<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Consultant</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/alexandre-mazars/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/alexandre-mazars/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 21 Oct 2020 13:26:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Consultant</title>
	<link>https://www.riskinsight-wavestone.com/author/alexandre-mazars/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to manage administration in Microsoft 365?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/10/how-to-manage-administration-in-microsoft-365/</link>
		
		<dc:creator><![CDATA[Alexandre Mazars]]></dc:creator>
		<pubDate>Mon, 19 Oct 2020 13:03:15 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[administrator]]></category>
		<category><![CDATA[authentication]]></category>
		<category><![CDATA[Azure AD]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[PIM]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14420</guid>

					<description><![CDATA[<p>Within any infrastructure or application, privileged accounts are particularly sensitive accounts. Securing them is a key issue. This is especially true for SaaS services, where the shared responsibility model requires an organization to protect its data and identities, and the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-manage-administration-in-microsoft-365/">How to manage administration in Microsoft 365?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Within any infrastructure or application, privileged accounts are particularly sensitive accounts. Securing them is a key issue. This is especially true for SaaS services, where the shared responsibility model requires an organization to protect its data and identities, and the Microsoft 365 suite is no exception.</p>
<p style="text-align: justify;"><strong>In fact, if there&#8217;s one thing you need to protect, it&#8217;s your administrators!</strong></p>
<p style="text-align: justify;">Whether it concerns authentication methods, third-party application permissions via APIs (allowing a third-party application to synchronize data with an external storage service, for example) or changing retention policies, an administrative action can significantly affect the data and security of the tenant on a larger scale. If it is necessary to make this point even more explicit, a Global Administrator has the ability to access all data or manage all the settings of Office 365, Windows 10, Azure AD&#8230; but also Azure!</p>
<p style="text-align: justify;">
<h1 style="text-align: justify;">What are the native functionalities in the Microsoft platform?</h1>
<h2 style="text-align: justify;">Which rights models within Microsoft 365?</h2>
<p style="text-align: justify;">To date, Microsoft 365 has two main levels of rights. These two levels schematically allow the delegation of administrative rights by adapting to different organisational models (small / medium / large, centralised / decentralised):</p>
<ul style="text-align: justify;">
<li>Azure AD roles: Administration of Azure AD and Microsoft 365 services;</li>
<li>RBAC roles: Administration of objects within services.</li>
</ul>
<h4 style="text-align: justify;">Level One: Using Azure AD roles to manage services</h4>
<p style="text-align: justify;">The person behind the opening of the tenant automatically takes over the role of General Administrator. He can then appoint other administrators to accompany him in his tasks. As far as possible, Global Admin&#8217;s rights should not be used in order to limit overexposure of the administration accounts. It is good practice to limit this general role to a maximum of 3-4 accounts. In addition, for almost all actions there is an equivalent service administration role (e.g. SharePoint Administrator, User Administrator, etc.).</p>
<p style="text-align: justify;">These service administration roles are also known as <a href="https://docs.microsoft.com/en-en/microsoft-365/admin/add-users/azure-ad-roles-in-the-mac?view=o365-worldwide">Azure AD roles</a>. Each service can be viewed as an Azure AD application. An administrator would thus be equivalent to the owner of the service in question. At the time of writing this article, Microsoft offers 59 different roles, which provides a <strong>good level of segregation of rights</strong> in most cases.</p>
<p style="text-align: justify;">However, the default roles provide access to the entire Admin Service for the entire tenant and may in some cases provide access to the underlying data (e.g. for SharePoint Administrator, Exchange Administrator and User Administrator).</p>
<p>&nbsp;</p>
<figure id="post-14425 media-14425" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-14425 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3.png" alt="" width="1750" height="1031" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3.png 1750w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-324x191.png 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-768x452.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image3-1536x905.png 1536w" sizes="(max-width: 1750px) 100vw, 1750px" /></figure>
<p style="text-align: center;">Figure 1 – Example of sensitive rights</p>
<p style="text-align: justify;">
<p style="text-align: justify;">In the case of <strong>advanced maturity</strong>, it is possible to go further in the segregation of rights by creating <strong>personalised Azure AD roles</strong>. In concrete terms, this means deciding what permissions this role has (e.g. &#8220;microsoft.directory/applications/create&#8221; allows you to create applications in Azure Active Directory).</p>
<p style="text-align: justify;">The downside will be that it will be more complicated to audit the administration and that it will be necessary to monitor the evolution of services to ensure that permissions remain consistent with the needs of administrators.</p>
<h4 style="text-align: justify;">Second level: Using the RBAC model to manage objects</h4>
<p style="text-align: justify;">Certain services such as Exchange Online, Intune, Security and Compliance Centres or Cloud App Security offer <a href="https://docs.microsoft.com/en-en/microsoft-365/security/office-365-security/permissions-microsoft-365-compliance-security?view=o365-worldwide">specific RBAC rights models</a>.</p>
<p style="text-align: justify;">As its name suggests, <em>Role Based Access Control</em> (RBAC), allows for the implementation of more refined permissions management; with the ability to define roles for defined perimeters (e.g. for certain user groups). For example, it will be possible to create &#8220;Helpdesk A&#8221; and &#8220;Helpdesk B&#8221; in Exchange Online to give support rights to two separate teams on a perimeter A and a perimeter B.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">How to provision the accounts of administrators?</h2>
<p style="text-align: justify;">The first question is how to create an administrator&#8217;s identity. Two strategies are possible:</p>
<ul style="text-align: justify;">
<li>The creation of an account in the organisation&#8217;s identity repository, which will then be synchronised with Azure AD (ex: wavestone.com);</li>
<li>The creation of the account directly in Azure AD. This account will then be called &#8220;cloud-only&#8221; (example: wavestone.onmicrosoft.com).</li>
</ul>
<p style="text-align: justify;">Regardless of the administration role, it is recommended for a SaaS service such as Microsoft 365 that <strong>the account be located as close as possible to the administered resource</strong>. Here, this amounts to <strong>using cloud-only accounts</strong>. The objective is twofold: to protect against a possible unavailability or of a compromise of the organisation&#8217;s identity repository.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">How to assign permissions?</h2>
<p style="text-align: justify;">The second question is how to assign the right privileges to the administrative roles created.</p>
<h4 style="text-align: justify;">In the case of service administration</h4>
<p style="text-align: justify;">In order to assign an AAD role, it is possible to use 3 methods (via the portal or the corresponding PowerShell command):</p>
<ul style="text-align: justify;">
<li>The <strong>Azure portal</strong> (portal.azure.com): this is <strong>the method</strong> that should be favoured, as it allows the association of rights as close as possible to the resources and the use of PIMs, which we will discuss in the rest of the article;</li>
<li>The <strong>Microsoft 365 portal</strong> (admin.microsoft.com): it is possible to carry out the assignment of roles directly through the main administration portal. However, this method is not compatible with PIM;</li>
<li>The use of <strong>third party IAM tools</strong>: these solutions now have connectors with Office 365 to perform identity and privilege provisioning. These solutions offer less granularity, are not compatible with PIM and are a source of common errors. For example, synchronisation is typically one-way, resulting in the administration account reappearing if it is only deleted in Azure AD.</li>
</ul>
<p style="text-align: justify;">Note that it is also now possible to assign an Azure AD role to a security group (Cloud only) via a <a href="https://docs.microsoft.com/en-en/azure/active-directory/users-groups-roles/roles-groups-concept">preview feature</a>. This may simplify certain administrative models, such as where the Unified Communications team needs the SharePoint Administrator role and Teams Administrator. However, be careful with the management of this group.</p>
<h4 style="text-align: justify;">In the case of the administration of objects</h4>
<p style="text-align: justify;">For RBAC roles, the definition of roles is done directly in the administration platform of the service concerned. It is then possible to assign the role in question manually or to a security group, in the portal or via an IAM solution.</p>
<p>&nbsp;</p>
<figure id="post-14423 media-14423" class="align-none"><img decoding="async" class="aligncenter wp-image-14423 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893.png" alt="" width="1492" height="948" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893.png 1492w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893-301x191.png 301w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893-61x39.png 61w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image2-1-e1603286671893-768x488.png 768w" sizes="(max-width: 1492px) 100vw, 1492px" /></figure>
<p style="text-align: center;">Figure 2 – Natives functionalities of the solution</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">How to build and implement your administration model?</h1>
<h2 style="text-align: justify;">What strategy to define your rights model?</h2>
<p style="text-align: justify;">The construction of a delegation model must be based on the <strong>principle of least privilege</strong>. The core of the work is to make an inventory of the cases of Office 365 administration usage and to <strong>match your teams with the available rights</strong>.</p>
<p style="text-align: justify;">This can be an opportunity to rethink the organisation of teams dealing with the working environment. Two observations are quite significant:</p>
<ul style="text-align: justify;">
<li>Mobile terminals and workstations are intended to be managed by unified solutions (UEM) such as Intune, Workspace One or MobileIron, and therefore by the same team.</li>
<li>Security and compliance tools are increasingly integrated natively in Office 365. It is therefore necessary to break down the wall that existed between the workplace world and the security world, in order to create a team with the same ambition: to create and maintain a controlled and secure platform.</li>
</ul>
<p style="text-align: justify;">Office 365 has the particularity of bringing together a multitude of different services, such as file or information storage (SharePoint, OneDrive), communication tools (Exchange, Teams) but also security (Defender, Information Protection, etc.). It is therefore essential to group the services into categories and define a <strong>correspondence matrix</strong> between team and administration roles.</p>
<p style="text-align: justify;">Concretely, we advise you first to <strong>use the default Azure AD roles for service administration</strong>, <strong>and then to define more granular roles</strong> with RBAC and custom roles.</p>
<p style="text-align: justify;">It is also interesting to <strong>identify the most sensitive roles</strong>, such as those allowing access to data or security settings (for example: Global Admin, Exchange Admin, Security Administrator and Application Administration) in order to be able to adapt the security of these roles.</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">How to delegate administration rights on objects in a multi-entity context ?</h2>
<p style="text-align: justify;">Before talking about security in the strict sense of the word, there is another question. Although <strong>the configuration of services and security parameters can only be done centrally, local teams need to carry out support actions</strong>: creation or modification of an internal or guest account, resetting of authenticators, creation of a Microsoft 365 group or a distribution list, etc.</p>
<p style="text-align: justify;">The service administration roles, the Azure AD roles, <strong>do not offer privilege segregation by perimeter</strong>; an Exchange Online administrator will therefore be able to handle all mailboxes. It will not be conceivable to give them in complex organisations or in regulated contexts. Several strategies are available, depending on the maturity and complexity of the organisation.</p>
<p style="text-align: justify;">In the case of small structures, it is easiest to use the native functionalities:</p>
<ul style="text-align: justify;">
<li><strong>RBAC roles</strong>: RBAC Exchange and Intune roles generally provide the right level of granularity to manage objects in native portals;</li>
<li><strong>Administrative Units</strong>: Administrative Units, <a href="https://docs.microsoft.com/en-en/azure/active-directory/users-groups-roles/directory-administrative-units">finally in GA</a> since the end of September, are the equivalent of RBAC for Azure Active Directory. They take the form of containers in which an administrator can create or modify objects, which makes sense for support activities.</li>
</ul>
<p style="text-align: justify;">In the case of larger structures, good practice is not to manage objects (users, mailboxes, groups, SharePoint sites, etc.) directly in native portals. What is needed is an <strong>interface that allows all these objects to be managed, while taking into account the business logic and the target administration model</strong>. Below are three examples of interfaces:</p>
<ul style="text-align: justify;">
<li><strong>In-house development of a &#8220;Custom Automation Engine&#8221;</strong>: this interface will be decorrelated from the IAM and very often a large powershell / Graph API machine;</li>
<li><strong>Integration of a connector to the current IAM solution</strong> in order to present a complete management of the objects by disregarding their direct hosting;</li>
<li><strong>Investment in a SaaS Management Platform (SMP)</strong>: software publishers have specialised in the creation of management tools for Office 365, combining object administration, licence management and security and operational supervision functions. Among these solutions, which are still relatively unknown, are ManageEngine, CoreView and Quadrotech.</li>
</ul>
<p style="text-align: justify;">Please note: this interface, dedicated to support teams, will be distinct from an interface open to all users allowing them to centrally create guest users, SharePoint sites, Teams, etc. In concrete terms, this second interface could be integrated with ITSM tools, SMP or even be developed based on Power Apps and Graph API.</p>
<p style="text-align: justify;">
<h1 style="text-align: justify;">How to protect access to these accounts ?</h1>
<h2 style="text-align: justify;">10 measures to secure administration accounts</h2>
<h2 style="text-align: justify;">Depending on the security licenses, mainly the EMS bundle, Microsoft provides a number of controls to secure administration accounts.</h2>
<p style="text-align: justify;">Most of these could also be obtained via third-party tools.</p>
<h3 style="text-align: justify;">Basic measures to secure the administration account</h3>
<ol>
<li style="text-align: justify;"><strong>A dedicated administrator account</strong></li>
</ol>
<p style="text-align: justify;">An administrator must have an account dedicated to administration, different from the office automation account. It should be cloud-only where possible (e.g. wavestone.onmicrosoft.com).</p>
<ol style="text-align: justify;" start="2">
<li><strong>Multi-Factor Authentication</strong></li>
</ol>
<p style="text-align: justify;">Multi-factor authentication is no longer an option today, and even less so for administrators.</p>
<p style="text-align: justify;">This measure is available for everyone, for all licences:</p>
<ul style="text-align: justify;">
<li>Via MFA for Office 365 (also called MFA with per-person inheritance) which forces a challenge at every connection;</li>
<li>Via Security Defaults which forces an additional factor to be registered for all users and imposes the MFA for administrators at each login;</li>
</ul>
<p style="text-align: justify;">It is also important to ensure that <a href="https://docs.microsoft.com/en-en/azure/active-directory/conditional-access/block-legacy-authentication">legacy authentication protocols</a> that do not support MFA are disabled. These would allow single sign-on to be bypassed.</p>
<p style="text-align: justify;">It will also make sense to limit the types of additional factors available; what is the point of securing administration accounts if the second factor is the administrator&#8217;s Gmail address.</p>
<h3 style="text-align: justify;">Highly recommended security measures</h3>
<ol style="text-align: justify;" start="3">
<li><strong>Unlicensed Office 365 account</strong></li>
</ol>
<p style="text-align: justify;">Without a licence, it will not be possible for an administrator to access the different services and data of the platform, or to have a mailbox.</p>
<p style="text-align: justify;">Please note that some services, such as Power Apps or Power BI, require a licence to access the administration portal. In practice, it can be interesting to create a security group that allocates the necessary licences for administrators.</p>
<ol style="text-align: justify;" start="4">
<li><strong>Conditional Access (with Azure AD P1)</strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/conditional-access/overview">Conditional access</a> allows you to evaluate the context when accessing an Office 365 service and to authorise access accordingly. For example, access can be blocked depending on the type of workstation used (whether managed by the company or not), the network on which the user is connected, the application in question or the user&#8217;s administrative role.</p>
<p style="text-align: justify;">In a Zero Trust logic, there should be no differentiation between the internal and external network, especially for administrators, but rather focus on the status of the workstation and the risk of connection.</p>
<ol style="text-align: justify;" start="5">
<li><strong>Password Protection (with </strong><strong>Azure AD P1)</strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/authentication/concept-password-ban-bad-on-premises">Azure AD Password Protection</a> provides controls over passwords. It will thus be possible to prohibit the use of a current password or a derivative (with a list predefined by Microsoft or maintained by the organisation).</p>
<p style="text-align: justify;">A good practice is to apply this protection to all Cloud-only administration accounts as a minimum.</p>
<ol style="text-align: justify;" start="6">
<li><strong>Azure AD Identity Protection (with Azure AD P2)</strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/identity-protection/overview-identity-protection">Azure AD Identity Protection</a> adds a notion of risk in the evaluation of user access and behaviour. Concretely, it will be advisable to define the following policies;</p>
<ul style="text-align: justify;">
<li>Risky users: Force password change for an administrator likely to be compromised (with a Medium or High risk);</li>
<li>Risky sign-in: Forcing an MFA challenge during risky access (e.g. anonymous or unusual IP).</li>
</ul>
<ol style="text-align: justify;" start="7">
<li><strong>Azure AD Privileged Identity Management (with Azure AD P2): </strong></li>
</ol>
<p style="text-align: justify;"><a href="https://docs.microsoft.com/en-en/azure/active-directory/privileged-identity-management/">Azure AD Privileged Identity Management</a> is a service to control the assignment and use of administrative roles:</p>
<ul style="text-align: justify;">
<li>Allocate just-in-time rights by giving an eligible role instead of a permanent one;</li>
<li>Submit role activation to third party validation;</li>
<li>Set up an end date for an administrative role;</li>
<li>Force recertifications of administrators.</li>
</ul>
<p style="text-align: justify;">It will be relevant to distinguish the so-called sensitive roles from the others during implementation.</p>
<p style="text-align: justify;">The monitoring of eligible administrators allows, as a bonus, to become aware of the real use of administration rights and therefore to clean up the list of administrators more easily.</p>
<p style="text-align: justify;">It should be noted that the PIM functionalities have recently been <a href="https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/groups-features">extended to the different groups</a>, which makes it possible to set up &#8220;Just-in-time&#8221; for more <a href="https://techcommunity.microsoft.com/t5/microsoft-security-and/using-azure-pim-for-the-aip-super-user-feature-management/ba-p/1587690">exotic cases such as RMS / AIP Super-Users</a>.</p>
<h3 style="text-align: justify;">To go even further</h3>
<ol style="text-align: justify;" start="8">
<li><strong>Supervision of administrator actions to detect abnormal behaviour</strong></li>
</ol>
<p style="text-align: justify;">Once all these security measures are in place, all that remains is for you to implement supervision to detect non-compliance with the previous rules and abnormal behaviour.</p>
<p style="text-align: justify;">And for this, nothing better than to refer to <a href="https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/">our article</a> on the subject to understand the available logs.</p>
<ol style="text-align: justify;" start="9">
<li><strong>Setting up a Privileged Access Workstation</strong></li>
</ol>
<p style="text-align: justify;">Administration is by definition a critical action. It must be carried out within a perimeter of trust. The provision of <a href="https://docs.microsoft.com/en-en/windows-server/identity/securing-privileged-access/privileged-access-workstations">PAW, or administration post</a>, will enable us to achieve this objective.</p>
<p style="text-align: justify;">The configuration of the administration station should be simple (no local administration rights, restricted Internet browsing, blocked USB ports, pre-installed PowerShell modules, etc.). But restricting the connection of an Office 365 administrator from this workstation may cause more problems. There are several possibilities for this:</p>
<ul style="text-align: justify;">
<li>In a modern context, a simple answer is to rely on Microsoft tools: define an administration workstation profile in Intune and assign it to the administrators. With a conditional access rule, it is possible to require a compliant workstation when connecting.</li>
<li>In a more traditional model, it is possible to set up an <a href="https://docs.microsoft.com/en-en/windows-server/security/credentials-protection-and-management/authentication-policies-and-authentication-policy-silos">authentication silo</a> with administrators and associated workstations. In this way, we would have a model similar to the third-party model well known to AD teams.</li>
<li>Other approaches are also possible, even if more complex: association of a certificate and a reverse proxy or even a bastion.</li>
</ul>
<ol style="text-align: justify;" start="10">
<li><strong>Keep up to date with good practices and news </strong></li>
</ol>
<p style="text-align: justify;">It cannot be repeated often enough that Office 365 is a Cloud platform and is constantly evolving. Keeping up to date will continue to increase its level of security over time.</p>
<p style="text-align: justify;">
<figure id="post-14421 media-14421" class="align-none"><img decoding="async" class="aligncenter wp-image-14421 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1.png" alt="" width="1875" height="785" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1.png 1875w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-437x183.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-768x322.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/10/Image1-1-1536x643.png 1536w" sizes="(max-width: 1875px) 100vw, 1875px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; The security of accounts, measures that can be counted on the fingers of one hand</p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">Focus on glass breaking accounts</h2>
<p style="text-align: justify;">A good practice in the administration of the Microsoft platform is the setting up of administrator accounts that allow control over the platform to be regained in the event of an incident.  These are called glass-breaking accounts. These accounts should allow full control over the Office 365 tenant and are therefore assigned the role of Global Administrator.</p>
<p style="text-align: justify;">These accounts must be secure; however, we must not forget their specificity which consists in using them in the event of an incident. Thus, <strong>the security imposed on these accounts must remain compatible with the urgent nature of their use</strong>.  These accounts must therefore comply with the following recommendations:</p>
<ul style="text-align: justify;">
<li>To be cloud-only accounts</li>
<li>No MFA configured (or at least a third party MFA)</li>
<li>Storage of the password in a safe which only identified members of the security team or Office 365 can access</li>
<li>Setting up alerts to check that these accounts are not used outside of an incident procedure requiring the use of glass breakage.</li>
</ul>
<p style="text-align: justify;">It is also recommended not to use a specific naming convention for these accounts, they should not catch the eye of a possible attacker!</p>
<p style="text-align: justify;">
<h1 style="text-align: justify;">Conclusion</h1>
<p style="text-align: justify;">Security on Office 365 is based on technical measures to protect administrator accounts, as well as the implementation of a target administration model, which includes clear governance and processes, tools to implement this delegation of rights, and mechanisms to maintain it over time.</p>
<p style="text-align: justify;">But whatever protection measures are implemented, security rests first and foremost with the administrators of the solution. <strong>Awareness raising and controls for administrators will be essential</strong>.</p>
<p style="text-align: justify;">Administrators must bear in mind that their accounts give access to extremely sensitive information and actions: they are therefore the preferred target of hackers!</p>
<p style="text-align: justify;">As O365 is constantly evolving, each new feature introduced by Microsoft may also bring with it its share of security problems that need to be studied and taken into account. Take the opportunity to update your documentation: O365 risk analysis, service configuration, delegation model&#8230;always <strong>without forgetting to allow your administrators to train</strong>!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/how-to-manage-administration-in-microsoft-365/">How to manage administration in Microsoft 365?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Logging of Office 365: a Case Study with Administrators</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/</link>
		
		<dc:creator><![CDATA[Alexandre Mazars]]></dc:creator>
		<pubDate>Tue, 28 Apr 2020 09:27:54 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[security architecture]]></category>
		<category><![CDATA[security surveillance]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12982</guid>

					<description><![CDATA[<p>Migrations to Microsoft&#8217;s Digital Workplace platform, Office 365, are well advanced, if not already completed. It is now time to improve processes, but  above all, to secure them. Several topics must be addressed when securing Office 365  including the need...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/">Logging of Office 365: a Case Study with Administrators</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Migrations to Microsoft&#8217;s Digital Workplace platform, Office 365, are well advanced, if not already completed. It is now time to improve processes, but  above all, to secure them.</p>
<p style="text-align: justify;">Several topics must be addressed when securing Office 365  including the need to be able to track actions to detect illicit behaviour or trace the cause of an incident.</p>
<p style="text-align: justify;">In France, however, many companies have difficulty consolidating logs and defining supervision use cases. Mastering logging must be at the heart of this approach.</p>
<p>&nbsp;</p>
<h2>Supervision of administrative actions is a necessity</h2>
<p>For this logging decryption, let&#8217;s take the case of the platform administrators.</p>
<p>As with other SaaS solutions (Google Cloud Platform, Salesforce, etc.), <strong>the breach of data integrity or confidentiality following an error or malicious action by a company administrator is one of the major risks identified by our customers.</strong></p>
<p style="text-align: justify;">By definition, <strong>Office 365 administrators have high privileges</strong>:</p>
<ul style="text-align: justify;">
<li>Configuration of the various services &#8211; or workloads &#8211; and APIs;</li>
<li>Managing permissions on OneDrive and user mailboxes;</li>
<li>Management of the life cycle of collaboration spaces.</li>
</ul>
<p style="text-align: justify;">It is easy to imagine <strong>the disastrous consequences that could result from the malicious or uncontrolled use of these privileges</strong>. Indeed, settings such as SharePoint Online external sharing, API permissions or email configuration could become significant data leakage vectors.</p>
<p style="text-align: justify;"><strong>On-premise IT best-practices</strong> (lifecycle, least privilege principle, rights segmentation, strong authentication, just-in-time access, etc.) <strong>must also be applied in the Cloud</strong>. The Cloud must be mastered and controlled.</p>
<p style="text-align: justify;">However, the implementation of good practices, although necessary, is not enough. Indeed, they do not guarantee that  administrators won&#8217;t carry out actions that compromise the level of security. One can therefore naturally <strong>wonder how it would be possible to audit the actions carried out and raise alerts if necessary</strong>.</p>
<p style="text-align: justify;">What are the means provided by Microsoft? How can we prevent a malicious person from covering his tracks (which would make an attack more difficult to detect and reconstruct)?</p>
<p style="text-align: justify;">To illustrate the different possibilities, we will follow the four examples below:</p>
<p>&nbsp;</p>
<figure id="post-12987 media-12987" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12987 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1.png" alt="" width="1757" height="469" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1.png 1757w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-437x117.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-768x205.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1-1536x410.png 1536w" sizes="auto, (max-width: 1757px) 100vw, 1757px" /></figure>
<p style="text-align: center;">Figure 1 &#8211; Examples of configuration changes that may affect safety</p>
<p>&nbsp;</p>
<h2>What logs are available?</h2>
<p>For historical and technical reasons, Office 365 inherently has several log sources: <strong>Unified Audit Logs</strong>, <strong>Exchange Logs</strong> and <strong>Azure Logs</strong>. These sources are complementary and must be analysed together in order to have an exhaustive view of the administrative actions performed.</p>
<h3>Unified Audit Logs: unified logging of the different services</h3>
<p style="text-align: justify;">The most commonly cited and used source of logs is the “<a href="https://docs.microsoft.com/fr-fr/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance">Unified Audit Logs</a>”. These logs <strong>centralise the traces of users and administrators for all the platform&#8217;s services</strong>: SharePoint Online, Azure AD, Exchange Online, Teams, Power Platforms<strong>. Microsoft is progressively integrating the different sources and continues to add new logs</strong>.</p>
<p style="text-align: justify;"><em>To come back to our concrete examples, the interesting logs are:</em></p>
<ul style="text-align: justify;">
<li><em>SharePoint Online External Sharing Policy Change: SharingPolicyChanged</em></li>
<li><em>Assigning rights to a One Drive: SiteCollectionAdminAdded</em></li>
<li><em>Assigning rights to a mailbox: AddMailboxPermission</em></li>
<li><em>Changing an Administration Role: AddMembertoRole</em></li>
</ul>
<p style="text-align: justify;">These logs are accessible and exportable via the Compliance and Security Centers, the Office 365 Management and PowerShell APIs (via the <a href="https://docs.microsoft.com/fr-fr/powershell/module/exchange/policy-and-compliance-audit/search-unifiedauditlog?view=exchange-ps">Search-UnifiedAuditLog</a> cmdlet). Note that <strong>logging must be enabled</strong> via the Compliance Center or PowerShell to be able to log and search.</p>
<p style="text-align: justify;">It is possible to directly <strong>configure alerts related to the occurrence of certain logs</strong> in the Security and Compliance Centers.</p>
<h3>Exchange Logs: logging of the messaging infrastructure</h3>
<p>The second interesting source of logs is the &#8220;<a href="https://docs.microsoft.com/fr-fr/microsoft-365/compliance/enable-mailbox-auditing">Exchange Logs</a>&#8220;. These logs <strong>provide information about usage and administrative actions performed on the Exchange Online service as well as on personal or shared mailboxes</strong>. Two types of logs can be distinguished:</p>
<ul>
<li><strong>Administrator Audit Logs</strong>: Service or mailbox administration logs (e.g. changing a user&#8217;s permissions, changing the retention time of a mailbox log etc.).</li>
<li><strong>Mailbox Audit Logs</strong>: Logs of use of a mailbox by the main user, a delegated user or a service administrator (e.g.: accessing the mailbox, sending an email in place of the main user, moving an item into a folder, permanent deletion, etc.).</li>
</ul>
<p><em>To come back to our concrete examples, the logs that will interest us here are: </em></p>
<ul>
<li><em>Assigning rights to a mailbox: AddMailboxPermission</em></li>
<li><em>Access to a folder or a mailbox: FolderBind (not enabled by default): </em></li>
<li><em>Access to a mail: MailItemAccessed (only for users with an E5 license)</em></li>
</ul>
<p><strong>To go further with Administrator Audit Logs</strong></p>
<p style="text-align: justify;">Administrator Audit Logs are generated for any Exchange administration action that can be linked to a PowerShell cmdlet other than Get, Search or Test. These logs are linked to the Unified Logs and can be used in the Exchange Administration Center, Security and Compliance Centers, Office 365 Management and PowerShell APIs.</p>
<p><strong>To go further with Mailbox Audit Logs </strong></p>
<p>Mailbox Audit Logs are the only category of logs to be configurable (perimeter and granularity). These logs allow tracing of the actions performed by an owner, a delegate (user with permissions) and an admin (access via eDiscovery tools).</p>
<p>Since January 2019, the logging of Mailbox Audit Logs is enabled by default for all Office 365 tenants. To date, if logging is enabled by default, all mailboxes are audited (even if the &#8220;-AuditDisabled&#8221; parameter is set to &#8220;True&#8221;). The only way not to log the actions of a mailbox is to implement a by-pass rule with &#8220;Set-MailboxAuditBypassAssociation&#8221;.</p>
<p>However, it should be noted that some actions are not audited by default, such as the access of a delegate or an admin to a user&#8217;s mailbox. It is therefore essential to analyse the logs to be activated, during the initial configuration of the service.</p>
<p>Depending on the license level and configuration, these logs can be linked to the Unified Logs and be used in the Exchange Administration Center, the Office 365 Management and PowerShell APIs or the Security and Compliance Centers.</p>
<h3>Azure Logs and Reports: Azure Active Directory Logging</h3>
<p style="text-align: justify;">The last, but not least important source of logs are the “<a href="https://docs.microsoft.com/en-us/azure/active-directory/reports-monitoring/plan-monitoring-and-reporting">Azure AD logs</a>”. These logs <strong>provide complete traces of the Office 365 identity brick and the associated administration actions</strong>. Several categories of logs and reports are available:</p>
<ul style="text-align: justify;">
<li><strong>Azure Audit Logs</strong>: Logs for the administration of the identification brick or modification of items (e.g. assigning the &#8220;SharePoint Administrator&#8221; role, creating a security user or group, authorising an API, configuring guest users, etc.).</li>
<li><strong>Azure Sign-in Logs</strong>: Logs for connecting to an Office 365 service (or to applications / APIs based on Azure AD) with information regarding the connection chain (e.g. protocol, IP address, terminal, etc.).</li>
<li><strong>Risky Sign-in</strong>: Connection reports with indicators related to suspicious connections.</li>
</ul>
<p style="text-align: justify;">These logs and reports are accessible and exportable via the Azure portal, the Graph or Azure Management and PowerShell APIs. Some of the logs directly related to Office 365 are also found in the Unified Audit Logs.</p>
<p><em>To come back to our concrete examples, the interesting logs are:</em></p>
<ul>
<li><em>Modification of an administration role: AddMembertoRole</em></li>
</ul>
<figure id="post-12990 media-12990" class="align-none"><img loading="lazy" decoding="async" class="wp-image-13098 size-full aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2.png" alt="" width="1563" height="727" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2.png 1563w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-411x191.png 411w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-768x357.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-2-1536x714.png 1536w" sizes="auto, (max-width: 1563px) 100vw, 1563px" /></figure>
<p style="text-align: center;"><em>Figure 2 &#8211; Summary of Office 365 Logs Features</em></p>
<p>&nbsp;</p>
<p style="text-align: justify;">In summary, the Unified Audit Logs provide a consolidated view of the different services of Office 365, but some information may be missing. It will be necessary to ensure that the required logs are present, and then to investigate further into the logs and reports of Exchange or Azure.</p>
<p>&nbsp;</p>
<h1>What is the retention period for the various Office 365 logs?</h1>
<p style="text-align: justify;">Once the proper logs have been identified, the challenge of retention arises. How can you be sure that the logs are well preserved without being altered, for as long as is required by the company&#8217;s security policy and various regulations, such as the anti-terrorist law or the GDPR?</p>
<p style="text-align: justify;">By construction, and contrary to Exchange and SharePoint on-premise solutions, <strong>all the logs mentioned above are unalterable</strong> &#8211; that is to say, they cannot be modified or deleted by the company administrators. Furthermore, <strong>the default retention periods defined by default cannot be modified</strong> (i.e. 90 days for Office 365 and 7 logs or 30 days for Azure logs with standard licenses). <strong>With one exception, an Exchange administrator has the ability to delete the logs </strong>from mailboxes by changing the associated retention time.</p>
<p style="text-align: justify;"><em>If we go back to our examples, we could imagine a malicious administrator giving himself rights to access a mailbox, then look at the mails and erase the access logs by setting a zero-retention time. In this case, only the privilege elevation made in the Administrator Audit Logs would be retained.</em></p>
<p style="text-align: justify;"><strong>In order to comply with security or regulatory requirements</strong>, it may also be necessary to ensure that the logs of the various departments<strong> are</strong> <strong>kept for more than 7, 30 or 90 days.</strong></p>
<p><em> </em></p>
<h1>3 steps to implement relevant logging within Office 365</h1>
<ol>
<li style="text-align: justify;"><strong>Definition and activation of the necessary logs</strong>: Unified Audit Logs may not be sufficient (monitoring of the Office 365 and Azure AD APIs, logging of administrator access to mailboxes, etc.);</li>
<li style="text-align: justify;"><strong>Configuration of an automatic export of the identified logs</strong> to an external storage or an independent SIEM (via PowerShell or the API Management);</li>
<li style="text-align: justify;"><strong>Monitoring the status of the tenant</strong>: implementing a dashboard of the tenant&#8217;s settings configuring alerts related to a change in log configuration (via the Security or Compliance Center, the Office 365 Management or PowerShell APIs), such as disabling Unified logs or a change in the retention of mailbox logs.</li>
</ol>
<figure id="post-12992 media-12992" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12992 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1.png" alt="" width="1648" height="291" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1.png 1648w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-437x77.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-71x13.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-768x136.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1-1536x271.png 1536w" sizes="auto, (max-width: 1648px) 100vw, 1648px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; Good Practices for Office 365 Logging</p>
<p style="text-align: justify;">After carrying out these three actions, the company will have the necessary information to audit the tenant&#8217;s use and administration actions. However, this does not yet address the larger need for supervision of administrators. It may be useful to set up alerts (via the Security or Compliance Center or specialised third-party tools).</p>
<ol style="text-align: justify;">
<li><strong>(To go further) Implementation of basic supervision</strong>: definition of general security detection scenarios, identification of the logs concerned, activation of the associated alert in the Security or Compliance Centers;</li>
<li><strong>(To go even further) Setting up advanced supervision</strong>: identification of scenarios related to a business context, implementation, definition of the associated governance, continuous improvement.</li>
</ol>
<p style="text-align: justify;">What tools should be used to analyze the logs? Which detection scenarios should be prioritised? What governance should be put in place to define, implement and monitor alerts? These are all questions that need to be addressed in the implementation of the collaboration platform supervision.</p>
<p style="text-align: justify;">It will also be necessary to take into account the regular changes made by Microsoft on these services, as well as on the structure of logs and APIs, especially since the preview and general availability functionalities coexist.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/logging-of-office-365-a-case-study-with-administrators/">Logging of Office 365: a Case Study with Administrators</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A secure Office 365, a rare gem?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/12/a-secure-office-365-a-rare-gem/</link>
		
		<dc:creator><![CDATA[Alexandre Mazars]]></dc:creator>
		<pubDate>Thu, 05 Dec 2019 11:04:14 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IT transformation]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[security architecture]]></category>
		<category><![CDATA[use cases]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12226</guid>

					<description><![CDATA[<p>Since 2015, along with the digital transformation, we have seen the Digital and Modern Workplace topic taking a growing place. As a result, Microsoft Office 365 established itself as the leader on the French market (nearly 90% of the CAC...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/a-secure-office-365-a-rare-gem/">A secure Office 365, a rare gem?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Since 2015, along with the digital transformation, we have seen the Digital and Modern Workplace topic taking a growing place. As a result, Microsoft Office 365 established itself as the leader on the French market (nearly 90% of the CAC 40). Four years later, following recent high profile cyberattacks, the security topic is finally coming to the forefront after having been neglected for too long, in favor of migrations and adoptions of services.</p>
<p>This reflection should cover the main risks of data leakage and access to data by administrators, Microsoft and third parties or applications.</p>
<h2>A new governance model imposed by Microsoft</h2>
<p>Office 365 is a SaaS communication and collaboration solution. As such, the platform is constantly evolving, unlike the historical &#8220;on-premise&#8221; solutions: new features or settings appear and are modified, while others disappear (e.g. retirement of Skype for Business planned for 2021, July 31<sup>st</sup> and the end of legacy authentication support for Exchange Online <a href="https://developer.microsoft.com/en-us/office/blogs/end-of-support-for-basic-authentication-access-to-exchange-online-apis-for-office-365-customers/">planned for 2020</a>). <strong>This continuous delivery pace is imposed by Microsoft, without control. Hence, a completely new governance model is required.</strong></p>
<p>Changes integration can no longer be done in project mode. It must follow an established process. In this model, <strong>the workplace and security teams must work hand in hand</strong> and must be represented in all project and architecture committees, starting from the very beginning of the platform use cases design. These teams will also have a <strong>common responsibility</strong> to ensure the platform efficiency and regulatory compliance.</p>
<p><strong>The security team sees its perimeter evolving: it no longer has control over security tools</strong> and can, or even must, play a <em><strong>business enabler</strong></em> role to support the migration to the cloud by proposing new uses (e.g. opening a controlled external file exchange service). An appropriate organization must be put in place. We could even consider having a Security Officer dedicated to the platform very close to the business, with the role of advising projects, ensuring the platform configuration and monitoring security alerts.</p>
<p>Another topic to be addressed is the <strong>delegated administration</strong>.  Even though it is not a rare situation, it is not possible to have nearly 20 General Administrators for an O365 tenant. Indeed, a Global Admin has control over Office 365 services, but also Intune, Azure, AAD, etc. A delegated administration solution must be considered for user accounts and objects, through the implementation of an interface or a connector based on PowerShell or Graph API. This process should allow the company to manage all objects while considering business logic. To define this new governance model, the following security pillars must be articulated:</p>
<ul>
<li>Identity management ;</li>
<li>Mastery of services and uses ;</li>
<li>Control of compliance to company policies.</li>
</ul>
<h2>Identity management at the core of the model</h2>
<p>In a solution <strong>designed to enable internal or external collaboration</strong>, with an ATAWAD use (Any Time, Any Where, Any Device), <strong>identity management</strong> (and therefore authentication) <strong>is the core of platform management.</strong>  As with any project, the <strong>definition</strong> phase of who can access what, when and where is fundamental.</p>
<p>On Office 365, there are three types of users, each with different privilege levels: <strong>administrators, internal users and guests</strong> (external users invited to collaborate on a file or within an O365 Group or SharePoint site).</p>
<p>For each of these account types, implementing the defined security measures will be <strong>challenging</strong>. In addition to the unavoidable multi-factor authentication (highlighted by the data leak that affected Deloitte in 2017), there are also other essential issues, such as administrator access control (personalized or predefined roles, permanent or occasional access, etc.) and guest users lifecycle management (nothing being clearly defined by default). <strong>The cost of Azure AD Premium licenses or a third-party tool will be a major element of the discussion.</strong></p>
<p>Also note that <strong>Office 365 allows external applications to communicate with its APIs.</strong> The external application can then act on behalf of a user with its own rights or of an administrator with higher privileges. These applications can come from different application stores (such as AppSource or AAD) or be developed locally. The management of <strong>permissions granted to these applications</strong> must be highly considered by companies. Indeed, through APIs, it is very easy to imagine a massive data leak in case of a user dupe (e.g. an application requiring unnecessary permissions, such as email access).</p>
<h2>An essential but neglected control of services and uses</h2>
<p>Once access to Office 365 is under control, the next topic is to <strong>manage its use</strong>. It is not uncommon to observe that some <strong>services, not prioritized during migration to the Cloud</strong> (Power BI, Teams, Flow, API access, etc.) <strong>are left accessible with their default configuration.</strong> The two reasons are generally a focus on adoption and a lack of time devoted to these non-priority services. In addition to setting up the service, it is also essential to define precise rules around uses <strong>to clarify who can do what and when</strong> (e.g. managing SharePoint authorizations, creating Groups). The best solution consists in implementing technical measures (general settings or configuration via PowerShell) congruent with the defined policy.</p>
<p>However, the lack of security of these services leaves the door open to potential <strong>data leaks</strong>: automatic transfer to the outside, exposure on the Internet or loss of the data control. As written above, governance must take security into account when designing future uses. Services must be analyzed and tested on small populations. Indeed, <strong>it will always be easier to open a feature than to restrict an already widespread use.</strong> In that case, it will be necessary to carry out an impact analysis, to tinker with a workaround solution and to raise users’ awareness widely. However, these actions may require significant investment and could be avoided.</p>
<p>The management of the service should not end with user adoption. Security and Workplace teams will be responsible for <strong>following Office 365 evolution</strong> (Evergreen program, setting up a watch, monitoring Microsoft blogs, etc.) in order to assess new opportunities and threats.</p>
<h2>The control of the compliance with company policies</h2>
<p>The <strong>implementation of the company security policies</strong> is the last pillar and includes the implementation of security tools: information protection, anti-malware, supervision and alerting.</p>
<p>Concerning Office 365 security, we can differentiate 3 levels of maturity. The resources put in place will depend on the <strong>expertise available</strong> (resources being limited on the market) and the <strong>budget</strong> (depending in particular on the strategy of the Microsoft licensing management company):</p>
<ul>
<li><strong>Level 1 &#8211; Control of identities, services and use of the Security and Compliance Center: </strong>the company implements native Security Center and Compliance Center security solutions (including Office DLP, Exchange Online Protection, eDiscovery) accessible with basic licenses;</li>
<li><strong>Level 2 &#8211; Development of &#8220;in-house tools&#8221;: </strong>the company creates a set of simple scripts or dashboards, using Graph API, Security Graph API and PowerShell, to implement controls and security measures adapted to its context (e.g. life cycle management of guest users);</li>
<li><strong>Level 3 &#8211; Use of advanced security tools: </strong>the company implements additional solutions to strengthen the level of security: tools to fight data leaks, analyze malware on emails, review rights, detect abnormal behavior or even harden the use of the platform according to the context.</li>
</ul>
<p>Mastering Office 365 services, their uses and native security features is essential, and must precede any consideration of adding an additional security tool, which would not cover existing vulnerabilities and would only add complexity.</p>
<figure id="post-12228 media-12228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-12228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2.png" alt="" width="1349" height="757" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2.png 1349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2-768x431.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/12/Image-2-69x39.png 69w" sizes="auto, (max-width: 1349px) 100vw, 1349px" /></figure>
<p style="text-align: center;"><em>Sample of controls included in the Wavestone Office 365 Audit Methodology</em></p>
<h2>Conclusion</h2>
<p>Office 365 is an interesting case of opening business applications on the Internet through the Cloud. This evolution requires adapting the company historical security model, towards the <a href="https://www.wavestone.com/app/uploads/2017/07/generation-cybersecurity-model.pdf">airport model</a> following the Cloud adoption.</p>
<p>However, Office 365 security must not omit the security of the on-premise bricks necessary for the platform operation, as it is generally the case for the authentication that is carried out by ADFS.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/a-secure-office-365-a-rare-gem/">A secure Office 365, a rare gem?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Comment construire une stratégie digitale efficace ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2012/10/comment-construire-une-strategie-digitale-efficace-2/</link>
		
		<dc:creator><![CDATA[Alexandre Mazars]]></dc:creator>
		<pubDate>Tue, 02 Oct 2012 09:18:04 +0000</pubDate>
				<category><![CDATA[Métiers - Marketing et relation client]]></category>
		<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[fidélisation]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[réseaux sociaux]]></category>
		<category><![CDATA[stratégie digitale]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=2356</guid>

					<description><![CDATA[<p>Les grandes entreprises ayant compris l’intérêt de mener une stratégie digitale (réseaux sociaux, blogs, sites,…), ce dispositif y est donc de plus en plus intégré. Cependant, il est nécessaire d’en connaître les fondamentaux afin d’avoir une stratégie cohérente et efficace....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/10/comment-construire-une-strategie-digitale-efficace-2/">Comment construire une stratégie digitale efficace ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Les grandes entreprises ayant compris l’intérêt de mener une stratégie digitale (réseaux sociaux, blogs, sites,…), ce dispositif y est donc de plus en plus intégré. Cependant, il est nécessaire d’en connaître les fondamentaux afin d’avoir une stratégie cohérente et efficace.</p>
<div>
<h2>Un client digitalisé est avant tout un client… fidélisé !</h2>
</div>
<p>Ce sont les chiffres qui le disent : selon une récente étude InsightNow portant sur le système bancaire, les entreprises les plus investies sur la sphère digitale sont également celles qui fidélisent le plus leur base client.</p>
<p align="left">Mais ces résultats ne sont pas à proprement parler surprenants. L’intérêt des canaux digitaux pour l’entreprise dans la communication, la relation client, et même la co-construction d’offre s’est imposé comme une évidence ces dernières années.</p>
<p>Cela est plutôt révélateur de la nécessité de construire une stratégie digitale cohérente. L’objectif est de répondre à la question « Quelle est la valeur ajoutée du digital dans ma stratégie marketing ? »</p>
<p>Ainsi, plus cette stratégie sera en phase avec la stratégie marketing globale, plus elle sera efficace. En ce sens, il est toujours utile de rappeler qu’il est difficile de penser le digital complétement à part de la stratégie globale.</p>
<p>D’ailleurs les exemples de réussite de stratégie digitale complétement intégrée ne manquent pas : <a href="http://twitter.com/b_and_you" target="_blank">B&amp;You</a>, <a href="http://twitter.com/Sosh_fr" target="_blank">Sosh</a>, <a href="http://twitter.com/iDTGV" target="_blank">iDTGV</a>, …<strong>                       </strong><strong><br />
</strong></p>
<div>
<h2>Stop aux expérimentations</h2>
</div>
<p>En réalité, très rares sont les grandes structures qui ne prennent pas la parole sur les canaux digitaux. Un fil Twitter, une page Facebook, une FAQ interactive, un blog… Souvent de nombreuses briques sont déjà présentes coté client.</p>
<p>Malheureusement, il arrive parfois que tout cela soit mis en ligne avant même que les bases d’une stratégie digitale ne soient posées. En effet, en interne ces prises de parole peuvent être le fruit d’expérimentations, parfois par des entités internes de l’entreprise très différentes (communication, marketing, relation client, DSI, …). En vision client ces différences sont bien sûr invisibles et il est alors incompréhensible que le message ne soit pas unifié.</p>
<p>Les risques d’image et de fidélisation sont réels. Un message traité de manière différente sur un fil Twitter ou sur le canal téléphone peut provoquer une très mauvaise publicité, voire un départ du client. En outre, sans objectif, ces initiatives peuvent se révéler couteuses et non porteuses de valeur.</p>
<h2>Courage ! Passons du test au dispositif efficace !</h2>
<p>Pour faire simple, de nombreuses entreprises passent aujourd’hui de l’étape « il faut qu’on soit sur Facebook ! » à « que faire de ma visibilité acquise sur Facebook ? ».</p>
<p>Mais comment prendre le problème ?</p>
<p>Il est d’abord nécessaire de  faire un état des lieux précis de la vision client des tous ces dispositifs afin de rationaliser les prises de paroles et repositionner l’existant pour qu’il soit au service de la stratégie globale</p>
<p>Quelques règles génériques de bonnes pratiques permettent de transformer l’essai :</p>
<ul>
<li>Centraliser le pilotage des canaux digitaux ;</li>
<li>Repositionner les dispositifs pour qu’ils servent un ou plusieurs des enjeux de la stratégie marketing globale ;</li>
<li>Mettre en place de vrais indicateurs avec objectifs comme pour les canaux physiques ;</li>
<li>Mesurer l’apport réel de chaque canal à l’entreprise (vente, contacts commerciaux, image, …).</li>
</ul>
<p>&nbsp;</p>
<p>Enfin, gardez en tête qu’un dispositif digital est propre à chaque industrie et chaque entreprise.  Inutile donc de tenter de calquer une stratégie sur un concurrent !</p>
<p>Le temps montrera très certainement que les entreprises les plus innovantes, ayant traité ces enjeux digitaux avant leurs concurrents, auront gagné une vraie avance concurrentielle.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2012/10/comment-construire-une-strategie-digitale-efficace-2/">Comment construire une stratégie digitale efficace ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
