Тёмный

Understanding Microsoft's Security stack 

Covenant Global
Подписаться 7
Просмотров 22
50% 1

Shel Philips: Hi, everyone, Shel Philips here. It's great to see you again. As always, I'm on a mission to shed light on the complex world of cybersecurity, particularly focusing on CMMC and compliance methodologies. Today, I'm excited to have one of my good buddies from Covenant Global with me. He’s the technical yin to my compliance yang, Mike Hughes, our CTO. We often call him "Mike-rosoft Expert." Welcome, Mike!
Mike Hughes: Thanks, Shel. Happy to be here.
Shel Philips: Today, we’re diving into cybersecurity stacks. So, Mike, let's start with the basics. What is a security stack, and why does Covenant Global prefer Microsoft?
Mike Hughes: Great question, Shel. A security stack encompasses all the components that protect your data, applications, user accounts, and devices. It's essentially about data protection. At Covenant Global, we've focused on the Microsoft security stack because it provides an integrated solution. Over the past 20 years, we've evolved from piecing together various components to adopting Microsoft's comprehensive security stack about five years ago. This shift has simplified training, management, and response to security events.
Shel Philips: Interesting. Can you elaborate on the components of this Microsoft security stack?
Mike Hughes: Sure thing. Key components include:
1. Identity Management: Tools like Windows Active Directory and Azure Active Directory help manage access controls and security groups.
2. Device Protection: Protecting against vulnerabilities on devices and applications, managed by tools like Intune.
3. Endpoint Management: Ensuring devices are patched and secure is especially important in a mobile workforce.
4. Data Protection: Classifying and encrypting data, whether on-premise or in the cloud, using Microsoft's indexing and classification tools.
5. Logging and Telemetry: Tools like Defender for Endpoint provide extensive logging and vulnerability management.
These components are designed to work seamlessly together, providing robust protection across the board.
Shel Philips: That’s a lot of information, Mike. What about licensing? How does one ensure they are properly licensed to meet CMMC requirements?
Mike Hughes: That's a good question. Licensing can be complex, but for CMMC compliance, we recommend the Microsoft 365 G5 license. This package includes all necessary components, such as Intune, Defender for Endpoint, and advanced identity protection. For frontline workers who have lighter needs, the F3 plus F5 Security and Compliance licenses are a cost-effective option. Choosing the right licenses is crucial to ensure proper coverage and compliance.
Shel Philips: Thanks for breaking that down. Can you explain what "hardening" the stack means and how Covenant Global approaches it?
Mike Hughes: Absolutely. Hardening the stack involves configuring your environment to meet compliance requirements, such as those outlined in NIST 171. This includes securing user identities, devices, and emails, as well as using tools like Intune and Defender to enforce security policies. Our approach at Covenant Global involves a comprehensive process we call Fortify, which covers over 600 aspects of Microsoft 365 security. This ensures our clients' environments are robust and compliant.
Shel Philips: Thanks, Mike. And that brings us to the importance of using Microsoft for a greater security posture. Understanding Microsoft's Security Stack for CMMC Compliance is crucial for any organization aiming to enhance its cybersecurity. The stack encompasses all components to protect your data perimeter, access, and user accounts.
Key Aspects of Microsoft's Security Stack:
- Intune: Mobile device management that ensures devices are secure and compliant, especially in a remote work environment.
- Defender for Endpoint: Provides endpoint protection and telemetry, helping to identify and mitigate threats.
- Azure Sentinel: Advanced logging and threat detection to monitor and respond to potential security incidents.
Licensing Recommendations:
- Microsoft 365 G5: Recommended for back office users, including all necessary compliance and protection features.
- F3 plus F5 Security and Compliance: A cost-effective option for frontline workers with lighter needs but still require robust security.
Hardening the Security Stack:
Hardening involves configuring identity, device, email, and data protection using tools like Intune and Defender. It also requires operational processes to manage the environment properly. Covenant Global's Fortify process, which covers over 600 aspects of Microsoft 365 security, ensures that environments are not only compliant but also highly secure.
Shel Philips: That’s a brainful, Mike! It looks like we're out of time, but I appreciate you sharing your expertise. We’ll definitely need to dive deeper in future sessions. Thanks, Mike. And thank you, everyone, for joining us. Stay tuned for more insights on cybersecurity and compliance. Until next time!

Опубликовано:

 

13 май 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
First Day at Microsoft! *Unboxing*
9:37
Просмотров 3 млн
Why I Quit the Scrum Alliance
7:58
Просмотров 5 тыс.
IEC 60601 explained by Leo Eisner (Medical Devices)
31:10
What Type of Shoes Are Best for Foot Health?
13:29
Просмотров 48 тыс.
What is RabbitMQ?
10:10
Просмотров 305 тыс.