Security in Microsoft 365 (part 2 of 3)
Account Breach
Mitigating an Account Breach
Tip- If you implement either of the solutions after a breach, then, you should also monitor the account for a period to make sure that it hasn't been re-breached.
Elevation of Privilege
This scenario means that an attacker has already compromised your one or more accounts and is now working to increase his or her power. The target is generally Global Administrator privileges in Microsoft 365, but specific privileges are also desirable if the targeted data is in that product or service. The hacker can also simply create a new account and promote to a global administrator to 'hide in plain sight', i.e. he or she will now have an account that no one else is using and which likely won't be noticed unless the other administrators are regularly reviewing the global administrator's account population.
Preventing an Elevation of Privilege Attack
However, if a breach of this nature still occurs, then you should carefully determine everything that the attacker may have done to your data or further entrench themselves in your tenancy. Generally, once you have successfully regained control of the breached accounts, you can easily reverse the changes made, and then determine what (if any) communication steps must be taken if data was exfiltrated or deleted. It is also recommended to enable MFA on the affected accounts.
Data Exfiltration
Preventing Data Exfiltration
- Access control lists- You should establish standards for determining who should have access to specific kinds of data, and then create processes to monitor as well as maintain those access controls.
- External sharing policies- Data leakage to an external endpoint must be prevented by configuring your tenant to restrict certain types of sharing but as these policies are restrictive in nature, then, you might require to strike a balance between risk and productivity.
- Least privilege- You should always take your time to only grant minimum privilege to the smallest group of users that you can instead of granting permissions to documents and document libraries that exceeds the required access.
- Data classification schemes- You can also set up and use data classification metadata especially with the data shared on SharePoint sites and OneDrive. This one requires you to determine a set of risk tiers and then sites as well as documents to tag data in your systems with a proper classification allowing you to monitor very sensitive data, as well as leverage specific technologies to further protect high business impact data.
- Data Loss Prevention (DLP)- The above data classification scheme is the most effective when used in combination with the DLP feature of Microsoft 365.It allows you to configure rules about how to handle the data moving in and out of your tenant while also preventing your sensitive document content from being emailed to any external parties as well as your users from social security numbers via email.
Microsoft 365 administrators can also enable auditing, alerts, and Advanced Security Management to detect any suspicious behaviors or activities in the tenant.
The Best Casino in Kansas City | JTG Hub
ReplyDeleteWith over 100 of the hottest 전라남도 출장안마 casino games and the 영주 출장안마 hottest slots and the nicest 울산광역 출장샵 slots in town for the poker, dining, entertainment 밀양 출장마사지 and more, 의왕 출장안마
It is really a helpful blog to find some different source to add my knowledge.
ReplyDeleteMS-201T02: Managing Messaging Security, Hygiene and Compliance