Service Overview
This assessment focuses on the security configuration of Microsoft Office 365, based on the customer’s license tier.
The assessment includes a focused review of:
Exchange Online and its Protection Module
Defender 365 capabilities, including Defender for Endpoint, Defender for Identity, and Defender for Cloud Applications
SharePoint organizational configuration
Methodology
The primary goals of the assessment are to:
Identify misconfigurations that reduce the effectiveness of Office 365 security controls
Identify unused features that, if activated, could enhance the organization’s security posture
CYE will not perform the following activities:
Endpoint Manager (Intune) assessment
Azure AD security assessment
Microsoft Purview (DLP module)
Deliverables
All discovered findings are shown in Hyver, CYE’s Continuous Threat Exposure Management (CTEM) platform
A maturity level representing the organization’s security posture is determined. The maturity level is derived using the NIST Cybersecurity Framework, based on discovered findings and organizational insights
Prerequisites
The following permissions must be assigned to the Office 365 user account used in the assessment:
Global Reader (directory role)
Security Administrator role
SharePoint Administrator or equivalent role with read access
Relevant policies should also be made available.
Customer Engagement
During the assessment, CYE requires access to a point of contact, such as a cloud architect, who can address questions related to the environment, hosted assets, and user groups
For the dedicated workshop, the customer should allocate three days and involve both the cloud IT and cloud security teams
Relevant Standards
The proprietary methodology is based on:
Center for Internet Security (CIS) Critical Security Controls
Security Domains Covered
Cross-organization policies, procedures, and governance
Security operations, monitoring, and incident response
Servers, network equipment, and endpoints security
Sensitive data and information management
Identity management and remote access
