Microsoft 365 Security Analysis

Analysis and assessment of the security posture in a Microsoft 365 environment

Improsec delivers an independent security analysis and assessment, providing management and the IT security organization with a clear overview of the basic security controls implemented in Microsoft 365 compared to vendor best practices.

Value

  • Analysis and assessment of the security posture in a Microsoft 365 environment

  • An evaluation of asset and resource security misconfigurations

  • Manage the risks associated with adoption and utilization of Microsoft 365

  • Ensure policies, security controls, and modern security perimeter configurations are implemented according to requirements

  • Enhance and improve security to protect the Microsoft 365 environment

Method

The security assessment is, among other recognized resources, based on Cloud Security Alliance’s (CSA) “Security Guidance for Critical Areas of Focus in Cloud Computing”, and “CIS Microsoft 365 Foundations Benchmark”. In addition, Microsoft best practice descriptions, guidelines and whitepapers are used in conjunction with the above benchmarking framework, combined with our personal expertise, and tailored to your specific setup and configuration of the deployed Microsoft 365 environment.

The assessment includes evaluation of:

  • Service misconfigurations (OneDrive, SharePoint, Exchange etc.)

  • Access controls and user permissions (internal / external)

  • Protection of information and data in shared storage solutions

  • Logging, monitoring, and alerting

  • Utilization and configuration of security solutions

  • Collaboration settings and configuration

  • Proper modern security perimeter usage (Conditional Access)

  • Utilization of least privilege targeting security principals

Product

The deliverable of the analysis is a written report containing the following:

  • A non-technical section with an Executive Summary for management and decision makers

  • A technical section including detailed observations and tangible recommendations to strengthen the level of security and recommendations on how hardening can be applied

Involvement

The delivery requires minimal involvement of your technical staff.