In this multi-part blog, we will help walk through the best ways to take on the challenges around successfully implementing your M365 licensing while increasing your ability to secure the environment. Challenges include how to plan for the integration of the M365 product suite with existing processes to maximize the investment in the licensing that was purchased and being able to manage the amount of change that the M365 adoption can bring in a consumable way.
While Part 1 was focused on tackling the foundational components of tenant configuration, this post will focus on Identity and will get into the tactical components of the Microsoft capabilities that will be leveraged to secure, add visibility to, and move towards a zero-trust strategy for Identity. Identity and the next blog’s topic of data protection are the fundamental keys in not only securing your Microsoft cloud environments, but your entire corporate environment including mobile devices, unmanaged devices, and external connections.
Identity has always been one of the single most important components of security, but one that has often taken a backseat to traditional components like networking or infrastructure to help provide a barrier to gain access to corporate information. With the data moving to cloud-based solutions like Office 365, the traditional infrastructure and networking protection is not as effective because access to the information only requires a connection to the internet. This is made even more precarious due to many SaaS applications, like Office 365, being designed to work best by being directly accessed from the internet and not being routed through network tunnels or proxies.
To help combat this, identity is on the front lines of security for cloud applications and platforms. Without a strong identity strategy for cloud, any SaaS application is vulnerable to a bad actor. The good news is if you have Microsoft 365 E5 licensing, many of the capabilities required to start securing identities are at your fingertips. These include:
If you have Microsoft 365 E3, then a subset of the capabilities above will be provided, but you will still have enough to get started in better securing identities for Office 365 and other cloud platforms. In the following sections, we will go into the details around how to leverage the capabilities above. The general order that they should be tackled will also be outlined based on the order that they are presented below.
The password has long been the weakest point in the armor we form to protect our companies. The recommendations around passwords have also changed significantly in the last 10 years from relying on longer complex passwords that should change at least every 90 days, to having shorter complex passwords that may never expire. The latter is only advisable if you have implemented additional “password less” technologies. By pairing the new solutions that rely on things like biometrics, facial recognition, or hardware tokens, the password becomes more of a last resort for logging in.
Even if you are proceeding down the path of password less authentication, Spyglass recommends that passwords be configured in a way that meets existing corporate standards while maintaining a good level of security practice including:
This should be combined with the following:
MFA is now a mainstream control that most users will be familiar with based on the current interactions that they have with financial institutions and healthcare providers. MFA can significantly reduce the chances of a bad actor from compromising an account without overwhelming a user with controls. MFA adds the simplest control that can be layered on an existing password policy that can increase the cost for any bad actor attempting to breach an account or environment.
When MFA is paired with Conditional Access policies, the story gets even stronger. The use of the policies can allow for even better user experiences and make sure that MFA is being triggered when it is necessary. Normal factors that will come into play for Conditional Access and MFA will be:
At this point, we have hopefully a strong password policy that balances complexity without creating bad habits and users being prompted for MFA when it makes sense. Now, we need to tackle the much harder topic of only providing users with the permissions that they NEED. In the cloud, it is critical to make sure that we assign all permissions based on the principles of least privilege.
One of the biggest threats to every Office 365 tenant and cloud application in general is the over-permissioning of users and administrators. It is not uncommon for Spyglass to go into an environment and find 10+ users assigned the Global Admin rights. This is absolutely unacceptable when you realize that:
To come up with a true strategy to deal with over-permissioning, you must do the following:
No users should be given standing permissions outside of potentially a reader type role. It is also important to remember to go through the exercise across all applications and cloud platforms like Azure, AWS, and GCP.
As we continue to layer on controls for users, the use of advanced capabilities like Entitlement Packages and Access Reviews needs to be addressed. This is often paired with how corporations deal with External Users and guests that need access to some corporate resources.
The access reviews will ensure that what people have access to is being reviewed so that access to any non-relevant resources is removed. This may also mean that a user themselves will be removed if they are no longer with the company, especially for external users and guests. The entitlement packages work well with the reviews in making sure that users (either internal or external) are only being provided with appropriate access to sites, applications, and other resources. These can be mostly automated as well based on group membership or other processes which again simplifies management while increasing the level of security by continually only permissioning people for what they need and reviewing that permissioning to make sure it is still relevant.
As we stated, this is just the first step. In this series, so far, we have covered how to start and also tackling identity. Over the next few posts, we will cover:
In Part 3, we will tackle what is often paired with identity for securing Office 365…Data Governance. Stay tuned for part 3 of 6 coming out soon!
We are here to help! Please contact us if you would like to have a conversation about this at any time.