Microsoft provides standard conditional policies called security defaults that ensure a
basic level of security. However, your organization may need more flexibility than
security defaults offer. You can use Conditional Access to customize security defaults
with more granularity and to configure new policies that meet your requirements.
Planning your Conditional Access policies in advance and having a set of active and
fallback policies is a foundational pillar of your Access Policy enforcement in a Zero Trust
deployment. Take the time to configure your trusted IP locations in your environment.
Even if you do not use them in a Conditional Access policy, configuring these IPs
informs the risk of Identity Protection mentioned above.
Check out our deployment guidance and best practices for resilient Conditional
Access policies.
Register devices with Microsoft Entra ID to restrict access from
vulnerable and compromised devices
1. Enable Microsoft Entra hybrid join or Microsoft Entra join. If you are managing the
user's laptop/computer, bring that information into Microsoft Entra ID and use it to
help make better decisions. For example, you may choose to allow rich client
access to data (clients that have offline copies on the computer) if you know the
user is coming from a machine that your organization controls and manages. If
you do not bring this in, you will likely choose to block access from rich clients,
which may result in your users working around your security or using shadow IT.
2. Enable the Intune service within Microsoft Endpoint Manager (EMS) for managing
your users' mobile devices and enroll devices. The same can be said about user
mobile devices as about laptops: The more you know about them (patch level,
jailbroken, rooted, etc.), the more you are able to trust or mistrust them and
provide a rationale for why you block/allow access.
Tip
ノ Expand table
Additional deployment objectives
1. Restrict user consent and manage consent requests to ensure that no unnecessary
exposure occurs of your organization's data to apps.
Manage entitlement
With applications centrally authenticating and driven from Microsoft Entra ID, you can
now streamline your access request, approval, and recertification process to make sure
that the right people have the right access and that you have a trail of why users in your
organization have the access they have.
1. Use Entitlement Management to create access packages that users can request as
they join different teams/projects and that assigns them access to the associated
resources (such as applications, SharePoint sites, group memberships).
With Microsoft Entra ID supporting FIDO 2.0 and passwordless phone sign-in, you can
move the needle on the credentials that your users (especially sensitive/privileged users)
are employing day-to-day. These credentials are strong authentication factors that can
mitigate risk as well.
Enable Microsoft Entra Password Protection for your users in the cloud and on-
premises.
Get more granular session/user risk signal with Identity Protection. You'll be able to
investigate risk and confirm compromise or dismiss the signal, which will help the
engine better understand what risk looks like in your environment.
Enable Defender for Cloud Apps monitoring to enrich the Identity Protection
signal.
Integration with Microsoft Defender for Identity enables Microsoft Entra ID to know that
a user is indulging in risky behavior while accessing on-premises, non-modern resources
(like File Shares). This can then be factored into overall user risk to block further access
in the cloud.
1. Enable Microsoft Defender for Identity with Microsoft Defender for Cloud Apps to
bring on-premises signals into the risk signal we know about the user.
2. Check the combined Investigation Priority score for each user at risk to give a
holistic view of which ones your SOC should focus on.
Microsoft Defender for Endpoint allows you to attest to the health of Windows
machines and determine whether they are undergoing a compromise. You can then feed
that information into mitigating risk at runtime. Whereas Domain Join gives you a sense
of control, Defender for Endpoint allows you to react to a malware attack at near real
time by detecting patterns where multiple user devices are hitting untrustworthy sites,
and to react by raising their device/user risk at runtime.
Microsoft Entra ID
Microsoft 365
SharePoint Online
Exchange Online
Conclusion
Identity is central to a successful Zero Trust strategy. For further information or help with
implementation, please contact your Customer Success team or continue to read
through the other chapters of this guide, which span all Zero Trust pillars.
Background
The modern enterprise has an incredible diversity of endpoints accessing data. Not all
endpoints are managed or even owned by the organization, leading to different device
configurations and software patch levels. This creates a massive attack surface and, if left
unresolved, accessing work data from untrusted endpoints can easily become the
weakest link in your Zero Trust security strategy.
Zero Trust adheres to the principle, "Never trust, always verify." In terms of endpoints,
that means always verify all endpoints. That includes not only contractor, partner, and
guest devices, but also apps and devices used by employees to access work data,
regardless of device ownership.
In a Zero Trust approach, the same security policies are applied regardless of whether
the device is corporate-owned or personally-owned through bring your own device
(BYOD); whether the device is fully managed by IT, or only the apps and data are
secured. The policies apply to all endpoints, whether PC, Mac, smartphone, tablet,
wearable, or IoT device wherever they are connected, be it the secure corporate
network , home broadband, or public internet.
Most importantly, the health and trustworthiness of apps that run on those endpoints
impacts your security posture. You need to prevent corporate data from leaking to
untrusted or unknown apps or services, either accidentally or through malicious intent.
There are a few key rules for securing devices and endpoints in a Zero Trust model:
Zero Trust security policies are centrally enforced through the cloud and cover
endpoint security, device configuration, app protection, device compliance, and
risk posture.
The platform as well as the apps that run on the devices are securely provisioned,
properly configured, and kept up to date.
Before most organizations start the Zero Trust journey, their endpoint security is
set up as follows:
Endpoints are domain-joined and managed with solutions like Group Policy
Objects or Configuration Manager. These are great options, but they don't
leverage modern Windows 10 CSPs or require a separate cloud management
gateway appliance to service cloud-based devices.
ノ Expand table
When implementing an end-to-end Zero Trust framework for securing endpoints, we recommend
you focus first on these initial deployment objectives:
I. Endpoints are registered with cloud identity providers. In order to monitor security and risk
across multiple endpoints used by any one person, you need visibility in all devices and
access points that may be accessing your resources.
II. Access is only granted to cloud-managed and compliant endpoints and apps. Set
compliance rules to ensure that devices meet minimum security requirements before access is
granted. Also, set remediation rules for noncompliant devices so that people know how to
resolve the issue.
III. Data loss prevention (DLP) policies are enforced for corporate devices and BYOD. Control
what the user can do with the data after they have access. For instance, restrict file saving to
untrusted locations (such as local disk), or restrict copy-and-paste sharing with a consumer
communication app or chat app to protect data.
IV. Endpoint threat detection is used to monitor device risk. Use a single pane of glass to
manage all endpoints in a consistent way, and use a SIEM to route endpoint logs and
transactions such that you get fewer, but actionable, alerts.
V. Access control is gated on endpoint risk for both corporate devices and BYOD. Integrate
data from Microsoft Defender for Endpoint, or other Mobile Threat Defense (MTD) vendors,
as an information source for device compliance policies and device Conditional Access rules.
The device risk will then directly influence what resources will be accessible by the user of that
device.
ノ Expand table
After a device is registered, users can access your organization's restricted resources
using their corporate username and password to sign in (or Windows Hello for
Business).
1. Start up your new device and begin the OOBE (out-of-box-experience) process.
2. On the Sign in with Microsoft screen, type your work or school email address.
4. On your mobile device, approve your device so it can access your account.
5. Complete the OOBE process, including setting your privacy settings and setting up
Windows Hello (if necessary).
3. On the Set up a work or school account screen, select Join this device to
Microsoft Entra ID.
4. On the Let's get you signed in screen, type your email address (for example,
[email protected]), and then select Next.
5. On the Enter password screen, type your password, and then select Sign in.
6. On your mobile device, approve your device so it can access your account.
7. On the Make sure this is your organization screen, review the information to make
sure it's right, and then select Join.
2. Select Access work or school, and then select Connect from the Access work or
school screen.
3. On the Add a work or school account screen, type in your email address for your
work or school account, and then select Next. For example, [email protected].
4. Sign in to your work or school account, and then select Sign in.
5. Complete the rest of the registration process, including approving your identity
verification request (if you use two-step verification) and setting up Windows Hello
(if necessary).
The following Microsoft Intune and Microsoft Entra actions are completed in the
Microsoft Endpoint Manager admin center :
Start by creating a Windows Hello for Business enrollment policy in Microsoft Intune.
1. Go to Devices > Enrollment > Enroll devices > Windows enrollment > Windows
Hello for Business.
2. Select from the following options for Configure Windows Hello for Business:
a. Disabled. If you don't want to use Windows Hello for Business, select this
setting. If disabled, users can't provision Windows Hello for Business except on
Microsoft Entra joined mobile phones where provisioning may be required.
b. Enabled. Select this setting if you want to configure Windows Hello for Business
settings. When you select Enabled, additional settings for Windows Hello
become visible.
c. Not configured. Select this setting if you don't want to use Intune to control
Windows Hello for Business settings. Any existing Windows Hello for Business
settings on Windows 10 devices isn't changed. All other settings on the pane
are unavailable.
If you selected Enabled, configure the required settings that are applied to all enrolled
Windows 10 devices and Windows 10 mobile devices.
1. Use a Trusted Platform Module (TPM). A TPM chip provides an additional layer of
data security. Choose one of the following values:
a. Required. Only devices with an accessible TPM can provision Windows Hello for
Business.
b. Preferred. Devices first attempt to use a TPM. If this option isn't available, they
can use software encryption.
2. Set a minimum PIN length and Maximum PIN length. This configures devices to
use the minimum and maximum PIN lengths that you specify to help ensure secure
sign-in. The default PIN length is six characters, but you can enforce a minimum
length of four characters. The maximum PIN length is 127 characters.
3. Set a PIN expiration (days). It's good practice to specify an expiration period for a
PIN, after which users must change it. The default is 41 days.
4. Remember PIN history. Restricts the reuse of previously used PINs. By default, the
last 5 PINs can't be reused.
5. Use enhanced anti-spoofing, when available. This configures when the anti-
spoofing features of Windows Hello are used on devices that support it. For
example, detecting a photograph of a face instead of a real face.
6. Allow phone sign-in. If this option is set to Yes, users can use a remote passport to
serve as a portable companion device for desktop computer authentication. The
desktop computer must be Microsoft Entra joined, and the companion device
must be configured with a Windows Hello for Business PIN.
After configuring the settings that apply to all enrolled Windows 10 devices and
Windows 10 mobile devices, set up Windows Hello for Business Identity Protection
profiles to customize Windows Hello for Business security settings for specific end user
devices.
1. Select Devices > Configuration profiles > Create profile > Windows 10 and Later
> Identity Protection.
2. Configure Windows Hello for Business. Choose how you want to configure
Windows Hello for Business.
g. Enable PIN recovery. Allows user to use the Windows Hello for Business PIN
recovery service.
h. Use a Trusted Platform Module (TPM). A TPM chip provides an additional layer
of data security.
i. Allow biometric authentication. Enables biometric authentication, such as facial
recognition or fingerprint, as an alternative to a PIN for Windows Hello for
Business. Users must still configure a PIN in case biometric authentication fails.
k. Use security keys for sign-in. This setting is available for devices that run
Windows 10 version 1903 or later. Use it to manage support for using Windows
Hello security keys for sign-in.
Finally, you can create additional device restriction policies to further lock down
corporate-owned devices.
Tip
Also, set remediation rules for noncompliant devices, such as blocking a noncompliant
device or offering the user a grace period to get compliant.
2. Select a Platform for this policy (Windows 10 used for example below).
8. Configure the required Microsoft Defender for Endpoint machine risk score.
9. On the Actions for noncompliance tab, specify a sequence of actions to apply
automatically to devices that do not meet this compliance policy.
When their endpoints or apps become non-compliant, users are guided through self-
remediation. Alerts are automatically generated with additional alarms and automated
actions set for certain thresholds. You can set non-compliance remediation actions.
1. Select Devices > Compliance policies > Notifications > Create notification.
Use Intune security baselines to help you secure and protect your users and devices.
Security baselines are preconfigured groups of Windows settings that help you apply a
known group of settings and default values that are recommended by the relevant
security teams.
1. Select Endpoint security > Security baselines to view the list of available baselines.
2. Select the baseline you'd like to use, and then select Create profile.
3. On the Configuration settings tab, view the groups of Settings that are available in
the baseline you selected. You can expand a group to view the settings in that
group and the default values for those settings in the baseline. To find specific
settings:
b. Use the Search bar and specify keywords that filter the view to display only
those groups that contain your search criteria.
4. On the Assignments tab, select groups to include and then assign the baseline to
one or more groups. To fine-tune the assignment, use Select groups to exclude.
Ensure updates are deployed automatically to endpoints
Configure Windows 10 devices
a. Select Devices > Windows > Windows 10 Update Rings > Create.
b. Under Update ring settings, configure settings for your business needs.
c. Under Assignments, choose + Select groups to include, and then assign the
update ring to one or more groups. To fine-tune the assignment, use + Select
groups to exclude.
2. Manage Windows 10 feature updates in Intune to bring devices to the Windows
version you specify (i.e., 1803 or 1809) and freeze the feature set on those devices
until you choose to update them to a later Windows version.
a. Select Devices > Windows > Windows 10 Feature updates > Create.
b. Under Basics, specify a name, a description (optional), and, for Feature update
to deploy, select the version of Windows with the feature set you want, and
then select Next.
c. Under Assignments, choose and select groups to include and then assign the
feature update deployment to one or more groups.
1. Select Devices > Update policies for iOS/iPadOS > Create profile.
2. On the Basics tab, specify a name for this policy, specify a description (optional),
and then select Next.
i. Latest update: This deploys the most recently released update for
iOS/iPadOS.
ii. Any previous version that is available in the dropdown box. If you select a
previous version, you must also deploy a device configuration policy to delay
visibility of software updates.
i. Update at next check-in. The update installs on the device the next time it
checks in with Intune. This is the simplest option and has no additional
configurations.
ii. Update during scheduled time. You configure one or more windows of time
during which the update will install upon check-in.
iii. Update outside of scheduled time. You configure one or more windows of
time during which the updates won't install upon check-in.
c. Weekly schedule: If you choose a schedule type other than update at next
check-in, configure the following options:
5. Define a time window. Define one or more blocks of time that restrict when the
updates install. Options include start day, start time, end day, and end time. By
using a start day and end day, overnight blocks are supported. If you do not
configure times to start or end, the configuration results in no restriction and
updates can install at any time.
4. Configure settings for BitLocker to meet your business needs, and then select OK.
Configure FileVault encryption on macOS devices
a. Platform: macOS.
6. Configure the remaining FileVault settings to meet your business needs, and then
select OK.
To ensure your data remains safe or contained in a managed app, create app protection
policies (APP). A policy can be a rule that is enforced when the user attempts to access
or move "corporate" data, or a set of actions that are prohibited or monitored when the
user is inside the app.
The APP data protection framework is organized into three distinct configuration levels,
with each level building off the previous level:
Enterprise basic data protection (Level 1) ensures that apps are protected with a
PIN and encrypted, and performs selective wipe operations. For Android devices,
this level validates Android device attestation. This is an entry-level configuration
that provides similar data protection control in Exchange Online mailbox policies
and introduces IT and the user population to APP.
Enterprise enhanced data protection (Level 2) introduces APP data leakage
prevention mechanisms and minimum OS requirements. This is the configuration
that is applicable to most mobile users accessing work or school data.
1. In Intune portal, choose Apps > App protection policies. This selection opens the
App protection policies details, where you create new policies and edit existing
policies.
2. Select Create policy and select either iOS/iPadOS or Android. The Create policy
pane is displayed.
3. Choose the apps that you would like to apply the App Protection Policy to.
b. Android data protection. For information, see Android app protection policy
settings - Data protection.
b. Android conditional launch. For information, see Android app protection policy
settings - Conditional launch.
8. When you are done, click Create to create the app protection policy in Intune.
Tip
ノ Expand table
Using the Intune Data warehouse, send device and app management data to reporting
or SIEM tools for intelligent filtering of alerts to reduce noise.
From PowerBI
1. From the menu, select File > Get Data > OData feed.
2. Paste the custom feed URL that you copied from the earlier step into the URL box
in the OData feed window.
3. Select Basic.
4. Select OK.
5. Select Organization account, and then sign in with your Intune credentials.
6. Select Connect. The Navigator will open and show you the list of tables in the
Intune Data Warehouse.
7. Select the devices and the ownerTypes tables. Select Load. Power BI loads data to
the model.
8. Create a relationship. You can import multiple tables to analyze not just the data in
a single table, but related data across tables. Power BI has a feature called
autodetect that attempts to find and create relationships for you. The tables in the
Data Warehouse have been built to work with the autodetect feature in Power BI.
However, even if Power BI doesn't automatically find the relationships, you can still
manage the relationships.
10. Select Autodetect if Power BI has not already detected the relationships.
With Microsoft Intune cloud enrollment services, you can give new devices to your
users without the need to build, maintain, and apply custom operating system
images to the devices.
Configure Windows Autopilot to automate Microsoft Entra join and enroll new
corporate-owned devices into Intune.
Microsoft Entra ID
Microsoft 365
BitLocker
Defender for IoT supports zero trust principles by addressing OT-specific challenges,
such as:
Deploy Defender for IoT network sensors to detect devices and traffic and watch for OT-
specific vulnerabilities. Segment your sensors into sites and zones across your network
to monitor traffic between zones, and follow Defender for IoT's risk-based mitigation
steps to lower risk across your OT environment. Defender for IoT then continuously
monitors your devices for anomalous or unauthorized behavior.
Integrate with Microsoft services, such as Microsoft Sentinel and other partner services,
including both SIEM and ticketing systems, to share Defender for IoT data across your
organization.
Conclusion
A Zero Trust approach can significantly strengthen the security posture of your devices
and endpoints. For further information or help with implementation, please contact your
Customer Success team, or continue to read through the other chapters of this guide
that spans all Zero Trust pillars.
The Zero Trust deployment guide series
Feedback
Was this page helpful? Yes No
Secure data with Zero Trust
Article • 04/30/2024
Background
Zero Trust is a security strategy used to design security principles for your organization.
Zero Trust helps secure corporate resources by implementing the following security
principles:
Verify explicitly. Always authenticate and authorize based on all available data
points, including user identity, location, device health, service or workload, data
classification, and anomalies.
Use least privilege access. Limit user access with just-in-time (JIT) and just-
enough-access (JEA), risk-based adaptive policies, and data protection to help
secure both data and productivity.
Assume breach. Minimize the blast radius and segment access. Verify end-to-end
encryption and use analytics to get visibility, drive threat detection, and improve
defenses.
Microsoft Purview proposes five core elements for a data defense in depth strategy and
a Zero Trust implementation for data:
2. Information Protection
Conditional and least privilege access to sensitive data reduce data security risks.
Apply sensitivity-based access control guardrails, rights management and
encryption where environmental controls are insufficient. Use information
sensitivity markings to increase awareness and security policy compliance.
5. Data Governance
Proactively managing the lifecycle of sensitive data reduces its exposure. Limit the
number of copies or propagation of sensitive data and delete data that is no
longer needed to minimize data breach risks.
We recommend you focus on these initial deployment objectives when implementing an end-to-
end Zero Trust framework for data:
I. Classify and label data. Automatically classify and label data where possible. Apply
manually where it is not.
II. Apply encryption, access control, and content markings. Apply encryption where
protection and access control are insufficient.
III. Control access to data. Control access to sensitive data so they're better protected.
As you make progress achieving the above objectives, add these additional deployment
objectives:
IV. Prevent data leakage. Use DLP policies that are driven by risky signals and data
sensitivity.
V. Manage risks. Manage risks that may lead to a data security incident by checking risky
security related user activities and data activity patterns that may result in a data security or
compliance incident.
VI. Reduce data exposure. Reduce data exposure through data governance and continual
data minimization
ノ Expand table
Classifications and sensitivity labels let you understand where your sensitive data is
located, how it moves, and implement appropriate access and usage controls consistent
with zero trust principles:
Use automated classification and labeling to detect sensitive information and scale
discovery across your data estate.
Use manual labeling for documents and containers, and manually curate data sets
used in analytics where classification and sensitivity is best established by
knowledgeable users.
Learn about scans and ingestion in the Microsoft Purview governance portal
As you discover, classify and label your data, use those insights to remediate risk and
inform your policy management initiatives.
Use sensitivity labels with Microsoft Teams, Microsoft 365 Groups, and SharePoint
sites
Tip
Check out Integrate SaaS apps for Zero Trust with Microsoft 365 to learn how to
apply Zero Trust principles to help manage your digital estate of cloud apps.
Deploy mandatory access control policies to IaaS/PaaS resources that contain sensitive
data.
Use Microsoft Purview DLP policies to identify, check, and automatically protect sensitive
data across:
Windows 10, Windows 11 and macOS (three latest released versions) endpoints
Remove all privileges where you can by deleting the sensitive data itself when it is no
longer valuable or permissible for your organization.
Minimize duplication of sensitive data by favoring in-place sharing and use rather than
data transfers.
For further information or help with implementation, please contact your Customer
Success team.
Background
To get the full benefit of cloud apps and services, organizations must find the right
balance of providing access while maintaining control to protect critical data accessed
via applications and APIs.
The Zero Trust model helps organizations ensure that apps, and the data they contain,
are protected by:
Before most organizations start the Zero Trust journey, their on-premises apps are
accessed through physical networks or VPN, and some critical cloud apps are
accessible to users.
ノ Expand table
I. Gain visibility into the activities and data in your applications by connecting them via
APIs.
1. Verify explicitly. Always authenticate and authorize based on all available data
points, including user identity, location, device health, service or workload, data
classification, and anomalies.
2. Use least privilege access. Limit user access with Just-In-Time and Just-Enough-
Access (JIT/JEA), risk-based adaptive polices and data protection to protect both
data and productivity.
3. Assume breach. Minimize blast radius for breaches and prevent lateral movement
by segmenting access by network, user, devices, and application awareness. Verify
all sessions are encrypted end to end. Use analytics to get visibility , drive threat
detection, and improve defenses.
ノ Expand table
1. Adopt Microsoft Defender for Cloud Apps , which works with services to optimize
visibility, governance actions, and usage.
2. Review what apps can be connected with the Defender for Cloud Apps API
integration, and connect the apps you need. Use the deeper visibility gained to
investigate activities, files, and accounts for the apps in your cloud environment.
Tip
Focus on identifying app usage patterns, assessing risk levels and business readiness of
apps, preventing data leaks to noncompliant apps, and limiting access to regulated data.
Tip
1. Set up Cloud Discovery, which analyzes your traffic logs against the Microsoft
Defender for Cloud Apps catalog of over 16,000 cloud apps. The apps are ranked
and scored, based on more than 90 risk factors.
2. Discover and identify shadow IT to find out what apps are being used, following
one of three options:
b. Deploy the Defender for Cloud Apps log collector on your firewalls and other
proxies to collect data from your endpoints and send it to Defender for Cloud
Apps for analysis.
a. In the Defender for Cloud Apps portal, under Discover, click Discovered apps.
Filter the list of apps discovered in your organization by the risk factors you are
concerned about.
b. Drill down into the app to understand more about its compliance by clicking the
app name and then clicking the Info tab to see details about the app's security
risk factors.
a. In the Defender for Cloud Apps portal, under Discover, click Discovered apps.
Filter the list of apps discovered in your organization by the compliance risk
factors you are concerned about. For example, use the suggested query to filter
out noncompliant apps.
b. Drill down into the app to understand more about its compliance by clicking the
app name and then clicking the Info tab to see details about the app's
compliance risk factors.
c. In the Defender for Cloud Apps portal, under Discover, click Discovered apps
and then drill down by clicking on the specific app you want to investigate. The
Use tab lets you know how many active users are using the app and how much
traffic it's generating. If you want to see who, specifically, is using the app, you
can drill down further by clicking Total active users.
d. Dive deeper into discovered apps. View subdomains and resources to learn
about specific activities, data access, and resource usage in your cloud services.
a. Create new custom app tags in order to classify each app according to its
business status or justification. These tags can then be used for specific
monitoring purposes.
b. App tags can be managed under Cloud Discovery settings App tags. These tags
can then be used later for filtering in the Cloud Discovery pages and creating
policies using them.
c. Manage discovered apps using Microsoft Entra Gallery. For apps that already
appear in the Microsoft Entra Gallery, apply single sign-on and manage the app
with Microsoft Entra ID. To do so, on the row where the relevant app appears,
choose the three dots at the end of the row, and then choose Manage app with
Microsoft Entra ID.
Tip
Learn about implementing an end-to-end Zero Trust strategy for your network .
Policies allow you to detect risky behavior, violations, or suspicious data points and
activities in your cloud environment. They help you monitor trends, see security threats,
and generate customized report and alerts.
1. Use out-of-the box policies that have already been tested for many activities and
files. Apply governance actions such as revoking permissions and suspending
users, quarantining files, and applying sensitivity labels.
2. Build new policies that Microsoft Defender for Cloud Apps suggests for you.
a. Create an app discovery policy that lets you know when there is a spike in
downloads or traffic from an app you're concerned about. Enable Anomalous
behavior in discovered users' policy, Cloud storage app compliance check,
and New risky app.
b. Keep updating policies, and using the Cloud Discovery dashboard, check what
(new) apps your users are using, as well as their usage and behavior patterns.
4. Control what's sanctioned and block undesirable apps using this option:
a. Connect apps via API for continuous monitoring.
5. Protect apps using Conditional Access App Control and Microsoft Defender for
Cloud Apps .
ノ Expand table
Enable real-time monitoring and control over access to any web app, based on
user, location, device, and app. For example, you can create policies to protect
downloads of sensitive content with sensitivity labels when using any unmanaged
device. Alternatively, files can be scanned on upload to detect potential malware
and block them from entering sensitive cloud environment.
Tip
The different detections are developed with security operations teams in mind and aim
to focus the alerts on true indicators of compromise, while unlocking threat intelligence-
driven investigation and remediation.
Take advantage of the Defender for Cloud Apps UEBA and machine learning (ML)
capabilities that are automatically enabled out-of-the-box to immediately detect
threats and run advanced threat detection across your cloud environment.
2. Limit the risk of a security breach by keeping cloud platforms, such as Microsoft
Azure, AWS and GCP, compliant with your organizational configuration policy and
regulatory compliance, following CIS benchmark, or the vendor's best practices for
the security configuration.
3. Using Defender for Cloud Apps, the security configuration dashboard can be used
to drive remediation actions to minimize the risk.
Tip
Learn about implementing an end-to-end Zero Trust strategy for your
infrastructure .
Microsoft Entra ID
Microsoft 365
Cloud Discovery
Conclusion
Regardless of where the cloud resource or application resides, Zero Trust principles help
ensure that your cloud environments and data are protected. For further information on
these processes or help with these implementations, please contact your Customer
Success team.
Modern security with an end-to-end Zero Trust strategy makes it easier for you to:
Just as importantly, Microsoft Azure Blueprints and related capabilities ensure that
resources are designed, implemented, and sustained in ways that conform to an
organization's policies, standards, and requirements.
Azure Blueprints, Azure Policies, Microsoft Defender for Cloud, Microsoft Sentinel, and
Azure Sphere can greatly contribute to improving the security of your deployed
infrastructure. Together, they enable a different approach to defining, designing,
provisioning, deploying, and monitoring your infrastructure.
Infrastructure Zero Trust deployment objectives
Tip
Before most organizations start the Zero Trust journey, their approach to
infrastructure security is characterized by the following:
ノ Expand table
When implementing an end-to-end Zero Trust framework for managing and monitoring your
infrastructure, we recommend you focus first on these initial deployment objectives:
Before you get started, ensure you've met these baseline infrastructure deployment
objectives.
Tip
Azure Arc allows organizations to extend the familiar security controls of Azure to on-
premises and the edge of the organization's infrastructure. Administrators have several
options for connecting on-premises resources to Azure Arc. These include Azure portal,
PowerShell, and Windows Installation with Service Principal scripting.
By enabling Defender for Cloud, you'll be able to incorporate a set of baseline controls
through Azure Policy's built-in policy definitions for Microsoft Defender for Cloud. The
set of baseline policies will be reflected in the Defender for Cloud secure score, where
you can measure your compliance with those policies.
You can extend your coverage of policies beyond the Defender for Cloud set and create
custom policies if a built-in isn't available. You can also incorporate Guest Configuration
policies, which measure compliance inside your guest VMs within your subscriptions.
By applying the tenant reader roll, you can get visibility across your tenant of the
status of each of the policies that are being evaluated as part of the Defender for
Cloud secure score, Azure Policy, and Guest Config policies. You funnel that to your
organizational compliance dashboard for central reporting of the state of your
tenant.
Additionally, as part of Defender for Servers, you can use the policy Enable the built-in
vulnerability assessment solution on virtual machines (powered by Qualys) to scan your
VMs for vulnerabilities, and have those reflected directly in Defender for Cloud. If you
already have a Vulnerability scanning solution deployed in your enterprise, you can use
the alternate policy Vulnerability assessment solution, which should be installed on your
virtual machines for Deploying a partner vulnerability scanning solution.
Tip
ノ Expand table
We recommend enabling Microsoft Defender for Cloud and its plans to protect the
supported resource types, including Defender for Servers, Defender for Storage,
Defender for Containers, Defender for SQL, etc.
For monitoring identities, we recommend enabling Microsoft Defender for Identity and
Advanced Threat Analytics in order to enable signal collection to identify, detect, and
investigate advanced threats, compromised identities, and malicious insider actions
directed at your organization.
Integrating these signals from Defender for Cloud, Defender for Identity, Advanced
Threat Analytics, and other monitoring and auditing systems with Microsoft Sentinel, a
cloud-native, security information event management (SIEM) and security orchestration
automated response (SOAR) solution, will allow your Security Operations Center (SOC)
to work from a single pane of glass to monitor security events across your enterprise.
Tip
All of these items help an organization become more aware of how administrative
permissions are being used, where these permissions are still necessary, and provide a
roadmap for how to operate more securely.
ノ Expand table
Once you've accomplished your initial three objectives, you can focus on additional
objectives such as blocking unauthorized deployments.
Microsoft Azure offers Azure Blueprints to govern how resources are deployed, ensuring
that only approved resources (for example, ARM templates) can be deployed. Blueprints
can ensure that resources which do not meet the Blueprint's policies or other rules are
blocked from deployment. Actual or attempted Blueprint violation can raise alerts as
needed and make notifications, activate webhooks or automation runbooks, or even
create service management tickets.
On the access control side, Role-Based Access Control (RBAC) can be employed to
assign permissions to resources. This allows permissions to be assigned and revoked
uniformly at the individual and group levels by using a variety of built-in or custom
roles.
Tip
Learn about implementing an end-to-end Zero Trust strategy for your network .
Azure Blueprints
Azure Policy
Azure Arc
Microsoft Sentinel
Conclusion
Infrastructure is central to a successful Zero Trust strategy. For further information or
help with implementation, please contact your Customer Success team, or continue to
read through the other chapters of this guide, which spans all Zero Trust pillars.
Big data presents new opportunities to derive new insights and gain a competitive edge.
We are moving away from an era where networks were clearly defined and usually
specific to a certain location. The cloud, mobile devices, and other endpoints expand
the boundaries and change the paradigm. Now there isn't necessarily a
contained/defined network to secure. Instead, there is a vast portfolio of devices and
networks, all linked by the cloud.
Instead of believing everything behind the corporate firewall is safe, an end-to-end Zero
Trust strategy assumes breaches are inevitable. That means you must verify each request
as if it originates from an uncontrolled network—identity management plays a crucial
role in this.
In the Zero Trust model, there are three key objectives when it comes to securing your
networks:
Verify explicitly. Always authenticate and authorize based on all available data
points, including user identity, location, device health, service or workload, data
classification, and anomalies.
Use least-privileged access. Limit user access with Just-In-Time and Just-Enough-
Access (JIT/JEA), risk-based adaptive polices, and data protection to protect both
data and productivity.
Assume breach. Minimize blast radius for breaches and prevent lateral movement
by segmenting access by network, user, devices, and application awareness. Verify
all sessions are encrypted end to end. Use analytics to get visibility , drive threat
detection, and improve defenses.
Network Zero Trust deployment objectives
Before most organizations start their Zero Trust journey, they have network
security that is characterized by the following:
ノ Expand table
When implementing an end-to-end Zero Trust framework for securing networks, we recommend
you focus first on these initial deployment objectives:
II. Threat protection: Cloud native filtering and protection for known threats.
V. Threat protection: Machine learning-based threat protection and filtering with context-
based signals.
ノ Expand table
Initial deployment objectives
There is no architecture design that fits the needs of all organizations. You have the
option between a few common design patterns for segmenting your network
according to the Zero Trust model.
In this deployment guide, we'll walk you through the steps to achieve one of those
designs: Micro-segmentation.
2. Create a central VNet to set up the security posture for inter-app connectivity and
connect the app VNets in a hub-and-spoke architecture.
3. Deploy Azure Firewall in the hub VNet to inspect and govern traffic between the
VNets.
Known attacks. Threats that have been discovered by your software provider or
the larger community. In such cases, the attack signature is available and you need
to ensure that each request is checked against those signatures. The key is to be
able to quickly update your detection engine with any newly identified attacks.
Unknown attacks. These are threats that don't quite match against any known
signature. These types of threats include zero-day vulnerabilities and unusual
patterns in request traffic. The ability to detect such attacks depends on how well
your defenses know what's normal and what is not. Your defenses should be
constantly learning and updating such patterns as your business (and associated
traffic) evolves.
1. For endpoints with HTTP/S traffic, protect using Azure Web Application Firewall
(WAF) by:
b. Turning on the bot protection ruleset to prevent malicious bots from scraping
information, conducting credential stuffing, etc.
2. For all endpoints (HTTP or not), front with Azure Firewall for threat intelligence-
based filtering at Layer 4:
Tip
3. Access your Azure virtual machines securely using encrypted communication via
Azure Bastion.
Tip
ノ Expand table
1. Within the VNet, add virtual network subnets so that discrete components of an
application can have their own perimeters.
2. Apply network security group rules to allow traffic only from the subnets that have
an app subcomponent identified as a legitimate communications counterpart.
Internet boundary
1. If internet connectivity is required for your application that needs to be routed via
the hub VNet, update the network security group rules in hub VNet to allow
internet connectivity.
2. Turn on Azure DDoS Protection Standard to protect the hub VNet from volumetric
network layer attacks.
3. If your application uses HTTP/S protocols, turn on Azure Web Application Firewall
to protect against Layer 7 threats.
On-premises boundary
1. If your app needs connectivity to your on-premise data center, use Azure
ExpressRoute of Azure VPN for connectivity to your hub VNet.
2. Configure the Azure Firewall in the hub VNet to inspect and govern traffic.
Tip
The major cloud service providers already filter for malformed packets and common
network layer attacks, so there's no need for a NIDS/NIPS solution to detect those. In
addition, traditional NIDS/NIPS solutions are typically driven by signature-based
approaches (which are considered outdated) and are easily evaded by attackers and
typically produce a high rate of false positives.
Based on this rationale, we offer an all-up recommendation that you discontinue use of
these legacy network security technologies. However, if your organizational experience
is that these technologies have had a palpable impact on preventing and detecting real
attacks, you can consider porting them to your cloud environment.
Azure Networking
Azure Firewall
Azure ExpressRoute
Conclusion
Securing networks is central to a successful Zero Trust strategy. For further information
or help with implementation, please contact your Customer Success team or continue to
read through the other chapters of this guide, which spans all Zero Trust pillars.
The Zero Trust deployment guide series
Feedback
Was this page helpful? Yes No
Visibility, automation, and orchestration
with Zero Trust
Article • 04/12/2024
One of the significant changes in perspectives that is a hallmark of a Zero Trust security
frameworks is moving away from trust-by-default toward trust-by-exception. However,
you need some reliable way to establish trust once trust is needed. Since you no longer
assume that requests are trustworthy, establishing a means to attest to the
trustworthiness of the request is critical to proving its point-in-time trustworthiness. This
attestation requires the ability to gain visibility into the activities on and around the
request.
In our other Zero Trust guides, we defined the approach to implementing an end-to-end
Zero Trust approach across identities , endpoints and devices, data , apps ,
infrastructure , and network . All these investments increase your visibility, which
gives you better data for making trust decisions. However, by adopting a Zero Trust
approach in these six areas, you necessarily increase the number of incidents Security
Operation Centers (SOC) analysts need to mitigate. Your analysts become busier than
ever, at a time when there's already a talent shortage. This can lead to chronic alert
fatigue and analysts missing critical alerts.
With each of these individual areas generating their own relevant alerts, we need an
integrated capability to manage the resulting influx of data to better defend against
threats and validate trust in a transaction.
Managing threats includes reactive as well as proactive detection and requires tools that
support both.
Reactive detection is when incidents are triggered from one of the six pillars that can be
investigated. Additionally, a management product like a SIEM will likely support another
layer of analytics that will enrich and correlate data, resulting in flagging an incident as
bad. The next step would then be to investigate to get the full narrative of the attack.
Proactive detection is when you apply hunting to the data to prove a compromised
hypothesis. Threat hunting starts with the assumption you have been breached--you
hunt for proof that there's indeed a breach.
Threat hunting starts with a hypothesis based on current threats, such as COVID-19
phishing attacks. Analysts start with this hypothetical threat, identify the key indicators
of compromise, and hunt through the data to see if there's proof that the environment
has been compromised. If indicators exist, hunting scenarios might result in analytics
that would notify the organizations if the certain indicators occurs again.
Either way, once an incident is detected, you need to investigate it to build out the
complete story of the attack. What else did the user do? What other systems were
involved? What executables were run?
If an investigation results in actionable learnings, you can take remediation steps. For
example, if an investigation uncovers gaps in a zero trust deployment, policies can be
modified to address these gaps and prevent future unwanted incidents. Whenever
possible it is desirable to automate remediation steps, because it reduces the time it
takes for a SOC analyst to address the threat and move onto the next incident.
In order to use these tactics to manage threats, you should have a central console to
allow SOC administrators to detect, investigate, remediate, hunt, utilize threat
intelligence, understand known vulnerabilities, lean on threat experts and block threats
across any of the six pillars. The tools needed to support these phases work best if
converged into a single workflow, providing a seamless experience that increases the
effectiveness of the SOC analyst.
Security Operation Centers often deploy a combination of SIEM and SOAR technologies
to collect, detect, investigate, and respond to threats. Microsoft offers Microsoft Sentinel
as its SIEM-as-a-service offering. Microsoft Sentinel ingests all Microsoft Defender for
Identity and third-party data.
Microsoft Threat Protection (MTP), a key feed into Microsoft Sentinel, provides a unified
enterprise defense suite that brings context-aware protection, detection, and response
across all Microsoft 365 components. By being context- aware and coordinated,
customers using Microsoft 365 can gain visibility and protection across endpoints,
collaboration tools, identities, and applications.
It is through this hierarchy that we enable our customers to maximize their focus.
Though context-awareness and automated remediation, MTP can detect and stop many
threats without adding additional alert-fatigue to already overloaded SOC personnel.
Advanced hunting inside of MTP brings that context to the hunt to focus on many key
attack points. And hunting and orchestration across the entire ecosystem through
Microsoft Sentinel provides the ability to gain the right visibility into all aspects of a
heterogeneous environment, all while minimizing the cognitive overload of the
operator.
When implementing an end-to-end Zero Trust framework for visibility, automation, and
orchestration, we recommend you focus first on these initial deployment objectives:
I. Establish visibility.
ノ Expand table
I. Establish visibility
The first step is to establish visibility by enabling Microsoft Threat Protection (MTP).
Automated Investigation and Remediation (AIR) can be enabled gradually, so that you
can develop a comfort level with the actions that are taken.
As part of the data connection process, relevant analytics can be enabled to trigger
incidents and workbooks can be created for a graphical representation of the data over
time.
Although machine learning and fusion analytics are provided out of the box, it is also
beneficial to ingest threat intelligence data into Microsoft Sentinel to help identify
events that relate to known bad entities.
ノ Expand table
Attack surface reduction controls represent one such opportunity. These protective
controls not only block certain activities that are most associated with malware, but also
give into attempts to use specific approaches, which can help to detect adversaries
leveraging these techniques earlier in the process.
Microsoft Sentinel
Microsoft 365
This article describes Zero Trust deployment guidance and resources for customers and
partners working with Microsoft 365 Business Premium and other technologies
commonly used by small- to medium-sized business customers. These resources help
you realize the principles of Zero Trust:
ノ Expand table
Always authenticate and Provide users with only the Do what you can to prevent
authorize with identity and access they need and for the attacks, protect against
device access policies. time they need it to perform threats, and then be ready to
their tasks. respond.
This article also includes information and resources for Microsoft partners.
ノ Expand table
In this library:
Downloadable poster that guides
you through the process of
configuring Microsoft 365 Business
Premium for Zero Trust.
Guidance for small and medium-sized
businesses who aren’t security experts
and need some help getting started.
Steps to secure unmanaged (bring
your own device, or BYOD) and
managed devices.
Cybersecurity playbook Description
ノ Expand table
Verify Multifactor authentication (MFA) is turned on by using security defaults (or with
explicitly Conditional Access). This configuration requires users to register for MFA. It also
disables access through legacy authentication (devices that don’t support modern
authentication) and requires admins to authenticate every time they sign in.
Use least Guidance is provided for protecting administrative accounts and not using these
privileged accounts for user tasks.
access
Assume Protection against malware and other cybersecurity threats is increased by using
breach preset security policies. Guidance is provided for training your team to set up
unmanaged (bring-your-own-device, or BYOD) devices, use email securely, and
collaborate and share more securely. Additional guidance is provided to secure
managed devices (devices that your organization owns).
Microsoft 365 Business Premium also includes advanced anti-phishing, anti-spam, and
anti-malware protection for email content and Office files (Safe Links and Safe
Attachments) with Microsoft Defender for Office 365 Plan 1. With these capabilities, your
email and collaboration content is more secure and better protected.
See the following resources:
ノ Expand table
Verify explicitly Devices that access company data must meet security requirements.
Use least Guidance is provided for using roles to assign permissions and security
privileged access policies to prevent unauthorized access.
Assume breach Advanced protection is provided for devices, email, and collaboration
content. Remediation actions are taken when threats are detected.
The Solutions Partner for Security designation enables customers to identify you as a
partner they can trust for integrated security, compliance, and identity solutions. See
Solutions Partner for Security Learning Path (Microsoft Partner Center) .
Resources are available to help you as a Microsoft partner to manage your customers’
security settings, and to help protect their devices and data. Microsoft 365 Lighthouse
integrates with Microsoft 365 Business Premium, Microsoft Defender for Business, and
Microsoft Defender for Endpoint.
The Defender for Endpoint APIs can be used to integrate device security capabilities in
Microsoft 365 Business Premium with remote monitoring and management (RMM) tools
and professional service automation (PSA) software. See the following articles:
Integrate Microsoft endpoint security with your RMM tools and PSA software
Use Microsoft 365 Lighthouse to secure and manage your customers’ devices and
data
Help for partners (general information and support)
ノ Expand table
Verify explicitly Partner resources are available to help Microsoft partners configure and
manage their customers’ identity and access methods and policies.
Use least Partners can configure integration with customer tenants. Customers can
privileged access review permissions and administrative access granted to partners.
Assume breach Microsoft 365 Lighthouse integrates with Microsoft threat protection
capabilities for small and medium-sized businesses.
After you add SaaS apps to your environment, these apps will automatically be
protected with Microsoft Entra MFA and the other protections provided by security
defaults. If you're using Conditional Access policies instead of security defaults, you
need to add these apps to the scope of your Conditional Access and related policies.
See Turn on MFA in Microsoft 365 Business Premium.
Microsoft Entra ID determines when a user will be prompted for MFA based on factors
such as location, device, role, and task. This functionality protects all applications
registered with Microsoft Entra ID, including SaaS applications. See Require users to do
MFA when necessary.
ノ Expand table
Verify explicitly All SaaS apps you add require MFA for access.
Use least Users must meet authentication requirements to use apps that access
privileged access company data.
Assume breach Factors, such as location, device, role, and task are considered when users
are authenticated. MFA is used when necessary.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Concepts and deployment objectives Apply Zero Trust protections IT teams and security
for general deployment guidance for aligned with technology staff
technology areas areas.
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and
(RaMP) for project management of Zero Trust protection. IT implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and detailed to your Microsoft 365 tenant. staff
design and deployment guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Documentation set Helps you... Roles
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security
and specializations solutions. staff
Develop using Zero Trust principles for Apply Zero Trust protections Application developers
application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Concepts and deployment objectives for Apply Zero Trust protections
security team general deployment guidance for aligned with technology
technology areas areas.
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Role Documentation set Helps you...
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Feedback
Was this page helpful? Yes No
Zero Trust Rapid Modernization Plan
Article • 04/12/2024
ノ Expand table
Initiative Steps
Identities
Endpoints (devices)
Apps
User access and Network
productivity
Data, compliance,
and governance
Initiative Steps
Modernize security
operations 4. Streamline response
5. Unify visibility
6. Reduce manual effort
Policy Optimization
Governance
Compliance
Data
Security Posture Assessment Emails & documents
Identities
Human
Non-human
Apps
Zero Trust Policies Network
SaaS
Evaluation Public
On-premises
Enforcement Private
Endpoints Infrastructure
Corporate Serverless
Personal Containers
IaaS
Threat Protection
Paas
Continuous Assessment
Internal Sites
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment JIT & Version Control
The RaMP initiatives for Zero Trust address all of the elements of this architecture. As
you step through the initiatives, we'll show which parts are being covered.
Next step
Begin your Zero Trust RaMP deployment journey with User access and productivity.
Additional Zero Trust documentation
Use additional Zero Trust content based on a documentation set or the roles in your
organization.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Concepts and deployment objectives Apply Zero Trust protections IT teams and security
for general deployment guidance for aligned with technology staff
technology areas areas.
Zero Trust for small businesses Apply Zero Trust principles to Customers and partners
small business customers. working with Microsoft
365 for business
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
detailed design and deployment
guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security staff
and specializations solutions.
Develop using Zero Trust principles for Apply Zero Trust protections Application developers
application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Concepts and deployment objectives for Apply Zero Trust protections
security team general deployment guidance for aligned with technology
technology areas areas.
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Feedback
Was this page helpful? Yes No
RaMP Checklist — Explicitly validate
trust for all access requests
Article • 04/12/2024
This Rapid Modernization Plan (RaMP) checklist helps you establish a security perimeter
for cloud applications and mobile devices that uses identity as the control plane and
explicitly validates trust for user accounts and devices before allowing access, for both
public and private networks.
Each one of these elements are the targets of attackers and must be protected with the
"never trust, always verify" central principle of Zero Trust.
This checklist includes using Zero Trust to explicitly validate trust for all access requests
for:
Identities
Endpoints (devices)
Apps
Network
After completing this work, you will have built out this part of the Zero Trust
architecture.
Identities
Verify and secure each identity with strong authentication across your entire digital
estate with Microsoft Entra ID, a complete identity and access management solution
with integrated security that connects hundreds of millions of people to their apps,
devices, and data each month.
ノ Expand table
Deployment objectives
Meet these deployment objectives to protect your privileged identities with Zero Trust.
ノ Expand table
Meet these deployment objectives to protect your user identities with Zero Trust.
ノ Expand table
5. Enable user and sign-in risk-based IT implementer How To: Configure and enable
policies to protect user access to risk policies
resources.
6. Detect and block known weak IT implementer Eliminate bad passwords using
passwords and their variants and Microsoft Entra Password
block additional weak terms specific Protection
to your organization.
You have now built out the Identities section of the Zero Trust architecture.
Endpoints
Ensure compliance and health status before granting access to your endpoints (devices)
and gain visibility into how they are accessing the network.
Program and project member accountabilities
This table describes the overall protection of your endpoints in terms of a
sponsorship/program management/project management hierarchy to determine and
drive results.
ノ Expand table
Deployment objectives
Meet these deployment objectives to protect your endpoints (devices) with Zero Trust.
ノ Expand table
operations). Admin
4. Monitor device compliance and risk Identity Use compliance policies to set
for Conditional Access. Security rules for devices you manage
Admin with Intune
You have now built out the Endpoints section of the Zero Trust architecture.
Apps
Because apps are used by malicious users to infiltrate your organization, you need to
ensure that your apps are using services, such as Microsoft Entra ID and Intune, that
provide Zero Trust protection or are hardened against attack.
ノ Expand table
Lead Owner Accountability
Deployment objectives
Meet these deployment objectives to ensure Zero Trust protection for your Microsoft
cloud apps, third-party SaaS apps, custom PaaS apps, and on-premises apps.
ノ Expand table
Third-party SaaS Register them with Microsoft Apps Integrating all your
apps and custom Entra ID for authentication, Architect apps with Microsoft
PaaS apps that are certification, and app consent Entra ID
NOT registered with policies.
Microsoft Entra ID
Use Microsoft Entra
Conditional Access policies
and Intune MAM and APP
policies.
On-premises users Ensure that your apps support Identity See your vendor
accessing on- modern authentication Architect documentation
premises protocols such as OAuth/OIDC
applications, which and SAML. Contact your
includes application vendor for updates
applications to protect user sign-in.
running on both
on-premises and
IaaS-based servers
Remote users Configure your VPN appliance Network See your vendor
accessing on- so that it uses Microsoft Entra Architect documentation
premises ID as its identity provider
applications
through a VPN
connection
After completing these deployment objectives, you will have built out the Apps section
of the Zero Trust architecture.
Network
The Zero Trust model assumes breach and verifies each request as though it originated
from an uncontrolled network. Although this is a common practice for public networks,
it also applies to your organization’s internal networks which are generally firewalled
from the public Internet.
To adhere to Zero Trust, your organization must address security vulnerabilities on both
public and private networks, whether on-premises or in the cloud, and ensure that you
verify explicitly, use least privilege access, and assume breach. Devices, users, and apps
are not to be inherently trusted because they are on your private networks.
ノ Expand table
Deployment objectives
Meet these deployment objectives to ensure Zero Trust protection for your public and
private networks, for both on-premises and cloud-based traffic. These objectives can be
done in parallel.
ノ Expand table
Limit access to critical data and Security Access policies for Defender
applications by policy (user or device Architect or for Cloud Apps Conditional
identity) or traffic filtering. Network Access App Control
Architect
Windows Firewall for Windows
devices
Use real-time threat detection for on- SecOps Windows threat protection
premises traffic. Analysts
Microsoft Defender for
Endpoint
After completing these deployment objectives, you will have built out the Network
section of the Zero Trust architecture.
Next step
Continue the user access and productivity initiative with Data, Compliance, and
Governance.
Feedback
Was this page helpful? Yes No
RaMP checklist—Ransomware recovery
readiness
Article • 04/12/2024
This Rapid Modernization Plan (RaMP) checklist helps you prepare your organization so
you have a viable alternative to paying the ransom demanded by ransomware attackers.
While attackers in control of your organization have a variety of ways to pressure you
into paying, the demands primarily focus on two categories:
Attackers demand payment under the threat that they won’t give you back access
to your systems and data. This is most frequently done by encrypting your systems
and data and demanding payment for the decryption key.
) Important
Paying the ransom isn’t as simple and clean of a solution as it may seem.
Because you're dealing with criminals that are only motivated by payment
(and often relatively amateur operators who are using a toolkit provided by
someone else), there is a lot of uncertainty around how well paying the
ransom will actually work. There is no legal guarantee that they will provide a
key that decrypts 100% of your systems and data, or even provide a key at all.
The process to decrypt these systems uses homegrown attacker tools, which
is often a clumsy and manual process.
To avoid being forced into payment (the profitable situation for attackers), the most
immediate and effective action you can take is to ensure your organization can restore
your entire enterprise from immutable storage that hasn't already been infected or
encrypted by a ransomware attack, which neither the attacker nor you can modify.
Identifying the most sensitive assets and protecting them at a higher level of assurance
is also critically important but is a longer and more challenging process to execute. We
don’t want you to hold up other areas, but we recommend you get the process started
by bringing together business, IT, and security stakeholders to ask and answer questions
like:
What business assets would be the most damaging if compromised? For example,
what assets would business leadership be willing to pay an extortion demand if
attackers controlled them?
How do these business assets translate to IT assets such as files, applications,
databases, and servers?
How can you protect or isolate these assets so that attackers with access to the
general IT environment can’t access them?
Secure backups
You must ensure that critical systems and their data are backed up and are immutable to
protect against deliberate erasure or encryption by an attacker. The backups must have
not already been infected or encrypted by a ransomware attack, otherwise you're
restoring a set of files that could contain entry points for the attackers to exploit after
the recovery.
Most organizations don’t protect backup and restoration procedures against this level
of intentional targeting.
7 Note
This preparation also improves resilience to natural disasters and rapid attacks like
WannaCry and (Not)Petya.
Backup and restore plan to protect against ransomware addresses what to do before an
attack to protect your critical business systems and during an attack to ensure a rapid
recovery of your business operations using Azure Backup and other Microsoft cloud
services. If you're using an offsite backup solution provided by a third-party, please
consult their documentation.
ノ Expand table
Deployment objectives
Meet these deployment objectives to secure your backup infrastructure.
ノ Expand table
5. Have your users configure OneDrive backup and Protected Microsoft 365
Folders. productivity
administrator
Next step
Continue the data, compliance, and governance initiative with Step 3. Data.
Feedback
Was this page helpful? Yes No
RaMP checklist — Data protection
Article • 04/12/2024
This Rapid Modernization Plan (RaMP) checklist helps you protect your on-premises and
cloud data from both inadvertent and malicious access.
Inadvertent access occurs when a user gains access to data that, based on their
roles and responsibilities, they should not have. The result can be unintended data
leakage, data destruction, or violations of data security and privacy regulations.
For both types of attacks, you must take the necessary steps to identify your data,
protect it, prevent its destruction or exfiltration, and ensure that only users with a
business purpose have access to it.
Protecting your data is part of the "assume breach" Zero Trust principle. Even with all the
user account and device protections in place, you must assume that an attacker could
find their way in and begin traversing your environment, searching for the most valuable
data for your organization.
Understand your data landscape and identify important information across your
cloud and on-premises environment.
Protect your sensitive data throughout its lifecycle by applying sensitivity labels
linked to protection actions like encryption, access restrictions, visual markings,
and more.
Apply a consistent set of data loss prevention policies across the cloud, on-
premises environments, and endpoints to monitor, prevent, and remediate risky
activities with sensitive data.
ノ Expand table
Deployment objectives
Meet these deployment objectives to protect your data for Zero Trust.
ノ Expand table
Done Deployment objective Owner
ノ Expand table
4. Discover and classify sensitive data. Data Security Architect Learn about
and/or Data Security
Engineer
ノ Expand table
2. Label and protect items for Microsoft Data Security Manage sensitivity labels
365 apps and services. Engineer
6. Extend your sensitivity labels to Azure by Data Security Labeling in the Microsoft
using Microsoft Purview Data Map Engineer Purview Data Map
ノ Expand table
1. Design and create data loss prevention (DLP) Security Learn about
policies. Architect
2. Enable and configure endpoint data loss Data Security Learn about
prevention. Engineer
ノ Expand table
1. From the Know your data deployment objective, review Data Security Engineer
the permissions for the locations of sensitive and critical
information.
2. Implement minimal permissions for the sensitive and Data Security Engineer
critical information while meeting collaboration and business
Done Implementation step Owner
3. Perform change management for your employees so that User Education Team
future locations for sensitive and critical information are
created and maintained with minimal permissions.
4. Audit and monitor the locations for sensitive and critical Data Security Engineer
information to ensure that broad permissions aren't being and/or Security
granted. Governance Admin
Results
After completing these deployment objectives, you will have built out the Data section
of the Zero Trust architecture.
Feedback
Was this page helpful? Yes No
Zero Trust deployment plan with
Microsoft 365
Article • 04/09/2024
This article provides a deployment plan for building Zero Trust security with Microsoft
365. Zero Trust is a new security model that assumes breach and verifies each request as
though it originated from an uncontrolled network. Regardless of where the request
originates or what resource it accesses, the Zero Trust model teaches us to "never trust,
always verify."
ノ Expand table
Item Description
In the illustration:
For more information about Zero Trust, see Microsoft's Zero Trust Guidance Center.
This illustration represents the work of deploying Zero Trust capabilities. This work is
broken into units of work that can be configured together, starting from the bottom and
working to the top to ensure that prerequisite work is complete.
SharePoint sites,
Microsoft 365
Teams, Power BI, Microsoft Defender
productivity apps:
Exchange for Cloud Apps
§ Word Endpoint devices:
§ Excel Windows & macOS (SaaS application
On-premises file
§ PowerPoint data classification
shares and
Protect and SharePoint Server
§ Outlook and protection)
govern
Pilot and deploy classification, labeling, information protection, and data loss prevention (DLP)
sensitive
data Create auto labeling rules Create DLP policies
Defend
Defender for Office Defender for Defender for Cloud
against threats Defender for Identity
365 Endpoint Apps
Configure Enterprise (recommended) Zero Trust identity and device access policies
Require healthy and compliant devices
Configure cloud identity: cloud only, hybrid with Password Hash Synchronization (PHS),
hybrid with Pass-Through Authentication (PTA), or federated
In this illustration:
This article assumes you are using cloud identity. If you need guidance for this objective,
see Deploy your identity infrastructure for Microsoft 365.
Tip
When you understand the steps and the end-to-end deployment process, you can
use the Set up your Microsoft Zero Trust security model advanced deployment
guide when signed in to the Microsoft 365 admin center. This guide steps you
through applying Zero Trust principles for standard and advanced technology
pillars. To step through the guide without signing in, go to the Microsoft 365 Setup
portal .
Go to Zero Trust identity and device access protection for detailed prescriptive
guidance. This series of articles describes a set of identity and device access prerequisite
configurations and a set of Microsoft Entra Conditional Access, Microsoft Intune, and
other policies to secure access to Microsoft 365 for enterprise cloud apps and services,
other SaaS services, and on-premises applications published with Microsoft Entra
application proxy.
ノ Expand table
Start by implementing the starting-point tier. These policies don't require enrolling
devices into management.
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
ノ Expand table
Return to Common identity and device access policies and add the policies in the
Enterprise tier.
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Go to Evaluate and pilot Microsoft Defender XDR for a methodical guide to piloting
and deploying Microsoft Defender XDR components.
ノ Expand table
Set up the evaluation See the guidance to read about Microsoft Entra ID Protection isn't
and pilot environment the architecture requirements included in this solution guide. It's
for all components: for each component of included in Step 1. Configure Zero
Defender for Microsoft Defender XDR. Trust identity and device access
Identity protection.
Defender for
Office 365
Defender for
Endpoint
Microsoft
Defender for
Cloud Apps
While this work is represented at the top of the deployment stack illustrated earlier in
this article, you can begin this work anytime.
For more information on how to plan and deploy information protection, see Deploy a
Microsoft Purview Information Protection solution.
If you're deploying information protection for data privacy regulations, this solution
guide provides a recommended framework for the entire process: Deploy information
protection for data privacy regulations with Microsoft 365.
Feedback
Was this page helpful? Yes No
Check out all of our small business content on Small business help & learning .
For information about the identity features of each Microsoft 365 for enterprise, the role
of Microsoft Entra ID, on-premises and cloud-based components, and the most
common authentication configurations, see the Identity Infrastructure poster .
Review this two-page poster to quickly ramp up on identity concepts and configurations
for Microsoft 365 for enterprise.
You can download this poster and can print it in letter, legal, or tabloid (11 x 17)
format.
This solution is the first step to build out the Microsoft 365 Zero Trust deployment stack.
For more information, see the Microsoft 365 Zero Trust deployment plan.
Verify explicitly: Always authenticate and authorize based on all available data
points.
Use least privilege access: Limit user access with Just-In-Time and Just-Enough-
Access (JIT/JEA), risk-based adaptive policies, and data protection.
Assume breach: Minimize blast radius and segment access. Verify end-to-end
encryption and use analytics to get visibility, drive threat detection, and improve
defenses.
ノ Expand table
Multifactor MFA requires users to provide two forms of verification, Microsoft 365 E3
authentication such as a user password plus a notification from the or E5
(MFA) Microsoft Authenticator app or a phone call. MFA greatly
reduces the risk that stolen credentials can be used to
access your environment. Microsoft 365 uses the Microsoft
Entra multifactor authentication service for MFA-based
sign-ins.
Conditional Microsoft Entra ID evaluates the conditions of the user Microsoft 365 E3
Access sign-in and uses Conditional Access policies to determine or E5
the allowed access. For example, in this guidance we show
you how to create a Conditional Access policy to require
device compliance for access to sensitive data. This greatly
reduces the risk that a hacker with their own device and
stolen credentials can access your sensitive data. It also
protects sensitive data on the devices, because the devices
must meet specific requirements for health and security.
Microsoft Entra Conditional Access policies, device management with Microsoft 365 E3
groups Intune, and even permissions to files and sites in your or E5
organization rely on the assignment to user accounts or
Microsoft Entra groups. We recommend you create
Microsoft Entra groups that correspond to the levels of
protection you're implementing. For example, members of
your executive staff are likely higher value targets for
hackers. Therefore, it makes sense to add the user accounts
of these employees to a Microsoft Entra group and assign
Capability or Description Licensing
feature
Microsoft Entra Enables you to detect potential vulnerabilities affecting Microsoft 365
ID Protection your organization's identities and configure automated E5, Microsoft
remediation policy to low, medium, and high sign-in risk 365 E3 with the
and user risk. This guidance relies on this risk evaluation to E5 Security add-
apply Conditional Access policies for multifactor on, EMS E5, or
authentication. This guidance also includes a Conditional Microsoft Entra
Access policy that requires users to change their password ID P2 licenses
if high-risk activity is detected for their account.
Self-service Allow your users to reset their passwords securely and Microsoft 365 E3
password reset without help-desk intervention, by providing verification of or E5
(SSPR) multiple authentication methods that the administrator can
control.
Microsoft Entra Detect and block known weak passwords and their variants Microsoft 365 E3
password and additional weak terms that are specific to your or E5
protection organization. Default global banned password lists are
automatically applied to all users in a Microsoft Entra
tenant. You can define additional entries in a custom
banned password list. When users change or reset their
passwords, these banned password lists are checked to
enforce the use of strong passwords.
Next steps
Use these steps to deploy an identity model and authentication infrastructure for your
Microsoft 365 tenant:
Manage
To manage your Microsoft cloud identity deployment, see:
User accounts
Licenses
Passwords
Groups
Governance
Directory synchronization
7 Note
Feedback
Was this page helpful? Yes No
Check out all of our small business content on Small business help & learning .
Microsoft 365 uses Microsoft Entra ID, a cloud-based user identity and authentication
service that is included with your Microsoft 365 subscription, to manage identities and
authentication for Microsoft 365. Getting your identity infrastructure configured
correctly is vital to managing Microsoft 365 user access and permissions for your
organization.
Before you begin, watch this video for an overview of identity models and
authentication for Microsoft 365.
https://www.microsoft.com/en-us/videoplayer/embed/RE2Pjwu?postJsllMsg=true
Here are the two types of identity and their best fit and benefits.
ノ Expand table
Definition User account only exists in User account exists in AD DS and a copy is
the Microsoft Entra tenant also in the Microsoft Entra tenant for your
for your Microsoft 365 Microsoft 365 subscription. The user account
subscription. in Microsoft Entra ID might also include a
hashed version of the already hashed AD DS
user account password.
How Microsoft The Microsoft Entra tenant The Microsoft Entra tenant for your
365 authenticates for your Microsoft 365 Microsoft 365 subscription either handles
user credentials subscription performs the the authentication process or redirects the
user to another identity provider.
Attribute Cloud-only identity Hybrid identity
Greatest benefit Simple to use. No extra Users can use the same credentials when
directory tools or servers accessing on-premises or cloud-based
required. resources.
Cloud-only identity
A cloud-only identity uses user accounts that exist only in Microsoft Entra ID. Cloud-only
identity is typically used by small organizations that do not have on-premises servers or
do not use AD DS to manage local identities.
Both on-premises and remote (online) users use their Microsoft Entra user accounts and
passwords to access Microsoft 365 cloud services. Microsoft Entra authenticates user
credentials based on its stored user accounts and passwords.
Administration
Because user accounts are only stored in Microsoft Entra ID, you manage cloud
identities with tools such as the Microsoft 365 admin center and Windows PowerShell.
Hybrid identity
Hybrid identity uses accounts that originate in an on-premises AD DS and have a copy
in the Microsoft Entra tenant of a Microsoft 365 subscription. Most changes, with the
exception of specific account attributes, only flow one way. Changes that you make to
AD DS user accounts are synchronized to their copy in Microsoft Entra ID.
The Microsoft Entra tenant has a copy of the AD DS accounts. In this configuration, both
on-premises and remote users accessing Microsoft 365 cloud services authenticate
against Microsoft Entra ID.
7 Note
You always need to use Microsoft Entra Connect to synchronize user accounts for
hybrid identity. You need the synchronized user accounts in Microsoft Entra ID to
perform license assignment and group management, configure permissions, and
other administrative tasks that involve user accounts.
7 Note
When AD DS user accounts are synchronized for the first time, they are not
automatically assigned a Microsoft 365 license and cannot access Microsoft 365
services, such as email. You must first assign them a usage location. Then, assign a
license to these user accounts, either individually or dynamically through group
membership.
There are two types of authentication when using the hybrid identity model:
Managed authentication
Federated authentication
Managed authentication
With PHS, you synchronize your AD DS user accounts with Microsoft 365 and manage
your users on-premises. Hashes of user passwords are synchronized from your AD DS to
Microsoft Entra ID so that the users have the same password on-premises and in the
cloud. This is the simplest way to enable authentication for AD DS identities in Microsoft
Entra ID.
When passwords are changed or reset on-premises, the new password hashes are
synchronized to Microsoft Entra ID so that your users can always use the same password
for cloud resources and on-premises resources. The user passwords are never sent to
Microsoft Entra ID or stored in Microsoft Entra ID in clear text. Some premium features
of Microsoft Entra ID, such as Identity Protection, require PHS regardless of which
authentication method is selected.
PTA allows your users to sign in to both on-premises and Microsoft 365 resources and
applications using their on-premises account and password. This configuration validates
users passwords directly against your on-premises AD DS without storing password
hashes in Microsoft Entra ID.
PTA is also for organizations with a security requirement to immediately enforce on-
premises user account states, password policies, and logon hours.
Federated authentication
For third-party authentication and identity providers, on-premises directory objects may
be synchronized to Microsoft 365 and cloud resource access that are primarily managed
by a third-party identity provider (IdP). If your organization uses a third-party federation
solution, you can configure sign-on with that solution for Microsoft 365 provided that
the third-party federation solution is compatible with Microsoft Entra ID.
Administration
Because the original and authoritative user accounts are stored in the on-premises AD
DS, you manage your identities with the same tools as you manage your AD DS.
You don't use the Microsoft 365 admin center or PowerShell for Microsoft 365 to
manage synchronized user accounts in Microsoft Entra ID.
Next step
Feedback
Was this page helpful? Yes No
This article applies to both Microsoft 365 Enterprise and Office 365 Enterprise.
Check out all of our small business content on Small business help & learning .
Microsoft cloud services are built on a foundation of trust and security. Microsoft
provides you security controls and capabilities to help you protect your data and
applications.
You own your data and identities and the responsibility for protecting them, the
security of your on-premises resources, and the security of cloud components you
control.
Microsoft provides capabilities to help protect your organization, but they're effective
only if you use them. If you don't use them, you may be vulnerable to attack. To protect
your privileged accounts, Microsoft is here to help you with detailed instructions to:
1. Create dedicated, privileged, cloud-based accounts and use them only when
necessary.
3. Protect privileged accounts with Zero Trust identity and device access
recommendations.
7 Note
To secure your privileged roles, check out Best practices for Microsoft Entra roles
to secure privileged access to your tenant.
From this moment onward, you sign in with the dedicated privileged accounts only for
tasks that require administrator privileges. All other Microsoft 365 administration must
be done by assigning other administration roles to user accounts.
7 Note
This does require additional steps to sign out as your everyday user account and
sign in with a dedicated administrator account. But this only needs to be done
occasionally for administrator operations. Consider that recovering your Microsoft
365 subscription after an administrator account breach requires a lot more steps.
You also need to create emergency access accounts to prevent being accidentally locked
out of Microsoft Entra ID.
You can further protect your privileged accounts with Microsoft Entra Privileged Identity
Management (PIM) for on-demand, just-in-time assignment of administrator roles.
7 Note
If you're a small business that is using user accounts stored only in the cloud (the cloud-
only identity model), set up MFA to configure MFA using a phone call or a text message
verification code sent to a smart phone for each dedicated privileged account.
If you're a larger organization that is using a Microsoft 365 hybrid identity model, you
have more verification options. If you have the security infrastructure already in place for
a stronger secondary authentication method, set up MFA and configure each dedicated
privileged account for the appropriate verification method.
If the security infrastructure for the desired stronger verification method isn't in place
and functioning for Microsoft 365 MFA, we strongly recommend that you configure
dedicated privileged accounts with MFA using the Microsoft Authenticator app, a phone
call, or a text message verification code sent to a smart phone for your privileged
accounts as an interim security measure. Don't leave your dedicated privileged accounts
without the extra protection provided by MFA.
Prerequisites
Common identity and device access policies
For instructions on how to set up a PAW, see Securing devices as part of the privileged
access story .
To enable Azure PIM for your Microsoft Entra tenant and administrator accounts, see the
steps to configure PIM.
Your administrator accounts go from being permanent admins to eligible admins. The
administrator role is inactive until someone needs it. You then complete an activation
process to add the administrator role to the privileged account for a predetermined
amount of time. When the time expires, PIM removes the administrator role from the
privileged account.
Using PIM and this process significantly reduces the amount of time that your privileged
accounts are vulnerable to attack and use by malicious users.
Using this feature requires either Microsoft Entra ID Governance or Microsoft Entra ID
P2 subscriptions. To find the right license for your requirements, see Compare generally
available features of Microsoft Entra ID .
For information about licenses for users, see License requirements to use Privileged
Identity Management.
In this step, you'll enable privileged access management in your tenant and configure
privileged access policies that provide extra security for task-based access to data and
configuration settings for your organization. There are three basic steps to get started
with privileged access in your organization:
Privileged access management enables your organization to operate with zero standing
privileges and provide a layer of defense against vulnerabilities arising because of such
standing administrative access. Privileged access requires approvals for executing any
task that has an associated approval policy defined. Users needing to execute tasks
included in the approval policy must request and be granted access approval.
To enable privileged access management, see Get started with privileged access
management.
Next step
Continue with Step 3 to secure your user accounts.
Feedback
Was this page helpful? Yes No
Check out all of our small business content on Small business help & learning .
MFA
MFA requires that user sign-ins be subject to an additional verification beyond the user
account password. Even if a malicious user determines a user account password, they
must also be able to respond to an additional verification, such as a text message sent
to a smartphone before access is granted.
Your first step in using MFA is to require it for all administrator accounts, also known as
privileged accounts. Beyond this first step, Microsoft recommends MFA For all users.
There are three ways to require your users to use MFA based on your Microsoft 365
plan.
ノ Expand table
Plan Recommendation
All Microsoft 365 plans Enable security defaults in Microsoft Entra ID. Security defaults in
(without Microsoft Entra ID Microsoft Entra ID include MFA for users and administrators.
P1 or P2 licenses)
Microsoft 365 E3 (includes Use the common Conditional Access policies to configure the
Microsoft Entra ID P1 following policies:
licenses) - Require MFA for administrators
- Require MFA for all users
- Block legacy authentication
Security defaults
Security defaults is a new feature for Microsoft 365 and Office 365 paid or trial
subscriptions created after October 21, 2019. These subscriptions have security defaults
turned on, which requires all of your users to use MFA with the Microsoft Authenticator
app.
Users have 14 days to register for MFA with the Microsoft Authenticator app from their
smart phones, which begins from the first time they sign in after security defaults has
been enabled. After 14 days have passed, the user won't be able to sign in until MFA
registration is completed.
Security defaults ensure that all organizations have a basic level of security for user sign-
in that is enabled by default. You can disable security defaults in favor of MFA with
Conditional Access policies or for individual accounts.
If the user account name is a member of a group for users that are assigned the
Exchange, user, password, security, SharePoint, Exchange admin, SharePoint
admin, or Global admin roles, require MFA before allowing access.
This policy allows you to require MFA based on group membership, rather than trying to
configure individual user accounts for MFA when they're assigned or unassigned from
these administrator roles.
You can also use Conditional Access policies for more advanced capabilities, such as
requiring that the sign-in is done from a compliant device, such as your laptop running
Windows 11.
Conditional Access requires Microsoft Entra ID P1 licenses, which are included with
Microsoft 365 E3 and E5.
You can't enable security defaults if you have any Conditional Access policies
enabled.
You can't enable any Conditional Access policies if you have security defaults
enabled.
If security defaults are enabled, all new users are prompted for MFA registration and the
use of the Microsoft Authenticator app.
This table shows the results of enabling MFA with security defaults and Conditional
Access policies.
ノ Expand table
Conditional If any are enabled, you If all are disabled, you User specifies during
Access policies can’t enable security can enable security MFA registration
defaults defaults
7 Note
Identity and device access policies are defined to be used in three tiers:
Baseline protection is a minimum level of security for your identities and devices
that access your apps and data.
Sensitive protection provides additional security for specific data. Identities and
devices are subject to higher levels of security and device health requirements.
Protection for environments with highly regulated or classified data is for typically
small amounts of data that are highly classified, contain trade secrets, or is subject
to data regulations. Identities and devices are subject to much higher levels of
security and device health requirements.
These tiers and their corresponding configurations provide consistent levels of
protection across your data, identities, and devices.
Microsoft highly recommends configuring and rolling out Zero Trust identity and device
access policies in your organization, including specific settings for Microsoft Teams,
Exchange Online, and SharePoint. For more information, see Zero Trust identity and
device access configurations.
ノ Expand table
Capability Description
Determine and address Microsoft Entra ID uses machine learning to detect anomalies and
potential vulnerabilities in suspicious activity, such as sign-ins and post-sign-in activities. Using
your organization’s this data, Microsoft Entra ID Protection generates reports and alerts
identities that help you evaluate the issues and take action.
Detect suspicious actions You can configure risk-based policies that automatically respond to
that are related to your detected issues when a specified risk level has been reached. These
organization’s identities policies, in addition to other Conditional Access controls provided
and respond to them by Microsoft Entra ID and Microsoft Intune, can either automatically
automatically block access or take corrective actions, including password resets
and requiring Microsoft Entra multifactor authentication for
subsequent sign-ins.
Investigate suspicious You can investigate risk events using information about the security
incidents and resolve them incident. Basic workflows are available to track investigations and
with administrative actions initiate remediation actions, such as password resets.
Next step
Continue with Step 4 to deploy the identity infrastructure based on your chosen identity
model:
Cloud-only identity
Hybrid identity
Feedback
Was this page helpful? Yes No
This article applies to both Microsoft 365 Enterprise and Office 365 Enterprise.
If you have chosen the cloud-only identity model, you already have a Microsoft Entra
tenant for your Microsoft 365 subscription to store all of your users, groups, and
contacts. After setting up protection for administrator accounts in Step 2 and user
accounts in Step 3 of this solution, you're now ready to begin creating the new accounts
and groups that your organization needs.
Users and their user accounts in organizations can be categorized in a number of ways.
For example, some are employees and have a permanent status. Some are vendors,
contractors, or partners that have a temporary status. Some are external users that have
no user accounts but must still be granted access to specific services and resources to
support interaction and collaboration. For example:
Tenant accounts represent users within your organization that you license for cloud
services
Business to Business (B2B) accounts represent users outside your organization that
you invite to participate in collaboration
Take stock of the types of users in your organization. What are the groupings? For
example, you can group users by high-level function or purpose to your organization.
Additionally, some cloud services can be shared with users outside your organization
without any user accounts. You'll need to identify these groups of users as well.
You can use groups in Microsoft Entra ID for several purposes that simplify management
of your cloud environment. For example, with Microsoft Entra groups, you can:
Use group-based licensing to assign licenses for Microsoft 365 to your user
accounts automatically as soon as they're added as members.
Add user accounts to specific groups dynamically based on user account
attributes, such as department name.
Automatically provision users for Software as a Service (SaaS) applications and to
protect access to those applications with multifactor authentication (MFA) and
other Conditional Access policies.
Provision permissions and levels of access for teams and SharePoint Online team
sites.
Feedback
Was this page helpful? Yes No
This article applies to both Microsoft 365 Enterprise and Office 365 Enterprise.
If you chose the hybrid identity model and configured protection for administrator
accounts in Step 2 and user accounts in Step 3 of this solution, your next task is to
deploy directory synchronization. The benefits of directory synchronization for your
organization include:
For more information about the advantages of using directory synchronization, see
hybrid identity with Microsoft Entra ID.
7 Note
Non-ASCII characters do not sync for any attributes on the AD DS user account.
AD DS Preparation
To help ensure a seamless transition to Microsoft 365 by using synchronization, you
must prepare your AD DS forest before you begin your Microsoft 365 directory
synchronization deployment.
7 Note
These are the same attributes that Microsoft Entra Connect synchronizes.
If your organization has multiple forests for authentication (logon forests), we highly
recommend the following:
If you can't consolidate your multi-forest AD DS deployment or are using other directory
services to manage identities, you might be able to synchronize them with the help of
Microsoft or a partner.
) Important
In your AD DS, complete the following clean-up tasks for each user account that will be
assigned a Microsoft 365 license:
3. If possible, ensure a valid and unique value for the userPrincipalName attribute in
the user's user object. For the best synchronization experience, ensure that the AD
DS UPN matches the Microsoft Entra UPN. If a user doesn't have a value for the
userPrincipalName attribute, then the user object must contain a valid and unique
value for the sAMAccountName attribute. Remove any duplicate values in the
userPrincipalName attribute.
4. For optimal use of the global address list (GAL), ensure the information in the
following attributes of the AD DS user account is correct:
givenName
surname
displayName
Job Title
Department
Office
Office Phone
Mobile Phone
Fax Number
Street Address
City
State or Province
Zip or Postal Code
Country or Region
Directory synchronization will also fail if some of your AD DS users have one or more
duplicate attributes. Each user must have unique attributes.
displayName
If the attribute exists in the user object, it's synchronized with Microsoft 365.
If this attribute exists in the user object, there must be a value for it. That is, the
attribute must not be blank.
Maximum number of characters: 256
givenName
If the attribute exists in the user object, it's synchronized with Microsoft 365, but
Microsoft 365 doesn't require or use it.
Maximum number of characters: 64
7 Note
If there are duplicate values, the first user with the value is synchronized.
Subsequent users will not appear in Microsoft 365. You must modify either
the value in Microsoft 365 or modify both of the values in AD DS in order
for both users to appear in Microsoft 365.
7 Note
Underscores ("_") in the synchronized name indicates that the original value
of this attribute contains invalid characters. For more information on this
attribute, see Exchange alias attribute.
proxyAddresses
Multiple-value attribute
Letters with diacritical marks, such as umlauts, accents, and tildes, are invalid
characters.
The invalid characters apply to the characters following the type delimiter and
":", such that SMTP:[email protected] is allowed, but
SMTP:user:[email protected] isn't.
) Important
All Simple Mail Transport Protocol (SMTP) addresses should comply with
email messaging standards. Remove duplicate or unwanted addresses if
they exist.
sAMAccountName
Maximum number of characters: 20
The attribute value must be unique within the directory.
Invalid characters: [ \ " | , / : < > + = ; ? * ']
If a user has an invalid sAMAccountName attribute but has a valid
userPrincipalName attribute, the user account is created in Microsoft 365.
If both sAMAccountName and userPrincipalName are invalid, the AD DS
userPrincipalName attribute must be updated.
sn (surname)
If the attribute exists in the user object, it's synchronized with Microsoft 365, but
Microsoft 365 doesn't require or use it.
targetAddress
userPrincipalName
The userPrincipalName attribute must be in the Internet-style sign-in format
where the user name is followed by the at sign (@) and a domain name: for
example, [email protected]. All Simple Mail Transport Protocol (SMTP)
addresses should comply with email messaging standards.
The maximum number of characters for the userPrincipalName attribute is 113.
A specific number of characters are permitted before and after the at sign (@),
as follows:
Maximum number of characters for the username that is in front of the at sign
(@): 64
Maximum number of characters for the domain name following the at sign (@):
48
Invalid characters: \ % & * + / = ? { } | < > ( ) ; : , [ ] "
Characters allowed: A – Z, a - z, 0 – 9, ' . - _ ! # ^ ~
Letters with diacritical marks, such as umlauts, accents, and tildes, are invalid
characters.
The @ character is required in each userPrincipalName value.
The @ character can't be the first character in each userPrincipalName value.
The username can't end with a period (.), an ampersand (&), a space, or an at
sign (@).
The username can't contain any spaces.
Routable domains must be used; for example, local or internal domains can't be
used.
Unicode is converted to underscore characters.
userPrincipalName can't contain any duplicate values in the directory.
In Microsoft 365, the UPN is the default attribute that's used to generate the email
address. It's easy to get userPrincipalName (in AD DS and in Microsoft Entra ID) and the
primary email address in proxyAddresses set to different values. When they're set to
different values, there can be confusion for administrators and end users.
It's best to align these attributes to reduce confusion. To meet the requirements of
single sign-on with Active Directory Federation Services (AD FS) 2.0, you need to ensure
that the UPNs in Microsoft Entra ID and your AD DS match and are using a valid domain
namespace.
4. Add an alternative UPN suffix to AD DS
You might need to add an alternative UPN suffix to associate the user's corporate
credentials with the Microsoft 365 environment. A UPN suffix is the part of a UPN to the
right of the @ character. UPNs that are used for single sign-on can contain letters,
numbers, periods, dashes, and underscores, but no other types of characters.
For more information on how to add an alternative UPN suffix to Active Directory, see
Prepare for directory synchronization .
Also see How to prepare a non-routable domain (such as .local domain) for directory
synchronization.
Next steps
After you've completed steps 1 through 5, see Set up directory synchronization.
Feedback
Was this page helpful? Yes No
When you synchronize your on-premises directory with Microsoft 365, you have to have
a verified domain in Microsoft Entra ID. Only the User Principal Names (UPNs) that are
associated with the on-premises Active Directory Domain Services (AD DS) domain are
synchronized. However, any UPN that contains a nonroutable domain, such as .local
(example: [email protected]), is synchronized to an .onmicrosoft.com domain
(example: [email protected]).
If you currently use a .local domain for your user accounts in AD DS, we recommend
that you change them to use a verified domain. For example, [email protected], in
order to properly synchronize with your Microsoft 365 domain.
Microsoft Entra Connect synchronizes your users' UPN and password so that users can
sign in with the same credentials they use on-premises. However, Microsoft Entra
Connect only synchronizes users to domains that are verified by Microsoft 365.
Microsoft Entra ID verifies the domain, as it manages Microsoft 365 identities. In other
words, the domain has to be a valid Internet domain (such as, .com, .org, .NET, .us). If
your internal AD DS only uses a nonroutable domain (for example, .local ), this can't
possibly match the verified domain you have for your Microsoft 365 tenant. You can fix
this issue by either changing your primary domain in your on-premises AD DS, or by
adding one or more UPN suffixes.
After you update the UPNs to use the verified domain, you're ready to synchronize your
on-premises AD DS with Microsoft 365.
1. On the AD DS domain controller, in the Server Manager choose Tools > Active
Directory Domains and Trusts.
Press Windows key + R to open the Run dialog, and then type in Domain.msc, and
then choose OK.
2. In the Active Directory Domains and Trusts window, right-click Active Directory
Domains and Trusts, and then choose Properties.
3. On the UPN Suffixes tab, in the Alternative UPN Suffixes box, type your new UPN
suffix or suffixes, and then choose Add > Apply.
1. On the AD DS domain controller, in the Server Manager choose Tools > Active
Directory Users and Computers.
Press Windows key + R to open the Run dialog, and then type in Dsa.msc, and
then select OK
3. On the Account tab, in the UPN suffix drop-down list, choose the new UPN suffix,
and then choose OK.
4. Complete these steps for every user.
For example, you could run the following PowerShell commands to update all
contoso.local suffixes to contoso.com:
PowerShell
Feedback
Was this page helpful? Yes No
This article applies to both Microsoft 365 Enterprise and Office 365 Enterprise.
Microsoft 365 uses a Microsoft Entra tenant to store and manage identities for
authentication and permissions to access cloud-based resources.
If you have an on-premises Active Directory Domain Services (AD DS) domain or forest,
you can synchronize your AD DS user accounts, groups, and contacts with the Microsoft
Entra tenant of your Microsoft 365 subscription. This is hybrid identity for Microsoft 365.
Here are its components.
Verify your on-premises domain. The Microsoft Entra Connect wizard guides you
through this.
Obtain the user names and passwords for the admin accounts of your Microsoft
365 tenant and AD DS.
For your on-premises server on which you install Microsoft Entra Connect, you'll need:
ノ Expand table
Windows Server 2008 R2 with - The latest version of PowerShell is available in Windows
Service Pack 1 (SP1)** or Management Framework 4.0. Search for it on Microsoft
Windows Server 2012 Download Center .
- .NET 4.5.1 and later releases are available on Microsoft
Download Center .
You can also review the Microsoft Entra Connect version release history to see what is
included and fixed in each release.
Next step
Assign licenses to user accounts
Feedback
Was this page helpful?
Yes No
Today's workforce requires access to applications and resources that exist beyond
traditional corporate network boundaries. Security architectures that rely on network
firewalls and virtual private networks (VPNs) to isolate and restrict access to resources
are no longer sufficient.
To address this new world of computing, Microsoft highly recommends the Zero Trust
security model, which is based on these guiding principles:
Verify explicitly: Always authenticate and authorize based on all available data
points. This verification is where Zero Trust identity and device access policies are
crucial to sign-in and ongoing validation.
Use least privilege access: Limit user access with Just-In-Time and Just-Enough-
Access (JIT/JEA), risk-based adaptive policies, and data protection.
Assume breach: Minimize blast radius and segment access. Verify end-to-end
encryption and use analytics to get visibility, drive threat detection, and improve
defenses.
Zero Trust identity and device access policies address the Verify explicitly guiding
principle for:
Identities: When an identity attempts to access a resource, verify that identity with
strong authentication and ensure that requested access is compliant and typical.
Devices (also called endpoints): Monitor and enforce device health and
compliance requirements for secure access.
Applications: Apply controls and technologies to:
Ensure appropriate in-app permissions.
Control access based on real-time analytics.
Monitor for abnormal behavior
Control user actions.
Validate secure configuration options.
This series of articles describe a set of identity and device access configurations and
policies using Microsoft Entra ID, Conditional Access, Microsoft Intune, and other
features. These configurations and policies provide Zero Trust access to Microsoft 365
for enterprise cloud apps and services, other SaaS services, and on-premises
applications that are published with Microsoft Entra application proxy.
Zero Trust identity and device access settings and policies are recommended in three
tiers:
Starting point.
Enterprise.
Specialized security for environments with highly regulated or classified data.
These tiers and their corresponding configurations provide consistent levels of Zero
Trust protection across your data, identities, and devices. These capabilities and their
recommendations:
Watch this video for a quick overview of identity and device access configurations for
Microsoft 365 for enterprise.
https://www.microsoft.com/en-us/videoplayer/embed/RWxEDQ?postJsllMsg=true
7 Note
Microsoft also sells Enterprise Mobility + Security (EMS) licenses for Office 365
subscriptions. EMS E3 and EMS E5 capabilities are equivalent to those in Microsoft
365 E3 and Microsoft 365 E5. For more information, see EMS plans .
Intended audience
These recommendations are intended for enterprise architects and IT professionals who
are familiar with Microsoft 365 cloud productivity and security services. These services
include Microsoft Entra ID (identity), Microsoft Intune (device management), and
Microsoft Purview Information Protection (data protection).
Customer environment
The recommended policies are applicable to enterprise organizations operating both
entirely within the Microsoft cloud and for customers with hybrid identity infrastructure.
A hybrid identity structure is an on-premises Active Directory forest that's synchronized
with Microsoft Entra ID.
Many of our recommendations rely on services that are available only with the following
licenses:
For organizations who don't have these licenses, we recommend that you at least
implement security defaults, which is included with all Microsoft 365 plans.
Caveats
Your organization might be subject to regulatory or other compliance requirements,
including specific recommendations that require you to apply policies that diverge from
these recommended configurations. These configurations recommend usage controls
that haven't historically been available. We recommend these controls because we
believe they represent a balance between security and productivity.
We've done our best to account for a wide variety of organizational protection
requirements, but we're not able to account for all possible requirements or for all the
unique aspects of your organization.
Three levels of protection
Most organizations have specific requirements regarding security and data protection.
These requirements vary by industry segment and by job functions within organizations.
For example, your legal department and administrators might require additional security
and information protection controls around their email correspondence that aren't
required for other business units.
Each industry also has their own set of specialized regulations. We aren't trying to
provide a list of all possible security options or a recommendation per industry segment
or job function. Instead, we're providing recommendations for three levels of security
and protection that can be applied based on the granularity of your needs.
This guidance shows you how to implement Zero Trust protection for identities and
devices for each of these levels of protection. Use this guidance as a minimum for your
organization and adjust the policies to meet your organization's specific requirements.
It's important to use consistent levels of protection across your identities, devices, and
data. For example, protection for users with priority accounts—such as executives,
leaders, managers, and others—should include the same level of protection for their
identities, their devices, and the data they access.
Additionally, see the Deploy information protection for data privacy regulations solution
to protect information stored in Microsoft 365.
Know your users and be flexible to their security and functional requirements.
Apply a security policy just in time and ensure it's meaningful.
This section provides an overview of the Microsoft 365 services and capabilities that are
important for Zero Trust identity and device access.
Microsoft Entra ID
Microsoft Entra ID provides a full suite of identity management capabilities. We
recommend using these capabilities to secure access.
ノ Expand table
Multifactor MFA requires users to provide two forms of verification, Microsoft 365 E3
authentication such as a user password plus a notification from the or E5
(MFA) Microsoft Authenticator app or a phone call. MFA greatly
reduces the risk that stolen credentials can be used to
access your environment. Microsoft 365 uses the Microsoft
Entra multifactor authentication service for MFA-based
sign-ins.
Conditional Microsoft Entra ID evaluates the conditions of the user Microsoft 365 E3
Access sign-in and uses Conditional Access policies to determine or E5
the allowed access. For example, in this guidance we show
you how to create a Conditional Access policy to require
device compliance for access to sensitive data. This greatly
reduces the risk that a hacker with their own device and
stolen credentials can access your sensitive data. It also
protects sensitive data on the devices, because the devices
must meet specific requirements for health and security.
Microsoft Entra Conditional Access policies, device management with Microsoft 365 E3
groups Intune, and even permissions to files and sites in your or E5
organization rely on the assignment to user accounts or
Microsoft Entra groups. We recommend you create
Microsoft Entra groups that correspond to the levels of
protection you are implementing. For example, your
executive staff are likely higher value targets for hackers.
Therefore, it makes sense to add the user accounts of these
employees to a Microsoft Entra group and assign this
group to Conditional Access policies and other policies that
enforce a higher level of protection for access.
Device You enroll a device into Microsoft Entra ID to create an Microsoft 365 E3
enrollment identity for the device. This identity is used to authenticate or E5
the device when a user signs in and to apply Conditional
Access policies that require domain-joined or compliant
PCs. For this guidance, we use device enrollment to
automatically enroll domain-joined Windows computers.
Device enrollment is a prerequisite for managing devices
with Intune.
Capability or Description Licensing
feature
Microsoft Entra Enables you to detect potential vulnerabilities affecting Microsoft 365
ID Protection your organization's identities and configure automated E5, Microsoft
remediation policy to low, medium, and high sign-in risk 365 E3 with the
and user risk. This guidance relies on this risk evaluation to E5 Security add-
apply Conditional Access policies for multifactor on, EMS E5, or
authentication. This guidance also includes a Conditional Microsoft Entra
Access policy that requires users to change their password ID P2 licenses
if high-risk activity is detected for their account.
Self-service Allow your users to reset their passwords securely and Microsoft 365 E3
password reset without help-desk intervention, by providing verification of or E5
(SSPR) multiple authentication methods that the administrator can
control.
Microsoft Entra Detect and block known weak passwords and their variants Microsoft 365 E3
password and additional weak terms that are specific to your or E5
protection organization. Default global banned password lists are
automatically applied to all users in a Microsoft Entra
tenant. You can define additional entries in a custom
banned password list. When users change or reset their
passwords, these banned password lists are checked to
enforce the use of strong passwords.
Here are the components of Zero Trust identity and device access, including Intune and
Microsoft Entra objects, settings, and subservices.
Microsoft Intune
Intune is Microsoft's cloud-based mobile device management service. This guidance
recommends device management of Windows PCs with Intune and recommends device
compliance policy configurations. Intune determines whether devices are compliant and
sends this data to Microsoft Entra ID to use when applying Conditional Access policies.
Intune app protection policies can be used to protect your organization's data in mobile
apps, with or without enrolling devices into management. Intune helps protect
information, making sure your employees can still be productive, and preventing data
loss. By implementing app-level policies, you can restrict access to company resources
and keep data within the control of your IT department.
This guidance shows you how to create recommended policies to enforce the use of
approved apps and to determine how these apps can be used with your business data.
Microsoft 365
This guidance shows you how to implement a set of policies to protect access to
Microsoft 365 cloud services, including Microsoft Teams, Exchange, SharePoint, and
OneDrive. In addition to implementing these policies, we recommend you also raise the
level of protection for your tenant using these resources:
ノ Expand table
Enforce password For high-risk users For high-risk For high-risk users
change users
Device ownership
The above table reflects the trend for many organizations to support a mix of
organization-owned devices, and personal or BYODs to enable mobile productivity
across the workforce. Intune app protection policies ensure that email is protected from
exfiltrating out of the Outlook mobile app and other Office mobile apps, on both
organization-owned devices and BYODs.
Analyze this list of apps to determine the sets of policies that provide appropriate
levels of protection.
You shouldn't create separate sets of policies each for app because management
of them can become cumbersome. Microsoft recommends that you group your
apps that have the same protection requirements for the same users.
For example, have one set of policies that include all Microsoft 365 apps for all
users for starting point protection. Have a second set of policies for all sensitive
apps, such as those used by human resources or finance departments, and apply
them to those groups.
Once you have determined the set of policies for the apps you want to secure, roll the
policies out to users incrementally, addressing issues along the way. For example:
1. Configure the policies that you intend to use for all Microsoft 365 apps.
2. Add just Exchange with its required changes, roll out the policies to users, and
work through any issues.
3. Add Teams with its required changes, roll out the policies to users, and work
through any issues.
4. Add SharePoint with its required changes, roll out the policies to users, and work
through any issues.
5. Continue adding the rest of your apps until you can confidently configure these
starting point policies to include all Microsoft 365 apps.
Similarly, for your sensitive apps, create the set of policies and add one app at a time.
Work through any issues until they're all included in the sensitive app policy set.
Microsoft recommends that you don't create policy sets that apply to all apps because it
can result in some unintended configurations. For example, policies that block all apps
could lock your admins out of the Microsoft Entra admin center and exclusions can't be
configured for important endpoints such as Microsoft Graph.
1. Configure prerequisite identity features and their settings.
2. Configure the common identity and access Conditional Access policies.
3. Configure Conditional Access policies for guest and external users.
4. Configure Conditional Access policies for Microsoft 365 cloud apps—such as
Microsoft Teams, Exchange, and SharePoint—and Microsoft Defender for Cloud
Apps policies.
After you have configured Zero Trust identity and device access, see the Microsoft Entra
feature deployment guide for a phased checklist of additional features to consider and
Microsoft Entra ID Governance to protect, monitor, and audit access.
Next step
Prerequisite work for implementing Zero Trust identity and device access policies
Feedback
Was this page helpful? Yes No
This article describes the prerequisites admins must meet to use recommended Zero
Trust identity and device access policies, and to use Conditional Access. It also discusses
the recommended defaults for configuring client platforms for the best single sign-on
(SSO) experience.
Prerequisites
Before using the Zero Trust identity and device access policies that are recommended,
your organization needs to meet prerequisites. The requirements are different for the
various identity and authentication models listed:
Cloud-only
Hybrid with password hash sync (PHS) authentication
Hybrid with pass-through authentication (PTA)
Federated
The following table details the prerequisite features and their configuration that apply to
all identity models, except where noted.
ノ Expand table
Configure PHS. This feature must be enabled to detect leaked Cloud-only Microsoft 365
credentials and to act on them for risk-based Conditional Access. E3 or E5
Note: This is required regardless of whether your organization
uses federated authentication.
Enable seamless single sign-on to automatically sign users in Cloud-only Microsoft 365
when they are on their organization devices connected to your and E3 or E5
organization network. federated
Register all users for self-service password reset (SSPR) and Microsoft 365
multifactor authentication (MFA). We recommend you register E3 or E5
users for Microsoft Entra multifactor authentication ahead of
time. Microsoft Entra ID Protection makes use of Microsoft Entra
multifactor authentication to perform additional security
verification. Additionally, for the best sign-in experience, we
recommend users install the Microsoft Authenticator app and
the Microsoft Company Portal app on their devices. These can be
installed from the app store for each platform.
Plan your Microsoft Entra hybrid join implementation. Cloud-only Microsoft 365
Conditional Access will make sure devices connecting to apps E3 or E5
are domain-joined or compliant. To support this on Windows
computers, the device must be registered with Microsoft Entra
ID. This article discusses how to configure automatic device
registration.
Prepare your support team. Have a plan in place for users that Microsoft 365
cannot complete MFA. This could be adding them to a policy E3 or E5
exclusion group, or registering new MFA information for them.
Before making either of these security-sensitive changes, you
need to ensure that the actual user is making the request.
Requiring users' managers to help with the approval is an
effective step.
automated remediation policy to low, medium, and high sign-in E3 with the E5
risk and user risk. Security add-
on
Enable modern authentication for Exchange Online and for Microsoft 365
Skype for Business Online . Modern authentication is a E3 or E5
prerequisite for using MFA. Modern authentication is enabled by
default for Office 2016 and 2019 clients, SharePoint, and
OneDrive for Business.
Enable continuous access evaluation for Microsoft Entra ID. Microsoft 365
Continuous access evaluation proactively terminates active user E3 or E5
sessions and enforces tenant policy changes in near real-time.
Windows devices
We recommend Windows 11 or Windows 10 (version 2004 or later), as Azure is
designed to provide the smoothest SSO experience possible for both on-premises and
Microsoft Entra ID. Work or school-issued devices should be configured to join
Microsoft Entra ID directly or if the organization uses on-premises AD domain join,
those devices should be configured to automatically and silently register with Microsoft
Entra ID.
For BYOD Windows devices, users can use Add work or school account. Note that users
of the Google Chrome browser on Windows 11 or Windows 10 devices need to install
an extension to get the same smooth sign-in experience as Microsoft Edge users.
Also, if your organization has domain-joined Windows 8 or 8.1 devices, you can install
Microsoft Workplace Join for non-Windows 10 computers. Download the package to
register the devices with Microsoft Entra ID.
iOS devices
We recommend installing the Microsoft Authenticator app on user devices before
deploying Conditional Access or MFA policies. At a minimum, the app should be
installed when users are asked to register their device with Microsoft Entra ID by adding
a work or school account, or when they install the Intune company portal app to enroll
their device into management. This depends on the configured Conditional Access
policy.
Android devices
We recommend users install the Intune Company Portal app and Microsoft
Authenticator app before Conditional Access policies are deployed or when required
during certain authentication attempts. After app installation, users may be asked to
register with Microsoft Entra ID or enroll their device with Intune. This depends on the
configured Conditional Access policy.
ノ Expand table
ノ Expand table
Platform Word/Excel/PowerPoint OneNote OneDrive SharePoint OneDrive
App App sync client
For editions of Microsoft 365 or Office 365 that do not support Conditional Access, you
can enable security defaults to require MFA for all accounts.
Next step
Configure the common Zero Trust identity and device access policies
Feedback
Was this page helpful? Yes No
Organizations have lots to worry about when deploying Microsoft 365 for their
organization. The Conditional Access, app protection, and device compliance policies
referenced in this article are based on Microsoft's recommendations and the three
guiding principles of Zero Trust:
Verify explicitly
Use least privilege
Assume breach
Organizations can take these policies as is or customize them to fit their needs. If
possible, test your policies in a non-production environment before rolling out to your
production users. Testing is critical to identify and communicate any possible effects to
your users.
We group these policies into three protection levels based on where you are on your
deployment journey:
The following diagram shows which level of protections each policy applies to and
whether the policies apply to PCs or phones and tablets, or both categories of devices.
Zero Trust identity and device access policies
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
Tip
Prerequisites
Permissions
Users who will manage Conditional Access policies must be able to sign in to the
Azure portal as a Conditional Access Administrator, Security Administrator, or
Global Administrator.
Users who will manage app protection and device compliance policies must be
able to sign in to Intune as an Intune Administrator or Global Administrator.
Those users who only need to view configurations can be assigned the Security
Reader or Global Reader roles.
For more information about roles and permissions, see the article Microsoft Entra built-
in roles.
User registration
Ensure your users register for multifactor authentication prior to requiring its use. If you
have licenses that include Microsoft Entra ID P2, you can use the MFA registration policy
within Microsoft Entra ID Protection to require that users register. We provide
communication templates , you can download and customize, to promote registration.
Groups
All Microsoft Entra groups used as part of these recommendations must be created as a
Microsoft 365 group not a Security group. This requirement is important for the
deployment of sensitivity labels when securing documents in Microsoft Teams and
SharePoint later on. For more information, see the article Learn about groups and access
rights in Microsoft Entra ID
Assigning policies
Conditional Access policies may be assigned to users, groups, and administrator roles.
Intune app protection and device compliance policies may be assigned to groups only.
Before you configure your policies, you should identify who should be included and
excluded. Typically, starting point protection level policies apply to everybody in the
organization.
Here's an example of group assignment and exclusions for requiring MFA after your
users have completed user registration.
ノ Expand table
Be careful when applying higher levels of protection to groups and users. The goal of
security isn't to add unnecessary friction to the user experience. For example, members
of the Top Secret Project Buckeye group will be required to use MFA every time they sign
in, even if they aren't working on the specialized security content for their project.
Excessive security friction can lead to fatigue.
You may consider enabling passwordless authentication methods, like Windows Hello
for Business or FIDO2 security keys to reduce some friction created by certain security
controls.
Exclusions
A recommended practice is to create a Microsoft Entra group for Conditional Access
exclusions. This group gives you a means to provide access to a user while you
troubleshoot access issues.
2 Warning
Deployment
We recommend implementing the starting point policies in the order listed in this table.
However, the MFA policies for enterprise and specialized security levels of protection
can be implemented at any time.
Starting point
ノ Expand table
Require MFA when sign- Use risk data from Microsoft Entra ID Microsoft 365 E5 or
in risk is medium or high Protection to require MFA only when risk Microsoft 365 E3 with
is detected the E5 Security add-on
Block clients that don't Clients that don't use modern Microsoft 365 E3 or E5
support modern authentication can bypass Conditional
authentication Access policies, so it's important to block
them.
High risk users must Forces users to change their password Microsoft 365 E5 or
change password when signing in if high-risk activity is Microsoft 365 E3 with
detected for their account. the E5 Security add-on
Apply application One Intune app protection policy per Microsoft 365 E3 or E5
protection policies for platform (Windows, iOS/iPadOS, Android).
data protection
Require approved apps Enforces mobile app protection policies Microsoft 365 E3 or E5
and app protection for phones and tablets using iOS, iPadOS,
policies or Android.
Enterprise
ノ Expand table
Policy More information Licensing
Require MFA when sign- Use risk data from Microsoft Entra ID Microsoft 365 E5 or
in risk is low, medium, or Protection to require MFA only when Microsoft 365 E3 with the
high risk is detected E5 Security add-on
Specialized security
ノ Expand table
Always require Users must perform MFA anytime they sign in to your Microsoft 365 E3
MFA organizations services or E5
Level 2 maps to what we consider starting point or enterprise level security, level 3 maps
to specialized security.
Manually create the policies by following the steps in How to create and deploy
app protection policies with Microsoft Intune.
Import the sample Intune App Protection Policy Configuration Framework JSON
templates with Intune's PowerShell scripts .
You must create a policy for each PC, phone, or tablet platform. This article will cover
recommendations for the following platforms:
Android
iOS/iPadOS
Windows 10 and later
iOS/iPadOS supports several enrollment scenarios, two of which are covered as part of
this framework:
Device enrollment for personally owned devices – these devices are personally
owned and used for both work and personal use.
Automated device enrollment for corporate-owned devices – these devices are
corporate-owned, associated with a single user, and used exclusively for work and
not personal use.
Using the principles outlined in Zero Trust identity and device access configurations:
The starting point and enterprise protection levels map closely with the level 2
enhanced security settings.
The specialized security protection level maps closely to the level 3 high security
settings.
Android Enterprise work profile – this enrollment model is typically used for
personally owned devices, where IT wants to provide a clear separation boundary
between work and personal data. Policies controlled by IT ensure that the work
data can't be transferred into the personal profile.
Android Enterprise fully managed devices – these devices are corporate-owned,
associated with a single user, and used exclusively for work and not personal use.
Using the principles outlined in Zero Trust identity and device access configurations:
The starting point and enterprise protection levels map closely with the level 2
enhanced security settings.
The specialized security protection level maps closely to the level 3 high security
settings.
Because of the settings available for personally owned work profile devices, there's
no basic security (level 1) offering. The available settings don't justify a difference
between level 1 and level 2.
Work profile enhanced security (Level 2)– Microsoft recommends this
configuration as the minimum security configuration for personal devices where
users access work or school data. This configuration introduces password
requirements, separates work and personal data, and validates Android device
attestation.
Work profile high security (Level 3) – Microsoft recommends this configuration
for devices used by specific users or groups who are uniquely high risk (users who
handle highly sensitive data where unauthorized disclosure causes considerable
material loss to the organization). This configuration introduces mobile threat
defense or Microsoft Defender for Endpoint, sets the minimum Android version,
enacts stronger password policies, and further restricts work and personal
separation.
The following settings are configured in Step 2: Compliance settings, of the compliance
policy creation process for Windows 10 and newer devices. These settings align with the
principles outlined in Zero Trust identity and device access configurations.
For Device health > Windows Health Attestation Service evaluation rules, see this
table.
ノ Expand table
Property Value
For Device properties, specify appropriate values for operating system versions based
on your IT and security policies.
ノ Expand table
Property Value
Firewall Require
Antivirus Require
Antispyware Require
ノ Expand table
Property Value
ノ Expand table
Use this policy along with Microsoft Entra password protection, which detects and
blocks known weak passwords and their variants in addition to terms specific to your
organization. Using Microsoft Entra password protection ensures that changed
passwords are stronger.
To create a Conditional Access policy that requires approved apps and APP protection,
follow the steps in Require approved client apps or app protection policy with mobile
devices. This policy only allows accounts within mobile apps protected by app
protection policies to access Microsoft 365 endpoints.
Blocking legacy authentication for other client apps on iOS and Android devices ensures
that these clients can't bypass Conditional Access policies. If you're following the
guidance in this article, you've already configured Block clients that don't support
modern authentication.
U Caution
Make sure that your device is compliant before enabling this policy. Otherwise, you
could get locked out and be unable to change this policy until your user account
has been added to the Conditional Access exclusion group.
7 Note
You can enroll your new devices to Intune even if you select Require device to be
marked as compliant for All users and All cloud apps in your policy. Require
device to be marked as compliant control does not block Intune enrollment and
the access to the Microsoft Intune Web Company Portal application.
Subscription activation
2 Warning
When configuring your policy, select the group that requires specialized security
and use that instead of selecting All users.
Next steps
Feedback
Was this page helpful? Yes No
This article discusses adjusting the recommended Zero Trust identity and device access
policies to allow access for guests and external users that have a Microsoft Entra
Business-to-Business (B2B) account. This guidance builds on the common identity and
device access policies.
These recommendations are designed to apply to the starting point tier of protection.
But you can also adjust the recommendations based on your specific needs for
enterprise and specialized security protection.
Providing a path for B2B accounts to authenticate with your Microsoft Entra tenant
doesn't give these accounts access to your entire environment. B2B users and their
accounts have access to services and resources, like files, shared with them by
Conditional Access policy.
Zero Trust identity and device access policies for guest and external users
New policy: Require MFA when Block clients that High risk users must
sign-in risk is medium don’t support change password
Require multifactor or high modern
PCs authentication (MFA) authentication This policy forces users
always for guests Exclude guest and to change their
Starting point and external users external users password when signing
Clients that do not
Require approved use modern in if high risk activity is Apply Level 2 App
apps authentication can detected for their Protection Policies
bypass Conditional account. (APP) data protection
Phones and This policy enforces
tablets mobile app protection Access policies. (one for each
for phones & tablets. platform)
ノ Expand table
Starting Require MFA always Create this new policy and configure:
point for guests and For Assignments > Users and groups > Include,
external users choose Select users and groups, and then select
All guest and external users.
For Assignments > Conditions > Sign-in risk and
select all Sign-in risk levels.
Require MFA when Modify this policy to exclude guests and external users.
sign-in risk is medium
or high
To include or exclude guests and external users in Conditional Access policies, for
Assignments > Users and groups > Include or Exclude, check All guest and external
users.
More information
External access is for an external user that doesn't have a B2B account. External
user access includes invitations, calls, chats, and meetings, but doesn't include
team membership and access to the resources of the team.
For more information, see the comparison between guests and external user access for
teams.
For more information on securing identity and device access policies for Teams, see
Policy recommendations for securing Teams chats, groups, and files.
For more information, see Limitations of ID Protection for B2B collaboration users.
Next step
Configure Conditional Access policies for:
Microsoft Teams
Exchange Online
SharePoint
Microsoft Defender for Cloud Apps
Feedback
Was this page helpful? Yes No
This article describes how to implement the recommended Zero Trust identity and
device access policies to protect Microsoft Teams chats, groups, and content such as
files and calendars. This guidance builds on the common identity and device access
policies, with additional information that's Teams-specific. Because Teams integrates
with our other products, also see Policy recommendations for securing SharePoint sites
and files and Policy recommendations for securing email.
These recommendations are based on three different tiers of security and protection for
Teams that can be applied based on the granularity of your needs: starting point,
enterprise, and specialized security. You can learn more about these security tiers and
the recommended policies referenced by these recommendations in the Identity and
device access configurations.
Zero Trust identity and device access policies for Microsoft Teams
Changes from the common PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
identity and device access policies Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
These services are the dependent services to include in the assignment of cloud apps for
Teams:
Microsoft Teams
SharePoint and OneDrive for Business
Exchange Online
Skype for Business Online
Microsoft Stream (meeting recordings)
Microsoft Planner (Planner tasks and plan data)
This table lists the policies that need to be revisited and links to each policy in the
common identity and device access policies, which has the wider policy set for all Office
applications.
ノ Expand table
Starting Require MFA when Be sure Teams and dependent services are included in
point sign-in risk is medium the list of apps. Teams has Guest Access and External
or high Access rules to consider as well, you'll learn more about
these rules later in this article.
Protection Policies Further information for Teams implementation
level
Block clients that don't Include Teams and dependent services in the
support modern assignment of cloud apps.
authentication
High risk users must Forces Teams users to change their password when
change password signing in if high-risk activity is detected for their
account. Be sure Teams and dependent services are
included in the list of apps.
Apply APP data Be sure Teams and dependent services are included in
protection policies the list of apps. Update the policy for each platform
(iOS, Android, Windows).
Enterprise Require MFA when Teams has Guest Access and External Access rules to
sign-in risk is low, consider as well, you'll learn more about these rules
medium or high later in this article. Include Teams and dependent
services in this policy.
Require compliant PCs Include Teams and dependent services in this policy.
and mobile devices
Specialized Always require MFA Regardless of user identity, MFA will be used by your
security organization. Include Teams and dependent services in
this policy.
Guest access uses a Microsoft Entra B2B account for a guest or external user that
can be added as a member of a team and have all permissioned access to the
communication and resources of the team.
External access is for an external user that doesn't have a Microsoft Entra B2B
account. External access can include invitations and participation in calls, chats, and
meetings, but doesn't include team membership and access to the resources of the
team.
Conditional Access policies only apply to guest access in Teams because there's a
corresponding Microsoft Entra B2B account.
For recommended policies to allow access for guest and external users with a Microsoft
Entra B2B account, see Policies for allowing guest and external B2B account access.
For more information about guest access and how to implement it, see Teams guest
access.
External access in Teams
External access is sometimes confused with guest access, so it's important to be clear
that these two non-internal access mechanisms are different types of access.
External access is a way for Teams users from an entire external domain to find, call,
chat, and set up meetings with your users in Teams. Teams administrators configure
external access at the organization level. For more information, see Manage external
access in Microsoft Teams.
External access users have less access and functionality than an individual who's been
added via guest access. For example, external access users can chat with your internal
users with Teams but can't access team channels, files, or other resources.
External access doesn't use Microsoft Entra B2B user accounts and therefore doesn't use
Conditional Access policies.
Teams policies
Outside of the common policies listed above, there are Teams-specific policies that can
and should be configured to manage various Teams functionalities.
Changing the default policy or creating custom policies would be recommended, and
you can learn more about managing your policies at this link: Manage teams policies in
Microsoft Teams.
Messaging policies
Messaging, or chat, can also be managed through the default global policy, or through
custom policies, and this can help your users communicate with one another in a way
that's appropriate for your organization. This information can be reviewed at Managing
messaging policies in Teams.
Meeting policies
No discussion of Teams would be complete without planning and implementing policies
around Teams meetings. Meetings are an essential component of Teams, allowing
people to formally meet and present to many users at once, and to share content
relevant to the meeting. Setting the right policies for your organization around meetings
is essential.
For more reading about App Permission Policies, check out Manage app permission
policies in Microsoft Teams.
Next steps
Exchange Online
SharePoint
Feedback
Was this page helpful? Yes No
This article describes how to implement the recommended Zero Trust identity and
device access policies to protect organizational email and email clients that support
modern authentication and conditional access. This guidance builds on the Common
identity and device access policies and also includes a few additional recommendations.
These recommendations are based on three different tiers of security and protection
that can be applied based on the granularity of your needs: starting point, enterprise,
and specialized security. You can learn more about these security tiers and the
recommended client operating systems in the recommended security policies and
configurations introduction.
These recommendations require your users to use modern email clients, including
Outlook for iOS and Android on mobile devices. Outlook for iOS and Android provide
support for the best features of Microsoft 365. These mobile Outlook apps are also
architected with security capabilities that support mobile use and work together with
other Microsoft cloud security capabilities. For more information, see Outlook for iOS
and Android FAQ.
Require multifactor Block clients that New policy: High risk users must
authentication (MFA) don’t support change password
when sign-in risk is modern Block ActiveSync
PCs medium or high authentication clients This policy forces users
to change their
Starting point password when signing
Clients that do not
Require approved use modern in if high risk activity is Apply Level 2 App
apps authentication can detected for their Protection Policies
bypass Conditional account. (APP) data protection
Phones and This policy enforces
tablets mobile app protection Access policies. (one for each
for phones & tablets. platform)
Note the addition of a new policy for Exchange Online to block ActiveSync clients. This
policy forces the use of Outlook for iOS and Android on mobile devices.
If you included Exchange Online and Outlook in the scope of the policies when you set
them up, you only need to create the new policy to block ActiveSync clients. Review the
policies listed in the following table and either make the recommended additions, or
confirm that these settings are already included. Each policy links to the associated
configuration instructions in Common identity and device access policies.
ノ Expand table
Starting point Require MFA when sign-in Include Exchange Online in the assignment of
risk is medium or high cloud apps
Apply APP data protection Be sure Outlook is included in the list of apps. Be
policies sure to update the policy for each platform (iOS,
Android, Windows)
Require approved apps and Include Exchange Online in the list of cloud apps
APP protection
Enterprise Require MFA when sign-in Include Exchange Online in the assignment of
Protection Policies More information
level
Require compliant PCs and Include Exchange Online in the list of cloud apps
mobile devices
For mobile devices, the following clients are blocked based on the Conditional Access
policy created in Require approved apps and APP protection:
2. Every Microsoft 365 organization with Exchange Online mailboxes has a built-in
Outlook on the web (formerly known as Outlook Web App or OWA) mailbox policy
named OwaMailboxPolicy-Default. Admins can also create custom policies.
To see the available Outlook on the web mailbox policies, run the following
command:
PowerShell
PowerShell
For example:
PowerShell
PowerShell
For example:
PowerShell
5. In the Azure portal, create a new Conditional Access policy with these settings:
Assignments > Users and groups: Select appropriate users and groups to include
and exclude.
Assignments > Cloud apps or actions > Cloud apps > Include > Select apps:
Select Office 365 Exchange Online.
See the steps to configure this policy in Manage messaging collaboration access by
using Outlook for iOS and Android.
Next steps
Microsoft Teams
SharePoint
Feedback
Was this page helpful? Yes No
This article describes how to implement the recommended Zero Trust identity and
device access policies to protect SharePoint and OneDrive for Business. This guidance
builds on the common identity and device access policies.
These recommendations are based on three different tiers of security and protection for
SharePoint files that can be applied based on the granularity of your needs: starting
point, enterprise, and specialized security. You can learn more about these security
tiers, and the recommended client operating systems, referenced by these
recommendations in the overview.
Device Microsoft Entra Conditional Access Intune device Intune app SharePoint
Protection compliance protection device access
level type policies policy policies policies
Require multifactor Block clients that New policy: High risk users must
authentication (MFA) don’t support change password
when sign-in risk is modern Use app-enforced
PCs medium or high authentication restrictions of This policy forces users
SharePoint to change their
Starting point password when signing
Clients that do not
Require approved use modern This tells Azure to in if high risk activity is Apply Level 2 App
apps authentication can use the settings detected for their Protection Policies
bypass Conditional specified in account. (APP) data protection
Phones and This policy enforces
tablets mobile app protection Access policies. SharePoint. (one for each
for phones & tablets. platform)
This rule applies to
all users but only
affects access to sites
included in
New access control
Require MFA when Require compliant SharePoint access Define compliance policy:
sign-in risk is low, PCs and mobile policies. policies (one for
medium, or high devices each platform)
Enterprise Allow browser-only
(Recommended for This policy enforces access to specific
Zero Trust) Intune management SharePoint sites from
Require Apply Level 2 APP unmanaged devices
approved apps for PCs, phones, and data protection
tablets.
Block access to
Require MFA always specific SharePoint
Specialized sites from
This is also available
security for all Office 365 unmanaged devices
(only if needed for Enterprise plans.
specific data sets or
Require Apply Level 3 APP
users)
approved apps data protection
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Changes from the common
identity and device access policies Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
If you included SharePoint when you created the common policies, you only need to
create the new policies. For Conditional Access policies, SharePoint includes OneDrive.
The new policies implement device protection for enterprise and specialized security
content by applying specific access requirements to SharePoint sites that you specify.
The following table lists the policies you either need to review and update or create new
for SharePoint. The common policies link to the associated configuration instructions in
the Common identity and device access policies article.
ノ Expand table
Starting Require MFA when sign-in risk is Include SharePoint in the assignment of cloud
point medium or high apps.
Block clients that don't support Include SharePoint in the assignment of cloud
modern authentication apps.
Apply APP data protection Be sure all recommended apps are included in
policies the list of apps. Be sure to update the policy
for each platform (iOS, Android, Windows).
Use app enforced restrictions in Add this new policy. This tells Microsoft Entra
SharePoint ID to use the settings specified in SharePoint.
This policy applies to all users, but only affects
access to sites included in SharePoint access
policies.
Enterprise Require MFA when sign-in risk is Include SharePoint in the assignments of cloud
low, medium or high apps.
Require compliant PCs and Include SharePoint in the list of cloud apps.
mobile devices
SharePoint access control policy: This prevents editing and downloading of files.
Allow browser-only access to Use PowerShell to specify sites.
specific SharePoint sites from
unmanaged devices.
To configure this policy see "Block or limit access to specific SharePoint site collections
or OneDrive accounts" in Control access from unmanaged devices.
Enterprise sites: Allow browser-only access. This prevents users from editing and
downloading files.
Specialized security sites: Block access from unmanaged devices.
See "Block or limit access to specific SharePoint site collections or OneDrive accounts" in
Control access from unmanaged devices.
The following illustration provides an example of how SharePoint device access policies
protect access to sites for a user.
Example of SharePoint Zero Trust identity and device access policies
Protection Device Microsoft Entra Conditional Access SharePoint SharePoint sites for
Resulting access
type device access which James is a
level policies policies member
restrictions
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the
Identity add-on, Office 365 with EMS E5, or March 2024
Phones and tablets include devices running the iOS, iPadOS, or Android platforms individual Microsoft Entra ID P2 licenses
James has starting point Conditional Access policies assigned, but he can be given
access to SharePoint sites with enterprise or specialized security protection.
Next step
Microsoft Teams
Exchange Online
Feedback
Was this page helpful? Yes No
Microsoft Defender for Cloud Apps builds on Microsoft Entra Conditional Access policies
to enable real-time monitoring and control of granular actions with SaaS apps, such as
blocking downloads, uploads, copy and paste, and printing. This feature adds security to
sessions that carry inherent risk, such as when corporate resources are accessed from
unmanaged devices or by guest users.
Defender for Cloud Apps also integrates natively with Microsoft Purview Information
Protection, providing real-time content inspection to find sensitive data based on
sensitive information types and sensitivity labels and to take appropriate action.
1. First, in Microsoft Entra ID, create a new conditional access policy and configure it
to "Use Conditional Access App Control." This redirects the request to Defender for
Cloud Apps. You can create one policy and add all SaaS apps to this policy.
2. Next, in Defender for Cloud Apps, create session policies. Create one policy for
each control you want to apply.
Permissions to SaaS apps are typically based on business need for access to the app.
These permissions can be highly dynamic. Using Defender for Cloud Apps policies
ensures protection to app data, regardless of whether users are assigned to a Microsoft
Entra group associated with starting point, enterprise, or specialized security protection.
To protect data across your collection of SaaS apps, the following diagram illustrates the
necessary Microsoft Entra Conditional Access policy plus suggested policies you can
create in Defender for Cloud Apps. In this example, the policies created in Defender for
Cloud Apps apply to all SaaS apps you're managing. These are designed to apply
appropriate controls based on whether devices are managed as well as sensitivity labels
that are already applied to files.
Protection Device Microsoft Entra Conditional Defender for Cloud Apps Access
level type Access policies App Control policies
(Specify which
Phones and SaaS apps this
tablets applies to. This
policy tells Azure
AD to forward
requests for these
SaaS apps to
Defender for Block download of
Require MFA when files labeled with
sign-in risk is low, Cloud Apps.)
sensitive or
medium, or high
Enterprise classified from
(Recommended for unmanaged
Zero Trust) Required policy devices (this Example policies
provides browser
only access)
These policies are applied to users and groups These policies are applied to SaaS apps
March 2024
The following table lists the new conditional access policy you must create in Microsoft
Entra ID.
ノ Expand table
All protection Use Conditional Access App This configures your IdP (Microsoft Entra
levels Control in Defender for Cloud ID) to work with Defender for Cloud Apps.
Protection Policy More information
level
Apps
This next table lists the example policies illustrated above that you can create to protect
all SaaS apps. Be sure to evaluate your own business, security, and compliance
objectives and then create policies that provide the most appropriate protection for
your environment.
ノ Expand table
Protection Policy
level
Enterprise Block download of files labeled with sensitive or classified from unmanaged
devices (this provides browser only access)
Specialized Block download of files labeled with classified from all devices (this provides
security browser only access)
For end-to-end instructions for setting up Conditional Access App Control, see Deploy
Conditional Access App Control for featured apps. This article walks you through the
process of creating the necessary conditional access policy in Microsoft Entra ID and
testing your SaaS apps.
For more information, see Protect apps with Microsoft Defender for Cloud Apps
Conditional Access App Control.
For example, you can protect your Box environment with these types of built-in anomaly
detection policy templates:
These are examples. Additional policy templates are added regularly. For examples of
how to apply additional protection to specific apps, see Protecting connected apps.
How Defender for Cloud Apps helps protect your Box environment demonstrates the
types of controls that can help you protect your business data in Box and other apps
with sensitive data.
The following illustration and table provide several examples of policies that can be
configured to help comply with the General Data Protection Regulation (GDPR). In these
examples, policies look for specific data. Based on the sensitivity of the data, each policy
is configured to take appropriate action.
Defender for Cloud Apps Conditional Access App Control policies
Protection — Data loss prevention policies
level
Alert when files containing Block downloads of files
this sensitive info type containing this sensitive info
“Credit Card Number” type:
Protect downloads of files Block downloads of files Alert when a file with one of
containing this sensitive info containing this sensitive info these labels is uploaded to
type: "Credit card number” type OneDrive for Business or Box:
Enterprise Customer data, Human
(Recommended for to managed devices “Credit card number”
Resources—Salary Data,
Zero Trust) to unmanaged devices Human Resources, Employee
data
ノ Expand table
Starting point Alert when files containing this sensitive information type ("Credit Card
Number") are shared outside the organization
Block downloads of files containing this sensitive information type ("Credit card
number") to unmanaged devices
Enterprise Protect downloads of files containing this sensitive information type ("Credit
card number") to managed devices
Block downloads of files containing this sensitive information type ("Credit card
number") to unmanaged devices
Alert when a file with on of these labels is uploaded to OneDrive for Business or
Box (Customer data, Human Resources: Salary Data, Human Resources,
Employee data)
Specialized Alert when files with this label ("Highly classified") are downloaded to managed
security devices
Protection Example policies
level
Next steps
For more information about using Defender for Cloud Apps, see Microsoft Defender for
Cloud Apps documentation.
Feedback
Was this page helpful? Yes No
Modern cloud services that use OAuth 2.0 for authentication traditionally rely on access
token expiration to revoke a user account's access. In practice, this means even if an
administrator revokes a user account's access, the user will still have access until the
access token expires, which for Microsoft 365 by default, used to be up to an hour after
the initial revocation event took place.
Continuous access evaluation for Microsoft 365 and Microsoft Entra ID proactively
terminates active user sessions and enforces tenant policy changes in near real time
instead of relying on access token expiration. Microsoft Entra ID notifies continuous
access evaluation-enabled Microsoft 365 services (such as SharePoint, Teams, and
Exchange) when the user account or tenant has changed in a way that requires
reevaluation of the user account's authentication state.
For a malicious insider who copies and exports a valid access token outside of your
organization, continuous access evaluation prevents usage of this token through
Microsoft Entra IP address location policy. With continuous access evaluation,
Microsoft Entra ID synchronizes policies down to supported Microsoft 365 services
so when an access token attempts to access the service from outside of the IP
address range in the policy, the service rejects the token.
Here are some examples of situations where continuous access evaluation improves
user access control security:
A user account's password has been compromised so an administrator invalidates
all existing sessions and resets their password from the Microsoft 365 admin
center. In near real time, all existing user sessions with Microsoft 365 services are
invalidated.
A user working on a document in Word takes their tablet to a public coffee shop
that is not in an administrator-defined and approved IP address range. At the
coffee shop, the user's access to the document is blocked immediately.
Continuous access evaluation will be included in all versions of Office 365 and Microsoft
365. Configuring Conditional Access policies requires Microsoft Entra ID P1, which is
included in all Microsoft 365 versions.
7 Note
The following Microsoft 365 services currently support continuous access evaluation by
listening to events from Microsoft Entra ID.
ノ Expand table
Critical events:
** Calls, meetings, and chat in Teams do not conform to IP-based Conditional Access
policies.
For more information about how to set up a Conditional Access policy, see this article.
The following clients support continuous access evaluation on web, Win32, iOS, Android,
and Mac:
Outlook
Teams
Office*
SharePoint
OneDrive
* Claim challenge is not supported on Office for web.
For clients that don't support continuous access evaluation, the access token lifetime to
Microsoft 365 remains as one hour by default.
See also
Continuous access evaluation
Conditional Access documentation
Microsoft Entra ID Protection documentation
Feedback
Was this page helpful? Yes No
Plan to enroll devices into Intune through Microsoft Entra join (including Microsoft
Entra hybrid join).
Plan to manually enroll devices into Intune.
Allow BYOD devices with plans to implement protection for apps and data and/or
enroll these devices to Intune.
On the other hand, if your environment includes plans for co-management including
Microsoft Configuration Manager, see Co-management documentation to develop the
best path for your organization. If your environment includes plans for Windows 365
Cloud PC, see Windows 365 Enterprise documentation to develop the best path for your
organization.
https://www.microsoft.com/en-us/videoplayer/embed/RE4Y4fC?postJsllMsg=true
Mostly driven by necessity as the world shifted to a remote or hybrid work model, users
are working from anywhere, from any device, more than anytime in history. Attackers
are quickly adjusting their tactics to take advantage of this change. Many organizations
face constrained resources as they navigate these new business challenges. Virtually
overnight, companies have accelerated digital transformation. Simply stated, the way
people work has changed. We no longer expect to access the myriad of corporate
resources only from the office and on company-owned devices.
Gaining visibility into the endpoints accessing your corporate resources is the first step
in your Zero Trust device strategy. Typically, companies are proactive in protecting PCs
from vulnerabilities and attack while mobile devices often go unmonitored and without
protections. To ensure you’re not exposing your data to risk, we need to monitor every
endpoint for risks and employ granular access controls to deliver the appropriate level
of access based on organizational policy. For example, if a personal device is jailbroken,
you can block access to ensure that enterprise applications aren't exposed to known
vulnerabilities.
This series of articles walks through a recommended process for managing devices that
access your resources. If you follow the recommended steps, your organization will
achieve very sophisticated protection for your devices and the resources they access.
The following diagram illustrates building blocks to achieve a Zero Trust security posture
for Microsoft 365 and other SaaS apps that you introduce to this environment. The
elements related to devices are numbered 1 through 7. Device admins will coordinate
with other administrators to accomplish these layers of protection.
SharePoint sites, 7
Microsoft 365
Teams, Power BI, Microsoft Defender
productivity apps:
Exchange for Cloud Apps
§ Word Endpoint devices:
§ Excel Windows & macOS (SaaS application
On-premises file
§ PowerPoint data classification
shares and
Protect and SharePoint Server
§ Outlook and protection)
govern
Pilot and deploy classification, labeling, information protection, and data loss prevention (DLP)
sensitive
data Create auto labeling rules Create DLP policies
Defend
Defender for Office Defender for Defender for Cloud
against threats Defender for Identity
365 Endpoint Apps
4 Configure Enterprise (recommended) Zero Trust identity and device access policies
Require healthy and compliant devices
Configure cloud identity: cloud only, hybrid with Password Hash Synchronization (PHS),
hybrid with Pass-Through Authentication (PTA), or federated
In this illustration:
ノ Expand table
1 Configure starting- Work with your identity administrator to Implement E3, E5, F1, F3,
point Zero Trust Level 2 App Protection Policies (APP) data F5
identity and device protection. These policies don't require that you
access policies manage devices. You configure the APP policies in
Intune. Your identity admin configures a Conditional
Access policy to require approved apps.
Step Description Licensing
requirements
2 Enroll devices to This task requires more planning and time to E3, E5, F1, F3,
Intune implement. Microsoft recommends using Intune to F5
enroll devices because this tool provides optimal
integration. There are several options for enrolling
devices, depending on the platform. For example,
Windows devices can be enrolled by using Microsoft
Entra join or by using Autopilot. You need to review
the options for each platform and decide which
enrollment option is best for your environment. See
Step 2. Enroll devices to Intune for more
information.
3 Configure You want to be sure devices that are accessing your E3, E5, F3, F5
compliance policies apps and data meet minimum requirements, for
example devices are password or pin-protected and
the operating system is up to date. Compliance
policies are the way to define the requirements that
devices must meet. Step 3. Set up compliance
policies helps you configure these policies.
4 Configure Enterprise Now that your devices are enrolled, you can work E3, E5, F3, F5
(recommended) Zero with your identity admin to tune Conditional Access
Trust identity and policies to require healthy and compliant devices.
device access
policies
5 Deploy configuration As opposed to device compliance policies that E3, E5, F3, F5
profiles simply mark a device as compliant or not based on
criteria you configure, configuration profiles actually
change the configuration of settings on a device.
You can use configuration policies to harden devices
against cyberthreats. See Step 5. Deploy
configuration profiles.
6 Monitor device risk In this step, you connect Intune to Microsoft E5, F5
and compliance with Defender for Endpoint. With this integration, you
security baselines can then monitor device risk as a condition for
access. Devices that are found to be in a risky state
are blocked. You can also monitor compliance with
security baselines. See Step 6. Monitor device risk
and compliance to security baselines.
7 Implement data loss If your organization has put the work into identifying E5, F5
prevention (DLP) sensitive data and labeling documents, you can work compliance
with information with your information protection admin to protect add-on
protection sensitive information and documents on your
capabilities devices.
Coordinating endpoint management with Zero
Trust identity and device access policies
This guidance is tightly coordinated with the recommended Zero Trust identity and
device access policies. You'll be working with your identity team to carry through
protection that you configure with Intune into Conditional Access policies in Microsoft
Entra ID.
Here’s an illustration of the recommended policy set with step callouts for the work
you'll do in Intune and the related Conditional Access policies you'll help coordinate in
Microsoft Entra ID.
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
In this illustration:
In Step 1, Implement Level 2 App Protection Policies (APP) you configure the
recommended level of data protection with APP policies. Then you work with your
identity team to configure the related Conditional Access rule to require use of this
protection.
In Steps 2, 3 and 4, you enroll devices into management with Intune, define device
compliance policies, and then coordinate with your identity team to configure the
related Conditional Access rule to only allow access to compliant devices.
1 Microsoft Intune
Organization devices
2
Microsoft Defender XDR
3
Microsoft 365 Compliance
In the illustration:
ノ Expand table
Enroll Onboard
Scope These device management tools Onboarding only affects the services that
manage the entire device, apply.
including configuring the device
to meet specific objectives, like
security.
Other methods Other methods of enrollment Other methods for onboarding devices
depend on the platform of the include, in recommended order:
device and whether it's BYOD or Configuration Manager
managed by your organization. Other mobile device management tool
(if the device is managed by one)
Local script
VDI configuration package for
onboarding non-persistent virtual desktop
infrastructure (VDI) devices
Group Policy
Learning for administrators
The following resources help administrators learn concepts about using Intune.
Learn about how the business management solutions through Microsoft 365
provide people with a secure, personalized desktop experience and help
organizations easily manage updates for all devices with a simplified admin
experience.
Microsoft Intune helps you protect the devices, apps, and data that the people at
your organization use to be productive. This article tells you how to set up
Microsoft Intune. Setup includes reviewing the supported configurations, signing
up for Intune, adding users and groups, assigning licenses to users, granting admin
permissions, and setting the Mobile Device Management (MDM) authority.
Next step
Go to Step 1. Implement App Protection Policies.
Feedback
Was this page helpful? Yes No
In this illustration:
With APP, Intune creates a wall between your organization data and personal data.
The app protection policies define which apps are allowed to access your data.
If a user signs in with their organization credentials, Intune applies a policy at the
app layer to prevent copy and paste of your organization data to personal apps
and to require PIN access to this data.
After creating an App Protection policy, you enforce data protection with a
Conditional Access policy.
This configuration greatly increases your security posture with almost no impact to the
user experience. Employees can use apps like Office and Microsoft Teams, that they
know and love, while at the same time your organization can protect the data contained
within the apps and devices.
If you have custom Line of Business applications that need protection, currently you can
use the app wrapping tool to enable APP with these applications. Or, you can integrate
using the Intune App SDK. When your app has app protection policies applied to it, it
can be managed by Intune and is recognized by Intune as a managed app.
For more information about protecting your Line of Business applications using Intune,
see Prepare apps for mobile application management with Microsoft Intune.
Configuring mobile app protection
This guidance is tightly coordinated with the recommended Zero Trust identity and
device access policies. After you create the Mobile App protection policies in Intune,
work with your identity team to configure the Conditional Access policies in Microsoft
Entra ID that enforce mobile app protection.
This illustration highlights the two policies (also described in the table following the
illustration).
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
To configure these policies, use the recommended guidance and settings prescribed in
Zero Trust identity and device access policies. The following table links directly to the
instructions for configuring these policies in Intune and Microsoft Entra ID.
ノ Expand table
Apply Application Protection One Intune App Protection policy per Microsoft 365
Policies (APP) data protection platform (Windows, iOS/iPadOS, Android). E3 or E5
Require approved apps and app Enforces mobile app protection for phones Microsoft 365
protection and tablets using iOS, iPadOS, or Android. E3 or E5
Next step
Go to Step 2. Enroll devices into management with Intune.
Feedback
Was this page helpful? Yes No
There are several ways to secure the endpoint, a term often used to refer to the
combined entity including devices, apps, and user identity. Security policies must be
enforced consistently and reliably not only on the apps but the device itself. Enrolling
the device to Intune and registering with a cloud identity provider, such as Microsoft
Entra ID, is a great start.
Whether a device is a personally owned Bring Your Own Device (BYOD) or a corporate-
owned and fully managed device, it's good to have visibility into the endpoints
accessing your organization’s resources to ensure you’re only allowing healthy and
compliant devices. This includes the health and trustworthiness of mobile and desktop
apps that run on endpoints. You want to ensure those apps are healthy and compliant
and that they prevent corporate data from leaking to consumer apps or services
through malicious intent or accidental means.
The device enrollment process establishes a relationship between the user, the device,
and the Microsoft Intune service. Using Microsoft Intune as a standalone service enables
you to use a single web-based administration console to manage Windows PCs, macOS,
and the most popular mobile device platforms.
This article recommends methods for enrolling devices to Intune. For more information
about these methods and how to deploy each one, see Deployment guidance: Enroll
devices in Microsoft Intune.
Use the guidance in this article together with this illustrated version of enrollment
options for each platform.
PDF | Visio
Updated June 2022
Windows enrollment
There are several options for enrolling Windows 10 and Windows 11 devices. The most
common methods include these two:
Microsoft Entra ID join: Joins the device with Microsoft Entra ID and enables users
to sign in to Windows with their Microsoft Entra credentials. If Auto Enrollment is
enabled, the device is automatically enrolled in Intune. The benefit of auto
enrollment is a single-step process for the user. Otherwise, they'll have to enroll
separately through MDM only enrollment and reenter their credentials. Users
enroll this way either during initial Windows OOBE or from Settings. The device is
marked as a corporate owned device in Intune.
Autopilot for existing devices enables you to easily deploy the latest version of
Windows to your existing devices.
For additional options, including enrolling BYOD Windows devices, see, Enroll Windows
devices in Microsoft Intune.
iOS and iPadOS enrollment
For user owned (BYOD) devices, you can let users enroll their personal devices with
Intune using one of the following methods.
Device enrollment is what you may think of as typical BYOD enrollment. It provides
admins with a wide range of management options.
User enrollment is a more streamlined enrollment process that provides admins
with a subset of device management options. This feature is currently in preview.
For organizations that buy devices for their users, Intune supports the following
iOS/iPadOS company-owned device enrollment methods:
For more information, see Enroll iOS and iPadOS devices in Microsoft Intune.
Android enrollment
There are several options for Android Enrollment depending on the type of device, the
type of enrollment you’d like to support, as well as things like the Android version you're
using or even the manufacturer (particularly Samsung). Most organizations use Android
Work profiles for their end users, particular in BYOD scenarios.
With an Android work profile, the end user’s information is separated distinctly with
data containers as well as separate apps for work and personal use. This is an ideal way
for users to enroll their device while still maintaining the privacy of their own data and
the security of corporate data.
However, if your organization is providing Android devices, you might choose to use
what is called a fully managed (User Affinity) or dedicated (no User Affinity) device.
To learn more about Android enrollment, see Enroll Android devices in Microsoft Intune.
macOS enrollment
Enrollment for macOS can be a tricky subject for lots of IT organizations. Unless a
majority of your users are Mac users, then you may not be managing these types of
devices to a great extent. If you have a small number of macOS users, we recommend
Intune Only Enrollment. If you have a large number of macOS users, we recommend
Intune + Jamf enrollment.
To learn more about macOS enrollment, see Enroll macOS devices in Microsoft Intune.
Next step
Go to Step 3. Set up compliance policies for devices with Intune.
Feedback
Was this page helpful? Yes No
Enrolling devices to Intune gives you the ability to achieve even greater security and
control of data in your environment. Step 2. Enroll devices to Intune details how to
accomplish this using Intune. This article covers the next step, which is to configure
device compliance policies.
You want to be sure devices that are accessing your apps and data meet minimum
requirements. For example, they’re password or pin-protected and the operating system
is up to date. Compliance policies are the way to define the requirements that devices
must meet. Intune uses these compliance policies to mark a device as compliant or non-
compliant. This binary status is passed to Microsoft Entra which can use this status in
Conditional Access rules to allow or prevent a device from accessing resources.
This illustration highlights where the work of defining compliance policies fits into the
overall Zero Trust recommended policy set.
Zero Trust identity and device access policies
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
In this illustration, defining device compliance policies is a dependency for achieving the
recommended level of protection within the Zero Trust framework.
To configure device compliance policies, use the recommended guidance and settings
prescribed in Zero Trust identity and device access policies. The following table links
directly to the instructions for configuring these policies in Intune, including the
recommended settings for each platform.
ノ Expand table
Define device compliance policies One policy for each platform Microsoft 365 E3 or E5
Next step
Go to Step 4. Require healthy and compliant devices with Intune.
Feedback
Was this page helpful? Yes No
After setting up device compliance policies and assigning these to user groups, Intune
lets Microsoft Entra ID know if a device is compliant or not. To use this status as a
condition for access, you must work with your Microsoft Entra administrator to create a
Conditional Access rule to require compliant PCs and mobile devices.
The recommended Zero Trust identity and device access rule set includes this rule. See
Require compliant PCs and mobile devices, as illustrated below.
Zero Trust identity and device access policies
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
Be sure to:
Coordinate the user groups you assigned to your compliance policies with the user
groups assigned to the Conditional Access policy.
Test out your Conditional Access policies using the What If and Audit Mode
capabilities before fully assigning the Conditional Access policy. This helps you
understand the results of the policy.
Set a grace period in line with the confidentiality of the data and/or app being
accessed.
Make sure your compliance policies don't interfere with any regulatory or other
compliance requirements.
Understand the device check-in intervals for compliance policies.
Avoid conflicts between compliance policies and configuration profiles.
Understand the outcomes if you choose to.
Note: If you want to start by requiring compliant PCs, but not mobile devices, see
Require compliant PCs (but not phones and tablets)
Next steps
Go to Step 5. Deploy device profiles in Microsoft Intune
Feedback
Was this page helpful? Yes No
Microsoft Intune includes settings and features you can enable or disable on different
devices within your organization. These settings and features are added to
"configuration profiles." You can create profiles for different devices and different
platforms, including iOS/iPadOS, Android device administrator, Android Enterprise, and
Windows. Then, use Intune to apply or "assign" the profile to the devices.
Configuration profiles give you the ability to configure important protection and to
bring devices into compliance so they can access your resources. Previously, these kinds
of configuration changes were configured by using Group Policy settings in Active
Directory Domain Services. A modern security strategy includes moving security controls
to the cloud where enforcement of these controls isn't dependent on on-premises
resources and access. Intune configuration profiles are the way to transition these
security controls to the cloud.
To give you an idea of the kind of configuration profiles you can create, see Apply
features and settings on your devices using device profiles in Microsoft Intune.
To deploy the Windows security baselines for Intune, available for Windows 10 and
Windows 11. See Use security baselines to configure Windows devices in Intune to learn
about the available baselines.
For now, just deploy the most appropriate MDM security baseline. See Manage security
baseline profiles in Microsoft Intuneto create the profile and choose the baseline
version.
Later, when Microsoft Defender for Endpoint is set up and you’ve connected Intune,
deploy the Defender for Endpoint baselines. This topic is covered in the next article in
this series: Step 6. Monitor device risk and compliance to security baselines.
It's important to understand that these security baselines aren't CIS or NIST compliant
but closely mirror their recommendations. For more information, see Are the Intune
security baselines CIS or NIST compliant?
The many settings you can configure by using configuration profiles can be grouped
into four categories, as illustrated below.
ノ Expand table
Category Description Examples
Device features Controls features on the device. This category Airprint, notifications, lock
only applies to iOS/iPadOS and macOS screen messages
devices.
Device Controls security, hardware, data sharing, and Require a PIN, data
restrictions more settings on the devices encryption
Custom Set custom configuration or execute custom Set OEM settings, execute
configuration actions PowerShell scripts
When customizing configuration profiles for your organization, use the following
guidance:
Additional resources
If you're not sure where to start with device profiles, the following can help:
Guided scenarios
Security baselines
If your environment includes on-prem GPOs, the following features are a good
transition to the cloud:
Next step
Go to Step 6. Monitor device risk and compliance to security baselines.
Feedback
Was this page helpful? Yes No
After your organization deploys Microsoft Defender for Endpoint, you can gain greater
insights and protection of your devices by integrating Microsoft Intune with Defender
for Endpoint. For mobile devices, this includes the ability to monitor device risk as a
condition for access. For Windows devices, you can monitor compliance of these devices
to security baselines.
Deploying Microsoft Defender for Endpoint includes onboarding endpoints. If you used
Intune to onboard endpoints (recommended), then you've connected Microsoft Intune
to Defender for Endpoint. If you used a different method to onboard endpoints to
Defender for Endpoint, see Configure Microsoft Defender for Endpoint in Intune to
ensure you set up the service-to-service connection between Intune and Microsoft
Defender for Endpoint.
In this article:
Microsoft Intune Microsoft Defender XDR
Monitor device risk
In this illustration:
For Android and iOS/iPadOS, threat signals can be used within your App Protection
Policies (APP). For more information, see Create and assign app protection policy to set
device risk level.
For all platforms, you can set the risk level in the existing device compliance policies. For
more information, see Create a Conditional Access policy.
The Step 5. Deploy configuration profiles article recommends getting started with
configuration profiles by using the security baselines, available for Windows 10 and
Windows 11. Microsoft Defender for Endpoint also includes security baselines that
provide settings that optimize all the security controls in the Defender for Endpoint
stack, including settings for endpoint detection and response (EDR). These are also
deployed by using Microsoft Intune.
Ideally, devices onboarded to Defender for Endpoint are deployed both baselines: the
Windows Intune security baseline to initially secure Windows and then the Defender for
Endpoint security baseline layered on top to optimally configure the Defender for
Endpoint security controls.
To benefit from the latest data on risks and threats and to minimize conflicts as
baselines evolve, always apply the latest versions of the baselines across all products as
soon as they're released.
Using Defender for Endpoint, you can monitor compliance for these baselines.
To deploy security baselines and monitor compliance for these settings, use the steps in
this table.
ノ Expand table
Step Description
1 Review key concepts and compare the Microsoft Defender for Endpoint and the Windows
Intune security baselines.
See Increase compliance to the Microsoft Defender for Endpoint security baseline to learn
recommendations.
See Use security baselines to configure Windows devices in Intune to review the list of
available security baselines and how to avoid conflicts.
2 Deploy Windows security baseline settings for Intune. If you haven't, see the guidance in
Step 5. Deploy configuration profiles.
3 Deploy Defender for Endpoint baseline settings for Intune. See Manage security baseline
profiles in Microsoft Intune to create the profile and choose the baseline version.
You can also follow the instructions here: Review and assign the Microsoft Defender for
Endpoint security baseline.
4 In Defender for Endpoint, review the Security baseline card on device configuration
management.
Next step
Go to Step 7. Implement DLP with information protection capabilities on endpoints.
Feedback
Was this page helpful? Yes No
If your organization has already put the time into understanding your data, developing a
data sensitivity schema, and applying the schema, you might be ready to extend
elements of this schema to endpoints by using Microsoft Purview Data Loss Prevention
(DLP) policies.
DLP policies are created by your information protection and governance team. Each DLP
policy defines what elements within a data set to look for, like sensitive information
types or labels, and how to protect this data.
For example, a DLP policy can look for personal data like a passport number. The DLP
policy includes a condition that triggers the policy to take action, such as when a
passport number is shared with people outside your organization. The action the policy
takes can be configured as well. Options range from simply reporting the action to
admins, warning users, or even preventing the data from being shared.
The DLP policy also specifies the location to apply the policy to, such as Exchange email
and SharePoint sites. One of the locations available to admins is devices. If devices are
selected, you can specify which users and user groups to apply the policy to. You can
also specify users and user groups to exclude from the policy.
If your information protection and governance team is ready to extend DLP policies to
endpoints, you need to coordinate with them to enable devices for Endpoint DLP, test
and tune DLP policies, train users, and monitor the results.
Use the following steps to work with your information protection team.
ノ Expand table
Step Description
2 Enable devices for Endpoint DLP. If you onboarded devices to Microsoft Defender for
Endpoint, your devices are already enabled for Endpoint DLP. If your devices aren't
onboarded to Defender for Endpoint, see Get started with Endpoint data loss prevention
for instructions.
3 Work with your information protection and governance team to define, test, and tune
policies. This includes monitoring the results. See these resources:
Next step
Go to Step 7. Implement data loss prevention (DLP) with information protection
capabilities.
Feedback
Was this page helpful? Yes No
Applies to:
If you're new to thinking about XDR security, you can scan the 7 linked articles in this
series to get a feel for how comprehensive the solution is.
For example, Microsoft XDR unifies endpoint (endpoint detection and response or EDR),
email, app, and identity security in one place.
Microsoft Defender XDR is an eXtended detection and response (XDR) solution that
automatically collects, correlates, and analyzes signal, threat, and alert data from across
your Microsoft 365 environment, including endpoint, email, applications, and identities. It
leverages artificial intelligence (AI) and automation to automatically stop attacks, and
remediate affected assets to a safe state.
Attack attempts:
Phishing mail User opens Malware is Attacker gets Attacker uses Attacker gets
a mail installed the user the identity to and exfiltrates
attachment identity move laterally sensitive data
Mitigated by:
Defender for Office 365 Defender for Defender for Defender for Cloud Apps
Endpoint Identity
In the illustration:
Exchange Online Protection, part of Microsoft Defender for Office 365, can detect
the phishing email and use mail flow rules (also known as transport rules) to make
certain it never arrives in the Inbox.
Defender for Office 365 uses Safe Attachments to test the attachment and
determine that it's harmful, so the mail that arrives either isn't actionable by the
user, or policies prevent the mail from arriving at all.
Defender for Endpoint manages devices that connect to the corporate network
and detect device and network vulnerabilities that might otherwise be exploited.
Defender for Identity takes note of sudden account changes like privilege
escalation, or high-risk lateral movement. It also reports on easily exploited identity
issues like unconstrained Kerberos delegation, for correction by the security team.
Microsoft Defender for Cloud Apps notices anomalous behavior like impossible-
travel, credential access, and unusual download, file share, or mail forwarding
activity and reports these to the security team.
ノ Expand table
Microsoft Microsoft Defender for Identity uses Active Directory signals What is
Defender for to identify, detect, and investigate advanced threats, Microsoft
Identity compromised identities, and malicious insider actions Defender for
directed at your organization. Identity?
Microsoft Microsoft Entra ID Protection evaluates risk data from billions What is Identity
Entra ID of sign-in attempts and uses this data to evaluate the risk of Protection?
Protection each sign-in to your environment. This data is used by
Microsoft Entra ID to allow or prevent account access,
depending on how Conditional Access policies are
configured. Microsoft Entra ID Protection is licensed
separately from Microsoft Defender XDR. It is included with
Microsoft Entra ID P2.
Shared signals
Exchange Online
Protection
Mail
Microsoft Entra ID
User
sign-ins
On-premises
integration
AD FS AD DS
Organization devices Cloud app traffic
In this illustration:
Microsoft Defender XDR combines the signals from all of the Defender
components to provide extended detection and response (XDR) across domains.
This includes a unified incident queue, automated response to stop attacks, self-
healing (for compromised devices, user identities, and mailboxes), cross-threat
hunting, and threat analytics.
Microsoft Defender for Office 365 safeguards your organization against malicious
threats posed by email messages, links (URLs), and collaboration tools. It shares
signals resulting from these activities with Microsoft Defender XDR. Exchange
Online Protection (EOP) is integrated to provide end-to-end protection for
incoming email and attachments.
Microsoft Defender for Identity gathers signals from servers running Active
Directory Federated Services (AD FS) and on-premises Active Directory Domain
Services (AD DS). It uses these signals to protect your hybrid identity environment,
including protecting against hackers that use compromised accounts to move
laterally across workstations in the on-premises environment.
Microsoft Defender for Endpoint gathers signals from and protects devices used by
your organization.
Microsoft Defender for Cloud Apps gathers signals from your organization's use of
cloud apps and protects data flowing between your environment and these apps,
including both sanctioned and unsanctioned cloud apps.
Microsoft Entra ID Protection evaluates risk data from billions of sign-in attempts
and uses this data to evaluate the risk of each sign-in to your environment. This
data is used by Microsoft Entra ID to allow or prevent account access, depending
on how Conditional Access policies are configured. Microsoft Entra ID Protection is
licensed separately from Microsoft Defender XDR. It is included with Microsoft
Entra ID P2.
Detailed signal data from all Microsoft Defender XDR components can be
integrated into Microsoft Sentinel and combined with other logging sources to
offer full SIEM and SOAR capabilities and insights.
For more reading on using Microsoft Sentinel, an Azure SIEM, with Microsoft
Defender XDR as an XDR, take a look at this Overview article and the Microsoft
Sentinel and Microsoft Defender XDR integration steps.
For more on SOAR in Microsoft Sentinel (including links to playbooks in the
Microsoft Sentinel GitHub Repository), please read this article.
ノ Expand table
1 Create the This step ensures you have the trial license for Microsoft
evaluation Defender XDR.
environment
2 Enable Defender for Review the architecture requirements, enable the evaluation,
Identity and walk through tutorials for identifying and remediating
different attack types.
3 Enable Defender for Ensure you meet the architecture requirements, enable the
Office 365 evaluation, and then create the pilot environment. This
component includes Exchange Online Protection and so you
will actually evaluate both here.
4 Enable Defender for Ensure you meet the architecture requirements, enable the
Endpoint evaluation, and then create the pilot environment.
5 Enable Microsoft Ensure you meet the architecture requirements, enable the
Defender for Cloud evaluation, and then create the pilot environment.
Apps
7 Promote the trial to Promote the Microsoft 365 components to production one-
production by-one.
This order is commonly recommended and designed to leverage the value of the
capabilities quickly based on how much effort is typically required to deploy and
configure the capabilities. For example, Defender for Office 365 can be configured in
less time than it takes to enroll devices in Defender for Endpoint. Of course, you should
prioritize the components to meet your business needs, and can enable these in a
different order.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
You can learn about and build out this Microsoft Defender XDR solution in steps that are
distributed through the rest of this series:
The steps in this series run end-to-end, from learning the concepts behind the Microsoft
Defender XDR to building it, and into taking the evaluation environment live to
production.
There are two common ways to do this next step in evaluation. This series assumes you
already have a production Microsoft 365 tenant and are activating Microsoft 365 E5 trial
licenses to evaluate Microsoft Defender XDR in the current environment. An in-place
evaluation will let you keep any security methods with the purchase of licenses after the
evaluation period.
The second is to Set up your Microsoft Defender XDR trial lab environment for
evaluation. It might not have many real signals from the business while in testing.
3. Scroll down to the Office 365 section and select Details button under Office 365 E5
license.
Go to the next step
Learn how to enable Microsoft 365 for Identity
Or return to the Overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
7 Note
This article is also part of the Microsoft Defender XDR XDR solution we talk about
in this Overview.
Before starting the process that enables and pilots Microsoft Defender for Identity, if
you intend to evaluate Microsoft Defender XDR as an eXtended Detection and Response
(XDR) solution, make sure you've reviewed the process from the beginning: evaluating
Microsoft Defender XDR including created the Microsoft Defender XDR evaluation
environment.
Use the steps below to enable and pilot Microsoft Defender for Identity.
ノ Expand table
2 Enable the evaluation Follow the steps to set up the evaluation environment.
environment
3 Set up the pilot Learn about benchmark settings for your identity
environment and try out Defender for Identity tutorials.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 1 of 3 in the process of setting up the evaluation environment for
Microsoft Defender for Identity. For more information about this process, see the
overview article.
Before enabling Microsoft Defender for Identity, be sure you understand the
architecture and can meet the requirements.
Microsoft Defender for Identity is fully integrated with Microsoft Defender XDR, and
leverages signals from both on-premises Active Directory and cloud identities to help
you better identify, detect, and investigate advanced threats directed at your
organization.
Deploy Microsoft Defender for Identity to help your SecOp teams deliver a modern
identity threat detection (ITDR) solution across hybrid environments, including:
Defender for Identity protects your on-premises Active Directory users and/or users
synced to your Microsoft Entra ID. To protect an environment made up of only Microsoft
Entra users, see Microsoft Entra ID Protection.
Shared signals
Microsoft Entra ID
User Account provisioning
sign-ins Authentication
Authorization
In this illustration:
Sensors installed on Active Directory Domain Services (AD DS) domain controllers
and Active Directory Certificate Services (AD CS) servers parse logs and network
traffic and send them to Microsoft Defender for Identity for analysis and reporting.
Sensors can also parse Active Directory Federation Services (AD FS) authentications
for third-party identity providers and when Microsoft Entra ID is configured to use
federated authentication (the dotted lines in the illustration).
Microsoft Defender for Identity shares signals to Microsoft Defender XDR for
extended detection and response (XDR).
Defender for Identity sensors can be directly installed on the following servers:
AD DS domain controllers
The sensor directly monitors domain controller traffic, without the need for a
dedicated server or the configuration of port mirroring.
AD CS servers
AD FS servers
For a deeper look into the architecture of Defender for Identity, see Microsoft Defender
for Identity architecture.
ノ Expand table
Security alerts Defender for Identity security alerts explain the Microsoft Defender
suspicious activities detected by sensors on your for Identity Security
network along with the actors and computers Alerts
involved in each threat.
Reports Defender for Identity reports allow you to schedule Microsoft Defender
or immediately generate and download reports that for Identity Reports
provide system and entity status information. You
Concept Description More information
Role groups Defender for Identity offers role-based groups and Microsoft Defender
delegated access to safeguard data according to for Identity role
your organization's specific security and compliance groups
needs which includes Administrators, Users and
Viewers.
Administrative In addition to the Microsoft Defender portal, the Working with the
portal Defender for Identity portal can be used to monitor Microsoft Defender
and respond to suspicious activity. for Identity portal
Microsoft Microsoft Defender for Cloud Apps integrates with Microsoft Defender
Defender for Microsoft Defender for Identity to provide user for Identity
Cloud Apps entity behavioral analytics (UEBA) across a hybrid integration
integration environment - both cloud app and on-premises
Review prerequisites
Defender for Identity requires some prerequisite work to ensure that your on-premises
identity and networking components meet minimum requirements. Use this article as a
checklist to ensure your environment is ready: Microsoft Defender for Identity
prerequisites.
Next steps
Step 2 of 3: Enable the evaluation environment Defender for Identity
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 2 of 2 in the process of setting up the evaluation environment for
Microsoft Defender for Identity. For more information about this process, see the
overview article.
Use the following steps to set up your Microsoft Defender for Identity environment.
ノ Expand table
1 Create the Defender for Identity instance Quickstart: Create your Microsoft
Defender for Identity instance
2 Connect the Defender for Identity instance to Quickstart: Connect to your Active
your Active Directory forest Directory Forest
Step 2: Install and configure the sensor
Next, download, install, and configure the Defender for Identity sensor on the domain
controllers and AD FS servers in your on-premises environment.
ノ Expand table
1 Determine how many Microsoft Defender Plan capacity for Microsoft Defender for
for Identity sensors you need. Identity
2 Download the sensor setup package Quickstart: Download the Microsoft Defender
for Identity sensor setup package
3 Install the Defender for Identity sensor Quickstart: Install the Microsoft Defender for
Identity sensor
ノ Expand table
2 Configure Internet proxy Configure endpoint proxy and Internet connectivity settings
settings for your Microsoft Defender for Identity Sensor
For instructions on how to do this, see Configure Microsoft Defender for Identity to
make remote calls to SAM.
Next steps
Step 3 of 3: Pilot Microsoft Defender for Identity
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 3 of 3 in the process of setting up the evaluation environment for
Microsoft Defender for Identity. For more information about this process, see the
overview article.
Use the following steps to set up and configure the pilot for Microsoft Defender for
identity. The recommendations don't include setting up a pilot group. The best practice
is to install the sensor on all of your servers running Active Directory Domain Services
(AD DS) and Active Directory Federated Services (AD FS).
Implementing these recommendations can take some time to plan and implement.
While these recommendations greatly increase the security of your identity
environment, they shouldn't prevent you from continuing to evaluate and implement
Microsoft Defender for Identity. These recommendations are provided here for your
awareness.
Reconnaissance alerts
Compromised credential alerts
Lateral movement alerts
Domain dominance alerts
Exfiltration alerts
Investigate a user
Investigate a computer
Investigate lateral movement paths
Investigate entities
Next steps
Evaluate Microsoft Defender for Office 365.
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Provide product feedback
Step 3. Enable and pilot Microsoft
Defender for Office 365
Article • 04/22/2024
Applies to:
This article outlines the process to enable and pilot Microsoft Defender for Office 365.
Before starting this process, be sure you've reviewed the overall process for evaluating
Microsoft Defender XDR, and you've created the Microsoft Defender XDR evaluation
environment.
Use the following steps to enable and pilot Microsoft Defender for Office 365.
ノ Expand table
2 Enable the evaluation Follow the steps to set up the evaluation environment.
environment
3 Set up the pilot Create pilot groups, configure protection, and become
familiar with key features and dashboards.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 1 of 3 in the process of setting up the evaluation environment for
Microsoft Defender for Office 365. For more information about this process, see the
overview article.
Before enabling Defender for Office 365, be sure you understand the architecture and
can meet the requirements. This article describes the architecture, key concepts, and the
prerequisites that your Exchange Online environment must meet.
Shared signals
7
Microsoft Defender for Office 365
Anti-Phishing
User impersonation
Domain impersonation
Safe Links
Safe Attachments
3 4
Internet Exchange Online
Exchange Online Microsoft Entra ID
1 Protection
2
Connection Filter Junk Mail Account
Provisioning
Anti-malware Mailbox Rules
Directory Edge
Policy Filter Message Encryption
External Blocking
Sender Anti-spam Rights Management
Anti-spoofing
Content Filter 5
SMTP Gateway
6
Exchange Active Directory Microsoft Entra
Connect
On-premises integration
Third-Party
ノ Expand table
Call- Description
out
1 The host server for the external sender typically performs a public DNS lookup for an MX
record, which provides the target server to relay the message. This referral can either be
Exchange Online (EXO) directly or an SMTP gateway configured to relay against EXO.
2 Exchange Online Protection negotiates and validates the inbound connection and
inspects the message headers and content to determine what extra policies, tagging, or
processing is required.
3 Exchange Online integrates with Microsoft Defender for Office 365 to offer more
advanced threat protection, mitigation, and remediation.
Call- Description
out
4 A message that isn't malicious, blocked, or quarantined is processed and delivered to the
recipient in EXO where user preferences related to junk mail, mailbox rules, or other
settings are evaluated and triggered.
5 Integration with on-premises Active Directory can be enabled using Microsoft Entra
Connect to synchronize and provision mail-enabled objects and accounts to Microsoft
Entra ID and ultimately Exchange Online.
7 Microsoft Defender for Office 365 shares signals to Microsoft Defender XDR for extended
detection and response (XDR).
ノ Expand table
Exchange Online Exchange Online Protection (EOP) is the cloud- Exchange Online
Protection based filtering service that helps protect your Protection overview
organization against spam and malware in email.
EOP is included in all Microsoft 365 licenses that
include Exchange Online.
Anti-phishing Defender for Office 365 offers more advanced Extra anti-phishing
protection anti-phishing protection related to spear protection in
phishing, whaling, ransomware, and other Microsoft Defender
malicious activities. for Office 365
Concept Description More information
Safe Attachments for In addition, Safe Attachments for SharePoint, Safe Attachments for
SharePoint, OneDrive, OneDrive, and Microsoft Teams offers an extra SharePoint, OneDrive,
and Microsoft Teams layer of protection for files that have been and Microsoft Teams
uploaded to cloud storage repositories.
Safe Links Safe Links is a feature that provides URL Safe Links in
scanning and rewriting within inbound email Microsoft Defender
messages and offers verification of those links for Office 365
before they're delivered or clicked.
For more detailed information about the capabilities included with Microsoft Defender
for Office 365, see Microsoft Defender for Office 365 service description.
) Important
SIEM integration
You can integrate Microsoft Defender for Office 365 with Microsoft Sentinel to more
comprehensively analyze security events across your organization and build playbooks
for effective and immediate response. For more information, see Connect alerts from
Microsoft Defender for Office 365.
Microsoft Defender for Office 365 can also be integrated into other Security Information
and Event Management (SIEM) solutions using the Office 365 Activity Management API.
Next steps
Step 2 of 3: Enable the evaluation environment Microsoft Defender for Office 365.
Return to the overview for Evaluate Microsoft Defender for Office 365.
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 2 of 3 in the process of setting up the evaluation environment for
Microsoft Defender for Office 365. For more information about this process, see the
overview article.
Use the following steps to enable the evaluation for Microsoft Defender for Office 365.
If the domain type is set to Authoritative, then it's assumed all recipient
mailboxes for your organization currently reside in Exchange Online.
If the domain type is set to InternalRelay, then you may still be in a hybrid
model where some recipient mailboxes still reside on-premises.
The From value is Partner org that might correlate to a third-party SMTP
gateway.
The From value is Your org that might indicate you're still in a hybrid
scenario.
For detailed information, see Try Microsoft Defender for Office 365.
1. In the Microsoft Defender portal at https://security.microsoft.com , expand Email
& collaboration > select Policies & rules > select Threat policies > scroll down to
the Others section, and then select Evaluation mode. Or, to go directly to the
Evaluation mode page, use https://security.microsoft.com/atpEvaluation .
3. In the Turn on protection dialog, select No, I only want reporting, and then click
Continue.
4. In the Select the users you want to include dialog, select All users, and then click
Continue.
5. In the Help us understand your mail flow dialog, one of the following options is
automatically selected based on our detection of the MX record for your domain:
I'm only using Microsoft Exchange Online: The MX records for your domain
point to Microsoft 365. There's nothing left to configure, so click Finish.
Return to the overview for Evaluate Microsoft Defender for Office 365
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 3 of 3 in the process of setting up the evaluation environment for
Microsoft Defender for Office 365. For more information about this process, see the
overview article.
Use the following steps to set up and configure the pilot for Microsoft Defender for
Office 365.
When you evaluate Microsoft Defender for Office 365, you might choose to pilot
specific users before enabling and enforcing policies for your entire organization.
Creating distribution groups can help manage the deployment processes. For example,
create groups such as Defender for Office 365 Users - Standard Protection, Defender for
Office 365 Users - Strict Protection, Defender for Office 365 Users - Custom Protection, or
Defender for Office 365 Users - Exceptions.
It might not be evident why 'Standard' and 'Strict' are the terms used for these groups,
but that will become clear when you explore more about Defender for Office 365
security presets. Naming groups 'custom' and 'exceptions' speak for themselves, and
though most of your users should fall under standard and strict, custom and exception
groups will collect valuable data for you regarding managing risk.
5. Give the group a Name and optional Description, and then click Next.
6. On the remaining pages, assign an owner, add members to the group, set the
email address, join-depart restrictions, and other settings.
Some capabilities are not yet configured. You have the following options for configuring
protection (which are easy to change later):
Assign users to preset security policies: Preset security policies are the
recommended method to quickly assign a uniform level of protection across all of
the capabilities. You can choose from Standard or Strict protection. The settings
for Standard and Strict are described in the tables here. The differences between
Standard and Strict are summarized in the table here.
The advantages of preset security polices are you protect groups of users as
quickly as possible using Microsoft's recommended settings based on observations
in the datacenters. As new protection capabilities are added and as the security
landscape changes, the settings in preset security policies are automatically
updated to our recommended settings.
The disadvantage of preset security policies is you can't customize virtually any of
the security settings in preset security policies (for example, you can't change an
action from deliver to junk to quarantine, or vice-versa). The exception is entries
and optional exceptions for user impersonation and domain impersonation
protection, which you must configure manually.
Also, keep in mind that preset security policies are always applied before custom
policies. So, if you want to create and use any custom policies, you'll need to
exclude users in those custom policies from preset security policies.
You can also use the Configuration analyzer to compare the settings in your
custom policies to the Standard and Strict values.
For detailed information about choosing preset security policies vs. custom policies, see
Determine your protection policy strategy.
For example, an EOP condition for pilot evaluations could be applied if the recipients are
members of a defined EOP Standard Protection group, and then managed by adding
accounts to, or removing account from, the group.
Likewise, a Defender for Office 365 condition for pilot evaluations could be applied if the
recipients are members of a defined Defender for Office 365 Standard Protection group
and then managed by adding / removing accounts via the group.
For complete instructions, see Use the Microsoft Defender portal to assign Standard and
Strict preset security policies to users.
It's important to be aware of the precedence these protection policies take when
applied and enforced, as explained in Order of precedence for preset security policies
and other policies.
The explanation and table in Configure protection policies provides a handy reference
for what you need to configure.
ノ Expand table
Threat Threat Explorer is a powerful near real-time tool to help About Threat
Explorer Security Operations teams investigate and respond to Explorer
threats and displays information about detected malware
and phishing in email and files in Office 365, as well as
other security threats and risks to your organization.
Capability Description More information
Attack You can use Attack simulation training in the Microsoft Get started using
simulation Defender portal to run realistic attack scenarios in your Attack simulation
training organization, which help you identify and find vulnerable training
users before a real attack impacts your environment.
Reports On the left navigation menu, click Reports and expand the View email security
dashboard Email & collaboration heading. The Email & collaboration reports in the
reports are about spotting security trends some of which Microsoft Defender
will allow you to take action (through buttons like 'Go to portal
submissions'), and others that will show trends. These
metrics are generated automatically. View Defender for
Office 365 reports in
the Microsoft
Defender portal
Next steps
Evaluate Microsoft Defender for Endpoint
Return to the overview for Evaluate Microsoft Defender for Office 365
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article outlines the process to enable and pilot Microsoft Defender for Endpoint.
Before starting this process, be sure you've reviewed the overall process for evaluating
Microsoft Defender XDR, and you've created the Microsoft Defender XDR evaluation
environment.
Use the following steps to enable and pilot Microsoft Defender for Endpoint.
ノ Expand table
Step Description
Step 1. Review architecture Understand the Defender for Endpoint architecture and
requirements and key concepts the capabilities available to you.
Step 2. Enable the evaluation Follow the steps to set up the evaluation environment.
environment
Step 3. Set up the pilot Verify your pilot group, run simulations, and become
familiar with key features and dashboards.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
This article will guide you in the process of setting up the evaluation for Microsoft
Defender for Endpoint environment.
For more information about this process, see the overview article.
Before enabling Microsoft Defender for Endpoint, be sure you understand the
architecture and can meet the requirements.
Shared signals
1 2 4
ノ Expand table
Call- Description
out
2 On-boarded devices provide and respond to Microsoft Defender for Endpoint signal
data.
5 Microsoft Defender for Endpoint alerts, investigations, and responses are managed in
Microsoft Defender XDR.
ノ Expand table
Administration Microsoft Defender portal to monitor and assist Microsoft Defender for
Portal in responding to alerts of potential advanced Endpoint portal
persistent threat activity or data breaches. overview
Attack Surface Help reduce your attack surfaces by minimizing Overview of attack
Reduction the places where your organization is vulnerable surface reduction
to cyberthreats and attacks.
Behavioral Blocking Behavioral blocking and containment capabilities Behavioral blocking and
and Containment can help identify and stop threats, based on their containment
behaviors and process trees even when the
threat has started execution.
Threat Analytics Threat analytics is a set of reports from expert Track and respond to
Microsoft security researchers covering the most emerging threats
Concept Description More information
relevant threats.
For more detailed information about the capabilities included with Microsoft Defender
for Endpoint, see What is Microsoft Defender for Endpoint.
SIEM integration
You can integrate Microsoft Defender for Endpoint with Microsoft Sentinel to more
comprehensively analyze security events across your organization and build playbooks
for effective and immediate response.
Microsoft Defender for Endpoint can also be integrated into other Security Information
and Event Management (SIEM) solutions. For more information, see Enable SIEM
integration in Microsoft Defender for Endpoint.
Next steps
Enable the evaluation
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
This article will guide you through the steps on setting up the evaluation environment
for Microsoft Defender for Endpoint using production devices.
Tip
Microsoft Defender for Endpoint also comes with an in-product evaluation lab
where you can add pre-configured devices and run simulations to evaluate the
capabilities of the platform. The lab comes with a simplified set-up experience that
can help quickly demonstrate the value of Microsoft Defender for Endpoint
including guidance for many features like advanced hunting and threat analytics.
For more information, see Evaluate capabilities.
The main difference between the guidance provided in this article and the
evaluation lab is the evaluation environment uses production devices whereas the
evaluation lab uses non-production devices.
Use the following steps to enable the evaluation for Microsoft Defender for Endpoint.
1. To view your licenses, go to the Microsoft Azure portal and navigate to the
Microsoft Azure portal license section .
On the screen, you'll see all the provisioned licenses and their current Status.
You can choose to use any of the supported management tools, but Intune provides
optimal integration. For more information, see Configure Microsoft Defender for
Endpoint in Microsoft Intune.
The Plan deployment topic outlines the general steps you need to take to deploy
Defender for Endpoint.
Watch this video for a quick overview of the onboarding process and learn about the
available tools and methods.
https://www.microsoft.com/en-us/videoplayer/embed/RE4bGqr?postJsllMsg=true
ノ Expand table
iOS App-based
Next step
Setup the pilot for Microsoft Defender for Endpoint
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful?
Yes No
This article will guide you in the process of running a pilot for Microsoft Defender for
Endpoint.
Use the following steps to setup and configure the pilot for Microsoft Defender for
Endpoint.
When you pilot Microsoft Defender for Endpoint, you may choose to onboard a few
devices to the service before onboarding your entire organization.
You can then try out capabilities that are available such as running attack simulations
and seeing how Defender for Endpoint surfaces malicious activities and enables you to
conduct an efficient response.
When you see your onboarded devices you can then proceed with trying out
capabilities.
Run a simulation
Microsoft Defender for Endpoint comes with "Do It Yourself" attack scenarios that you
can run on your pilot devices. Each document includes OS and application requirements
as well as detailed instructions that are specific to an attack scenario. These scripts are
safe, documented, and easy to use. These scenarios will reflect Defender for Endpoint
capabilities and walk you through investigation experience.
To run any of the provided simulations, you need at least one onboarded device.
1. In Help > Simulations & tutorials, select which of the available attack scenarios
you would like to simulate:
2. Download and read the corresponding walkthrough document provided with your
selected scenario.
3. Download the simulation file or copy the simulation script by navigating to Help >
Simulations & tutorials. You can choose to download the file or script on the test
device but it's not mandatory.
4. Run the simulation file or script on the test device as instructed in the walkthrough
document.
7 Note
Simulation files or scripts mimic attack activity but are actually benign and will not
harm or compromise the test device.
Next steps
Evaluate Microsoft Defender for Cloud Apps
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article outlines the process to enable and pilot Microsoft Defender for Cloud Apps
alongside Microsoft Defender XDR. Before starting this process, be sure you've reviewed
the overall process for evaluating Microsoft Defender XDR and you have created the
Microsoft Defender XDR evaluation environment.
Use the following steps to enable and pilot Microsoft Defender for Cloud Apps.
ノ Expand table
Step Description
Review architecture Understand the Defender for Cloud Apps architecture and how it
requirements and key integrates with Microsoft Defender XDR, Microsoft Defender for
concepts Endpoint, and Microsoft Entra ID.
Enable the evaluation Connect to the portal, configure integration with Defender for
environment Identity and/or your organization's network devices, and begin to
view and manage cloud apps.
Set up the pilot Scope your deployment to certain user groups, configure
Conditional Access App Control, and try out tutorials for protecting
your environment.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 1 of 3 in the process of setting up the evaluation environment for
Microsoft Defender for Cloud Apps alongside Microsoft Defender XDR. For more
information about this process, see the overview article.
Before enabling Microsoft Defender for Cloud Apps, be sure you understand the
architecture and can meet the requirements.
Without Defender for Cloud Apps, cloud apps that are used by your organization are
unmanaged and unprotected, as illustrated.
Cloud app traffic
In the illustration:
Shared signals
Cloud discovery
Firewalls Proxies
Cloud app traffic
On-premises integration
In this illustration, there are two methods that can be used to monitor network traffic
and discover cloud apps that are being used by your organization.
A. Cloud App Discovery integrates with Microsoft Defender for Endpoint natively.
Defender for Endpoint reports cloud apps and services being accessed from IT-
managed Windows 10 and Windows 11 devices.
B. For coverage on all devices connected to a network, the Defender for Cloud
Apps log collector is installed on firewalls and other proxies to collect data from
endpoints. This data is sent to Defender for Cloud Apps for analysis.
App connectors
Connected app
In this illustration:
Some apps are sanctioned for use. This sanction is a simple way of beginning to
manage apps.
You can enable greater visibility and control by connecting apps with app
connectors. App connectors use the APIs of app providers.
Cloud app traffic
In this illustration:
Access to sanctioned cloud apps from users and devices in your organization is
routed through Defender for Cloud Apps.
This proxy access allows session controls to be applied.
Cloud apps that you have not sanctioned or explicitly unsanctioned are not
affected.
Session controls allow you to apply parameters to how cloud apps are used by your
organization. For example, if your organization is using Salesforce, you can configure a
session policy that allows only managed devices to access your organization's data at
Salesforce. A simpler example could be configuring a policy to monitor traffic from
unmanaged devices so you can analyze the risk of this traffic before applying stricter
policies.
Proxy access
Others session controls
Conditional
Access App
Microsoft Control
Entra
Cloud app traffic
In this illustration:
SaaS apps are integrated with the Microsoft Entra tenant. This integration allows
Microsoft Entra ID to enforce conditional access policies, including multi-factor
authentication.
A policy is added to Microsoft Entra ID to direct traffic for SaaS apps to Defender
for Cloud Apps. The policy specifies which SaaS apps to apply this policy to.
Therefore, after Microsoft Entra ID enforces any conditional access policies that
apply to these SaaS apps, Microsoft Entra ID then directs (proxies) the session
traffic through Defender for Cloud Apps.
Defender for Cloud Apps monitors this traffic and applies any session control
policies that have been configured by administrators.
You might have discovered and sanctioned cloud apps using Defender for Cloud Apps
that have not been added to Microsoft Entra ID. You can take advantage of Conditional
Access App Control by adding these cloud apps to your Microsoft Entra tenant and the
scope of your conditional access rules.
It's worth repeating this illustration from the overview to this Microsoft Defender XDR
evaluation and pilot guide.
Attack attempts:
Phishing mail User opens Malware is Attacker gets Attacker uses Attacker gets
a mail installed the user the identity to and exfiltrates
attachment identity move laterally sensitive data
Mitigated by:
Defender for Office 365 Defender for Defender for Defender for Cloud Apps
Endpoint Identity
Focusing on the right side of this illustration, Microsoft Defender for Cloud Apps notices
anomalous behavior like impossible-travel, credential access, and unusual download, file
share, or mail forwarding activity and reports these behaviors to the security team.
Therefore, Defender for Cloud Apps helps prevent lateral movement by hackers and
exfiltration of sensitive data. Microsoft 356 Defender for Cloud correlates the signals
from all the components to provide the full attack story.
Defender for Presents an overview of the most important Working with the
Cloud Apps information about your organization and gives dashboard
Dashboard links to deeper investigation.
Conditional Reverse proxy architecture that integrates with Protect apps with
Access App your Identity Provider (IdP) to give Microsoft Entra Microsoft Defender for
Control Conditional Access policies and selectively enforce Cloud Apps Conditional
session controls. Access App Control
Cloud App The Cloud App Catalog gives you a full picture Working with App risk
Catalog against Microsoft catalog of over 16,000 cloud scores
apps that are ranked and scored based on more
than 80 risk factors.
Cloud Discovery Cloud Discovery analyzes your traffic logs and is Working with discovered
Dashboard designed to give more insight into how cloud apps
apps are being used in your organization as well
as give alerts and risk levels.
Get up and running quickly with Cloud Discovery by integrating with Microsoft
Defender for Endpoint. This native integration enables you to immediately start
collecting data on cloud traffic across your Windows 11 and Windows 10 devices,
on and off your network.
To discover all cloud apps accessed by all devices connected to your network,
deploy the Defender for Cloud Apps log collector on your firewalls and other
proxies. This deployment helps collect data from your endpoints and sends it to
Defender for Cloud Apps for analysis. Defender for Cloud Apps natively integrates
with some third-party proxies for even more capabilities.
These options are included in Step 2. Enable the evaluation environment.
SIEM integration
You can integrate Microsoft Defender for Cloud Apps with your generic SIEM server or
with Microsoft Sentinel to enable centralized monitoring of alerts and activities from
connected apps.
Additionally, Microsoft Sentinel includes a Microsoft Defender for Cloud Apps connector
to provide deeper integration with Microsoft Sentinel. This arrangement enables you to
not only gain visibility into your cloud apps but to also get sophisticated analytics to
identify and combat cyberthreats and to control how your data travels.
Next steps
Step 2 of 3: Enable the evaluation environment for Microsoft Defender for Cloud Apps
Return to the overview for Evaluate Microsoft Defender for Cloud Apps
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article is Step 2 of 2 in the process of setting up the evaluation environment for
Microsoft Defender for Cloud Apps. For more information about this process, see the
overview article.
This article walks you through the process of accessing the Defender for Cloud Apps
portal and configuring the necessary integration to collect cloud app traffic data.
To discover cloud apps used in your environment, you can implement one or both of the
following methods:
Get up and running quickly with Cloud Discovery by integrating with Microsoft
Defender for Endpoint. This native integration enables you to immediately start
collecting data on cloud traffic across your Windows 10 and Windows 11 devices,
on and off your network.
To discover all cloud apps accessed by all devices connected to your network,
deploy the Defender for Cloud Apps log collector on your firewalls and other
proxies. This deployment helps collect data from your endpoints and sends it to
Defender for Cloud Apps for analysis. Defender for Cloud Apps natively integrates
with some third-party proxies for even more capabilities.
Use the following steps to set up Microsoft Defender for Cloud Apps.
If you're not immediately able to connect to the portal, you might need to add the IP
address to the allowlist of your firewall. See Basic setup for Defender for Cloud Apps.
If you've already set up Microsoft Defender for Endpoint, configuring integration with
Defender for Cloud Apps is a toggle in Microsoft Defender XDR. After integration is
turned on, you can return to the Defender for Cloud Apps portal and view rich data in
the Cloud Discovery Dashboard.
To accomplish these tasks, see Microsoft Defender for Endpoint integration with
Microsoft Defender for Cloud Apps.
Zscaler
iboss
Corrata
Menlo Security
For more information on integrating with these network devices, see Set up Cloud
Discovery.
To get started using the Cloud Discovery dashboard, see Working with discovered apps.
Next steps
Step 3 of 3: Pilot Microsoft Defender for Cloud Apps
Return to the overview for Evaluate Microsoft Defender for Cloud Apps
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Provide product feedback
Pilot Microsoft Defender for Cloud Apps
with Microsoft Defender XDR
Article • 04/25/2024
Applies to:
This article is Step 3 of 3 in the process of setting up the evaluation environment for
Microsoft Defender for Cloud Apps. For more information about this process, see the
overview article.
Use the following steps to set up and configure the pilot for Microsoft Defender for
Cloud Apps.
Step 1. Create the pilot group—Scope your pilot deployment to certain user
groups
Step 2. Configure protection—Conditional Access App Control
Step 3. Try out capabilities—Walk through tutorials for protecting your
environment
The first step in using Microsoft Defender for Cloud Apps to manage SaaS apps is to
discover these apps and then add them to your Microsoft Entra tenant. If you need help
with discovery, see Discover and manage SaaS apps in your network. After you've
discovered apps, add these apps to your Microsoft Entra tenant.
You can begin to manage these apps by executing the following tasks:
First, in Microsoft Entra ID, create a new conditional access policy and configure it
to "Use Conditional Access App Control." This configuration helps to redirect the
request to Defender for Cloud Apps. You can create one policy and add all SaaS
apps to this policy.
Next, in Defender for Cloud Apps, create session policies. Create one policy for
each control you want to apply.
For more information, including supported apps and clients, see Protect apps with
Microsoft Defender for Cloud Apps Conditional Access App Control.
For example policies, see Recommended Microsoft Defender for Cloud Apps policies for
SaaS apps. These policies build on a set of common identity and device access policies
that are recommended as a starting point for all customers.
For more information on advanced hunting in Microsoft Defender for Cloud Apps data,
see the video .
Next steps
Investigate and respond using Microsoft Defender XDR in a pilot environment
Return to the overview for Evaluate Microsoft Defender for Cloud Apps
Return to the overview for Evaluate and pilot Microsoft Defender XDR
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
This article outlines the process to create incidents with attack simulations and tutorials
and use Microsoft Defender XDR to investigate and respond. Before starting this
process, be sure you've reviewed the overall process for evaluating Microsoft Defender
XDR and you have created the Microsoft Defender XDR evaluation environment.
ノ Expand table
Step Description
1. Simulate attacks Simulate attacks on your evaluation environment and use the
Microsoft Defender portal to perform incident response.
2. Try incident response Try additional incident response features and capabilities in Microsoft
capabilities Defender XDR.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
After preparing your pilot environment, it's time to test Microsoft Defender XDR's
incident response and automated investigation and remediation capabilities by creating
an incident with a simulated attack and using the Microsoft Defender portal to
investigate and respond.
Microsoft 365 services and apps create alerts when they detect a suspicious or malicious
event or activity. Individual alerts provide valuable clues about a completed or ongoing
attack. However, attacks typically employ various techniques against different types of
entities, such as devices, users, and mailboxes. The result is multiple alerts for multiple
entities in your tenant.
7 Note
If you are brand new to security analysis and incident response, see the Respond to
your first incident walkthrough to get a guided tour of a typical process of
analysis, remediation, and post-incident review.
Attack simulation training for Microsoft Defender XDR for Office 365 at
https://security.microsoft.com/attacksimulator .
In the Microsoft Defender portal, select Email & collaboration > Attack simulation
training.
Attack tutorials & simulations for Microsoft Defender XDR for Endpoint at
https://security.microsoft.com/tutorials/simulations .
In the Microsoft Defender portal , select Endpoints > Tutorials & simulations.
1. Create a simulation
For step by step instructions on how to create and launch a new simulation, see
Simulate a phishing attack.
2. Create a payload
For step by step instructions on how to create a payload for use within a
simulation, see Create a custom payload for attack simulation training.
3. Gaining insights
For step by step instructions on how to gain insights with reporting, see Gain
insights through attack simulation training.
https://www.microsoft.com/en-us/videoplayer/embed/RWMhvB?postJsllMsg=true
There are additional simulations from third-party sources. There are also a set of
tutorials.
2. Download the simulation file. You can choose to download the file or script on the
test device but it's not mandatory.
3. Run the simulation file or script on the test device as instructed in the walk-
through document.
For more information, see Experience Microsoft Defender for Endpoint through
simulated attack.
1. Verify your pilot environment tenant has enabled Microsoft Defender XDR.
If you use tenant and device groups, create a dedicated device group for the test device
and push it to top level.
One alternative is to host your AD DS domain controller and test device as virtual
machines in Microsoft Azure infrastructure services. You can use the instructions in
Phase 1 of the simulated enterprise Test Lab Guide, but skip the creation of the APP1
virtual machine.
You'll simulate a sophisticated attack that leverages advanced techniques to hide from
detection. The attack enumerates opened Server Message Block (SMB) sessions on
domain controllers and retrieves recent IP addresses of users' devices. This category of
attacks usually doesn't include files dropped on the victim's device and they occur solely
in memory. They "live off the land" by using existing system and administrative tools
and inject their code into system processes to hide their execution. Such behavior allows
them to evade detection and persist on the device.
In this simulation, our sample scenario starts with a PowerShell script. In the real world, a
user might be tricked into running a script or the script might run from a remote
connection to another computer from a previously infected device, which indicates that
the attacker is attempting to move laterally in the network. Detection of these scripts
can be difficult because administrators also often run scripts remotely to carry out
various administrative activities.
During the simulation, the attack injects shellcode into a seemingly innocent process.
The scenario requires the use of notepad.exe. We chose this process for the simulation,
but attackers would more likely target a long-running system process, such as
svchost.exe. The shellcode then goes on to contact the attacker's command-and-control
(C2) server to receive instructions on how to proceed. The script attempts executing
reconnaissance queries against the domain controller (DC). Reconnaissance allows an
attacker to get information about recent user login information. Once attackers have
this information, they can move laterally in the network to get to a specific sensitive
account
) Important
For optimum results, follow the attack simulation instructions as closely as possible.
1. Ensure that your pilot environment includes the isolated AD DS domain controller
and Windows device.
PowerShell
[Net.ServicePointManager]::SecurityProtocol =
[Net.SecurityProtocolType]::Tls12
;$xor = [System.Text.Encoding]::UTF8.GetBytes('WinATP-Intro-
Injection');
$base64String = (Invoke-WebRequest -URI
"https://wcdstaticfilesprdeus.blob.core.windows.net/wcdstaticfiles/MTP_
Fileless_Recon.txt" -UseBasicParsing).Content;Try{ $contentBytes =
[System.Convert]::FromBase64String($base64String) } Catch {
$contentBytes =
[System.Convert]::FromBase64String($base64String.Substring(3)) };$i =
0;
$decryptedBytes = @();$contentBytes.foreach{ $decryptedBytes += $_ -
bxor $xor[$i];
$i++; if ($i -eq $xor.Length) {$i = 0} };Invoke-Expression
([System.Text.Encoding]::UTF8.GetString($decryptedBytes))
7 Note
If you open this article on a web browser, you might encounter problems
copying the full text without losing certain characters or introducing extra line
breaks. If this is the case, download this document and open it on Adobe
Reader.
7 Note
If you're running PowerShell using remote desktop protocol (RDP), use the Type
Clipboard Text command in the RDP client because the CTRL-V hotkey or right-
click-paste method might not work. Recent versions of PowerShell sometimes will
also not accept that method, you might have to copy to Notepad in memory first,
copy it in the virtual machine, and then paste it into PowerShell.
A few seconds later, the Notepad app will open. A simulated attack code will be injected
into Notepad. Keep the automatically generated Notepad instance open to experience
the full scenario.
You'll see this message displayed on the PowerShell console when this script completes:
Console
ran NetSessionEnum against [DC Name] with return code result 0
To see the Automated Incident and Response feature in action, keep the notepad.exe
process open. You'll see Automated Incident and Response stop the Notepad process.
7 Note
Before we walk you through this simulation, watch the following video to see how
incident management helps you piece the related alerts together as part of the
investigation process, where you can find it in the portal, and how it can help you in
your security operations:
https://www.microsoft.com/en-us/videoplayer/embed/RE4Bzwz?postJsllMsg=true
Switching to the SOC analyst point of view, you can now start to investigate the attack in
the Microsoft Defender portal.
2. From the navigation pane, select Incidents & Alerts > Incidents.
3. The new incident for the simulated attack will appear in the incident queue.
The alerts generated during this simulation are associated with the same threat, and as a
result, are automatically aggregated as a single incident.
2. From the navigation pane, select Incidents & Alerts > Incidents.
3. Select the newest item by clicking on the circle located left of the incident name. A
side panel displays additional information about the incident, including all the
related alerts. Each incident has a unique name that describes it based on the
attributes of the alerts it includes.
The alerts that are shown in the dashboard can be filtered based on service
resources: Microsoft Defender for Identity, Microsoft Defender for Cloud Apps,
Microsoft Defender for Endpoint, Microsoft Defender XDR, and Microsoft Defender
for Office 365.
4. Select Open incident page to get more information about the incident.
In the Incident page, you can see all the alerts and information related to the
incident. The information includes the entities and assets that are involved in the
alert, the detection source of the alerts (such as Microsoft Defender for Identity or
Microsoft Defender for Endpoint), and the reason they were linked together.
Reviewing the incident alert list shows the progression of the attack. From this
view, you can see and investigate the individual alerts.
You can also click Manage incident from the right-hand menu, to tag the incident,
assign it to yourself, and add comments.
Let's look at some of the alerts generated during the simulated attack.
7 Note
We'll walk through only a few of the alerts generated during the simulated attack.
Depending on the version of Windows and the Microsoft Defender XDR products
running on your test device, you might see more alerts that appear in a slightly
different order.
Alert: Suspicious process injection observed (Source: Microsoft
Defender for Endpoint)
Advanced attackers use sophisticated and stealthy methods to persist in memory and
hide from detection tools. One common technique is to operate from within a trusted
system process rather than a malicious executable, making it hard for detection tools
and security operations to spot the malicious code.
To allow the SOC analysts to catch these advanced attacks, deep memory sensors in
Microsoft Defender for Endpoint provide our cloud service with unprecedented visibility
into a variety of cross-process code injection techniques. The following figure shows
how Defender for Endpoint detected and alerted on the attempt to inject code to
notepad.exe.
Microsoft Defender for Endpoint detections often target the most common attribute of
an attack technique. This method ensures durability and raises the bar for attackers to
switch to newer tactics.
7 Note
Because this alert is based on machine learning models that require additional
backend processing, it might take some time before you see this alert in the portal.
Notice that the alert details include the external IP address—an indicator that you can
use as a pivot to expand investigation.
Select the IP address in the alert process tree to view the IP address details page.
The following figure displays the selected IP Address details page (clicking on IP address
in the Alert process tree).
Alert: User and IP address reconnaissance (SMB) (Source:
Microsoft Defender for Identity)
Enumeration using Server Message Block (SMB) protocol enables attackers to get recent
user logon information that helps them move laterally through the network to access a
specific sensitive account.
In this detection, an alert is triggered when the SMB session enumeration runs against a
domain controller.
Select the name of the device where the attack was conducted, to open the entity page
for that specific device. In that page, you can see alerts that were triggered and related
events.
Select the Timeline tab to open the device timeline and view all events and behaviors
observed on the device in chronological order, interspersed with the alerts raised.
Expanding some of the more interesting behaviors provides useful details, such as
process trees.
For example, scroll down until you find the alert event Suspicious process injection
observed. Select the powershell.exe injected to notepad.exe process event below it, to
display the full process tree for this behavior under the Event entities graph on the side
pane. Use the search bar for filtering if necessary.
Select the user name to open the user's profile page where further investigation can be
conducted. Read more about investigating risky users.
7 Note
Before we walk you through this simulation, watch the following video to get
familiar with what automated self-healing is, where to find it in the portal, and how
it can help in your security operations:
https://www.microsoft.com/en-us/videoplayer/embed/RE4BzwB?postJsllMsg=true
Navigate back to the incident in the Microsoft Defender portal. The Investigations tab in
the Incident page shows the automated investigations that were triggered by Microsoft
Defender for Identity and Microsoft Defender for Endpoint. The screenshot below
displays only the automated investigation triggered by Defender for Endpoint. By
default, Defender for Endpoint automatically remediates the artifacts found in the
queue, which requires remediation.
Select the alert that triggered an investigation to open the Investigation details page.
You'll see the following details:
7 Note
During the automated investigation, Microsoft Defender for Endpoint identified the
notepad.exe process, which was injected as one of the artifacts requiring remediation.
Defender for Endpoint automatically stops the suspicious process injection as part of the
automated remediation.
You can see notepad.exe disappear from the list of running processes on the test device.
From the Incident page, select Manage incident. Set the status to Resolve incident and
select True alert for the classification and Security testing for the determination.
When the incident is resolved, it resolves all of the associated alerts in the Microsoft
Defender portal and the related portals.
This wraps up attack simulations for incident analysis, automated investigation, and
incident resolution.
Next step
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
Once you have performed an incident response for a simulated attack, here are some
Microsoft Defender XDR capabilities to explore:
ノ Expand table
Capability Description
Prioritizing Use filtering and sorting of the incidents queue to determine which
incidents incidents to address next.
Managing Modify incident properties to ensure correct assignment, add tags and
incidents comments, and to resolve an incident.
Automated Use automated investigation and response (AIR) capabilities to help your
investigation and security operations team address threats more efficiently and effectively.
response The Action center is a "single pane of glass" experience for incident and
alert tasks such as approving pending remediation actions.
Advanced hunting Use queries to proactively inspect events in your network and locate threat
indicators and entities. You also use advanced hunting during the
investigation and remediation of an incident.
Prioritize incidents
You get to the incident queue from Incidents & alerts > Incidents on the quick launch
of the Microsoft Defender portal . Here's an example.
The Most recent incidents and alerts section shows a graph of the number of alerts
received and incidents created in the last 24 hours.
To examine the list of incidents and prioritize their importance for assignment and
investigation, you can:
Configure customizable columns (select Choose columns) to give you visibility into
different characteristics of the incident or the impacted entities. This helps you
make an informed decision regarding the prioritization of incidents for analysis.
From the default incident queue, select Filters to see a Filters pane, from which you can
specify a specific set of incidents. Here's an example.
Manage incidents
You can manage incidents from the Manage incident pane for an incident. Here's an
example.
You can display this pane from the Manage incident link on the:
Change the automatically assigned name based on your security team best
practices.
Add tags that your security team uses to classify incidents, which can be later
filtered.
Resolve an incident
Classify and select the threat type when you resolve an incident.
Add comments
Use comments for progress, notes, or other information based on your security
team best practices. The full comment history is available from the Comments and
history option in the details page of an incident.
Here's an example.
From the Action center, you can select pending actions and then approve or reject them
in the flyout pane. Here's an example.
Approve (or reject) pending actions as soon as possible so that your automated
investigations can proceed and complete in a timely manner.
For more information, see Automated investigation and response and Action center.
7 Note
Before we walk you through the advanced hunting simulation, watch the following
video to understand advanced hunting concepts, see where you can find it in the
portal, and know how it can help you in your security operations.
https://www.microsoft.com/en-us/videoplayer/embed/RE4Bp7O?postJsllMsg=true
If the optional fileless PowerShell attack simulation were a real attack that had already
reached the credential access stage, you can use advanced hunting at any point in the
investigation to proactively search through events and records in the network using
what you already know from the generated alerts and affected entities.
For instance, based on information in the User and IP address reconnaissance (SMB)
alert, you can use the IdentityDirectoryEvents table to find all the SMB session
enumeration events, or find more discovery activities in various other protocols in
Microsoft Defender for Identity data using the IdentityQueryEvents table.
Hunting environment requirements
There's a single internal mailbox and device required for this simulation. You'll also need
an external email account to send the test message.
a. Make sure you are using Windows 10 version 1903 or later version.
2. Open the sent email from the device configured as defined in step 3 of the hunting
environment requirements section. Either open the attachment or save the file to
the device.
Go hunting
1. Open the Microsoft Defender portal .
Console
EmailEvents
c. Change the time frame of the query to the last 24 hours. Assuming the email
you sent when you ran the simulation above was in the past 24 hours, otherwise
change the time frame as needed.
d. Select Run query. You may have differing results depending on your pilot
environment.
7 Note
See the next step for filtering options to limit data return.
7 Note
Advanced hunting displays query results as tabular data. You can also opt
to view the data in other format types such as charts.
e. Look at the results and see if you can identify the email you opened. It may take
up to two hours for the message to show up in advanced hunting. To narrow
down the results, you can add the where condition to your query to only look
for emails that have "yahoo.com" as their SenderMailFromDomain. Here's an
example.
Console
EmailEvents
| where SenderMailFromDomain == "yahoo.com"
f. Click the resulting rows from the query so you can inspect the record.
4. Now that you have verified that you can see the email, add a filter for the
attachments. Focus on all emails with attachments in the environment. For this
simulation, focus on inbound emails, not those that are being sent out from your
environment. Remove any filters you have added to locate your message and add
"| where AttachmentCount > 0 and EmailDirection == "Inbound""
The following query will show you the result with a shorter list than your initial
query for all email events:
Console
EmailEvents
| where AttachmentCount > 0 and EmailDirection == "Inbound"
5. Next, include the information about the attachment (such as: file name, hashes) to
your result set. To do so, join the EmailAttachmentInfo table. The common fields
to use for joining, in this case are NetworkMessageId and RecipientObjectId.
Console
EmailEvents
| where AttachmentCount > 0 and EmailDirection == "Inbound"
| project-rename EmailTimestamp=Timestamp
| join EmailAttachmentInfo on NetworkMessageId, RecipientObjectId
6. Next, use the SHA256 value from the EmailAttachmentInfo table to find
DeviceFileEvents (file actions that happened on the endpoint) for that hash. The
common field here will be the SHA256 hash for the attachment.
The resulting table now includes details from the endpoint (Microsoft Defender for
Endpoint) such as device name, what action was done (in this case, filtered to only
include FileCreated events), and where the file was stored. The account name
associated with the process will also be included.
Console
EmailEvents
| where AttachmentCount > 0 and EmailDirection == "Inbound"
| project-rename EmailTimestamp=Timestamp
| join EmailAttachmentInfo on NetworkMessageId, RecipientObjectId
| join DeviceFileEvents on SHA256
| where ActionType == "FileCreated"
You've now created a query that'll identify all inbound emails where the user
opened or saved the attachment. You can also refine this query to filter for specific
sender domains, file sizes, file types, and so on.
7. Functions are a special kind of join, which let you pull more TI data about a file like
its prevalence, signer and issuer info, etc. To get more details on the file, use the
FileProfile() function enrichment:
Console
EmailEvents
| where AttachmentCount > 0 and EmailDirection == "Inbound"
| project-rename EmailTimestamp=Timestamp
| join EmailAttachmentInfo on NetworkMessageId, RecipientObjectId
| join DeviceFileEvents on SHA256
| where ActionType == "FileCreated"
| distinct SHA1
| invoke FileProfile()
Create a detection
Once you have created a query that identifies information that you'd like to get alerted
about if they happen in the future, you can create a custom detection from the query.
Custom detections will run the query according to the frequency you set, and the results
of the queries will create security alerts, based on the impacted assets you choose.
Those alerts will be correlated to incidents and can be triaged as any other security alert
generated by one of the products.
1. On the query page, remove lines 7 and 8 that were added in step 7 of the Go
hunting instructions and click Create detection rule.
7 Note
If you click Create detection rule and you have syntax errors in your query,
your detection rule won't be saved. Double-check your query to ensure
there's no errors.
2. Fill in the required fields with the information that will allow the security team to
understand the alert, why it was generated, and what actions you expect them to
take.
Ensure that you fill out the fields with clarity to help give the next user an informed
decision about this detection rule alert
3. Select what entities are impacted in this alert. In this case, select Device and
Mailbox.
4. Determine what actions should take place if the alert is triggered. In this case, run
an antivirus scan, though other actions could be taken.
5. Select the scope for the alert rule. Since this query involves devices, the device
groups are relevant in this custom detection according to Microsoft Defender for
Endpoint context. When creating a custom detection that does not include devices
as impacted entities, scope does not apply.
For this pilot, you might want to limit this rule to a subset of testing devices in your
production environment.
6. Select Create. Then, select Custom detection rules from the navigation panel.
From this page, you can select the detection rule, which will open a details page.
Expert training on advanced hunting
Tracking the adversary is a webcast series for new security analysts and seasoned threat
hunters. It guides you through the basics of advanced hunting all the way to creating
your own sophisticated queries.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
Applies to:
Next, complete any other configuration and expand your pilot groups until these reach
full production.
1. Purchase and provision the necessary licenses and assign them to your production
users.
2. Rerun recommended baseline policy configurations (either Standard or Strict)
against your production email domain or specific groups of users.
3. Optionally create and configure any custom Defender for Office 365 policies
against your production email domain or groups of users. However, remember
that any assigned baseline policies will always take precedence over custom
policies.
4. Update the public MX record for your production email domain to resolve directly
to EOP.
5. Decommission any third-party SMTP gateways and disable or delete any EXO
connectors associated with this relay.
Microsoft Defender for Endpoint
To promote Microsoft Defender for Endpoint evaluation environment from a pilot to
production, onboard more endpoints to the service using any of the supported tools
and methods.
Use the following general guidelines to onboard more devices to Microsoft Defender for
Endpoint.
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender XDR Tech Community .
Feedback
Was this page helpful? Yes No
To see examples of Microsoft Purview Information Protection in action, from the end-
user experience to the admin configuration, watch the following video:
https://www.microsoft.com/en-us/videoplayer/embed/RW1a6dR?postJsllMsg=true
Tip
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to
explore how additional Purview capabilities can help your organization manage
data security and compliance needs. Start now at the Microsoft Purview
compliance portal trials hub . Learn details about signing up and trial terms.
Licensing
Microsoft Purview Information Protection capabilities are included with Microsoft
Purview. The licensing requirements can vary even within capabilities, depending on
configuration options. To identify licensing requirements and options, see the Microsoft
365 guidance for security & compliance.
ノ Expand table
1 Describe the categories of sensitive information you want to Learn about sensitive
protect. information types
You already have an idea of what types of information are Learn about trainable
most valuable to your org and what types aren't. Work with classifiers
stakeholders to describe these categories that are your
starting point.
ノ Expand table
1 Define your sensitivity labels and policies that will protect Get started with sensitivity
your organization's data. labels
2 Label and protect data for Microsoft 365 apps and services. Manage sensitivity labels
in Office apps
Sensitivity labels are supported for Microsoft 365 Word,
Excel, PowerPoint, Outlook, Teams meetings, and also Enable sensitivity labels for
containers that include SharePoint and OneDrive sites, and files in SharePoint and
Microsoft 365 groups. Use a combination of labeling OneDrive
methods such as manual labeling, automatic labeling, a
default label, and mandatory labeling. Enable co-authoring for
files encrypted with
Example configuration for client-side auto-labeling: sensitivity labels
1. Recommend Confidential \ Anyone (unrestricted) if 1-9
credit card numbers Configure a default
2. Recommend Confidential \ All Employees if 10+ credit sensitivity label for a
card numbers SharePoint document
-- typical end user experience, and the user selects the library
button to show sensitive content (Word only)
Apply a sensitivity label to
Example configuration for service-side auto-labeling: content automatically
Apply to all locations (Exchange, SharePoint, OneDrive)
1. Apply Confidential \ Anyone (unrestricted) if 1-9 credit Use sensitivity labels with
card numbers Microsoft Teams, Microsoft
2. Apply Confidential \ All Employees if 10+ credit card 365 groups, and
numbers SharePoint sites
3. Apply Confidential \ Anyone (unrestricted) if 1-9 US
personal data and full names Use sensitivity labels to
4. Apply Confidential \ All Employees if 10+ US personal protect calendar items,
data and full names Teams meetings, and chat
3 Discover, label, and protect sensitive items that reside in Discover, classify, label,
data stores in the cloud (Box, GSuite, SharePoint, and and protect regulated and
OneDrive) by using Microsoft Defender for Cloud Apps with sensitive data stored in the
your sensitivity labels. cloud
4 Discover, label, and protect sensitive items that reside in Configuring and installing
data stores on premises by deploying the information the information protection
protection scanner with your sensitivity labels. scanner
Refer to the Protect your data with Microsoft Purview page for the full list of protection
capabilities.
Deploy Microsoft Purview Data Loss Prevention (DLP) policies to govern and prevent the
inappropriate sharing, transfer, or use of sensitive data across apps and services. These
policies help users make the right decisions and take the right actions when they're
using sensitive data.
ノ Expand table
Step Description More
information
Deployment strategies
The credit card number examples are often helpful for initial testing and end user
education. Even if your organization doesn't typically need to protect credit card
numbers, the concept of these being sensitive items that need protection is easily
understood by users. Many websites provide credit card numbers that are suitable for
testing purposes only. You can also search for sites that provide credit card number
generators so that you can paste the numbers into documents and emails.
When you're ready to move your automatic labeling and DLP policies into production,
change to classifiers and configurations that are suitable for the type of data used by
your organization. For example, you might need to use trainable classifiers for
intellectual property and specific types of documents, or exact data match (EDM)
sensitive information types for privacy data that's related to customers or employees.
Or, you might want to start by discovering and protecting IT-related information that is
frequently the target of security attacks. Then, supplement this by checking for and
preventing the sharing of passwords with DLP policies for email and Teams chat:
Use the trainable classifiers IT and IT Infra and Network Security Documents
Use the built-in sensitive info type General Password and create a custom sensitive
info type for "password is" for the different languages used by your users
Deploying an information protection solution isn't a linear deployment but iterative, and
often circular. The more you know your data, the more accurately you can label it, and
prevent data leakage. The results of those applied labels and policies flow into the data
classification dashboard and tools, which in turn makes more sensitive data visible for
you to protect. Or, if you're already protecting that sensitive data, consider whether it
requires additional protective actions.
You can start to manually label data as soon as you've defined sensitivity labels. The
same classifiers that you use for DLP can be used to automatically find and label more
data. You can even use sensitivity labels as a classifier, for example, block sharing items
that are labeled highly confidential.
Most customers already have some solutions in place to protect their data. Your
deployment strategy might be to build on what you already have, or focus on gaps that
offer the most business value or addresses high risk areas.
To help you plan your unique deployment strategy, reference Get started with sensitivity
labels and Plan for data loss prevention.
Details of such a phased deployment might look something like the following plan,
where sensitivity labels and DLP policies become more integrated with each other to
provide greater data protection than if they were used independently:
Phase 1
DLP policy A:
If 1-2 instances of credit cards are found, block external sharing except if the
item is labeled as Personal or Confidential\Anyone (unrestricted). Use
logging and reporting for analysis.
DLP policy B:
If 3-9 instances of credit cards are found, block external sharing, cloud egress,
and copy to removable drives except if the item is labeled as
Confidential\Anyone (unrestricted). Use logging and reporting for analysis.
DLP policy C:
If 10+ instances of credit cards are found, block external sharing, cloud egress,
and copy to removable drives with no exceptions. Use logging and reporting
for analysis.
Training resources
Interactive guides: Microsoft Purview Information Protection
To help train your users to apply and use the sensitivity labels that you configure for
them, see End-user documentation for sensitivity labels.
When you deploy data loss prevention policies for Teams, you might find the following
end-user guidance useful as an introduction to this technology. It includes some
potential messages that users might see: Teams messages about data loss prevention
(DLP) and communication compliance policies .
Feedback
Was this page helpful? Yes No
Manage data privacy and data
protection with Microsoft Priva and
Microsoft Purview
Article • 01/03/2024
Data privacy and data protection go hand in hand. You can't have data privacy without
data protection. Data protection helps protect personal data stored and managed by
your organization from external threats and leakage. Data privacy provides another layer
of sophisticated protection, which helps honor the purpose of personal data use and
respects a data subject's rights throughout the data lifecycle. To help organizations
regardless of size or location fortify their data privacy and protection posture, we offer
robust and scalable solutions in Microsoft Priva and Microsoft Purview.
1. Assess your organization's data and risks: Start your journey by understanding your
data and possible risks.
2. Protect and govern your data: Identify, categorize, and manage the data you need
to protect.
3. Stay on track with privacy regulations: Monitor your progress in completing
assessments and stay up-to-date as regulations change.
4. Respond to data privacy incidents and subject requests: Set up alerts so you can
respond to privacy risks and automate your management of data subject requests.
) Important
Following this guidance will not necessarily make you compliant with any data
privacy regulation, especially considering the number of steps required that are
outside the context of the features. You are responsible for ensuring your
compliance and to consult your legal and compliance teams or to seek guidance
and advice from third parties that specialize in compliance.
Resources
Microsoft Priva
Microsoft Purview
Microsoft Privacy
Microsoft compliance offerings
Data privacy thought paper: From privacy vulnerability to privacy resilience
Priva Privacy Risk Management eBook
Feedback
Was this page helpful? Yes No
Welcome to Step 1 of managing data privacy and data protection with Microsoft Priva
and Microsoft Purview: Assess your organization's data and risks.
When you begin your data privacy journey, you'll want to first understand what types of
personal data you have, how much, where it's stored, and how it flows over time. The
best place to start understanding your data is with Microsoft Priva. You'll next want to
know which regulations you'll need to comply with. Microsoft Purview Compliance
Manager helps you identify which data privacy regulations most likely apply to your
organization.
Actions to take
ノ Expand table
Use Priva to Priva evaluates your organization's Microsoft 365 Learn more
understand your environment to determine the types and amounts of about Priva
organization's sensitive information types and where they're stored. It
personal data. then gives you insights and key analytics to help you Check Priva
understand the privacy issues and associated risks in your licensing
organization. guidance
To get started with Priva, check to make sure your users Set user
are appropriately licensed and have the roles they need. permissions for
It's also a good idea to confirm that the Microsoft 365 Priva
audit log is enabled.
Check Priva
We recommend making some initial settings before you settings
start. Visit Priva settings to turn anonymization On for
Action Description Get details
greater protection while reviewing sensitive data, and turn Find and
user notification emails Off while you're getting familiar visualize
with Privacy Risk Management policies. You can turn both personal data in
on later. your
organization
Visit Compliance The next step is knowing which data protection Learn more
Manager to regulations apply to your organization so you know what about
assess your your obligations are. Compliance
compliance Manager
posture. Keeping up with new and updated laws and regulations
can be a full-time job in itself, and many organizations Start a premium
struggle with manual processes for monitoring, updating, assessments
and reporting on their state of compliance. Compliance trial
Manager helps manage the complexities of implementing
controls through built-in control mapping, versioning, and Learn about
continuous control assessments. This automation and multicloud
continuous monitoring helps you to stay current with support in
regulations and certifications, and eases reporting to Compliance
auditors. Manager
Select Data profile underneath Privacy risk management on the left navigation of the
Purview compliance portal. On this page, you can explore and document all the personal
data types detected across repositories. Based on this information, you can decide if all
the data types you're concerned about are successfully detected. If you find something
missing, you can create custom sensitive information types (SITs) and come back to the
data profile page in the next 24-48 hours.
There are three data handling policies in Priva Privacy Risk Management: data
overexposure, data transfers, and data minimization. You can learn more about the
policy types here, and we'll discuss them further in step 2 of this solution. A default
version of each policy type is set up and running when you start using Priva. You'll see
them listed with the word Default in their names on your Policies page.
We recommend turning off the default policies as you get started. This is because the
default policies monitor for personal data based on multiple classification groups (sets
of data based on privacy regulations), which can involve a broad array of SITs that may
not be relevant to your industry or geographic location. You may also experience a high
number of false positives. The result may be that an overwhelming amount of data
that's less relevant appears in your data profile and gets factored into your insights. To
create a more manageable and accurate view of the personal data you're most
concerned with, we suggest setting up a customized policy at first. This also gives you
time to become familiar with how policies work and watch for false positives. You can
run the policy in test mode and continue to fine tune its settings until it's set up to track
exactly what you need.
If you felt overwhelmed by the amount of data presented on your overview and data
profile pages at the start, turning off the default policies and setting up one or more
custom policies may present a more accurate and workable picture of your data estate
and current risks.
We'll walk you through setting up your first policy in step 2 of this guidance.
Next step
Visit Step 2. Protect and govern your data.
Feedback
Was this page helpful? Yes No
Welcome to Step 2 of managing data privacy and data protection with Microsoft Priva
and Microsoft Purview: Protect and govern your data.
When you know what personal data you have, where it is, and your regulatory
requirements, it's time to put things in place to protect that data. Microsoft provides
comprehensive, robust capabilities to help you protect personal data in two ways:
1. Features that IT admins set up to categorize sensitive items and take protective
actions, and
2. Features that empower your employees to spot and fix data privacy issues quickly
and get trained on sound data handling practices.
Actions to take
ノ Expand table
Identify sensitive Identifying and categorizing sensitive items Learn more about
information types so managed by your organization is the first step in the sensitive
you know what needs Information Protection discipline. information types
protection.
Microsoft Purview provides three ways of identifying View the full list
items so that they can be categorized a) manually by of sensitive
users, b) automated pattern recognition, like information types
sensitive information types, and c) machine learning.
Categorize and label Categorizing and labeling content so it can be Learn more about
your content so you protected and handled properly is the starting place trainable
can apply features to for the information protection discipline. Microsoft classifiers
protect it. 365 has three ways to classify content.
Apply sensitivity When you’ve identified your sensitive data, you’ll Learn more about
labels to protect data, want to protect it. That’s often challenging when sensitivity labels
even if it roams. people collaborate with others both inside and
outside the organization. That data can roam
everywhere, across devices, apps, and services. And
when it roams, you want it to do so in a secure,
protected way that meets your organization's
business and compliance policies.
Use data loss Organizations have sensitive information under their Learn more about
prevention policies to control such as financial data, proprietary data, data loss
prevent the sharing of credit card numbers, health records, or social prevention
personal data. security numbers. To help protect sensitive
information and reduce risk, they need a way to
prevent their users from inappropriately sharing it
with people who shouldn't have it. This practice is
called data loss prevention (DLP).
Set up secure storage If you plan to store highly sensitive personal data in Learn more about
of personal data in Teams, you can configure a private team and use a configuring a
Microsoft Teams. sensitivity label that's specifically configured to team with
secure access to the team and files within it. security isolation
Empower users to Create data handling policies in Priva Privacy Risk Learn more about
spot potential risks Management so that your users can immediately Privacy Risk
and fix issues. identify risks in the data they create and manage. Management
Use records A records management system is a solution for Learn more about
management for organizations to manage regulatory, legal, and records
high-value items that business-critical records. management
must be managed for
business, legal, or Microsoft Purview Records Management helps an
regulatory record- organization manage their legal obligations,
keeping provides the ability to demonstrate compliance with
requirements. regulations, and increases efficiency with regular
disposition of items that are no longer required to
Action Description Get details
Protecting data is also the responsibility of every user in your organization who views,
creates, and handles personal data in the course of the job duties. Each user must know
and abide by your organization's internal and regulatory responsibilities to protect
personal data wherever it exists in your organization. To that end, Priva helps you
empower your users to know their responsibilities, to be informed when they're
handling data in risky ways, and take immediate action to minimize privacy risks to the
organization.
The three data handling policies available in Priva Privacy Risk Management help your
users play a proactive role in your organization's data protection strategy. Email
notifications with built-in remediation actions prompt users to apply the necessary
protections and take a privacy training designated by your organization. This awareness
and ability to act can help to cultivate better habits for preventing future privacy issues.
When you get to the Choose data to monitor step of the policy creation wizard,
we recommend selecting the Individual sensitive information types option and
choosing the SITs that are most relevant to your organization. For example, if
you're a financial services company with customers in Europe, you'll likely want to
include the EU debit card number as one of your SITs. Find the list of SIT definitions
here.
At the Choose users and groups covered by this policy step, we recommend
selecting Specific users or groups and choosing a small inner circle of users in
scope for this policy.
At the Choose conditions for the policy step, we recommend selecting only
External so that you're tracking data you might consider more at risk while
keeping the total amount of data you'll have to monitor at more manageable
levels.
At the Specify alerts and thresholds step, we recommend turning alerts On and
selecting the frequency option of Alert when one of the conditions below is met.
Turning on alerts will help admins gauge whether the severity and frequency of
alerts meet their needs. Note that policies don't work retrospectively, so if you
decide to keep alerts off at first and later turn them on, you wouldn't see any alerts
for matches that occurred prior to turning on alerts.
At the Decide policy mode state, we recommend keeping the policy in test mode
and monitoring its performance for at least five days. This allows you to see what
kind of matches the policy conditions are picking up, how the alerts will fire.
Data transfer:
For Data to monitor, select specific SITs.
For Choose users and groups covered by this policy, select an inner ring of users.
For Choose conditions for the policy, choose the condition that matters the most.
For Define outcomes when a policy match is detected, turn on email notifications.
For Specify alerts and thresholds, turn alerts on for each time an activity occurs.
For Decide policy mode, turn the policy mode on (which turns off test mode).
Data minimization:
The matches generated by each policy type and the instances of false positives and
false negatives
The impact and the feedback from end users and admins
Based on your findings, you can now tune the policy performance by doing the
following:
Think of this as your third phase. You can create more versions of each policy type and
deploy them to the whole organization in two rounds: a first round that covers 50% of
your users, and a second round that covers 100% of your users.
This is also the stage where you accumulate learnings based on user behavior as noted
in Priva and create specific privacy training for your users, which you can include in your
policies' user email notifications.
Next step
Visit Step 3. Stay on track with privacy regulations.
Feedback
Was this page helpful? Yes No
Welcome to Step 3 of managing data privacy and data protection with Microsoft Priva
and Microsoft Purview: Stay on track with privacy regulations.
Research shows that there are over 250 daily updates to global regulations*. Microsoft
Purview Compliance Manager helps you keep up with the evolving compliance and risk
landscape by providing continuous control assessments and regulatory updates. Choose
from a library of 350+ templates that correspond to national, regional, and industry-
specific requirements on the collection and use of data. Modify the templates for your
needs, or create your own custom template for assessments that meet your unique
needs. Explore the links below for detailed guidance on managing your organization's
compliance activities with Compliance Manager.
Actions to take
ノ Expand table
Monitor progress Make sure you've set up assessments in Compliance Build and manage
and improve your Manger to help you stay on top of new and assessments in
compliance score. evolving data privacy regulations and laws that Compliance Manager
apply to your organization.
Learn how to assess
your compliance
posture across your
multicloud
environment
Raise your
compliance score by
Action Description Get details
completing
improvement actions
Automatically test To realize the full benefits of continuous control Set your testing
improvement assessment, make sure your settings are configured source for automated
actions. to enable automatic testing of all eligible testing
improvement actions.
Set alerts for Compliance Manager can alert you to changes as Create alert policies
changes in soon as they happen so that you can stay on track
Compliance with your compliance goals. Set up alerts for
Manager. improvement action changes such as a score
increase or decrease, an implementation or test
status change, a reassignment, or the addition or
removal of evidence.
Facilitate the work Make sure that individuals who oversee compliance Grant user access to
of assessors and activities in the organization have the right roles individual
auditors. and can access evidence files and reporting. assessments
Compliance Manager allows scoped access to
individual assessment for specific users. Store evidence
Next step
Visit Step 4. Respond to data privacy incidents and subject requests.
Reference
Feedback
Was this page helpful? Yes No
Welcome to Step 4 of managing data privacy and data protection with Microsoft Priva
and Microsoft Purview: Respond to data privacy incidents and subject requests.
Features in both Purview and Priva can help you monitor, investigate, and respond to
data privacy incidents in your organization as you operationalize related capabilities.
Having processes, procedures, and other documentation for each incident may also be
important to demonstrate compliance to regulatory bodies. These features include:
Actions to take
ノ Expand table
Set up alerts for You can set up alerts to help you respond quickly to an Priva policy
potential array of privacy incidents, whether they come through alerts
incidents. Priva, auditing, or other alert policies.
Unified auditing
Mailbox auditing
Microsoft
Purview Audit
(Premium)
Alert policies
Action Description Get details
Manage subject Several privacy regulations around the world grant Learn more
rights requests at individuals—or data subjects—the right to make about Subject
scale. requests to review or manage the personal data that Rights Requests
companies have collected about them. These subject
rights requests are also referred to as data subject
requests (DSRs), data subject access requests (DSARs), or
consumer rights requests.
Use insider risk Microsoft Purview Insider Risk Management is a Learn more
management as compliance solution that helps you minimize internal risk about insider risk
an investigative by enabling you detect, investigate, and act on malicious management
tool. and inadvertent activities in your organization.
Auditing, alerting, and reporting for activities related to the storage, sharing, and
processing of personal data.
The ability to respond to subject requests and, in some cases, perform investigative
and other administrative measures to comply with such requests.
Your organization may also wish to perform monitoring and response activities for other
purposes, such as other compliance needs or for business reasons. Establishing your
monitoring and response scheme for data privacy should be done as part of overall
monitoring and response planning, implementation, and management.
Use the links above to explore how Purview capabilities can help you develop a
monitoring and response scheme, and answer questions such as:
What sort of day-to-day monitoring and investigative and reporting techniques are
available for the different data types and sources?
What mechanisms will be needed to handle subject rights requests and any
remedial actions, such as anonymization, redaction, and deletion?
Feedback
Was this page helpful? Yes No
While a multi-cloud environment can help reduce operational costs and improve
scalability, the large amount of sensitive data and the flexibility it affords organizations
can potentially pose a security risk. Deliberate steps must be taken to ensure that apps
hosted in the cloud and their data are protected.
To ensure that access and productivity are secure, implementation of SaaS apps need to
align with the Zero Trust security model, which is based on these guiding principles.
ノ Expand table
Verify Always authenticate and authorize based on all Registering your SaaS apps
explicitly available data points. and using Microsoft Entra
Conditional Access policies.
Use least Limit user access with Just-In-Time and Just- Using Microsoft Purview
privileged Enough-Access (JIT/JEA), risk-based adaptive Information Protection.
access policies, and data protection.
Assume Minimize blast radius and segment access. Verify Using Microsoft Defender for
breach end-to-end encryption and use analytics to get Cloud Apps.
visibility, drive threat detection, and improve
defenses.
This documentation solution helps you apply Zero Trust principles using Microsoft 365
to help manage your digital estate of cloud apps, with a focus on SaaS apps.
The following diagram shows the relationships between your third-party cloud apps,
Microsoft Entra ID, Defender for Cloud Apps, and Microsoft Purview Information
Protection to apply these principles.
Your third-party cloud apps
§ Add SaaS and PaaS apps § Discover cloud apps § Protect your data
to Microsoft Entra ID § Approve cloud apps § Prevent data loss
§ Add these apps to the § Integrate with Microsoft
scopes of your Conditional Entra to enforce MFA
Access policies and require
§ Apply session controls to
multi-factor authentication
cloud apps
(MFA)
§ Discover sensitive
information in cloud apps
Examples of third-party cloud apps that include SaaS apps and your custom PaaS
apps.
The role of Microsoft Entra ID to include these apps in the scope of your strong
authentication and other Conditional Access policies. For more information, see
Integrating all your apps with Microsoft Entra ID.
The role of Microsoft Defender for Cloud Apps in discovering the cloud apps that
your organization uses. You can approve apps, apply session controls, and discover
sensitive data. For newly-discovered enterprise cloud apps that support federation,
you can add them to Microsoft Entra ID to enforce strong authentication and other
policies.
The role of Microsoft Purview Information Protection to protect cloud app data
and prevent data loss in conjunction with Microsoft Defender for Cloud apps.
Defend
Defender for Office Defender for Defender for Cloud
against threats Defender for Identity
365 Endpoint Apps
Configure Enterprise (recommended) Zero Trust identity and device access policies
Require healthy and compliant devices
Configure cloud identity: cloud only, hybrid with Password Hash Synchronization (PHS),
hybrid with Pass-Through Authentication (PTA), or federated
ノ Expand table
Step Description
1. Add SaaS apps to Add applications to Microsoft Entra ID so that authorized users can
Microsoft Entra ID securely access it. Many types of applications can be registered with
Microsoft Entra ID.
2. Create Microsoft Ensure that policies are in place so that only authorized users and
Defender for Cloud Apps specific conditions are met before users are able to access
policies resources.
3. Deploy information Ensure that the proprietary and sensitive business data for your
protection for SaaS apps SaaS apps is protected.
For guidance on licensing, see Microsoft 365 guidance for security & compliance.
For more information about applying Zero Trust protections across Microsoft 365, see
the Microsoft 365 Zero Trust deployment plan.
Next steps
Use these steps to apply Zero Trust principles for your SaaS apps with Microsoft 365:
Recommended training
ノ Expand table
Training Specify requirements for securing SaaS, PaaS, and IaaS services
Learn how to analyze security requirements for different cloud offerings (SaaS,
PaaS, and IaaS), IoT workloads, web workloads and containers.
Start >
Feedback
Was this page helpful? Yes No
Step 1: Add SaaS apps to Microsoft
Entra ID and to the scope of policies
Article • 04/23/2024
Integrate your SaaS apps into Microsoft Entra ID so that you can monitor and configure
access for them. Microsoft Entra ID has an application gallery, which is a collection of
SaaS apps that have been preintegrated with Microsoft Entra ID. You can also add your
own custom apps. For more information, see Five steps for integrating all your apps with
Microsoft Entra ID.
After adding apps to Microsoft Entra ID, you can configure how apps are accessed and
subject to specific conditions by including them in the scope of your Zero Trust identity
and device access policies.
If you already have Microsoft Defender for Cloud Apps deployed, you can discover SaaS
apps that are being used in your organization. For more information, see Step 2 of this
solution and Discover and manage shadow IT in your network.
For more information, see Add an enterprise application and Overview of the Microsoft
Entra application gallery.
For more information, see What is application management in Microsoft Entra ID? and
Request to publish your application in the Microsoft Entra application gallery.
After adding apps in Microsoft Entra ID, you'll need to add them to the scope of your
Zero Trust identity and device access policies.
Zero Trust identity and device access policies for SaaS and PaaS apps
Changes from the common PCs include devices running the Windows or macOS platforms
Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Identity add-on, Office 365 with EMS E5, or individual March 2024
identity and device access policies Phones and tablets include devices running the iOS, iPadOS, or Android platforms Microsoft Entra ID P2 licenses
For each policy to update, make sure that your apps and their dependent services are
included in the assignment of cloud apps.
This table lists the policies that need to be reviewed with links to each policy in the set
of common identity and device access policies.
ノ Expand table
Starting Require MFA when sign-in Ensure that your cloud apps and dependent services
point risk is medium or high are included in the list of apps.
Block clients that don't Include your apps and dependent services in the
support modern assignment of cloud apps.
authentication
High risk users must Forces app users to change their password when
change password signing in if high-risk activity is detected for their
account.
Apply APP data protection Ensure that your cloud apps and dependent services
policies are included in the list of apps. Update the policy
for each platform (iOS, Android, Windows).
Enterprise Require MFA when sign-in Ensure that your cloud apps and dependent services
risk is low, medium, or are included in the list of apps.
Protection Policies Description
level
high
Require compliant PCs Ensure that your cloud apps and dependent services
and mobile devices are included in the list of apps.
Specialized Always require MFA Regardless of user identity, your organization uses
security MFA.
For more information, see Recommended Microsoft Defender for Cloud Apps policies
for SaaS apps.
Next step
Feedback
Was this page helpful? Yes No
Step 2: Create Defender for Cloud Apps
policies
Article • 04/23/2024
SaaS apps play a key role in ensuring that your applications and resources are available
and accessible from any device with an Internet connection. However, some apps can
pose a security risk with the potential to cause significant damage to your organization
if not discovered and managed. You must have visibility into the apps that are being
used in your organization so that you can protect your sensitive data and resources.
Microsoft Defender for Cloud Apps keeps you in control through comprehensive
visibility, auditing, and granular controls over your sensitive data. Defender for Cloud
Apps has tools that help uncover shadow IT and assess risk while enabling you to
enforce policies and investigate app activities. It helps you control access in real time
and stop threats so your organization can more safely move to the cloud.
If you haven't already set up Defender for Cloud Apps, see Evaluate Microsoft Defender
for Cloud Apps.
Defender for Cloud Apps has a capability called Cloud Discovery that analyzes your
traffic logs against the Microsoft Defender for Cloud Apps catalog of over 31,000 cloud
apps. The apps are ranked and scored based on more than 90 risk factors and provide
you with ongoing visibility into cloud app use, Shadow IT, and the risk posed by
unknown and unmanaged apps.
The following diagram shows the components of cloud app discovery and the two
methods used to monitor network traffic and discover cloud apps that are being used in
your organization
Shared signals
2 2
1
Cloud app
traffic
Firewalls Proxies
On-premises integration
In this diagram:
Method 1: Cloud App Discovery integrates with Microsoft Defender for Endpoint,
which reports cloud apps and services being accessed from IT-managed Windows
10 and Windows 11 devices.
Method 2: For coverage on all devices connected to a network, a Defender for
Cloud Apps log collector installed on firewalls and proxies collect and send data
from endpoints to Defender for Cloud Apps for analysis.
Use the following guidance to leverage the built-in capabilities in Defender for Cloud
Apps to discover apps in your organization:
In conjunction with Conditional Access policies, you can further increase the security of
your cloud apps by applying access and session controls using conditional access app
control. With the conditional access app control capability in Defender for Cloud Apps,
user app access and sessions are monitored and controlled in real time based on access
and session policies. Access and session policies configured with the Defender for Cloud
Apps portal allow you to further refine filters and set actions that users can perform.
Microsoft Defender for Cloud Apps natively integrates with Microsoft Entra. When you
configure a policy in Microsoft Entra to use conditional access app control, cloud app
traffic is routed through Defender for Cloud Apps as a proxy, which allows Defender for
Cloud Apps to monitor this traffic and to apply session controls.
The following diagram shows how cloud app traffic gets routed through Microsoft Entra
and Defender for Cloud Apps.
Shared signals
Conditional
access app
Microsoft control
Entra
Cloud app traffic
In this diagram:
Microsoft Entra has a conditional access app control policy for the traffic the
specified and integrated SaaS apps. Microsoft Entra ID then directs (proxies) the
session traffic through Defender for Cloud Apps.
Defender for Cloud Apps monitors this traffic and applies session control policies.
Conditional Access dictates the requirements that must be fulfilled before a user can
access an app. Conditional access app control dictates what apps a user can access and
the set of actions that a user can take during a session after they've been granted
access.
Protect apps with Microsoft Defender for Cloud Apps Conditional Access App
Control
Integrating Microsoft Entra ID with Conditional Access App Control
Defender for Cloud Apps provides end-to-end protection for connected apps using
cloud-to-cloud integration, API connectors, and real-time access and session controls
that leverage Conditional app access controls.
Defender for Cloud Apps documentation includes the following series of tutorials to
help you discover risk and protect your environment:
Next step
Feedback
Was this page helpful? Yes No
Step 3: Deploy information protection
for SaaS apps
Article • 04/23/2024
While protecting access to apps and session activities are important, the data that SaaS
apps contain may be one of the most critical resources to protect. Deploying
information protection for SaaS apps is a key step in preventing inadvertent or malicious
exposure of sensitive information.
This step builds on the Deploy information protection with Microsoft Purview solution
guidance and guides you on how to use Defender for Cloud Apps to extend information
protection to data in SaaS apps. You may want to review the guidance to gain a better
understanding of the overall workflow.
The scope of this article focuses on protecting Microsoft Office and PDF files and
document repositories within SaaS applications.
The key concepts surrounding information protection involves knowing your data,
protecting your data, and preventing data loss. The following diagram shows how to
perform these key functions with the Purview compliance portal and the Defender for
Cloud Apps portal.
Microsoft
Purview
compliance
portal Identify sensitive Define sensitivity Define DLP
information labels policies
Defender for
Cloud Apps
portal Discover sensitive data Extend labels out to Extend DLP policies to
in SaaS and PaaS apps SaaS and PaaS apps Prevent data loss SaaS and PaaS apps
Know your data Protect your data Prevent data loss
In this diagram:
To protect data in SaaS apps, you must first determine the information in your
organization that is sensitive. After doing that, check to see if any of the sensitive
information types (SITs) map to the determined sensitive information. If none of
the SITs meet your needs, you can modify them or create custom SITs with the
Microsoft Purview compliance portal.
Using the defined SITs, you can discover items that contain sensitive data in SaaS
apps.
Tip
To learn about the full list of supported apps for Microsoft Purview
Information Protection, see Information Protection
After discovering items that contain sensitive data, you can extend labels to SaaS
apps and then apply them.
To prevent data loss, you can define and then extend data loss prevention (DLP)
policies. With a DLP policy, you can identify, monitor, and automatically protect
sensitive items across services. An example of a protective action of DLP policies is
showing a pop-up policy tip to a user when they try to share a sensitive item
inappropriately. Another example is blocking the sharing of sensitive items.
Use the following steps to apply information protection capabilities for your SaaS apps.
Enable the Microsoft Purview Information Protection integration with Defender for
Cloud Apps.
Create policies to identify sensitive information in files.
Once you know the kinds of information you want to protect, you create policies to
detect them. You can create policies for:
Files: File policies scan the content of files stored in your connected cloud apps via
API, for supported apps.
Sessions: Session policies scan and protect files in real time upon access to prevent
data exfiltration, protect files on download, and prevent the upload of unlabeled
files.
Defender for Cloud Apps is natively integrated with Microsoft Purview Information
Protection and the same sensitivity types and labels are available throughout both
services. When you want to define sensitive information, use the Microsoft Purview
compliance portal to create them and they will be available in Defender for Cloud Apps.
Defender for Cloud Apps lets you automatically apply sensitivity labels from Microsoft
Purview Information Protection. These labels are applied to files as a file policy
governance action and, depending on the label configuration, can apply encryption for
another layer of protection.
For more information, see Apply Microsoft Purview Information Protection labels
automatically.
ノ Expand table
Scenario Tool
- Exchange Online email For more information, see Learn about DLP.
- SharePoint Online sites
- OneDrive accounts
- Teams chat and channel messages
Scenario Tool
Your organization uses other apps that aren't Use Defender for Cloud Apps.
covered in Microsoft Purview, but can be connected
to Microsoft Defender for Cloud Apps via API such To use a DLP policy that's scoped to a
as: specific non-Microsoft cloud app, the app
must be connected to Defender for Cloud
- Atlassian Apps. For more information, see Connect
- Azure apps.
- AWS
- Box
- DocuSign
- Egnyte
- GitHub
- Google Workspace
- GCP
- NetDocuments
- Office 365
- Okta
- OneLogin
- Salesforce
- ServiceNow
- Slack
- Smartsheet
- Webex
- Workday
- Zendesk
The apps that your organization uses aren't yet Use Defender for Cloud Apps.
supported in Defender for Cloud Apps via API, but
can be added using app connectors and you can For more information, see Connect apps
use session policies to apply DLP policies in real and Use data loss prevention policies for
time. non-Microsoft cloud apps.
For guidance on licensing, see Microsoft 365 guidance for security & compliance.
Feedback
Was this page helpful? Yes No
Use Zero Trust security to prepare for AI
companions, including Microsoft
Copilots
Article • 04/23/2024
Security, especially data protection, is a top concern when introducing AI tools into an
organization. Security recommendations for AI are anchored in Zero Trust. As a leader in
security, Microsoft provides a practical roadmap and clear guidance for Zero Trust. By
implementing recommended protections as you introduce AI tools and companions,
you are building a foundation of Zero Trust security.
This series of articles helps you apply the principles of Zero Trust to Microsoft’s Copilots
and similar AI companions. Zero Trust is a security strategy. It isn't a product or a service,
but an approach in designing and implementing the following set of security principles:
Verify explicitly
Use least privileged access
Assume breach
Implementing the Zero Trust "never trust, always verify" mindset requires changes to
cloud infrastructure, deployment strategy, and implementation.
Web-grounded prompts
Prompts grounded with security tools
Microsoft 365 graph-grounded prompts
In the illustration:
Web-grounded prompts are issued by Copilot for Bing, Edge, and Windows.
Copilot for Microsoft 365 can also be configured to allow web-grounded prompts.
Microsoft 365-grounded prompts are issued by Copilot for Microsoft 365. If
integration with Copilot for Bing, Edge, and Windows is configured, these copilot
experiences can include graph-grounded data (for example, when the web/work
toggle is set to work).
Prompts grounded with your security tools are issued by Microsoft Copilot for
Security.
Zero Trust
foundation by
Web-grounded prompts
preparing
your Microsoft 365 graph-
environment grounded prompts
for Microsoft
Copilots Prompts grounded with
security tools
The following table summarizes the illustration and links to articles for implementing the
recommended protections.
ノ Expand table
Web-grounded User accounts, devices, and some app data. Microsoft Copilot
prompts
Microsoft 365 Includes the previous protections plus more robust Microsoft Copilot
graph-grounded protection for app data and cloud apps. It also for Microsoft 365
promtps includes adding in threat protection.
Prompts grounded Focuses on tuning up least privilege access, a key Microsoft Copilot
with security tools principle of Zero Trust. for Security
For more information on implementing Zero Trust, see the Zero Trust Guidance Center.
References
Microsoft Copilot
Microsoft Copilot for Microsoft 365
Manage Microsoft Copilot in Windows
Data, Privacy, and Security for Microsoft 365 Copilot
Feedback
Was this page helpful? Yes No
Apply principles of Zero Trust to
Microsoft Copilot
Article • 04/12/2024
Summary: To apply Zero Trust principles to Microsoft Copilot, you need to:
Introduction
Microsoft Copilot or Copilot is an AI companion in copilot.microsoft.com, Windows,
Edge, Bing, and the Copilot mobile app. This article helps you implement security
protections to keep your organization and data safe while using Copilot. By
implementing these protections, you are building a foundation of Zero Trust.
Zero Trust security recommendations for Copilot focus on protection for user accounts,
user devices, and the data that is in scope for the way you configure Copilot.
You can introduce Copilot in stages, from allowing Web-grounded prompts to the
Internet to allowing both Web-grounded and Microsoft 365 Graph-grounded prompts
to both the Internet and to your organization data. This article helps you understand the
scope of each configuration and, consequently, the recommendations for preparing
your environment with appropriate security protections.
As a leader in security, Microsoft provides a practical roadmap and clear guidance for
implementing Zero Trust. Microsoft’s set of Copilots are built on top of existing
platforms, which inherit the protections applied to those platforms. For the details of
applying Zero Trust to Microsoft’s platforms, see the Zero Trust Guidance Center. By
implementing these protections, you are building a foundation of Zero Trust security.
This article draws from that guidance to prescribe the Zero Trust protections that relate
to Copilot.
ノ Expand table
1 Web-grounded prompts to the Internet Basic security hygiene for users and
devices using identity and access
policies.
4 Web-grounded prompts to the Internet and All the components listed above.
access to Copilot for Microsoft 365 with Edge
browser page summarization enabled
Microsoft Copilot
Internet
In the illustration:
Users can interact with Copilot through copilot.microsoft.com, Windows, Bing, the
Edge browser, and the Copilot mobile app.
Prompts are Web-grounded. Copilot only uses publicly available data to respond
to prompts.
With this configuration, your organization data isn’t included in the scope of data that
Copilot references.
Use this stage to implement identity and access policies for users and devices to prevent
bad actors from using Copilot. At a minimum, you must configure Conditional Access
policies that require:
Microsoft Copilot
Web-grounded
prompts
Internet
Open browser tabs
(if enabled)
Here are some examples of private or organization web pages and document types that
Copilot in Edge can summarize:
7 Note
For the current list of document types supported by Copilot in Edge for analysis
and summarization, see Copilot in Edge webpage summarization behavior.
Potentially sensitive organization sites and documents that Copilot in Edge can
summarize could be stored in local, intranet, or cloud locations. This organization data
can be exposed to an attacker who has access to the device and uses Copilot in Edge to
quickly produce summarizations of documents and sites.
The organization data that can be summarized by Copilot in Edge can include:
PDFs or information displayed in an Edge browser tab by local apps that are not
protected with MAM policies
Intranet resources
PDFs or sites for internal apps and services that are not protected by Microsoft
Purview DLP policies, MAM policies, or MDM policies
Microsoft 365 sites that are not protected by Microsoft Purview DLP policies, MAM
policies, or MDM policies
PDFs on virtual machines or sites for SaaS apps that are not protected by Microsoft
Purview DLP policies, MAM policies, or MDM policies
Third-party cloud product sites for cloud-based SaaS apps and services that are
not protected by Microsoft Purview DLP policies, MAM policies, or MDA policies
Use this stage to implement levels of security to prevent bad actors from using Copilot
to more quickly discover and access sensitive data. At a minimum, you must:
Copilot in Edge
Copilot in Edge webpage summarization behavior
This illustration shows the data sets available to Microsoft Copilot in Edge with browser
summarization enabled.
Microsoft Copilot
Local Intranet
Microsoft 365
Microsoft Azure
Third party
CIoud
Turn on Microsoft Defender for Office 363 Plan 1, which include Exchange Online
Protection (EOP) for Safe Attachments, Safe Links, advanced phishing thresholds
and impersonation protection, and real-time detections.
Internet
For more information, see Apply principles of Zero Trust to Microsoft Copilot for
Microsoft 365.
Recommendations for E3
Implement the following:
Sensitivity labels
Retention policies
Recommendations for E5
Implement the recommendations for E3 and the following:
Graph-grounded prompts that are sent to Copilot for Microsoft 365 (toggle set to
Work).
Web-grounded prompts that primarily use internet data (toggle set to Web).
Web-grounded
prompts
Graph-grounded
prompts copilot.microsoft.com Windows Bing Copilot mobile app Edge
In the diagram:
Users on devices with a license for Copilot for Microsoft 365 can choose Work or
Web mode for Microsoft Copilot prompts.
If Work is chosen, Graph-grounded prompts are sent to Copilot for Microsoft 365
for processing.
If Web is chosen, Web-grounded prompts entered via Windows, Bing, or Edge use
internet data in its processing.
In the case of Edge and when enabled, Windows Copilot includes some types of
data in open Edge tabs in its processing.
If the user does not have a license for Copilot for Microsoft 365, the Work/Web toggle
is not displayed and all prompts are Web-grounded.
Here are the sets of accessible organization data for Microsoft Copilot, which include
both Graph- and Web-grounded prompts.
Microsoft Copilot
Web-grounded
prompts
Graph-grounded
prompts
copilot.microsoft.com Windows Bing Copilot mobile app Edge
Internet
In the illustration, the yellow shaded blocks are for your organization data that is
accessible through Copilot. Access to this data by a user through Copilot depends on
the permissions to the data assigned to the user account. It can also depend on the
status of the user’s device if conditional access is configured for either the user or for
access to the environment where the data resides. Following the principles of Zero Trust,
this is data you want to protect in case an attacker compromises a user account or
device.
For Web-grounded prompts from the Edge browser with open browser tab
summarization enabled (toggle set to Web), this can include organization data that
can be summarized by Copilot in Edge from local, intranet, and cloud locations.
Use this stage to verify your implementation of the following levels of security to
prevent bad actors from using Copilot to access your sensitive data:
Recommendations for E3
Review your configuration and the features of Defender for Office 365 Plan 1 and
Defender for Endpoint Plan 1 and implement additional capabilities as needed.
Set up appropriate levels of protection for Microsoft Teams.
Recommendations for E5
Implement the recommendations for E3 and extend the XDR capabilities in your
Microsoft 365 tenant:
Configuration summary
This figure summarizes Microsoft Copilot configurations and the resulting accessible
data that Copilot uses to respond to prompts.
Microsoft Copilot configurations and resulting accessible data
Web-grounded prompts Graph-grounded prompts
disabled
(Work/Web toggle
not available)
summarization
Microsoft 365 licenses
disabled
With Copilot for
This table includes Zero Trust recommendations for your chosen configuration.
ノ Expand table
Without Copilot for For Web-grounded None required, but highly recommended for
Microsoft 365 licenses prompts, internet data overall security hygiene.
(Work/Web toggle only
not available)
AND
Without Copilot for For Web-grounded For your Microsoft 365 tenant, see Zero Trust
Microsoft 365 licenses prompts: for Copilot for Microsoft 365 and apply Zero
(Work/Web toggle Trust protections.
not available) - Internet data
- Organization data on For organization data on local, intranet, and
AND local, intranet, and cloud cloud locations, see Manage devices with
locations that Copilot in Intune Overview for MAM and MDM policies.
Edge browser page Edge can summarize Also see Manage data privacy and data
summarization protection with Microsoft Priva and Microsoft
enabled Purview for DLP policies.
Configuration Accessible data Zero Trust recommendations
With Copilot for For Graph-grounded For your Microsoft 365 tenant, see Zero Trust
Microsoft 365 licenses prompts: for Copilot for Microsoft 365 and apply Zero
(Work/Web toggle Trust protections.
available) - Microsoft 365 tenant
data
AND - Internet data if the
web plug-in is enabled
Edge browser page - Data for Copilot-
summarization enabled plug-ins and
disabled connectors
For Web-grounded
prompts, only internet
data
With Copilot for For Graph-grounded For your Microsoft 365 tenant, see Zero Trust
Microsoft 365 licenses prompts: for Copilot for Microsoft 365 and apply Zero
(Work/Web toggle Trust protections.
available) - Microsoft 365 tenant
data For organization data on local, intranet, and
AND - Internet data if the cloud locations, see Manage devices with
web plug-in enabled Intune Overview for MAM and MDM policies.
Edge browser page - Data for Copilot- Also see Manage data privacy and data
summarization enabled plug-ins and protection with Microsoft Priva and Microsoft
enabled connectors Purview for DLP policies.
For Web-grounded
prompts:
- Internet data
- Organization data that
can be rendered in an
Edge browser page,
including local, cloud,
and intranet resources
Next steps
See these additional articles for Zero Trust and Microsoft's Copilots:
Overview
Microsoft Copilot for Microsoft 365
Microsoft Copilot for Security
References
Refer to these links to learn about the various services and technologies mentioned in
this article.
Copilot in Edge
Copilot in Edge webpage summarization behavior
Manage Copilot in Windows
Manage access to public web content in Microsoft Copilot for Microsoft 365
responses
Data, Privacy, and Security for Microsoft Copilot for Microsoft 365
Feedback
Was this page helpful? Yes No
Apply principles of Zero Trust to
Microsoft Copilot for Microsoft 365
Article • 04/12/2024
Summary: To apply Zero Trust principles to Microsoft Copilot for Microsoft 365, you
need to apply seven layers of protection in your Microsoft 365 tenant:
1. Data protection
2. Identity and access
3. App protection
4. Device management and protection
5. Threat protection
6. Secure collaboration with Teams
7. User permissions to data
Introduction
Before you introduce Microsoft Copilot for Microsoft 365 or Copilot into your
environment, Microsoft recommends that you build a strong foundation of security.
Fortunately, guidance for a strong security foundation exists in the form of Zero Trust.
The Zero Trust security strategy treats each connection and resource request as though
it originated from an uncontrolled network and a bad actor. Regardless of where the
request originates or what resource it accesses, Zero Trust teaches us to "never trust,
always verify."
This article provides steps to apply the principles of Zero Trust security to prepare your
environment for Copilot in the following ways:
ノ Expand table
Verify Always authenticate and authorize Enforce the validation of user credentials,
explicitly based on all available data points. device requirements, and app permissions
and behaviors.
Use least Limit user access with Just-In- Validate JEA across your organization to
privileged Time and Just-Enough-Access eliminate oversharing by ensuring that
access (JIT/JEA), risk-based adaptive correct permissions are assigned to files,
policies, and data protection. folders, Teams, and email. Use sensitivity
Zero Trust Definition Met by
principle
Assume Minimize blast radius and Use Exchange Online Protection (EOP) and
breach segment access. Verify end-to- Microsoft Defender XDR services to
end encryption and use analytics automatically prevent common attacks and to
to get visibility, drive threat detect and respond to security incidents.
detection, and improve defenses.
For the basics of Copilot, see the overview and how to get started.
Logical architecture
You apply Zero Trust principles for Copilot across the entire architecture, from users and
devices to the application data that they have access to. The following diagram shows
the logical architecture components.
Users and devices
Microsoft Graph
Organization data
(Example data)
OneDrive Exchange
Online
User folders
Recordings
and files
SharePoint
Teams Chat
Communication
Team sites
Viva Engage groups
sites
In the diagram:
User devices have Microsoft 365 apps installed from which users can initiate
Copilot prompts
Copilot components include:
The Copilot service, which orchestrates the responses to user prompts
An instance of the Microsoft Graph for the data of your Microsoft 365 tenant
Your Microsoft 365 tenant that contains your organization data
3 Deploy or validate your App Protection policies Use least privileged access
Assume breach
If you're NOT using any of the protections described in the step, take the time to
pilot and deploy them prior to assigning Copilot licenses.
If you're using some of the protections described in the step, use the information
in the step as a checklist and verify that each protection stated has been piloted
and deployed prior to assigning Copilot licenses.
For the latest Copilot support for security-related and other features of Microsoft 365,
see Copilot requirements.
7 Note
Beginning on January 1, 2024, Copilot will be generally available for Microsoft 365
A3 and A5 faculty. See this technical community post for more information.
These data protection capabilities can also be used to ensure that your organization
complies with data regulations, such as those dealing with protecting personal
information.
The following capabilities from Microsoft Purview strengthen your data security and
compliance for Copilot:
For more information, see Microsoft Purview data security and compliance protections
for Microsoft Copilot and Considerations for deploying Microsoft Purview data security
and compliance protections for Copilot.
Consider augmenting manual labeling by using the sensitivity label policy settings of a
default label and mandatory labeling. A default label helps to set a base level of
protection settings that you want applied to all your content. Mandatory labeling
ensures users label documents and emails. However, without comprehensive user
training and other controls, these settings can result in inaccurate labeling.
Extend your data loss prevention policies to more locations and use a greater
range of classifiers to find sensitive information.
Retention labels can be automatically applied when sensitive information is found
that needs different settings from your retention policies, or a higher level of
management.
To help you better understand your sensitive data and how it’s being labeled, use
activity explorer and the full capabilities of content explorer.
Ensure that you include Microsoft 365 Services and your other SaaS apps in the scope of
these policies.
If your environment includes hybrid identities with on-premises Active Directory Domain
Services, be sure to deploy Microsoft Entra Password Protection. This capability detects
and blocks known weak passwords and their variants and can also block more weak
terms within passwords that are specific to your organization.
For more information about implementing protection for identity and access based on
your licensing plan, see Increase sign-in security for hybrid workers with MFA.
Microsoft 365 E5 and Microsoft Entra ID P2 both include more protection for privileged
accounts. Implement the capabilities summarized in the following table.
ノ Expand table
Capability Resources
Privileged Identity Provides protections for privileged accounts that access resources,
Management (PIM) including resources in Microsoft Entra ID, Azure, and other Microsoft
Online Services such as Microsoft 365 or Microsoft Intune. See Plan a
Privileged Identity Management deployment.
Microsoft Purview Allows granular access control over privileged Exchange Online admin
Privileged Access tasks in Office 365. It can help protect your organization from breaches
Management that use existing privileged admin accounts with standing access to
Capability Resources
Finally, consider implementing access reviews as part of your overall JEA strategy. Access
reviews enable your organization to efficiently manage group memberships, access to
enterprise applications, and role assignments. User's access can be reviewed regularly to
make sure only the right people have the appropriate continued access.
With APP, Intune creates a wall between your organization data and personal data. APP
ensure that organization data in specified apps can't be copied and pasted to other
apps on the device, even if the device isn't managed.
Devices are enrolled in Microsoft Intune and must meet health and compliance
requirements.
You can administer settings and features on devices.
You can monitor your devices for their level of risk.
You can proactively prevent data loss.
Next, begin to enroll devices into management. Once enrolled, set up compliance
policies and then require healthy and compliant devices. Finally, you can deploy device
profiles, also known as configuration profiles, to manage settings and features on
devices.
Microsoft 365 E5 also includes endpoint data loss prevention (DLP). If your organization
already understands your data, has developed a data sensitivity schema, and applied the
schema, you might be ready to extend elements of this schema to endpoints by using
Microsoft Purview DLP policies.
To deploy these device protection and management capabilities, use the following
articles:
You can automatically prevent common types of email and device-based attacks.
You can use features to reduce the attack surface area of Windows devices.
You can detect and respond to security incidents with a comprehensive suite of
threat protection services.
EOP overview
Preset security policies
Capability Resources
Microsoft Defender Application Guard for Edge Microsoft Defender Application Guard overview
These capabilities can be configured directly on the client, by using Group Policy Objects
(GPOs), or by using a device management tool, including Intune. However, you can
manage settings on devices in Intune only by deploying configuration profiles, which is
a feature of Microsoft 365 E5.
For more information and a description of this illustration, see Evaluate and pilot
Microsoft Defender XDR.
After deploying Microsoft Defender XDR, integrate these eXtended detection and
response (XDR) tools with Microsoft Sentinel. Microsoft Sentinel is licensed and billed
separately from Microsoft 365 E5. Use these resources for more information:
Implement Microsoft Sentinel and Microsoft Defender XDR for Zero Trust
Plan costs and understanding Microsoft Sentinel pricing and billing
External sharing
Introducing Copilot is a good time to review your policies for sharing files with people
outside your organization and for allowing external contributors. Guest accounts aren't
licensed to use Copilot.
For sharing with people outside your organization, you might need to share information
of any sensitivity. See these resources:
Apply best practices for sharing files and folders with unauthenticated users
Limit accidental exposure to files when sharing with people outside your
organization
Create a secure guest sharing environment
For collaborating with people outside your organization, see these resources:
Collaborate on documents to share individual files or folders
Collaborate on a site for guests in a SharePoint site
Collaborate as a team for guests in a team
Collaborate with external participants in a channel for people outside the
organization in a shared channel
These features can help you identify files in Microsoft Teams, SharePoint sites,
OneDrive locations, within email, in chat conversations, in your on-premises
infrastructure, and on endpoint devices either containing sensitive information or
classified content, then automatically apply controls to limit their access.
At the site team and container level within Microsoft Teams and SharePoint
You can audit access to shared content at the site and team level and enforce
restrictions that limits information discovery to only those who should have access.
To help automate this process even more, Microsoft Syntex – SharePoint Advanced
Management helps you find potential oversharing with your SharePoint and
Microsoft Teams files.
Applying protections and deploying Copilot in
parallel
To streamline the assignment of Copilot licenses in your tenant with the appropriate
protections in place, you do both in parallel. The following diagram shows how you can
move through the phases of rolling out protections prior to assigning Copilot licenses to
individual user accounts and their devices once they're protected.
Devices Test device Apply device Enroll the rest of the endpoints
protections with protections to the in larger increments
the same 50 users same users
Copilot licenses Assign Copilot licenses to users AFTER their account and devices are
protected
As the diagram also shows, you can roll out information protection across your
organization while you're deploying identity and device access protections.
Training
ノ Expand table
Training Get started with Copilot
This learning path walks you through the basics of Copilot, showcases its
versatility across various Microsoft 365 applications, and offers advice on
maximizing its potential.
Start >
ノ Expand table
This learning path examines the Copilot design, its security and compliance
features, and provides instruction on how to implement Copilot.
Start >
Next steps
Watch the How to get ready for Copilot video.
See these additional articles for Zero Trust and Microsoft's Copilots:
Overview
Microsoft Copilot
Microsoft Copilot for Security
Also see:
Microsoft Purview data security and compliance protections for Microsoft Copilot
Data, Privacy, and Security for Copilot for Microsoft 365
Copilot for Microsoft 365 documentation
Summary poster
For a visual summary of the information in this article, see the Copilot architecture &
deployment poster.
PDF | Visio
Use the Visio file to customize these illustrations for your own use.
References
Refer to these links to learn about the various services and technologies mentioned in
this article.
Feedback
Was this page helpful? Yes No
Apply principles of Zero Trust to
Microsoft Copilot for Security
Article • 04/12/2024
Summary: To apply Zero Trust principles to your environment for Microsoft Copilot for
Security, you need to apply five layers of protection:
1. Protect admin and SecOps staff user accounts with identity and access policies.
2. Apply least privilege access to admin and SecOps staff user accounts, including
assigning the minimum user account roles.
3. Manage and protect admin and SecOps staff devices.
4. Deploy or validate your threat protection.
5. Secure access to third-party security products that you integrate with Copilot for
Security.
Introduction
As a part of introducing Microsoft Copilot for Security into your environment, Microsoft
recommends that you build a strong foundation of security for your admin and SecOps
staff user accounts and devices. Microsoft also recommends ensuring you have
configured threat protection tools. If you’re integrating third-party security products
with Copilot for Security, also ensure you’ve protected access to these products and
related data.
Fortunately, guidance for a strong security foundation exists in the form of Zero Trust.
The Zero Trust security strategy treats each connection and resource request as though
it originated from an uncontrolled network and a bad actor. Regardless of where the
request originates or what resource it accesses, Zero Trust teaches us to "never trust,
always verify."
From within security portals, Copilot for Security provides a natural language, assistive
copilot experience that helps support:
Copilot for Security uses data from event logs, alerts, incidents, and policies for your
Microsoft and third-party subscriptions and security products. If an attacker
compromises an admin or security staff user account that has been assigned a Copilot
for Security role, they can use Copilot for Security and its results to understand how
your SecOps team is addressing attacks in progress. An attacker can then use this
information to thwart attempts to respond to an incident, possibly one that they
initiated.
Consequently, it’s critical to ensure that you’ve applied appropriate mitigations within
your environment.
Logical architecture
The first line of defense when introducing Copilot for Security is to apply the principles
of Zero Trust to the accounts and devices of admin and SecOps staff. It’s also important
to ensure your organization applies the principle of least privilege. In addition to
Copilot-specific roles, the assigned roles for admin and SecOps staff within your security
tools determine what data they have access to while using Copilot for Security.
It’s easy to understand why these mitigations are important by looking at the logical
architecture of Copilot for Security shown here.
Admin and SecOps Security products with Microsoft Copilot for Security service architecture
users and devices Copilot experiences
Microsoft Entra
Sources
Microsoft Defender
External Attack Surface
Management (EASM) Preinstalled plugins Files you upload
In the diagram:
SecOps team members can prompt using a copilot experience, such as those
offered by Copilot for Security, Microsoft Defender XDR, and Microsoft Intune.
The Copilot for Security service, which orchestrates responses to user and skill-
based prompts.
Plugins for specific products. Preinstalled plugins for Microsoft products are
provided. These plugins preprocess and post-process prompts.
Your subscription data. The SecOps data for event logs, alerts, incidents, and
policies stored in the subscriptions. For more information, see this Microsoft
Sentinel article for the most common data sources for security products.
Files you upload. You can upload specific files to Copilot for Security and include
these in the scope of prompts.
Each Microsoft security product with a copilot experience only provides access to the
data set associated with that product, such as event logs, alerts, incidents, and policies.
Copilot for Security provides access to all the data sets to which the user has access.
For more information, see Get started with Microsoft Copilot for Security.
How does on-behalf-of authentication work with Copilot
for Security?
Copilot for Security uses on-behalf-of (OBO) authentication provided by OAuth 2.0. This
is an authentication flow provided by delegation in OAuth. When a SecOps user issues a
prompt, Copilot for Security passes the user’s identity and permissions through the
request chain. This prevents the user gaining permission to resources for which they
shouldn't have access.
For more information about OBO authentication, see Microsoft identity platform and
OAuth2.0 On-Behalf-Of flow.
Here's the logical architecture when issuing prompts from within the Microsoft Intune
embedded experience.
Admin and SecOps Security products with Microsoft Copilot for Security service architecture
users and devices Copilot experiences
Microsoft Entra
Sources
Microsoft Defender
External Attack Surface
Preinstalled plugins Files you upload
Management (EASM)
Microsoft Entra ID Microsoft Defender Examples — playbooks,
Microsoft Sentinel for Endpoint
Microsoft Intune your organization policies
Additional including Microsoft Purview Microsoft Defender
third-party Threat Intelligence
Microsoft Sentinel
In the diagram:
Intune admins use the Microsoft Copilot in Intune experience to submit prompts.
The Copilot for Security component orchestrates responses to the prompts using:
The Intune data for devices, policies, and security posture stored in your
Microsoft 365 subscription.
Here's the logical architecture of Copilot for Security with third-party security products.
Sources
In the diagram:
Copilot for Security integrates with third-party security products through plugins.
These plugins provide access to the data associated with the product, such as logs
and alerts.
These third-party components reside outside the Microsoft security trust
boundary.
ノ Expand table
1 Deploy or validate identity and access policies for admin and Verify explicitly
SecOps staff.
2 Apply least privilege to admin and SecOps user accounts. Use least privileged access
Assume breach
There are several approaches you can take to onboarding admin and SecOps staff to
Copilot for Security while you configure protections for your environment.
Least privileged Configure least Configure least Configure least privileges for
privilege for your privilege for your the rest of your admins and
access test group pilot group SecOps users
Copilot for Security Introduce Copilot for Security to admins AFTER their identities and devices are
access protected and they have been configured for least privilege. Only assign the
Copilot Owner role after these protections are verified.
In the illustration:
In the Evaluate phase, you pick a small set of admin and SecOps users that you
want to have access to Copilot for Security and apply identity and access and
device protections.
In the Pilot phase, you pick the next set of admin and SecOps users and apply
identity and access and device protections.
In the Full deployment phase, you apply identity and access and device
protections for the rest of your admin and SecOps users.
At the end of each phase, you assign the appropriate role in Copilot for Security to
the user accounts.
If you're NOT using any of the protections described in the step, take the time to
pilot and deploy them to your admin and SecOps staff prior to assigning roles that
include Copilot for Security.
If you're already using some of the protections described in the step, use the
information in the step as a checklist and verify that each protection stated has
been piloted and deployed prior to assigning roles that include Copilot for
Security.
User accounts are required to use multifactor authentication (MFA) (so their access
can't be compromised by guessing user passwords alone) and they're required to
change their passwords when high-risk activity is detected.
Devices must comply with Intune management and device compliance policies.
For identity and access policy recommendations, see the identity and access step in Zero
Trust for Microsoft Copilot for Microsoft 365. Based on the recommendations in this
article, ensure that your resulting configuration applies the following policies for all
SecOps staff user accounts and their devices:
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
In the diagram, the recommended policies for Microsoft Entra Conditional Access,
Intune device compliance, and Intune app protection are illustrated for each of the three
levels:
Each of these policies is described in greater detail in Common Zero Trust identity and
device access policies for Microsoft 365 organizations.
ノ Expand table
Microsoft Security These Microsoft Entra roles inherit the Copilot owner role in
Entra ID Administrator Copilot for Security. Only use these privileged roles to onboard
Copilot for Security to your organization.
Global
Administrator
Copilot for Copilot owner These two roles include access to use Copilot for Security. Most
Security of your admin and SecOps staff can use the Copilot
Copilot contributor role.
contributor
The Copilot owner role includes the ability to publish custom
plugins and to manage settings that affect all of Copilot for
Security.
It’s important to know that, by default, all users in the tenant are given Copilot
contributor access. With this configuration, access to your security tool data is governed
by the permissions you configured for each of the security tools. An advantage of this
configuration is that the embedded experiences of Copilot for Security are immediately
available to your admin and SecOps staff within the products they use daily. This works
well if you’ve already adopted a strong practice of least privileged access within your
organization.
If you’d like to take a staged approach to introducing Copilot for Security to your admin
and SecOps staff while you tune up least privileged access in your organization, remove
All users from the Copilot contributor role and add security groups as you're ready.
For more information, see these Microsoft Copilot for Security resources:
Get started
Understand authentication
Review the privileges granted for the specific products your admin and SecOps
staff work with. For example, for Microsoft Entra, see Least privileged roles by task.
Use Microsoft Entra Privileged Identity Management (PIM) to gain greater control
over access to Copilot for Security.
Use Microsoft Purview Privileged Access Management to configure granular access
control over privileged admin tasks in Office 365.
Microsoft Entra Privileged Identity Management (PIM) allows you to manage, control,
and monitor the roles required to access Copilot for Security. With PIM, you can:
Microsoft Purview Privileged Access Management helps protect your organization from
breaches and helps to meet compliance best practices by limiting standing access to
sensitive data or access to critical configuration settings. Instead of administrators
having constant access, just-in-time access rules are implemented for tasks that need
elevated permissions. Instead of administrators having constant access, just-in-time
access rules are implemented for tasks that need elevated permissions. For more
information, see Privileged access management.
For more information on how to configure a device for privileged access, see Securing
devices as part of the privileged access story.
To require these devices, be sure to update your Intune device compliance policy. If
you're transitioning admin and SecOps staff to hardened devices, transition your
security groups from the original device compliance policy to the new policy. The
Conditional Access rule can remain the same.
ノ Expand table
Scope Description and resources
Microsoft 365 and See the Zero Trust for Microsoft Copilot for Microsoft 365 article for
SaaS apps integrated guidance on how to ramp up threat protection beginning with
with Microsoft Entra Microsoft 365 E3 plans and progressing with Microsoft E5 plans.
For Microsoft 365 E5 plans, also see Evaluate and pilot Microsoft
Defender XDR security.
Your Azure cloud Use the following resources to get started with Defender for Cloud:
resources
- Microsoft Defender for Cloud
Your resources in other - Apply Zero Trust principles to IaaS applications in AWS
cloud providers, such
as Amazon Web
Services (AWS)
Your digital estate with The Implement Microsoft Sentinel and Microsoft Defender XDR for Zero
all Microsoft XDR tools Trust solution guide walks through the process of setting up Microsoft
and Microsoft Sentinel eXtended detection and response (XDR) tools together with Microsoft
Sentinel to accelerate your organization’s ability to respond to and
remediate cybersecurity attacks.
For protection with identity and device access policies, changes to common policies for
SaaS apps are outlined in red in the following diagram. These are the policies to which
you can add your third-party security products.
Zero Trust identity and device access policies for SaaS apps
Protection Device Microsoft Entra Conditional Access Intune device Intune app
level type compliance protection
policies policy policies
Changes from the common PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the
Identity add-on, Office 365 with EMS E5, or
March 2024
identity and device access policies Phones and tablets include devices running the iOS, iPadOS, or Android platforms individual Microsoft Entra ID P2 licenses
For your third-party security products and apps, consider creating a dedicated set of
policies for these. This allows you to treat your security products with greater
requirements compared to productivity apps, like Dropbox and Salesforce. For example,
add Tanium and all other third-party security products to the same set of Conditional
Access policies. If you want to enforce stricter requirements for devices for your admin
and SecOps staff, also configure unique policies for Intune device compliance and
Intune app protection and assign these policies to your admin and SecOps staff.
For more information about adding your security products to Microsoft Entra ID and to
the scope of your Conditional Access and related policies (or configuring a new set of
policies), see Add SaaS apps to Microsoft Entra ID and to the scope of policies.
Here's the logical architecture of Copilot for Security with the Tanium Skills plugin.
Microsoft Copilot for Security service architecture
Sources
In the diagram:
1. Use the Microsoft Entra ID Application Gallery to find and add Tanium SSO to your
tenant. See Add an enterprise application. For a Tanium-specific example, see
Microsoft Entra SSO integration with Tanium SSO.
2. Add Tanium SSO to the scope of your Zero Trust identity and access policies.
Next steps
Watch the Discover Microsoft Copilot for Security video .
See these additional articles for Zero Trust and Microsoft's Copilots:
Overview
Microsoft Copilot
Microsoft Copilot for Microsoft 365
Feedback
Was this page helpful? Yes No
Overview – Apply Zero Trust principles
to Azure services
Article • 05/10/2024
Summary: To apply Zero Trust principles to Azure services, you need to determine the
set of infrastructure components required to support your desired workload, and then
apply Zero Trust principles to those components.
This series of articles helps you apply the principles of Zero Trust to your services in
Microsoft Azure using a multi-disciplinary methodology. Zero Trust is a security strategy.
It is not a product or a service, but an approach in designing and implementing the
following set of security principles:
Verify explicitly
Use least privileged access
Assume breach
Implementing the Zero Trust “never trust, always verify” mindset requires changes to
cloud infrastructure, deployment strategy, and implementation.
These articles show you how to apply Zero Trust approach to these new or already
deployed Azure services:
Content architecture
Here is the content architecture for this set of articles that contain the set of platform
and workload articles to apply Zero Trust principles to Azure services.
Workloads
Azure Virtual
Virtual Machines
Desktop
IaaS apps in Amazon
Web Services Spoke VNet with Azure IaaS services Spoke VNet with Azure PaaS services
Storage
Platform
Hub VNets (traditional) OR
managed)
You apply the guidance in the articles in a stack from the bottom up.
ノ Expand table
It’s important to note that the guidance in this series of articles is more specific for this
type of architecture than the guidance provided in the Cloud Adoption Framework and
Azure landing zone architectures. If you have applied the guidance in either of these
resources, be sure to also review this series of articles for additional recommendations.
References
Refer to the links below to learn about the various services and technologies mentioned
in this article.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Documentation set Helps you... Roles
Concepts and deployment objectives Apply Zero Trust protections IT teams and security
for general deployment guidance for aligned with technology staff
technology areas areas.
Zero Trust for small businesses Apply Zero Trust principles Customers and partners
to small business customers. working with Microsoft
365 for business
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and IT
(RaMP) for project management of Zero Trust protection. implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
detailed design and deployment
guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security staff
and specializations solutions.
Develop using Zero Trust principles Apply Zero Trust protections Application developers
for application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Concepts and deployment objectives for Apply Zero Trust protections
security team general deployment guidance for aligned with technology
technology areas areas.
Role Documentation set Helps you...
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Feedback
Was this page helpful? Yes No
Overview – Apply Zero Trust principles
to Azure IaaS
Article • 04/12/2024
Summary: To apply Zero Trust principles to Azure IaaS components and infrastructure,
you must first understand the common reference architecture and the components of
Azure storage, virtual machines, and spoke and hub virtual networks.
This series of articles help you apply the principles of Zero Trust to your workloads in
Microsoft Azure IaaS based on a multi-disciplinary approach to applying the Zero Trust
principles. Zero Trust is a security strategy. It isn't a product or a service, but an
approach in designing and implementing the following set of security principles:
Verify explicitly
Use least privileged access
Assume breach
Implementing the Zero Trust mindset to "assume breach, never trust, always verify"
requires changes to cloud infrastructure, deployment strategy, and implementation.
These initial series of five articles (including this introduction) show you how to apply
Zero Trust approach to a common IT business scenario based on infrastructure services.
The work is broken into units that can be configured together as follows:
Azure storage
Virtual machines
Spoke virtual networks (VNets) for virtual machine-based workloads
Hub VNets to support access to many workloads in Azure
For more information, see Apply Zero Trust principles to Azure Virtual Desktop.
7 Note
Additional articles will be added to this series in the future, including how
organizations can apply a Zero Trust approach to applications, networking, data,
and DevOps services based on real IT business environments.
) Important
This Zero Trust guidance describes how to use and configure several security
solutions and features available on Azure for a reference architecture. Several other
resources also provide security guidance for these solutions and features, including:
To describe how to apply a Zero Trust approach, this guidance targets a common
pattern used in production by many organizations: a virtual-machine-based application
hosted in a VNet (and IaaS application). This is a common pattern for organizations
migrating on-premises applications to Azure, which is sometimes referred to as "lift-
and-shift." The reference architecture includes all components necessary to support this
application, including storage services and a hub VNet.
If you're interested in learning about the guidance recommended in the Cloud Adoption
Framework Azure landing zones, see these resources:
Reference architecture
The following figure shows the reference architecture for this Zero Trust guidance.
Internet Azure
APP GW subnet
User NSG
Front end tier subnet
ASG ASG
AppGw (WAF)
Admin VM VM
Bastion
VPN GW NSG
Data tier subnet
Security (HUB) VNET ASG ASG
VM VM
Azure Files
Admin
On-premises
datacenter
Multiple IaaS components and elements, including different types of users and IT
consumers accessing the app from different sites. such as Azure, the internet, on-
premises, and branch offices.
A common three-tier application containing a front end tier, application tier, and
data tier. All tiers run on virtual machines within a VNet named SPOKE. Access to
the app is protected by another VNet named HUB that contains additional security
services.
Some of the most used PaaS services on Azure that support IaaS applications,
including role-based access control (RBAC) and Microsoft Entra ID, which
contribute to the Zero Trust security approach.
Storage Blobs and Storage Files that provide object storage for the applications
and files shared by users.
This series of articles walk through the recommendations for implementing Zero Trust
for the reference architecture by addressing each of these larger pieces hosted in Azure,
as shown here.
Azure
APP GW subnet
2
NSG
Front end tier subnet
AppGw (WAF)
Bastion ASG ASG
VM VM
VPN GW
ASG ASG
VM VM
Azure Blob 3
Workload (SPOKE) VNET
1 NSG = Network Security Group
ASG = Application Security Group
Azure Files
The diagram outlines the larger areas of the architecture that are addressed by each
article in this series:
It’s important to note that the guidance in this series of articles is more specific for this
type of architecture than the guidance provided in the Cloud Adoption Framework and
Azure landing zone architectures. If you applied the guidance in either of these
resources, be sure to also review this series of articles for additional recommendations.
Entra ID (Tenant)
Resource
Storage resource group Virtual machine resource Spoke VNet resource Hub VNet resource group groups for
additional
group group
workloads
Storage accounts
Virtual machines for VNet VNet
Blob Storage Azure Files front end tier
service service App GW + WAF Bastion
Virtual machines for
Data set Data set Network security
app tier Azure Firewall
groups
1 2 3 4
In this diagram, the Azure infrastructure is contained within an Entra ID tenant. The
following table describes the different sections shown in the diagram.
Azure subscriptions
You can distribute the resources in more than one subscription, where each
subscription may hold different roles, such as network subscription, or security
subscription. This is described in the Cloud Adoption Framework and Azure
Landing Zone documentation previously referenced. The different subscriptions
may also hold different environments, such as production, development, and tests
environments. It depends on how you want to separate your environment and the
number of resources you'll have in each. One or more subscriptions can be
managed together using a Management Group. This gives you the ability to apply
permissions with role based access control (RBAC) and Azure policies to a group of
subscriptions instead of setting up each subscription individually.
For each Azure subscription, a set of Azure Monitor solutions and Defender for
Cloud is available. If you manage these subscriptions through a Management
Group, you're able to consolidate in a single portal for all the functionality of Azure
Monitor and Defender for Cloud. For example, Secure Score, provided by Defender
for Cloud, are consolidated for all your subscriptions, using a Management Group
as the scope.
The storage account is contained in a dedicated resource group. You can isolate
each storage account in a different resource group for more granular permission
control. Azure storage services are contained within a dedicated storage account.
You can have one storage account for each type of storage workload, for example
an Object Storage (also called Blob storage) and Azure Files. This provides more
granular access control and can improve performance.
Virtual machines are contained in one resource group. You can also have each
virtual machine type for workload tiers such as front end, application, and data in
different resource groups to further isolate access control.
Spoke (3) and hub (4) VNet resource groups in separate subscriptions
The network and other resources for each of the VNets in the reference
architecture are isolated within dedicated resource groups for spoke and hub
VNets. This organization works well when responsibility for these live on different
teams. Another option is to organize these components by putting all network
resources in one resource group and security resources in another. It depends on
how your organization is set up to manage these resources.
Microsoft Defender XDR Microsoft Defender for Cloud enabled for a management group
Microsoft Teams
Active Directory
Federation Services
Files, mailboxes, chat data,
videos, etc.
In the diagram:
Defender for Cloud is enabled for a management group that includes multiple
Azure subscriptions.
Microsoft Defender XDR is enabled for Microsoft 365 apps and data, SaaS apps
that are integrated with Microsoft Entra ID, and on-premises Active Directory
Domain Services (AD DS) servers.
For more information about configuring management groups and enabling Defender
for Cloud, see:
1. Protect data in all three modes: data at rest, data in transit, and data in use
2. Verify users and control access to storage data with the least privileges
3. Logically separate or segregate critical data with network controls
4. Use Defender for Storage for automated threat detection and protection
1. Leverage Microsoft Entra RBAC or set up custom roles for networking resources
2. Isolate infrastructure into its own resource group
3. Create a network security group for each subnet
4. Create an application security group for each virtual machine role
5. Secure traffic and resources within the VNet
6. Secure access to the VNet and application
7. Enable advanced threat detection and protection
ノ Expand table
Start >
Configure Azure Policy
ノ Expand table
Start >
ノ Expand table
Once you have deployed and secured your Azure environment, learn to monitor,
operate, and continuously improve the security of your solutions.
This learning path helps prepare you for Exam AZ-500: Microsoft Azure Security
Technologies.
Start >
ノ Expand table
Learn how to configure common Azure Storage security features like storage
access signatures.
In this module, you learn how to:
Configure a shared access signature (SAS), including the uniform resource
identifier (URI) and SAS parameters.
Configure Azure Storage encryption.
Implement customer-managed keys.
Recommend opportunities to improve Azure Storage security.
Start >
Configure Azure Firewall
ノ Expand table
You will learn how to configure the Azure Firewall including firewall rules.
After completing this module, you will be able to:
Determine when to use Azure Firewall.
Implement Azure Firewall including firewall rules.
Start >
For more training on security in Azure, see these resources in the Microsoft catalog:
Security in Azure | Microsoft Learn
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
Technical illustrations
This poster provides a single-page, at-a-glance view of the components of Azure IaaS as
reference and logical architectures, along with the steps to ensure that these
components have the "never trust, always verify" principles of the Zero Trust model
applied.
ノ Expand table
Item Related solution guides
PDF | Visio
Updated March 2024
This poster provides the reference and logical architectures and the detailed
configurations of the separate components of Zero Trust for Azure IaaS. Use the pages
of this poster for separate IT departments or specialties or, with the Microsoft Visio
version of the file, customize the diagrams for your infrastructure.
ノ Expand table
PDF | Visio
Updated March 2024
References
Refer to the following links to learn about the various services and technologies
mentioned in this article.
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to Azure
storage
Article • 04/12/2024
Summary: To apply Zero Trust principles to Azure storage, you must protect data (at
rest, in transit, and in use), verify users and control access, separate or segregate critical
data with network controls, and use Defender for Storage for automated threat
detection and protection.
This article provides steps to apply the principles of Zero Trust to Azure Storage:
ノ Expand table
Verify Always authenticate and authorize Verify user credentials and access.
explicitly based on all available data points.
Use least Limit user access with Just-In-Time Control access to storage data with least
privileged and Just-Enough-Access (JIT/JEA), risk- privileges.
access based adaptive policies, and data
protection.
Assume Minimize blast radius and segment Protect data at rest, data in transit, and
breach access. Verify end-to-end encryption data in use. Separate critical data with
and use analytics to get visibility, drive network controls. Use Defender for
threat detection, and improve Storage for automated threat detection
defenses. and protection.
This article is part of a series of articles that demonstrate how to apply the principles of
Zero Trust across an environment in Azure that includes Azure Storage services to
support an IaaS workload. For an overview, see Apply Zero Trust principles to Azure
infrastructure.
Azure subscription
Storage accounts
In the diagram:
The diagram doesn't include Azure Queues and Azure Tables. Use the same guidance in
this article to secure these resources.
What's in this article?
This article walks through the steps to apply the principles of Zero Trust across the
reference architecture.
ノ Expand table
1 Protect data in all three modes: data at rest, data in transit, Assume breach
data in use.
2 Verify users and control access to storage data with least Verify explicitly
privileges. Use least privileged access
4 Use Defender for Storage for automated threat detection Assume breach
and protection.
This configuration is enabled by default when you deploy a new Azure Storage Account
(Secure by Default).
Consider applying a policy to deny the deployment of insecure connections for Azure
Storage (Secure by Design).
For more information, see Prevent anonymous public read access to containers and
blobs.
You configure data protection for all three modes from the configuration settings of a
storage account, as shown here.
These settings can't be changed after you create the storage account.
Limiting copy operations to source storage accounts with private endpoints is the most
restrictive option and requires that the source storage account has private endpoints
enabled.
You configure a scope for copy operations from the configuration settings of a storage
account, as shown here.
You enable CMK from the Encryption blade when creating a storage account, as shown
here.
You can also enable infrastructure encryption, which provides double encryption at both
the service and infrastructure levels. This setting can't be changed after you create the
storage account.
7 Note
It is important to note that roles for storage accounts must be assigned at either the
management or data level. Thus, if you're using Microsoft Entra ID as the authentication
and authorization method, a user should be assigned the appropriate combination of
roles to give them the least amount of privilege necessary to complete their job
function.
For a list of Storage Account Roles for granular access see Azure built-in roles for
Storage. RBAC assignments are done through the Access Control option on the Storage
Account and can be assigned at various scopes.
You configure access control from the Access Control (IAM) settings of a storage
account, as shown here.
You can check the access levels of users, groups, service principals, or managed
identities and add a role assignment.
Another way to provide permissions that are time-bound is through Shared Access
Signatures (SAS). Best Practices when using SAS at a high level are the following:
Always use HTTPS. If you have deployed the suggested Azure Policies for Azure
landing zones , secure transfer via HTTPS will be audited.
Have a revocation plan.
Configure SAS expiration policies.
Validate permissions.
Use a user delegation SAS wherever possible. This SAS is signed with Microsoft
Entra credentials.
The following diagram highlights the network connections to the Azure Storage services
in the reference architecture.
Internet Azure
ノ Expand table
Task Description
Prevent public access, create Private endpoint allows you to connect to services with the
network segmentation with use of a single private IP address on the VNet using Azure
Private Endpoint and Private Private Link.
Link. Enabling private endpoints allows the Azure platform to
validate network connections and allow only the connection
Task Description
Use Azure Private Link Use Azure Private Link to access Azure Storage over a private
endpoint in your VNet. Use the approval workflow to
automatically approve or manually request, as appropriate.
Prevent public access to your You can do network segmentation using Service Endpoints by
data sources using Service enabling private IP addresses in a VNet to reach an endpoint
Endpoints without using public IP addresses.
You configure private endpoints from the Networking settings of a storage account, as
shown here.
Defender for Storage detects anomalous access pattern alerts such as:
For more information about threat protection across the reference architecture, see the
Apply Zero Trust principles to Azure IaaS overview.
Once enabled, Defender for Storage notifies you of security alerts and recommendations
for improving the security posture of your Azure storage accounts.
Here's an example security alert for a storage account with a description of the alert and
prevention measures highlighted.
Recommended training
ノ Expand table
Training Configure Storage security
Learn how to configure common Azure Storage security features like storage
access signatures.
In this module, you learn how to:
Configure a shared access signature (SAS), including the uniform resource
identifier (URI) and SAS parameters.
Configure Azure Storage encryption.
Implement customer-managed keys.
Recommend opportunities to improve Azure Storage security.
Start >
For more training on security in Azure, see these resources in the Microsoft catalog:
Security in Azure | Microsoft Learn
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
Technical illustrations
This poster provides a single-page, at-a-glance view of the components of Azure IaaS as
reference and logical architectures, along with the steps to ensure that these
components have the "never trust, always verify" principles of the Zero Trust model
applied.
ノ Expand table
Item Description
Virtual machines
Spoke VNets
Hub VNets
PDF | Visio
Updated March 2024
This poster provides the reference and logical architectures and the detailed
configurations of the separate components of Zero Trust for Azure IaaS. Use the pages
of this poster for separate IT departments or specialties or, with the Microsoft Visio
version of the file, customize the diagrams for your infrastructure.
ノ Expand table
Item Description
Virtual machines
Spoke VNets
Hub VNets
PDF | Visio
Updated March 2024
References
Refer to the links below to learn about the various services and technologies mentioned
in this article.
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to virtual
machines in Azure
Article • 04/12/2024
Summary: To apply Zero Trust principles to Azure virtual machines, you must configure
logical isolation with dedicated resource groups, leverage Role Based Access Control
(RBAC), secure virtual machine boot components, enable customer-managed keys and
double encryption, control installed applications, configure secure access and
maintenance of virtual machines, and enable advanced threat detection and protection.
This article provides steps to apply the principles of Zero Trust to virtual machines in
Azure:
ノ Expand table
Use least Limit user access with Just-In-Time and Leverage Role Based Access Control
privileged Just-Enough-Access (JIT/JEA), risk- (RBAC) and control the applications
access based adaptive policies, and data running on virtual machines.
protection.
Assume Minimize blast radius and segment Isolate virtual machines with resource
breach access. Verify end-to-end encryption groups, secure their components, use
and use analytics to get visibility, drive double encryption, and enable
threat detection, and improve defenses. advanced threat detection and
protection.
This article is part of a series of articles that demonstrate how to apply the principles of
Zero Trust across an environment in Azure that includes a spoke virtual network (VNet)
hosting a virtual machine-based workload. For an overview, see Apply Zero Trust
principles to Azure infrastructure.
Entra ID tenant
Resource group
Azure B
subscription Virtual machine
A
Resource group Applications
In this diagram:
This article walks through the steps to apply the principles of Zero Trust across this
logical architecture, using these steps.
Resource group 1 Configure logical isolation by deploying virtual
machines to a dedicated resource group
Disks
ノ Expand table
3 Secure virtual machine boot components including boot loaders, OS Assume breach
kernels, and drivers. Securely protect keys, certificates, and secrets in
the Trusted Platform Module (TPM).
5 Control the applications that are installed on virtual machines. Use least
privileged access
6 Configure secure access (not shown on the logical architecture figure). Verify explicitly
Use least
privileged access
Assume breach
7 Set up secure maintenance of virtual machines (not shown on the Assume breach
logical architecture figure).
8 Enable advanced threat detection and protection (not shown on the Assume breach
logical architecture figure).
Step 1: Configure logical isolation for virtual
machines
Begin by isolating virtual machines within a dedicated resource group. You can isolate
virtual machines into different resource groups based on purpose, data classification,
and governance requirements, such as the need to control permissions and monitoring.
Using dedicated resource groups allows you to set policies and permissions that apply
to all the virtual machines within the resource group. You can then use role based access
control (RBAC) to create least privileged access to the Azure resources contained in the
resource group.
For more information on creating and managing resource groups, see Manage Azure
resource groups by using the Azure portal.
You assign a virtual machine to a resource group when you first create the virtual
machine, as shown here.
The following built-in roles are commonly used for virtual machine access:
Virtual Machine User Login: View virtual machines in the portal and sign-in as a
regular user.
Virtual Machine Administration Login: View virtual machines in the portal and
sign-in to virtual machines as an Administrator.
Virtual Machine Contributor: Create and manage virtual machines, including reset
root user's password and managed disks. Doesn't grant access to the management
virtual network (VNet) or the ability to assign permissions to the resources.
To join a virtual machine to a VNet, you can use the custom permission
Microsoft.Network/virtualNetworks/subnets/join/action to make a custom role.
When this custom role is used with Managed Identity and Conditional Access Policy, you
can use device state, data classification, anomalies, location, and identity to force
multifactor authentication and granularly allow access based on verified trust.
To extend your realm of control beyond the system and allow your Microsoft Entra
tenant with Microsoft Intelligent Security Graph to support secure access, go to the
Management blade of the virtual machine and turn on System Assigned Managed
Identity, as shown here.
7 Note
This feature is only available for Azure Virtual Desktop, Windows Server 2019,
Windows 10, and Linux Distros using certificate-based access.
Step 3: Secure virtual machine boot
components
Follow these steps:
When you create the virtual machine, be sure you configure security for the boot
components. Enhanced deployment of virtual machines allows you to select
security type and use Secure boot and vTPM.
Securely deploy virtual machines with verified boot loaders, OS kernels, and drivers
that are signed by trusted publishers to establish a "root ." If the image isn't signed
by a trusted publisher, the virtual machine won't boot.
Securely protect keys, certificates, and secrets in the virtual machines in a Trusted
Platform Module.
Gain insights and confidence of the entire boot chain's integrity.
Ensure workloads are trusted and verifiable. The vTPM enables attestation by
measuring the entire boot chain of your virtual machine (UEFI, OS, system, and
drivers).
Enhanced deployment of virtual machines allows you to select security type and use
secure boot and vTPM when you create them, as shown here.
Step 4: Enable customer-managed keys and
double encryption
Using customer-managed keys and double encryption ensures that if a disk is exported,
it isn't readable or able to function. By ensuring that the keys are privately held and
disks are double encrypted, you protect against breaches that attempt to extract disk
information.
Enable server-side encryption at the host for end-to-end encryption of your virtual
machine data.
After completing these procedures, you use your customer-managed encryption key to
encrypt the disks within your virtual machine.
You select the encryption type on the Disks blade for the virtual machine configuration.
For Encryption type, select Double encryption with platform-managed and customer-
managed keys, as shown here.
Step 5: Control the applications installed on
virtual machines
It's important to control the applications that are installed on your virtual machines:
Browser extensions (APIs) are difficult to secure which can lead to malicious URL
delivery.
Unsanctioned apps can go unpatched as they're shadow IT objects (the IT teams
aren't prepared or have no knowledge that these are installed).
You can use the Virtual Machine Applications feature to control the applications that are
installed on virtual machines. With this feature, you select which virtual machine
applications to install. This feature uses the Azure Compute Gallery to simplify
management of applications for virtual machines. When used together with RBAC, you
can ensure that only trusted applications are available for users.
You select the virtual machine applications on the Advanced blade for the virtual
machine configuration, as show here.
In the diagram:
The following diagram shows the components of secure communications for virtual
machines.
NSG
APP GW subnet Front end tier subnet
VM VM
NSG
Data tier subnet
ASG ASG
Security (HUB) VNET VM VM
Azure Storage
(file)
Azure Storage Services
The following diagram shows the recommended policies for Zero Trust.
Zero Trust identity and device access policies
PCs include devices running the Windows or macOS platforms Requires Microsoft 365 E5, Microsoft 365 E3 with the E5
Phones and tablets include devices running the iOS, iPadOS, or Android platforms
Identity add-on, Office 365 with EMS E5, or individual March 2024
Microsoft Entra ID P2 licenses
Remember that usernames and passwords can be 100% compromised. Using multifactor
authentication, you reduce your risk of compromise by 99.9%. This requires Microsoft
Entra ID P1 licenses.
7 Note
You can use VPNs used to connect to virtual machines in Azure as well. However,
you should be sure to use methods to verify explicitly. Creating a tunnel that is
"trusted" regardless of how they are used can be riskier than having specific
connections that are highly verified.
Use PAWs
Use Privileged Access Workstations (PAWs) to ensure devices that access virtual
machines are healthy. PAWs are configured specifically for privileged access so that
admins use a device that has:
Using anti-malware
Automating virtual machine updates
Each Windows virtual machine - Update Management does a scan twice a day for
each machine.
Each Linux virtual machine - Update Management does a scan every hour.
Tenant 1
Entra ID directory
Defender for Cloud enabled for a management group with Defender for
Servers turned on
Management group
Azure Azure
subscription subscription
In the diagram:
As described in the Apply Zero Trust principles to Azure IaaS overview article,
Defender for Cloud is enabled at the level of an Azure subscription or at the level
of an Azure management group that includes multiple Azure subscriptions.
In addition to enabling Defender for Cloud, Defender for Servers is provisioned.
Advanced threat protection verifies the activities occurring on virtual machines based on
Microsoft's threat intelligence. It looks for specific configurations and activities that
suggest that there could be a breach. It enables the Verify explicitly and Assume breach
Zero Trust principles.
Recommended training
Learn how to use Azure Disk Encryption (ADE) to encrypt OS and data disks on
existing and new virtual machines.
In this module, you learn how to:
Determine which encryption method is best for your virtual machine.
Encrypt existing virtual machine disks using the Azure portal.
Encrypt existing virtual machine disks using PowerShell.
Modify Azure Resource Manager templates to automate disk encryption on
new virtual machines.
Start >
ノ Expand table
In this learning path, learn how to protect and harden your virtual machines in
Azure.
Start >
For more training on virtual machines in Azure, see these resources in the Microsoft
catalog:
Virtual machines in Azure | Microsoft Learn
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
Technical illustrations
This poster provides a single-page, at-a-glance view of the components of Azure IaaS as
reference and logical architectures, along with the steps to ensure that these
components have the "never trust, always verify" principles of the Zero Trust model
applied.
ノ Expand table
Item Description
This poster provides the reference and logical architectures and the detailed
configurations of the separate components of Zero Trust for Azure IaaS. Use the pages
of this poster for separate IT departments or specialties or, with the Microsoft Visio
version of the file, customize the diagrams for your infrastructure.
ノ Expand table
Item Description
References
Manage Azure resource groups with the Azure portal
Secure boot
Overview of vTPM
Attestation
Enable server-side encryption of Azure Disk Storage
AES 256 encryption
Azure Bastion
Azure multifactor authentication for Azure Virtual Desktop
Windows Servers 2019 or newer
Log in to a Linux VM with Microsoft Entra credentials
Common Zero Trust identity and device access policies
Privileged Access Workstations (PAW)
Privileged access deployment
Microsoft Anti-malware
Virtual Machine Agent
Plan deployment for updating Windows VMs in Azure - Azure Example Scenarios
Use Azure Private Link to securely connect networks to Azure Automation
Microsoft Defender for Servers
Microsoft Defender for Endpoint
Defender for Cloud's integrated vulnerability assessment
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to a spoke
virtual network in Azure
Article • 04/12/2024
Summary: To apply Zero Trust principles to a spoke virtual network in Azure, you must
leverage Role Based Access Control (RBAC), isolate subnets and virtual machines
(resource groups, network security groups, and application security groups), secure
traffic and resources within the VNet and virtual machine applications, and enable
advanced threat detection, alerting, and protection.
This article helps you apply the principles of Zero Trust to a spoke virtual network (VNet)
for IaaS workloads in Azure in the following ways:
ノ Expand table
Verify Always authenticate and Use application security groups to verify that
explicitly authorize based on all available individual NICs have permissions to
data points. communicate over specific channels.
Use least Limit user access with Just-In- Don't enable 3389/RDP access by default on
privileged Time and Just-Enough-Access any channel. Use correct role permissions for
access (JIT/JEA), risk-based adaptive the spoke context.
policies, and data protection.
This article is a part of a series of articles that demonstrate how to apply the principles
of Zero Trust across an environment in Azure that includes a spoke VNet hosting a
virtual machine-based workload. For more information, see the Apply Zero Trust
principles to Azure IaaS overview.
Reference architecture
The following diagram shows a common reference architecture for IaaS-based
workloads.
NSG-fe
APP GW subnet Front end tier subnet
ASG- ASG-
fe fe
AppGw (WAF) VM VM
NSG-app
App tier subnet
ASG- ASG-
app app
VM VM
NSG-data
Data tier subnet
ASG- ASG-
data data
VM VM
In the diagram:
The application shown in the reference architecture follows the N-tier architecture style
The following diagram shows the components of a resource group for a spoke VNet in
an Azure subscription separate from the subscription for the hub VNet.
In the diagram, all the components of the spoke VNet are contained in a dedicated
resource group:
One VNet
One Azure Application Gateway (App GW), including a Web Application Firewall
(WAF)
Three network security groups, one for each application tier
Three application security groups, one for each application tier
ノ Expand table
1 Use Microsoft Entra role-based access control (RBAC) or set up Use least privileged
custom roles for networking resources. access
3 Create a network security group for each subnet. Use least privileged
access
Assume breach
4 Create an application security group for each virtual machine Verify explicitly
role. Use least privileged
access
Assume breach
One easy way to implement this is to deploy the custom roles found in the Azure
Landing Zone Reference Architecture .
The specific role is the Network Management custom role has the following
permissions:
Rather than having the spoke network resources available in multiple contexts in a
shared resource group, create a dedicated resource group for it. The reference
architecture that this article supports illustrates this concept.
Virtual machine resource Storage resource group Resource group Resource group
group (hub VNet) (spoke VNet)
Storage accounts
Virtual machines VNet VNet AppGW + WAF
(front end [fe])
Blob storage Azure Files
service service Bastion NSG-fe ASG-fe
Virtual machines (app)
Data set Data set Azure Firewall NSG-app ASG-app
In the figure, resources and components across the reference architecture are divided
into dedicated resource groups for virtual machines, storage accounts, hub VNet
resources, and spoke VNet resources.
With a dedicated resource group, you can assign a custom role using the following
process: Tutorial: Grant a user access to Azure resources using the Azure portal - Azure
RBAC.
Additional recommendations:
If you aren't using policies that enforce log forwarding on resource groups, configure
this in the Activity log for the resource group: Navigate to Activity log > Export Activity
Logs and then select + Add diagnostic setting.
On the Diagnostic setting screen, select all log categories (especially Security) and send
them to the appropriate logging sources, such as a Log Analytics workspace for
observability, or a storage account for long term storage.
Subscription Democratization
While not directly related to networking, you should plan your subscription RBAC in a
similar way. In addition to isolating resources logically by resource group, you should
also isolate the subscription based on business areas and portfolio owners. The
subscription as a management unit should be narrowly scoped.
For more about subscription democratization, see Azure landing zone design principles
- Cloud Adoption Framework.
You configure diagnostics from the Security category of Diagnostic setting in Azure
Monitor, as shown here.
See Diagnostic Settings to understand how to review these logs and alert on them.
In the diagram:
Each tier of the application is hosted in a dedicated subnet such as, front end tier,
app tier, and data tier.
A network security group is configured for each of these subnets.
Configuring network security groups in a different way than shown in the figure can
result in incorrect configuration of some or all of the network security groups and can
create issues in troubleshooting. It can also make it difficult to monitor and log.
Create a network security group using this process: Create, change, or delete an Azure
network security group
See network security groups to understand how you can use them to secure the
environment.
Step 4: Create an application security group for
each virtual machine role
Application security groups enable you to configure network security as a natural
extension of an application's structure, allowing you to group virtual machines and
define network security policies based on those groups. You can reuse your security
policy at scale without manual maintenance of explicit IP addresses. The platform
handles the complexity of explicit IP addresses and multiple rule sets, allowing you to
focus on your business logic.
Inside your workload, identify the specific virtual machine roles. Then, build an
application security group for each role. In the reference architecture, three application
security groups are represented.
In the diagram:
Three application security groups are created to support this app, one for each tier:
front end, app, and data.
Each virtual machine is assigned to the corresponding application security group
for its role (red text in the diagram).
For more information about application security groups and how to assign these to
virtual machines, see Azure application security groups overview.
7 Note
If you're using load balancers, using the IP address of the load balancer in the
network security groups is required as application security groups can't scope a
load balancer.
Once provisioned, create a deny all rule in each of the inbound and outbound rules, with
a priority of 4096. This is the last custom priority available, which means you still have
the remaining scope to configure Allow actions.
In the network security group, navigate to Outbound Security Rules and select Add. Fill
in the following:
Source: Any
Source port ranges: *
Destination: Any
Service: Custom
Destination Port Ranges: *
Protocol: Any
Action: Deny
Priority: 4096
Name: DenyAllOutbound
Description: Denies all outbound traffic unless specifically allowed.
Here's an example.
Repeat this process with inbound rules, adjusting the name and description as
appropriate. You'll notice that on the Inbound security rules tab, there is a warning sign
on the rule, as shown here.
If you click the rule and scroll to the bottom, you'll see more details, as shown here.
Azure Load Balancers won't, by default, be able to access resources using this
network security group.
Other resources on this VNet won't, by default, be able to access resources using
this network security group.
For our purpose in Zero Trust, this is how it should be. It means that just because
something is on this VNet, doesn't mean that it has immediate access to your resources.
For each traffic pattern, you'll need to create a rule explicitly allowing it and you should
do so with the least amount of permissions. Therefore, if you've specific outbound
connections for management–such as to Active Directory Domain Services (AD DS)
domain controllers, private DNS virtual machines, or to specific external websites–they
need to be controlled here.
You can then either create a deny all VNet outbound, or instead allow all outbound (but
secure items with their inbound rules).
Read more about Azure Firewall and Route Tables to understand how you can use them
to further increase the security of the environment.
On port 443:
enterpriseregistration.windows.net
settings-win.data.microsoft.com
sls.update.microsoft.com
v10.events.data.microsoft.com
login.microsoftonline.com
pas.windows.net
169.254.169.254
On port 80:
ctldl.windowsupdate.com
www.msftconnecttest.com
On port 123:
40.119.6.228
On port 1688:
40.83.235.53
NSG-fe NSG-app
APP GW subnet Front end tier subnet App tier subnet Data tier subnet
As another example, here is a configuration for a stand-alone spoke VNet in which the
Web Application Firewall is placed in the Application Gateway subnet of the spoke VNet.
NSG-fe NSG-app
APP GW subnet Front end tier subnet App tier subnet Data tier subnet
Rule 5 - Allow traffic from app tier virtual machines to the data tier
load balancer (SQL 1433)
In the network security group for the app tier subnet, navigate to Inbound Security
Rules, and select Add. Populate the list with the following:
You'll notice after completion that there is a blue icon for informational alerts on the
rule. Clicking the rule gives the following message:
"Rules using application security groups may only be applied when the application
security groups are associated with network interfaces on the same virtual
network."
Here's an example.
The rule only applies when this application security group is used in this network.
Finally, in the same network security group, navigate to Outbound Security Rules and
select Add. Populate the list similar to the example, changing Inbound to Outbound.
Rule 6 - Allow traffic from data tier load balancer to data tier
virtual machines (SQL 1433)
In the network security group for the data tier subnet, navigate to Inbound Security
Rules and select Add. Populate the list with the following:
Source: IP Address
Source IP Address: The IP address of the load balancer
Source port ranges: 1433
Destination: Application security group
Destination application security groups: Select your data tier application security
group
Service: MS SQL
Destination Port Ranges: This is automatically filled in for port 1433.
Protocol: This is automatically selected for TCP.
Action: Allow
Priority: A value between 100 and 4096. You can start with 105.
Name: Allow-SQL-LB-to-SQL-VMs-Inbound
Description: Allows inbound access to the SQL-based data tier virtual machines
from the data tier load balancer.
In the same network security group, navigate to Outbound Security Rules and select
Add. Populate the list as done in the example, changing Inbound to Outbound.
Rule 7 - Allow traffic between data tier virtual machines (SQL 1433)
In the network security group for the data tier subnet, navigate to Inbound Security
Rules and select Add. Populate the list with the following:
In the same network security group, navigate to Outbound Security Rules and select
Add. Populate the list as the previous list, changing Inbound to Outbound.
With these three rules, you've defined the Zero Trust connectivity pattern for a single
application tier. You can repeat this process as required for additional flows.
See the full reference architecture in the Apply Zero Trust principles to Azure IaaS
overview article.
This varies based on your specific management needs. However, rules on the firewall
appliances and rules on the network security group should be used to explicitly allow
connections on both the platform networking side and the workload networking side.
To enable Network Security Group Flow Logging, you can follow the Tutorial: Log
network traffic flow to and from a virtual machine against the existing network security
group that is created.
7 Note
The storage account should follow the Zero Trust storage account guidance.
Access to the logs should be restricted as needed.
They should also flow in to Log Analytics and Sentinel as needed.
The following diagram shows both of these access modes across the reference
architecture.
Internet Azure
Azure Firewall
AppGw (WAF)
Subnet VM VM
Admin
Bastion
SSH or RDP
To requested
Azure Firewall SSH or RDP VM
Premium App tier subnet
VM VM
VPN GW Subnet
VPN GW Data tier subnet
Azure Blob
Azure Files
Central office
Router Admin
To secure access from hub resources to the VNet, see Apply Zero Trust principles to a
hub virtual network in Azure.
Next, add the application to the scope of your identity and device access policies.
The following diagram shows the recommended policies for Zero Trust.
users)
approved apps data protection
As mentioned in the other articles from this series, Microsoft Defender for Cloud is a
Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWP) tool
that offers Security Recommendations, Alerts, and advanced features such as Adaptive
Network Hardening to assist you as you progress in your Cloud Security journey. To
better visualize where Defender for Cloud fits into the greater Microsoft security
landscape, see Microsoft Cybersecurity Reference Architectures.
This article doesn't discuss Microsoft Defender for Cloud in detail, but it's important to
understand that Microsoft Defender for Cloud works based on Azure Policies and logs
ingested in a Log Analytics workspace. Once enabled on the subscription(s) with your
spoke VNet and associated resources, you'll be able to see recommendations to
improve their Security Posture. You can filter these Recommendations further by MITRE
tactic, Resource Group, etc. Consider prioritizing the resolution of Recommendations
that have a greater impact on your organization's Secure score.
If you choose to onboard one of the Defender for Cloud plans that offer Advanced
Workload Protections, it includes Adaptive Network Hardening Recommendations to
improve your existing network security group rules. Here's an example.
You can accept the recommendation by selecting Enforce, which either creates a new
network security group rule or modify an existing one.
Recommended training
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Configure and manage Azure Monitor
Configure network security groups
Design and implement network security
Secure access to your applications by using Azure identity services
For more training on security in Azure, see these resources in the Microsoft catalog:
Security in Azure | Microsoft Learn
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
ノ Expand table
Item Description
This poster provides the reference and logical architectures and the detailed
configurations of the separate components of Zero Trust for Azure IaaS. Use the pages
of this poster for separate IT departments or specialties or, with the Microsoft Visio
version of the file, customize the diagrams for your infrastructure.
ノ Expand table
Item Description
References
Embrace proactive security with Zero Trust
Secure networks with Zero Trust
Zero-trust network for web applications with Azure Firewall and Application
Gateway - Azure Architecture Center
Azure Landing Zone Policies
Common Zero Trust identity and device policies
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to a hub
virtual network in Azure
Article • 04/12/2024
Summary: To apply Zero Trust principles to a hub virtual network in Azure, you must
secure Azure Firewall Premium, deploy Azure DDoS Protection Standard, configure
network gateway routing to the firewall, and configure threat protection.
The best way to deploy an Azure-based hub virtual network (VNet) for Zero Trust is to
use the Azure Landing Zone materials to deploy a feature-complete hub VNet, and then
tailor it to your specific configuration expectations.
This article provides steps for how to take an existing hub VNet and ensure you're ready
for a Zero Trust methodology. It assumes that you have used the ALZ-
Bicep hubNetworking module to rapidly deploy a hub VNet, or have deployed some
other hub VNet with similar resources. Using a separate connectivity hub connected to
isolated workplace spokes is an anchor pattern in Azure secure networking and helps
support the Zero Trust principles.
This article describes how to deploy a hub VNet for Zero Trust by mapping the principles
of Zero Trust in the following ways.
ノ Expand table
Verify Always authenticate and Use Azure Firewall with Transport Layer Security
explicitly authorize based on all (TLS) inspection to verify risk and threats based on
available data points. all available data.
Use least Limit user access with Just- Each spoke VNet has no access to other spoke
privileged In-Time and Just-Enough- VNets unless the traffic gets routed through the
access Access (JIT/JEA), risk-based firewall. The firewall is set to deny by default,
adaptive policies, and data allowing only traffic allowed by specified rules.
protection.
Assume Minimize blast radius and In the event of a compromise or breach of one
breach segment access. Verify end- application/workload, it has limited ability to spread
to-end encryption and use due to the Azure Firewall performing traffic
analytics to get visibility, inspection and only forwarding allowed traffic. Only
drive threat detection, and resources in the same workload would be exposed
improve defenses. to the breach in the same application.
This article is a part of a series of articles that demonstrate how to apply the principles
of Zero Trust across an environment in Azure that includes a hub VNet to support an
IaaS workload. For more information, see the Apply Zero Trust principles to Azure IaaS
overview.
Reference architecture
The following diagram shows the reference architecture. The hub VNet is highlighted in
red. For more information about this architecture, see the Apply Zero Trust principles to
Azure IaaS overview.
Internet Azure
APP GW subnet
User NSG
Front end tier subnet
ASG- ASG-
AppGw (WAF) fe fe
Admin VM VM
Bastion
Azure Files
Admin
On-premises datacenter
For this reference architecture, there are many ways you can deploy the resources across
the Azure subscription. The reference architecture shows the recommendation of
isolating all resources for the hub VNet within a dedicated resource group. The
resources for the spoke VNet are also shown for comparison. This model works well if
different teams are given responsibility for these different areas.
In the diagram, a hub VNet includes components to support access to other apps and
services within the Azure environment. These resources include:
The hub VNet provides access from these components to an IaaS-based app hosted on
virtual machines in a spoke VNet.
For guidance on organizing for cloud adoption, see Manage organization alignment in
the Cloud Adoption Framework.
The resources that are deployed for the hub VNet are:
An Azure VNet
Azure Firewall with Azure Firewall policy and a public IP address
Bastion
VPN gateway with a public IP address and route table
The following diagram shows the components of a resource group for a hub VNet in an
Azure subscription separate from the subscription for the spoke VNet. This is one way of
organizing these elements within the subscription. Your organization might choose to
organize these in a different way.
Entra ID tenant
In the diagram:
The resources for the hub VNet are contained within a dedicated resource group. If
you're deploying Azure DDoS Plan a part of the resources, you need to include
that in the resource group.
The resources within a spoke VNet are contained within a separate dedicated
resource group.
Depending on your deployment, you may also note that there can be a deployment of
an array for Private DNS Zones used for Private Link DNS resolution. These are used to
secure PaaS resources with Private Endpoints, which are detailed in a future section.
Note that it deploys both a VPN Gateway and an ExpressRoute Gateway. You may not
need both, so you can remove whichever one isn't needed for your scenario or turn it
off during deployment.
ノ Expand table
Step Task Zero Trust principle(s) applied
As a part of your deployment, you'll want to make specific selections that aren't the
defaults for automated deployments due to their additional costs. Prior to the
deployment, you should review the costs.
Operating the connectivity hub as deployed still provides significant value for isolation
and inspection. If your organization isn't ready to incur the costs of these advanced
features, you can deploy a reduced functionality hub and make these adjustments later.
As a part of the deployment, use Azure Firewall Premium. This requires that you deploy
the generated management policy as a premium policy. Changing to Azure Firewall
Premium involves recreating the firewall and often the policy as well. As a result, start
with Azure Firewall if possible, or be prepared for redeployment activities to replace the
existing firewall.
Outbound TLS Inspection protects against malicious traffic that is sent from an
internal client to the internet. This helps identify when a client has been breached,
and if it is trying to send data outside of your network or establish a connection to
a remote computer.
East-West TLS Inspection protects against malicious traffic sent from within Azure
to other parts of Azure or to your non-Azure networks. This helps identify attempts
for a breach to expand and spread its blast radius.
Inbound TLS Inspection protects resources in Azure from malicious requests that
arrive from outside the Azure network. Azure Application Gateway with Web
Application Firewall provides this protection.
You should use the Inbound TLS Inspection for resources whenever possible. Azure
Application Gateway only provides protection for HTTP and HTTPS traffic. It can't be
used for some scenarios, such as those that use SQL or RDP traffic. Other services often
have their own threat protection options that could be used to provide explicit
verification controls for those services. You can review Security baselines for Azure
overview to understand the threat protection options for these services.
Azure Application Gateway isn't recommended for the hub VNet. It should instead
reside in a spoke VNet or a dedicated VNet. For more information, see Apply Zero Trust
principles to spoke virtual network in Azure for guidance on the spoke VNet or Zero-
trust network for web applications.
These scenarios have specific digital certificate considerations. For more information,
see Azure Firewall Premium certificates.
Without TLS inspection, Azure Firewall has no visibility in the data that flows in the
encrypted TLS tunnel, and so it is less secure.
For example, Azure Virtual Desktop doesn't support SSL termination. You should review
your specific workloads to understand how to provide TLS inspection.
In addition to the customer defined allow/deny rules, the Azure Firewall is still able to
apply threat intelligence-based filtering. Threat intelligence-based filtering uses known-
bad IP addresses and domains to identify traffic that poses a risk. This filtering occurs
prior to any other rules, which means even if the access was allowed by your defined
rules, Azure Firewall can stop the traffic.
Azure Firewall Premium also has enhanced options for URL filtering and web category
filtering, allowing for more fine-tuning for roles.
You can set threat intelligence to notify you with an alert when this traffic occurs, but to
allow it through. However for Zero Trust, set it to Deny.
Additional configuration
With the Azure Firewall Premium configured, you can now perform the following
configuration:
Because you can deploy the created policy to existing resources, you can add this
protection after the initial deployment without requiring the redeployment of resources.
Although automatic detection and automatic mitigation are both a part of the DDoS
Protection Basic that is enabled by default, these additional features are only available
with DDoS Standard.
In the current version of Azure DDoS Protection, you must apply Azure DDoS Protection
per VNet. See additional instructions in DDoS Quickstart.
If you configure only one side, either just the spoke subnets or the gateway subnets,
then you have asynchronous routing that prevents connections from working.
Why route network gateway traffic to the firewall?
A key element of Zero Trust is to not assume that just because something is in your
environment, that it should have access to other resources in your environment. A
default configuration often allows for routing between resources in Azure to your on-
premises networks, controlled only by network security groups.
By routing the traffic to the firewall, you increase the level of inspection and increase the
security of your environment. You're also alerted to suspicious activity and can take
action.
Deploy the Azure Network Gateway (either for VPN or ExpressRoute connections)
in a dedicated VNet (often called a Transit or Gateway VNet), peer it to the hub
VNet, and then create a broad routing rule that covers your planned Azure
networking address spaces routing to the firewall.
Deploy the Azure Network Gateway in the hub VNet, configure routing on the
gateway subnet, and then configure routing on the spoke VNet subnets.
This guide details the second option because it is more compatible with the reference
architecture.
7 Note
Azure Virtual Network Manager is a service that simplifies this process. When this
service is Generally Available, used it to manage the routing.
2. Place the Route Table in a resource group, select a region, and specify a name.
5. Select Add and then add a route to one of the spoke VNets:
a. In Route name, specify the name of the route field.
b. Select IP Addresses in the Address prefix destination drop-down.
c. Provide the spoke VNet's address space in the Destination IP addresses/CIDR
ranges field.
d. Select Virtual appliance in the Next hop type drop-down box.
e. Provide the Azure Firewall's private IP address in the Next hop address field.
f. Select Add.
Here's an example.
The gateway now forwards traffic intended for spoke VNets to the Azure Firewall.
Here's an example.
This process disables the propagation of routes from the gateway, which enables the
default route to take traffic intended to the on-premises networks.
7 Note
1. Navigate to the Route Table associated with your subnet, and select Configuration.
2. For Propagate gateway routes, select No.
3. Select Save.
Your default route now forwards traffic intended for the gateway to the Azure Firewall.
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and
Cloud Workload Protection (CWP) that offers a secure score system to help your
company build an IT environment with a better security posture. It also includes features
to protect your network environment against threats.
This article won't cover Microsoft Defender for Cloud in detail. However, it is important
to understand that Microsoft Defender for Cloud works based on Azure Policies and
logs that it ingests in a Log Analytics workspace.
You write Azure Policies in JavaScript Object Notation (JSON) to hold different analysis
of Azure resource properties, including network services and resources. That said, it is
easy for Microsoft Defender for Cloud to check a property under a network resource
and provide a recommendation to your subscription if you're protected or exposed to a
threat.
How to check all network recommendations available
through Microsoft Defender for Cloud
To view all the Azure policies that provide network recommendations used by Microsoft
Defender for Cloud:
1. Open Microsoft Defender for Cloud, by selecting the Microsoft Defender for
Cloud icon in the left menu.
4. If you select in the ASC Default, you'll be able to review all the policies available,
including the policies that evaluate network resources.
Network recommendations
Follow these steps to view some of the network recommendations, based on the
Microsoft cloud security benchmark:
It is important to understand that Microsoft Defender for Cloud provides other network
recommendations for different Azure resources such as virtual machines and storage.
You may review those recommendations in the left menu, under Recommendations.
On the left menu of the Microsoft Defender for Cloud portal, select Security Alerts to
review alerts based on network resources so you may avoid some types of threats.
Those alerts are generated automatically by Microsoft Defender for Cloud based on logs
ingested in the Log Analytics workspace and monitored by Microsoft Defender for
Cloud.
Recommended training
Configure Azure Policy
Design and implement network security
Configure Azure Firewall
Configure VPN Gateway
Introduction to Azure DDoS Protection
Resolve security threats with Microsoft Defender for Cloud
For more training on security in Azure, see these resources in the Microsoft catalog:
Security in Azure | Microsoft Learn
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
Technical illustrations
This poster provides a single-page, at-a-glance view of the components of Azure IaaS as
reference and logical architectures, along with the steps to ensure that these
components have the "never trust, always verify" principles of the Zero Trust model
applied.
ノ Expand table
Item Description
This poster provides the reference and logical architectures and the detailed
configurations of the separate components of Zero Trust for Azure IaaS. Use the pages
of this poster for separate IT departments or specialties or, with the Microsoft Visio
version of the file, customize the diagrams for your infrastructure.
ノ Expand table
Item Description
References
Refer to these links to learn about the various services and technologies mentioned in
this article.
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to a spoke virtual
network with Azure PaaS Services
Article • 04/12/2024
This article helps you apply the principles of the Zero Trust security model to a PaaS workload using Azure virtual networks
(VNets) and private endpoints in the following ways:
ノ Expand table
Verify Always authenticate and authorize based on all Use threat detection in Azure Firewall and Azure Application Gateway to
explicitly available data points. validate traffic and to verify if the traffic is acceptable.
Use least Limit user access with Just-In-Time and Just- Reduce ingress to and egress from Azure services to your private
privileged Enough-Access (JIT/JEA), risk-based adaptive networking. Use network security groups to allow only specific ingress
access policies, and data protection. from your VNet. Use a central Azure Firewall instance to grant non-VNet
traffic access to the Azure service.
Assume Minimize blast radius and segment access. Limit unnecessary communication between resources. Ensure that you
breach Verify end-to-end encryption and use analytics are logging from network security groups and that you have proper
to get visibility, drive threat detection, and visibility into anomalous traffic. Track changes to network security
improve defenses. groups.
For more information about how to apply the principles of Zero Trust across an Azure IaaS environment, see the Apply Zero
Trust principles to Azure IaaS overview.
Azure SQL Database has its own firewall that can be used to allow specific client IP addresses that need to access the
database server.
Azure storage accounts have a configuration option allow connections from a specific VNet or to block public network
access.
Azure App Service supports access restrictions to define a priority-ordered allow/deny list that controls network access
to your app.
However, for Zero Trust guided implementations, these service-native access controls often fall short of being sufficient. This
creates a diffusion of access controls and logging that can increase management and decrease visibility.
In addition, PaaS services can use fully qualified domain names (FQDN) that resolve to a dynamically assigned public IP
address that is allocated from a pool of public IP addresses in a specific region for a type of service. Because of this, you
won't be able to allow traffic from or to a specific PaaS service by using their public IP address, which can change.
Microsoft recommends that you use private endpoints. A private endpoint is a VNet interface that uses a private IP address
from your VNet. This network interface connects you privately and securely to a service that's powered by Azure Private
Link. By enabling a private endpoint, you bring the service into your VNet.
Depending on your solution scenario, you may still need public inbound access to your PaaS services. But unless you do,
Microsoft recommends that all traffic remain private to eliminate potential security risks.
This guide provides instructions for a specific reference architecture, but the principles and methods can be applied to other
architectures as needed.
Reference architecture
The following diagram shows a common reference architecture for PaaS-based workloads.
ASG-fe
Web
AppGw (WAF) private endpoint
VNet Integra on
NSG-data
Data tier subnet
ASG-data
Data
private endpoint
SQL Server
In the diagram:
The following diagram shows the logical architecture of these components within an Azure subscription.
SQL resource group Web resource group Storage resource group Resource group Resource group
(hub VNet) (spoke VNet)
Storage accounts
VNet VNet AppGW + WAF
SQL Database Application Service
Blob storage Azure Files
service service Bastion NSG-fe NSG-data
SQL Server Application Service Plan
Data set Data set Azure Firewall NSG-data ASG-fe
Data-PrvEndpoint
In the diagram, all components of the spoke VNet are contained in a dedicated resource group:
One VNet
One Azure Application Gateway (App GW), including a Web Application Firewall (WAF)
Three network security groups (named with "NSG" in the diagram) for the database, application, and front-end tiers
Two application security groups (named with "ASG" in the diagram)
Two private endpoints
In addition, resources for the hub VNet are deployed in the appropriate connectivity subscription.
What's in this article
Zero Trust principles are applied across the architecture, from the tenant and directory level down to the assignment of VMs
to application security groups. The following table describes the recommendations for securing this architecture.
ノ Expand table
Step Task
1 Leverage Microsoft Entra RBAC or set up custom roles for networking resources.
This guide assumes that you already have an Azure Application Service and Azure SQL Database deployed in their own
resource groups.
One easy way to implement this is to deploy the custom roles found in the Azure Landing Zone Reference Architecture .
The specific role that can be used is the Network Management custom role, which has the following permissions:
This role can be created using the scripts in the Azure Landing Zone Reference Architecture GitHub repository or can be
created through Microsoft Entra ID with Azure custom roles.
Rather than having the spoke network resources available in multiple contexts in a shared resource group, create a
dedicated resource group. The following architecture diagram shows this configuration.
SQL resource group Web resource group Storage resource group Resource group Resource group
(hub VNet) (spoke VNet)
Storage accounts
VNet VNet AppGW + WAF
SQL Database Application Service
Blob storage Azure Files
service service Bastion NSG-fe NSG-data
SQL Server Application Service Plan
Data set Data set Azure Firewall NSG-data ASG-fe
Data-PrvEndpoint
In the diagram, resources and components across the reference architecture are divided into dedicated resource groups for
application services, Azure SQL databases, storage accounts, hub VNet resources, and spoke VNet resources.
With a dedicated resource group, you can assign a custom role using the Grant a user access to Azure resources using the
Azure portal tutorial.
Additional recommendations:
If you are not using policies that enforce log forwarding on resource groups, configure this in the activity log for the
resource group:
See Diagnostic Settings to understand how to review these logs and alert on them.
Subscription democratization
While not directly related to networking, you should plan your subscription RBAC in a similar way. In addition to isolating
resources logically by resource group, you should also isolate the subscription based on business areas and portfolio
owners. The subscription as a management unit should be narrowly scoped.
See the Azure landing zone design principles for more information.
For multi-tier applications, the recommendation is to create a dedicated network security group ("NSG" in the following
diagram) for each subnet that hosts a networking component.
In the diagram:
Each tier of the application has a dedicated ingress subnet, such as one for the web tier and another for the data tier.
Azure Application Services has a dedicated egress subnet for a specific application service.
A network security group is configured for each of these subnets.
Configuring network security groups in a different way than in the diagram can result in incorrect configuration of some or
all of the network security groups and can create issues in troubleshooting. It can also make it difficult to monitor and log.
See Create, change, or delete an Azure network security group to manage the settings of your network security groups.
Read more about Network security groups to understand how they can be used to secure your environments.
To do this, in the network security group, go to Outbound Security Rules and select Add. Fill in the following:
Source: Any
Source port ranges: *
Destination: Any
Service: Custom
Destination Port Ranges: *
Protocol: Any
Action: Deny
Priority: 4096
Name: DenyAllOutbound
Description: Denies all outbound traffic unless specifically allowed.
Here's an example.
Repeat this process with inbound rules, adjusting the name and description as appropriate.
The Inbound security rules tab displays warning sign on the rule. Here's an example.
Click the rule and scroll to the bottom to see more details. Here's an example:
Azure Load Balancers won't, by default, be able to access resources using this network security group.
Other resources on this VNet won't, by default, be able to access resources using this network security group.
For our purpose in Zero Trust, this is how it should be. It means that just because something is on this VNet, doesn't mean
that it will have immediate access to your resources. For each traffic pattern, create a rule explicitly allowing it and you
should do so with the least amount of permissions.
If you have specific outbound connections for management, such as to Active Directory Domain Services (AD DS) domain
controllers, private DNS VMs, or to specific external websites, they need to be controlled here.
7 Note
If you are using Azure Firewall to manage your outbound connections, instead of performing a deny-outbound-all, you can
create alternate rules for outbound connections. As a part of the Azure Firewall implementation, you set up a route table
that sends default route (0.0.0.0/0) traffic to the firewall. This will handle traffic outside of the VNet.
You can then either create a deny all VNet outbound rule, or an allow all outbound rule but secure items with their inbound
rules.
See Azure Firewall and Route Tables to understand how they can be used to further increase the security of the
environment.
Web
Data
Application Gateway VNet Integra on private endpoint
private endpoint
w/Web Application
Firewall
ASG-fe ASG-data
Web
Data
Application Gateway VNet Integra on private endpoint
private endpoint
w/Web Application
Firewall
Use the Manage network security groups: Create a security rule process to add rules to your network security groups.
ノ Expand table
Network Direction Source Source Source Destination Destination Service Network security group Network
security Details Port Details Name security
group for group
Subnet description
Azure SQL Inbound IP Your App 1433 IP The explicit MS AllowApptoSQLDBInbound Allows
Subnet Addresses Service Addresses IP address SQL inbound
Integration of your SQL access to
Subnet's IP DB's private the SQL
Address endpoint private
Range endpoint
from App
Service
Integration
subnet.
7 Note
Sometimes source traffic can come from different ports and if this pattern occurs you can add source port ranges to "*"
to allow any source port. The destination port is more significant, and some recommendations are to always use "*" for
the source port.
7 Note
For priority, use a value between 100 and 4000. You can start at 105.
This is in addition to the network security group rules on your Application Gateway Subnet.
With these rules, you have defined the Zero Trust connectivity pattern for a single application tier. You can repeat this
process as required for additional flows.
See Apply Zero Trust principles to Azure IaaS overview for the full reference architecture.
Your configuration will vary based on your specific management needs. However, you should use rules on firewall
appliances and rules on the network security group to explicitly allow connections on both the platform networking and
workload networking sides.
The traffic to the private endpoints is not logged, but if other services are deployed to the subnets later this log will help
detect the activities.
To enable network security group flow Logging, follow the Tutorial: Log network traffic flow to and from a virtual machine
for the existing network security group for the private endpoints.
7 Note
Logs should flow into Log Analytics and Microsoft Sentinel as needed.
In addition, you should also consider your DNS configuration to allow for the resolution of names.
Place them in the specific resource group that houses the parent resources to keep resources with a similar lifecycle
together and to provide central access.
Place them in the appropriate subnet in the VNet based on their role.
For the Azure Application Service, you can configure private endpoints both for its normal frontend and its SCM
endpoint, which is used for deployments and management.
Also, as part of this deployment, you should ensure that the service-specific firewall is set to deny inbound traffic. This will
deny any attempts at public ingress.
For the Azure SQL database, manage its server-level IP firewall rules. Ensure that Public network access is set to Disable from
the networking panel in the Azure portal.
For the Azure Application Service, adding the private endpoint sets its service level firewall to block inbound access by
default. For more information, see Using Private Endpoints for App Service apps.
To configure your App Service, see Enable VNet integration in Azure App Service. Ensure that you are placing it in your
subnet designated for egress.
DNS considerations
As part of using private endpoints, enable DNS resolution of the resources' FQDNs to their new private IP addresses. For the
instructions to implement this in a variety of ways, see Private Endpoint DNS configuration.
7 Note
DNS resolution needs to apply to all traffic. Resources in the same VNet won't be able to resolve unless they are using
the correct DNS zones.
The following diagram shows both access modes across the reference architecture.
Internet Azure
VNet Integra on
VPN GW Subnet
VPN GW Data tier subnet
Azure Blob
Azure Files
Central office
Router Admin
Secure traffic within Azure environment for the VNet and application
Much of the work of security traffic within the Azure environment is already complete. See Apply Zero Trust principles to
Azure storage to configure secure connections between storage resources and the VMs.
See Apply Zero Trust principles to a hub VNet in Azure to secure access from hub resources to the VNet.
First, if the application isn't yet integrated with Microsoft Entra ID, see Application types for the Microsoft identity platform.
Next, add the application to the scope of your identity and device access policies.
When configuring MFA with Conditional Access and related policies, use the recommended policy set for Zero Trust as a
guide. This includes Starting point policies that don't require managing devices. Ideally, the devices accessing your VMs are
managed and you can implement the Enterprise level, which is recommended for Zero Trust. For more information, see
Common Zero Trust identity and device access policies.
The following diagram shows the recommended policies for Zero Trust.
Zero Trust identity and device access policies
As mentioned in the other articles from this series, Defender for Cloud is a Cloud Security Posture Management (CSPM) and
Cloud Workload Protection (CWP) tool that offers security recommendations, alerts, and advanced features such as adaptive
network hardening to assist you as you progress in your cloud security journey.
This article does not describe Defender for Cloud in detail, but it is important to understand that Defender for Cloud works
based on Azure policies and logs ingested in a Log Analytics workspace. Once enabled on the subscriptions with your spoke
VNet and associated resources, you can see recommendations to improve their security posture. You can filter these
recommendations further by MITRE tactic, Resource Group, and others. Consider prioritizing to resolve recommendations
that have a greater impact on your organization's Secure Score. Here's an example.
There are Defender for Cloud plans that offer advanced workload protections that includes adaptive network hardening
recommendations to improve your existing network security group rules. Here's an example.
You can accept the recommendation by selecting Enforce, which will either create a new network security group rule or
modify an existing one.
Recommended training
Secure your Azure resources with Azure role-based access control (Azure RBAC)
Configure and manage Azure Monitor
Configure network security groups
Design and implement network security
Design and implement private access to Azure Services
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
References
Embrace proactive security with Zero Trust
Secure networks with Zero Trust
Zero-trust network for web applications with Azure Firewall and Application Gateway
Azure Landing Zone Policies
Common Zero Trust identity and device across policies
What is a private endpoint?
Private endpoint DNS configuration
Integrate your app with an Azure VNet
Using private endpoints for App Service apps
Connect to an Azure SQL server using an Azure private endpoint
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to an Azure
Virtual Desktop deployment
Article • 04/12/2024
This article provides steps to apply the principles of Zero Trust to an Azure Virtual
Desktop deployment in the following ways:
ノ Expand table
Verify Always authenticate and Verify the identities and endpoints of Azure
explicitly authorize based on all available Virtual Desktop users and secure access to
data points. session hosts.
Use least Limit user access with Just-In- Confine access to session hosts and their
privileged Time and Just-Enough-Access data.
access (JIT/JEA), risk-based adaptive Storage: Protect data in all three modes:
policies, and data protection. data at rest, data in transit, data in use.
Virtual networks (VNets): Specify allowed
network traffic flows between hub and
spoke VNets with Azure Firewall.
Virtual machines: Use Role Based Access
Control (RBAC).
Reference architecture
In this article, we use the following reference architecture for Hub and Spoke to
demonstrate a commonly deployed environment and how to apply the principles of
Zero Trust for Azure Virtual Desktop with users’ access over the Internet. Azure Virtual
WAN architecture is also supported in addition to private access over a managed
network with RDP Shortpath for Azure Virtual Desktop.
Internet Azure
Azure Virtual Desktop Control Plane Azure Virtual Desktop Management Plane
User Workspace
Private Endpoint
Entra ID MDC RBAC Azure · Web access
Monitor
· Gateway Personal Pooled Pool AVD Scaling
F Pool Applica on Applica on
Plan
· Broker Group Group Start VM on
Start VM on Connect
· Diagnostics
Connect
Endpoints
Schedules
B
Bastion Subnet
Azure Firewall
Subnet Azure Virtual Desktop (SPOKE) VNET Azure Virtual Desktop (SPOKE) VNET
Bastion
Session host virtual machines (Personal) C Session host virtual machines (Pooled) C Key Vault
Keys
Azure Firewall
Premium
AVD Shared Services
DNS
VPN GW Subnet Zone
Custom Custom NSG NSG
DNS DNS Azure Compute Key Vault
Server 1 Server 2
Gallery Secrets
VPN GW
DDoS
Protec on VM Image
Definition
Office location
Image Template
Private Endpoint Private Endpoint
G Azure Storage Azure Storage
(file) (file)
A A
Azure Storage Services Azure Storage Services
Admin
On-premises datacenter
Router Admin Entra ID AD DS
Connect
ノ Expand table
Component Description
C A spoke VNet with Azure Virtual Desktop session host virtual machine-based
workloads.
F Dependent PaaS services including Microsoft Entra ID, Microsoft Defender for
Cloud, role-based access control (RBAC), and Azure Monitor.
Component Description
Users or admins that access the Azure environment can originate from the internet,
office locations, or on-premises datacenters.
Logical architecture
In this diagram, the Azure infrastructure for an Azure Virtual Desktop deployment is
contained within an Entra ID tenant.
Entra ID tenant
Resource group: Resource group: Resource group: Resource group: Resource group: Resource group:
Azure Virtual Desktop Storage account Session host Spoke Virtual Network Azure Compute Hub Virtual Network
Azure Files service virtual machines (Azure Virtual Gallery
Desktop)
Key Vault - PE VPN GW
AVD Virtual
Service objects Data Sets VNet RBAC VNet
machines
You can distribute the resources in more than one subscription, where each
subscription may hold different roles, such as network subscription, or security
subscription. This is described in Cloud Adoption Framework and Azure Landing
Zone. The different subscriptions may also hold different environments, such as
production, development, and tests environments. It depends on how you want to
separate your environment and the number of resources you have in each. One or
more subscriptions can be managed together using a Management Group. This
gives you the ability to apply permissions with RBAC and Azure policies to a group
of subscriptions instead of setting up each subscription individually.
A storage resource group isolates Azure Files service private endpoints and data
sets.
A dedicated resource group isolates the virtual machines for their session hosts
Virtual Machines, Disk Encryption Set and an Application Security Group.
A dedicated resource group isolates the spoke VNet resources and a Network
Security Group, which networking specialists in your organization can manage.
ノ Expand table
3 Apply Zero Trust principles to Azure Virtual Desktop storage Verify explicitly
resources. Use least privileged access
Assume breach
4 Apply Zero Trust principles to hub and spoke Azure Virtual Verify explicitly
Desktop VNets. Use least privileged access
Assume breach
5 Apply Zero Trust principles to Azure Virtual Desktop session Verify explicitly
host. Use least privileged access
Assume breach
Azure Virtual Desktop supports different types of identities. Use the information in
Securing identity with Zero Trust to ensure that your chosen identity types adhere
to Zero Trust principles.
Create a dedicated user account with least privileges to join session hosts to a
Microsoft Entra Domain Services or AD DS domain during session host
deployment.
Secure your Azure Virtual Desktop data at rest, in transit, and in use.
Verify users and control access to storage data with the least privileges.
Implement private endpoints for storage accounts.
Logically separate critical data with network controls. Such as separate storage
accounts for different host pools and other purposes such as with MSIX app attach
file shares.
Use Defender for Storage for automated threat protection.
7 Note
In some designs, Azure NetApp files is the storage service of choice for FSLogix
profiles for Azure Virtual Desktop via an SMB share. Azure NetApp Files provides
built-in security features that include delegated subnets and security benchmarks.
A spoke VNet isolates the Azure Virtual Desktop workload and contains the session host
virtual machines. Implement the steps in Apply Zero Trust principles to spoke virtual
network in Azure for the spoke VNet that contains the session host/virtual machines.
Isolate different host pools on separate VNets using NSG with the required URL
necessary for Azure Virtual Desktop for each subnet. When deploying the private
endpoints place them in the appropriate subnet in the VNet based on their role.
Azure Firewall or a network virtual appliance (NVA) firewall can be used to control and
restrict outbound traffic Azure Virtual Desktop session hosts. Use the instructions here
for Azure Firewall to protect session hosts. Force the traffic through the firewall with
User-Defined Routes (UDRs) linked to the host pool subnet. Review the full list of
required Azure Virtual Desktop URLs to configure your firewall. Azure Firewall provides
an Azure Virtual Desktop FQDN Tag to simplify this configuration.
Host pools should have separated organizational units (OUs) if managed by group
policies on Active Directory Domain Services (AD DS).
Azure Virtual Desktop has built-in advanced security features to protect session hosts.
However, see the following articles to improve the security defenses of your Azure
Virtual Desktop environment and session hosts:
In addition, see the key design considerations and recommendations for security,
governance, and compliance in Azure Virtual Desktop landing zones in accordance with
Microsoft's Cloud Adoption Framework.
Recommended training
ノ Expand table
Training Secure an Azure Virtual Desktop deployment
Learn about the Microsoft security capabilities that help keep your applications
and data secure in your Microsoft Azure Virtual Desktop deployment.
Start >
ノ Expand table
Deploy Azure Firewall, route all network traffic through Azure Firewall, and
configure rules. Route the outbound network traffic from the Azure Virtual Desktop
host pool to the service through Azure Firewall.
Start >
ノ Expand table
Learn how to plan and implement Azure roles for Azure Virtual Desktop and
implement Conditional Access policies for remote connections. This learning
path aligns with exam AZ-140: Configuring and Operating Microsoft Azure
Virtual Desktop.
Start >
ノ Expand table
Training Design for user identities and profiles
Your users require access to those applications both on-premises and in the cloud.
You use the Remote Desktop client for Windows Desktop to access Windows apps
and desktops remotely from a different Windows device.
Start >
For more training on security in Azure, see these resources in the Microsoft catalog:
Security in Azure
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
Technical illustrations
You can download the illustrations used in this article. Use the Visio file to modify these
illustrations for your own use.
PDF | Visio
References
Refer to the links below to learn about the various services and technologies mentioned
in this article.
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to an Azure
Virtual WAN deployment
Article • 04/12/2024
With the modern cloud, mobile devices, and other endpoints evolution, relying only on
corporate firewalls and perimeter networks is no longer sufficient. An end-to-end Zero
Trust strategy assumes that security breaches are inevitable. That means you must verify
each request as if it originates from an uncontrolled network. Networking still plays an
important role in Zero Trust to connect and protect infrastructure, applications, and
data. In the Zero Trust model, there are three key objectives when it comes to securing
your networks:
Azure Virtual WAN allows a global transit network architecture by enabling ubiquitous,
any-to-any connectivity between globally distributed sets of cloud workloads in virtual
networks (VNets), branch sites, SaaS and PaaS applications, and users. Adopting a Zero
Trust approach in Azure Virtual WAN is critical to ensure that your backbone is secure
and protected.
This article provides steps to apply the principles of Zero Trust to an Azure Virtual WAN
deployment in the following ways:
ノ Expand table
Verify Always authenticate Use Azure Firewall with Transport Layer Security (TLS)
explicitly and authorize based inspection to verify risk and threats based on all available
on all available data data. Conditional Access controls are intended to provide
points. authentication and authorization by diverse data points
and the Azure Firewall doesn't perform user
authentication.
Use least Limit user access with User access is beyond the scope of Azure network
privileged Just-In-Time and Just- infrastructure deployments. Using Identity pillar solutions
access Enough-Access like Privileged Access Management, Conditional Access,
(JIT/JEA), risk-based and other controls are the way to deliver on this principle.
adaptive policies, and
data protection.
Zero Trust Definition Met by
principle
Assume Minimize blast radius Each spoke VNet has no access to other spoke VNets
breach and segment access. unless the traffic gets routed through the firewall
Verify end-to-end integrated inside each Azure Virtual WAN hub. The firewall
encryption and use is set to deny by default, allowing only traffic allowed by
analytics to get specified rules. In the event of a compromise or breach of
visibility, drive threat one application/workload, it has limited ability to spread
detection, and due to the Azure Firewall performing traffic inspection and
improve defenses. only forwarding allowed traffic. Only resources in the same
workload are exposed to the breach in the same
application.
For more information about how to apply the principles of Zero Trust across an Azure
IaaS environment, see the Apply Zero Trust principles to Azure infrastructure overview.
For an industry discussion of Zero Trust, see NIST Special Publication 800-207 .
A Zero Trust approach for Azure Virtual WAN requires configuration of several
underlying services and components from the Zero Trust principle table previously
listed. Here's a list of steps and actions:
Deploy Azure Firewall or supported Next Generation Firewall (NGFW) NVAs inside
each Virtual WAN hub.
Configure inter-VNet and on-premises branch routing to create a Zero Trust
environment by sending all traffic to security appliances in the hubs for inspection.
Configure the routing to provide filtering and protection for known threats.
Ensure that no resources in the spokes have direct access to the Internet.
Provide application micro-segmentation in spoke networks, along with an
ingress/egress micro-perimeters strategy.
Provide observability for network security events.
Reference architecture
The following diagram shows a common reference architecture that demonstrates a
commonly deployed environment and how to apply the principles of Zero Trust to Azure
Virtual WAN.
Azure
Azure Firewall
Admin Manager
WAF Policy
DNS Private
Firewall Resolver
Policy
VM
Private endpoint VNet
VM VNet Domain Domain
VM Bas on controller controller
VNet
VNet - Shared Services
DNS
Hub-to-Hub Connectivity
Proxy
VPN P2S user VPN Branch 1 VPN Branch 2 ExpressRoute VPN Branch 3 VPN Branch 4 ExpressRoute VPN P2S user
Circuit 1 Circuit 2
Azure Virtual WAN is deployable in Basic and Standard types. Applying Zero Trust
principles for Azure Virtual WAN with Azure Firewall or an NGFW requires the Standard
type.
The Azure Virtual WAN with secured hubs reference architecture includes:
Azure Virtual WAN supports the integration of a limited set of third party firewalls inside
its hubs as an alternative to native Azure Firewall. This article only describes Azure
Firewall. What is included in the VNet-Shared Services spoke in the reference
architecture is just an example of what you could deploy. Microsoft manages Azure
Virtual WAN hubs and you can't install anything else within them except what Azure
Firewall and supported NVAs explicitly allow.
This reference architecture aligns to the architectural principles described in the Cloud
Adoption Framework article for Virtual WAN network topology.
Routing Security
Securing route propagation and isolation of on-premises environment is a critical
security element that must be managed.
Other than traffic segmentation, routing security is a critical part of any network security
design. Routing protocols are an integral part of most networks, including Azure. You
need to protect your infrastructure from the inherent risks to routing protocols such as
misconfigurations or malicious attacks. The BGP protocol used for VPN or ExpressRoute
offers very rich possibilities of protecting your network against undesired routing
changes, which might include the advertisement of too specific routes or too broad
routes.
The best way protect your network is configure your on-premises devices with
appropriate route policies and route maps to make sure that only allowed prefixes are
propagated into your network from Azure. For example, you can:
Under certain circumstances you could get some long IPv4 prefixes from Azure
(network prefix length 30 to 32), which are typically included in other less specific
prefixes and therefore not required. Dropping these prefixes prevents your on-
premises routing tables from growing unnecessarily large.
Block inbound prefixes that aren't in Azure unless you're using Azure as a transit
network.
If you aren't using Azure to transport traffic between your on-premises locations
(for example, with technologies such as ExpressRoute Global Reach), an on-
premises prefix being advertised from Azure would indicate a routing loop. Only
taking Azure prefixes in your on-premises routers would protect you from these
types of routing loops.
If you aren't using your on-premises network for transit between Azure regions,
you shouldn’t be advertising to Azure any prefix that you don’t use on-premises. If
you don’t, you run into the risk of creating routing loops, especially given the fact
that eBGP implementations in most routers re-advertise all prefixes on non-
preferred links. This has the effect of sending Azure prefixes back to Azure unless
you have configured eBGP multi-path.
Logical architecture
Azure Virtual WAN is a collection of hubs and services made available inside a hub. You
can deploy as many Virtual WANs as you need. In a Virtual WAN hub, there are multiple
services such as VPN, ExpressRoute, Azure Firewall, or a third party integrated NVA.
The following diagram shows the logical architecture of Azure infrastructure for an
Azure Virtual WAN deployment as depicted in the Cloud Adoption Framework.
Connec vity Landing zone
subscrip ons subscrip ons
Azure
DDoS VWAN Hub Virtual
DNS UDR(s) NSG/ASG(s)
Standard
Region 1
VNet peering network
Recovery...
Role Policy Network Defender
assignment assignment Watcher for Cloud Dashboards Recovery Services Shared
(Azure portal) vault(s) services
VM SKU(s)
· Access creden als
· In-guest policies/DSC
· Backup policy
· Extensions
Compliant
VM templates
· Tagging
The majority of resources are contained inside the connectivity subscription. You deploy
all Virtual WAN resources into a single resource group in the connectivity subscription,
including when you're deploying across multiple regions. Azure VNet spokes are in the
landing zone subscriptions. If you use inheritance and hierarchy Azure Firewall policy,
the parent policy and the child policy must be located in the same region. You can still
apply a policy that you created in one region on a secured hub from another region.
ノ Expand table
2 Convert your Azure Virtual WAN hubs to secured hubs. Verify explicitly
Assume breach
You must do Steps 1 and 2 in order. The other steps can be done in any order.
Azure Firewall policies can be arranged in a parent-child hierarchy. For either a classic
hub and spoke scenario or a managed Azure Virtual WAN, you should define a root
policy with a common set of IT-wide security rules to allow or deny traffic. Then, for each
hub, a child policy could be defined to implement hub-specific rules through
inheritance. This step is optional. If rules that must be applied to each hub are identical,
a single policy can be applied.
For Zero Trust, a Premium Azure Firewall policy is required and should include the
following settings:
DNS Proxy – You should configure Azure Firewall as a custom DNS server for spoke
VNets that protect the real DNS that resides in a shared service spoke or on-
premises. Azure firewalls act as a DNS Proxy, listen on UDP port 53, and forward
DNS requests to the DNS servers specified in the policy settings. For every spoke,
you must configure a DNS server at the virtual network level pointing to the
internal IP address of the Azure Firewall in the Virtual WAN Hub. You shouldn't
grant network access from spokes and branches to the custom DNS.
Outbound TLS Inspection to protect against malicious traffic that is sent from
an internal client hosted in Azure to the Internet.
As part of the policy creation, you must create the necessary Destination Network
Address Translation (DNAT) rules, network rules, and application rules to enable only the
network flows for explicitly permitted traffic. To enable TLS inspection for selected
targets, the corresponding application rule must have "TLS inspection" setting enabled.
When creating rules in Rules Collections, you should use the most restrictive
"Destination" and "Destination Type".
We recommend Azure Firewall Premium for Zero Trust and that you configure it with the
Premium Policy described in Step 1.
7 Note
For more information, see Install Azure Firewall in a Virtual WAN hub.
When the "Private Traffic" routing policy is enabled, VNet traffic in and out of the Virtual
WAN Hub, including inter-hub traffic, is forwarded to the next-hop Azure Firewall or
NVA that was specified in the policy. Users with Role-Based Access Control (RBAC)
privileges could override Virtual WAN route programming for spoke VNets and
associate a custom User Defined Route (UDR) to bypass the hub firewall. To prevent this
vulnerability, RBAC permissions to assign UDRs to spoke VNet subnets should be
restricted to central network administrators and not delegated to the landing zone
owners of the spoke VNets. To associate a UDR with a VNet or subnet, a user must have
the Network Contributor role or a custom role with the
"Microsoft.Network/routeTables/join/action" action or permission.
7 Note
In this article, Azure Firewall is primarily considered for both Internet traffic and
private traffic control. For Internet traffic, a third party, supported security NVA can
be used or a third party Security as a Service (SECaaS) provider. For private traffic,
third party supported security NVAs can be used as an alternative to Azure Firewall.
7 Note
Custom Route Tables in Azure Virtual WAN can't be used in conjunction with
Routing Intent and Policies and should not be considered as a security option.
Local DMZ: A DNAT rule created in the central firewall inside the Azure Virtual
WAN Hub should filter and allow inbound non-http or https traffic. Inbound http
or https traffic should be managed by a local Azure Application Gateway and
associated Web Application Firewall.
Although Azure Virtual WAN secure virtual hubs don't support Azure DDoS
Protection yet, usage of DDoS to protect Internet-facing endpoints in spoke VNets
is possible and highly recommended. For more information, see Azure Firewall
Manager known issues and Hub virtual network and secured virtual hub
comparison.
Advanced threat detection and protection: See Apply Zero Trust principles to a
spoke virtual network. The elements inside the spoke must be protected with
threat protection tools like Microsoft Defender for Cloud.
Because the hub in Azure Virtual WAN is locked and managed by Azure, custom
components can't be installed or enabled there. Some resources that are normally
deployed inside the hub, in a classic hub and spoke model, must be placed in one or
more spokes that acts as shared resource networks. For example:
Azure Bastion: Azure Bastion supports Azure Virtual WAN but must be deployed
inside a spoke virtual network because the hub is restricted and managed by
Azure. From the Azure Bastion spoke, users can reach resources in other VNets, but
requires IP-based connection available with the Azure Bastion Standard SKU.
Custom DNS servers: DNS server software can be installed on any virtual machine
and act as DNS server for all the spokes in Azure Virtual WAN. The DNS server
must be installed in a spoke VNet that serves all other spokes directly, or through
DNS Proxy feature offered by the Azure Firewall that is integrated inside the Virtual
WAN hub.
Azure Private DNS Resolver: Deployment of an Azure Private DNS Resolver is
supported inside one of the spoke VNets connected to Virtual WAN hubs. Azure
Firewall that is integrated inside the Virtual WAN hub can use this resource as a
custom DNS when you enable the DNS Proxy feature.
Private Endpoints: This resource type is compatible with Virtual WAN but must be
deployed inside a spoke VNet. This provides connectivity to any other virtual
network or branch connected to the same Virtual WAN, if the integrated Azure
Firewall allows the flow. Instructions on how to secure traffic to Private Endpoints
using the Azure Firewall integrated inside a Virtual WAN hub can be found in
Secure traffic destined to private endpoints in Azure Virtual WAN.
Azure Private DNS Zone (links): This type of resource doesn't live inside a virtual
network but must be linked to them to function correctly. Private DNS Zones can't
be linked to Virtual WAN hubs. Instead, they should be connected to the spoke
VNet containing custom DNS servers or an Azure Private DNS Resolver
(recommended) or directly to the spoke VNets that require the DNS records from
that zone.
Virtual WAN S2S VPN gateway provides encryption when using IPsec/IKE (IKEv1
and IKEv2) VPN connection.
Virtual WAN P2S VPN gateway provides encryption when using user VPN
connection over OpenVPN or IPsec/IKE (IKEv2).
The Virtual WAN ExpressRoute gateway doesn't provide encryption, therefore the
same considerations from standalone ExpressRoute apply.
For third party Software-Defined WAN (SD-WAN) devices and NVAs integrated
into Virtual WAN hub, specific encryption capabilities must be verified and
configured according to the vendor's documentation.
Once the traffic has entered the Azure network infrastructure through one of the
gateways or an SD-WAN/NVA, there's no specific Virtual WAN service or capability that
provides network encryption. If traffic between a hub and its virtual network and hub-
to-hub is unencrypted, you must use application-level encryption if needed.
7 Note
Virtual WAN spokes doesn't support VNet-to-VNet encryption using Azure VPN
Gateway because a spoke is required to use Virtual WAN hub remote gateway.
7 Note
Microsoft Entra authentication is only available for gateways that use the OpenVPN
protocol, which is supported only for OpenVPN protocol connections and requires
the Azure VPN Client.
Azure Virtual WAN and Azure Firewall don't provide traffic routing and filtering based
on user account or group names, but it's possible to assign different groups of users
different pools of IP addresses. You can then define rules on the integrated Azure
Firewall to restrict users or groups based on their assigned P2S IP address pool.
If you divide your P2S users into different groups based on network access
requirements, we recommend that you differentiate them at the network level and
ensure that they can access only a subset of the internal network. You can create
multiple IP address pools for Azure Virtual WAN. For more information, see Configure
user groups and IP address pools for P2S User VPNs.
Azure Firewall provides the following monitoring tools that you should use to ensure
security and correct application of Zero Trust principles:
Azure Firewall Policy Analytics provide insights, centralized visibility, and control to
Azure Firewall. Security does require that proper firewall rules are in place and
effective to protect the internal infrastructure. The Azure Portal summarizes details
about "Potential Malicious Sources" generated by firewall engine IDPS and Threat
Intelligence features.
Azure Firewall Workbook provides a flexible canvas for Azure Firewall data analysis.
You can gain insights into Azure Firewall events, learn about your application, and
network rules, and see statistics for firewall activities across URLs, ports, and
addresses. We highly recommend that you periodically review check IDPS Log
Statistics and from the Investigations tab, check denied traffic, source and
destination flows, and the Threat Intelligence report to review and optimize firewall
rules.
Azure Firewall also integrates with Microsoft Defender for Cloud and Microsoft
Sentinel . We highly recommend that you correctly configure both tools and actively
use them for Zero Trust in the following ways:
With Microsoft Defender for Cloud integration , you can visualize the all-up
status of network infrastructure and network security in one place, including Azure
Network Security across all VNets and Virtual Hubs spread across different regions
in Azure. With a single glance, you can see the number of Azure Firewalls, firewall
policies, and Azure regions where Azure Firewalls are deployed.
A Microsoft Sentinel solution for seamless Azure Firewall integration provides
threat detection and prevention. Once deployed, the solution allows built-in
customizable threat detection on top of Microsoft Sentinel. The solution also
includes a workbook, detections, hunting queries and playbooks .
ノ Expand table
Start >
ノ Expand table
Describe how Azure Firewall protects Azure VNet resources, including the Azure
Firewall features, rules, deployment options, and administration with Azure Firewall
Manager.
Start >
ノ Expand table
Describe whether you can use Azure Firewall Manager to provide central security
policy and route management for your cloud-based security perimeters. Evaluate
whether Azure Firewall Manager can help secure your cloud perimeters.
Start >
Design and implement network security
ノ Expand table
You will learn to design and implement network security solutions such as Azure
DDoS, Network Security Groups, Azure Firewall, and Web Application Firewall.
Start >
For more training on security in Azure, see these resources in the Microsoft catalog:
Security in Azure
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
References
Refer to these links to learn about the various services and technologies mentioned in
this article.
Security baselines
Azure Firewall
Azure Firewall Manager
Azure security
Introduction to Azure security
Zero Trust implementation guidance
Overview of the Microsoft cloud security benchmark
Building the first layer of defense with Azure security services
Microsoft Cybersecurity Reference Architectures
Technical illustrations
You can download the illustrations used in this article. Use the Visio file to modify these
illustrations for your own use.
PDF | Visio
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to IaaS
applications in Amazon Web Services
Article • 05/10/2024
This article provides steps to apply the principles of Zero Trust to IaaS applications in
Amazon Web Services (AWS):
ノ Expand table
Use least- Limit user access with Just-In- Microsoft Entra Permissions
privilege Time and Just-Enough-Access Management detects, right-sizes, and
access (JIT/JEA), risk-based adaptive monitors unused and excessive
policies, and data protection. permissions.
Privileged Identity Management (PIM), a
service in Microsoft Entra ID P2, allows
you to manage, control, and monitor
access to important resources in your
organization.
Assign users role-based access control
(RBAC) to resources at the repository
level, team level, or organization level.
Assume Minimize blast radius and Microsoft Defender for Cloud and
breach segment access. Verify end-to- Microsoft Defender for Endpoint
end encryption and use analytics (Microsoft 365) continuously scan the
to get visibility, drive threat environment for threats and
detection, and improve defenses. vulnerabilities.
Microsoft Sentinel analyzes collected
data, behavioral trend of entities,
anomalies, and multi-stage threats
across enterprises to detect suspicious
activity, and can respond with
automation.
For more information about how to apply the principles of Zero Trust across an Azure
IaaS environment, see the Apply Zero Trust principles to Azure IaaS overview.
AWS and AWS components
AWS is one of the public cloud providers available in the market, along with Microsoft
Azure, Google Cloud Platform, and others. It's common for companies to have a
multicloud architecture that consists of more than one cloud provider. In this article, we
focus on a multicloud architecture where:
Azure and AWS are integrated to run workloads and IT business solutions.
You secure an AWS IaaS workload using Microsoft products.
AWS virtual machines, called Amazon Elastic Compute Cloud (Amazon EC2), run on top
of an AWS virtual network, called Amazon Virtual Private Cloud (Amazon VPC). Users
and cloud administrators set up an Amazon VPC in their AWS environment and add
Amazon EC2 virtual machines.
AWS CloudTrail logs AWS account activity in the AWS environment. Amazon EC2,
Amazon VPC, and AWS CloudTrail are common in AWS environments. Collecting logs
from these services is essential to understanding what is going on in your AWS
environment and the actions to take to avoid or mitigate attacks.
Amazon GuardDuty is a threat detection service that helps to protect AWS workloads by
monitoring the AWS environment for malicious activities and unauthorized behavior.
In this article, you learn how to integrate monitoring and logging of these AWS
resources and services with Azure's monitoring solutions and the Microsoft security
stack.
Reference Architecture
The following architecture diagram shows the common services and resources needed
to run an IaaS workload in an AWS environment. The diagram also shows the Azure
services needed to ingest logs and data from the AWS environment into Azure and to
provide threat monitoring and protection.
Source Control Microso Entra
GitHub
AWS Cloud
Iden ty
Azure Cloud
Iden ty
Log Analy cs
Workspaces
Logging & Monitoring Storage
MIcrosoft 365 subscription
Microso Defender
Amazon GuardDuty
Amazon Simple Queuing Service
for Cloud
(Amazon SQS)
The diagram demonstrates ingestion of logs into Azure for the following resources and
services in the AWS environment:
To ingest logs into Azure for the resources and services in the AWS environment, you
must have Amazon Simple Storage Service (Amazon S3) and Amazon Simple Queue
Service (SQS) defined.
Logs and data are ingested into Log Analytics in Azure Monitor.
7 Note
You don't have to ingest logs into all of the Microsoft products listed to monitor
your AWS resources and services. Using all of the Microsoft products together,
though, provides greater benefit from AWS log and data ingestion into Azure.
This article follows the architecture diagram and describes how to:
Install and configure the Microsoft products to ingest logs from your AWS
resources.
Configure metrics for the security data that you want to monitor.
Improve your overall security posture and secure the AWS workload.
Secure Infrastructure as code.
ノ Expand table
Steps Task
A Install Azure Connected Machine agent on to your Amazon Elastic Compute Cloud
(Amazon EC2) virtual machines to ingest operating system data and logs into Azure.
B Install Azure Monitor Agent on to Amazon EC2 virtual machines to send logs to your Log
Analytics workspace.
E Use the AWS connectors to pull AWS service logs into Microsoft Sentinel.
When you enable VM insights for a machine, the Azure Monitor Agent (AMA) is
installed. AMA collects monitoring data from the Amazon EC2 virtual machines and
delivers it to Azure Monitor for use by features, insights, and other services, such as
Microsoft Sentinel and Microsoft Defender for Cloud.
) Important
Log Analytics is a tool in the Azure portal that you use to edit and run log queries
against data in the Azure Monitor Logs store. Log Analytics is automatically
installed.
Amazon EC2 virtual machines may have the legacy Log Analytics agent installed. This
agent will be deprecated in September 2024. Microsoft recommends installing the new
Azure Monitor Agent.
The Log Analytics agent or Azure Monitor Agent for Windows and Linux is required to:
Proactively monitor the operating system and workloads running on the machine.
Manage the machine using Automation runbooks or solutions like Update
Management.
Use other Azure services like Microsoft Defender for Cloud.
When you collect logs and data, the information is stored in a Log Analytics workspace.
You need a Log Analytics workspace if you collect data from Azure resources in your
subscription.
Azure Monitor workbooks are a visualization tool available in the Azure portal.
Workbooks combine text, log queries, metrics, and parameters into rich interactive
reports. Setting up workbooks helps you use analytics to adhere to the Zero Trust
assume breach principle.
Workbooks are discussed in the next article under Monitor in Microsoft Sentinel logs
from Amazon Virtual Private Cloud (Amazon VPC), AWS CloudTrail, and Amazon
GuardDuty.
Continuously assess - Know your security posture. Identify and track vulnerabilities.
Secure - Harden resources and services with the Microsoft cloud security
benchmark (MCSB) and AWS Foundational Security Best Practices standard .
Defend - Detect and resolve threats to resources and services.
Microsoft Defender for Servers is one of the paid plans provided by Microsoft Defender
for Cloud. Defender for Servers extends protection to your Windows and Linux machines
that run in Azure, AWS, Google Cloud Platform, and on-premises. Defender for Servers
integrates with Microsoft Defender for Endpoint to provide endpoint detection and
response (EDR) and other threat protection features.
Connect an AWS account to Microsoft Defender for Cloud to protect your AWS
resources.
Select a Defender for Servers plan in Microsoft Defender for Cloud to compare
different plans offered by Defender for Servers. Defender for Servers automatically
provisions the Defender for Endpoint sensor on every supported machine that's
connected to Defender for Cloud.
7 Note
If you haven't deployed AMA on your servers yet, you can deploy the Azure
Monitor Agent on your servers when you enable Defender for Servers.
Microsoft Sentinel delivers security analytics and threat intelligence across the
enterprise. With Microsoft Sentinel, you get a single solution for attack detection, threat
visibility, proactive hunting, and threat response.
The AWS connector is available in two versions: the new Amazon Simple Storage Service
(Amazon S3) connector that ingests logs by pulling them from an Amazon S3 bucket
and the legacy connector for CloudTrail management and data logs. The Amazon S3
connector can ingest logs from Amazon Virtual Private Cloud (Amazon VPC), AWS
CloudTrail, and Amazon GuardDuty. The Amazon S3 connector is in preview. We
recommend using the Amazon S3 connector.
To ingest logs from Amazon VPC, AWS CloudTrail, and Amazon GuardDuty using the
Amazon S3 connector, see Connect Microsoft Sentinel to AWS.
7 Note
Microsoft recommends using the automatic setup script to deploy the Amazon S3
connector. If you prefer to perform each step manually, then follow the manual
setup to connect Microsoft Sentinel to AWS.
ノ Expand table
Steps Task
A Collect Amazon Elastic Compute Cloud (Amazon EC2) logs in Azure Monitor.
B View and manage Microsoft Defender for Cloud security alerts and recommendations for
Amazon EC2.
E Monitor in Microsoft Sentinel logs from Amazon Virtual Private Cloud (Amazon VPC),
AWS CloudTrail, and Amazon GuardDuty.
F Use Microsoft Sentinel built in detection rules to create and investigate threat detection
rules in your environment.
To collect logs from your Amazon EC2 VMs, see create data collection rules.
There are two ways to view recommendations in the Azure portal. In the Defender for
Cloud overview page, you view recommendations for the environment you want to
improve. On the Defender for Cloud asset inventory page, recommendations are shown
according to the affected resource.
Learn about the different types of alerts available in Defender for Cloud and how
to respond to alerts.
Improve your security posture by implementing recommendations from Defender
for Cloud.
Learn how to access the asset inventory page of Defender for Cloud.
7 Note
For more information, see Enable the Microsoft Defender for Endpoint integration.
The following image demonstrates how Amazon EC2 operating system logs are ingested
by Microsoft Sentinel. The Azure Connected Machine agent makes your Amazon EC2
VMs part of Azure. The Windows Security Events via AMA data connector collects data
from your Amazon EC2 VMs.
7 Note
You don't need Microsoft Sentinel to ingest logs from Amazon EC2 but you do
need a Log Analytics workspace previously set-up.
For step-by-step guidance, see Amazon EC2 Sentinel Ingestion using Arc and AMA ,
which is a document in GitHub. The GitHub document addresses installing AMA, which
you can skip because you installed AMA earlier in this solution guide.
You can query Amazon VPC Flow Logs, AWS CloudTrail and Amazon GuardDuty in
Microsoft Sentinel. The following are query examples for each service and
corresponding table in Log Analytics:
In Microsoft Sentinel, you utilize the Amazon S3 workbook to analyze more details.
Microsoft's team of security experts and analysts design rule templates based on known
threats, common attack vectors, and suspicious activity escalation chains. Rules created
from these templates automatically search across your environment for any activity that
looks suspicious. Many of the templates can be customized to search for activities, or
filter them out, according to your needs. The alerts generated by these rules create
incidents that you can assign and investigate in your environment.
For more information, see detecting threats with built-in analytics rules in Microsoft
Sentinel.
ノ Expand table
Steps Task
Permissions Management deepens Zero Trust security strategies by augmenting the use
least-privilege access principle, allowing customers to:
Get comprehensive visibility: Discover which identity is doing what, where, and
when.
Automate least-privilege access: Use access analytics to ensure identities have the
right permissions, at the right time.
Unify access policies across IaaS platforms: Implement consistent security policies
across your cloud infrastructure.
Permissions Management provides a summary of key statistics and data for AWS and
Azure. The data includes metrics related to avoidable risk. These metrics allow the
Permissions Management administrator to identify areas where risks related to the Zero
Trust use least-privilege access principle can be reduced.
Data can be fed into Microsoft Sentinel for further analysis and automation.
You implement the Zero Trust use least-privilege access principle by:
Prerequisites:
ノ Expand table
Steps Task
When you deploy cloud-based solutions for your infrastructure deployments, security
should always be your most important concern. Microsoft keeps the underlying cloud
infrastructure secure. You configure security in Azure DevOps or GitHub.
To configure security:
In Azure DevOps, you can use security groups, policies, and settings at the
organization/collection, project, or object level.
In GitHub, you can assign users access to resources by granting them roles at the
repository level, team level, or organization level.
By default, GitHub Advanced Security is enabled for public repositories. For your private
repositories, you need to use the GitHub Advanced Security licensing. Once enabled,
you can start using the many features that come with the GitHub Advanced Security
suite:
Code scanning
Dependency scanning
Secret scanning
Access control
Vulnerability alerts
Audit log
Branch protection rules
Pull request reviews
With these features, you can ensure that your code is secure and compliant with
industry standards. You can also create automated workflows to help you quickly detect
and address any security issues in your code. Additionally, you can use branch
protection rules to prevent unauthorized changes to your codebase.
Defender for DevOps exposes security findings as annotations in Pull Requests (PR).
Security operators can enable PR annotations in Microsoft Defender for Cloud. Exposed
issues can be remedied by developers. This process can prevent and fix potential
security vulnerabilities and misconfigurations before they enter the production stage.
You can configure PR annotations in Azure DevOps. You can get PR annotations in
GitHub if you're a GitHub Advanced Security customer.
Next steps
Learn more about the Azure services discussed in this article:
Learn more about AWS and Amazon services and resources discussed in this article:
Feedback
Was this page helpful? Yes No
Apply Zero Trust principles to
encrypting Azure-based network
communication
Article • 04/12/2024
This article provides guidance to applying the principles of Zero Trust for encrypting
network communication to, from, and across Azure environments in the following ways.
ノ Expand table
Verify Always authenticate and Using Conditional Access policies for your
explicitly authorize based on all available Azure VPN Gateway connections and Secure
data points. Shell (SSH) and Remote Desktop Protocol
(RDP) for your user-to-virtual machine
connections.
Use least Limit user access with Just-In- Configuring your Microsoft Enterprise Edge
privileged Time and Just-Enough-Access (MSEE) devices to use static connectivity
access (JIT/JEA), risk-based adaptive association key (CAK) for Azure ExpressRoute
policies, and data protection. with direct ports and using managed identity
to authenticate ExpressRoute circuit resources.
Assume Minimize blast radius and Protecting network traffic with encryption
breach segment access. Verify end-to- methods and protocols that provide
end encryption and use analytics confidentiality, integrity, and authenticity of
to get visibility, drive threat your data in transit.
detection, and improve defenses.
Using Azure Monitor to provide ExpressRoute
network performance metrics and alerts.
Reference architecture
The following diagram shows the reference architecture for this Zero Trust guidance for
encrypted communication between users and admins on-premises or on the internet
and components in the Azure environment for the steps described in this article.
Internet
Azure
Security VNET
1
User Bastion Subnet
P2S VPN
3 Subnet
Subnet
Admin Bastion SSH or RDP VNet
To requested encryption
VM VM
Azure Firewall DNAT
VM
VM VM (native or
Premium SSH or RDP peering)
Azure Firewall
Subnet Azure Web Apps
BE Pool
Workload VNET Application VNET
4 VPN GW ExRGW
AppGW VPN GW ExRGW Regional
Subnet Subnet AppGw (WAF) 3 DataLink Region A
On-premises APP GW MACsec
subnet
5 Region B
User Bastion
1
Admin
P2S VPN S2S Over ExR
2 Partner Circuits VM VM
1
Subnet
S2S VPN vWAN Secure
Manged Hub Standalone VNET
VPN GW ExR GW
Datacenter
ExpressRoute ExpressRoute
Partner Circuits Direct Port
Circuits
1 2
S2S VPN ExpressRoute S2S
Direct Over ExR Direct Port Circuits
In the diagram, the numbers correspond to the steps in the following sections.
ノ Expand table
Step Task Zero Trust principle(s)
applied
3 Secure and verify communication within and across Azure Assume breach
VNets.
The following diagram shows the reference architecture for implementing network layer
encryption.
Internet
Azure
Security VNET
1
User Bastion Subnet
P2S VPN
Subnet
Subnet
Admin Bastion SSH or RDP
To requested
VM VM VM
Azure Firewall DNAT VM VM
Premium SSH or RDP
Azure Firewall
Subnet Azure Web Apps
BE Pool
Workload VNET Application VNET
VPN GW ExRGW
VPN GW ExRGW
AppGw (WAF)
Subnet Subnet Region A
On-premises APP GW
subnet
Region B
User
1
Admin
P2S VPN VM VM
1
Subnet
S2S VPN vWAN Secure
Manged Hub Standalone VNET
VPN GW ExR GW
Datacenter
ExpressRoute ExpressRoute
Partner Circuits Direct Port
Circuits
1
S2S VPN S2S
Over ExR Direct Port Circuits
In the next two sections, we discuss Internet Protocol Security (IPsec) and Media Access
Control Security (MACsec ), which Azure networking services support these protocols,
and how you can ensure they're being used.
IPsec
IPsec is a group of protocols that provides security for Internet Protocol (IP)
communications. It authenticates and encrypts network packets using a set of
encryption algorithms. IPSec is the security encapsulation protocol used to establish
virtual private networks (VPNs). An IPsec VPN tunnel consists of two phases, phase 1
known as main mode and phase 2 known as quick mode.
Phase 1 of IPsec is tunnel establishment, where peers negotiate parameters for the
Internet Key Exchange (IKE) security association, such as encryption, authentication,
hashing, and Diffie-Hellman algorithms. To verify their identities, peers exchange a
preshared key. Phase 1 of IPsec can operate in two modes: main mode or aggressive
mode. Azure VPN Gateway supports two versions of IKE, IKEv1 and IKEv2, and only
operates in main mode. Main mode ensures the encryption of the identity of the
connection between the Azure VPN Gateway and the on-premises device.
In phase 2 of IPsec, peers negotiate security parameters for data transmission. In this
phase, both peers agree on the encryption and authentication algorithms, lifetime value
of the security association (SA), and traffic selectors (TS) that defines what traffic is
encrypted over the IPsec tunnel. The tunnel created in phase 1 serves as a secure
channel for this negotiation. IPsec can secure IP packets using either Authentication
Header (AH) protocol or Encapsulating Security Payload (ESP) protocol. AH provides
integrity and authentication, while ESP also provides confidentiality (encryption). IPsec
phase 2 can operate in either transport mode or tunnel mode. In transport mode, only
the payload of the IP packet gets encrypted, while in tunnel mode the entire IP packet is
encrypted and a new IP header is added. IPsec phase 2 can be established on top of
either IKEv1 or IKEv2. The current Azure VPN Gateway IPsec implementation supports
only ESP in tunnel mode.
VNet-to-VNet connections
Point-to-Site connections
VPN sites
There are no settings that you need to modify to enable IPsec for these services. They're
enabled by default.
MACsec is configured with connectivity associations, which are a set of attributes that
network interfaces use to create inbound and outbound security channels. Once
created, traffic over these channels gets exchanged over two MACsec secured links.
MACsec has two connectivity association modes:
Static connectivity association key (CAK) mode: MACsec secured links are
established using a preshared key that includes a connectivity association key
name (CKN) and the assigned CAK. These keys are configured on both ends of the
link.
Dynamic CAK mode: The security keys are generated dynamically using the 802.1x
authentication process, which can use a centralized authentication device such as a
Remote Authentication Dial-In User Service (RADIUS) server.
Microsoft Enterprise Edge (MSEE) devices support static CAK by storing the CAK and
CKN in an Azure Key Vault when you configure Azure ExpressRoute with direct ports. To
access the values in the Azure Key Vault, configure managed identity to authenticate the
ExpressRoute circuit resource. This approach follows the Use least privileged access
Zero Trust principle because only authorized devices can access the keys from the Azure
Key Vault. For more information, see Configure MACsec on ExpressRoute Direct ports.
The following diagram shows the reference architecture for securing and verifying
communication from an on-premises network to Azure VNets.
Internet
Azure
Security VNET
User Bastion Subnet
Subnet
Subnet
Admin Bastion SSH or RDP
To requested
VM VM VM
Azure Firewall DNAT VM VM
Premium SSH or RDP
Azure Firewall
Subnet Azure Web Apps
BE Pool
Workload VNET Application VNET
VPN GW ExRGW
AppGW VPN GW ExRGW
AppGw (WAF)
Subnet Subnet Region A
On-premises APP GW
subnet
Region B
User
Admin
P2S VPN S2S Over ExR
2 Partner Circuits VM VM
Subnet
vWAN Secure
Manged Hub Standalone VNET
VPN GW ExR GW
Datacenter
ExpressRoute ExpressRoute
Partner Circuits Direct Port
Circuits
2
ExpressRoute S2S
Direct Over ExR Direct Port Circuits
Azure ExpressRoute provides a high bandwidth private connection that lets you
extend your on-premises network into Azure with the assistance of a connectivity
provider. Because network traffic doesn’t travel over the public internet, data isn’t
encrypted by default. To encrypt your traffic over ExpressRoute, configure an IPsec
tunnel. However, keep in mind that when running IPsec tunnels over ExpressRoute,
the bandwidth is limited to the tunnel bandwidth and you might need to run
multiple tunnels to match the ExpressRoute circuit bandwidth. For more
information, see Site-to-Site VPN connections over ExpressRoute private peering -
Azure VPN Gateway.
If you’re using ExpressRoute Direct ports, you can increase your network security
by enabling authentication when establishing BGP peers or configuring MACsec to
secure layer 2 communication. MACsec provides encryption for Ethernet frames,
ensuring data confidentiality, integrity, and authenticity between your edge router
and Microsoft’s edge router.
Azure ExpressRoute also supports Azure Monitor for network performance metrics
and alerts.
Encryption can safeguard your data from unauthorized interception, but it also
introduces an extra layer of processing for encrypting and decrypting network traffic
that can affect performance. Network traffic going over the internet can also be
unpredictable because it must travel through multiple network devices that can
introduce network latency. To avoid performance issues, Microsoft recommends using
ExpressRoute because it offers reliable network performance and bandwidth allocation
that you can customize for your workload.
When deciding between Azure VPN Gateway or ExpressRoute, consider the following
questions:
1. What kinds of files and applications are you accessing between your on-premises
network and Azure? Do you require consistent bandwidth for transferring large
volumes of data?
2. Do you need consistent and low latency for your applications to perform
optimally?
3. Do you need to monitor the network performance and health of your hybrid
connectivity?
If you answered yes to any of these questions, then Azure ExpressRoute should be your
primary method of connecting your on-premises network to Azure.
There are two common scenarios where ExpressRoute and Azure VPN Gateway can
coexist:
Azure VPN Gateway can be used to connect your branch offices to Azure while
having your main office connected using ExpressRoute.
You can also use Azure VPN Gateway as a backup connection to Azure for your
central office if your ExpressRoute service has an outage.
The following diagram shows the reference architecture for securing and verifying
communication within and across Azure VNets.
Internet
Azure
Security VNET
User Bastion Subnet
3 Subnet
Subnet
Admin Bastion SSH or RDP VNet
To requested encryption
VM VM
Azure Firewall DNAT
VM
VM VM (native or
Premium SSH or RDP peering)
Azure Firewall
Subnet Azure Web Apps
BE Pool
Workload VNET Application VNET
VPN GW ExRGW
AppGW VPN GW ExRGW Regional
Subnet Subnet AppGw (WAF) 3 DataLink Region A
On-premises APP GW MACsec
subnet
Region B
User
Admin
VM VM
Subnet
vWAN Secure
Manged Hub Standalone VNET
VPN GW ExR GW
Datacenter
ExpressRoute ExpressRoute
Partner Circuits Direct Port
Circuits
To reduce the overhead of configuring a VPN gateway or virtual appliance, enable the
VNet encryption feature for certain virtual machine sizes to encrypt and verify traffic
between virtual machines at the host level, within a VNet, and across VNet peerings.
The following diagram shows the reference architecture for implementing encryption at
the application layer.
Internet
Azure
Security VNET
User Bastion Subnet
Subnet
Subnet
Admin Bastion SSH or RDP
To requested
VM VM VM
Azure Firewall DNAT VM VM
Premium SSH or RDP
Azure Firewall
Subnet Azure Web Apps
BE Pool
Workload VNET Application VNET
4 VPN GW ExRGW
AppGW VPN GW ExRGW
AppGw (WAF)
Subnet Subnet Region A
On-premises APP GW
subnet
Region B
User Bastion
Admin
VM VM
Subnet
vWAN Secure
Manged Hub Standalone VNET
VPN GW ExR GW
Datacenter
ExpressRoute ExpressRoute
Partner Circuits Direct Port
Circuits
S2S
Over ExR Direct Port Circuits
One of the most common examples of encryption at the application layer is Hypertext
Transfer Protocol Secure (HTTPS), which encrypts data between a web browser and a
web server. HTTPS uses Transport Layer Security (TLS) protocol to encrypt client-server
communication and uses a TLS digital certificate to verify the identity and
trustworthiness of the website or domain.
Another example of application layer security is Secure Shell (SSH) and Remote Desktop
Protocol (RDP) that encrypts data between the client and server. These protocols also
support multifactor authentication and Conditional Access policies to ensure that only
authorized and compliant devices or users can access remote resources. See Step 5 for
information about securing SSH and RDP connections to Azure virtual machines.
Azure Front Door is a global distribution service that optimizes the content delivery to
end users through Microsoft's edge locations. With features such as Web Application
Firewall (WAF) and Private Link service, you can detect and block malicious attacks on
your web applications at the edge of the Microsoft network while privately accessing
your origins using the Microsoft internal network.
To protect your data, traffic to Azure Front Door endpoints is protected using HTTPS
with end-to-end TLS for all traffic going to and from its endpoints. Traffic is encrypted
from the client to the origin and from the origin to the client.
Azure Front Door handles HTTPS requests and determines which endpoint in its profile
has the associated domain name. Then it checks the path and determines which routing
rule matches the path of the request. If caching is enabled, Azure Front Door checks its
cache to see if there's a valid response. If there's no valid response, Azure Front Door
selects the best origin that can serve the content requested. Before the request is sent
to the origin, a rule set can be applied to the request to change the header, query string,
or origin destination.
Azure Front Door supports both front end and back-end TLS. Front end TLS encrypts
traffic between the client and Azure Front Door. Back-end TLS encrypts traffic between
Azure Front Door and the origin. Azure Front Door supports TLS 1.2 and TLS 1.3. You can
configure Azure Front Door to use a custom TLS certificate or use a certificate managed
by Azure Front Door.
7 Note
You can also use the Private Link feature for connectivity to NVAs for further packet
inspection.
Azure Application Gateway is a regional load balancer that operates at Layer 7. It routes
and distributes web traffic based on HTTP URL attributes. It can route and distribute
traffic using three different approaches:
HTTP only: Application Gateway receives and routes incoming HTTP requests to
the appropriate destination in unencrypted form.
SSL Termination: Application Gateway decrypts incoming HTTPS requests at the
instance level, inspects them, and routes them unencrypted to the destination.
End-to-End TLS: Application Gateway decrypts incoming HTTPS requests at the
instance level, inspects them, and re-encrypts them before routing them to the
destination.
The most secure option is end-to-end TLS, which allows encryption and transmission of
sensitive data by requiring the use of Authentication Certificates or Trusted Root
Certificates. It also requires uploading these certificates to the backend servers and
ensuring these back end servers are known to Application Gateway. For more
information, see Configure end-to-end TLS by using Application Gateway.
Additionally, on-premises users or users on virtual machines in another VNet can use
the internal front end of Application Gateway with the same TLS capabilities. Along with
encryption, Microsoft recommends that you always enable WAF for more front-end
protection for your endpoints.
Azure virtual machines don't need a public IP address. Connections are over TCP
port 443 for HTTPS and can traverse most firewalls.
Virtual machines are protected against port scanning.
The Azure Bastion platform is constantly updated and protected against zero-day
exploits.
With Bastion, you can control the RDP and SSH connectivity to your virtual machine
from a single point of entry. You can manage individual sessions from the Bastion
service in the Azure portal. You can also delete or force a disconnect of an on-going
remote session if you suspect a user isn't supposed to be connecting to that machine.
The following diagram shows the reference architecture for using Azure Bastion to
protect Azure virtual machines.
Internet
Azure
Security VNET
User Bastion Subnet
Subnet
Subnet
Admin Bastion SSH or RDP
To requested
VM VM VM
Azure Firewall DNAT VM VM
Premium SSH or RDP
Azure Firewall
Subnet Azure Web Apps
BE Pool
Workload VNET Application VNET
VPN GW ExRGW
VPN GW ExRGW
AppGw (WAF)
Subnet Subnet Region A
On-premises APP GW
subnet
5 Region B
User Bastion
Admin
VM VM
Subnet
vWAN Secure
Manged Hub Standalone VNET
VPN GW ExR GW
Datacenter
ExpressRoute ExpressRoute
Partner Circuits Direct Port
Circuits
S2S
Over ExR Direct Port Circuits
To protect your Azure virtual machine, deploy Azure Bastion and begin using RDP and
SSH to connect to your virtual machines with their private IP addresses.
Recommended training
Connect your on-premises network to Azure with VPN Gateway
Connect your on-premises network to the Microsoft global network by using
ExpressRoute
Introduction to Azure Front Door
Configure Azure Application Gateway
Introduction to Azure Bastion
Next Steps
For additional information about applying Zero Trust to Azure networking, see:
Secure networks with Zero Trust
Spoke virtual networks in Azure
Hub virtual networks in Azure
Spoke virtual networks with Azure PaaS services
Azure Virtual WAN
References
Refer to these links to learn about the various services and technologies mentioned in
this article.
Feedback
Was this page helpful? Yes No
Implement Microsoft Sentinel and
Microsoft Defender XDR for Zero Trust
Article • 03/07/2024
This solution guide walks through the process of setting up Microsoft eXtended
detection and response (XDR) tools together with Microsoft Sentinel to accelerate your
organization’s ability to respond to and remediate cybersecurity attacks.
Microsoft Defender XDR is an XDR solution that automatically collects, correlates, and
analyzes signal, threat, and alert data from across your Microsoft 365 environment.
This guidance helps you mature your Zero Trust architecture by mapping the principles
of Zero Trust in the following ways.
ノ Expand table
Verify Microsoft Sentinel collects data from across the environment, performs analysis
explicitly of threats and anomalies, and can respond with automation.
Use least Microsoft Sentinel can detect anomalous activity through its User Entity
privileged Behavioral Analytics (UEBA) engine.
access
Threat Intelligence with Microsoft Sentinel can import threat intelligence data
from Microsoft or third-party providers to detect new, emerging threats and
provide extra context for investigations.
Microsoft Defender XDR has Microsoft Entra ID Protection, which can block
users based on the level of risk with identity. Data can be fed into Microsoft
Sentinel for further analysis and automation.
Assume Microsoft Defender XDR continuously scans the environment for threats and
breach vulnerabilities. Microsoft Sentinel analyzes collected data, behavioral trend of
entities to detect suspicious activity, anomalies and multi-stage threats across
Zero Trust Met by
Principle
enterprise.
Azure Services
Third-party Other Cloud Microsoft SQL Azure Storage
Server VMs Azure DNS
SaaS and SaaS and On-premises Endpoints security and Entra ID and Storage Azure Resource
AD DS and threat Entra ID Network Traffic Manager
PaaS apps PaaS apps Microsoft 365 (devices) Industrial IoT Azure Key Vault
AD FS intelligence
Protec on Azure App Services Azure App Service
Azure Arc-enabled resources
Signals
Microsoft Microsoft Microsoft Microsoft
Defender Defender Defender Defender
for Cloud for Office for for
Apps 365 Identity Endpoint Microsoft Defender for
Cloud
Microsoft Sentinel
Third-party &
partners
Multi-cloud
In this diagram:
Insights from signals across your entire organization feed into Microsoft Defender
XDR and Microsoft Defender for Cloud.
Microsoft Defender XDR and Microsoft Defender for Cloud send SIEM log data
through Microsoft Sentinel connectors.
SecOps teams can then analyze and respond to threats identified in the Microsoft
Sentinel and Microsoft Defender portals.
Microsoft Sentinel provides support for multi-cloud environments and integrates
with third-party apps and partners.
Implementing Microsoft Sentinel and Microsoft
Defender XDR for Zero Trust
Microsoft Defender XDR is an XDR solution that complements Microsoft Sentinel. An
XDR pulls raw telemetry data from across multiple services like cloud applications, email
security, identity, and access management.
Using artificial intelligence (AI) and machine learning, the XDR then performs automatic
analysis, investigation, and response in real time. The XDR solution also correlates
security alerts into larger incidents, providing security teams greater visibility into
attacks, and provides incident prioritization, helping analysts understand the risk level of
the threat.
With Microsoft Sentinel, you can connect to many security sources using built-in
connectors and industry standards. With its AI you can correlate multiple low fidelity
signals spanning multiple sources to create a complete view of ransomware kill chain
and prioritized alerts.
SIEM data
Signals
Microsoft Defender for Office 365 Microsoft Defender Microsoft Entra ID and Microsoft Defender for Cloud Apps
for Endpoint Entra ID Protection
Attacker
downloads
sensitive files
The diagram also shows the Microsoft security products in place to detect each attack
step and how attack signals and SIEM data flow to Microsoft Defender XDR and
Microsoft Sentinel.
ノ Expand table
2. User opens Microsoft The Microsoft Defender for Office 365 Safe
attachment Defender for Attachments feature opens attachments in an
Office 365 isolated environment for additional scanning of
threats (detonation).
3. Attachment installs Microsoft Protects endpoints from malware with its next
malware Defender for generation protection features, such as cloud-
Endpoint delivered protection and behavior-
based/heuristic/real-time antivirus protection.
4. Malware steals user Microsoft Entra ID Protects identities by monitoring user behavior and
credentials and Microsoft activities, detecting lateral movement, and alerting
Entra ID Protection on anomalous activity.
Attack step Detection service Defenses in place
and signal source
Here is the process of responding to an incident with Microsoft Defender XDR and
Microsoft Sentinel:
The following diagram shows the process, starting with discovery and triage in Microsoft
Sentinel.
For more information, see Respond to an incident using Microsoft Sentinel and
Microsoft Defender XDR.
Key capabilities
To implement a Zero trust approach in managing incidents, use these Microsoft Sentinel
and XDR features.
ノ Expand table
Automated AIR capabilities are designed to examine alerts and take Microsoft
Investigation & immediate action to resolve breaches. AIR capabilities Defender XDR
Response (AIR) significantly reduce alert volume, allowing security
operations to focus on more sophisticated threats and
other high-value initiatives.
Custom network By creating indicators for IPs and URLs or domains, you Microsoft
indicators can now allow or block IPs, URLs, or domains based on Defender XDR
your own threat intelligence.
Endpoint detection Provides added protection from malicious artifacts when Microsoft
and response (EDR) Microsoft Defender Antivirus (MDAV) isn't the primary Defender XDR
Block antivirus product and is running in passive mode. EDR in
block mode works behind the scenes to remediate
malicious artifacts that were detected by EDR
capabilities.
User and Entity Analyzes behavior of organization entities such as users, Microsoft
Behavioral Analytics hosts, IP addresses, and applications) Sentinel
(UEBA)
Anomaly rules Anomaly rule templates use machine learning to detect Microsoft
specific types of anomalous behavior. Sentinel
Scheduled queries Built-in rules written by Microsoft security experts that Microsoft
search through logs collected by Sentinel for suspicious Sentinel
activity chains, known threats.
Near-real-time NRT rules are limited set of scheduled rules, designed to Microsoft
(NRT) rules run once every minute, in order to supply you with Sentinel
information as up-to-the-minute as possible.
Capability or Description Product
feature
Data connectors Allow for the ingestion of data for analysis in Microsoft Microsoft
Sentinel. Sentinel
Content hub Zero Trust (TIC 3.0) includes a workbook, analytics rules, Microsoft
solution -Zero Trust and a playbook, which provide an automated Sentinel
(TIC 3.0) visualization of Zero Trust principles, cross-walked to the
Trust Internet Connections framework, helping
organizations to monitor configurations over time.
Learn about the configuration options and data provided by Microsoft Sentinel
connectors for Microsoft Defender XDR.
Start >
Next steps
Use these steps to implement Microsoft Sentinel and XDR for a Zero Trust approach:
Also see these additional articles for applying Zero Trust principles to Azure:
Feedback
Was this page helpful? Yes No
Step 1. Set up your XDR tools
Article • 03/07/2024
This article guides you to the best approaches for setting up Microsoft Defender 365
and other Microsoft XDR tools, which is the first step in setting up an integrated
environment with Microsoft Sentinel.
The Microsoft Defender products are best in class for a security suite. Mature
organizations unify their security platforms to ensure solutions are sharing information
with each other for a more granular threat detection. Microsoft XDR tools have settings
that allow the utilities to forward their information to each other. Additionally, each tool
is designed to enrich data to each other.
In the illustration:
1. Create the evaluation environment
2. Set up and pilot Defender for Identity
3. Set up Defender for Office 365
4. Set up Defender for Endpoint
5. Set up Defender for Cloud apps
6. Investigate and respond to threats
7. Promote your evaluation to production
This order is commonly recommended and designed to apply the value of the
capabilities quickly based on how much effort is typically required to deploy and
configure the capabilities. For example, Defender for Office 365 can be configured in
less time than it takes to enroll devices in Defender for Endpoint. You should prioritize
the components to meet your business needs, and can enabled in a different order.
Use the following guidance to enable Microsoft 365 capabilities and integrate these with
other components.
ノ Expand table
Pilot and deploy Use this methodical process to deploy the Evaluate and pilot
Microsoft components of Microsoft Defender XDR. Microsoft Defender
Defender XDR XDR
Integrate Defender for Cloud Apps uses the traffic information Microsoft Defender
Microsoft collected by Defender for Endpoint about the cloud for Endpoint
Defender for apps and services being accessed from IT-managed integration with
Endpoints with devices specified in the prerequisites below. The Microsoft Defender
Microsoft integration doesn't require any additional for Cloud Apps
Defender for deployment and can be enabled directly from the
Cloud Apps settings in Defender for Endpoint and Microsoft
Defender XDR.
Integrate Microsoft Defender for Cloud Apps integrates with Microsoft Defender
Microsoft Microsoft Defender for Identity to provide user entity for Identity
Defender for behavioral analytics (UEBA) across a hybrid integration
Identity with environment - both cloud app and on-premises.
Defender for
Cloud Apps
Integrate Microsoft Defender for Cloud Apps lets you Microsoft Purview
Microsoft Purview automatically apply sensitivity labels from Microsoft Information
with Defender for Purview Information Protection. You can then Protection
Cloud Apps investigate files by using these labels. integration
Microsoft Defender portal
The Microsoft Defender portal combines protection, detection, investigation, and
response to email, collaboration, identity, device, and cloud app threats, in a central
place. The Microsoft Defender XDR unified portal emphasizes quick access to
information, simpler layouts, and bringing related information together for easier use.
Microsoft Defender for Office 365 Microsoft Defender for Office 365 helps
organizations secure their enterprise with a set of prevention, detection,
investigation and hunting features to protect email, and Office 365 resources.
Microsoft Defender for Endpoint delivers preventative protection, post-breach
detection, automated investigation, and response for devices in your organization.
Microsoft Defender for Identity is a cloud-based security solution that leverages
your on-premises Active Directory signals to identify, detect, and investigate
advanced threats, compromised identities, and malicious insider actions directed at
your organization.
Microsoft Defender for Cloud Apps is a comprehensive cross-SaaS and PaaS
solution bringing deep visibility, strong data controls, and enhanced threat
protection to your cloud apps.
Watch this short video to learn about the Microsoft Defender portal.
https://www.microsoft.com/en-us/videoplayer/embed/RWBKau?postJsllMsg=true
Microsoft Entra ID Protection evaluates risk data from billions of sign-in attempts and
uses this data to evaluate the risk of each sign-in to your environment. This data is used
by Microsoft Entra ID to allow or prevent account access, depending on how Conditional
Access policies are configured.
For this solution and target scenario, we'll also ingest the signals from Microsoft Entra ID
Protection into Sentinel. To enable Microsoft Entra ID Protection, use the following
resources.
ノ Expand table
Integrate Microsoft Entra Microsoft Defender for Cloud Apps integrates with Microsoft
ID Protection with Microsoft Entra ID Protection to provide user entity Entra ID
Defender for Cloud Apps behavioral analytics (UEBA) across a hybrid Protection
environment.
Use the following guidance to enable Defender for Cloud and integrate capabilities.
ノ Expand table
Protect your With Microsoft Defender for Servers (included Protect your endpoints with
server with Defender for Cloud), you gain access to Defender for Cloud's
resources and can deploy Microsoft Defender for integrated EDR solution:
Endpoint to your server resources. Microsoft Defender for
Endpoint
Recommended training
Explore security solutions in Microsoft Defender XDR
ノ Expand table
This module introduces you to several features in Microsoft 365 that can help
protect your organization against cyberthreats, detect when a user or computer has
been compromised, and monitor your organization for suspicious activities.
Start >
ノ Expand table
Use Microsoft Defender for Cloud to strengthen security posture and protect
workloads against modern threats.
Start >
Next steps
Continue to Step 2 to architect a Sentinel workspace.
Feedback
Was this page helpful? Yes No
Step 2. Architect your Microsoft Sentinel
workspace
Article • 03/07/2024
7 Note
If you are new to Microsoft Sentinel workspaces, see design strategies and criteria
in Design a Log Analytics workspace architecture.
For example, the Microsoft Sentinel workspace in the following diagram is in the
Security subscription under the Platform management group, which is part of the
Microsoft Entra tenant.
Microsoft Operations
Sentinel workspace
workspace
The Security Azure subscription and the Microsoft Sentinel workspace inherit the role-
based access control (RBAC) and Azure policies that are applied to the Platform
management group.
It is a best practice to create separate workspaces for the operational and security data
for data ownership and cost management for Microsoft Sentinel. For example, if there’s
more than one person administering operational and security roles, your first decision
for Zero Trust is whether to create separate workspaces for those roles.
For more information, see Design criteria for Log Analytics workspaces.
For an example of separate workspaces for operation and security roles, see Contoso's
solution.
Single tenant with a single Log Analytics workspace. In this case, the workspace
becomes the central repository for logs across all resources within the tenant.
Advantages:
Central consolidation of logs.
Easier to query information.
Log Analytics RBAC to control access. For more information, see Manage
access to Log Analytics workspaces - Azure Monitor.
Microsoft Sentinel RBAC for service RBAC. For more information, see Roles
and permissions in Microsoft Sentinel.
Disadvantages:
May not meet governance requirements.
There is a bandwidth cost between regions.
Disadvantages:
No central pane of glass.
Analytics, workbooks, and other configurations must be deployed multiple
times.
To create your Log Analytics workspaces, see Create Log Analytics workspaces.
Create a “Security” resource group for governance purposes, which allows for
isolation of Microsoft Sentinel resources and role-based access to the collection.
For more information, see Design a Log Analytics workspace architecture.
Create a Log Analytics workspace in the “Security” resource group and onboard
Microsoft Sentinel into it. This automatically gives you 31 days of data ingestion up
to 10 Gb a day free as part of a free trial.
Set your Log Analytics Workspace supporting Microsoft Sentinel to 90 day
retention at a minimum.
Once you onboard Microsoft Sentinel to a Log Analytics workspace, you get 90 days of
data retention at no additional cost. You will incur costs for the total amount of data in
the workspace after 90 days. Setting it to 90 days ensures a 90-day rollover of log data.
You may consider retaining log data for longer based on governmental requirements.
See Quickstart: Onboard in Microsoft Sentinel for more information.
Define Microsoft Sentinel RBAC roles with associated Microsoft Entra groups.
Validate that implemented access practices to Microsoft Sentinel still meet your
organization’s requirements.
Consider the use of customer-managed keys.
ノ Expand table
Microsoft Sentinel View data, incidents, workbooks, and other Microsoft Sentinel resources.
Reader
Microsoft Sentinel In addition to the capabilities of the Microsoft Sentinel Reader role,
Responder manage incidents (assign, dismiss, etc.). This role is applicable to user types
of security analysts.
Microsoft Sentinel List, view, and manually run playbooks. This role is also applicable to user
Playbook Operator types of security analysts. This role is for granting a Microsoft Sentinel
responder the ability to run Microsoft Sentinel playbooks with the least
amount of privilege.
Microsoft Sentinel In addition to the capabilities of the Microsoft Sentinel Playbook Operator
Contributor role, create and edit workbooks, analytics rules, and other Microsoft
Sentinel resources. This role is applicable to user types of security
engineers.
Microsoft Sentinel Allows Microsoft Sentinel to add playbooks to automation rules. It isn't
Automation meant for user accounts.
Contributor
When you assign Microsoft Sentinel-specific Azure roles, you may come across other
Azure and Log Analytics roles that may have been assigned to users for other purposes.
For example, the Log Analytics Contributor and Log Analytics Reader roles grant access
to a Log Analytics workspace. To implement RBAC for a Microsoft Sentinel workspace,
see Roles and permissions in Microsoft Sentinel and Manage access to Microsoft
Sentinel data by resource.
Security Azure Management Azure Identity Azure Security Azure Management Azure Identity Azure
subscription subscription subscription subscription subscription subscription
Microsoft Microsoft
Operations Operations
Sentinel Sentinel
workspace workspace
workspace workspace
With Azure Lighthouse, you can run queries across multiple workspaces or create
workbooks to visualize and monitor data from your connected data sources and gain
additional insight. It’s important to consider Zero Trust principles. See Recommended
security practices to implement least privileges access controls for Azure Lighthouse.
Consider the following questions when implementing security best practices for Azure
Lighthouse:
See Manage Microsoft Sentinel workspaces at scale: Granular Azure RBAC for the
security best practices of Microsoft Sentinel and Azure Lighthouse.
Recommended training
The following are the recommended training modules for this step.
ノ Expand table
Learn how Microsoft Sentinel enables you to start getting valuable security
insights from your cloud and on-premises data quickly.
Start >
ノ Expand table
Start >
ノ Expand table
Next step
Continue with Step 3 to configure Microsoft Sentinel to ingest data sources and
configure incident detection.
References
Refer to these links to learn about the services and technologies mentioned in this
article.
Microsoft Sentinel:
Feedback
Was this page helpful? Yes No
Step 3. Ingest data sources and
configure incident detection in
Microsoft Sentinel
Article • 03/07/2024
Data connectors are configured to enable data ingestion into the workspace. After
enabling key data points to be ingested into Sentinel, User and Entity Behavior Analytics
(UEBA) and Analytic Rules must also be enabled to capture anomalous and malicious
activities. Analytic Rules dictate how Alerts and Incidents are generated in your Sentinel
instance. Tailoring Analytic Rules to your environment and organizational needs through
entity mapping allows you to produce high-fidelity incidents and reduce alert fatigue.
The following table is a summary of the prerequisites required to ingest key Azure and
data connectors:
ノ Expand table
b. Office 365 Audit Logs, including all SharePoint activity, Exchange admin activity,
and Teams.
c. Security alerts, including alerts from Microsoft Defender for Cloud, Microsoft
Defender XDR, Microsoft Defender for Office 365, Microsoft Defender for
Identity, and Microsoft Defender for Endpoint:
ii. Incident investigation starts in Sentinel and should continue in the Microsoft
Defender portal or Defender for Cloud, if deeper analysis is required.
7 Note
The following table lists the free data sources you can enable in Microsoft Sentinel:
Tip
For more information on the most up-to-date Sentinel pricing, see Microsoft
Sentinel Pricing .
ノ Expand table
Microsoft Sentinel data Free data type
connector
2. To provide broader monitoring and alerting coverage, focus on the following data
connectors:
7 Note
There is a charge for ingesting data from the sources listed in the section
Microsoft Entra ID
Send Microsoft Defender XDR logs to Sentinel, if any of the following are
required:
Azure Firewall
Azure Application Gateway
Keyvault
Azure Kubernetes Service
Azure SQL
Network Security Groups
Azure-Arc Servers
The recommended method is setting up Azure Policy to require that their logs be
forwarded to the underlying Log Analytics workspace. For more on information,
see Create diagnostic settings at scale using Azure Policy.
4. For virtual machines hosted on-premises or in other clouds that require their logs
collected, use:
For more information, see, Deploy a log forwarder to ingest Syslog and CEF logs to
Microsoft Sentinel.
Consider migrating from the legacy agent to the new unified Azure Monitor Agent
guidance. For more information, see MIgrat from legacy agents to Azure Monitor
Agent.
6. Search in content hub for other devices, Software as a service (SaaS) apps that
require logs to be sent to Sentinel. For more information, see Discover and
manage Microsoft Sentinel out-of-the-box content .
Step 2: Enable User Entity Behavior Analytics
After setting up data connectors in Sentinel, make sure to enable User Entity Behavior
Analysis to identify suspicious behavior that could lead to phishing exploits and
eventually attacks such as ransomware. Often, anomaly detection through UEBA is the
best method for detecting Zero-day exploits early on.
Using UEBA allows Microsoft Sentinel to build behavioral profiles of your organization's
entities across time and peer group to identify anomalous activity. This added utility aids
in an expedition of determining if an asset has been compromised. Since it identifies
peer group association this can also aid in determining the blast radius of said
compromise.
7 Note
If you have enabled the Microsoft Defender XDR connector, a bi-directional sync
between 365 Defender Incidents and Sentinel is automatically established. To avoid
creating duplicate incidents for the same alerts, we recommend that customer turn
off all Microsoft incident creation rules for Microsoft Defender XDR-integrated
products (Defender for Endpoint, Defender for Identity, Defender for Office 365,
Defender for Cloud Apps, and Microsoft Entra ID Protection). For more information,
see Microsoft Defender XDR incidents and Microsoft incident creation rules.
Microsoft Sentinel enables the Fusion Advanced multistage attack detection analytic rule
by default to automatically identify multistage attacks. Leveraging anomalous behavior
and suspicious activity events observed across the cyber kill chain, Microsoft Sentinel
generates incidents that allow you to see the compromise incidents with two or more
alert activities in it with a high degree of confidence.
Fusion alert technology correlates broad points of data signals with extended machine
learning (ML) analysis to help determine known, unknown and emerging threats. For
example, Fusion detection can take the Anomaly Rule templates and the scheduled
queries created for the Ransomware scenario and pair them with alerts from Microsoft
Security Suite products:
Another set of out-of-the-box rules enabled by default are Anomaly Rules in Sentinel.
These are based on Machine Learning models and UEBA that train on the data in your
workspace to flag anomalous behavior across users, hosts, and others. Often a phishing
attack leads to an execution step such as local or cloud account manipulation/control or
malicious script execution. Anomaly Rules look exactly for those types of activities:
Review the Anomaly Rules and Anomaly Score Threshold for each one. If you're
observing false positives for example, consider duplicating the rule and modifying the
threshold by following the steps outlined in Tune anomaly rules.
After reviewing and modifying Fusion and Anomaly rules, enable the out-of-the-box
Microsoft Threat Intelligence Analytics Rule. Verify that this rule matches your log data
with Microsoft-generated threat intelligence. Microsoft has a vast repository of threat
intelligence data, and this Analytic Rule uses a subset of it to generate high fidelity alerts
and incidents for SOC (security operations centers) teams to triage.
With Fusion, Anomaly, and Threat Intelligence Analytic Rules enabled, you should
conduct a MITRE Att&ck crosswalk to help you decide which remaining Analytic Rules to
enable and to finish implementing a mature XDR (extended detection and response)
process. This will empower you to detect and respond throughout the lifecycle of an
attack.
The MITRE Att&ck research department created the MITRE method, and it is provided
as part of Microsoft Sentinel to ease your implementation. You should ensure you have
Analytic rules that stretch the length and breadth of the attack vectors approach. Start
by reviewing the MITRE techniques that are covered by your existing 'Active' Analytic
Rules, and then select 'Analytic rule templates' and 'Anomaly Rules' in the Simulated
dropdown. Now, it will show you where you have the adversary tactic and/or technique
covered and where there are available Analytic Rules you should consider enabling to
improve your coverage. For example, to detect potential phishing attacks, review the
Analytic rule templates for the Phishing technique, and prioritize enabling the rules that
specifically query the data sources you have onboarded to Sentinel.
In general, there are five phases to a human-operated Ransomware attack, and Phishing
falls under Initial Access as can be seen in the screenshot below. Continue through the
remaining steps to cover the entire kill chain with appropriate Analytic Rules:
1. Initial access
2. Credential theft
3. Lateral movement
4. Persistence
5. Defense evasion
6. Exfiltration (this is where ransomware itself is detected)
Recommended training
ノ Expand table
The primary approach to connect log data is using the Microsoft Sentinel provided
data connectors. This module provides an overview of the available data
connectors.
Start >
ノ Expand table
Connect data at cloud scale across all users, devices, applications, and
infrastructure, both on-premises and in multiple clouds to Microsoft Sentinel.
Start >
Identify threats with Behavioral Analytics
ノ Expand table
The primary approach to connect log data is using the Microsoft Sentinel provided
data connectors. This module provides an overview of the available data
connectors.
Start >
Next steps
Continue to Step 4 to respond to an incident.
Feedback
Was this page helpful? Yes No
Step 4. Respond to an incident using
Microsoft Sentinel and Microsoft
Defender XDR
Article • 03/07/2024
This article provides a general set of steps and procedures to resolve an incident using
Microsoft Sentinel and Microsoft Defender XDR, which includes triage, investigation, and
resolution. Microsoft Sentinel and Microsoft Defender XDR share:
The following diagram shows how Microsoft’s extended detection and response (XDR)
solution seamlessly integrates with Microsoft Sentinel.
Azure Services
Third-party Other Cloud Microsoft SQL Azure Storage
Server VMs Azure DNS
SaaS and SaaS and On-premises Endpoints security and Entra ID and Storage Azure Resource
AD DS and threat Entra ID Network Traffic Manager
PaaS apps PaaS apps Microsoft 365 (devices) Industrial IoT Azure Key Vault
AD FS intelligence
Protec on Azure App Services Azure App Service
Azure Arc-enabled resources
Signals
Microsoft Microsoft Microsoft Microsoft
Defender Defender Defender Defender
for Cloud for Office for for
Apps 365 Identity Endpoint Microsoft Defender for
Cloud
Microsoft Sentinel
Third-party &
partners
Multi-cloud
In this diagram:
Insights from signals across your entire organization feed into Microsoft Defender
XDR and Microsoft Defender for Cloud.
Microsoft Defender XDR and Microsoft Defender for Cloud send SIEM log data
through a series of Microsoft Sentinel connectors.
SecOps teams can then analyze and respond to threats.
Microsoft Sentinel provides support for multi-cloud environments and integrates
with third-party apps and partners.
For more information about the integration of Microsoft Defender with Microsoft
Sentinel, see Microsoft Defender XDR integration with Microsoft Sentinel. This
interactive guide steps you through detecting and responding to modern attacks with
Microsoft’s unified security information and event management (SIEM) and extended
detection and response (XDR) capabilities.
1. Use Microsoft Sentinel portal to triage the potential incident, which includes
understanding the details of the incident and taking immediate actions.
2. Move over to the Microsoft Defender portal to begin your investigation. This
includes:
Understanding the incident and its scope and reviewing asset timelines.
Reviewing self-healing pending actions, manually remediating entities,
performing live response.
Adding prevention measures.
3. Where needed, continue the investigation in the Microsoft Sentinel portal. This
includes:
4. Resolve the incident in the Microsoft Sentinel portal and perform appropriate
follow-up within your security team.
Within Microsoft Sentinel, you can take advantage of playbooks and automation rules.
The following sections describe the general incident response process using the
Microsoft Sentinel and Microsoft Defender portals.
For more information, see Navigate and investigate incidents in Microsoft Sentinel.
1. From the Incident page of the Microsoft Sentinel portal (Preview), select
Investigate in Microsoft Defender XDR in the summary pane.
2. From the Attack story tab in the Microsoft Defender portal, begin your
investigation with Microsoft Defender XDR. Consider using the following next
steps for your own incident response workflow.
3. View the attack story of the incident to understand its scope, severity, detection
source, and what entities are affected.
4. Begin analyzing the alerts to understand their origin, scope, and severity with the
alert story within the incident.
5. As needed, gather information on impacted devices, users, and mailboxes with the
graph. Click on any entity to open a flyout with all the details.
6. See how Microsoft Defender XDR has automatically resolved some alerts with the
Investigations tab.
7. As needed, use information in the data set for the incident from the Evidence and
Response tab.
For more information, see Incident response with Microsoft Defender XDR.
4. Add comments to the incident to record your actions and the results of your
analysis.
For more information, see Navigate and investigate incidents in Microsoft Sentinel.
1. In the Microsoft Sentinel portal using the improved incident page (Preview), locate
the incident in the incident queue and select it. In the Status drop-down for the
incident, select Closed, and then select a classification:
2. You will also be prompted to provide a comment on the incident. You can add
details such as:
Here’s an example.
3. Select Apply to resolve the incident. Once you close the incident in Microsoft
Sentinel, it will synchronize the incident status to Microsoft Defender XDR and
Microsoft Defender for Cloud.
4. As needed, report the incident to your incident response lead for possible follow-
up to determine additional actions, such as:
Inform your Tier 1 security analysts to better detect the attack early.
Create an orchestration playbook to automate and orchestrate your threat
response for a similar. For more information, see Automate threat response
with playbooks in Microsoft Sentinel.
Research the attack in Microsoft Defender XDR Threat Analytics and the
security community for a security attack trend.
As needed, record the workflow you used to resolve the incident and update
your standard workflows, processes, policies, and playbooks.
Determine whether changes in your security configuration are needed and
implement them.
Recommended training
The following are the recommended training modules for this step.
ノ Expand table
Start >
ノ Expand table
Learn the fundamentals of efficient incident response and the Azure tools that
make them possible.
Start >
Learn how Microsoft 365 investigates, manages, and responds to security concerns
to protect customers and the Microsoft 365 cloud environment.
Start >
Next steps
See Navigate and investigate incidents in Microsoft Sentinel and Incident response
with Microsoft Defender XDR for more details about incident response processes
within the Microsoft Sentinel and Microsoft Defender portals.
See Incident response overview for Microsoft security best practices.
See Incident response playbooks for workflows and checklists to respond to
common cyberattacks.
References
Use these resources to learn about the various services and technologies mentioned in
this article:
Zero Trust is an approach to security that adapts to the complexity of the modern
environment, embraces the mobile workforce, and protects people, devices,
applications, and data wherever they are located.
The journey to implementing Zero Trust will be distinct for every organization
depending on their needs and existing infrastructure. For this reason, we support
technology partner integrations that help meet our customers' unique needs.
The integration guidance in this section is organized by Zero Trust technology areas.
This guidance is for software providers and technology partners who want to enhance
their security solutions and reach new customers by integrating with Microsoft products.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Concepts and deployment objectives Apply Zero Trust protections IT teams and security
for general deployment guidance for aligned with technology staff
technology areas areas.
Documentation set Helps you... Roles
Zero Trust for small businesses Apply Zero Trust principles Customers and partners
to small business customers. working with Microsoft
365 for business
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and IT
(RaMP) for project management of Zero Trust protection. implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
detailed design and deployment
guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Develop using Zero Trust principles Apply Zero Trust protections Application developers
for application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Concepts and deployment objectives for Apply Zero Trust protections
security team general deployment guidance for aligned with technology
technology areas areas.
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Role Documentation set Helps you...
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Feedback
Was this page helpful? Yes No
Identity integrations
Article • 04/17/2024
Identity is the key control plane for managing access in the modern workplace and is
essential to implementing Zero Trust. Identity solutions support Zero Trust through
strong authentication and access policies, least privileged access with granular
permission and access, and controls and policies that manage access to secure
resources and minimize the blast radius of attacks.
This integration guide explains how independent software vendors (ISVs) and
technology partners can integrate with Microsoft Entra ID to create secure Zero Trust
solutions for customers.
Microsoft Entra ID
There are many ways to integrate your solution with Microsoft Entra ID. Foundational
integrations are about protecting your customers using Microsoft Entra ID's built-in
security capabilities. Advanced integrations will take your solution one step further with
enhanced security capabilities.
Foundational integrations
Foundational integrations protect your customers with Microsoft Entra ID's built-in
security capabilities.
Publishing in the app gallery will make it easy for IT admins to integrate the solution
into their tenant with automated app registration. Manual registrations are a common
cause of support issues with applications. Adding your app to the gallery will avoid
these issues with your app.
For mobile apps, we recommend you use the Microsoft Authentication Library and a
system browser to implement single sign-on.
Our tutorial on the subject, develop a SCIM endpoint for user provisioning to apps from
Microsoft Entra ID, describes how to build a SCIM endpoint and integrate with the
Microsoft Entra provisioning service.
Advanced integrations
Advanced integrations will increase the security of your application even further.
Security APIs
In our experience, many independent software vendors have found these APIs to be
particularly useful.
If your application needs to make updates to the users and groups in the tenant, you
can use the user and group APIs through Microsoft Graph to write back to the Microsoft
Entra tenant. You can read more about using the API in the Microsoft Graph REST API
v1.0 reference and the reference documentation for the user resource type
For more, check out the configure conditional access policies using the Microsoft Graph
API sample on GitHub.
Going in the other direction, Microsoft Entra ID continually evaluates user risk based on
various signals and machine learning. The Risky User API provides programmatic access
to all at-risk users in the app’s Microsoft Entra tenant. Independent software vendors
can make use of this API to ensure they are handling users appropriately to their current
level of risk. riskyUser resource type.
Become a Microsoft-compatible FIDO2 security key vendor FIDO2 security keys can
replace weak credentials with strong hardware-backed public/private-key credentials
which cannot be reused, replayed, or shared across services. You can become a
Microsoft-compatible FIDO2 security key vendor by following the process in this
document.
As with Microsoft Entra ID, partners can integrate with Azure Active Directory B2C by
using Microsoft Graph and key security APIs such as the Conditional Access, confirm
compromise, and risky user APIs. You can read more about those integrations in the
Microsoft Entra ID section above.
7 Note
We highly recommend customers using Azure Active Directory B2C (and solutions
that are integrated with it) activate Identity Protection and Conditional Access in
Azure Active Directory B2C.
We have guidance on how to use our RESTful endpoints as well as detailed sample
walkthroughs of partners who have integrated using the RESTful APIs:
Identity verification and proofing, which enables customers to verify the identity of
their end users
Role-based access control, which enables granular access control to end users
Secure hybrid access to on-premises application, which enables end users to
access on-premises and legacy applications with modern authentication protocols
Fraud protection, which enables customers to protect their applications and end
users from fraudulent login attempts and bot attacks
Implementing a WAF solution requires that you configure Azure Active Directory B2C
custom domains. You can read how to do this in our tutorial on enabling custom
domains. You can also see existing partners who have created WAF solutions that
integrate with Azure Active Directory B2C.
Next steps
What is Microsoft Entra ID?
Partner gallery for Azure Active Directory B2C
Identity Protection and Conditional Access for Azure Active Directory B2C
Feedback
Was this page helpful? Yes No
Endpoint integrations
Article • 04/17/2024
Endpoints are devices that access an organization's resources and applications. Modern
workplaces include a variety of devices that request access from both inside and outside
the corporate network.
Zero Trust solutions for endpoints are about verifying the security of the devices that
access work data, including the applications that are running on the devices. Partners
can integrate with Microsoft's endpoint solutions to verify device and app security,
enforce least privilege policies, and prepare in advance for breaches.
This guidance is for software providers and technology partners who want to enhance
their endpoint security solutions by integrating with Microsoft products.
Microsoft Defender for Endpoint, which helps enterprise networks prevent, detect,
investigate, and respond to advanced threats.
Microsoft Endpoint Manager, which provides protection and security for the
devices that employees use and the applications that run on those devices.
Microsoft Defender for IoT, which provides security across your operational
technology (OT) networks.
Defender for Endpoint supports third-party applications to help enhance the detection,
investigation, and threat intelligence capabilities of the platform. In addition, partners
can extend their existing security offerings on top of the open framework and a rich and
complete set of APIs to build extensions and integrations with Defender for Endpoint.
The Microsoft Defender for Endpoint partner opportunities and scenarios page
describes several categories of integrations that are supported. In addition, other ideas
for integration scenarios can include:
To become a Defender for Endpoint solution partner, you'll need to follow and complete
the steps found at Become a Microsoft Defender for Endpoint partner.
To integrate with Microsoft Endpoint Manager, ISVs will use Microsoft Graph and the
Microsoft Endpoint Manager application management SDK. Endpoint Manager’s
integration with the Graph API allows any of the same functionality offered by the
administrator console for Endpoint Manager (Intune). Information such as device
compliance state, compliance policy configuration, application protection policy settings
and more can be found through the Graph API. Additionally, you can automate tasks in
Endpoint Manager that further enhance your customer’s Zero Trust story. General
guidance for Working with Intune in Microsoft Graph is available in the Microsoft Graph
documentation repo. Here, we focus on scenarios related to Zero Trust.
Verify devices follow security and compliance standards
ISV solutions can leverage Endpoint Manager’s device compliance and policy
information to support the Zero Trust principle of Verify Explicitly. The compliance data
about users and devices from Endpoint Manager allows the ISV's application to
determine a device's risk posture as it relates to use of the application. By doing these
verifications, the ISV ensures that devices using the service are compliant with the
customers’ security and compliance standards and policies.
The Microsoft Graph API allows ISVs to integrate with Endpoint Manager (Intune)
through a set of RESTful APIs. These APIs are the same ones used by the Endpoint
Manager console to view, create, manage, deploy, and report on all actions, data and
activity in Intune. Items of specific interest for ISVs supporting Zero Trust initiatives are
the ability to view device compliance state and configure compliance rules and policies.
See Microsoft's recommendations for using Microsoft Entra ID and Endpoint Manager
for Zero Trust configuration and compliance: Secure endpoints with Zero Trust. Endpoint
Manager’s compliance rules are foundational for device based Conditional Access
support through Microsoft Entra ID. ISVs should also view the Conditional Access
feature and APIs to understand how to complete scenarios for user and device
compliance and Conditional Access.
Ideally as an ISV, your application connects to the Microsoft Graph APIs as a cloud
application and establishes a service-to-service connection. Multi-tenant applications
provide ISVs with centralized application definition and control and enable customers to
individually consent to the ISV application operating against their tenant data. Review
the information on Tenancy in Microsoft Entra ID for registering and creating single or
multi-tenant Microsoft Entra Applications. Your application’s authentication can leverage
Microsoft Entra ID for single sign on.
After creating your application, you will need to access the device and compliance
information using the Microsoft Graph API. Documentation for using Microsoft Graph
can be found at the Microsoft Graph dev center. The Graph API is a RESTful set of APIs
that follow ODATA standards for data access and querying.
This diagram shows how device compliance information flows from the device to your
ISV solution. End user devices receive policies from Intune, a mobile threat defense
(MTD) partner, or an mobile device management (MDM) compliance partner. Once the
compliance information is gathered from the devices, Intune calculates the overall
compliance state of each device and stores that in Microsoft Entra ID. By using the
Microsoft Graph API, your solution can read and respond to the device compliance
state, applying the principles of Zero Trust.
When enrolled with Intune, a device record is created in Intune with additional device
details, including the device compliance state. Intune forwards the device compliance
state to Microsoft Entra ID, where Microsoft Entra ID also stores the compliance state
with each device. By making a GET on
https://graph.microsoft.com/v1.0/deviceManagement/managedDevices you can see all the
enrolled devices for a tenant and their compliance state. Or you can query
https://graph.microsoft.com/v1.0/devices to get a list of the Microsoft Entra registered
HTTP
GET
https://graph.microsoft.com/v1.0/users/{usersId}/managedDevices/{managedDevi
ceId}
Will return:
HTTP
HTTP/1.1 200 OK
Content-Type: application/json
Content-Length: 5095
{
"value": {
"@odata.type": "#microsoft.graph.managedDevice",
"id": "705c034c-034c-705c-4c03-5c704c035c70",
"userId": "User Id value",
"deviceName": "Device Name value",
"managedDeviceOwnerType": "company",
"enrolledDateTime": "2016-12-31T23:59:43.797191-08:00",
"lastSyncDateTime": "2017-01-01T00:02:49.3205976-08:00",
"complianceState": "compliant",
...
}
You can also retrieve a list of compliance policies, their deployments, and status of users
and devices for those compliance policies. Information for calling Graph to get
compliance policy information starts here: Get deviceCompliancePolicy - Microsoft
Graph v1.0. A good background on device compliance policies and how they are used is
here: Device compliance policies in Microsoft Intune - Azure.
Once you have identified a specific policy, you can query to get the state of a device for
a particular compliance policy setting. For example, assuming a compliance policy was
deployed to require a passcode on lock, query Get deviceComplianceSettingState for
the specific state of that setting. This indicates whether the device is compliant or non-
compliant with the passcode lock setting. This same approach can be used for other
device compliance policies that customers have deployed.
An ISV integrating with Endpoint Manager will also want to ensure their application
supports the Zero Trust principle to Apply Least Privilege Access. Endpoint Manager
integration supports two important methods of access control – delegated permissions
or application permissions. The ISV's application must use one of the permission
models. Delegated permissions give you fine grained control over the specific objects in
Endpoint Manager the application has access to but requires that an administrator log
in with their credentials. By comparison, application permissions allow the ISV's app to
access or control classes of data and objects, rather than specific individual objects, but
does not require a user to log in.
Deploy Microsoft Defender for IoT to apply zero trust principles to your OT network,
monitoring traffic for anomalous or unauthorized behavior as traffic crosses sites and
zones. Watch for threats and vulnerabilities specific to OT devices, mitigating risks as
they're detected.
Speed operations by sharing Defender for IoT data across your security operations
center (SOC) and other parts of your organization. Integrate with Microsoft services,
such as Microsoft Sentinel and Defender for Endpoint, or other partner services,
including both SIEM and ticketing systems. For example:
Forward on-premises alert data directly to SIEMs such as Splunk, IBM QRadar, and
more. Splunk and IBM QRadar also support Event Hub ingestion, which you can
use to forward cloud alerts from Defender for IoT.
Integrate with ServiceNow's Operational Technology Manager to import Defender
for IoT data to ServiceNow and risk-based action with production process context.
Next steps
Microsoft Defender for Endpoint
Microsoft Endpoint Manager
Microsoft Defender for IoT
Feedback
Was this page helpful? Yes No
Application integrations
Article • 04/17/2024
Applications are core productivity tools for employees. In a modern workplace, adoption
of cloud based Software as a Service (SaaS) applications has created new challenges for
IT. Lack of visibility and control over applications, the way users interact with them, and
the data that is exposed through them creates security and compliance risks.
Zero Trust solutions for the applications pillar are about providing visibility and control
over app usage data and analytics that identify and combat cyber threats across cloud
apps and services.
This guidance is for software providers and technology partners who want to enhance
their applications security solutions by integrating with Microsoft products.
The Defender for Cloud Apps API provides programmatic access to Defender for Cloud
Apps through REST API endpoints. ISVs can use the API to perform read and update
operations on Defender for Cloud Apps data and objects at scale. For example:
Use Cloud Discovery to map and identify your cloud environment and the cloud
apps your organization is using.
Sanction and unsanction apps in your cloud.
Easily deploy app connectors that take advantage of provider APIs, for deeper
visibility and granular governance of apps that you connect to.
Use Conditional Access App Control protection to get real-time visibility and
control over access and activities within your cloud apps.
To get started, check out the introduction to the Defender for Cloud Apps REST API.
1. Deployment-less: The vendor will stream traffic logs directly to Defender for Cloud
Apps to avoid any agent deployment and maintenance.
2. Log enrichment and App correlation: traffic logs will be enriched against the
Defender for Cloud Apps catalog to map each log record to a known app
(associated with a risk profile)
3. Defender for Cloud Apps analytics and reporting: Defender for Cloud Apps will
analyze and process the data to provide an overview Shadow IT report
4. Risk-based access control: Defender for Cloud Apps will sync back to the vendor
the signatures of the app to be blocked in to allow the customer with risk-based
app management in Defender for Cloud Apps that is enforced by consistent access
control mechanism of the vendor
1. Create a trial Defender for Cloud Apps tenant using this link .
2. Upload a sample traffic log using the manual upload feature.
3. Alternatively, you can use the API-based upload. For detailed instructions, use your
trial credentials and Cloud Discovery API documentation
a. Generate API token
b. Log upload –consists of three stages:
i. Initiate file upload
ii. Perform file upload
iii. Finalize file upload
c. Generate block script (that is, extract unsanctioned apps info)
When uploading the log, choose one of the following parser options:
1. If your log format is a standard CEF, W3C, LEEF, select it in the dropdown of
existing log formats
2. If not, configure a custom log parser
Next steps
Microsoft Defender for Cloud Apps overview
Defender for Cloud Apps REST API
Feedback
Was this page helpful? Yes No
Data integrations
Article • 04/17/2024
Keeping data protected is a central objective of a Zero Trust strategy. Where possible,
data should remain safe even if it leaves the devices, apps, infrastructure, and networks
the organization controls. To ensure protection and that data access is restricted to
authorized users, data should be inventoried, classified, labeled, and, where appropriate,
encrypted.
Zero Trust data solutions help customers classify and label data based on assessed risk,
and ensure that the data management is following the organization's compliance
requirements.
This guidance is for software providers and technology partners who want to enhance
their data security solutions by integrating with Microsoft products.
Independent software vendors (ISVs) can integrate with the Microsoft Information
Protection (MIP) SDK to build solutions that help customers understand and protect
data, prevent data loss, and govern data storage and access.
Microsoft Information Protection SDK
The Microsoft information protection solution is the unification of Microsoft's
classification, labeling, and protection services. Third parties can use the MIP SDK to
integrate with applications, using a standard, consistent data labeling schema and
protection service.
ISVs can use the Microsoft Information Protection SDK to help customers understand
their data landscape, apply flexible protection actions, detect risky behavior to prevent
data loss, and maintain data compliance through automatic actions. For example:
The Microsoft Information Protection SDK - API concepts page includes more examples
of how you can integrate with the MIP SDK.
https://www.youtube-nocookie.com/embed/MjVXD4OKaLo
Microsoft Information Protection SDK This document describes common use cases for
the MIP SDK, including how to get started using the SDK and building integrations. The
MIP SDK exposes the labeling and protection services from Microsoft 365 Security and
Compliance Center to third-party applications and services. Partners can use the SDK to
build solutions with native support for applying labels and protection to files as well as
reasoning over MIP-encrypted information and which actions should be taken when
specific labels are detected.
Next steps
Microsoft Information Protection SDK - Classification label concepts
Microsoft Purview Compliance Manager
Microsoft Purview Information Protection
(Video) Develop Compliance Powered LOB Applications with Microsoft Purview
Information Protection
Feedback
Was this page helpful? Yes No
Infrastructure integrations
Article • 04/17/2024
Zero Trust infrastructure solutions support the principles of Zero Trust by ensuring that
access to infrastructure resources is verified explicitly, access is granted using principles
of least privilege access, and mechanisms are in place that assume breach and look for
and remediate security threats in infrastructure.
This guidance is for software providers and technology partners who want to enhance
their infrastructure security solutions by integrating with Microsoft products.
The guidance includes integrations with the most popular Security Information and
Event Management (SIEM), Security Orchestration Automated Response (SOAR),
Endpoint Detection and Response (EDR), and IT Service Management (ITSM) solutions.
ノ Expand table
Assess In Defender for Cloud, every subscription automatically has the Microsoft
compliance cloud security benchmark (MCSB) assigned as the default security initiative.
Using the secure score tools and the regulatory compliance dashboard you
can get a deep understanding of your customer's security posture.
Harden Assigning security initiatives to subscriptions, and reviewing the secure score,
configuration leads you to the hardening recommendations built into Defender for Cloud.
Defender for Cloud periodically analyzes the compliance status of resources
to identify potential security misconfigurations and weaknesses. It then
provides recommendations on how to remediate those issues.
Set up threat Defender for Cloud offers integrated cloud workload protection plans, for
detection threat detection and response. The plans provide advanced, intelligent,
protection of Azure, hybrid, and multicloud resources and workloads.
One of the Microsoft Defender plans, Defender for servers, includes a native
integration with Microsoft Defender for Endpoint.
Learn more in Introduction to Microsoft Defender for Cloud.
Automatically Many of the hardening recommendations in Defender for Cloud offer a deny
block suspicious option. This feature lets you prevent the creation of resources that don't
behavior satisfy defined hardening criteria. Learn more in Prevent misconfigurations
with Enforce/Deny recommendations.
Automatically flag Microsoft Defender for Cloud's security alerts are triggered by advanced
suspicious detections. Defender for Cloud prioritizes and lists the alerts, along with the
behavior information needed for you to quickly investigate the problem. Defender for
Cloud also provides detailed steps to help you remediate attacks. For a full
list of the available alerts, see Security alerts - a reference guide.
Defender for Cloud's workflow automation feature lets you automate responses to
Defender for Cloud triggers.
This is great way to define and respond in an automated, consistent manner when
threats are discovered. For example, to notify relevant stakeholders, launch a change
management process, and apply specific remediation steps when a threat is detected.
There are Azure-native tools for ensuring you can view your alert data in all of the most
popular solutions in use today, including:
Microsoft Sentinel
Splunk Enterprise and Splunk Cloud
IBM's QRadar
ServiceNow
ArcSight
Power BI
Palo Alto Networks
Microsoft Sentinel
Defender for Cloud natively integrates with Microsoft Sentinel, Microsoft's cloud-native,
security information event management (SIEM) and security orchestration automated
response (SOAR) solution.
There are two approaches to ensuring your Defender for Cloud data is represented in
Microsoft Sentinel:
Sentinel connectors - Microsoft Sentinel includes built-in connectors for Microsoft
Defender for Cloud at the subscription and tenant levels:
Stream alerts to Microsoft Sentinel at the subscription level
Connect all subscriptions in your tenant to Microsoft Sentinel
Tip
Learn more in Connect security alerts from Microsoft Defender for Cloud.
Stream your audit logs - An alternative way to investigate Defender for Cloud
alerts in Microsoft Sentinel is to stream your audit logs into Microsoft Sentinel:
Connect Windows security events
Collect data from Linux-based sources using Syslog
Connect data from Azure Activity log
You can use this API to stream alerts from the entire tenant (and data from many other
Microsoft Security products) into third-party SIEMs and other popular platforms:
Splunk Enterprise and Splunk Cloud - Use the Microsoft Graph Security API Add-
On for Splunk
Power BI - Connect to the Microsoft Graph Security API in Power BI Desktop
ServiceNow - Follow the instructions to install and configure the Microsoft Graph
Security API application from the ServiceNow Store
QRadar - IBM's Device Support Module for Microsoft Defender for Cloud via
Microsoft Graph API
Palo Alto Networks, Anomali, Lookout, InSpark, and more - Microsoft Graph
Security API
Use Defender for Cloud's continuous export feature to connect Defender for Cloud with
Azure monitor via Azure Event Hubs and stream alerts into ArcSight, SumoLogic, Syslog
servers, LogRhythm, Logz.io Cloud Observability Platform, and other monitoring
solutions.
Learn more in Stream alerts with Azure Monitor.
This can also be done at the Management Group level using Azure Policy, see Create
continuous export automation configurations at scale.
Tip
To view the event schemas of the exported data types, visit the Event Hub event
schemas .
Microsoft Defender for servers, includes an integrated license for Microsoft Defender for
Endpoint . Together, they provide comprehensive endpoint detection and response
(EDR) capabilities. For more information, see Protect your endpoints.
When Defender for Endpoint detects a threat, it triggers an alert. The alert is shown in
Defender for Cloud and you can pivot to the Defender for Endpoint console to perform
a detailed investigation and uncover the scope of the attack. Learn more about
Microsoft Defender for Endpoint.
There are two recommendations in Defender for Cloud to ensure you've enabled
endpoint protection and it's running well. These recommendations are checking for the
presence and operational health of EDR solutions from:
Trend Micro
Symantec
McAfee
Sophos
Learn more in Endpoint protection assessment and recommendations in Microsoft
Defender for Cloud.
Microsoft Defender for Cloud protects workloads wherever they're running: in Azure,
on-premises, Amazon Web Services (AWS), or Google Cloud Platform (GCP).
To secure hybrid cloud workloads, you can extend Defender for Cloud's protections by
connecting on-premises machines to Azure Arc enabled servers.
To view the security posture of Amazon Web Services machines in Defender for Cloud,
onboard AWS accounts into Defender for Cloud. This will integrate AWS Security Hub
and Microsoft Defender for Cloud for a unified view of Defender for Cloud
recommendations and AWS Security Hub findings and provide a range of benefits as
described in Connect your AWS accounts to Microsoft Defender for Cloud.
To view the security posture of Google Cloud Platform machines in Defender for Cloud,
onboard GCP accounts into Defender for Cloud. This will integrate GCP Security
Command and Microsoft Defender for Cloud for a unified view of Defender for Cloud
recommendations and GCP Security Command Center findings and provide a range of
benefits as described in Connect your GCP accounts to Microsoft Defender for Cloud.
Next steps
To learn more about Microsoft Defender for Cloud, see the complete Defender for Cloud
documentation.
Feedback
Was this page helpful? Yes No
Network integrations
Article • 04/17/2024
Traditional enterprise networks are designed to provide users access to applications and
data hosted in company operated data centers with strong perimeter security. However,
the modern workplace increasingly uses services and data outside the corporate firewall.
Apps and services have moved to the cloud, and users need to be able to access them
from a variety of work and personal devices.
Network solutions are an important piece of Zero Trust. They verify that the ingress and
egress at the edge of the network is allowable and inspect traffic for malicious content.
They support least privilege access and the principle of "assume breach" by allowing
organizations to segment networks and only connect users to the segment of the
network they need access to.
In this article we discuss our Network integration partners so customers can use familiar,
best-in-breed, third-party security as a service (SECaaS) offerings to protect Internet
access for their users. Please see Microsoft 365 Networking Partner Program for more
information about becoming an ISV partner.
Virtual WAN
Virtual WAN is a networking service that brings many networking, security, and routing
functionalities together to provide a single operational interface. It provides a hub and
spoke architecture with scale and performance built in for branches (VPN/SD-WAN
devices), users (Azure VPN/OpenVPN/IKEv2 clients), ExpressRoute circuits, and virtual
networks. It enables a global transit network architecture, where the cloud hosted
network 'hub' enables transitive connectivity between endpoints that may be distributed
across different types of 'spokes'.
DDOS Protection
Azure DDoS Protection, combined with application design best practices, provides
enhanced DDoS mitigation features to defend against DDoS attacks. It's automatically
tuned to help protect your specific Azure resources in a virtual network. Protection is
simple to enable on any new or existing virtual network, and it requires no application or
resource changes.
Security partner providers have integrated with Azure Firewall Manager so customers
can use familiar, best-in-breed, third-party security as a service (SECaaS) offerings to
protect Internet access for their users. Customers can secure a hub with a supported
security partner and route and filter Internet traffic from Virtual Networks (VNets) or
branch locations within a region. Hubs can be deployed in multiple Azure regions to get
connectivity and security anywhere across the globe, using the security partner’s
offering for Internet/SaaS application traffic and Azure Firewall for private traffic in the
secured hubs.
The supported security partners are Zscaler, Check Point, and iboss.
If your solution will connect with Microsoft 365, you can use the guidance from the
Microsoft 365 Networking Partner Program to ensure that your solution follows
Microsoft 365 network connectivity principles. The purpose of this program is to
facilitate great customer experience with Microsoft 365 through easy discovery of
validated partner solutions that consistently demonstrate alignment to key principles for
optimal Microsoft 365 connectivity in customer deployments.
Next steps
Gateway Load Balancer documentation
Virtual WAN documentation
DDOS Protection documentation
Azure Firewall Manager documentation
Feedback
Was this page helpful? Yes No
Visibility, automation, and orchestration
integrations
Article • 04/17/2024
Visibility, automation, and orchestration integrations are about building robust solutions
for monitoring security signals. They're key to ensuring the ongoing security of an
environment by detecting suspicious behavior and enabling proactive hunting for
threats. They allow customers to scan for unexpected behavior and access and
proactively search for bad actors already in the network.
This guidance is for software providers and technology partners who want to enhance
their visibility, automation, and orchestration security solutions by integrating with
Microsoft products.
Microsoft Sentinel
Microsoft’s approach to threat protection is to combine both Security Information and
Event Management (SIEM) and Extended Detection and Response (XDR) into an
integrated experience, with Microsoft Sentinel, Microsoft Defender XDR, and Microsoft
Defender for Cloud. This approach gives organizations the best of both worlds: end-to-
end threat visibility across all of your resources; correlated, prioritized alerts based on
the deep understanding Microsoft has of specific resources and AI that stitches that
signal together; and coordinated action across the organization.
Microsoft Sentinel, Microsoft’s cloud-native SIEM, provides a bird’s eye view across your
entire digital estate. It provides intelligent security analytics across all users, devices,
applications, and infrastructure, both on-premises and in multiple clouds. It then cross-
correlates and detects threats using machine learning, and streamlines investigations
with AI and powerful hunting tools.
Microsoft Sentinel has many integrations with partner solutions, including other security
solutions, clouds, threat intelligence vendors, and more. ISVs can integrate with
Microsoft Sentinel to enable new use-cases for customers with data connectors,
analytics rules, interactive workbooks, and automation playbooks to deliver end-to-end
product or domain or industry vertical value for customers.
The following guidance helps you create solutions that integrate with Microsoft Sentinel.
What you can build: Integration Opportunities Guide for Microsoft Sentinel
Partners can engage with Microsoft Sentinel in several key scenarios to deliver mutual
customer value. This article outlines these scenario opportunities and technical
integrations by describing how to decide what integrations to build, how to get started,
how to deliver to Microsoft Sentinel customers, and finally how to promote Microsoft
Sentinel Integrations.
Once you've identified the scenarios you want to support with your solution, create a list
of artifacts to implement. This resource contains a list of all the artifacts that you can
build and guidance on how to build them. It's available as part of the Threat Hunters
program, which is Microsoft Sentinel's community of content contributors inclusive of
both partners and the community.
Next steps
Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
Integration Opportunities Guide for Microsoft Sentinel
Integration Components for Microsoft Sentinel
Guide to Building Microsoft Sentinel Solutions
Feedback
Was this page helpful? Yes No
Monitor Zero Trust (TIC 3.0) security
architectures with Microsoft Sentinel
Article • 03/17/2023
Zero Trust is a security strategy for designing and implementing the following sets of
security principles:
Always Limit user access with Just-In- Minimize blast radius and segment
authenticate and Time and Just-Enough-Access access. Verify end-to-end encryption and
authorize based (JIT/JEA), risk-based adaptive use analytics to get visibility, drive threat
on all available policies, and data protection. detection, and improve defenses.
data points.
This article describes how to use the Microsoft Sentinel Zero Trust (TIC 3.0) solution,
which helps governance and compliance teams monitor and respond to Zero Trust
requirements according to the TRUSTED INTERNET CONNECTIONS (TIC) 3.0 initiative.
Microsoft Sentinel solutions are sets of bundled content, pre-configured for a specific
set of data. The Zero Trust (TIC 3.0) solution includes a workbook, analytics rules, and a
playbook, which provide an automated visualization of Zero Trust principles, cross-
walked to the Trust Internet Connections framework, helping organizations to monitor
configurations over time.
While the Microsoft Sentinel solution for Zero Trust (TIC 3.0) provides best practice
guidance, Microsoft does not guarantee nor imply compliance. All Trusted Internet
Connection (TIC) requirements, validations, and controls are governed by the
Cybersecurity & Infrastructure Security Agency .
The Zero Trust (TIC 3.0) solution provides visibility and situational awareness for control
requirements delivered with Microsoft technologies in predominantly cloud-based
environments. Customer experience will vary by user, and some panes may require
additional configurations and query modification for operation.
Recommendations do not imply coverage of respective controls, as they are often one
of several courses of action for approaching requirements, which is unique to each
customer. Recommendations should be considered a starting point for planning full or
partial coverage of respective control requirements.
The Microsoft Sentinel solution for Zero Trust (TIC 3.0) is useful for any of the following
users and use cases:
Prerequisites
Before installing the Zero Trust (TIC 3.0) solution, make sure you have the following
prerequisites:
Onboard Microsoft services: Make sure that you have both Microsoft Sentinel and
Microsoft Defender for Cloud enabled in your Azure subscription.
Add required regulatory standards to your dashboard. Make sure to add both
the Azure Security Benchmark and NIST SP 800-53 R5 Assessments to your
Microsoft Defender for Cloud dashboard. For more information, see add a
regulatory standard to your dashboard in the Microsoft Defender for Cloud
documentation.
Continuously export Microsoft Defender for Cloud data to your Log Analytics
workspace. For more information, see Continuously export Microsoft Defender
for Cloud data.
Required user permissions. To install the Zero Trust (TIC 3.0) solution, you must
have access to your Microsoft Sentinel workspace with Security Reader
permissions.
The Zero Trust (TIC 3.0) solution is also enhanced by integrations with other Microsoft
Services, such as:
1. In Microsoft Sentinel, select Content hub and locate the Zero Trust (TIC 3.0)
solution.
2. At the bottom-right, select View details, and then Create. Select the subscription,
resource group, and workspace where you want to install the solution, and then
review the related security content that will be deployed.
After installing the Zero Trust (TIC 3.0) solution, use the workbook, analytics rules, and
playbook deployed to your Microsoft Sentinel workspace to manage Zero Trust in your
network.
Tip
Use the Guide toggle at the top of the page to display or hide
recommendations and guide panes. Make sure that the correct details are
selected in the Subscription, Workspace, and TimeRange options so that you
can view the specific data you want to find.
2. Review the control cards displayed. For example, scroll down to view the Adaptive
Access Control card:
Tip
Use the Guides toggle at the top left to view or hide recommendations and
guide panes. For example, these may be helpful when you first access the
workbook, but unnecessary once you've understood the relevant concepts.
3. Explore queries. For example, at the top right of the Adaptive Access Control card,
select the : More button, and then select the Open the last run query in the
Logs view. option.
By default, the Zero Trust (TIC 3.0) solution installs a set of analytics rules that are
configured to monitor Zero Trust (TIC3.0) posture by control family, and you can
customize thresholds for alerting compliance teams to changes in posture.
For example, if your workload's resiliency posture falls below a specified percentage in a
week, Microsoft Sentinel will generate an alert to detail the respective policy status
(pass/fail), the assets identified, the last assessment time, and provide deep links to
Microsoft Defender for Cloud for remediation actions.
Use this playbook to automatically monitor CMMC alerts, and notify the governance
compliance team with relevant details via both email and Microsoft Teams messages.
Modify the playbook as needed:
For more information, see Use triggers and actions in Microsoft Sentinel playbooks.
For more information, see Use Azure Monitor workbooks to visualize and monitor your
data.
For more information, see Use Azure Monitor workbooks to visualize and monitor your
data and Manage multiple tenants in Microsoft Sentinel as an MSSP.
For more information, see Use Azure Monitor workbooks to visualize and monitor your
data and Surface custom event details in alerts.
Microsoft Sentinel Reader users can view data, incidents, workbooks, and other
Microsoft Sentinel resources.
This article helps you, as a developer, to understand the guiding principles of Zero Trust
so that you can improve your application security. You play a key role in organizational
security; applications and their developers can no longer assume that the network
perimeter is secure. Compromised applications can affect the entire organization.
Organizations are deploying new security models that adapt to complex modern
environments and embrace the mobile workforce. New models are designed protect
people, devices, applications, and data wherever they're located. Organizations are
striving to achieve Zero Trust, a security strategy and approach for designing and
implementing applications that follow these guiding principles:
Verify explicitly
Use least privilege access
Assume breach
Instead of believing everything behind the corporate firewall is safe, the Zero Trust
model assumes breach and verifies each request as though it originated from an
uncontrolled network. Regardless of where the request originates or what resource it
accesses, the Zero Trust model requires us to "never trust, always verify."
Understand that Zero Trust isn't a replacement for security fundamentals. With work
originating from anywhere on any device, design your applications to incorporate Zero
Trust principles throughout your development cycle.
The development guidance in this section helps you to increase security, reduce the
blast radius of a security incident, and swiftly recover by using Microsoft technology.
Next steps
Subscribe to our Develop using Zero Trust principles RSS feed for notification of new
articles.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Concepts and deployment objectives Apply Zero Trust protections IT teams and security
for general deployment guidance for aligned with technology staff
technology areas areas.
Zero Trust for small businesses Apply Zero Trust principles Customers and partners
to small business customers. working with Microsoft
365 for business
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and IT
(RaMP) for project management of Zero Trust protection. implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
Documentation set Helps you... Roles
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security staff
and specializations solutions.
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Concepts and deployment objectives for Apply Zero Trust protections
security team general deployment guidance for aligned with technology
technology areas areas.
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Role Documentation set Helps you...
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Feedback
Was this page helpful? Yes No
What do we mean by Zero Trust
compliance?
Article • 04/17/2024
With the Microsoft identity platform and Zero Trust enabling technologies (as shown in
the following diagram), using Microsoft Entra tokens helps your application to integrate
with Microsoft's entire suite of security technologies.
When a delegated identity provider verifies identity, your customer's IT department can
enforce least privilege access with Microsoft Entra permission and consent. Microsoft
Entra ID determines when it issues tokens to applications.
When your customers understand which corporate resources your application needs to
access, they can correctly grant or deny access requests. For example, if your application
needs to access Microsoft SharePoint, document this requirement so that you can help
customers grant the correct permissions.
Next steps
Using standards-based development methodologies provides an overview of
supported standards (OAuth 2.0, OpenID Connect, SAML, WS-Federation, and
SCIM) and the benefits of using them with MSAL and the Microsoft identity
platform.
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens. Learn how to customize tokens and improve flexibility and control
while increasing application Zero Trust security with least privilege.
Supported identity and account types for single- and multi-tenant apps explains
how you can choose if your app allows only users from your Microsoft Entra
tenant, any Microsoft Entra tenant, or users with personal Microsoft accounts.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Feedback
Was this page helpful? Yes No
Zero Trust identity and access
management development best
practices
Article • 04/17/2024
This article helps you, as a developer, to understand identity and access management
best practices for your application development lifecycle. You start developing secure,
Zero Trust compliant applications with identity and access management (IAM).
The Zero Trust security framework uses the principles of explicit verification, least
privileged access, and assuming breach. Secure users and data while allowing for
common scenarios like access to applications from outside the network perimeter.
Reduce reliance upon implicit trust to interactions behind a secure network perimeter
that can become vulnerable to security attacks.
1. Implement credential hygiene and rotation policies for apps and services.
WWhen attackers compromise secrets such as certificates or passwords, they can
achieve a depth of system access to acquire tokens under the guise of an app's
identity. They then access sensitive data, move laterally, and establish persistence.
2. Roll out strong authentication. IT administrators are configuring policies that
require multi-factor authentication and passwordless FIDO2 devices.
3. Restrict user consent to apps with low-risk permissions to verified publisher
apps. Access to data in APIs like Microsoft Graph allow you to build rich
applications. Organizations and customers evaluate your app's permission requests
and trustworthiness before granting consent. IT admins are embracing the
principle of verify explicitly by requiring publisher verification. They apply the
principle of least privilege by only allowing user consent for low-risk permissions.
4. Blocking legacy protocols and APIs. IT admins are blocking older authentication
protocols such as "Basic authentication" and requiring modern protocols like
OpenID Connect and OAuth2.
Use trusted, standards-based authentication
libraries
Develop your application with known and accepted standards and libraries to increase
application portability and security. Trusted, standards-based authentication libraries
stay up-to-date so that your apps are responsive to the latest technologies and threats.
Using standards-based development methodologies provides an overview of supported
standards (OAuth 2.0, OpenID Connect, SAML, WS-Federation, and SCIM) and the
benefits of using them with MSAL and the Microsoft identity platform.
Rather than using protocols that can have known vulnerabilities and extensive
documentation, develop your application with libraries such as Microsoft Authentication
Library (MSAL), Microsoft Identity Web authentication library, and Azure SDKs for
managed identities. MSAL and SDKs allow you to use these features without needing to
write extra code:
Conditional access
Device registration and management
Passwordless and FIDO2 authentication
MSAL and Microsoft Graph are your best choices for developing Microsoft Entra
applications. MSAL developers have done the work for you to ensure compliance with
protocols. Microsoft optimizes MSAL for efficiency when working directly with Microsoft
Entra ID.
Application properties that improve security include redirect URI, access tokens (never
use with implicit flows), certificates and secrets, application ID URI, and application
ownership. Conduct periodical security and health assessments similar to Security Threat
Model assessments for code.
Always provide the least privilege required for your user to perform specific tasks. For
example, use incremental consent to only request permissions when they're necessary
and use granular scopes in Microsoft Graph.
Explore scopes in Graph Explorer to call an API and examine required permissions.
They're displayed in order from lowest to highest privilege. Picking the lowest possible
privilege ensures that your application is less vulnerable to attacks.
Follow the guidance in Enhance security with the principle of least privilege to reduce
your applications' attack surfaces and security breach blast radius should compromise
occur.
When you support CAE, tokens that Microsoft Entra ID issues to call Microsoft Graph are
valid for 24 hours instead of the standard 60 to 90 minutes. CAE adds resiliency to your
app by requiring hourly token refresh and enabling MSAL to proactively refresh the
token well before the token expires.
Next steps
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens. Learn how to customize tokens to improve flexibility and control
while increasing application Zero Trust security with least privilege.
Configuring group claims and app roles in tokens describes how to configure your
apps with app role definitions and assign security groups to app roles. This
approach improves flexibility and control while increasing application Zero Trust
security with least privilege.
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
The Identity integrations guide explains how to integrate security solutions with
Microsoft products to create Zero Trust solutions.
Developer and administrator responsibilities for application registration,
authorization, and access helps you to better collaborate with your IT Pros.
Supported identity and account types for single- and multi-tenant apps explains
how you can choose if your app allows only users from your Microsoft Entra ID)
tenant, any Microsoft Entra tenant, or users with personal Microsoft accounts.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Feedback
Was this page helpful? Yes No
Using standards-based development
methodologies
Article • 04/17/2024
As a developer, you can make good use of industry standards for software development
augmented by the Microsoft Authentication Library (MSAL). In this article, we provide an
overview of supported standards (OAuth 2.0, OpenID Connect, SAML, WS-Federation,
and SCIM) and the benefits of using them with MSAL and the Microsoft identity
platform. Ensure that your cloud applications meet Zero Trust requirements for optimal
security.
We optimize MSALs to build and work with Microsoft Entra ID. If your environment
hasn't implemented MSAL or has unlocked capabilities in its own library, develop your
application with the Microsoft identity platform. Build on OAuth 2.0 capabilities and
OpenID Connect. Consider costs of correctly falling back to a protocol.
When your applications use enhanced security features like CAE and Conditional Access
authentication context, they must include code to manage claims challenges. With open
protocols, you use claims challenges and claims requests to invoke other client
capabilities. For example, indicating to apps that they need to repeat interaction with
Microsoft Entra ID due to an anomaly. Another scenario is when the user no longer
satisfies conditions under which they had earlier authenticated. You can code for these
extensions without disturbing primary authentication code flows.
Using MSAL, you acquire tokens for application types that include web applications, web
APIs, single page apps, mobile and native applications, daemons, and server-side
applications. MSAL enables fast and simple integration with secure access to users and
data via Microsoft Graph and APIs. With best-in-class auth libs, you can reach any
audience and follow the Microsoft Security Development Lifecycle.
Next steps
Microsoft identity platform authentication libraries describes application type
support.
Develop using Zero Trust principles helps you to understand the guiding principles
of Zero Trust so that you can improve your application security.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
Developer and administrator responsibilities for application registration,
authorization, and access helps you to better collaborate with your IT Pros.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
Zero Trust goals.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens. It explains how token customization improves flexibility and control
while increasing application Zero Trust security with least privilege.
Configuring group claims and app roles in tokens describes how to configure apps
with app role definitions and assign security groups to app roles. This approach
improves flexibility and control while increasing application Zero Trust security with
least privilege.
Feedback
Was this page helpful? Yes No
Developer and administrator
responsibilities for application
registration, authorization, and access
Article • 04/17/2024
As a developer creating applications in the Microsoft identity platform, you work with IT
Professionals who have administrator privileges in Microsoft Entra ID to enable your
applications to take full advantage of the Microsoft identity platform. Knowing what
your IT Pros need from you and what you need from them helps you to streamline your
zero trust development workflow.
App developers usually implement, evaluate, and validate aspects of Zero Trust before
working with an organization's IT Pros to achieve full compliance and adherence.
Developers are responsible for building and integrating apps so that IT Pros can use
their tools to further secure the applications. Partnering with IT Pros can help you to:
The following table summarizes the decisions and tasks required for developer and IT
Pro roles to build and deploy secure applications in the Microsoft identity platform.
Read on for key details and links to articles to help you plan your secure application
development.
Developer
Register app in Microsoft identity platform
Define supported account types
Determine if app works on behalf of itself or user
Define resources required and how/when to request permission
IT Pro Administrator
Configure who can register apps in tenant
Assign application users, groups, and roles
Grant permissions to applications
Define policies (including conditional access policy)
IT Pros can apply conditional access policies to Security Assertions Markup Language
(SAML) apps at authentication. For OAuth 2.0 applications, they can apply policies when
an application attempts to access a resource. IT Pros determine which conditional access
policies apply to your application (SAML) or the resources that your application accesses
(OAuth 2.0).
Next steps
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application Zero Trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application Zero Trust security with
least privilege.
What do we mean by Zero Trust compliance? provides an overview of application
security from a developer's perspective to address the guiding principles of Zero
Trust.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Using standards-based development methodologies provides an overview of
supported standards (OAuth 2.0, OpenID Connect, SAML, WS-Federation, and
SCIM) and the benefits of using them with MSAL and the Microsoft identity
platform.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Feedback
Was this page helpful? Yes No
Building apps that secure identity
through permissions and consent
Article • 04/17/2024
This article continues from the Zero Trust identity and access management development
best practices article to help you use a Zero Trust approach to identity in your software
development lifecycle (SDLC).
Here's an overview of the Permissions and access articles in this Developer Guide so
that you can dive into identity components that include authentication, authorization,
and identity management.
Integrating applications with Microsoft Entra ID and the Microsoft identity platform
helps developers to build and integrate apps that IT pros can secure in the
enterprise by securely integrate apps with Microsoft Entra ID and the Microsoft
identity platform.
Registering applications introduces developers to the application registration
process and its requirements. It helps them to ensure that apps satisfy Zero Trust
principles of use least privileged access and assume breach.
Supported identity and account types for single- and multi-tenant apps explains
how you can choose if your app allows only users from your Microsoft Entra
tenant, any Microsoft Entra tenant, or users with personal Microsoft accounts.
Authenticating users for Zero Trust helps developers to learn best practices for
authenticating application users in Zero Trust application development. It describes
how to enhance application security with the Zero Trust principles of least privilege
and verify explicitly.
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Developing delegated permissions strategy helps you to implement the best
approach for managing permissions in your application and develop using Zero
Trust principles.
Developing application permissions strategy helps you to decide upon your
application permissions approach to credential management.
Requesting permissions that require administrative consent describes the
permission and consent experience when application permissions require
administrative consent.
Reducing overprivileged permissions and apps helps you to understand why
applications shouldn't request more permissions than they need (overprivileged).
Learn how to limit privilege to manage access and improve security.
Providing application identity credentials when there's no user explains why the
best Zero Trust client credentials practice for services (non-user applications) on
Azure is Managed Identities for Azure resources.
Managing tokens for Zero Trust helps developers to build security into applications
with ID tokens, access tokens, and security tokens that your they can receive from
the Microsoft identity platform.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how you can customize tokens.
Securing applications with Continuous Access Evaluation helps developers to
improve application security with Continuous Access Evaluation. Learn how to
ensure Zero Trust support in your apps that receive authorization to access
resources when they acquire access tokens from Microsoft Entra ID.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Example of API protected by Microsoft identity consent framework helps you to
design least privilege application permissions strategies for the best user
experience.
Calling an API from another API helps you to ensure Zero Trust when you have one
API that needs to call another API. Learn how to securely develop your application
when it's working on behalf of a user.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Next steps
Subscribe to our Develop using Zero Trust principles RSS feed for notification of
new articles.
Develop using Zero Trust principles helps you to understand the guiding principles
of Zero Trust so that you can improve your application security.
What do we mean by Zero Trust compliance? provides an overview of application
security from a developer's perspective to address the guiding principles of Zero
Trust.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Using standards-based development methodologies provides an overview of
supported standards (OAuth 2.0, OpenID Connect, SAML, WS-Federation, and
SCIM) and the benefits of using them with MSAL and the Microsoft identity
platform.
Developer and administrator responsibilities for application registration,
authorization, and access helps you to better collaborate with your IT Pros.
Build Zero Trust-ready apps using Microsoft identity platform features and tools
maps features of the Microsoft identity platform to the principles of Zero Trust.
The Identity integrations guide explains how to integrate security solutions with
Microsoft products to create Zero Trust solutions.
Feedback
Was this page helpful? Yes No
Integrating applications with Microsoft
Entra ID and the Microsoft identity
platform
Article • 04/17/2024
As a developer, you can build and integrate apps that IT pros can secure in the
enterprise. This article will help you to understand how to use Zero Trust principles to
securely integrate your app with Microsoft Entra ID and the Microsoft identity platform.
The Microsoft cloud-based identity and access management service, Microsoft Entra ID,
provides developers with these application integration benefits:
The above diagram illustrates the unified toolkit of the Microsoft identity platform for
developers that supports several identities and industry standards. You can build
applications and integrate identity with endpoints, libraries, web APIs, publisher
verification, user provisioning, and auth brokers.
An integrated app can run from any location, including these examples:
Microsoft Azure
Other cloud providers
Your own data centers and servers
Desktop computers
Mobile devices
Internet of Things devices.
The app or device, such as a web browser app accessing the authorization endpoint, can
natively provide requirements. Cooperation between a disconnected browser and the
application will satisfy the requirements. For example, apps running on televisions may
have the user perform the initial authentication with a browser on a desktop or mobile
device.
You'll register your client application (web or native app) or web API to establish a trust
relationship between your application and the Microsoft identity platform. Microsoft
Entra application registration is critical because misconfiguration or lapse in hygiene of
your application can result in downtime or compromise. Follow the Security best
practices for application properties in Microsoft Entra ID.
Publish to Microsoft Entra application gallery
The Microsoft Entra application gallery is a collection of software as a service
(SaaS) application and service principal objects in Microsoft Entra ID that developers
have pre-integrated with Microsoft Entra ID. It contains thousands of applications that
make it easy to deploy and configure SSO and automatic user provisioning.
Automatic user provisioning refers to creating user identities and roles in cloud
applications that users need to access. Automatic provisioning includes maintaining and
removing user identities as status or roles change. To provision users to SaaS apps and
other systems, the Microsoft Entra provisioning service connects to a System for Cross-
domain Identity Management (SCIM) 2.0 user management API endpoint that the
application vendor provides. This SCIM endpoint allows Microsoft Entra ID to
programmatically create, update, and remove users.
When you develop apps for Microsoft Entra ID, you can use the SCIM 2.0 user
management API to build a SCIM endpoint that integrates Microsoft Entra ID for
provisioning. For details, reference the Develop and plan provisioning for a SCIM
endpoint in Microsoft Entra ID tutorial.
Publish your application to the Microsoft Entra application gallery and make them
publicly available for users to add to their tenants by completing these tasks:
App publishers verify their identity with Microsoft by associating their app registration
with their verified Microsoft Partner Network (MPN) account. During verification,
Microsoft requests verification documentation. After you become a verified publisher, a
blue verified badge displays in your app's Microsoft Entra consent prompts and web
pages.
Next steps
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Configure an app's publisher domain helps you to understand multitenant apps
and default publisher domain values.
SaaS App Integration Tutorials for use with Microsoft Entra ID helps you to
integrate your cloud-enabled SaaS applications with Microsoft Entra ID.
Reference tips to troubleshoot publisher verification if you're receiving errors or
seeing unexpected behavior during publication.
Feedback
Was this page helpful? Yes No
Registering applications
Article • 04/17/2024
The Microsoft identity platform app registration portal is the primary entry point for
applications that use the platform for authentication and associated needs. As a
developer, when registering and configuring your apps, the choices you make drive and
affect how well your application satisfies Zero Trust principles. Effective app registration
especially considers the principles of use least privileged access and assume breach. This
article helps you to learn about the application registration process and its requirements
to ensure that your apps follow a Zero Trust approach to security.
You can configure your application to use Microsoft Entra ID through three methods: in
Visual Studio, by using the Microsoft Graph API, or by using PowerShell. There are
developer experiences in Azure and in API Explorer across developer centers. Reference
the required decisions and tasks for the developer and IT Pro roles to build and deploy
secure applications in the Microsoft identity platform.
When the first user in a directory signs in to an application and grants consent, the
system creates a service principal in the tenant that stores all user consent information.
Microsoft Entra ID automatically creates a service principal for a newly registered app in
the tenant before a user authenticates.
Only Microsoft Entra global administrators can perform specific application tasks (such
as adding applications from the app gallery and configuring applications to use
application proxy).
You might not have permission to create or modify an application registration. When
administrators don't give you permissions to register your applications, ask them how
you can convey necessary app registration information to them.
During registration, you receive the identity of your application: the application (client)
ID. Your app uses its client ID every time it performs a transaction through the Microsoft
identity platform.
Next steps
Reference the Microsoft identity platform documentation to learn how to register
application types. Example app types include single-page apps (SPA), web apps,
web APIs, desktop apps, mobile apps, and background services, daemons, and
scripts.
The New App registrations experience for Azure AD B2C article helps you become
familiar the new experience that replaces the legacy experience.
Integrating applications with Microsoft Entra ID and the Microsoft identity platform
helps developers to build and integrate apps that IT pros can secure in the
enterprise by securely integrate apps with Microsoft Entra ID and the Microsoft
identity platform.
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Feedback
Was this page helpful? Yes No
Identity and account types for single-
and multi-tenant apps
Article • 04/17/2024
This article will explain how you, as a developer, can choose if your app allows only users
from your Microsoft Entra tenant, any Microsoft Entra tenant, or users with personal
Microsoft accounts. You can configure your app to be either single tenant or multitenant
during app registration in Azure. Ensure the Zero Trust principle of least privilege access
so that your app only requests permissions it needs.
The Microsoft identity platform provides support for specific identity types:
Work or school accounts when the entity has an account in a Microsoft Entra ID
Microsoft personal accounts (MSA) for anyone who has account in Outlook.com,
Hotmail, Live, Skype, Xbox, etc.
External identities in Microsoft Entra ID for partners (users outside of your
organization)
Microsoft Entra Business to Customer (B2C) that allows you to create a solution
that will let your customers bring in their other identity providers. Applications that
use Azure AD B2C or are subscribed to Microsoft Dynamics 365 Fraud Protection
with Azure Active Directory B2C can assess potentially fraudulent activity following
attempts to create new accounts or sign in to the client's ecosystem.
You'll choose from the following supported account type options when registering your
application.
Multitenant)
Azure AD B2C provides business-to-customer identity as a service. You can allow users
to have a username and password just for your app. B2C supports customers with social
identities to reduce passwords. You can support enterprise customers by federating your
Azure AD B2C directory to your customers' Microsoft Entra ID (or any identity provider
that supports SAML) to OpenID Connect. Unlike a multitenant app, your app doesn't use
the customer's corporate directory where they're protecting their corporate assets. Your
customers can access your service or capability without granting your app access to
their corporate resources.
As a developer, it's your responsibility to keep tenant information separate. For example,
if the Contoso data is from Microsoft Graph, the User B from Contoso will only see
Contoso's Microsoft Graph data. There's no possibility for User B from Contoso to
access Microsoft Graph data in the Adatum tenant because Microsoft 365 has true data
separation.
In the above diagram, User B from Contoso can sign in to the application and they can
access Contoso data in your application. Your application can use our common (or
organization) endpoints so the user signs in natively to their tenant, requiring no
invitation process. A user can run and sign in to your application and it will work after
the user or tenant admin grants consent.
As a developer, keep these considerations in mind when your application supports guest
users:
You must use a tenant specific endpoint when signing in the guest user. You can't
use the common, organization, or consumer endpoints.
The guest user identity is different from the user's identity in their home tenant or
other IDP. The oid claim in the token for a guest user will be different from the
same individual's oid in their home tenant.
Next steps
How and why apps are added to Microsoft Entra ID explains how application
objects describe an application to Microsoft Entra ID.
Security best practices for application properties in Microsoft Entra ID covers
properties such as redirect URI, access tokens, certificates and secrets, application
ID URI, and application ownership.
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Developing delegated permissions strategy helps you to implement the best
approach for managing permissions in your application and develop using Zero
Trust principles.
Developing application permissions strategy helps you to decide upon your
application permissions approach to credential management.
Feedback
Was this page helpful? Yes No
Authenticating users for Zero Trust
Article • 04/17/2024
This article helps you, as a developer, to learn best practices for authenticating your
application users in Zero Trust application development. Always enhance your
application security with the Zero Trust principles of least privilege and verify explicitly.
The Microsoft identity platform ID token is part of the OpenID Connect (OIDC) standard
that specifies ID tokens as JSON Web Tokens (JWT). The JWT long string comprises three
components:
1. Header claims. The header claims present in ID tokens include typ (type claim),
alg (algorithm for signing the token), and kid (thumbprint for the public key to
The following example of an ID token shows information about the user and confirms
authentication to use the application.
JSON
{
"typ": "JWT",
"alg": "RS256",
"kid": "1LTMzakihiRla_8z2BEJVXeWMqo"
}.
{
"ver": "2.0",
"iss": "https://login.microsoftonline.com/3338040d-6c67-4c5b-b112-
36a304b66dad/v2.0",
"aud": "6cb04018-a3f5-46a7-b995-940c78f5aef3",
"exp": 1536361411,
"iat": 1536274711,
"nbf": 1536274711,
"sub": "AAAAAAAAAAAAAAAAAAAAAIkzqFVrSaSaFHy782bbtaQ",
"name": "Abe Lincoln",
"preferred_username": "[email protected]",
"oid": "00000000-0000-0000-66f3-3332eca7ea81",
"tid": "3338040d-6c67-4c5b-b112-36a304b66dad",
}.
.[Signature]
If you receive a token whose audience claim is different from your app's client ID,
immediately reject the token. The user hasn't authenticated by signing into your app.
They signed into another app. Always make sure that the user has permission to use
your app.
A JSON web token is valid until it expires. The exp (expiration) claim tells you when
the token expires. If the current time is before the time in the exp claim, the token
is valid.
Don't consider the user as authenticated before the time specified in the nbf (not
before time) claim. The nbf and exp times of the token define the token's valid
lifetime. When the expiration time is imminent, make sure that you get a new ID
token.
The sub (subject claim) is a unique identifier for an application user. The same user
has a different sub claim for other apps. If you want to store data to associate back
to a user and prevent an attacker from making that association, use the subject
claim. Because it doesn't expose the user's Microsoft Entra identity, it's the most
private way to associate data to a user. The sub claim is immutable.
If you want to share information across multiple applications, use the combination
of tenant ID ( tid ) and object ID ( oid ) claims that are unique to the user. The
combined tenant ID and object ID are immutable.
No matter what happens to an individual's identity, the sub , oid , and tid claims
remain immutable. Anything about the user can change and you can still key your
data off identifying the user based on the subject or the combined tid and oid
claims.
An app authenticates the user when the application requests an ID token from the
Microsoft identity platform. Workloads (applications that don't have users present but
rather run as services, background processes, daemons) skip this step.
You should always silently ask for this token first. To silently acquire a token in Microsoft
Authentication Libraries (MSAL), your app can start with the AcquireTokenSilent
method. If your app can authenticate without disturbing the user, it receives the
requested ID token.
If the Microsoft identity platform can't complete the request without interacting with the
user, then your app needs to fall back to the MSAL AcquireTokenInteractive method. To
interactively acquire a token, perform the request by opening a web surface to an
address under the https://login.microsoftonline.com domain.
From this web surface, the user has a private conversation with the Microsoft identity
platform. Your app has no view into this conversation, nor does it have any control of
the conversation. The Microsoft identity platform can ask for a user ID and password,
multifactor authentication (MFA), passwordless authentication, or other authentication
interaction that the IT admin or user has configured.
Your application will receive an ID token after the user has performed required
authentication steps. When your app receives the token, you can be certain that the
Microsoft identity platform has authenticated the user. If your app doesn't receive an ID
token, the Microsoft identity platform hasn't authenticated the user. Don't allow
unauthenticated users to continue into secured areas of your app.
It's best practice for applications to create a session for a user after it receives an ID
token from Microsoft Entra ID. In the ID token that an app receives, an expiration ( exp )
claim with a Unix timestamp. This timestamp specifies the on or after expiration time for
which the app mustn't accept the JWT for processing. Use this token expiration time to
drive the lifetime of your user sessions. The exp claim plays a crucial role in keeping an
explicitly verified user in front of the app with the right privilege and for the right
amount of time.
As illustrated in the following diagram, the simplest use case of a shared web surface is
an app that's running in a web browser (such as Microsoft Edge, Google Chrome,
Firefox, Safari). Browser tabs share the SSO state.
The Microsoft identity platform manages the SSO state in any specific browser unless
the user has different browsers open on the same device. On Windows 10 and newer,
the Microsoft identity platform natively supports browser SSO in Internet Explorer and
Microsoft Edge. When the user has signed into Windows, accommodations in Google
Chrome (via the Windows 10 accounts extension) and in Mozilla Firefox v91+ (via a
browser setting) allow each browser to share the SSO state.
As shown in the following diagram, the native application use case is more complicated.
With an auth broker in place, applications send authentication requests to the broker
instead of directly to the Microsoft identity platform. In this way, the broker becomes
the shared surface for all authentication on the device.
In addition to providing a shared surface, the auth broker provides other benefits. When
adopting Zero Trust, enterprises may want to have applications run only from enterprise
managed devices. Examples of enterprise device management include full Mobile
Device Management (MDM) and scenarios where users bring their own devices that
participate in Mobile Application Management (MAM).
By design, underlying operating systems (OS) isolate browsers. Developers need a closer
connection with the OS to have full access to device details. In Windows, the auth broker
is the Windows Web Account Manager (WAM). On other devices, the auth broker is
either the Microsoft Authenticator app (for devices running iOS or Android) or the
Company Portal App (for devices running Android). Applications access the auth broker
with MSAL. In Windows, an app can access the WAM without MSAL. However, MSAL is
the easiest way for apps to access the auth broker (especially apps that aren't Universal
Windows Platform apps).
Auth brokers work in combination with Microsoft Entra ID to utilize Primary Refresh
Tokens (PRT) that reduce the need for users to authenticate multiple times. PRTs can
determine whether the user is on a managed device. Microsoft Entra ID requires auth
brokers as it introduces Proof of Possession tokens , a more secure option over the
bearer tokens that are prevalent today.
Next steps
Troubleshoot Microsoft Entra access tokens: Validate an access token describes
how, when you have a Microsoft Entra access token, you verify that certain fields
match the record.
The Increase resilience of authentication and authorization applications you
develop article series addresses apps that use the Microsoft identity platform and
Microsoft Entra ID. They include guidance for client and service applications that
work on behalf of a signed in user and daemon applications that work on their
own behalf. They contain best practices for using tokens and calling resources.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how you can customize tokens.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles.
Building apps that secure identity through permissions and consent provides an
overview of permissions and access best practices.
Feedback
Was this page helpful? Yes No
Acquiring authorization to access
resources
Article • 04/17/2024
This article will help you, as a developer, to understand how to best ensure Zero Trust
when acquiring resource access permissions for your application. To access protected
resources like email or calendar data, your application needs the resource owner's
authorization. The resource owner can consent to or deny your app's request. Your app
will receive an access token when the resource owner grants consent; your app won't
receive an access token when the resource owner denies access.
Conceptual review
You can use the Microsoft identity platform to authenticate and authorize your
applications and manage permissions and consent. Let's start with some concepts:
To access data, your application can use delegated access (acting on behalf of a
signed-in user) or direct access (acting only as the application's own identity).
Delegated access requires delegated permissions (also known as scopes); the client
and the user must be separately authorized to make the request. Direct access may
require application permissions (also known as app roles); when app roles are
granted to applications, they can be called applications permissions.
Resource application owners can preauthorize client apps (in the Azure portal or by
using PowerShell and APIs like Microsoft Graph). They can grant resource
permissions without requiring users to see a consent prompt for the set of
permissions that have been preauthorized.
When you need to allow your application to call an API or authorize your application so
that the application can access a resource, modern authorization schemes can require
authorization through a permission and consent framework. Reference Security best
practices for application properties that include redirect URI, access tokens (used for
implicit flows), certificates and secrets, application ID URI, and application ownership.
Next steps
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application zero trust security with
least privilege.
Developing delegated permissions strategy helps you to implement the best
approach for managing permissions in your application and develop using Zero
Trust principles.
Developing application permissions strategy helps you to decide upon your
application permissions approach to credential management.
Providing application identity credentials when there's no user explains why the
best Zero Trust client credentials practice for services (non-user applications) on
Azure is Managed Identities for Azure resources.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Building apps with a Zero Trust approach to identity continues from the Zero Trust
identity and access management development best practices article to help you
use a Zero Trust approach to identity in your software development Lifecycle
(SDLC).
Feedback
Was this page helpful? Yes No
Developing delegated permissions
strategy
Article • 04/17/2024
This article will help you, as a developer, to implement the best approach for managing
permissions in your application and develop using Zero Trust principles. As described in
Acquiring authorization to access resources, delegated permissions are used with
delegated access to allow an application to act on behalf of a user, accessing only what
the user can access. Application permissions are used with direct access to allow an
application to access any data with which the permission is associated. Only
administrators and owners of service principals can consent to application permissions.
The permission and consent models refer primarily to an application. The permission
and consent process has no control over what a user can do. It controls what actions the
application is allowed to perform.
For example, your application that has users in front of the app gets permission to
update every user's profile in the tenant. That doesn't mean that anyone running your
application can update anyone else's profile. If the admin decides to grant your
application User.ReadWrite.All , then they believe that your application is doing the
right things when updating any users profile. Your app might log the changes and
properly safeguard the information. The admin makes a value judgment about the
application, not about the user.
Least privilege approach
APIs can be complex. Simple APIs may not have many operations. Complex APIs like
Microsoft Graph encapsulate many requests that an application may want to use. Just
because the application has the right to read doesn't mean it should have the right to
update. For example, Microsoft Graph has thousands of APIs. Just because you have
permission to read the user's profile, there's no reason why you should also have
permission to delete all their OneDrive files.
APIs often provide access to organization data stores and attract the attention of
attackers who want to access that data.
Evaluate the permissions you request to ensure that you seek the absolute least
privileged set to get the job done. Avoid requesting higher privilege permissions;
instead, carefully work through the large number of permissions that APIs like Microsoft
Graph provide. Locate and use the minimum permissions to address your needs. If you
won't write code to update the user's profile, you won't request it for your application. If
you only access users and groups, you won't request access to other information in the
directory. You won't request permission to manage user email if you won't write code
that accesses user email.
When an API designer defines permissions that require user consent, user consent
suggestions by the API designer can be overruled by the tenant admin. The tenant
admins can do that with a "big switch" in the tenant: everything requires admin consent.
They can overrule user consent in a more granular way with permission and consent
management. For example, they may allow users to consent to user consent requests
from verified publishers but not from other publishers. In another example, they may
allow User.Read to sign in the user and read their profile but require admin consent to
apps that ask permission to mail or to files.
API designers make their suggestions but tenant admins have the final say. Therefore, as
a developer, you won't always know when your app requires admin consent. It's nice to
plan and design around that but remember, when you make a token request, it could be
denied for any reason. In your code, you need to gracefully handle not getting a token
because tenant admins in which your customers or users are running your application
decide when permissions require admin consent.
From the related Quickstart article, you can download and run a code sample. It
demonstrates how a JavaScript single-page application (SPA) can sign in users and call
Microsoft Graph using the authorization code flow with Proof Key for Code Exchange
(PKCE). The code sample shows how to get an access token to call the Microsoft Graph
API or any web API.
As shown in the example code below, you'll instantiate a public client because an
application that runs entirely in the browser must be a public client. The user can get
their hands on the internals of your application when the code is in the browser.
JavaScript
As shown in the code example below, the sign-in pop-up handles the authentication
that the user needs to perform by calling the signIn function.
JavaScript
function signIn() {
/**
* You can pass a custom request object below. This will override the
initial configuration. For more information, visit:
* https://github.com/AzureAD/microsoft-authentication-library-for-
js/blob/dev/lib/msal-browser/docs/request-response-object.md#request
*/
myMSALObj.loginPopup(loginRequest)
.then(handleResponse)
.catch(error => {
console.error(error);
});
}
Your app can get information about the user, such as their display name or user ID.
Next, your app needs authorization to read the full profile of the user from Microsoft
Graph by following a pattern that you'll use throughout our MSAL libraries.
As shown in the example code below, your app attempts to get the authorization by
calling AcquireTokenSilent . If Microsoft Entra ID can issue the token without interacting
with the user, then AcquireTokenSilent will return the token that your app needs to
access Microsoft Graph on behalf of the user.
JavaScript
function getTokenPopup(request) {
/**
* See here for more info on account retrieval:
* https://github.com/AzureAD/microsoft-authentication-library-for-
js/blob/dev/lib/msal-common/docs/Accounts.md
*/
request.account = myMSALObj.getAccountByUsername(username);
return myMSALObj.`AcquireTokenSilent`(request)
.catch(error => {
console.warn("silent token acquisition fails. acquiring token
using popup");
if (error instanceof msal.InteractionRequiredAuthError) {
// fallback to interaction when silent call fails
return myMSALObj.`AcquireTokenPopup`(request)
.then(tokenResponse => {
console.log(tokenResponse);
return tokenResponse;
}).catch(error => {
console.error(error);
});
} else {
console.warn(error);
}
});
}
However, often Microsoft Entra ID can't issue the token without interacting with the user
(for example, the user changed their password or they haven't granted consent).
Therefore, AcquireTokenSilent will send an error back to the application it requires user
interaction. When you're your app receives the error, you'll fall back to call
AcquireTokenPopup .
At that point, Microsoft Entra ID will have a conversation with the user so they can
authenticate the user and authorize your app to act on the user's behalf (for example,
do an MFA, provide their password, grant consent). Then your app will get the token
needed to move forward.
Next steps
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Developing application permissions strategy helps you to decide upon your
application permissions approach to credential management.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application zero trust security with
least privilege.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Calling an API from another API helps you to ensure Zero Trust when you have one
API that needs to call another API and securely develop your application when it's
working on behalf of a user.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Feedback
Was this page helpful? Yes No
Developing application permissions
strategy
Article • 04/17/2024
As you learn to develop using Zero Trust principles, reference this article after reviewing
Acquiring authorization to access resources and Developing delegated permissions
strategy. Define your application permissions approach to credential management when
you use the Microsoft identity platform to authenticate and authorize your applications
and manage permissions and consent.
When no user is involved, you won't have an effective permission model because your
application is always granted the same permissions that the specific user of your
application has been granted.
App proves it's the app requesting permission. Your application will prove its own
identity with one of the following methods:
a certificate, which is the best option, or
a secret in a sophisticated secret management system, or
a secret when you're developing your services on Azure and using Managed
Identities for Azure resources. See the following Managing application
credentials section.
App always requires advance admin consent. Your application will request this
permission with the .default scope. It will request the permissions the admin
assigns to the application. Regardless of the naming for any particular scope, these
permissions apply across all users by default.
Permissions granted the app are always the permissions used. Unlike a delegated
permission, application permissions aren't bounded by what any particular user
can do.
Remove all secrets from code and configuration. When you're using the Azure
platform, place secrets in Key vault and access them via Managed Identities for
Azure resources. Make your code resilient to handle secret rotations if a
compromise occurs. IT admins can remove and rotate secrets and certificates
without taking down your application or affecting legitimate users.
Regularly roll over certificates and secrets to build resiliency in your application
and avoids outage due to an emergency rollover.
Next steps
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Developing delegated permissions strategy helps you to implement the best
approach for managing permissions in your application and develop using Zero
Trust principles.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Requesting permissions that require administrative consent describes the
permission and consent experience when application permissions will require
administrative consent.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Providing application identity credentials when there's no user explains why the
best Zero Trust client credentials practice for services (non-user applications) on
Azure is Managed Identities for Azure resources.
Feedback
Was this page helpful? Yes No
Requesting permissions that require
administrative consent
Article • 04/17/2024
In this article, we'll describe the permission and consent experience for a scenario where
you, as a developer, are writing your application code to request application permissions
that will require administrative consent. Example screenshots of permission and consent
dialogs and the Microsoft Entra admin center give you an idea of what your users and
tenant admins experience. Improve collaboration with admins to implement the Zero
Trust principle of least privilege in your applications.
As you develop your application, you'll write code that requests access to a resource by
requesting an access token with a specific scope (or permission). You'll use the scope
parameter as described in the OAuth 2.0 standard that some people describe as a
permission. A resource owner will grant or deny each request for permission. In
Microsoft Entra ID, the resource owner is either the user of the app or an admin who has
the rights to grant consent to that resource on behalf of all users.
In the above example dialog, the user grants consent to allow the app to read the data
on their behalf by selecting Accept or denies the request by selecting Cancel. The
application receives an access token and will be able to continue its processes after the
user grants consent. Remember to ensure that your app is ready to gracefully handle
when it doesn't receive a token.
However, you never know which permissions will require admin consent and which allow
a regular user to grant consent because tenant admins can configure their tenant with
Do not allow user consent (all permissions require admin consent) as shown in the
following example screenshot of User consent settings in the Microsoft Entra admin
center.
Admins can also Allow user consent for apps from verified publishers, for selected
permissions as shown in the following example screenshot of User consent settings in
the Microsoft Entra admin center.
Admins can then Add permissions to which users can consent as shown in the following
example screenshot of Permission classifications in the Microsoft Entra admin center.
When your app requests a permission that requires admin consent (by design or admin
configuration), your user may see a Need admin approval dialog similar to this example.
The above example dialog shows the default (out of the box) experience for permissions
that require admin consent. Most users don't know what to do in this scenario. They
don't know who their admin is, they don't know who to go to for approval. This
uncertainty can limit the user's ability to achieve desired results.
Below Admin consent requests, the tenant admin can improve the user's permission
and consent experience by selecting Yes on Users can request admin consent to apps
they're unable to consent to and configuring other Admin consent requests settings.
After the tenant admin selects Yes on Users can request admin consent to apps they're
unable to consent to and an application requests a permission that requires admin
consent, the user will see something similar to the following Approval required dialog
that provides a better user experience.
In the above example dialog, the user can Enter justification for requesting this app
before selecting Request approval. The approval request then enters an Admin consent
requests queue (example screenshot below) where admins have options to review,
accept, or ban applications in their organization based on risk profile.
When an admin runs an application that requires admin consent (and the admin hasn't
yet configured that consent in the Microsoft Entra admin center), the admin user sees a
slightly different Permissions requested dialog similar to the following example.
In the above example, the admin sees a description of the permissions that the
application is requesting. The admin can select Accept to individually run the application
or they can select Consent on behalf of your organization before selecting Accept.
After the admin grants consent for the organization, no future organization users will
need to grant permission for this application unless an admin removes consent from the
tenant Admin consent requests configuration.
In the above User consent example, the admin can review the granted permissions for
the app along with information about claims, permission type, and who gave consent.
The admin can select Admin consent to review granted permissions that require admin
consent.
The above example shows how the admin can pre-consent to the permissions that you
declared and provide the best experience for your users and tenant admins.
Requesting admin consent ahead of time is an excellent choice for line of business (LOB)
apps, especially the apps that your organization is developing. It's easier to not have to
ask your user if your company can access your company's data by pre-consenting those
applications. You make the admin consent request as part of your app registration
process.
Next steps
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Overview of permissions and consent in the Microsoft identity platform helps you
to understand foundational concepts of access and authorization.
Overview of consent and permissions helps you to learn foundational concepts
and scenarios around consent and permissions in Microsoft Entra ID.
Learn module: Permissions and consent framework helps you to learn permissions
and consent framework models.
Learn Live: Microsoft Identity: Permissions and Consent Framework helps you to
learn the basics of Microsoft identity including tokens, account types, and
topologies.
Feedback
Was this page helpful? Yes No
Reducing overprivileged permissions
and apps
Article • 04/17/2024
As a developer aiming to design and implement applications that follow the guiding
principles of Zero Trust, you want to increase application security with least privilege. It's
imperative that you reduce the attack surface of your application and the effect of a
security breach.
In this article, you'll learn why applications shouldn't request more permissions than
they need. You'll understand the term overprivileged and discover recommendations and
best practices for limiting privilege in your applications to manage access and improve
security.
What is overprivileged?
Overprivileged occurs when an application requests or receives more permissions than it
needs for it to properly function. The following examples of unused and reducible
permissions will improve your understanding of overprivileged.
Unused permissions
For this unused key example, imagine that there are three locked doors (blue, yellow,
and green) as shown in the diagram below.
Your assets are behind the doors. You have three keys (blue, yellow, and green) that
allow you to open its corresponding door. For example, the blue key can open the blue
door. When you only need access to the yellow door, you only carry the yellow key.
To best protect your assets, you only carry the keys you need when you need them and
keep unused keys in a safe location.
Reducible permissions
The reducible keys example is more complicated than the unused key example to which
we now add two special keys as shown in the diagram below.
The first black key is a pass key that can open all the doors. The second black key can
open the yellow and the green doors. When you only need access to the yellow and the
green doors, you only carry the second black key. You keep your pass key in a safe
location with the redundant green key.
In the Microsoft identity world, the keys are access permissions. Your resources and you,
the key holder, are applications. If you understand the risk of carrying unnecessary keys,
you're aware of the risk of your applications having unnecessary permissions.
The X axis represents Time and the Y axis represents Permissions. At the start of the
measured Time, you request and receive permission for your application. As the
business grows and changes over time, you add new permissions to support your needs
and the slope of Granted Permissions increases. The Permissions Used may be lower
than Granted Permissions when you forget to remove unnecessary permissions (for
example, if the application doesn't break) resulting in a Permission Gap.
Think carefully about what permissions your app actually requires. Beware of the
permission gap and regularly check your application permissions.
IT admin: Jeff is a tenant admin who ensures that applications in Microsoft Entra ID
are trustworthy and secure. Part of Jeff's job is to grant consent to permissions that
app developers require.
Developer: Kelly is an app developer who uses Microsoft identity platform and
owns apps. Kelly's job is to ensure that applications have the right permissions to
perform required tasks.
A common security compromise scenario for overprivileged typically has four stages as
shown and described below.
1. First, the developer starts configuring the application and adding required
permissions.
2. Second, the IT admin reviews required permissions and grants consent.
3. Third, the bad actor starts cracking user credentials and successfully hacks the user
identity.
4. If the user owns multiple applications, they're also overprivileged. The bad actor
can quickly use the token of the granted permission to retrieve sensitive data.
Overprivileged applications
When an entity asks for or receives more permissions than it needs, it's overprivileged.
The definition of overprivileged application in Microsoft identity platform is, "any
application that's been granted an unused or reducible permission."
Let's use Microsoft Graph as part of the Microsoft identity platform in a real-world
example to better understand unused permission and reducible permission.
Unused permission occurs when your application receives permissions that aren't
necessary for the desired tasks. For example, you're building a calendar app. Your
calendar app requests and receives Files.ReadWrite.All permission. Your app doesn't
integrate with any files' APIs. Therefore, your application has an unused
Files.ReadWrite.All permission.
Prevention
Auditing
Remediation
Prevent: When building an application, you should fully understand the permission
required for the API calls that your application needs to make, and only request
what's necessary to enable your scenario. Microsoft Graph documentation has
clear references for least privilege permissions to most privileged permission for all
endpoints. Be mindful of overprivileged scenarios as you determine which
permissions you need.
Audit: You and IT admins should regularly review existing applications' previously
granted privileges.
Remediate: If you or IT admins notice an overprivileged application in the
ecosystem, you should stop requesting tokens for the overprivileged permission. IT
admins should revoke granted consents. This step usually requires a code change.
Next steps
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application zero trust security with
least privilege.
Achieving Zero Trust readiness in your apps: Designing for Least Privilege helps
you to design apps using the principle of least privileged access with the Microsoft
identity platform.
Increase application security with the principle of least privilege helps you to
reduce the attack surface of an application and the effect of a security breach (the
blast radius) should one occur in a Microsoft identity platform-integrated
application.
Graph Explorer and Microsoft Graph permissions reference helps you to select
Microsoft Graph API calls to enable your app scenario and find corresponding
permissions from least to most privileged.
Feedback
Was this page helpful? Yes No
Providing application identity
credentials when there's no user
Article • 04/17/2024
When you, as a developer, are building non-user applications, you don't have a user
whom you can prompt for a username and password or Multifactor Authentication
(MFA). You need to provide the application's identity on its own. This article explains why
the best Zero Trust client credentials practice for services (non-user applications) on
Azure is Managed Identities for Azure resources.
Secret key
Certificate
Managed Identities for Azure resources
Federated Credentials
Certificate-based client credentials are more secure than secret keys. Certificates are
better managed as they aren't the secret itself. The secret isn't part of a transmission.
When you use a secret key, your client sends the actual value of the secret key to
Microsoft Entra ID. When you use a certificate, the private key of the certificate never
leaves the device. Even if someone intercepts, decodes, and de-encrypts the
transmission, the secret is still secure because the intercepting party doesn't have the
private key.
Next steps
Supported identity and account types for single- and multi-tenant apps explains
how you can choose if your app allows only users from your Microsoft Entra
tenant, any Microsoft Entra tenant, or users with personal Microsoft accounts.
Developing application permissions strategy helps you to decide upon your
application permissions approach to credential management.
Providing application identity credentials when there's no user explains why the
best Zero Trust client credentials practice for services (non-user applications) on
Azure is Managed Identities for Azure resources.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
Feedback
Was this page helpful? Yes No
Managing tokens for Zero Trust
Article • 04/17/2024
Ensure that your application adheres to the Zero Trust principle of least privilege and
prevents usage in ways that compromise your intention. Limit user access with Just-In-
Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data
protection. Separate your app's sensitive and powerful sections, providing only
authorized user access to these areas. Limit users who can use your application and the
capabilities that they have in your app.
Build least privilege into how your application manages ID tokens that it receives from
the Microsoft identity platform. Information in ID Tokens allows you to verify that a user
is who they claim to be. The user or their organization may specify authentication
conditions such as providing an MFA, using a managed device, and being in the correct
location.
Make it easy for your customers to manage authorizations to your app. Reduce their
user provision overhead and the need for manual processes. Automatic user
provisioning allows IT admins to automate user identity creation, maintenance, and
removal in target identity stores. Your customers can base automations on changes to
users and groups with app provisioning or HR driven provisioning in Microsoft Entra ID.
In the standard pattern for security token authorization, an issued ID token allows the
application to receive information about the user. Don't use the ID token as an
authorization process to access resources. The authorization server issues ID tokens that
contain claims with user information that include the following.
The audience ( aud ) claim is your app's client ID. Accept only tokens for your API
client ID.
The tid claim is the ID of the tenant that issued the token. The oid claim is an
immutable value that uniquely identifies the user. Use the unique combination of
the tid and oid claims as a key when you need to associate data with the user.
You can use these claim values to connect your data back to the user's ID in
Microsoft Entra ID.
The sub claim is an immutable value that uniquely identities the user. The subject
claim is also unique for your application. If you use the sub claim to associate data
with the user, it's impossible to go from your data and connect it with a user in
Microsoft Entra ID.
Your apps can use the openid scope to request an ID token from the Microsoft identity
platform. The OIDC standard governs the openid scope along with the format and
contents of the ID token. OIDC specifies these scopes:
Use the openid scope to sign in the user and add a sub claim to the ID token.
These scopes provide a user ID that is unique to the app and the user and calls the
UserInfo endpoint.
The email scope adds an email claim containing the user's email address to the ID
token.
The profile scope adds claims with basic profile attributes of the user (name,
username) to the ID token.
The offline_access scope allows the app to access user data even when the user
isn't present.
The Microsoft Authentication Library (MSAL) always adds the openid, email, and
profile scopes to every token request. As a result, MSAL always returns an ID token
Microsoft uses the OAuth2 standard to issue access tokens. The OAuth2 standard says
that you receive a token, but it doesn't specify the token format or what needs to be in
the token. When your application needs to access a resource that Microsoft Entra ID
protects, it should use a scope that the resource has defined.
For example, Microsoft Graph defines the User.Read scope that authorizes the
application to access the current user's full user profile and the tenant's name. Microsoft
Graph defines permissions across the full range of functionality available in that API.
Upon authorization, the Microsoft identity platform returns an access token to your
application. When you call the resource, your app provides this token as part of the
authorization header of the HTTP request to the API.
Always respect the token lifetime as provided in the token response for access tokens or
the exp claim in the ID token. Conditions that govern token lifetime can include sign-in
frequency for an enterprise. Your application can't configure the token lifetime. You can't
request a token lifetime.
In general, tokens must be valid and unexpired. The audience claim (aud) must match
your client ID. Make sure the token is coming from a trusted issuer. If you have a
multitenant API, you may choose to filter so that only specific tenants can call your API.
Make sure you enforce the token's lifetime. Check the nbf (not before) and the exp
(expiration) claims to ensure the current time is within those two claims' values.
Don't aim for exceptionally long or short session lifetimes. Let the granted ID token
lifetime drive this decision. Keeping your app's sessions active beyond token validity
violates the rules, policies, and concerns that drove an IT admin to set a token validity
duration to prevent unauthorized access. Short sessions degrade user experience and
don't necessarily increase the security posture. Popular frameworks like ASP.NET allow
you to set session and cookie timeouts from Microsoft Entra ID's ID token's expiry time.
Following the identity provider's token expiry time ensures that your user's sessions are
never longer than the policies that the identity provider dictates.
When your client acquires an access token to access a protected resource, it receives a
refresh token. Use the refresh token to obtain new access/refresh token pairs after the
current access token expires. Use refresh tokens to acquire extra access tokens for other
resources. Refresh tokens are bound to a combination of user and client (not to a
resource or tenant). You can use a refresh token to acquire access tokens across any
combination of resource and tenant where your app has permissions.
Rarely, a call to retrieve a token can fail due to issues like network, infrastructure, or
authentication service failure or outage. Increase authentication experience resiliency in
your application if a token acquisition failure occurs by following these best practices:
Developers often have questions about looking inside tokens to debug issues such as
receiving a 401 error from calling the resource. As more encrypted tokens prevent you
from looking inside an access token, you need find alternatives to looking inside access
tokens. For debugging, the token response that contains the access token provides the
information that you need.
In your code, check for error classes rather than individual error cases. For example,
handle user interaction required rather than individual errors where the system hasn't
granted permission. Because you may miss those individual cases, it's better to check for
a classifier like user interaction rather than dig into individual error codes.
You may need to fall back to AcquireTokenInteractive and provide claims challenges
that the AcquireTokenSilent call requires. Doing so ensures effective management of
the interactive request.
Next steps
Customizing tokens helps you to understand how to customize tokens to improve
flexibility and control while increasing application zero trust security with least
privilege.
Authenticating users for Zero Trust helps developers to learn best practices for
authenticating application users in Zero Trust application development. It describes
how to enhance application security with the Zero Trust principles of least privilege
and verify explicitly.
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Configure how users consent to applications
Providing application identity credentials when there's no user explains why the
best Zero Trust client credentials practice for services (nonuser applications) on
Azure is Managed Identities for Azure resources.
Troubleshoot Microsoft Entra access tokens: Validate an access token
Feedback
Was this page helpful? Yes No
Customizing tokens
Article • 04/17/2024
Your reasons for customizing your application tokens depend on the process you're
using to drive more granular authorization in your applications and APIs. For example,
you may have different user roles, access levels, and functionalities in your app that rely
on information from tokens.
The Microsoft Graph API provides a robust set of directory information and data across
Microsoft 365. You can develop a fine-grained and rich authorization system by building
on the data in Microsoft Graph. For example, you can access information from the user's
group membership, detailed profile data, SharePoint, and Outlook to use in your
authorization decisions. You can also include authorization data in the token from
Microsoft Entra ID.
Application-level authorization
It's possible for IT Pros to add app-level authorization without customizing the token
nor having the developer add any code.
IT Pros can prevent tokens from being issued to any app in the tenant by using the user
assignment required flag to ensure that only a set of users are able to sign in to the
application. Without this flag, all users in a tenant can access the application. With this
flag, only assigned users and groups can access the application. When an assigned user
accesses the app, the app receives a token. If the user doesn't have an assignment, the
app won't receive a token. Remember to always gracefully handle token requests that
don't receive tokens.
Optional claims
Optional claims specify which claims you want Microsoft Entra ID to send to your
application in tokens. You can use optional claims to:
Optional claims hang off of the application registration object with a defined schema.
They apply to the application no matter where it was running. When you're writing a
multi-tenant application, optional claims work well because they're consistent across
every tenant in Microsoft Entra ID. For example, an IP address isn't tenant-specific
whereas an application has an IP address.
By default, guest users in a tenant can also sign in to your app. If you want to block
guest users, opt-in to the optional claim (acct). If it's 1, then the user has a guest
classification. If you want to block guests, then block tokens with acct==1.
Claims mapping
In Microsoft Entra ID, policy objects represent sets of rules on individual applications or
on all applications in an organization. A claims mapping policy modifies the claims that
Microsoft Entra ID issues in tokens for specific applications.
You'll use claims mapping for tenant-specific information that has no schema (for
example, EmployeeID, DivisionName). Claims mapping applies at the service principal
level that the tenant admin controls. Claims mapping corresponds to the enterprise app
or the service principal for that application. Each tenant can have its own claims
mapping.
If you're developing a line of business application, you can look specifically at what your
tenant does (what specific claims your tenant has available that you can use in your
token). For example, if an organization has a user's division name property (not a
standard field in Microsoft Entra ID) in their on-premises Active Directory, you can use
Microsoft Entra Connect to sync it to Microsoft Entra ID.
You can use one of the standard extension attributes to contain that information. You
can define your token with a division name claim that you can compose from the
corresponding extension (even if it won't apply across every tenant). For example, an
organization puts their division name in extension attribute 13.
With claims mapping, you can make it work for another tenant that puts their division
name in attribute seven.
Planning token customization
Which token you customize depends on your type of application: client application or
API. There's no difference in what you can do to customize your token. What you can
put in the token is the same for each of them. Which token you choose to customize
depends upon which token your app will consume.
Customizing ID tokens
If you're developing a client application, you customize the ID token because it's the
token that you request to identify the user. A token belongs to your app when the
audience claim ( aud ) in the token matches the client ID of your application. For a client
application that calls APIs, but doesn't implement them, make sure you only customize
your app's ID token.
The Azure portal and Microsoft Graph API allow you to customize the access token for
your app as well, but those customizations have no effect. You can't customize an access
token for an API that you don't own. Remember, your app must not attempt to decode
or inspect an access token that your client app receives as authorization to call an API.
Client applications always customize the ID token that they receive to identity the user.
APIs customize the access tokens that the API will receive as part of the call to the API.
Next steps
B2B collaboration user claims mapping describes Microsoft Entra ID support for
customizing the claims that are issued in the SAML token for B2B collaboration
users.
Customize app SAML token claims when a user authenticates to an application
through the Microsoft identity platform using the SAML 2.0 protocol.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Feedback
Was this page helpful? Yes No
Securing applications with Continuous
Access Evaluation
Article • 04/17/2024
This article will help you, as a developer, to improve application security with
Continuous Access Evaluation. You'll learn how to ensure Zero Trust support in your
apps that receive authorization to access resources when they acquire access tokens
from Microsoft Entra ID.
When Microsoft Entra ID issues these access tokens, it fully evaluates the conditions for
that authorization. Microsoft Entra ID performs standard authorization actions, such as
ensuring consent for the application has been granted, every time it issues tokens for
initial token requests and when it refreshes tokens.
Microsoft Entra ID primarily uses JSON Web Tokens (JWT) for access tokens. A resource
API can decode, validate, and interpret the JWT without needing to call back to
Microsoft Entra ID on every call to the resource API. The JWT standard defines an exp
claim that identifies the on-or-after expiration time that you must not accept the JWT
token for processing. By default, Microsoft Entra tokens expire 60 to 90 minutes after
issue. Your applications must cache and use access tokens for this period during which
Microsoft Entra ID doesn't evaluate the authorization conditions.
One solution is to evaluate conditions on every call to a protected resource. The most
common way to implement this enforcement is token introspection. Token introspection
doesn't use a JWT format for the token. Instead, token introspection uses an opaque
string that the resource API can't interpret. The resource API sends the token to the
identity provider on each call. The identity provider then checks for any conditions and
returns data that the resource API can use to complete the operation. This process can
be expensive as it adds another round trip web request to every API call.
To remedy this expense with Continuous Access Evaluation (CAE), a resource API can
listen for events that Microsoft Entra ID pushes about the tokens that Microsoft Entra ID
issues for the resource API. For example, when your application calls the Microsoft
Graph API, Microsoft Graph can check if it has received events from Microsoft Entra ID
about the token. If the conditions of the original authentication have changed and the
user needs to reauthenticate, Microsoft Graph returns an error to the calling app.
Watch the above presentation to learn how applications work when using modern
authentication with these steps:
As access to a resource can be revoked outside a token's lifetime, Microsoft Entra ID can
issue tokens for a longer lifetime. For apps that support CAE, Microsoft Entra ID can
issue tokens that are valid for up to 28 hours. Although this longer token lifetime
doesn't improve the app's resilience, it reduces application costs as the app will need to
request tokens much less frequently.
CAE improves an app's resilience to issues that the app could encounter in acquiring an
access token from Microsoft Entra ID. Whenever possible, Microsoft Entra ID will issue a
refresh time as part of a token response that contains an access token. Microsoft
Authentication Libraries (MSAL) use this refresh time to proactively refresh the token.
The refresh time is some fraction (usually half) of the token's expiration time. As long as
MSAL is able to refresh the access token before the token's expiration time, the app is
resilient to token refresh problems.
For example, when an app supports CAE, Microsoft Entra ID issues a token that
authorizes the app to call Microsoft Graph that is valid for 24 hours. Microsoft Entra ID
then tells MSAL to proactively refresh the token after 12 hours. If MSAL attempts to
refresh the access token fail because the original access token is still valid for 12 more
hours, the app is more resilient to problems when it acquires tokens from Microsoft
Entra ID.
Next steps
Continuous access evaluation for workload identities in Microsoft Entra ID
describes the CAE security benefits to an organization.
Apply Zero Trust Principles to Authentication Session Management with
Continuous Access Evaluation describes how to secure authentication sessions
without affecting user experience and productivity and modernize session
management.
Increase resilience of authentication and authorization applications you develop
introduces a series of articles that provide guidance on increasing resiliency in
apps using the Microsoft identity platform and Microsoft Entra ID. They contain
best practices for using tokens and calling resources.
Building apps with a Zero Trust approach to identity provides an overview of
permissions and access best practices.
Integrating applications with Microsoft Entra ID and the Microsoft identity platform
helps developers to build and integrate apps that IT pros can secure in the
enterprise by securely integrate apps with Microsoft Entra ID and the Microsoft
identity platform.
Feedback
Was this page helpful? Yes No
Configuring group claims and app roles
in tokens
Article • 04/17/2024
Configuring group claims and app roles in tokens shows you how to configure your
apps with app role definitions and assign security groups to app roles so that you can
improve flexibility and control while increasing application security with least privilege.
Microsoft Entra ID supports sending a user's assigned security groups, Microsoft Entra
directory roles, and distribution groups as claims in a token. You can use this approach
to drive authorization in apps. However, Microsoft Entra ID limits security group support
in a token by the size of the token. If the user is a member of too many groups, there
will be no security groups in the token.
In this article, you'll learn an alternative approach to getting user information in tokens
using Microsoft Entra security group support. Instead, you'll configure your apps with
app role definitions and assign security groups to app roles. This Zero Trust developer
best practice will improve flexibility and control while increasing application security
with least privilege.
You can configure group claims in tokens that you can use within your applications for
authorization. Remember that group information in the token is current only when you
receive the token. Group claims support two main patterns:
Group membership can drive authorization decisions. For example, the following
example shows some claims in a token. You can add group claims and roles to either ID
or access tokens.
"aud": "e18c04b1-4868-4b93-93d1-8d71f17ab99b",
"iss": "https://login.microsoftonline.com/833ced3d-cb2e-41de-92f1-
29e2af035ddc/v2.0",
"iat": 1669657224, "nbf": 1669657224, "exp": 1669661124,
"groups": [
"0760b6cf-170e-4a14-91b3-4b78e0739963",
"3b2b0c93-acd8-4208-8eba-7a48db1cd4c0"
],
"oid": "cb7eda1b-d09a-40ae-b8bb-37836ebc6abd",
"sub": "3OBtLXUC2ZrN_ADLNjW9X4o0lcd61py7lgHw3Skh77s",
"tid": "833ced3d-cb2e-41ce-92f1-29e2af035ddc",
"ver": "2.0",
"wids": [
"cf1c38e5-3621-4004-a7cb-879624dced7c",
"b79fbf4d-3ef9-4689-8143-76b194e85509"
]
The groups claims array comprises the IDs of the groups to which this user is a member.
The wids array comprises the IDs of the Microsoft Entra roles assigned to this user.
Here, cf1c38e5-3621-4004-a7cb-879624dced7c shows that this user's assigned roles
include Application Developer and standard member as 3b2b0c93-acd8-4208-8eba-
7a48db1cd4c0 indicates.
Your app can make authorization decisions based on the presence or absence of these
claims and their values. See Microsoft Entra built-in roles for a list of values for the wids
claim.
To add the groups and wids claims to your tokens, select All groups as shown in the
following example of the App registrations | Token configuration | Optional claims |
Edit groups claim screen.
Group overages
When you request all groups in your token as shown in the above example, you can't
rely on the token having the groups claim in your token. There are size limits on tokens
and on groups claims so that they don't become too large. When the user is a member
of too many groups, your app will need to get the user's group membership from
Microsoft Graph. The limits for groups in a groups claim are:
If you're using OpenID Connect or OAuth2, you can have up to 200 groups in your
token. If you're using SAML, you can have only 150 groups because SAML tokens are
bigger than OAuth2 and OpenID Connect tokens. If you're using the implicit flow, the
limit is six because those responses show up in the URL. In all of these cases, instead of
having a groups claim, you'll see an indication (known as a group overage) that tells you
that the user is a member of too many groups to fit in your token.
In the following token example, for an OpenID connect, or OAuth2, JSON web token
(JWT), there won't be a groups claim if the user is a member of too many groups.
Instead, there will be a _claim_names claim that contains a groups member of the array.
In the above token example, you see that the groups claim is supposed to be mapped
to src1 . In theory, you'd then look for the _claim_sources claim then find the src1
member. From there, you'd find the Graph query that you'd use to get the group
membership. However, there's a problem with what you see in the example Graph
query. It goes to Azure AD Graph (which Microsoft is deprecating), so don't use it.
Implicit flow overage indication is done with a hasgroups claim instead of the groups
claim.
To ensure proper authorization using group membership, have your app check for the
groups claim. If present, use that claim to determine the user's group membership. If
there's no groups claim, check for the existence of a hasgroups claim or a _claim_names
claim with a groups member of the array. If either of these claims are present, the user is
a member of too many groups for the token. In this case, your app must use Microsoft
Graph to determine the group membership for the user. See List a user's memberships
(direct and transitive) to find all the groups, both direct and transitive, of which the user
is a member.
If your application requires real time group membership information, use Microsoft
Graph to determine group membership. Remember that the information in the token
that you receive is up to date only at the time you call Microsoft Graph.
See the following example of the App registrations | Token configuration | Optional
claims | Edit groups claim screen. One way to avoid hitting a group overage claim is to
select Groups assigned to the application on the Edit groups claim screen instead of
All groups.
When you select Groups assigned to the application, a group is included in the groups
claim if the following conditions are true:
As of this article's publication, the Groups assigned to the application option doesn't
support indirect membership. Group assignment requires at least a P1 level license. A
free tenant can't assign groups to an application.
Having created the app role in the app's registration, IT Pros can assign users and
groups to the role. Your app will get a roles claim in your token (ID token for app,
access token for APIs) with all the signed-in user's assigned roles as shown in the
following token example.
"aud": "acaf6ce9-81f0-462a-a93d-a314070738d3",
"iss": "https://login.microsoftonline.com/833ced3d-cb2e-41de-92f1-
29e2af035ddc/v2.0",
"iat": 1670826509, "nbf": 1670826509, "exp": 1670830409,
"name": "Kyle Marsh",
"oid": "cb7eda1b-d09a-419e-b8bb-37836ebc6abd",
"preferred_username": "[email protected]",
"roles": [
"Approver",
"Reviewer"
],
"sub": "dx-4lf-0loB3c3uVrULnZ2VTLuRRWYff0q7-QlIfYU4",
"tid": "833ced3d-cb3e-41de-92f1-29e2af035ddc",
When you create app roles that allow user and groups as members, always define a
baseline user role with no elevated authorization roles. When an Enterprise App
configuration requires assignment, only users with direct assignment to an application
or membership in a group assigned to the app can use the app.
If your app has defined app roles that allow users and groups as members then, when a
user or group is assigned to the app, one of the defined app roles must be part of the
user or group's assignment to the app. If your app has only defined elevated roles (such
as admin ) for the app, then all users and groups would be assigned the admin role.
When you define a base role (such as user ), users and groups assigned to the app can
be assigned the base user role.
In addition to avoiding group overage claims, another advantage of using roles isn't
needing to map between a group ID or name and what it means in your application. For
example, your code can look for the admin role claim instead of iterating through
groups in the groups claims and deciding which group IDs should be allowed the admin
functionality.
Next steps
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configure group claims for applications by using Microsoft Entra ID shows how
Microsoft Entra ID can provide a user's group membership information in tokens
for use within applications.
Security best practices for application properties describes redirect URI, access
tokens (used for implicit flows), certificates and secrets, application ID URI, and
application ownership.
Microsoft identity platform scopes, permissions, & consent explains the
foundational concepts of access and authorization to help you build more secure
and trustworthy applications.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Feedback
Was this page helpful? Yes No
Protecting APIs
Article • 04/17/2024
When you, as a developer, protect your API, your focus is on authorization. To call your
resource's API, applications need to acquire application authorization. The resource itself
must enforce the authorization. In this article, you'll learn best practices for protecting
your API through registration, defining permissions and consent, and enforcing access
to achieve your Zero Trust goals.
During registration, you'll define how calling applications will reference your API and its
delegated and application permissions. An app registration can represent a solution that
has both client applications and APIs. However, in this article, we'll address the scenario
where a standalone resource exposes an API.
Normally, an API doesn't perform authentication or directly ask for authorization. The
API will validate a token presented by the calling app. APIs won't have interactive sign-
ins, so you won't need to register settings such as redirect URI or application type. APIs
get their tokens from the applications that are calling those APIs, not by interacting with
Microsoft Entra ID. For web APIs, use OAuth2 access tokens for authorization. Web APIs
validate bearer tokens to authorize callers. Don't accept ID tokens as a proof of
permission.
By default, Microsoft Entra ID adds User.Read to the API permissions of any new app
registration. You'll remove this permission for most web APIs. Microsoft Entra ID requires
API permissions only when an API calls another API. If your API doesn't call another API,
remove the User.Read permission when you register your API.
You'll need a unique identifier for your API, known as the Application ID URI, that client
apps that need to access your API will ask for permission to call your API. The
Application ID URI needs to be unique across all Microsoft Entra tenants. You can use
api://<clientId> (the default suggestion in the portal), where <clientId> is the
To provide developers who are calling your API with a more user-friendly name, you can
use your API's address as your Application ID URI. For example, you can use
https://API.yourdomain.com where yourdomain.com must be a configured publisher
domain in your Microsoft Entra tenant. Microsoft validates that you have ownership of
the domain so that you can use it as the unique identifier for your API. You don't need
to have code at this address. The API can be wherever you want it to be, but it's a good
practice to use the HTTPS address of the API as the Application ID URI.
APIs that provide access to organization data stores can attract the attention of
attackers who want to access that data. Instead of having only one delegated
permission, design your permissions with the Zero Trust principle of least privilege
access in mind. It can be difficult to get into a least privileged model later if all client
apps start with full privileged access.
Often, developers fall into a pattern of using a single permission like "access as user" or
"user impersonation" (which is a common phrase although technically inaccurate).
Single permissions like these only allow full, privileged access to your API.
Declare least privilege scopes so that your applications aren't vulnerable to compromise
or used to perform a task that you never intended. Define your multiple scopes in API
Permissions. For example, separate scopes from reading and updating data and
consider offering read-only permissions. "Write access" includes privileges for create,
update, and delete operations. A client should never require write access to only read
data.
Consider "standard" and "full" access permissions when your API works with sensitive
data. Restrict the sensitive properties so that a standard permission doesn't allow access
(for example, Resource.Read ). Then implement a "full" access permission (for example,
Resource.ReadFull ) that returns properties and sensitive information.
Always evaluate permissions that you request to ensure that you seek the absolute least
privileged set to get the job done. Avoid requesting higher privilege permissions.
Instead, create an individual permission for each core scenario. Refer to Microsoft Graph
permissions reference for good examples of this approach. Locate and use just the right
number of permissions to address your needs.
As the API designer, you can provide guidance on which scopes can safely require only
user consent. However, tenant admins can configure a tenant so that all permissions
require admin consent. If you define a scope as requiring admin consent, the permission
will always require admin consent.
When deciding upon user or admin consent, you have two primary considerations:
1. Whether the range of operations behind the permission affect more than a
single user. If permission allows the user to choose which application can access
only their own information, then user consent may be appropriate. For example,
the user can consent to choosing their preferred application for email. However, if
the operations behind the permission involve more than a single user (for example,
viewing full user profiles of other users), then define that permission as requiring
admin consent.
2. Whether the range of operations behind the permission have a broad scope. For
example, a broad scope is when a permission enables an app to change everything
in a tenant or to do something that might be irreversible. A broad scope indicates
that you require admin consent rather than user consent.
Err on the conservative side and require admin consent if you're in doubt. Clearly and
concisely describe the consequences of consent in your permission strings. Assume that
the individual reading your description strings has no familiarity with your APIs or
product.
Avoid adding your APIs to existing permissions in a way that changes the semantics of
the permission. Overloading existing permissions dilutes the reasoning upon which
clients previously granted consent.
Workloads authenticate with client credentials and request a token using the .default
scope as demonstrated in the following example code.
JavaScript
Permissions require admin consent when there's no user in front of the app and when
the application permission enables a broad range of operations.
Enforcing access
Ensure that your APIs enforce access by validating and interpreting access tokens that
calling application provide as bearer tokens in the HTTPS request's authorization header.
You can enforce access by validating tokens, managing metadata refresh, and enforcing
scopes and roles, as described in the following sections.
Validating tokens
After your API receives a token, it must validate the token. Validation ensures that the
token comes from the proper issuer as untampered and unmodified. Check the
signature because you don't get the token directly from Microsoft Entra ID as you do
with ID tokens. Validate the signature after your API receives a token from an untrusted
source on the network.
Because there are known vulnerabilities around JSON web token signature verification,
use a well-maintained and established standard token validation library. Authentication
libraries (such as Microsoft.Identity.Web or Passport, if you're building a node) use the
proper steps and mitigate for known vulnerabilities.
Optionally, extend token validation . Use the tenant ID ( tid ) claim to restrict the
tenants in which your API can obtain a token. Use the azp and appid claims to filter
apps that can call your API. Use the object ID ( oid ) claim to further narrow down access
to individual users.
For example, older libraries were occasionally hard coded to update those public signing
keys every 24 hours. Consider when Microsoft Entra ID has to quickly rotate those keys
and the keys that you downloaded didn't include the new rotated keys. Your API could
be offline for a day while it waits for its metadata refresh cycle. Reference specific
metadata refresh guidance to ensure that you properly get the metadata. If you're using
a library, ensure that it treats that metadata within reasonable timing.
For delegated permission tokens, have your API inspect the scope ( scp ) claim to see
what the application has consent to do. Inspect the object ID ( oid ) or subject key ( sub )
claims to see the user on whose behalf the application is working.
Then have your API check to ensure that the user also has access to the requested
operation. If your API has defined roles for assigning to users and groups, have your API
check for any roles claims in the token and behave accordingly. For application
permission tokens, there will be no scope ( scp ) claim. Instead, have your API determine
what application permissions the workload has received by inspecting the roles claim.
After your API has validated the token and scopes and processed the object ID ( oid ),
subject key ( sub ), and roles claims, your API can return the results.
Next steps
Example of API protected by Microsoft identity consent framework helps you to
design least privilege application permissions strategies for the best user
experience.
Calling an API from another API helps you to ensure Zero Trust when you have one
API that needs to call another API and securely develop your application when it's
working on behalf of a user.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application zero trust security with
least privilege.
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Requesting permissions that require administrative consent describes the
permission and consent experience when application permissions will require
administrative consent.
In this Quickstart: Protect a web API with the Microsoft identity platform, learn how
to protect an ASP.NET web API by restricting access to its resources to authorized
accounts only.
In this Tutorial - Transform and protect your API in Azure API Management, learn
about configuring common policies to hide the technology stack info or the
original URLs in API's HTTP response.
Feedback
Was this page helpful? Yes No
Example of API protected by Microsoft
identity consent framework
Article • 04/17/2024
This article can help you, as a developer, to design your application permissions strategy
to provide least privilege. Before proceeding, see the API protection article to learn best
practices for registration, defining permissions and consent, and enforcing access.
Let's take a look at how an API that is protected by the Microsoft identity platform uses
the Microsoft identity consent framework. We'll use the Microsoft Graph API as our
example because it makes the most extensive use of the Microsoft identity platform
consent framework.
The constraint element affects the degree of access that your app has within the
directory. Microsoft Graph supports these constraints:
All grants permission for your app to perform the operations on all of the
resources of the specified type in a directory.
Shared grants permission for your app to perform the operations on resources that
other users have shared with the signed-in user.
AppFolder grants permission for your app to read and write files in a dedicated
folder in OneDrive. This constraint is exposed only on the Files permissions object
and is only valid for Microsoft accounts.
If you specify No constraint, your app can only perform the operations on the
resources that the signed-in user owns.
ノ Expand table
User.Read Sign-in and read Allows users to sign-in to the app and allows the app to
user profile read the profile of signed-in users. It also allows the app to
read basic company information of signed-in users.
User.ReadWrite Read and write Allows the app to read the signed-in user's full profile. It
access to user also allows the app to update the signed-in user's profile
profile information on their behalf.
least privilege. If the developer doesn't have a requirement and code to update the
user's profile, the app won't ask for User.ReadWrite . Therefore, an attacker can't
compromise the application and use it to change data.
Notice that User.Read doesn't just give the application access to the user object. Each
permission represents a specific range of operation. It's important that developers and
admins read the permission description to see exactly what any specific permission
enables. User.Read , in addition to enabling reading the current user's full profile,
enables the application to see the basic information from the Organizations object in
Microsoft Graph.
ノ Expand table
User.ReadBasic.All Read all Allows the app to read a basic set of profile properties of
users' basic other users in your organization on behalf of the signed-in
profiles user. Includes display name, first and last name, email
address, open extensions, and photo. Allows the app to read
the full profile of the signed-in user.
The range of operation that User.ReadBasic.All starts with everything that User.Read
does. In addition, you can access display name, first and last name, email address,
photo, and open extensions for other organization users. The specific range of operation
enables applications to have a nice people picker UI and is an example of the API
designers using a permission to enable a specific range of operation.
Let's look at a couple more permissions on the Microsoft Graph user object:
ノ Expand table
User.Read.All Read all Allows the app to read the full set of profile properties,
users' full reports, and managers of other users in your organization,
profiles on behalf of the signed-in user.
User.ReadWrite.All Read and Allows the app to read and write the full set of profile
write all properties, reports, and managers of other users in your
users' full organization, on behalf of the signed-in user. Also allows
profiles the app to create and delete users and reset user
passwords on behalf of the signed-in user.
User.Read.All is interesting because every user in the organization has this capability
(for example, open Outlook, go up and down a reporting chain). You, as an individual,
can see the full user profile of every other user in your organization. However, the
Microsoft Graph API designers decided that only admins should allow an application to
perform the same operation because User.Read.All includes the tenant's organizational
hierarchy. If a bad actor accessed this information, they could mount a targeted
phishing attack where the phishing email came from a person's manager or their
manager's manager.
permission can update, or even delete, every user in the tenant. As a delegated
permission, when a user is in front of the app, the app can do only what the current user
can do. Regular users can't update or delete other users regardless of the app's
permissions. However, when a tenant admin uses the app, then they can perform these
operations. When deciding to grant or deny this permission, you should evaluate your
app with a tenant admin user in mind.
ノ Expand table
User.Read Sign-in and Allows users to sign-in to the app and allows the No
read user app to read the profile of signed-in users. It also
profile allows the app to read basic company information
of signed-in users.
User.ReadWrite Read and Allows the app to read the signed-in user's full No
write access profile. It also allows the app to update the
to user signed-in user's profile information on their
profile behalf.
User.ReadBasic.All Read all Allows the app to read a basic set of profile No
users' basic properties of other users in your organization on
profiles behalf of the signed-in user. Includes display
name, first and last name, email address, open
extensions, and photo. Allows the app to read the
full profile of the signed-in user.
User.Read.All Read all Allows the app to read the full set of profile Yes
users' full properties, reports, and managers of other users
profiles in your organization, on behalf of the signed-in
user.
User.ReadWrite.All Read and Allows the app to read and write the full set of Yes
write all profile properties, reports, and managers of other
users' full users in your organization, on behalf of the
profiles signed-in user. Also allows the app to create and
delete users and reset user passwords on behalf
of the signed-in user.
Next steps
Calling an API from another API helps you to ensure Zero Trust when you have one
API that needs to call another API and securely develop your application when it's
working on behalf of a user.
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application zero trust security with
least privilege.
Requesting permissions that require administrative consent describes the
permission and consent experience when application permissions will require
administrative consent.
In this Quickstart: Protect a web API with the Microsoft identity platform, download
and run a code sample that demonstrates how to protect an ASP.NET web API.
In this Tutorial - Transform and protect your API in Azure API Management, learn
about configuring common policies to hide technology stack info and original
URLs in the API HTTP response body.
Authorization best practices helps you to implement the best authorization,
permission, and consent models for your applications.
Feedback
Was this page helpful? Yes No
Calling an API from another API
Article • 04/17/2024
How do you, as a developer, ensure Zero Trust when you have one API that needs to call
another API? In this article, you'll learn how to securely develop your application when
it's working on behalf of a user.
When a user drives an app's UI, the app might use a delegated permission so that the
API knows which user on whose behalf the app is working. It would inspect the subject
(sub) claim or object ID (oid) and tenant ID (tid) claims in the access token that the app
provides when calling the API. The API wouldn't rely on the untrusted app, which is just
a call coming from somewhere on the network. Instead, it would validate the token to
ensure that the API only works on behalf of the app user that Microsoft Entra ID verified.
When one API (we'll refer to it as the Original API) calls another, it's vital that the API
that we're calling (we'll refer to it as the Downstream API) follows the above-described
validation process. The Downstream API can't rely on an untrusted network source. It
must get the user identity from a properly validated access token.
If the Downstream API doesn't follow the proper validation process, the Downstream
API must rely on the Original API to provide the identity of the user in another way. The
Downstream API might incorrectly use an application permission to perform the
operation. Then the Original API would become the sole authority over which users
could achieve which results against the Downstream API. The Original API could
intentionally (or unintentionally) allow a user to accomplish a task that the user couldn't
otherwise accomplish. For example, one user could change the details of another user or
read and update documents that the user doesn't have permission to access. Improper
validation can cause serious security issues.
For better security, the Original API acquires a delegated permission access token to
provide to the Downstream API when the Original API makes the call. Let's walk through
how this works.
The Client Application has acquired a delegated permission access token (indicated by
the pentagon shape with the "A" label) to the Original API. The delegated permission
access token allows it to work on behalf of the user to call the Original API that requires
authorization.
The next animation shows the Original API providing the token that the Original API
received from the Client App and the Original API's client credentials.
Microsoft Entra ID will check for things like consent or conditional access enforcement.
You may have to go back to your calling client and provide a reason for not being able
to get the token. You would typically use a claims challenge process to go back to the
calling application with information regarding consent not being received (such as being
related to conditional access policies).
The token will include the scopes for granted consent and the original app user identity.
The Downstream API can properly implement effective permissions to ensure that the
identified user has permission to accomplish the requested task. You'll want to use the
on behalf of flow to acquire tokens for an API to call another API to make sure that user
context passes to all Downstream APIs.
When an API is acting on behalf of a user and needs to call another API, the API must
use OBO to acquire a delegated permission access token to call the Downstream API on
behalf of the user. APIs should never use application permissions to call Downstream
APIs when the API is acting on behalf of a user.
Next steps
Microsoft identity platform authentication flows & app scenarios describes
authentication flows and the application scenarios in which they're used.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Example of API protected by Microsoft identity consent framework helps you to
design least privilege application permissions strategies for the best user
experience.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
The Secure custom APIs with Microsoft Identity Learn module explains how to
secure a web API with Microsoft identity and how to call it from another
application.
Security best practices for application properties describes redirect URI, access
tokens (used for implicit flows), certificates and secrets, application ID URI, and
application ownership.
Microsoft identity platform authentication libraries describes Microsoft
Authentication Library support for various application types.
Feedback
Was this page helpful? Yes No
Authorization best practices
Article • 04/17/2024
As you learn to develop using Zero Trust principles, this article continues from Acquiring
authorization to access resources, Developing delegated permissions strategy, and
Developing application permissions strategy. It will help you, as a developer, to
implement the best authorization, permission, and consent models for your applications.
You can implement authorization logic within applications or solutions that require
access control. When authorization approaches rely on information about an
authenticated entity, an application can evaluate information that is exchanged during
authentication (for example, information provided within a security token). When a
security token doesn't contain information, an application can make calls to external
resources.
You don't have to embed authorization logic entirely within your application. You can
use dedicated authorization services to centralize authorization implementation and
management.
Use the correct permission type based on scenarios. Avoid using both application
and delegated permissions in the same app. If you're building an interactive
application where a signed-in user is present, your application should use
delegated permissions. If, however, your application runs without a signed-in user,
such as a background service or daemon, your application should use application
permissions.
Provide terms of service and privacy statements. The user consent experience
surfaces your terms of service and privacy statement to users to help them know
that they can trust your app. They're especially critical for user-facing multi-tenant
apps.
Use the /.default scope. The /.default scope effectively mimics the old default
experience that looked at what you put in the application registration, figured out
what consents you needed, and then asked for all of the consents not yet granted.
It doesn't require you to include the permissions that you need in your code
because they're in your app registration.
While access to data in APIs like Microsoft Graph allows you to build rich applications,
your organization or your customer will evaluate the permissions that your app requests
along with your app's trustworthiness.
Becoming a Microsoft Verified Publisher helps you to give your customers an easier
experience in accepting your application requests. When an application comes from a
verified publisher, users, IT Pros, and customers know that it comes from someone with
whom Microsoft has a business relationship. A blue checkmark appears next to the
publisher's name (component #5 in the Permissions requested consent prompt
example below; see component table at Microsoft Entra application consent experience).
The user can select the verified publisher from the consent prompt to view more
information.
When you're a verified publisher, users and IT pros gain trust in your application
because you're a verified entity. Publisher verification provides improved branding for
your application, and increased transparency, reduced risk, and smoother enterprise
adoption for your customers.
Next steps
Developing delegated permissions strategy helps you to implement the best
approach for managing permissions in your application and develop using Zero
Trust principles.
Developing application permissions strategy helps you to decide upon your
application permissions approach to credential management.
Use Zero Trust identity and access management development best practices in
your application development lifecycle to create secure applications.
Security best practices for application properties describes redirect URI, access
tokens, certificates and secrets, application ID URI, and application ownership.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application zero trust security with
least privilege.
API Protection describes best practices for protecting your API through
registration, defining permissions and consent, and enforcing access to achieve
your Zero Trust goals.
Acquiring authorization to access resources helps you to understand how to best
ensure Zero Trust when acquiring resource access permissions for your application.
Feedback
Was this page helpful? Yes No
Securing DevOps environments for Zero
Trust
Article • 04/17/2024
This article describes best practices for securing your DevOps environments with a Zero
Trust approach for preventing hackers from compromising developer boxes, infecting
release pipelines with malicious scripts, and gaining access to production data via test
environments.
Notice in the above diagram how connections between environments and to external
integrations expand the threat landscape. These connections can increase opportunities
for hackers to compromise the system.
Bad actors are stretching across the enterprise to compromise DevOps environments,
gain access, and unlock new dangers. Attacks go beyond the typical breadth of cyber
security breaches to inject malicious code, assume powerful developer identities, and
steal production code.
DevOps tools are key entry points for hackers, from pipeline automation to code
validation and code repositories. If bad actors infect code before it reaches production
systems, in most cases, it can pass through cyber security checkpoints. To prevent
compromise, ensure that your development teams are engaged with peer reviews,
security checks with IDE security plugins, secure coding standards, and branch review.
Cyber security teams aim to prevent attackers from sieging production environments.
However, environments have widened to include supply chain tools and products.
Breach of third-party open-source tools can heighten global cyber security risks.
Learn more about developer-specific articles with the following DevSecOps articles in
the Developer guidance section of the Zero Trust Guidance Center:
Securing the DevOps platform environment helps you to implement Zero Trust
principles in your DevOps platform environment and highlights best practices for
secret and certificate management.
Securing the developer environment helps you to implement Zero Trust principles
in your development environments with best practices for least privilege, branch
security, and trusting tools, extensions, and integrations.
Embedding Zero Trust security into your developer workflow helps you to innovate
quickly and securely.
Next steps
Accelerate and secure your code with Azure DevOps with tools that give
developers the fastest and most secure code to cloud experience.
Sign up for Azure Developer CLI, an open-source tool that accelerates the time it
takes to get started on Azure.
Configure Azure to trust GitHub's OIDC as a federated identity. OpenID Connect
(OIDC) allows your GitHub Actions workflows to access resources in
Azure without needing to store the Azure credentials as long-lived GitHub
secrets.
The DevOps resource center helps you with DevOps practices, Agile methods, Git
version control, DevOps at Microsoft, and how to assess your organization's
DevOps progress.
Learn how the Microsoft DevSecOps solution integrates security into every
aspect of the software delivery lifecycle to enable DevSecOps, or secure DevOps,
for apps on the cloud (and anywhere) with Azure and GitHub.
Implement Zero Trust principles as described in memorandum 22-09 (in support of
US executive order 14028, Improving the Nation's Cyber Security) by using
Microsoft Entra ID as a centralized identity management system.
Feedback
Was this page helpful? Yes No
Securing the DevOps platform
environment for Zero Trust
Article • 04/17/2024
This article will help you, as a DevOps team member, to implement the Zero Trust
principle of least privilege and secure the DevOps platform environment. It features
content from our Securing Enterprise DevOps Environments eBook and highlights
best practices for secret and certificate management.
Modern enterprises rely on DevOps platforms for deployment, including pipelines and
production environments that developers require to be productive. In the past,
application security methods didn't consider the increased attack surface that present
day pipelines and production environments expose. As hackers shift left and target
upstream tools, you need innovative approaches to secure your DevOps platform
environments.
In the diagram below, notice that the DevOps platform environment connects to the
application environment and to continuous integration and continuous delivery (CI/CD)
pipeline extensions.
As shown in the above diagram, the developer starts a build for a customer request.
GitHub then starts a runner with a Vault App Role's role ID and secret ID. The Trusted
Entity periodically requests a new secret ID from the Vault and gets the GitHub Secret
secret ID from GitHub. The Vault uses the GitHub Secrets role ID and secret ID to sign in
and get code-signing assets. The Runner customizes and code-signs the mobile app.
The following best practices will help you to build a secure setup that minimizes secret
and parameter exposure.
Provide secure storage for secrets and certificates at each application lifecycle
stage. Always develop as if it's an open-source project. Ensure that teams are
storing secrets in key vaults rather than in the code or on team environments. Use
the Azure Key Vault cloud service for securely storing and accessing secrets.
Configure Azure to trust GitHub's OIDC as a federated identity. OpenID Connect
(OIDC) allows your GitHub Actions workflows to access resources in Azure
without needing to store the Azure credentials as long-lived GitHub secrets.
Equip every DevOps platform environment with audit trails. Review audit logs to
track who gained access, what change occurred, and the date/time for any active
system. Specifically include DevOps platforms with CI/CD pipelines that flow into
production. Audit trails for DevOps tools provide robust ways to remediate threats
quicker, find and alert on suspicious activities to possible breaches or
vulnerabilities, and find potential data or privilege misuse. Ensure granular control
and audit trails are available across each environment.
Secure the software supply chain. With every library you bring into your
codebase, you expand the software supply chain and inherit dependencies from
each open-source project or tool. With caution, remove unnecessary libraries and
open-source components to reduce the attack surface of your software supply
chain.
Automate Infrastructure-as-Code (IaC) template scans. With IaC environments,
it's easy to scan for misconfigurations, compliance audits, and policies issues.
Implementing compliance checks and access controls raises the security posture of
your entire infrastructure. Verify the security of third-party tool integrations that
fulfill automation system requirements.
Automate approval workflows. For any approval workflow to push code into
production, certain automatic or manual checks must confirm security, business
value, status, and quality of each request. These checks function as a gate between
development and production to prevent denial-of-service attacks and hackers
injecting code into production environments without flagging or triggering an
alert.
Allow only verified DevOps tool integrations. As in developer environments,
DevOps tools come with extensions and integrations to make the DevOps team
efficient and secure. Confirm that verified integrations require the least privilege
possible to execute their work. Implement least privilege access when possible and
ensure the right level of read/write permissions. Learn how to disable or limit
GitHub Actions for your organization.
Next steps
Securing the developer environment helps you to implement Zero Trust principles
in your development environments with best practices for least privilege, branch
security, and trusting tools, extensions, and integrations.
Embedding Zero Trust security into your developer workflow helps you to innovate
quickly and securely.
Securing DevOps environments for Zero Trust describes best practices for securing
your DevOps environments with a Zero Trust approach for preventing hackers from
compromising developer boxes, infecting release pipelines with malicious scripts,
and gaining access to production data via test environments.
Implement Zero Trust principles as described in memorandum 22-09 (in support of
US executive order 14028, Improving the Nation's Cyber Security) by using
Microsoft Entra ID as a centralized identity management system.
Accelerate and secure your code with Azure DevOps with tools that give
developers the fastest and most secure code to cloud experience.
Feedback
Was this page helpful? Yes No
Securing the developer environment for
Zero Trust
Article • 04/12/2024
This article will help you, as a developer, to secure your development environment so
that you can implement Zero Trust principles (verify explicitly, use least privilege access,
assume breach). It features content from our Securing Enterprise DevOps
Environments eBook and highlights best practices for branch security and trusting
tools, extensions, and integrations.
Developer velocity relies on your ability to work how and where you want to maximize
business outcomes. You want powerful, customizable machines with root or
administrator access. However, developer demands can run contrary to compliance
regulations and the need to audit and control private employee environment access and
storage.
In the diagram below, notice how the developer environment connects to the DevOps
tools environment to affect Git branches. It widens the environment surface through
connection to third-party open-source packages and application extensions. Extensions
present attack vectors in dependency and extension application vulnerabilities.
Giving DevOps team members flexibility and control while preventing malicious attacks
is a fundamental challenge for security offices. DevOps can control the developer
environment with a cloud environment (see Trusted launch for Azure VMs and GitHub
Enterprise Cloud Docs ) and secure the developer environment with containers (see
GitHub Codespaces Documentation ).
In addition, developers can implement these Zero Trust measures to help secure the
developer environment:
To remediate potential access opportunities that cause hackers to target the software
developer role, consider the following Zero Trust least privilege security best practices
for apps .
Implement least privilege and just-in-time access for DevOps. Make sure that
team members maintain only minimal access to environments for the shortest
required time. Put policies in place to cover administrator access rights on main
devices, DevOps tools, release pipelines, code repositories, environments, secret
stores, and databases. For DevOps teams, the base requirement is a connection to
the organization identity store . Use identity federation for integrating with SaaS
environments to avoid duplication of identities on third party platforms and to
reduce exposure risk.
Don't use personal access tokens for source code access. Secure practices for
DevOps teams include access to SaaS-based DevOps tools, code repositories (via
SSH, HTTPS, or personal access token). For SaaS-based environment access, have
clear instructions for how access principles dictate who can download (clone)
systems code repos and from which devices (local, cloud, and container). For
example, OneDrive can block or limit unmanaged device access.
Standardize and synchronize GitHub Enterprise Managed User (EMU) user
accounts with corporate identities. With Enterprise Managed Users , you can
control the user accounts of your enterprise members through your identity
provider (IdP). In your organization identity store, explicitly define GitHub
usernames, emails, and display names. Users then easily identify collaborators even
when they've never met face-to-face.
For the three ways a developer can connect to a SaaS environment (HTTPS with
an identity, personal access token, connecting with SSH key), make connections
with the organization identity store. With GitHub (except for GitHub EMU
accounts), your identity is and always will be your public identity. Controlled access
via SSO requires connection with the organization identity store.
Use an SSH certificate authority (CA) to provide signed SSH certificates for
members to securely access resources with Git. An SSH certificate is a mechanism
for one SSH key to sign another SSH key. GitHub Enterprise Cloud supports SSH
certificates to give organizations more control over how members access
repositories. Admins can upload their SSH CA public key and issue certificates for
members to use for Git authentication. Certificates can only access repositories
that belong to the organization. Admins can require members to use certificates
when accessing their repositories.
Use a Git credential manager to harden access to your code. Tools like Visual
Studio (VS) have built-in identity support. VS Code will defer to a Git credential
manager .
Protect branches with code reviews to give DevOps teams control over code
changes and auditing advances. The branching strategy in the preceding diagram
articulates a controlled flow of changes that delivers a clear chain of command and
blueprint for addressing code changes . Of the different approaches for the
branching strategy, one commonality is that protected branches serve as the
source for new releases to production.
Have administrators of Git repositories control approval authorizations. The
control mechanism of branching strategies is in the approval workflow .
Protected branches require validations, reviews, and approvals before accepting
changes. One option is to create a branch protection rule to enforce workflows. For
example, require an approval review or status check pass for all pull requests
merged into the protected branch. Branch policies help teams protect important
branches of development. Policies enforce your team's code quality and change
management standards.
Ensure that you only integrate tools from both trusted marketplaces and
publishers. For example, the VS Code marketplace has thousands of extensions
to make your life easier. However, when your teams adopt new tools or extensions,
the most important aspect can be verifying a publisher's trustworthiness.
Set up secure practices to control extension use to limit the attack surface of
developer environments. Most IDE extensions require approving certain privileges
to function, often as a file with read permissions on the system to analyze code.
Extensions require connections to cloud environments to function (common in
metric tools). Approving extra functionalities on top of the IDE opens up
organizations to more threats.
On developer machines, track the number and maturity of used extensions to
understand the potential attack surface. Incorporate only VS Code marketplace
extensions from verified publishers . When you're installing third-party
application extensions with VS Code, regularly check extensions that you're
running with the command line, code --list-extensions --show-versions . Have a
good understanding of extensible components that you're running in your
developer environment.
Next steps
Embedding Zero Trust security into your developer workflow helps you to innovate
quickly and securely.
Securing the DevOps platform environment helps you to implement Zero Trust
principles in your DevOps platform environment and highlights best practices for
secret and certificate management.
Securing DevOps environments for Zero Trust describes best practices for securing
your DevOps environments with a Zero Trust approach for preventing hackers from
compromising developer boxes, infecting release pipelines with malicious scripts,
and gaining access to production data via test environments.
Implement Zero Trust principles as described in memorandum 22-09 (in support of
US executive order 14028, Improving the Nation's Cyber Security) by using
Microsoft Entra ID as a centralized identity management system.
Accelerate and secure your code with Azure DevOps with tools that give
developers the fastest and most secure code to cloud experience.
Configure Azure to trust GitHub's OIDC as a federated identity. OpenID Connect
(OIDC) allows your GitHub Actions workflows to access resources in
Azure without needing to store the Azure credentials as long-lived GitHub
secrets.
Feedback
Was this page helpful? Yes No
Embedding Zero Trust security into your
developer workflow
Article • 04/17/2024
As a developer, you need to feel confident and secure to move at speed. The need for
security starts as soon as you clone your code. In this article, you'll learn how to develop
using Zero Trust principles so that you can innovate quickly and securely. The Zero Trust
security strategy and approach for designing and implementing applications comprises
these principles:
Verify explicitly. Always authenticate and authorize based on all available data
points.
Use least privilege access. Limit user access with Just-In-Time and Just-Enough-
Access (JIT/JEA), risk-based adaptive policies, and data protection.
Assume breach. Minimize blast radius and segment access. Verify end-to-end
encryption and use analytics to get visibility, drive threat detection, and improve
defenses.
Implement the following best practices that work together in Azure and GitHub to
secure your development solution.
Because security starts when developers clone code, enable DevSecOps with Azure
and GitHub to bridge across DevOps and SecOps teams and secure your
development environments.
Provide flexible and powerful developer tools for any developer, language, and
stack with Visual Studio and Visual Studio Code .
Simplify new developer onboarding and third-party collaboration with an entire
development lifecycle tool in the cloud using GitHub Codespaces and Microsoft
Dev Box.
Include built-in intellectual property protection for code that you no longer
disperse into multiple locations. Help your teams collaborate, develop, automate,
and deploy code wherever they want with GitHub Actions and Azure Pipelines.
Get security guidance and continuous security feedback within the developer
workflow with code scanning, secret scanning, and dependency review using
GitHub Advanced Security .
Instill zero-trust security throughout your organization using identity management
services in Microsoft Entra ID.
Pre-commit stage
Threat modeling
IDE security plug-in
Pre-commit hooks
Secure coding standards
Peer review
During the commit stage, use extensive security methods to review your code (including
static code analysis) and scan your code as you check it into your source control. Use
credential scanning (also known as secret scanning or token scanning) to expose
credentials that you may have inadvertently introduced into the codebase. Catch
insecure dependencies before you introduce them to your environment with
dependency review.
During the deploy stage, look at the overall health of your codebase and perform high-
level security scanning to identify risks. Perform cloud configuration checks,
infrastructures code checks, and security acceptance tests to ensure alignment with
organizational security goals.
Operate and monitor stage
Continuous monitoring
Threat intelligence
Blameless postmortems
During the operate and monitor phase, use continuous monitoring and threat
intelligence to mitigate overall dependency vulnerabilities that you may inherit over
time. Perform postmortems to take away lessons learned and continue iterating through
your DevOps cycle.
Dependency scanning
Integrated review of dependencies
Alerts and security updates
Get risk levels of dependencies and automated fixes to vulnerable dependencies in your
codebase with continuous dependency scanning . As a continuous process, it nudges
your developers in the right direction in a friendly and non-obtrusive way.
Code scanning
Extensible framework for code scanning
Integrated within the developer workflow
Backed by industry leading CodeQL engine
Implement code scanning as you generate code with no other steps to run at
separate locations. Ease fixes early in your development lifecycle by viewing scanning
results in your familiar GitHub user experience.
Secret scanning
Scan for leaked secrets in public and private repos
Partnership with 40+ providers
Push protection
Move from remediation to prevention
Check for high-confidence secrets
Enable protection with one click
Scan your code for hardcoded credentials and tokens with secret scanning . Push
protection scans for secrets and tokens before you push to your codebase. Check for
high-confidence secrets as developers push code, blocking the push when GitHub
identifies a secret.
Get visibility into the activity of your workload identities and enable periodic cleanup.
Determine who owns workload identities and how you keep this information up to date
across organization changes. Track when you have last used workload identities, when
you last issued tokens and when tokens expire.
To mitigate the potential for leaked secrets and credentials, periodically conduct access
reviews. Require users to review their workload identities and remove unnecessary
access privileges. Have users report overprivileged and underutilized access privileges.
Discuss how you'll protect workload identities from breach. Enable conditional access to
ensure that access is originating from expected resources.
Watch April Edwards, Senior Cloud Advocate and DevOps Practice Lead, demo the
Workload Identity Federation workflow. The demonstration begins at the 19:14 mark in
the Accelerate and secure your code to cloud development Microsoft Build 2022
session that is also available on YouTube (embedded below).
https://www.youtube-nocookie.com/embed/1fMdA3pSBaY
Next steps
Sign up for Azure Developer CLI, an open-source tool that accelerates the time it
takes to get started on Azure.
Configure Azure to trust GitHub's OIDC as a federated identity. OpenID Connect
(OIDC) allows your GitHub Actions workflows to access resources in Azure
without needing to store the Azure credentials as long-lived GitHub secrets.
Implement Zero Trust principles as described in memorandum 22-09 (in support of
US executive order 14028, Improving the Nation's Cyber Security) by using
Microsoft Entra ID as a centralized identity management system.
Accelerate and secure your code with Azure DevOps with tools that give
developers the fastest and most secure code to cloud experience.
Securing the developer environment helps you to implement Zero Trust principles
in your development environments with best practices for least privilege, branch
security, and trusting tools, extensions, and integrations.
Securing DevOps environments for Zero Trust describes best practices for securing
your DevOps environments for preventing hackers from compromising developer
boxes, infecting release pipelines with malicious scripts, and gaining access to
production data via test environments.
Customizing tokens describes the information that you can receive in Microsoft
Entra tokens and how to customize tokens to improve flexibility and control while
increasing application zero trust security with least privilege.
Configuring group claims and app roles in tokens shows you how to configure
your apps with app role definitions and assign security groups to app roles to
improve flexibility and control while increasing application zero trust security with
least privilege.
Feedback
Was this page helpful? Yes No
Zero Trust illustrations for IT architects
and implementers
Article • 04/12/2024
These posters and technical diagrams give you information about deployment and
implementation steps to apply the principles of Zero Trust to Microsoft cloud services,
including Microsoft 365 and Microsoft Azure.
Zero Trust is a new security model that assumes breach and verifies each request as
though it originated from an uncontrolled network. Regardless of where the request
originates or what resource it accesses, the Zero Trust model teaches us to "never trust,
always verify."
As an IT architect or implementer, you can use these resources for deployment steps,
reference architectures, and logical architectures to more quickly apply Zero Trust
principles to your existing environment for:
Microsoft 365
Azure services:
Azure IaaS
Azure Virtual WAN
A PDF file for easier viewing, links to articles, and to print for your IT department.
If available, a Microsoft Visio file to modify the illustrations for your own use.
If available, a Microsoft PowerPoint file for presentations and to modify the slides
for your own use.
To use the same set of icons and templates in the Visio or PowerPoint files, get the
downloads in Microsoft 365 architecture templates and icons.
ノ Expand table
Item Description
ノ Expand table
Item Description
Copilot combines the power of large language models (LLMs) with your
data in the Microsoft Graph — your calendar, emails, chats, documents,
meetings, and more — and the Microsoft 365 apps to provide a
powerful productivity tool.
ノ Expand table
Item Description
You can also download the technical diagrams used in the Zero Trust for Azure IaaS
series of articles as an easier way of viewing the illustrations in the articles or to modify
them for your own use.
ノ Expand table
Item Description
ノ Expand table
Item Description
Use this illustration together with this article: Apply Zero Trust
principles to Azure Virtual WAN
PDF | Visio
Updated March 2024
ノ Expand table
Item Description
Use this illustration together with this article: Apply Zero Trust
principles to Azure Virtual Desktop
PDF | Visio
Updated March 2024
ノ Expand table
Item Description
ノ Expand table
Item Description
Use this illustration together with this article: Zero Trust deployment
for technology pillars
PDF | Visio
Updated February 2024
Additional Microsoft security posters and
illustrations
See these additional Microsoft security posters and illustrations:
The phishing, password spray, app consent grant incident response playbook
workflows: PDF | Visio
Next steps
Use additional Zero Trust content based on a documentation set or the roles in your
organization.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
ノ Expand table
Adoption framework for phase and Apply Zero Trust protections Security architects, IT
step guidance for key business from the C-suite to the IT teams, and project
solutions and outcomes implementation. managers
Concepts and deployment objectives Apply Zero Trust protections IT teams and security
for general deployment guidance for aligned with technology staff
technology areas areas.
Zero Trust for small businesses Apply Zero Trust principles Customers and partners
to small business customers. working with Microsoft
365 for business
Documentation set Helps you... Roles
Zero Trust Rapid Modernization Plan Quickly implement key layers Security architects and IT
(RaMP) for project management of Zero Trust protection. implementers
guidance and checklists for easy wins
Zero Trust deployment plan with Apply Zero Trust protections IT teams and security
Microsoft 365 for stepped and to your Microsoft 365 tenant. staff
detailed design and deployment
guidance
Zero Trust for Microsoft Copilots for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Microsoft Copilots. staff
deployment guidance
Zero Trust for Azure services for Apply Zero Trust protections IT teams and security
stepped and detailed design and to Azure workloads and staff
deployment guidance services.
Partner integration with Zero Trust for Apply Zero Trust protections Partner developers, IT
design guidance for technology areas to partner Microsoft cloud teams, and security staff
and specializations solutions.
Develop using Zero Trust principles Apply Zero Trust protections Application developers
for application development design to your application.
guidance and best practices
Your role
Follow this table for the best documentation sets for your role in your organization.
ノ Expand table
Security architect Adoption framework for phase and step Apply Zero Trust protections
guidance for key business solutions and from the C-suite to the IT
IT project manager outcomes implementation.
IT implementer
Member of an IT or Concepts and deployment objectives for Apply Zero Trust protections
security team general deployment guidance for aligned with technology
technology areas areas.
Customer or partner Zero Trust for small businesses Apply Zero Trust principles
for Microsoft 365 for to small business customers.
business
Role Documentation set Helps you...
Security architect Zero Trust Rapid Modernization Plan Quickly implement key
(RaMP) for project management layers of Zero Trust
IT implementer guidance and checklists for easy wins protection.
Member of an IT or Zero Trust deployment plan with Apply Zero Trust protections
security team for Microsoft 365 for stepped and detailed to your Microsoft 365
Microsoft 365 design and deployment guidance for tenant.
Microsoft 365
Member of an IT or Zero Trust for Microsoft Copilots for Apply Zero Trust protections
security team for stepped and detailed design and to Microsoft Copilots.
Microsoft Copilots deployment guidance
Member of an IT or Zero Trust for Azure services for stepped Apply Zero Trust protections
security team for and detailed design and deployment to Azure workloads and
Azure services guidance services.
Partner developer or Partner integration with Zero Trust for Apply Zero Trust protections
member of an IT or design guidance for technology areas to partner Microsoft cloud
security team and specializations solutions.
Application developer Develop using Zero Trust principles for Apply Zero Trust protections
application development design to your application.
guidance and best practices
Feedback
Was this page helpful? Yes No
Meet identity requirements of
memorandum 22-09 with Microsoft
Entra ID
Article • 10/23/2023
The Executive Order on Improving the Nation’s Cybersecurity (14028) , directs federal
agencies to advance security measures that significantly reduce the risk of successful
cyberattacks against federal government digital infrastructure. On January 26, 2022, in
support of Executive Order (EO) 14028, the Office of Management and Budget (OMB)
released the federal Zero Trust strategy in M 22-09 Memorandum for Heads of Executive
Departments and Agencies .
This article series has guidance to employ Microsoft Entra ID as a centralized identity
management system when implementing Zero Trust principles, as described in
memorandum 22-09.
Memorandum 22-09 supports Zero Trust initiatives in federal agencies. It has regulatory
guidance for federal cybersecurity and data privacy laws. The memo cites the US
Department of Defense (DoD) Zero Trust Reference Architecture :
"The foundational tenet of the Zero Trust Model is that no actor, system, network, or
service operating outside or within the security perimeter is trusted. Instead, we must verify
anything and everything attempting to establish access. It is a dramatic paradigm shift in
philosophy of how we secure our infrastructure, networks, and data, from verify once at
the perimeter to continual verification of each user, device, application, and transaction."
The memo identifies five core goals for federal agencies to reach, organized with the
Cybersecurity Information Systems Architecture (CISA) Maturity Model. The CISA Zero
Trust model describes five complementary areas of effort, or pillars:
Identity
Devices
Networks
Applications and workloads
Data
Visibility
Analytics
Automation
Orchestration
Governance
Scope of guidance
Use the article series to build a plan to meet memo requirements. It assumes use of
Microsoft 365 products and a Microsoft Entra tenant.
For agency users, agencies employ centralized identity management systems that
can be integrated with applications and common platforms
Agencies use enterprise-wide, strong multi-factor authentication (MFA)
MFA is enforced at the application layer, not the network layer
For agency staff, contractors, and partners, phishing-resistant MFA is required
For public users, phishing-resistant MFA is an option
Password policies don't require special characters or regular rotation
When agencies authorize user access to resources, they consider at least one
device-level signal, with identity information about the authenticated user
Next steps
Enterprise-wide identity management system
Meet multifactor authentication requirements of memorandum 22-09
Meet authorization requirements of memorandum 22-09
Other areas of Zero Trust addressed in memorandum 22-09
Securing identity with Zero Trust
Configure Microsoft cloud services for
the DoD Zero Trust Strategy
Article • 04/15/2024
The U.S. Department of Defense (DoD) Zero Trust Portfolio Management Office (ZT
PfMO) was established to orchestrate DoD-wide Zero Trust adoption and execution. In
November 2022, the DoD ZT PfMO released the DoD Zero Trust Strategy and
Roadmap .
The strategy and accompanying execution plans outline a path to adopt a new
cybersecurity framework to facilitate well-informed, risk-based decisions. This model
incorporates Zero Trust principles by eliminating traditional perimeters and trust
assumptions, enabling a more efficient architecture that enhances security, user
experience, and mission performance. The Zero Trust Framework aims to minimize DoD
attack surface, reduce risks, enable effective data-sharing and collaboration, proactively
safeguard its technical estate, and disrupt adversarial activities.
Zero Trust Cultural Adoption - A Zero Trust security framework and mindset that
guides the design, development, integration, and deployment of information
technology across the DoD Zero Trust ecosystem.
Department of Defense Information Systems are Secured and Defended - DoD
cybersecurity practices incorporate and operationalize Zero Trust to achieve
enterprise resilience in DoD information systems.
Technology Acceleration - Zero Trust technologies deploy at a pace equal to, or
that exceeds, industry advancements to remain ahead of the changing threat
environment.
Zero Trust Enablement - DoD Zero Trust execution integrates with DoD, and
component-level processes, resulting in seamless and coordinated Zero Trust
execution.
Microsoft has an expanding array of Zero Trust capabilities powered by a unified identity
platform and pre-integrated, fit-for-purpose security tools. They offer repeatable,
comprehensive coverage across the seven pillars of the DoD Zero Trust Strategy for
target and advanced activities.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
The pillars span 45 Zero Trust capabilities. Capabilities are achieved by completing one
or more implementation activities. In the following tables, activities are tagged with
Target or Advanced , based on Zero Trust phases defined by the DoD. A capability might
include target activities, advanced activities, or both. See, Table 1. There are 152
activities in total, 92 target and 60 advanced. DoD Zero Trust Capability Execution
Roadmap sets a timeline for achieving Target Level ZT by 2027 and Advanced Level ZT
by 2032.
Activity details are outlined in the Zero Trust Capabilities and Activities Execution
Roadmap . The activities cover a range of technical and nontechnical tasks. Technical
tasks deploy, configure, and adopt security tools. Nontechnical tasks procure tools,
create policies and standards, and assemble teams to operationalize the Zero Trust
strategy.
Scope of guidance
This document has summary guidance for 45 Zero Trust capabilities and prescriptive
guidance for completing 152 Zero Trust activities with Microsoft cloud services. In each
table, the Microsoft guidance and recommendations column has activity-level
guidance based on activity descriptions and outcomes in the context of the activity
parent capability. Use the activity-level guidance with capability summaries to learn how
Microsoft cloud services align to the DoD Zero Trust Strategy. Guidance is scoped to
features generally available (GA) or in public preview in Microsoft 365 DoD cloud and
Azure for US Government cloud.
) Important
When activities have more than one part, Microsoft guidance assumes you
implemented the previous parts. For example, if an activity has three parts, finish
Pt1, then Pt2, and then Pt3.
This document prioritizes recommendations by product, or feature area, listing the most
essential items first. When implementation actions span features in different Microsoft
services, these actions are ordered in the required configuration sequence. Activity-level
guidance lists all recommendations relevant for each activity. Your organization might
complete the activity by doing a portion of the recommended configuration or
implementing alternative solutions.
The DoD Zero Trust Strategy assigns activities to target or advanced phases. This guide
indicates Target and Adanced in the activity title. Target-level ZT is achieved by
completing all target activities. Advanced-level ZT is achieved by completing all
advanced activities. You don't need to finish all target activities before starting advanced
activities. Configuring one feature might complete target and advanced activities at the
same time. We recommend implementing key protections first, following the Microsoft
Zero Trust Rapid Modernization Plan.
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
DoD Zero Trust Strategy for the user
pillar
Article • 04/15/2024
The DoD Zero Trust Strategy and Roadmap outlines a path for Department of Defense
components and Defense Industrial Base (DIB) partners to adopt a new cybersecurity
framework based on Zero Trust principles. Zero Trust eliminates traditional perimeters
and trust assumptions, enabling a more efficient architecture that enhances security,
user experiences, and mission performance.
This guide has recommendations for the 152 Zero Trust activities in the DoD Zero Trust
Capability Execution Roadmap . The sections correspond with the seven pillars of the
DoD Zero Trust model.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
1 User
This section has Microsoft guidance and recommendations for DoD Zero Trust activities
in the user pillar. To learn more, see Securing identity with Zero Trust.
ノ Expand table
Conditional Access is the real-time Zero Trust policy engine in Microsoft Entra ID.
Conditional Access policies use security signals from user, device, application, session,
risk, and more to apply adaptive dynamic authorization for resources protected by
Microsoft Entra ID.
ノ Expand table
Target 1.2.1 Implement App Based Permissions per Microsoft Entra Connect
Enterprise Establish hybrid identity with Microsoft
The DoD enterprise working with the Organizations Entra Connect to populate Microsoft
establishes a basic set of user attributes for Entra ID tenants with user attribute
authentication and authorization. These are integrated data from current directory systems.
with the "Enterprise Identity Life-Cycle Management - Microsoft Entra Connect
Pt1" activity process for a complete enterprise standard.
The enterprise Identity, Credential, and Access Microsoft Entra applications
Management (ICAM) solution is enabled for self-service Integrate applications with Microsoft
functionality for adding/updating attributes within the Entra ID. Design application
solution. Remaining Privileged Access Management authorization and permissions models
(PAM) activities are fully migrated to PAM solution. using security groups, and app roles.
To delegate app management, assign
Outcomes: owners to manage app configuration,
- Enterprise roles/attributes needed for user also register, and assign app roles.
authorization to application functions and/or data have - Integrate apps with Microsoft Entra
been registered with enterprise ICAM ID
- DoD Enterprise ICAM has self-service attribute/role - Dynamic security groups
registration service that enables application owners to - App roles for applications
add attributes or use existing enterprise attributes
- Privileged activities are fully migrated to PAM Microsoft Entra ID Governance
Configure access packages in
entitlement management so users can
request access to application roles or
groups.
- Govern access to apps
- Delegate access package governance
Conditional Access
Configure Conditional Access policies
for dynamic authorization to
applications and services protected by
Microsoft Entra ID. In Conditional
Access policies, use custom security
attributes and application filters to
scope security attribute authorization
assigned to application objects, such
as sensitivity.
- Conditional Access
- Custom security attributes
- Filter for apps
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Advanced 1.2.3 Rule Based Dynamic Access Pt2 Microsoft Entra ID Protection
DoD Organizations expand the development of rules for Microsoft Entra ID Protection uses
dynamic access decision making accounting for risk. machine learning (ML) algorithms to
Solutions used for dynamic access are integrated with detect users and sign-in risk. Use risk
cross pillar Machine Learning and Artificial Intelligence conditions in Conditional Access
functionality enabling automated rule management. policies for dynamic access, based on
risk level.
Outcomes: - Microsoft Entra ID Protection
- Components and services are fully utilizing rules to - Risk detections
enable dynamic access to applications and services - Risk-based access policies
- Technology utilized for Rule Based Dynamic Access
supports integration with AI/ML tooling Microsoft Defender XDR
Microsoft Defender XDR is an
extended detection and response
(XDR) solution. Deploy Microsoft
Defender for Endpoint and Microsoft
Defender for Cloud Apps and
DoD Activity Description and Outcome Microsoft guidance and
recommendations
configure integrations.
- Integrate Defender for Endpoint with
Defender for Cloud Apps
You can create Conditional Access policies to enforce authentication strength and
dynamically authorize access based on user, device, and environment conditions,
including risk level.
ノ Expand table
Microsoft Intune
Microsoft Entra supports two methods to
use certificates on a mobile device:
derived credentials (on-device certificates),
and hardware security keys. To use DoD
PKI-derived credentials on managed
mobile devices, use Intune to deploy DISA
Purebred.
- Derived credentials
- CBA on iOS devices
- CBA on Android devices
Advanced 1.3.2 Alternative Flexible MFA Pt1 Microsoft Entra authentication methods
DoD Organization’s Identity Provider (IdP) supports Configure Microsoft Entra authentication
alternative methods of multi-factor authentication methods for users to register passkeys
complying with Cyber Security requirements (e.g., (FIDO2 security keys). Use optional
FIPS 140-2, FIPS 197, etc.). Alternative tokens can be settings to configure a key restriction
used for application-based authentication. Multi- policy for keys compliant with FIPS 140-2.
Factor options support Biometric capability and can - Passwordless security key sign-in
be managed using a self-service approach. Where - Authentication methods
possible multi-factor provider(s) is moved to cloud
services instead of being hosted on-premises. Temporary access pass
Configure a temporary access pass (TAP)
Outcomes: for users to register alternate passwordless
- IdP provides user self-service alternative token authenticators without a CAC.
- IdP provides alt token MFA for approved - Configure TAP
applications per policy
Conditional Access
Create a Conditional Access policy to
require authentication strength: DoD CAC
for security info registration. The policy
requires CAC to register other
authenticators like FIDO2 security keys.
- Security info registration
Microsoft Sentinel
Configure a Sentinel analytics rule and
playbook to create an incident for Entra ID
Protection alerts when user risk is high.
- Microsoft Entra ID Protection connector
for Sentinel
- User:revokeSignInSessions
Conditional Access enforces authentication strength, risk level, and compliant Privileged
Access Workstation (PAW) device for privileged access. Administrative actions in
Microsoft Entra ID are recorded in the Microsoft Entra audit logs.
ノ Expand table
implemented administration.
- Applications and devices that support and don't - Privileged access strategy
support PAM tools identified
- Applications that support PAM, now use PAM for Conditional Access
controlling emergency/built-in accounts Use Conditional Access policy to require
compliant devices. To enforce PAW, use
device filters in the Conditional Access
compliant-device grant control.
- Filters for devices
Advanced 1.4.3 Real Time Approvals & JIT/JEA Privileged Identity Mangement
Analytics Pt1 Identify high-risk roles in your environment
Identification of necessary attributes (Users, Groups, such as Microsoft Entra roles like Global
etc.) are automated and integrated into the Administrator, Azure roles like Owner and
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Privileged Access Management (PAM) solution. User Access Administrator, also privileged
Privilege access requests are migrated to the PAM security groups.
solution for automated approvals and denials. - Best practices for roles
- Privileged roles
Outcomes:
- Identified accounts, applications, devices, and Configure PIM role settings to require
data of concern (of greatest risk to DoD mission) approval.
- Using PAM tools, applied JIT/JEA access to high- - Azure resource role settings
risk accounts - Microsoft Entra role settings
- Privileged access requests are automated as - PIM for Groups settings
appropriate
Microsoft Entra ID Governance
Use access packages to manage security
groups for role eligibility. This mechanism
manages eligible admins; it adds self-
service requests, approvals, and access
reviews for role eligibility.
- Entitlement mangement
Microsoft Entra ID Governance features help you manage the access lifecycle for
entitlements like apps, Microsoft Teams, and security group membership. Entitlement
management can also be used to onboard and govern external guests. You can block
access and remove guest user objects when their last access package is removed. To
understand how your organization can migrate ILM functions to Microsoft Entra ID, see
Road to the cloud.
ノ Expand table
methods
Use cloud-based phishing-resistant
MFA methods. Set up Microsoft Entra
certificate-based authentication (CBA)
with DoD Common Access Cards
(CACs) to register other passwordless
credentials.
Identity protection is integrated with Microsoft Defender XDR to show identity risks
detected by other components in the Microsoft Defender product family.
ノ Expand table
Target 1.6.1 Implement User & Entity Behavior Microsoft Entra ID Protection
Analytics Deploy Microsoft Entra ID Protection to get
(UEBA) and User Activity Monitoring (UAM) real-time and offline risk detentions for users
tooling DoD Organizations procure and and sign-in events. Extend identity risk
implement User & Entity Behavior Analytics detections to application identities (Service
(UEBA) and User Activity Monitoring (UAM) Principals) using Microsoft Entra Workload ID,
solutions. Initial integration point with Enterprise Workload Identities Premium edition.
IdP is completed enabling future usage in - Secure workload identities
decision making. - Risk-based policy for workload identities
Microsoft Intune
Configure integrations with Defender for
Endpoint and use Defender for Endpoint
machine risk score in your device compliance
policy.
- Defender for Endpoint rules
Conditional Access
Create Conditional Access policies to require
compliant devices. Before access is granted,
the control requires a device marked as
compliant in Microsoft Intune. Integration
between Defender for Endpoint and Intune
provides an overall picture of device health
and risk level based on the compliance state.
- Compliance policies to set rules for Inune
managed devices
Microsoft Sentinel
Connect data sources to Sentinel and enable
UEBA for audit logs, sign-in logs, Azure
activity, and security events.
- Enable UEBA
- Advanced threats with UEBA
Outcome:
- UEBA/Entity Monitoring is integrated with
JIT/JEA for all services
Use Microsoft Entra built-in roles to assign least privilege permissions by task.
Administrative Units let you scope resource-based permissions for Microsoft Entra ID
users and devices.
Microsoft Entra Permissions Management and custom Azure roles help organizations
analyze cloud permission use, create, and assign least-privilege roles.
ノ Expand table
usage for permissions and revoke permissions when permissions in Microsoft Entra ID. Restrict
possible. This activity includes the revocation and/or user consent to applications and review
decommission of excess permissions and access for current consent in your organization.
application/service-based identities and groups. - Default user permissions
Where possible static privileged users are - Restrict user consent permissions
decommissioned or reduced permissions preparing
for future rule/dynamic based access. Microsoft Entra applications
Access to Microsoft Entra apps is denied
Outcomes: by default. Microsoft Entra ID verifies
- Applications updated to deny by default to entitlements and applies Conditional
functions/data requiring specific roles/attributes for Access policies to authorize resource
access access.
- Reduced default permissions levels are - Integrate apps
implemented - App integration
- Applications/services have reviewed/audited all
privileged users and removed those users who don't Microsoft Entra ID Governance
need that level of access Use the entitlement management identity
governance feature to manage identity
and access lifecycles. Find automated
access request workflows, access
assignments, reviews, and expiration.
- Entitlement management
- Access reviews
Custom roles
Use Microsoft Entra ID built-in roles for
resource management. However, if roles
don’t meet organizational needs, or to
minimize privileges for your administrative
users, create a custom role. Grant custom
roles granular permissions to manage
users, groups, devices, applications and
more.
- Custom roles
Administrative units
An administrative unit is a Microsoft Entra
resource that contains other Microsoft
Entra resources, such as users, groups, or
devices. Use administrative units to
delegate permissions to a subset of
administrators, based on organizational
structure.
- Administrative units
- Restricted management administrative
units
- Create or delete administrative units
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Microsoft Sentinel
Use PIM to assign Azure roles for Sentinel
access and periodically audit queries and
activities.
- Audit queries and activities
ノ Expand table
authentication requirements for applications manage session refresh without user interaction.
and services. Traditionally these are based on
duration and/or duration timeout but other See Microsoft guidance in 1.8.1.
period-based analytics can be used to
mandate re-authentication of user sessions. Conditional Access
Configure the sign-in frequency session control
Outcome: in Conditional Access to re-authenticate user
- Authentication implemented multiple times sessions. Use the feature when sign-ins are risky,
per session based on security attributes or a user device is unmanaged or non-
compliant.
- Configure authentication session management
- Access policies in Defender for Cloud Apps
Conditional Access
Define and use Conditional Access
authentication context to protect sensitive
SharePoint sites, Microsoft Teams, Microsoft
Defender for Cloud Apps protected applications,
PIM role activation, and custom applications.
- Authentication context
- Policy for SharePoint sites and OneDrive
- Session policies in Defender for Cloud Apps
- Require authentication context for PIM roles
- Authentication context guidance
Microsoft Intune
Intune supports private and public-key
cryptography standards (PKCS) certificates.
- PKCS certificates
DoD Activity Description and Outcome Microsoft guidance and recommendations
Microsoft Authenticator
Mobile devices and Authenticator use touch and
face for passwordless authentication. Passkey
support is another phishing-resistant
authentication method in Authenticator.
- Authenticator
- Passwordless sign-in
- Enhanced phishing-resistant authentication
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
DoD Zero Trust Strategy for the device
pillar
Article • 05/08/2024
The DoD Zero Trust Strategy and Roadmap outlines a path for Department of Defense
components and Defense Industrial Base (DIB) partners to adopt a new cybersecurity
framework based on Zero Trust principles. Zero Trust eliminates traditional perimeters
and trust assumptions, enabling a more efficient architecture that enhances security,
user experiences, and mission performance.
This guide has recommendations for the 152 Zero Trust activities in the DoD Zero Trust
Capability Execution Roadmap . The sections correspond with the seven pillars of the
DoD Zero Trust model.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
2 Device
This section has Microsoft guidance and recommendations for DoD Zero Trust activities
in the device pillar. To learn more, see Securing endpoints with Zero Trust.
ノ Expand table
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Microsoft Intune
View device information about managed
devices from the Microsoft Intune admin
center. Retrieve diagnostics from
Windows devices using the Collect
diagnostics remote action.
- Device details
- Windows device diagnostics
Managed identities
Use managed identities for supported
Azure resources and Azure Arc-enabled
VMs.
- Managed identities for Azure resources
- Azure Arc-enabled servers
Conditional Access
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Microsoft Tunnel
Tunnel is a virtual private network (VPN)
gateway solution for Intune-managed
devices and un-enrolled devices with
Intune-managed apps. Tunnel uses
Microsoft Entra ID for authentication and
Conditional Access policies for mobile
device access to on-premises
applications.
- Tunnel for Intune
Microsoft Defender XDR components assess device and identity risk levels by using
machine learning (ML) detections, and by enabling dynamic, risk-based decisions to
allow, block, or control access to data, applications, assets, and services (DAAS).
ノ Expand table
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Advanced 2.3.1 Entity Activity Monitoring Pt1 Microsoft Intune and Microsoft
Using the developed User and Device baselines, DoD Defender for Endpoint
Organizations utilize the implemented User and Entity Manage devices with Intune, deploy
Behavioral Activity (UEBA) solution to integrate Defender for Endpoint, and configure a
baselines. UEBA device attributes and baselines are device compliance policy using
available to be used for device authorization Defender for Endpoint machine risk
detections. score.
Target 2.3.3 Implement Application Control & File Microsoft Defender for Endpoint
Integrity Monitoring (FIM) Tools Defender for Endpoint aggregates
DoD Organizations procure and implement File signals from File Integrity Monitoring
Integrity Monitoring (FIM) and Application Control (FIM), Application Control, Next
solutions. FIM continues development and expansion Generation Antivirus (NGAV), and more
of monitoring in the Data Pillar. Application Control is for machine risk score.
deployed to low-risk environments in a monitor only - Next-generation protection
mode establishing baseline allowances. Application - Antivirus for managed devices
control teams being integration with the Enterprise and - Controlled folder access
Organization PKI environments utilize certificates for
application allowances. NextGen AV covers all possible Microsoft Intune
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Advanced 2.3.5 Fully Integrate Device Security stack Complete activity 2.3.4.
with C2C as appropriate
DoD Organizations continue the deployment of Microsoft Defender for Cloud Apps
Application Control to all environments and in Identify and control risky cloud
prevention mode. File Integrity Monitoring (FIM) and applications with Defender for Cloud
Application Controls analytics are integrated into Apps policies.
Comply to Connect for expanded access decision - Control cloud apps with policies
making data points. Comply to Connect analytics are
evaluated for further device/endpoint security stack
data points such as UEDM and are integrated as
necessary.
Outcomes:
- AppControl and FIM deployment is expanded to all
necessary services/applications
- Remaining data from Device Security tooling is
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Target 2.4.2 Managed and Limited BYOD & IOT Complete activity 2.4.1.
Support
DoD Organizations utilize Unified Endpoint and Microsoft Intune
Device Management (UEDM) and similar solutions Use Intune device management and
to ensure that managed Bring Your Own Device mobile application management to bring
(BYOD) and Internet of Things (IoT) devices are fully your own device (BYOD).
integrated with Enterprise IdP enable user and - Mobile app management for unenrolled
device-based authorization are supported. Device devices
access for all applications requires dynamic access - App protection policies
policies.
Conditional Access
Outcomes: Require compliant device and/or app
- All applications require dynamic permissions protection policy in Conditional Access for
access for devices all users and applications.
- BYOD and IOT device permissions are baselined - Approved client app or app protection
and integrated with Enterprise IDP policy
- App protection policy on Windows
devices
Advanced 2.4.3 Managed and Full BYOD & IOT Complete activity 2.4.2.
Support Pt1
DoD Organizations utilize Unified Endpoint and Microsoft Defender for Cloud Apps
Device Management (UEDM) and similar solutions Configure access policies to require client
to enable access for managed and approved certificates for application access. Block
devices to Mission and Operational Critical access from unauthorized devices.
services/applications using dynamic access policies.
BYOD and Internet of Things (IoT) devices are See Microsoft guidance in 2.3.6.
required to meet standard baseline checks before
authorization.
Outcomes:
- Only BYOD and IOT devices that meet mandated
configuration standards allowed to access resources
- Critical Services require dynamic access for devices
Advanced 2.4.4 Managed and Full BYOD & IOT Azure Virtual Desktop
Support Pt2 Deploy Azure Virtual Desktop (AVD) to
DoD Organizations utilize Unified Endpoint and support remote access from unmanaged
Device Management (UEDM) and similar solutions devices. Join AVD session host VMs to
to enable access for unmanaged devices meeting Microsoft Entra and manage compliance
device checks and standard baselines. All possible with Microsoft Intune. Allow sign-in to AVD
services/applications are integrated to allow access with passwordless or a passwordless
to managed devices. Unmanaged devices are phishing-resistant authenticator from
integrated with services/applications based on risk unmanaged devices.
driven methodical authorization approach. - Microsoft Entra joined VMs in AVD
- Authentication strength
Outcome:
- All possible services require dynamic access for Microsoft Defender for Cloud Apps
devices Use Defender for Cloud Apps session
control to monitor and restrict web
sessions from unmanaged devices.
- Session policies
2.5 Partially and fully automated asset,
vulnerability, and patch management
Microsoft Endpoint Manager supports cloud-based and hybrid (co-management)
solutions for device management. Configuration and compliance policies ensure devices
meet the patch level and security configuration requirements for your organization.
ノ Expand table
Microsoft Entra External ID cross-tenant access settings include trust settings for guest
collaboration. These settings can be customized for each partner tenant. When you trust
compliant devices from another tenant, guests using compliant devices in their home
tenant satisfy Condtional Access policies requiring compliant devices in your tenant. You
don’t need to make exceptions to Conditional Access policies to avoid blocking external
guests.
ノ Expand table
Target 2.6.2 Enterprise Device Management Pt1 Microsoft Intune and Conditional
DoD Organizations migrate the manual device inventory Access
to an automated approach using the Unified Endpoint Manage devices with Microsoft Intune.
and Device Management solution. Approved devices are Configure device compliance policies.
able to be managed regardless of location. Devices part Require compliant device Conditional
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Outcomes:
- Manual inventory is integrated with an automated
management solution for critical services
- Enable ZT Device Management (from any location with
or without remote access)
Target 2.6.3 Enterprise Device Management Pt2 Microsoft Intune and Conditional
DoD Organizations migrate the remaining devices to Access
Enterprise Device Management solution. EDM solution Manage devices with Intune. Configure
is integrated with risk and compliance solutions as device compliance policies. Require
appropriate. compliant device in Conditional Access
policies.
Outcome:
- Manual inventory is integrated with an automated See Microsoft guidance in 2.1.4.
management solution for all services
Risk-based Conditional Access policies can secure, limit, or block access to cloud
services for the risky user, even if they use a compliant device on a trusted network.
To learn more, see enable Microsoft Defender XDR components and what are risks?
ノ Expand table
Target 2.7.1 Implement Endpoint Detection & Microsoft Defender for Endpoint
Response (EDR) Tools and Integrate with C2C Deploy Defender for Endpoint for end
DoD Organizations procure and implement Endpoint user devices.
Detection and Response (EDR) solution(s) within
environments. EDR is protecting, monitoring, and See Microsoft guidance 2.3.1 in this
responding to malicious and anomalous activities section.
enabling ZT Target functionality and is sending data to
the Comply to Connection solution for expanded device Microsoft Intune
and user checks. Configure Intune device compliance
policies. Include Defender for Endpoint
Outcomes: machine risk score for policy
- Endpoint Detection & Response Tooling is compliance.
implemented
- Critical EDR data is being sent to C2C for checks See Microsoft guidance 2.1.4. and in
- NextGen AV tooling covers maximum amount of 2.3.2.
services/applications
Microsoft Defender for Cloud
Enable Microsoft Defender for Server
for subscriptions with virtual machines
(VMs) in Azure. Defender for Server
plans include Defender for Cloud for
servers.
- Defender for Servers
part of the XDR implementation. Basic analytics are sent - Defender for Endpoint with Defender
from the XDR solution stack to the SIEM. for Cloud Apps
- Defender for Identity and Defender
Outcomes: for Cloud Apps
- Integration Points have been identified per Capability - Purview Information Protection and
- Riskiest integration points have been integrated w/ Defender for Cloud Apps
XDR
- Basic alerting is in place with SIEM and/or other Configure Sentinel data connectors for
mechanisms Microsoft Defender XDR. Enable
analytics rules.
- Install Defender XDR
- Connect Defender XDR data to
Sentinel
Outcomes:
- Remaining integration points have been integrated as
appropriate
- Extended alerting and response is enabled with other
Analytics tools at least using SIEM
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
DoD Zero Trust Strategy for the
applications and workloads pillar
Article • 04/12/2024
The DoD Zero Trust Strategy and Roadmap outlines a path for Department of Defense
components and Defense Industrial Base (DIB) partners to adopt a new cybersecurity
framework based on Zero Trust principles. Zero Trust eliminates traditional perimeters
and trust assumptions, enabling a more efficient architecture that enhances security,
user experiences, and mission performance.
This guide has recommendations for the 152 Zero Trust activities in the DoD Zero Trust
Capability Execution Roadmap . The sections correspond with the seven pillars of the
DoD Zero Trust model.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
7 Note
Recommendations in this section align with the draft DoD Enterprise DevSecOps
Reference Design .
ノ Expand table
Azure DevOps
Use this service for secure package
management. Developers share code and
manage packages in one place.
- Azure Artifacts
- Azure GitHub repos
ノ Expand table
Target 3.2.2 Build DevSecOps Software Factory Pt2 GitHub Advanced Security
DoD Organizations will use their approved CI/CD Use GitHub Advanced Security to
pipelines to develop most new applications. Any scan for code dependencies and
exceptions will follow a standardized approval process to vulnerabilities. Configure periodic
be allowed to develop in a legacy fashion. DevSecOps builds to assess code quality.
processes are also used to develop all new applications - Advanced Security
and update existing applications. Continual validation - CodeQL code scanning
functions are integrated into the CI/CD pipelines and - Secure supply chain
DevSecOps processes and integrated with existing
applications. Bicep in Azure
Provision cloud infrastructure using
Outcomes: infrastructure-as-code (IaC) with
- Development of applications is migrated to CI/CD Azure Resource Manager (ARM) and
pipeline Bicep templates.
- Continual validation process/technology is implemented - Bicep
and in use
- Development of applications is migrated to DevSecOps Microsoft Defender for Cloud
process and technology Enable Defender for Cloud workload
protections for subscriptions with
application workloads.
- Protect cloud workloads
Target 3.2.3 Automate Application Security & Code Azure Application Gateway
Remediation Pt1 Put publicly accessible web
A standardized approach to application security including applications and APIs with Azure
code remediation is implemented across the DoD Application Gateway and Web
enterprise. Part one (1) of this activity includes the Application Firewall.
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Advanced 3.2.4 Automate Application Security & Code Complete activities 3.2.2 and 3.2.3.
Remediation Pt2
DoD Organizations modernize approaches to delivering
internally developed and managed services following best
practice approaches such as Microservices. These
approaches will enable more resilient and secure
architectures by allowing for quicker changes to code in
each microservice as security issues are discovered.
Further advancement security remediation activities
continue across the DoD Enterprise with the inclusion of
runtime security functions for containers as appropriate,
automated vulnerable library updates and automated
CI/CD approvals during the release process.
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Outcomes:
- Secure API Gateway is operational and majority of API
calls are passing through gateway
- Services are provided following a Service Oriented
Architecture (SOA)
- Security Remediation activities (e.g., runtime security,
library updates, release approvals) are fully automated
ノ Expand table
on managed endpoints.
- Application Control and App
locker
- Platform code integrity
ノ Expand table
Conditional Access
Use Conditional Access policies
to dynamically authorize,
control, or block application
access.
Advanced 3.4.5 Enrich Attributes for Resource Authorization Microsoft Entra applications
Pt1 Use Microsoft Entra ID to
Initial attributes from sources such as User and Entity Activity authorize modern applications
Monitoring, Micro-segmentation services, DLP, and data rights and APIs. Deploy Microsoft
management (DRM) are integrated into the Resource Entra application proxy and
Authorization technology stack and policy. Any other Azure Arc-enabled servers to
attributes for later integration are identified and planned. extend Microsoft Entra ID to
Attributes are used to create basic risk posture of users, legacy authentication protocols.
nonperson entities (NPEs), and devices allowing for
authorization decisions. See Microsoft guidance in 3.1.1
and in 3.2.3.
Outcomes:
- Most API calls are passing through the Secure API Gateway Conditional Access
- Resource Authorization receives data from Analytics Engine Microsoft Entra is a secure
- Authorization policies incorporate identified attributes in gateway for resource
making authorization decisions authorization. Conditional
- Attributes to be used for initial enrichment are identified Access is the authorization
engine. Configure policies for
detailed authorization using
user, application, user,
environment conditions,
including device- compliance
status.
- Conditional Access
- Conditional Access design
- Require compliant devices
Advanced 3.4.6. Enrich Attributes for Resource Authorization Microsoft Entra ID Protection
Pt2 Use sign-in risk and user signals
Extended identified attributes are integrated with the resource from Microsoft Entra ID
authorization technology and policy. Confidence scoring is Protection in a Conditional
introduced across the attributes to create a more advanced Access policy set. Configure
method of authorization decision making in an automated authentication context including
fashion. risk to establish confidence
levels, based on environmental
Outcomes: details and risk level.
- Authorization policies incorporate confidence levels in - Microsoft Entra ID risks
making authorization decisions - Policy template: sign-in risk
- Confidence levels for attributes are defined MFA
- Authentication context
example
control (ABAC).
- Custom security attributes
API design
Follow recommended practices
to design APIs for microservices.
Protect and authorize APIs with
Microsoft Entra ID.
- Microservice APIs
- Protect APIs
ノ Expand table
monitoring of controls and offer the capability to Enterprise DevSecOps Reference Design
identify deviations. Where appropriate monitoring - DoD CIO Library
and testing are integrated with DevSecOps
processes. Microsoft Defender for Cloud
Protect Azure and non-Azure workloads
Outcomes: with Defender for Cloud. Use regulatory
- Controls derivation is standardized and ready for compliance and Azure Policy initiatives to
automation assess infrastructure continuously with
- Controls testing is integrated with DevSecOps configuration standards. Prevent
processes and technology configuration drift.
- Assign security standards
- Multicloud environments
Microsoft Sentinel
Automate Sentinel integration and
deployment operations with GitHub and
Azure DevOps.
- Sentinel and Azure DevOps integration
- Deploy custom content from a repository
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
DoD Zero Trust Strategy for the data
pillar
Article • 04/12/2024
The DoD Zero Trust Strategy and Roadmap outlines a path for Department of Defense
components and Defense Industrial Base (DIB) partners to adopt a new cybersecurity
framework based on Zero Trust principles. Zero Trust eliminates traditional perimeters
and trust assumptions, enabling a more efficient architecture that enhances security,
user experiences, and mission performance.
This guide has recommendations for the 152 Zero Trust activities in the DoD Zero Trust
Capability Execution Roadmap . The sections correspond with the seven pillars of the
DoD Zero Trust model.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
4 Data
This section has Microsoft guidance and recommendations for DoD Zero Trust activities
in the data pillar. To learn more, see Secure data with Zero Trust for more information.
ノ Expand table
DoD Activity Description and Outcome Microsoft guidance and recommendations
ノ Expand table
Outcomes:
- Enterprise data classification and tagging
standards are developed
- Organizations align to enterprise standards
and begin implementation
Outcome:
- Formal standards are in place by the
enterprise for the appropriate data standards
Target 4.3.1 Implement Data Tagging & Classification Tools Microsoft Purview Information
DoD organizations utilize the enterprise standard and Protection
requirements to implement data tagging and classification Use Microsoft Purview Information
solution(s). Organizations ensure that future ML and AI Protection to classify data based
integrations are supported by solutions through DoD on sensitive information types,
enterprise requirements. and classifiers trained by machine
learning (ML).
Outcomes: - Sensitive data and Purview
- A requirement of Data classification and tagging tools - Label policies
must include integration and/or support of Machine
Learning (ML)
- Data classification and tagging tools are implemented at
org and enterprise levels
Advanced 4.3.4 Automated Data Tagging & Support Pt1 Microsoft Purview Information
DoD organizations use data loss prevention, rights Protection
management, and/or protection solutions to conduct Configure client-side labeling for
DoD Activity Description and Outcome Microsoft guidance and
recommendations
scanning of data repositories. Standardized tags are applied files and emails created in
to supported data repositories and data types. Unsupported Microsoft Office applications.
data repositories and types are identified. - Autolabeling for Office apps
Microsoft Purview
Register data sources, scan, ingest,
and classify data in the Microsoft
Purview governance portal.
- Data sources in Purview
- Scans and ingestion
- Data classification
Advanced 4.3.5 Automated Data Tagging & Support Pt2 Microsoft Purview Information
Remaining supported data repositories have basic and Protection
extended data tags which are applied using machine Trainable classifiers in Purview
learning and artificial intelligence. Extended data tags are help you recognize content by
applied to existing repositories. Unsupported data using machine learning (ML).
repositories and data types are evaluated for Create and train classifiers with
decommissioning using a risk based methodical approach. human picked and positively
Approved exceptions utilize manual data tagging matched samples.
approaches with data owners and/or custodians to manage - Trainable classifiers
tagging.
Outcomes:
- Full automation of data tagging is completed
- Results of data tagging are fed into ML algorithms.
ノ Expand table
Target 4.4.1 DLP Enforcement Point Logging and Microsoft Purview Data Loss Prevention
Analysis Create DLP policies in Purview compliance.
DoD Organizations identify data loss prevention Enforce DLP for Microsoft 365 applications,
(DLP) enforcement points such as specific services Windows, and macOS endpoints, also non-
and user endpoints. Using the established DoD Microsoft cloud apps.
Enterprise cybersecurity incident response - Plan for DLP
standard, DoD organizations ensure the - Design DLP policy
appropriate detail of data is captured. Additionally, - Audit log activities
protection, detection, and response use cases are - Office 365 Management Activity API
developed to better outline solution coverage. schema
- Standardized Logging schema is enforced at the with Defender for Cloud Apps to apply
enterprise and org levels sensitivity labels automatically, enforce
encryption policies, and prevent data loss.
Target 4.4.2 DRM Enforcement Point Logging Microsoft Purview Information Protection
and Analysis Purview data rights management (DRM)
DoD Organizations identify data rights enforcement points include Microsoft 365
management (DRM) enforcement points such as and third-party applications and services
specific services and user endpoints. Using the integrated with the Microsoft Information
established DoD Enterprise cybersecurity incident Protection (MIP) SDK, online apps, and rich
response standard, DoD organizations ensure the clients.
appropriate detail of data is captured. Additionally, - Protect sensitive data
protection, detection, and response use cases are - Restrict content access with sensitivity
developed to better outline solution coverage. labels
- MIP SDK
Outcomes: - Encryption in Microsoft 365
- Enforcement points are identified
- Standardized Logging schema is enforced at the Microsoft Defender for Cloud Apps
enterprise and org levels Integrate Purview Information Protection
with Defender for Cloud Apps to apply
sensitivity labels automatically, enforce
encryption policies, and prevent data loss.
Target 4.4.3 File Activity Monitoring Pt1 Microsoft Purview Data Loss Prevention
DoD Organizations utilize File Monitoring tools to DLP alerts appear in Microsoft Defender
monitor the most critical data classification levels in XDR. File activity about creation, labeling,
applications, services, and repositories. Analytics printing, and sharing is in the Unified Audit
from monitoring are fed into the SIEM with basic Log, and in activity explorer in the Microsoft
data attributes to accomplish ZT Target Purview compliance portal.
functionality. - DLP alerts
- Activity explorer
Outcomes: - Export, configure, and view audit log
- Data and files of critical classification are actively records
being monitored
- Basic Integration is in place with monitoring Microsoft Defender XDR and Microsoft
system such as the SIEM Sentinel
Integrate Microsoft Defender XDR with
Sentinel to view and investigate data loss
prevention (DLP) alerts in an enterprise
security incident and event management
(SIEM) system.
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Conditional Access
Detections for unusual file access, found by
Microsoft Defender XDR, raise the user risk
level. User risk is a condition in Conditional
Access, the policy decision point (PDP) for
Microsoft Entra ID. Define a Conditional
Access authentication context with the user
risk condition no risk. Protect labeled
SharePoint sites; require Conditional Access
authentication context.
- Risk detections
- Unusual file access
- Authentication context example
ノ Expand table
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Target 4.5.1 Implement DRM and Protection Tools Microsoft 365 encryption
Pt1 Microsoft 365 has baseline, volume-level
DoD Organizations procure and implement DRM encryption with the Windows security
and Protection solution(s) as needed following the feature BitLocker and Distributed Key
DoD Enterprise standard and requirements. Newly Manager (DKM).
implemented DRM and protection solution(s) are - Understand encryption
implemented with high risk data repositories using
ZTA target level protections. Microsoft Purview
Use labeling policies to automatically apply
Outcome: more encryption for high-risk data in
- DRM and protection tools are enabled for high- Microsoft 365, based on sensitivity label.
risk data repositories with basic protections - Restrict content access with sensitivity
labels
- Email encryption in Microsoft 365
Azure Policy
Use Azure Policy to require a secure
Transport Layer Security (TLS) version,
implement Transparent Data Encryption
(TDE), and require it with customer-
managed keys to encrypt data at rest.
- Azure Policy definitions for Azure SQL
database and SQL Managed Instance
Target 4.5.2 Implement DRM and Protection Tools Azure Key Vault
Pt2 Use Azure Key Vault Managed Hardware
DRM and protection coverage is expanded to cover Security Module (Azure Key Vault HSM) to
all in scope data repositories. Encryption keys are safeguard application cryptographic keys
automatically managed to meet best practices (e.g., using FIPS 140-2 Level 3 Validated
FIPS). Extended data protection attributes are Hardware Security Modules.
implemented based on the environment - Azure Key Vault Managed HSM
classification.
Microsoft Purview Customer Key
Outcome: Microsoft 365 offers a layer of encryption
- DRM and protection tools are enabled for all for your content with Customer Key.
possible repositories - Service encryption
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Target 4.5.3 DRM Enforcement via Data Tags and Microsoft Purview Information Protection
Analytics Pt1 Use labeling policies to apply more
Data rights management (DRM) and protection encryption automatically for high-risk data,
solutions are integrated with basic data tags in Microsoft 365, based on sensitivity label.
defined by the DoD Enterprise standard. Initial data - Restrict content access with sensitivity
repositories are monitored and have protect and labels
response actions enabled. Data at rest is encrypted
in repositories. Microsoft 365 encryption
Microsoft 365 has baseline, volume-level
Outcomes: encryption with BitLocker and Distributed
- Data Tags are integrated with DRM and monitored Key Manager (DKM).
repositories are expanded
- Based on data tags, data is encrypted at rest See Microsoft guidance in 4.5.1.
Advanced 4.5.5 DRM Enforcement via Data Tags Microsoft Purview Information Protection
and Analytics Pt3 Use Microsoft Purview Information
DRM and Protection solutions integrate with AI and Protection to classify data, based on
ML tooling for encryption, rights management and sensitive information types, and by
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Conditional Access
Define authentication context with Identity
Protection risk signals. Require
authentication context for labeled
SharePoint sites and custom applications.
- Authentication context
ノ Expand table
Target 4.6.1 Implement Enforcement Points Microsoft Purview Data Loss Prevention
Data loss prevention (DLP) solution is deployed Microsoft 365 applications and Windows
to the in-scope enforcement points. DLP endpoints enforce DLP policies. Configure
solution is set to "monitor-only" and/or policies in DLP simulation mode.
"learning" mode limiting impact. DLP solution - Plan for DLP
results are analyzed, and policy is fine tuned to - DLP simulation mode
manage risk to an acceptable level.
Create policies in DLP. Set policy state to test
Outcome: or test with policy tips. Set policy actions to
- Identified enforcement points have DLP tool Audit only or Block with override.
- DLP policy deployment
DoD Activity Description and Outcome Microsoft guidance and recommendations
Conditional Access
Control access to Office 365 and other
Microsoft Entra-integrated applications. Use
report-only mode to monitor the outcome
before you enable policies with block access
grant control.
- Build policy
- Report only mode
- Session policies: monitor all
Target 4.6.2 DLP Enforcement via Data Tags Microsoft Purview Data Loss Prevention
and Analytics Pt1 est DLP policy, then change the state to On to
The data loss prevention (DLP) solution is enable Enforcement mode. If you set policy
updated from monitor only mode to prevention actions to Block, user activity that triggers DLP
mode. Basic data tags are utilized for the DLP isn’t allowed.
solution and logging schema is integrated. - Actions in DLP policies
Cloud Apps.
- DLP content inspection
Conditional Access
After testing, enable Conditional Access
policies that apply session controls, or use
block access grant control. To avoid tenant
lockout, exclude emergency-access accounts.
- Emergency access accounts
Advanced 4.6.3 DLP Enforcement via Data Tags Microsoft Purview Information Protection
and Analytics Pt2 Define custom sensitive information types.
Data loss prevention (DLP) solution is updated Create labels and data loss prevention policies.
to include extended data tags based on parallel
Automation activities. See Microsoft guidance in 4.1.1.
Outcome:
- Enforcement points have extended data tag
attributes applied for additional prevention
Advanced 4.6.4 DLP Enforcement via Data Tags Microsoft Purview Information Protection
and Analytics Pt3 Use Microsoft Purview Information Protection
Data loss prevention (DLP) solution is to classify data, based on sensitive information
integrated with automated data tagging types and by classifiers trained by machine
techniques to include any missing enforcement learning (ML).
points and tags.
See Microsoft guidance in 4.3.5.
Outcome:
- Automated tagging attributes are integrated
with DLP and resulting metrics are used for ML
Microsoft Entra roles and security groups provide organizations role-based access
control. Dynamic security groups use attributes defined on user, group, and device
objects to define membership, based upon rich expressions and rule sets.
Microsoft Entra ID attribute-based access control utilizes custom security attributes,
which are business-specific attributes you can define and assign to Microsoft Entra
objects. Custom security attributes store sensitive information. Access to view, or
modify, custom security attributes is restricted to Attribute Administrator roles.
ノ Expand table
DoD Organizations implement the DAAS policies, custom security attributes, dynamic
policy in an automated fashion. security groups, and other Microsoft Entra ID
features using the Microsoft Graph API.
Outcome: - Identity and access APIs
- Attribute based fine-grained DAAS Policy
implemented in an automated fashion
Advanced 4.7.3 Integrate DAAS Access w/ Microsoft Defender for Cloud Apps
SDS Policy Pt3 Integrate Microsoft Purview and Defender for
Newly implemented SDS technology and/or Cloud Apps. Create File Policies to enforce
functionalities are integrated with the DAAS automated processes using cloud provider APIs.
policy in a risk-based fashion. A phased - Integrate Information Protection
approach should be taken during - File policies
implementation to measure results and
adjust accordingly.
Outcomes:
- SDS is integrated with DAAS policy
functionality
- All data in all applications are protected
with attribute based fine-grained DAAS
policy.
Advanced 4.7.5 Integrate Solution(s) and Complete activities 4.7.1 and 4.7.4.
Policy with Enterprise IDP Pt2
Newly implemented SDS technology and/or
functionalities are integrated with the
Enterprise Identity Provider (IdP) following
the integration plan. Identity attributes
required to meet ZT Target functionalities
DoD Activity Description and Outcome Microsoft guidance and recommendations
Outcome:
- Complete integration with Enterprise IDP
and SDS tooling to support all attribute
based fine-grained DAAS access
Advanced 4.7.7 Implement SDS Tool and/or Microsoft 365 and Microsoft Purview
integrate with DRM Tool Pt2 Microsoft Purview protects Microsoft 365 content
DoD Organizations configure the SDS with data loss prevention (DLP) and data rights
functionality and/or solution to be management (DRM) without more infrastructure.
integrated with the underlying DLP and - Protect sensitive data
DRM/Protection infrastructure as
appropriate. Lower-level integrations
enable more effective protection and
response.
Outcome:
- Integrate SDS infrastructure with existing
DLP and DRM infrastructure
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
DoD Zero Trust Strategy for the network
pillar
Article • 04/12/2024
The DoD Zero Trust Strategy and Roadmap outlines a path for Department of Defense
components and Defense Industrial Base (DIB) partners to adopt a new cybersecurity
framework based on Zero Trust principles. Zero Trust eliminates traditional perimeters
and trust assumptions, enabling a more efficient architecture that enhances security,
user experiences, and mission performance.
This guide has recommendations for the 152 Zero Trust activities in the DoD Zero Trust
Capability Execution Roadmap . The sections correspond with the seven pillars of the
DoD Zero Trust model.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
5 Network
This section has Microsoft guidance and recommendations for DoD Zero Trust activities
in the network pillar. To learn more, see Secure networks with Zero Trust for more
information.
When you deploy a multiple hub-and-spoke network topology in Azure, Azure Firewall
handles routing traffic between virtual networks. Also, Azure Firewall Premium includes
security features like Trasport-Layer Security (TLS) inspection, network intrusion,
detection, and prevention system (IDPS), URL filtering, and content filtering.
Azure network tools like Azure Network Watcher and Azure Monitor Network Insights
help you map and visualize network traffic flow. Microsoft Sentinel integration enables
visibility and control over organizational network traffic, with workbooks, automation,
and detection capabilities.
ノ Expand table
Azure Policy
Use Azure Policy to enforce networking
standards, such as traffic forced tunneling to
Azure Firewall, or other networking appliances.
Prohibit public IPs or enforce secure use of
encryption protocols.
- Definitions for Azure networking services
Azure Monitor
Use Azure Network Watcher and Azure
Monitor Network Insights for a comprehensive
and visual representation of your network.
- Network Watcher
- Network insights
Azure Firewall
Azure Firewall Manager is a security
management service for centralized security
DoD Activity Description and Outcome Microsoft guidance and recommendations
ノ Expand table
automation. requests.
- Azure Resource Manager
Outcomes: - Azure REST API references
- SDN APIs are standardized and implemented
- APIs are functional for AuthN Decision Point, App Azure roles
Delivery Control Proxy, and Segmentation Gateways Assign built-in Azure roles for networking
resource management. Follow least-
privilege principles and assign roles just-in-
time (JIT) via PIM.
- Azure built-in roles
Conditional Access
Use Conditional Access insights and
reporting workbook to understand the
effects of organizational Conditional Access
policies.
- Insights and reporting
To learn more, see secure and govern workloads with network-level segmentation.
ノ Expand table
Microsoft Sentinel
Use connectors to consume logs from Microsoft
Entra ID, networking resources to send to
Sentinel for audit, threat hunting, detection, and
response. Enable User Entity Behavior Analytics
(UEBA) in Sentinel.
To learn more, see secure and govern workloads with network-level segmentation.
ノ Expand table
Azure Bastion
Use Bastion to connect securely to Azure
VMs with private IP addresses from the
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
DoD Zero Trust Strategy for the
automation and orchestration pillar
Article • 04/12/2024
The DoD Zero Trust Strategy and Roadmap outlines a path for Department of Defense
components and Defense Industrial Base (DIB) partners to adopt a new cybersecurity
framework based on Zero Trust principles. Zero Trust eliminates traditional perimeters
and trust assumptions, enabling a more efficient architecture that enhances security,
user experiences, and mission performance.
This guide has recommendations for the 152 Zero Trust activities in the DoD Zero Trust
Capability Execution Roadmap . The sections correspond with the seven pillars of the
DoD Zero Trust model.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
ノ Expand table
Target 6.1.1 Policy Inventory & Development Microsoft Purview Compliance Manager
The DoD enterprise works with the Organizations to Use Microsoft Purview Compliance
catalog and inventory existing Cyber Security Manager to assess and manage
policies and standards. Policies are updated and compliance in a multicloud environment.
created in cross pillar activities as needed to meet - Compliance Manager
critical ZT Target functionality. - Azure, Dynamics 365, Microsoft Purview
- Multicloud support
Outcomes:
- Policies have been collected in reference to Microsoft Defender for Cloud
applicable compliance and risk (e.g. RMF, NIST) Use Defender for Cloud regulatory
- Policies have been reviewed for missing Pillars and compliance features to view and improve
Capabilities per the ZTRA compliance with Azure Policy initiatives in
- Missing areas of policies are updated to meet the a multicloud environment.
capabilities per ZTRA - Improve regulatory compliance
- FedRAMP High Regulatory Compliance
- NIST SP 800-53 Rev. 5 Regulatory
Compliance
- CMMC Regulatory Compliance
Microsoft Sentinel
The Sentinel content hub has solutions to
visualize and measure progress with
domain-specific security requirements.
- Sentinel content hub catalog
- DoD ZT Sentinel workbook
- NIST SP 800-53 solution
Outcomes:
DoD Activity Description and Outcome Microsoft guidance and
recommendations
ノ Expand table
Learn about the Microsoft security stack and ML, Preparing for Security Copilot in US
Government Clouds .
ノ Expand table
ノ Expand table
Outcome:
DoD Activity Description and Outcome Microsoft guidance and recommendations
ノ Expand table
Outcome:
- Automatable response activities are identified
- Response activities are enumerated
playbooks
ノ Expand table
Target 6.6.2 Standardized API Calls and Schemas Pt1 Complete activity 6.6.1.
The DoD enterprise works with organizations to establish a
programmatic interface (e.g., API) standard and requirements as Azure API Management
needed to enable target ZTA functionalities. DoD Organizations Use Azure API Management as
update programmatic interfaces to the new standard and an API gateway to
mandate newly acquired/developed tools to meet the new communicate with APIs and
standard. Tools unable to meet the standard are allowed by create a consistent access
exception using a risk-based methodical approach. schema for various APIs.
- Azure API Management
Outcomes:
- Initial calls and schemas are implemented Azure Automation tools
- Noncompliant tools are replaced Orchestrate Zero Trust actions
using Azure Automation tools.
- Integration and automation
in Azure
Target 6.6.3 Standardized API Calls and Schemas Pt2 Microsoft Sentinel
DoD organizations complete the migration to the new Use Sentinel as an
programmatic interface standard. Tools marked for orchestration engine to trigger
decommission in the previous activity are retired and functions and execute actions in
are migrated to modernized tools. Approved schemas are automation tools cited in this
adopted based on the DoD Enterprise standard/requirements. document.
- Automate threat response
Outcome: with playbooks
- All calls and schemas are implemented
Learn how to increase SOC maturity, see Sentinel incident investigation and case
management.
ノ Expand table
DoD Activity Description and Outcome Microsoft guidance and recommendations
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
DoD Zero Trust Strategy for the visibility
and analytics pillar
Article • 04/12/2024
The DoD Zero Trust Strategy and Roadmap outlines a path for Department of Defense
components and Defense Industrial Base (DIB) partners to adopt a new cybersecurity
framework based on Zero Trust principles. Zero Trust eliminates traditional perimeters
and trust assumptions, enabling a more efficient architecture that enhances security,
user experiences, and mission performance.
This guide has recommendations for the 152 Zero Trust activities in the DoD Zero Trust
Capability Execution Roadmap . The sections correspond with the seven pillars of the
DoD Zero Trust model.
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Networking infrastructure
Ensure networking infrastructure meets
bandwidth requirements for Microsoft
365 and cloud-based security monitoring
for on-premises servers.
- Microsoft 365 network connectivity
- Network planning and performance
tuning
- Azure ExpressRoute
- Connected machine agent network
requirements
Microsoft Sentinel
Develop custom analytics queries and
visualize collected data using workbooks.
- Custom analytics rules to detect threats
- Visualize collected data
ノ Expand table
and anomaly rules are developed in the SIEM to See Microsoft guidance 6.7.1 and 6.7.2 in
detect advanced threats. Automation and orchestration.
ノ Expand table
Target 7.3.1 Implement Analytics Tools Microsoft Defender XDR and Microsoft
DoD Organizations procure and implement Sentinel
basic Cyber-focused analytics tools. Analytics Configure integration of Microsoft Defender
development is prioritized based on risk and XDR and Sentinel.
complexity looking for easy impactful analytics - Microsoft Defender XDR
first. Continued analytics development focuses - Sentinel and Defender XDR for Zero Trust
on Pillar requirements to better meet reporting
needs.
DoD Activity Description and Outcome Microsoft guidance and recommendations
Outcomes:
- Develop requirements for analytic
environment
- Procure and implement analytic tools
Microsoft Sentinel
Use workbooks to visualize and
monitor data. Create custom analytics
rules and enable anomaly detection to
identify and alert for changing threat
conditions.
- Visualize and monitor data
- Custom analytics to detect threats
- Customize anomalies to detect
threats
your-own-Machine-Learning (BYO-ML)
platform.
- BYO-ML into Sentinel
- Jupyter notebooks and MSTICPy
ノ Expand table
Target 7.5.1 Cyber Threat Intelligence Program Pt1 Microsoft Defender Threat
The DoD Enterprise works with the Organizations to develop Intelligence
and Cyber Threat Intelligence (CTI) program policy, standard Connect Defender Threat
and process. Organizations utilize this documentation to Intelligence and other threat
develop organizational CTI teams with key mission/task intelligence feeds to Sentinel.
stakeholders. CTI Teams integrate common feeds of data with - Defender Threat Intelligence
the Security Information and Event Management (SIEM) for - Enable data connector for
improved alerting and response. Integrations with Device and Defender Threat Intelligence
Network enforcement points (e.g., Firewalls, Endpoint Security - Connect threat intelligence
Suites, etc.) are created to conduct basic monitoring of CTI platforms to Sentinel
driven data.
Azure networking
Outcomes: Integrate network resources
- Cyber Threat Intelligence team is in place with critical with Microsoft Sentinel.
stakeholders - Sentinel with Azure Web App
- Public and Baseline CTI feeds are being utilized by SIEM for Firewall
alerting - Azure Firewall with Sentinel
- Basic integration points exist with Device and Network
enforcement points (e.g., NGAV, NGFW, NG-IPS)
Target 7.5.2 Cyber Threat Intelligence Program Pt2 Microsoft Sentinel data
DoD Organizations expand their Cyber Threat Intelligence (CTI) connectors
teams to include new stakeholders as appropriate. Manage networking resources
Authenticated, private, and controlled CTI data feeds are in Azure with REST API.
integrated into Security Information and Event Management Establish basic integration with
(SIEM) and enforcement points from the Device, User, Network network enforcement points
DoD Activity Description and Outcome Microsoft guidance and
recommendations
Use device risk to mark a device as noncompliant. Identity risk level enables
organizations to require phishing-resistant authentication methods, compliant devices,
increased sign-in frequency, and more. Use risk conditions and Conditional Access
controls to enforce automated, dynamic access policies.
ノ Expand table
DoD Activity Description and Outcome Microsoft guidance and recommendations
Microsoft Sentinel
Use Azure Firewall to visualize firewall activities,
detect threats with AI investigation capabilities,
correlate activities, and automate response actions.
- Azure Firewall with Sentinel
Next steps
Configure Microsoft cloud services for the DoD Zero Trust Strategy:
Introduction
User
Device
Applications and workloads
Data
Network
Automation and orchestration
Visibility and analytics
Feedback
Was this page helpful? Yes No
The immutable laws of security
Article • 04/12/2024
The original immutable laws of security identified key technical truths that busted
prevalent security myths of those times. In that spirit, we updated these laws focused on
busting myths in today’s world of ubiquitous cybersecurity risk.
Since the original immutable laws, information security grew from a technical discipline
into a cybersecurity risk management discipline that includes cloud, IoT and OT devices.
Now security is part of the fabric of our daily lives, business risk discussions, elections,
and more.
Each set of laws deals with different aspects of cybersecurity – designing sound
technical solutions vs. managing a risk profile of complex organizations in an ever-
changing threat environment. The difference in the nature of these laws also illustrates
the difficult nature of navigating cybersecurity in general; technical elements tend
toward the absolute while risk is measured in likelihood and certainty
Because it's difficult to make predictions (especially about the future), we suspect these
laws will evolve with our understanding of cybersecurity risk.
Reference
Immutable Laws of Security v2
Law #1: If a bad actor can persuade you to run their program on your computer,
it's not solely your computer anymore.
Law #2: If a bad actor can alter the operating system on your computer, it's not
your computer anymore.
Law #3: If a bad actor has unrestricted physical access to your computer, it's not
your computer anymore.
Law #4: If you allow a bad actor to run active content in your website, it's not your
website anymore.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no
scanner at all.
Law #9: Absolute anonymity isn't practically achievable, online or offline.
Law #10: Technology isn't a panacea.
Feedback
Was this page helpful? Yes No