MICROSOFT CLOUD APP SECURITY
Sebastien Molendijk Senior Program Manager
CLOUD APP SECURITY Sebastien Molendijk Senior Program Manager - - PowerPoint PPT Presentation
MICROSOFT CLOUD APP SECURITY Sebastien Molendijk Senior Program Manager https://www.polleverywhere.com/multiple_choice_polls/BjnYY9hZKbBPAVfjvFhgc?preview=true&controls=none Enterprise-class technology Identity & access Threat
MICROSOFT CLOUD APP SECURITY
Sebastien Molendijk Senior Program Manager
https://www.polleverywhere.com/multiple_choice_polls/BjnYY9hZKbBPAVfjvFhgc?preview=true&controls=none
Enterprise-class technology
Secure identities to reach zero trust
Identity & access management Security management
Strengthen your security posture with insights and guidance
Threat protection
Help stop damaging attacks with integrated and automated security Locate and classify information anywhere it lives
Information protection Infrastructure security
https://www.polleverywhere.com/multiple_choice_polls/ 12sqtYRadhdO4r6L1IJM5?preview=true&controls=none
https://www.polleverywhere.com/multiple_choice_polls/ Hv68q7qjXJitDquT6sK5P?preview=true&controls=none
CLOUD ACCESS SECURITY BROKERS
Cloud services require a new approach to security
Top CASB use cases
Office 365 Salesforce
Azure
Box AWS
Dropbox
MICROSOFT CLOUD APP SECURITY
Office 365
Microsoft Teams
DISCOVERING AND ASSESSING THE RISK OF SHADOW IT
Shadow IT management lifecycle
Discovery of Shadow IT across SaaS, IaaS and PaaS Discover cloud usage across all locations (HQ, Branches, Remote..) Understand the risk of your SaaS apps Risk assessment for 16,000+ cloud apps based on 70+ security and compliance risk factors Analyze usage patterns Understand the usage patterns and identify high risk volume users by understanding traffic data, top users and IP addresses, app categories Block risky and unsanctioned apps Using native and programmatic integration with leading SWG and Proxies Continuous monitoring Be alerted when new, risky or high- volume apps are discovered
Cloud App Discovery
DISCOVERY ARCHITECTURE WITH MICROSOFT DEFENDER ATP
Firewall / Proxy Log collector
User IP address MachineMicrosoft Cloud App Security portal Endpoints Shadow IT Microsoft Defender ATP
Cloud Discovery with Microsoft Defender A TP
Native, endpoint-based Discovery of Shadow IT Discovery of cloud apps beyond the corporate network from any Windows 10 machine Single-click enablement Machine-based Discovery Deep dive investigation in Windows Defender ATP
1-click deployment with Microsoft Defender ATP
User education when attempting to access a non-trusted app
User education when attempting to access a non-trusted app
User education when attempting to access a non-trusted app
Shadow IT Discovery for IaaS and PaaS services
Shadow IT Discovery for IaaS and PaaS services – Drill down
Deplo loyment yment meth thod
Autom
log uploa
Checkbo box x deploym yment Supp ppor
d platforms rms Device-ba base sed d Discov
Off-networ
Discov
Inline blocking
Deployme ment Complexi xity
Log file e (Snap apshot report)
No No Any No No No Medium
Log colle llect ctor
Yes No Any No No No Medium
Windows ws Defender er ATP TP
Yes Yes Windows, Mac coming in 2019 Yes Yes H1 2019 Low
Zscaler aler
Yes No Any No Yes Yes Low
iboss
Yes No Any No Yes Yes Low
Shadow IT Discovery deployment options
DISCOVERY
PROTECTING YOUR INFORMATION
Protect your files and data in the cloud
Data is ubiquitous and you need to make it accessible and collaborative, while safeguarding it
Understand your data and exposure in the cloud Classify and protect your data no matter where it’s stored
Monitor, investigate and remediate violations
App Connectors
collaborators and classification labels
external- and compliance risks
granular DLP policies
capabilities for classification
encrypt your data using Azure Information Protection
alerts and trigger automatic governance actions
and related activities
permissions and notify users
Create policies to generate alerts and trigger automatic governance actions Be notified to identify and investigate policy violations and related activities Automatically remediate with built-in actions incl. notify owner, notify admin, make private, quarantine, etc. Automatically label and protect existing sensitive information and when new files are uploaded
Detect and remediate
anomalies
Unified labelling with Microsoft Information Protection - streamlined experience across O365 DLP , AIP and MCAS 90 built-in, sensitive information types you can choose from Custom sensitive information types using Regex, keywords and large dictionary Leverage Microsoft or 3rd party DLP engines for classification Leverage AIP labels
Key Differentiators via Microsoft Information Protection approach
INFORMATION PROTECTION
ENABLING REAL-TIME INFORMATION PROTECTION
Context-aware session policies Control access to cloud apps and sensitive data within apps based on user, location, device, and app SAML, Open ID Connect, & on- prem apps Support for Microsoft and non- Microsoft web apps, including on- prem apps onboarded via Azure AD App proxy Enforce granular monitoring & control for risky user sessions Data Exfiltration:
label on download
IMs with sensitive content) Data Infiltration:
Conditional Access App Control
Unique integration with Azure AD Conditional Access Selective routing to MCAS based on the session risk determined by Conditional Access to optimize end user productivity Simple deployment Built-in policies that can be configured directly within the Azure AD portal for an easy deployment. Control your on-prem apps With the same powerful real-time controls by integrating them with Azure AD Application Proxy Worldwide Azure datacenters infrastructure MCAS leverages Azure data centers across the world to optimize performance and user experience
Key differentiators to optimize the admin and end user experience
Cloud apps & services
Exemplary use case
Prevent download of sensitive files from unmanaged device
Config:Unmanaged
Any app
https://www.polleverywhere.com/multiple_choice_polls/ 0AU0d7HMIbntk8IOf5isF?preview=true&controls=none
PROTECTING YOUR INFORMATION IN REAL-TIME
THREAT PROTECTION IN THE CLOUD
inbound phishing attacks
Detections across cloud apps and sessions
! ! !Malware Detection
The challenge of securing your environment
The digital estate offers a very broad surface area that is difficult to secur ure Bad actors are using increasingly creative and sophisticated attacks cks Intelligent correlation and action on signals is difficult, time-consuming, and expens nsive
Identity Security – Covering your environment
Cloud identity threats Azure AD Identity Protection On-premises identity threats Azure ATP Application sessions Microsoft Cloud App Security
Azure AD & ADFS
On Premises Activities – via Azure ATP Cloud Activities – via Azure AD IP , Office 365 and MCAS
https://www.polleverywhere.com/multiple_choice_polls/ 9gRK9AEY6UcZRqVkd8OJ3?preview=true&controls=none
https://www.polleverywhere.com/discourses/qcKw1b76P E2fNeHvad8RH?preview=true&controls=none
M365 UEBA - Overview
USER INVESTIGATION PRIORITY
ALERTS ABNORMAL ACTIVITIES USER CONTEXT
Total user risk for investigation priority – reflecting security alerts, abnormal activities and user impact
User Investigation Priority
Suspicious activities Alerts User’s investigation priority
Identify top users to investigate
How abnormal is this user’s behavior?
User Investigation Priority
Example: User investigation priority distribution at a 200k+ employee organization
20000 40000 60000 80000 100000 120000 140000 160000 Number of Users Scores
Users / Score Distribution
Identify abnormal activities by analyzing the behavior of users, peers and the entire organization
Suspicious Activity: how does it work?
Suspicious
Has this user accessed this server before? Is the ‘finance server’ accessed by many users in the organization? Do the peers of this user login to this server ?
Normal
Does this user have a usual pattern of logons to servers?
Investigation Priority Feedback
True positives discovered:
resources, this was not detected by ATP products. filtering by activities with investigation priority helped sort and find compromised resources.
(custom policy inbox FW rule). When reviewed the case we noticed that the first activities by the adversary would have been flagged (by User agent+ISP)
THREAT PROTECTION
https://www.polleverywhere.com/multiple_choice_polls/ TH0DTL57l2zAIwcYgqKnw?preview=true&controls=none
https://www.polleverywhere.com/multiple_choice_polls/ ajznvQR4A9iqZR2ajAhB6?preview=true&controls=none
https://www.polleverywhere.com/multiple_choice_polls/ ZpWYvHObYJU5bcrRaVvcx?preview=true&controls=none
https://www.polleverywhere.com/multiple_choice_polls/ HVCvuMK7GFYO3n17eDy5C?preview=true&controls=non e
Enterprise integration
Export alerts and activities to your SIEM
Better protect your cloud applications while maintaining your usual security workflow, automating security procedures and correlating between cloud-based and on-premises events
Automate processes via API or PowerShell
Create your own applications using programmatic access to Cloud App Security data and actions through REST API endpoints
External DLP solution
Integrate with existing DLP solutions to extend these controls to the cloud while preserving a consistent and unified policy across on-premises and cloud activities
Security Workflow automation with Microsoft Flow
Centralized alert automation and orchestration of custom workflows using the ecosystem of connectors in Microsoft Flow. Enables routing alerts to ticketing systems (e.g. ServiceNow), gather end user input for alert investigation, get approval from SOC operator to execute action or apply additional security controls
Enterprise Integrations
Centralized alert automation and orchestration of custom workflows Automate the triage of alerts Enables an ecosystem
connectors in Microsoft Flow incl. >100 3rd party connectors such as Jira, ServiceNow, and DocuSign Out-of-the-box and custom workflow playbooks that work with the systems
your choice Predefined governance
when creating policies
Automating Security Workflows with MS Flow
Open incident in ticketing system & populate with alert attributes Request user input to provide context during alert investigation Get admin approval to execute remediation action
Configuration
Configuration steps
1.
Route alerts to ticketing systems such as Jira or ServiceNow
2.
Route alerts to different SOC teams based on geography of the user
3.
Request input from a user's manager to triage alert
4.
Request user input to decide how to triage an alert
5.
Block unsanctioned apps on the firewall using CAS discovery alerts
6.
Get admin approval to execute remediation action
7.
Disable user in AAD and in on-prem Active Directory based on suspicious alerts
8.
Remove malicious forwarding inbox rule in Exchange Online
9.
Automatically dismiss “unusual location” alerts when a user has OOF message set to “On”
Sample automation scenarios
Reach on-premises systems with Azure Automation
Reach on-premises systems with Hybrid Runbook Workers
https://docs.microsoft.com/en-us/azure/automation/automation-hybrid-runbook-worker
SIEM integration and Automating Security Workflows
External Admins
Service Providers (MSSPs) to act as administrators
admin roles
For MSSPs
to provide services across multiple customer tenants
the portal for MSSPs (See image)
Managed Security Service Provider (MSSP)
SUMMARY & NEXT STEPS
https://www.polleverywhere.com/discourses/jLyE4YUwLZ 7mZUnsfWfyH?preview=true&controls=none
https://www.polleverywhere.com/discourses/HWuN6tbi7 pj9mzAFxr12n?preview=true&controls=none
Top 10 CASB use cases you should think about
explore enterprise-ready alternatives
environment
cloud apps and understand your exposure
data stored in your cloud apps
identify insider threats
Next steps
Sign up for a Microsoft Cloud App Security Trial. Upload a log file from your network firewall or enable logging via Microsoft Defender ATP to discover Shadow IT in your network and assess the risks of detected cloud apps. Connect your Cloud Apps to Microsoft Cloud App Security to detect suspicious user activity and exposed sensitive data. Enable out-of-the-box anomaly detection policies and start detecting cloud threats in your environment. Continue with more advanced use cases across Information Protection, Compliance and more.
RESOURCES
aka.ms/mcas aka.ms/mcascommunity aka.ms/mcasblog aka.ms/mcastech aka.ms/mcastrial aka.ms/mcaslicensing
THANK YOU