Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (14.67 MB, 95 trang )
<span class="text_page_counter">Trang 1</span><div class="page_container" data-page="1">
<b>MCRA is a subset of the full Security Architecture Design Session (ADS) module 1 workshop:</b>
<b>CISO Workshop</b>
<i><b>Security Program and Strategy</b></i>
<i><small>End-to-end Security Program Guidance + Integration with Digital & Cloud Transformation Teams</small></i>
<b><small>Module 2 – Secure Identities and Access</small></b>
<b><small>Module 3 – Modern Security Operations (SecOps/SOC) </small></b>
<b><small>Module 4 – Infrastructure & Development Security</small></b>
<b><small>Module 5 – Data Security & Governance, Risk, Compliance (GRC)</small></b>
<b><small>Module 6 – IoT and OT Security</small></b>
<b>Security Architecture Design SessionModule 1 – Zero Trust Architecture and </b>
<b>Ransomware </b>
<b><small>1 - I want people to do their job securely from anywhere</small></b>
<b><small>2 - I want to minimize business damage from security incidents3 - I want to identify and protect critical business assets</small></b>
<b><small>4 - I want to proactively meet regulatory requirements</small></b>
<b><small>5 - I want to have confidence in my security posture and programs</small></b>
<i><small>Guiding North Star</small></i>
<b>Security Strategy and ProgramZero Trust Architecture</b>
<b>& Governance<sup>IoT and OT </sup>Security</b>
<i><b>Microsoft Cybersecurity Reference Architectures (MCRA)</b></i>
<i><small>Assess current plans, configurations, and operations for Microsoft security capabilities</small></i>
</div><span class="text_page_counter">Trang 8</span><div class="page_container" data-page="8"><i><small>Step by Step Instructions on Microsoft Docs site</small></i>
<i><small>Enables a Zero Trust transformation</small></i>
</div><span class="text_page_counter">Trang 9</span><div class="page_container" data-page="9"><i>Attempting to force on-prem controls and practices directly onto cloud resources</i>
<i>Treating security controls and processes as points in time instead of an ongoing lifecycle</i>
<i>Legacy system maintenance and costs draining ability to effectively secure business assets</i>
<i>Independent security teams, strategies, tech, and processes for network, identity, devices, etc.</i>
<i>Skipping backups, disaster recovery exercises, and software updates/patching on assets</i>
<i>Focused on custom manual solutions instead of automation and off the shelf tooling</i>
<i><b>Rapidly and effectively manage attacks</b></i>
<i>NIST Cybersecurity Framework v2</i>
<i><b>The job will never be ‘done’ or ‘perfect’, but it’s important to keep doing (like cleaning a house)</b></i>
</div><span class="text_page_counter">Trang 11</span><div class="page_container" data-page="11"><b>Zero Trust Architecture</b>
<i><b>Security Posture Management</b></i>
<i><b>Rapidly and effectively manage attacks</b></i>
<b>Infrastructure & Development SecurityIoT and OT Security</b>
<b>Modern Security Operations (SecOps/SOC) </b>
<b>Data Security & GovernanceSecure Identities and Access</b>
</div><span class="text_page_counter">Trang 12</span><div class="page_container" data-page="12"><i>A. Strong security controls + effective placement </i>
<i>B. Rapid response to attacks</i>
<i>C. Continuously testing & monitoring controls</i>
<i>A. Strong security controls + effective placement </i>
<i>B. Rapid response to attacks</i>
<i>C. Continuously testing & monitoring controls</i>
</div><span class="text_page_counter">Trang 13</span><div class="page_container" data-page="13"><i><b><small>Phishing email to admin</small></b></i>
<b><small>Looks like they have NGFW, IDS/IPS, and DLP</small></b>
<b><small>I bet their admins 1. Check email from </small></b>
<b><small>admin workstations2. Click on links for </small></b>
<b><small>higher paying jobs</small></b>
<i><b><small>Found passwords.xls</small></b></i>
<b><small>Now, let’s see if admins save service account passwords in a spreadsheet…</small></b>
<i><b><small>Replace password.xls ‘process’ with </small></b></i>
<small>•</small> <i><small>PIM/PAM</small></i>
<small>•</small> <i><small>Workload identities</small></i>
<i><b><small>Sensitive Data Protection & Monitoring</small></b></i>
<small>•</small> <i><small>Discover business critical assets with business, technology, and security teams</small></i>
<small>•</small> <i><small>Increase security protections and monitoring processes</small></i>
<small>•</small> <i><small>Encrypt data with Azure Information Protection</small></i>
<i><b><small>Modernize Security Operations</small></b></i>
<small>•</small> <i><small>Add XDR for identity, endpoint (EDR), cloud apps, and other paths</small></i>
<small>•</small> <i><small>Train SecOps analysts on endpoints and identity authentication flows</small></i>
<i><b><small>Protect Privileged Accounts</small></b></i>
<i><small>Require separate accounts for Admins and enforce MFA/passwordlessPrivileged Access Workstations (PAWs) + enforce with Conditional Access</small></i>
<i><b><small>Rigorous Security Hygiene</small></b></i>
<small>•</small> <i><small>Rapid Patching</small></i>
<small>•</small> <i><small>Secure Configuration</small></i>
<small>•</small> <i><small>Secure Operational Practices</small></i>
</div><span class="text_page_counter">Trang 15</span><div class="page_container" data-page="15"><b><small>InfrastructureApplicationData</small></b>
<i><b>Nothing gets retired!</b></i>
<small>Usually for fear of breaking something (& getting blamed)</small>
<b><small>‘Data swamp’ accumulates</small></b>
<i><small>managed data + unmanaged ‘dark’ data</small></i>
</div><span class="text_page_counter">Trang 16</span><div class="page_container" data-page="16"><b>Security is the opposite of productivityBusiness Enablement</b>
<i><small>Align security to the organization’s mission, priorities, risks, and processes</small></i>
<i><small>Continuously reduce blast radius and attack surface through prevention and detection/response/recovery</small></i>
<b>All attacks can be prevented</b>
<b>Shift to Asset-Centric Security Strategy</b>
<i><small>Revisit how to do access control, security operations, infrastructure and development security, and more</small></i>
<b>Shift to Asset-Centric Security Strategy</b>
<i><small>Revisit how to do access control, security operations, infrastructure and development security, and more</small></i>
<b>Explicitly Validate Account Security </b>
<i><small>Require MFA and analyze all user sessions with behavior analytics, threat intelligence, and more</small></i><b>Explicitly Validate Account Security </b>
<i><small>Require MFA and analyze all user sessions with behavior analytics, threat intelligence, and more</small></i>
<b>Network security perimeter will keep attackers outPasswords are strong enough</b>
<b>IT Admins are safeIT Infrastructure is safe</b>
<b>Developers always write secure codeThe software and components we use are secure</b>
<b>Plan and Execute Privileged Access Strategy</b>
<i><small>Establish security of accounts, workstations, and other privileged entities (aka.ms/spa)</small></i>
<b>Plan and Execute Privileged Access Strategy</b>
<i><small>Establish security of accounts, workstations, and other privileged entities (aka.ms/spa)</small></i>
<b>Validate Infrastructure Integrity</b>
<i><small>Explicitly validate trust of operating systems, applications, services accounts, and more</small></i>
<b>Validate Infrastructure Integrity</b>
<i><small>Explicitly validate trust of operating systems, applications, services accounts, and more</small></i>
<b>Integrate security into development process</b>
<i><small>Security education, issue detection and mitigation, response, and more</small></i>
<b>Integrate security into development process</b>
<i><small>Security education, issue detection and mitigation, response, and more</small></i>
<b>Supply chain security</b>
<i><small>Validate the integrity of software and hardware components from open source. vendors, and others</small></i>
<b>Supply chain security</b>
<i><small>Validate the integrity of software and hardware components from open source. vendors, and others</small></i>
<b><small>With 30+ years of backlog at most organizations, it will take a while to burn down the backlog of assumed trust</small><sup>With 30+ years of backlog at most organizations, it will </sup><small>take a while to burn down the backlog of assumed trust</small></b>
</div><span class="text_page_counter">Trang 17</span><div class="page_container" data-page="17"><b>Security Strategy and ProgramZero Trust Architecture</b>
<b>Security Documentation<small>aka.ms/SecurityDocs</small></b>
<b><small>▪ Rapidly modernize your security posture for Zero Trust▪ Secure remote and hybrid work with Zero Trust</small></b>
<b><small>▪ Identify and protect sensitive business data with Zero Trust▪ Meet regulatory and compliance requirements with Zero Trust</small></b>
<b>Zero Trust Architecture</b>
<small>•</small> <b><small>Microsoft Cybersecurity Reference Architectures (MCRA)- aka.ms/MCRA| -videos</small></b>
<small>•</small> <b><small>Zero Trust Deployment Guidance -aka.ms/ztguide| aka.ms/ztramp</small></b>
<small>•</small> <b><small>Ransomware and Extortion Mitigation -aka.ms/humanoperated</small></b>
<small>•</small> <b><small>Backup and restore plan to protect against ransomware -aka.ms/backup</small></b>
<b>Secure Identities and </b>
<b><small>Product Capabilities</small></b>
<b><small>www.microsoft.com/security/business</small></b> <sup>•</sup> <b><sup>Security Product Documentation </sup><small>Azure| Microsoft 365</small><sup>Microsoft Security Response Center (MSRC)</sup><small>www.microsoft.com/en-us/msrc</small></b>
<small>•</small> <b><small>Microsoft Cloud Security </small></b>
<small>•</small> <b><small>Defender for Cloud Documentation</small></b>
<small>•</small> <b><small>Securing Privileged Access (SPA) </small></b>
<small>•</small> <b><small>Zero Trust User Access</small></b>
<small>•</small> <b><small>Microsoft Entra Documentation</small></b>
<small>•</small> <b><small>Incident Response -aka.ms/IR</small></b>
<small>•</small> <b><small>CDOC Case Study -aka.ms/ITSOC</small></b>
<small>•</small> <b><small>Insider Risk Management</small></b>
<small>•</small> <b><small>Microsoft Purview Documentation</small></b>
<small>•</small> <b><small>Ninja Training</small></b>
<small>•</small> <b><small>Defender for IoT Training</small></b>
<small>•</small> <b><small>MCRA Videos</small></b>
<small>•</small> <b><small>MCRA Video OT & IIoT Security</small></b>
<small>•</small> <b><small>Defender for IoT Documentation</small></b>
<b><small>aka.ms/D4IoTDocs</small></b>
</div><span class="text_page_counter">Trang 29</span><div class="page_container" data-page="29"><b>Infrastructure & </b>
<b>Development Security<sup>IoT and OT </sup>SecurityOperations <sup>Modern Security </sup><small>(SecOps/SOC) </small></b>
<b>Data Security & Governance</b>
<b>Zero Trust Architecture</b>
<b>Secure Identities and Access</b>
Align security to the organization’s mission, priorities, risks, and processes
Assume attackers can and will successfully attack anything (identity, network, device, app, infrastructure, etc.) and plan accordingly
Protect assets against attacker control by explicitly validating that all trust and security decisions use all relevant available information and telemetry.
Limit access of a potentially compromised asset, typically with in-time and just-enough-access (JIT/JEA) and risk-based polices like adaptive access control.
</div><span class="text_page_counter">Trang 32</span><div class="page_container" data-page="32">Limit access of a potentially compromised asset, typically with in-time and just-enough-access (JIT/JEA) and risk-based polices like adaptive access control.
Limit access of a potentially compromised asset, typically with in-time and just-enough-access (JIT/JEA) and risk-based polices like adaptive access control.
<b><small>Asset/Node = account, app, device, VM, container, data, API, etc.</small></b>
Protect assets against attacker control by explicitly validating that all trust and security decisions use all relevant available information and telemetry.
Protect assets against attacker control by explicitly validating that all trust and security decisions use all relevant available information and telemetry.
Align security to the organization’s mission, priorities, risks, and processes
Align security to the organization’s mission, priorities, risks, and processes
Assume attackers can and will successfully attack anything (identity, network, device, app, infrastructure, etc.) and plan accordingly
Assume attackers can and will successfully attack anything (identity, network, device, app, infrastructure, etc.) and plan accordingly
</div><span class="text_page_counter">Trang 33</span><div class="page_container" data-page="33"><i><small>backups, service accounts and privileges that control other systems/services, etc.</small></i>
<b><small>Asset-centric protections Automated threat response</small></b>
<b><small>Asset–centric detection and response (XDR)End to end visibility (SIEM)</small></b>
<b><small>Threat modelling</small></b>
<i><b>All elements informed by threat and business intelligence, assisted by security engineering/automation</b></i>
<b><small>Posture Management</small></b>
<i><small>Continuous improvement of security posture and </small></i>
<small>Classify assets and apply controls per asset type and classification (CA policies, encryption, monitoring, detection, response etc.)</small>
<small>Risk-based polices Always make security decisions using all available data points, including identity, location, device health, resource, data classification, and anomalies. </small>
<b><small>Just-in-time & Just-enough-access (JIT/JEA) </small></b>
<b><small>Cloud Infrastructure Entitlement Management (CIEM)</small></b>
<b><small>Micro-segmentation </small></b>
<i>Reduce blast radius both proactive and reactively</i>
<i>Reduce attack surface and exposure to risk</i>
<i>General strategy shift from ‘assume safe network’</i>
<b><small>Privileged Access Workstations (PAWs) </small></b>
<i><small>For SOC Analysts, IT Admins, and business critical assets</small></i>
<b><small>Secure AccessService Edge (SASE)</small></b>
<b><small>DevSecOps and CI/CD process integration </small></b>
<i><small>of best practices (Static and dynamic analysis, etc.)</small></i>
<i><b>(Data-Centric & System-Centric)</b></i>
<small>Classification, Protection, Tokenization</small> Digital Ecosystems
<b><small>Defender for Endpoint</small></b>
<i><small>Endpoint Detection and </small></i>
<b><small>Defender for IdentityDefender for Cloud AppsDefender for CloudDefender for EndpointDefender for Office 365</small></b>
<b><small>Security telemetry from across the environment Microsoft </small></b>
<b><small>65+ Trillion signals per day of security context65+ Trillion signals per day of security context</small></b>
<b><small>GitHub Advanced Security & Azure DevOps Security</small></b>
<small>Secure development and software supply chain</small>
<b><small>Entra Internet AccessEntra Private Access</small></b>
<b><small>Defender for Cloud</small></b>
</div><span class="text_page_counter">Trang 40</span><div class="page_container" data-page="40"><b><small>Workstations</small><sup>Virtual Desktops</sup></b>
<b><small>Policy Enforcement / Admin (PE/PA)</small></b>
<b><small>Defender for Endpoint</small></b>
<i><small>Endpoint Detection and </small></i>
<b><small>Defender Application Guard</small></b>
<i><b><small>Infrastructure & Access</small></b></i>
<b><small>ON-PREM APPS & WORKLOADS</small></b>
<i><b><small>DatabaseFile shareStorage</small></b></i>
<b><small>CLOUD APPS & WORKLOADS</small></b>
<b><small>Defender for IdentityDefender for Cloud AppsDefender for CloudDefender for EndpointDefender for Office 365</small></b>
<b><small>Security telemetry from across the environment </small></b>
<b><small>Entra ID</small></b>
<b><small>Entra ID Governance</small></b>
<b><small>Grant Access </small></b>
<i><b><small>Software Defined Perimeter(SDP)</small></b></i>
<b><small>Policy Enforcement Point (PEP)</small></b>
<b><small>Entra ID</small></b>
<small>Conditional Access</small>
<i><b><small>Entra Internet Access</small></b></i>
<i><b><small>Feedback mechanisms enable continuous improvement</small></b></i>
</div>