Sentinel POC- Architecture and Recommendations For MSSPs (Part 2)

 




To read part 1, please click here
To read part 3, please click here
To read part 4, please click here
To read part 5, please click here







B2B or GDAP 

In order to access tenant level services, tenant level access is required. However, while testing Sentinel, this becomes more important because there are links provided to Microsoft Defender 365 and to make those links to work properly, the user must have access to the services.

GDAP and B2B offers the ability to access tenant level services. Everyone is quite familiar with B2B, which is available for all tenants to invite guests into their tenant to collaborate. But, some partners may have either compliance or cybersecurity insurance requirements preventing them from having an identity in their customers' tenants. Granular Delegated Admin Privileges (GDAP) is exclusively available to Cloud Solution Providers (CSPs) and it is configured by Partner Center. This one can help in accessing customer resources securely and does not require an identity in the customer's tenant.

Partners can choose either GDAP or B2B to access the tenants acting as customer tenant during the POC. For the purpose of Sentinel POC, the access and the behavior of using GDAP vs B2B is equivalent. However, if it is required to follow the same procedures during POC expected to be followed during go-live, then, it is recommended to configure GDAP. But, for simply testing the Sentinel's features for a period of time, then B2B can be used. 

More on CSPs

Cloud Solution Providers (CSPs) partners can create subscriptions for customers which is great for the customers not having security subscription and migrating from legacy SIEM solutions. Although this may not be used in POC, but can be tested according to the requirements of POC. That subscription will then be billed through the partner, but will remain associated with the customer's tenant. 

Where is data?

The customer's security subscription, where Sentinel is onboarded, should always be associated with the customer's tenant. Sentinel artifacts like, analytics rules, workbooks, automation rules, playbooks, etc., can easily exist either on MSSP workspace or the customer workspace. It should also be noted that features such as UEBA, and connectors like Defender 365, will only work with supported configuration depending on the data being ingested into the customer's workspace. The other types of data like Threat Intelligence (TI) data, can also be ingested into MSSP tenant.










To read part 1, please click here
To read part 3, please click here
To read part 4, please click here
To read part 5, please click here






























Comments

Popular posts from this blog

Deployment (Part 3)

Project Resourcing (Part 2)

Design Planning (Part 3)