In this inaugural sprint, we lay the foundation for our future defenses by focusing on key areas of our security strategy.
Fine-Tuning Application-Level #
We assess and secure the software applications used within our organization, ensuring their logs and data provide valuable insights into security incidents.
- Identify critical applications.
- Determine data types generated.
- Streamline logs from various sources.
- Utilize Third-party integrations and SecOperate connectors by Microsoft Sentinel.
- Develop custom scripts for data ingestion.
Securing Data at Its Core #
We focus on securing data assets, including Microsoft 365 services, Privileged Identity Management (PIM), Azure Information Protection, and Microsoft Sentinel.
Microsoft 365 Services #
- Assess data usage.
- Configure security and compliance settings.
- Monitor user activities and access.
Privileged Identity Management (PIM) #
- Identify and categorize privileged accounts.
- Implement role-based access control and just-in-time access.
- Monitor and audit privileged access.
Azure Information Protection #
- Classify data based on sensitivity.
- Apply encryption and access control policies.
- Monitor data usage and access.
Granular Identity Management #
We focus on securing user identities and access to organizational resources using Multi-Factor Authentication (MFA), Microsoft Sentinel, and others.
- Strengthened by MFA, Sentinel, Defender, and Entra ID.
Advanced Endpoint-Level Security Techniques #
We secure endpoints with services like Microsoft Intune, Azure AD, Conditional Access, and Defender for Endpoint.
- Microsoft Intune manages and secures devices.
- Azure AD authenticates users and devices.
- Conditional Access defines access control policies.
- Defender for Endpoint provides real-time threat protection.
Security at the Infrastructure Level #
We fortify infrastructure using PaaS services, Microsoft Sentinel, version control, and Just-In-Time (JIT) access.
- PaaS services provide a secure foundation.
- Sentinel monitors the entire infrastructure.
- Version control maintains change history.
- JIT access grants access dynamically.
Access Level | Key Contributions |
---|---|
JIT Access | Dynamic and proactive security by granting access to critical resources only when necessary and for the shortest. |
PaaS Services | Delivers Platform as a Service solutions for streamlined application development and deployment. |
This sprint comprehensively addresses the intricacies of implementing our solution, including initiating the data ingestion process from diverse sources.