{"id":302177,"date":"2020-03-27T09:23:46","date_gmt":"2020-03-27T08:23:46","guid":{"rendered":"https:\/\/pulse.microsoft.com\/?p=302177"},"modified":"2020-06-10T06:51:14","modified_gmt":"2020-06-10T05:51:14","slug":"fa2-this-is-serious-so-is-your-secure-score","status":"publish","type":"post","link":"https:\/\/pulse.microsoft.com\/en\/work-productivity-en\/na\/fa2-this-is-serious-so-is-your-secure-score\/","title":{"rendered":"Securing\u00a0your business\u00a0when\u00a0staff are working\u00a0from home\u00a0"},"content":{"rendered":"<p class=\"intro\">In times like these, cyber security may not be at the top of our priority lists. But it\u2019s important to be aware of the threats that switching from on-premises to remote working conditions pose to organizations across the world.<\/p>\n<p>As we seek to rapidly deploy cloud-based collaboration services to help professionals work from home, we may lose sight of the security threats that can accompany this shift. Your chosen applications may have a limited set of security controls.<\/p>\n<h2>How you can boost security today<\/h2>\n<p>Without additional security controls, you rely on user awareness to prevent impactful mistakes and on <a href=\"https:\/\/www.linkedin.com\/pulse\/how-perform-security-monitoring-office-365-paul-huijbregts\" target=\"_blank\" rel=\"noopener noreferrer\">targeted monitoring with whatever logs are available<\/a>. This is not an ideal situation.<\/p>\n<p>But in the Microsoft cloud, the gatekeeper for all cloud security-related things is Azure Active Directory (Azure AD). And it makes sense to focus efforts there first, even if the collaboration service you wish to provide your users is not from Microsoft. Then, once you have established secure access, it really depends on the chosen solution as to which controls are available. So, being aware of what\u2019s in the box is important.<\/p>\n<p>In this article, we will list some of the security controls available to our customers. All with the goal of helping you to bolster security quickly \u2013 while reducing the impact on productivity.<\/p>\n<h2>Security defaults &#8211; Azure Active Directory<\/h2>\n<p>For Azure AD, we recently <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\" target=\"_blank\" rel=\"noopener noreferrer\">introduced security defaults<\/a>. These fall under the category of what we feel are the most basic and yet the most important controls to consider. These defaults help you enforce <a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/identity\/mfa\" target=\"_blank\" rel=\"noopener noreferrer\">multi-factor authentication<\/a> (MFA) for administrative accounts and then give you the option of enabling the Microsoft Authenticator mobile app for users. Note that it is not granular, so it will either be on or off (<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/authentication\/howto-mfa-userstates#enable-azure-mfa-by-changing-user-state\" target=\"_blank\" rel=\"noopener noreferrer\">by user state<\/a>). However, you can give users the option to \u2018remember my device\u2019 to reduce the amount of times they are asked to perform 2-step authentication.<\/p>\n<p>To see what the configuration and user experiences look like before you start configuring, <a href=\"https:\/\/www.linkedin.com\/posts\/janwillemroks_quick-wins-for-securing-online-collaboration-activity-6645691393777942529-ZNes\" target=\"_blank\" rel=\"noopener noreferrer\">take a look at this video one of my colleagues made<\/a>.<\/p>\n<div id=\"attachment_341934\" style=\"width: 1307px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-341934\" class=\"wp-image-341934 size-full\" src=\"https:\/\/pulse.microsoft.com\/uploads\/prod\/2020\/03\/Azure_Security.jpg\" alt=\"a screenshot\" width=\"1297\" height=\"994\" data-contrast=\"too_bright\" srcset=\"\/wp-content\/uploads\/2020\/03\/Azure_Security.jpg 1297w, \/wp-content\/uploads\/2020\/03\/Azure_Security-300x230.jpg 300w, \/wp-content\/uploads\/2020\/03\/Azure_Security-768x589.jpg 768w\" sizes=\"(max-width: 1297px) 100vw, 1297px\" \/><p id=\"caption-attachment-341934\" class=\"wp-caption-text\">Azure security<\/p><\/div>\n<p>Security defaults in Azure AD make it easier to be secure and help protect your organization because they contain preconfigured security settings for common attacks.<\/p>\n<p>These are configurable controls on top of our platform in the area of accounts and identities. Read about the\u202f<a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/shared-responsibility\" target=\"_blank\" rel=\"noopener noreferrer\">shared responsibilities model<\/a>\u202fto understand which security tasks are handled by Microsoft as the cloud provider and which tasks are handled by you.<\/p>\n<p>If there\u2019s nothing else you can do, the above is a strong starting point. If your organization has access to Premium features in Azure AD, it is definitely advisable to use those as they provide you with additional options that greatly increase account security, as well as offering more fine-grain controls that increase usability.<\/p>\n<h2>Powerful quick wins with Office 365 and Microsoft Teams<\/h2>\n<p>So, let&#8217;s talk about what we can do for Microsoft&#8217;s collaboration platform, Office 365. This includes Microsoft Teams. In fact, Microsoft is currently offering an <a href=\"https:\/\/docs.microsoft.com\/en-us\/MicrosoftTeams\/e1-trial-license\" target=\"_blank\" rel=\"noopener noreferrer\">extended trial<\/a> to <a href=\"https:\/\/docs.microsoft.com\/en-us\/MicrosoftTeams\/support-remote-work-with-teams\" target=\"_blank\" rel=\"noopener noreferrer\">support remote workers using Microsoft Teams<\/a>. Since these workloads are connected to Azure AD, the controls mentioned above also apply.<\/p>\n<p>Our Enterprise Cybersecurity Architects Mark Simos and Matt Kemelhar provided the input for our Office 365 Security Roadmap. This roadmap contains a prioritized overview of recommended security configurations and practices and gives you a clear path of where to focus.<\/p>\n<p>While we strive to achieve as much as possible in the long-term, some of the best first steps to take can be found here:\u202f<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/security-roadmap?view=o365-worldwide#30-days--powerful-quick-wins\" target=\"_blank\" rel=\"noopener noreferrer\">30 days \u2013 powerful quick wins<\/a>.<\/p>\n<h2>Microsoft Secure Score<\/h2>\n<p>When it comes to security, it&#8217;s increasingly difficult to know what you should be doing first or next. There are a multitude of considerations around information protection, security management, security monitoring and so on \u2013 and we certainly don\u2019t recommend taking any shortcuts around these areas.<\/p>\n<p>This is where <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/mtp\/microsoft-secure-score-preview?view=o365-worldwide\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Secure Score<\/a> \u2013 free for all customers \u2013 can help.<\/p>\n<p>By following your Security Score recommendations, you can protect your organization from threats. From a centralized dashboard in the Microsoft 365 security center, you can monitor and work on the security of your Microsoft 365 identities, data, apps, devices and infrastructure.<\/p>\n<p>Secure Score gives you a way to improve your security posture in a structured way by providing visibility and actionable recommendations. Security posture management is a complex topic for any organization. And if you want to enable continuous security posture improvement (which you do!) \u2013 you\u2019ll need to make sure it\u2019s\u202f<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-privacy-and-compliance\/how-to-operationalize-microsoft-secure-score-in-your\/ba-p\/1168429\" target=\"_blank\" rel=\"noopener noreferrer\">well rooted in your organization<\/a>.<\/p>\n<p>So, even though this article started with recommendations to cover the basics quickly, we\u2019ve seen there\u2019s always something more to do. Microsoft Secure Score is an excellent tool for you to work on your organization\u2019s security posture. It\u2019s free to use, and a great starting point.<\/p>\n<h2>Find out more about multifactor authentication (MFA)<\/h2>\n<p>As mentioned above, MFA is a vital piece of the security puzzle. By requiring multiple forms of verification to prove identity when signing into an application, MFA can immediately help secure your business against breaches. And with Azure AD, you can enable MFA at no extra cost.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-gb\/security\/business\/identity\/mfa\" target=\"_blank\" rel=\"noopener noreferrer\">Click here<\/a> to find out more about boosting security with MFA.<\/p>\n<h2>Enable remote working with Zero Trust security<\/h2>\n<p>Understanding &#8220;Zero Trust&#8221; security and how companies can build cloud strategies around it is crucial as staff increasingly is work remotely.<\/p>\n<p>With a <a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fzero-trust%3Fwt.mc_id%3DAID3012394_QSG_BLOG_431706&amp;data=02%7C01%7Cv-dipeke%40microsoft.com%7C3353e9cc62c64e166ec408d7fb4553ff%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637254147486456800&amp;sdata=RPKZtaa%2BYOM8OCGGedSAEFQ3%2Ba3NICzHqItHjX80QT0%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust model<\/a>, instead of assuming everything behind your corporate firewall is safe, you assume breach and verify each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches you to \u2018never trust, always verify.\u2019<\/p>\n<p><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fzero-trust%3Fwt.mc_id%3DAID3012394_QSG_BLOG_431706&amp;data=02%7C01%7Cv-dipeke%40microsoft.com%7C3353e9cc62c64e166ec408d7fb4553ff%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637254147486456800&amp;sdata=RPKZtaa%2BYOM8OCGGedSAEFQ3%2Ba3NICzHqItHjX80QT0%3D&amp;reserved=0\" target=\"_blank\" rel=\"noopener noreferrer\">Click here<\/a> to find out more about Zero Trust security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In times like these, cyber security may not be at the top of our priority lists. But it\u2019s important to be aware of the threats that switching from on-premises to remote working conditions pose to organizations across the world. As we seek to rapidly deploy cloud-based collaboration services to help professionals work from home, we [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":302180,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1829],"class_list":["post-302177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-privacy-en","specials-work-productivity-en","stories-how-can-i-work-secure","stories-working-secure-en","businessPriorities-modern-workplace"],"_links":{"self":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/302177"}],"collection":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/comments?post=302177"}],"version-history":[{"count":24,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/302177\/revisions"}],"predecessor-version":[{"id":341988,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/posts\/302177\/revisions\/341988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media\/302180"}],"wp:attachment":[{"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/media?parent=302177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pulse.microsoft.com\/en\/wp-json\/wp\/v2\/categories?post=302177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}