Skip to main content

Office365 Security Configuration Review

Updated over 5 months ago

Service Overview

This assessment focuses on the security configuration of Microsoft Office 365, based on the customer’s license tier.

The assessment includes a focused review of:

  • Exchange Online and its Protection Module

  • Defender 365 capabilities, including Defender for Endpoint, Defender for Identity, and Defender for Cloud Applications

  • SharePoint organizational configuration


Methodology

The primary goals of the assessment are to:

  • Identify misconfigurations that reduce the effectiveness of Office 365 security controls

  • Identify unused features that, if activated, could enhance the organization’s security posture

CYE will not perform the following activities:

  • Endpoint Manager (Intune) assessment

  • Azure AD security assessment

  • Microsoft Purview (DLP module)


Deliverables

  • All discovered findings are shown in Hyver, CYE’s Continuous Threat Exposure Management (CTEM) platform

  • A maturity level representing the organization’s security posture is determined. The maturity level is derived using the NIST Cybersecurity Framework, based on discovered findings and organizational insights


Prerequisites

The following permissions must be assigned to the Office 365 user account used in the assessment:

  • Global Reader (directory role)

  • Security Administrator role

  • SharePoint Administrator or equivalent role with read access

Relevant policies should also be made available.


Customer Engagement

  • During the assessment, CYE requires access to a point of contact, such as a cloud architect, who can address questions related to the environment, hosted assets, and user groups

  • For the dedicated workshop, the customer should allocate three days and involve both the cloud IT and cloud security teams


Relevant Standards

The proprietary methodology is based on:

  • Center for Internet Security (CIS) Critical Security Controls


Security Domains Covered

  • Cross-organization policies, procedures, and governance

  • Security operations, monitoring, and incident response

  • Servers, network equipment, and endpoints security

  • Sensitive data and information management

  • Identity management and remote access

Did this answer your question?