Holistic Security in the Modern workplace Introduction https

  • Slides: 52
Download presentation
Holistic Security in the Modern workplace

Holistic Security in the Modern workplace

Introduction https: //www. twitter. com/rvackooij/ https: //www. linkedin. com/in/rvackooij/

Introduction https: //www. twitter. com/rvackooij/ https: //www. linkedin. com/in/rvackooij/

What is Cloud Computing “Cloud Computing allows self-service access to an elastic pool of

What is Cloud Computing “Cloud Computing allows self-service access to an elastic pool of IT resources” ON-DEMAND SELF SERVICE SCALABLE AND ELASTIC POOLED & HIGHLY AUTOMATED MEASURED SERVICES

Cloud Service Models INFRASTRUCTURE AS A SERVICE DESKTOP AS A SERVICE DISASTER RECOVERY PLATFORM

Cloud Service Models INFRASTRUCTURE AS A SERVICE DESKTOP AS A SERVICE DISASTER RECOVERY PLATFORM AS A SERVICE BACKUP AS A SERVICE SOFTWARE AS A SERVICE ANYTHING ……. . AS A SERVICE

Cloud Deployment Models Private Community Hybrid Public

Cloud Deployment Models Private Community Hybrid Public

Why a Cloud strategy COST CONTROL SCALABILITY CONTINUITY COMPLIANC E FEATURE SET

Why a Cloud strategy COST CONTROL SCALABILITY CONTINUITY COMPLIANC E FEATURE SET

Why a Cloud strategy SCALABILITY CONTINUITY

Why a Cloud strategy SCALABILITY CONTINUITY

Why a Cloud strategy - Compliance COMPLIANC E

Why a Cloud strategy - Compliance COMPLIANC E

Why a Cloud strategy - Compliance Nov/Dec 2018

Why a Cloud strategy - Compliance Nov/Dec 2018

Why a Cloud strategy – Feature set FEATURE SET

Why a Cloud strategy – Feature set FEATURE SET

Why a Cloud strategy - Compliance

Why a Cloud strategy - Compliance

Why a Cloud strategy – Feature set COST CONTROL SCALABILITY CONTINUITY COMPLIANC E FEATURE

Why a Cloud strategy – Feature set COST CONTROL SCALABILITY CONTINUITY COMPLIANC E FEATURE SET

IT Maturity level BASIC STANDARDIZED RATIONALIZED DYNAMIC Uncoordinated, manual infrastructure Managed IT infrastructure with

IT Maturity level BASIC STANDARDIZED RATIONALIZED DYNAMIC Uncoordinated, manual infrastructure Managed IT infrastructure with limited automation Managed and Consolidated IT infrastructure with maximum automation Fully automated management, dynamic resource usage, business linked SLA’s

The Modern Workplace enables Digital Transformation

The Modern Workplace enables Digital Transformation

Assuming a protected state!. . From cruising down the road….

Assuming a protected state!. . From cruising down the road….

Assuming bad-actors are targeting your organization. . To being ready to face any form

Assuming bad-actors are targeting your organization. . To being ready to face any form of attack!

Assuming BREACH and actively responding to active threats within your organization. . to be

Assuming BREACH and actively responding to active threats within your organization. . to be in upside-down fighting mode!

The Modern Workplace enables Digital Transformation • Unlocks Creativity • Built for Collaboration •

The Modern Workplace enables Digital Transformation • Unlocks Creativity • Built for Collaboration • Integrated for Simplicity • Intelligent Security The Modern Desktop starts with Microsoft 365

Microsoft 365 - Security Why are we talking “security”? The growth of the number

Microsoft 365 - Security Why are we talking “security”? The growth of the number cyber attacks – (From our experience out of the field) Sophisticated attacks, spread quickly 100 million Identities a month are being attacked 50 K are compromised each month 2 types of organizations: • Organizations that have been breached and know about it • Organizations that have been breached and don’t know about it Amount of internet connected devices & the growing use of Cloud computing So, your perimeter-based security model is no longer good enough As, your network is where your users are, your network is where your devices are, and even, your network is where your data is

Microsoft 365 - Security Complexity is the absolute Enemy of Security! Larger organizations in

Microsoft 365 - Security Complexity is the absolute Enemy of Security! Larger organizations in most cases have a lot of security products, but they are not integrated, and they really require a lot of time, effort, energy from your sys/sec-admins We’ll have to “simplify” & integrate: Identity, Device, Information, Threats Therefore, we should think: “Built-in” vs. “Bolt-on” Microsoft –eq Security Company

Legacy workplace—just protect the front door Files Devices Data Remote work On-premises Partners Branch

Legacy workplace—just protect the front door Files Devices Data Remote work On-premises Partners Branch offices Line-ofbusiness (Lo. B) apps

Modern workplace, modern security threats Lo. B apps Software-as-a-service (Saa. S) apps Data Files

Modern workplace, modern security threats Lo. B apps Software-as-a-service (Saa. S) apps Data Files Devices Partners Clouds Artificial intelligence (AI) Remote work Branch offices Internet of things (Io. T) On-premises

The security challenges you face have never been greater

The security challenges you face have never been greater

The threat landscape Identities Users and admins Endpoints User data Cloud apps Infrastructure Devices

The threat landscape Identities Users and admins Endpoints User data Cloud apps Infrastructure Devices and sensors Email messages and documents Saa. S applications and data stores Servers, virtual machines, databases, networks Microsoft Intelligent Security Graph 6. 5 trillion signals per day

Microsoft Intelligent Security Graph

Microsoft Intelligent Security Graph

Empower your defenders with Azure ATP Improve Security Posture More Visibility, Less Alerts Automate

Empower your defenders with Azure ATP Improve Security Posture More Visibility, Less Alerts Automate updates and configuration Focus on what’s important and reduce noise Cloud Scale, Continuous Updates Reduce Mean Time To Response Automate responses and integrate with existing tools Uncover Complex Threats Understand the entire attack and Identify Suspicious users

Maximize detection during attack stages Azure AD Identity Protection Identity protection & conditional access

Maximize detection during attack stages Azure AD Identity Protection Identity protection & conditional access Cloud App Security Extends protection & conditional access for cloud applications Brute force account, use stolen account Exfiltrate data Phishing mail Clicks on a URL, Open attachment Exploitation & Installation Command & Control User browses to a website Office ATP Attacker collects reconnaissance and configuration data User account compromised Microsoft Defender ATP Attacker attempts lateral movement Attacker accesses sensitive data Privileged account compromised Domain compromise & persistence Azure ATP Detect identity-based attacks

Why deploying security first matters A typical technology deployment Prepare users and data Deploy

Why deploying security first matters A typical technology deployment Prepare users and data Deploy workloads Onboard and train users Implement security Deprioritizing security creates vulnerability

Foiling cyberattacks with Microsoft 365 threat protection Parallel deployment done quickly and securely Executive

Foiling cyberattacks with Microsoft 365 threat protection Parallel deployment done quickly and securely Executive sponsorship and adoption Implement security and deploy workload Leveraging protection, detection, and remediation capabilities of Microsoft 365 Migrate data and users Frontline business value

Thank you!

Thank you!

The Modern Workplace Security Quick Wins

The Modern Workplace Security Quick Wins

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information protection Holistic Security Approach Threat protection

Identity driven security What can go wrong? Identity and access management (IAM) 80% of

Identity driven security What can go wrong? Identity and access management (IAM) 80% of breaches on accounts 32% of users will open email 12% of users click the link It takes only 2 ½ hours to hack an 8 -character password Assuming we are protected

Identity driven security What can we do? Identity and access management (IAM) “Assume breach”

Identity driven security What can we do? Identity and access management (IAM) “Assume breach” “Zero-Trust” QUICK WINS! • Named admin accounts – Required! • Implement Hybrid Identity (AD synchronization with Azure AD) • Enforce MFA on all admin accounts (privileged roles) - Required • Implement MFA for all Users (preferable conditional)* • Implement Office 365 Advanced Threat Protection (ATP)* • Portal Branding Next steps… • Implement PIM (Privileged Identity Management) • Implement Identity Protection (Behavioural analysis, AI, Risky sign-ins, leaked credentials, unfamiliar locations, etc. ) • Implement Azure Advanced Threat Protection * Conditional Access and Office 365 ATP will be covered in a bit

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information protection Holistic Security Approach Threat protection

Modern Workplace Security What can go wrong? Mobile device & app management Data is

Modern Workplace Security What can go wrong? Mobile device & app management Data is shared via non-corporate apps Data is stored locally on the device Mobile devices are commonly used careless Device gets stolen or is disposed in a careless way What else can we think off? We are not in control over managed, nor un-managed devices

Modern Workplace Security What can we do? Mobile device & app management Windows 7’s

Modern Workplace Security What can we do? Mobile device & app management Windows 7’s funeral was beautiful: QUICK WINS! • Enrol your devices; Windows 10, i. OS, and Android in Intune • Encrypt the disk with Bit. Locker – Required! • Implement App Protection Policies with DLP features • Implement Compliancy policy for your devices (insights) Next steps… • Implement advanced configuration policies and application deliveries • Make use of Windows 10 Enterprise features (Credential Guard, Application Guard, etc. ) • Combine Conditional Access with Device Compliancy (NAP) • Implement Windows Defender Advanced Threat Protection EPP (endpoint protection platform) – EDR (endpoint detection & response) • Configure One. Drive; Known Folder Move (KFM), Files on Demand • Implement Windows Information Protection (WIP)

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information protection Holistic Security Approach Threat protection

Modern Workplace Security What can go wrong? Information protection 58% of workers have accidentally

Modern Workplace Security What can go wrong? Information protection 58% of workers have accidentally shared sensitive data to the wrong person Users are unaware of the “gold” they have in their hands We don’t know where our data travels

Modern Workplace Security What can we do? Information protection is a responsibility of the

Modern Workplace Security What can we do? Information protection is a responsibility of the Business! IT facilitates QUICK WINS! • Implement Office message encryption • Start with classification labels (without policy) • Discuss information compliancy regulations – Retention • Implement basic retention policies • Create user awareness sessions Next steps… • Implement policies on specific classification labels • Retention based • Sensitivity based • Create DLP (Data Loss Prevention) policies • Configure Access Reviews • Start the review for automatic labelling of specific information

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information

Modern Workplace Security Identity and access management (IAM) Mobile device & app management Information protection Holistic Security Approach Threat protection

Modern Workplace Security What can go wrong? Threat protection 91% of cyberattacks and the

Modern Workplace Security What can go wrong? Threat protection 91% of cyberattacks and the resulting data breach begin with a spear phishing email Patient-Zero/ Zero-Day, is not tackled on Day-Zero We are hold ransom for our own data! We are unaware of threats currently happening

Modern Workplace Security What can we do? Threat protection QUICK WINS! • Finish the

Modern Workplace Security What can we do? Threat protection QUICK WINS! • Finish the quick wins of Identity Access Management • Finish the quick wins of Device Next steps… • Run through the reports generated now from your Office 365 ATP implementations • Dive deeper into the Secure Score actions • Implement Azure Sentinel (Advanced SIEM) and connect the M 365 + ATP products to Sentinel • Implement Azure ATP for behavioural analysis on your identities onpremises and in the Cloud

Recap - Modern Workplace Security Protect at the front door Protect your data anywhere

Recap - Modern Workplace Security Protect at the front door Protect your data anywhere Microsoft 365 Detect & remediate attacks

Secure Score

Secure Score

Real-life Experiences What happened – Case 1 What happened – Case 2 Organization lost

Real-life Experiences What happened – Case 1 What happened – Case 2 Organization lost a lot of money, by being tricked into sending money towards a new bank account Organization lost a lot of Personal Identification Information (PII) of her customers Compromised Credentials!!! We MUST switch to an Identity driven security approach

Maximize detection during attack stages Azure AD Identity Protection Identity protection & conditional access

Maximize detection during attack stages Azure AD Identity Protection Identity protection & conditional access Cloud App Security Extends protection & conditional access for cloud applications Brute force account, use stolen account Exfiltrate data Phishing mail Clicks on a URL, Open attachment Exploitation & Installation Command & Control User browses to a website Office ATP Attacker collects reconnaissance and configuration data User account compromised Microsoft Defender ATP Attacker attempts lateral movement Attacker accesses sensitive data Privileged account compromised Domain compromise & persistence Azure ATP Detect identity-based attacks

Thank you!

Thank you!