Office 365 provides security features to protect user data and credentials in the cloud, including:
1. Multi-factor authentication and conditional access policies that control user access based on conditions like device, location, and authentication method.
2. Tools like Azure Active Directory and Microsoft Cloud App Security that detect threats like phishing attacks, password spraying, and anomalous sign-in attempts from untrusted locations or devices.
3. Privileged identity management capabilities to enforce just-in-time administrative access and monitor privileged users and roles.
5. Sobering statistics
The frequency and sophistication of cybersecurity attacks are escalating
$6T
annual cost
of cybercrime to the
global economy
$3M
average cost of a
data breach to a
company
140+
median # days attackers
reside within a victim’s
network before
detection
network intrusions
due to compromised
user credentials
81%+
17. Access
granted
to data
Microsoft Enterprise Mobility + Security
Apps
Risk
MICROSOFT INTUNE
AZURE ACTIVE
DIRECTORY
MICROSOFT CLOUD
APP SECURITY
AZURE INFORMATION
PROTECTION
MICROSOFT ADVANCED
THREAT ANALYTICS
!
Device
!
CONDITIONAL
ACCESS
Location
Classify
Audit
Protect
Label
!
!
19. Privileged Identity Management
Enforce on-demand, just-in-time
administrative access when needed
Ensure policies are met with alerts,
audit reports and access reviews
Manage admins access in Azure AD
and also in Azure RBAC
User Administrator
Discover, restrict, and monitor privileged identities
UserAdministrator
privileges expire after
a specified interval
23. Identity Secure Score
Visibility into your Identity security position and how to improve it
Insights into your
Identity security position
Guidance to increase
your security level
Easily compare score against
other organizations
View trends
Set an ideal score.
Choose controls to achieve ideal score based on
impact.
Ignore controls that are not valid for you.
3rd party product support.
Checkout your Identity secure score now @ http://aka.ms/MyIdentitySecureScore
Own datacenter with firewall and everything was protected
It was all in own control or by trusted vendorAlles in eigen beheer of door lokale partij uitbesteed
Now that we are going into the cloud, how about that security
We are leaving the fort, who can access my data?
The user is the central point of protection, not the perimeter anymore
8
Azure AD P1
https://www.trusona.com/docs/azure-ad-integration-guide