Вы находитесь на странице: 1из 55

Identify Protect Detect Respond

Mapping Microsoft Cyber Offerings to: NIST Cybersecurity (CSF),


CIS Controls and ISO27001:2013 Frameworks

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 1


Identify Protect Detect Respond

The NIST Cybersecurity Framework (CSF) is a voluntary Framework For this document, we referenced the NIST CSF for Improving Critical
consisting of standards, guidelines, and best practices to manage Infrastructure Cybersecurity version 1.0 from February 2014, Center
cybersecurity-related risk. The Framework complements an for Internet Security Controls1 and ISO 27001:2013. Note: the two latter
organization’s risk management process and cybersecurity program. standards had already been mapped by NIST2. What we provide in this
The organization can use its current processes and leverage the document is information and guidance on:
Framework to identify opportunities to strengthen and communicate its
• Microsoft Cyber Offerings that can help an organization meet the
management of cybersecurity risk while aligning with industry practices.
security functions
Alternatively, an organization without an existing cybersecurity
program can use the Framework as a reference to establish one. Just • Certain functions that should be fulfilled by the implementing
as the Framework is not industry-specific, the common taxonomy organization utilizing either internal resources or third parties
of standards, guidelines, and practices that it provides also is not
In the table below, we have included four out of the five NIST CSF Core
country-specific. Organizations outside the United States may also
Functions (Identify, Protect, Detect, Respond and Recover) from the
use the Framework to strengthen their own cybersecurity efforts, and
NIST CSF for which Microsoft Cyber Offerings can help. These offerings
the Framework can contribute to developing a common language for
can help organizations with 70 of the 98 subcategories. Under the
international cooperation on critical infrastructure cybersecurity.
column “Microsoft Cyber Offerings that Help”, the resources (hyperlinks)
listed reflect product information and how-to documentation.
Where no offering is shown, the activity should be covered by the
implementing organization utilizing internal resources or third parties.
For Microsoft partners, that white space is the opportunity to step in
and provide much needed services.

1
Formerly known as Council on CyberSecurity Critical Security Controls (CCS CSC)
2
Alternative View: Appendix A - Framework Core Informative References: https://www.nist.gov/sites/default/files/documents/itl/alternative-view-framework-core-021214.pdf

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 2


Identify Protect Detect Respond

ID.AM: Asset Management


The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with
their relative importance to business objectives and the organization’s risk strategy.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.AM-1 1 A.8.1.1, System Center Configuration Manager Inventory – for fully Inventory devices and systems
A.8.1.2 managed devices (both Microsoft and non-
Physical devices and
systems within the Active Directory (AD) – Domain Joined Devices Microsoft such as iOS, Mac OS
organization are inventoried X, Android).
Azure AD Registered Devices
IoT Hub – Device Identity Registry
Microsoft Intune Device Inventory – for lightly managed devices
Windows Analytics

ID.AM-2 2 A.8.1.1, Software Inventory with System Center Configuration Manager Inventory software platforms
Software platforms and A.8.1.2 Microsoft Intune Device Inventory – for lightly managed devices and apps (both Microsoft and
applications within the non-Microsoft).
Azure Subscription Inventory and Analysis – MSIT Showcase
organization are inventoried
Windows Server 2016 – Software Inventory Logging
Windows Server 2016 – Software Restriction Policies
Shadow IT/SaaS App Discovery with Cloud App Security (CAS)

ID.AM-3 1 A.13.2.1 Shadow IT/SaaS App Discovery with Cloud App Security Automatically discover, map
Organizational communication Service Map solution in Azure and monitor various data flows
and data flows are mapped (cloud apps usage, Network
Azure Network Watcher
Security Groups, IP filtering, and
Azure Network Security Groups – ACLs application components on
Azure IoT Hub IP Filtering systems, administrative activity)
Enhanced Security Administrative Environment (ESAE) and map communication
between services.
Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 3
Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.AM-4 A.11.2.6 Azure AD Integrated Apps Maintain accountability of


External information Shadow IT/SaaS App Discovery with Cloud App Security users’ access and usage of
systems are catalogued SaaS apps.

ID.AM-5 A.8.2.1 Azure Information Protection (AIP) – Data Classification Enable data classification,
Resources (e.g., hardware, Privileged Access Reference Material secure privileged access, and
devices, data, and software) the ability to manage, control,
Azure AD Privileged Identity Management
are prioritized based on their and monitor access to Azure
classification, criticality, and and Azure AD resources and
business value other online services (e.g.
Office 365 or Intune).

ID.AM-6 A.6.1.1 Privileged Access Reference Material Define roles and


Cybersecurity roles and Azure AD Privileged Identity Management responsibilities (e.g. related
responsibilities for the entire to privileged access)
Just Enough Administration
workforce and third-party across Azure and Windows
Just in Time Administration – Privileged Access Management environments, to prevent
stakeholders (e.g., suppliers,
customers, partners) credential theft and to
are established safeguard sensitive resources
and data.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 4


Identify Protect Detect Respond

ID.BE: Business Environment


The organization’s mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles,
responsibilities, and risk management decisions.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.BE-1 A.15.1.3, Privileged Access Workstation Define, communicate as


A.15.2.1, Design and Implementation for Active Directory (DIAD) needed, and centrally store
The organization’s role in
A.15.2.2 and manage information
the supply chain is identified
about organization’s users’
and communicated
roles (including their
privileges).
ID.BE-2
The organization’s place in
critical infrastructure and its
industry sector is identified
and communicated

ID.BE-3
Priorities for organizational
mission, objectives, and
activities are established
and communicated

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 5


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.BE-4 A.11.2.2,
Dependencies and critical A.11.2.3,
functions for delivery of critical A.12.1.3
services are established
ID.BE-5 A.11.1.4, Designing Resilient Applications for Microsoft Azure Define resilience
Resilience requirements to A.17.1.1, requirements to support
support delivery of critical A.17.1.2, building and delivery of
services are established applications/services in Azure.
A.17.2.1

ID.GV: Governance
The policies, procedures, and processes to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements
are understood and inform the management of cybersecurity risk.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.GV-1 A.5.1.1
Organizational information
security policy is established

ID.GV-2 A.6.1.1, Azure – Shared Responsibility Microsoft and its customers


Information security roles & A.7.2.1 Microsoft Incident Response and Shared Responsibility have certain information
responsibilities are coordinated security roles and
and aligned with internal roles responsibilities that must
and external partners be coordinated and aligned
for successful outcomes for
the organization.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 6


Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.GV-3 A.18.1 Microsoft Compliance Offerings Microsoft itself as a


CAS – third-party risk evaluation and known certifications technology solutions provider
Legal and regulatory
adheres to legal, data privacy
requirements regarding Microsoft and General Data Protection Regulation (GDPR)
and regulatory/compliance
cybersecurity, including privacy
Microsoft Compliance Manager requirements regarding
and civil liberties obligations,
Privacy with Microsoft cybersecurity and enables
are understood and managed
customers to do the same.

ID.GV-4 Microsoft Cloud Services Risk Assessment Microsoft cloud services have
implemented security and
Governance and risk
privacy controls. If desired,
management processes address
customers can perform risk
cybersecurity risks
assessment of the services to
assess compliance.

ID.RA: Risk Assessment


The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational
assets, and individuals.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.RA-1 4 A.12.6.1, Vulnerability Assessment in Azure Security Center Microsoft offers tools and
Asset vulnerabilities are A.18.2.3 Office 365 Secure Score services to help identify
identified and documented and report /document
AD Risk Assessment
vulnerabilities across assets on
Microsoft Cloud Services Risk Assessment premise and in the cloud.
PAW
DIAD

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 7


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.RA-2 A.6.1.4 Microsoft Security Intelligence Microsoft analyzes many


Threat and vulnerability Azure Log Analytics billions of data points
information is received from monthly, building intelligence
information sharing forums and on threats and vulnerabilities
sources which is then used to actively
protect the information of
enterprises and customers.
ID.RA-3 Microsoft Threat Modeling Tool Microsoft provides various
Threats, both internal and Microsoft Threat Management tools, products and services
external, are identified and to help organizations identify
Azure Log Analytics
documented (detect) and document
(report on), protect and
respond to threats.

ID.RA-4
Potential business impacts and
likelihoods are identified

ID.RA-5 A.12.6.1 Cybersecurity Operations Service Microsoft provides proactive


Threats, vulnerabilities, analysis (including detection
likelihoods, and impacts are of threats and vulnerabilities)
used to determine risk by incident response experts
to determine likelihoods to
determine risk.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 8


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.RA-6 Cybersecurity Operations Service Microsoft provides proactive


Risk responses are identified analysis (including detection
and prioritized of threats and vulnerabilities)
by incident response experts
to determine likelihoods to
determine risk.

ID.RM: Risk Management Strategy


The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.RM-1 Cybersecurity Risk Review service - contact the Microsoft Services Whether your orgnaization
team to learn more has suffered a data loss
Risk management processes
are established, managed, incident or is planning a
and agreed to by major security improvement
organizational stakeholders program, the Cybersecurity
Risk Review (CRR) service
can help. It is an assessment
that helps your organization
understand the current
security environment across
technical, organizational, and
operational controls.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 9


Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

ID.RM-2 Cybersecurity Risk Review Service - contact the Microsoft Services The Cybersecurity Risk Review
team to learn more (CRR) service is an assessment
Organizational risk tolerance is
determined and clearly expressed that helps your organization
understand the current
ID.RM-3
security environment across
The organization’s
technical, organizational, and
determination of risk tolerance
operational controls.
is informed by its role in critical
infrastructure and sector
specific risk analysis

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 10


Identify Protect Detect Respond

PR.AC: Protect (PR) Access Control


Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AC-1 16 A.9.2.1, Best Practices for Securing AD Microsoft offers tools,


Identities and credentials A.9.2.2, Microsoft Identity Manager: Connect your Directories products and services for
are managed for authorized A.9.2.4, managing identities and
Connect AD with Azure AD
devices and users credentials for authorized
A.9.3.1,
Azure AD – Group Management devices and users (e.g.
A.9.4.2,
Automated User Provisioning and Deprovisioning to SaaS Apps privileged accounts).
A.9.4.3
Azure AD Join (Devices)
Enroll devices for management in Microsoft Intune
Control Access to Azure IoT Hub
Azure IoT Hub – Device Identity Registry
Azure AD Privileged Identity Management
Privileged Access Management for AD Domain Services
PAW
DIAD
Azure AD B2C
Fast Start – Azure for Identity
Dynamic Identity Framework (DIF)
ESAE
Microsoft Identity Manager Implementation Services

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 11


Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AC-1 continued 16 A.9.2.1, Privileged Access Management Microsoft offers tools,


Identities and credentials A.9.2.2, Azure AD Implementation Services (AADIS) products and services for
are managed for authorized A.9.2.4, managing identities and
Enterprise Modernization for AD
devices and users credentials for authorized
A.9.3.1,
devices and users (e.g.
A.9.4.2,
privileged accounts).
A.9.4.3
PR.AC-2 A.11.1.1, Protecting Data in Azure (Page 23, Physical Security) Microsoft provides
Physical access to assets is A.11.1.2, PAW protections for Azure
managed and protected A.11.1.4, (e.g. employs rigorous
DIAD
operations and processes
A.11.1.6,
to prevent unauthorized
A.11.2.3
access, Azure nodes
physically protected, and so
forth), hardens dedicated
physical workstations used
by administrators and for
Active Directory, offers a
service engagement for
deployment of read-only
domain controllers (RODCs)
for locations where physical
security cannot be guaranteed.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 12


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AC-3 A.6.2.2 Conditional Access in Azure AD Microsoft security services


Remote access is managed A.13.1.1, Remote Desktop Services in Server 2016 enable control over and
A.13.2.1 management of remote access
Server 2016: Web Application Proxy
(to applications and data)
Secure Remote Access to on-premises applications: in support of security and
Azure AD App Proxy compliance requirements.
Azure Security – Remote Management
CAS – Cloud App Governance and Control
Device Compliance Policies for Conditional Access
PAW
DIAD

PR.AC-4 12, 15 A.6.1.2, Just Enough Administration (PowerShell - White Paper Microsoft offers the ability
Access permissions are A.9.1.2, and Resources) to define access control
managed, incorporating the A.9.2.3, policies based on a just
Just Enough Administration: Step by Step
principles of least privilege enough administration
A.9.4.1, Windows Server: Dynamic Access Control
and separation of duties approach, role based access
A.9.4.4 control and privileged
Microsoft Azure: Role Based Access Control
access management for
Azure AD Privileged Identity Management
managing access permissions,
Privileged Access Management for AD Domain Services incorporating the principles of
PAW least privilege and separation
DIAD of duties.

ESAE

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 13


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AC-5 A.13.1.1, Microsoft Azure: Secure network with virtual appliances Microsoft has spent more
Network integrity is A.13.1.3, Microsoft Cloud Services and Network Security than two years establishing
protected, incorporating A.13.2.1 secure, isolated environments,
Azure Network Security Best Practices
network segregation credential management
Azure Network Security Whitepaper services and policies, and
where appropriate
PAW secure admin workstations to
help protect mission-critical
DIAD
systems and services—
ESAE including those used to
manage cloud services, like
Azure. And, Microsoft has a
comprehensive approach to
protect cloud infrastructure
needed to run hyper-scale
global services. Microsoft
cloud infrastructure includes
hardware, software, networks,
and administrative and
operations staff, in addition to
the physical data centers.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 14


Identify Protect Detect Respond

PR.AT: Awareness and Training


The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-
related duties and responsibilities consistent with related policies, procedures, and agreements

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AT-1 9 A.7.2.2 ESAE Cyber-attackers have been


successful at rapidly gaining
All users are informed
administrative access to
and trained
corporate and government
computing environments.
At minimum, organizations
must inform and train all
users on cybersecurity.
To help secure without
impeding administrators, the
Microsoft Enhanced Security
Administrative Environment
(ESAE) service utilizes
advanced technologies and
recommended practices to
provide an administrative
environment and
workstations with enhanced
security protection.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 15


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AT-2 9 A.6.1.1, ESAE Credential hygiene is the


A.7.2.2 recommended practice of
Privileged users understand
verifying that privileged
roles & responsibilities
accounts only log on to
workstations and servers
that are sufficiently trusted
and do not perform
high-risk activities. The
Microsoft Enhanced Security
Administrative Environment
(ESAE) service enforces
credential hygiene by
separating administrative
accounts from normal
user accounts (for email
and web browsing) and
compartmentalizing logon
access for each type of
administrative account.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 16


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AT-3 9 A.6.1.1, ESAE Third-party stakeholders


A.7.2.2 must understand their
Third-party stakeholders
roles and responsibilities
(e.g., suppliers, customers,
regarding access to
partners) understand roles &
corporate resources and
responsibilities
data. To help thwart a critical
element of credential theft
attacks—the inadvertent
exposure of administrative
credentials—the Microsoft
Enhanced Security
Administrative Environment
(ESAE) service utilizes
advanced technologies and
recommended practices to
provide an administrative
environment and
workstations with enhanced
security protection.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 17


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AT-4 9 A.6.1.1, ESAE Senior executives, due to


A.7.2.2 the overly sensitive nature
Senior executives understand
of intellectual property
roles & responsibilities
and insider knowledge
on corporate strategy
and financial data they
have at their disposal, are
a highly valuable target
for cyberattacks, and,
particularly, credential
theft attacks. This makes
it imperative for them to
understand their roles and
responsibilities regarding
access to corporate resources
and data. To help thwart a
critical element of credential
theft attacks—the inadvertent
exposure of administrative
credentials—the Microsoft
Enhanced Security
Administrative Environment
(ESAE) service utilizes
advanced technologies and
recommended practices to
provide an administrative
environment and
workstations with enhanced
security protection.
Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 18
Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.AT-5 9 A.6.1.1, ESAE Physical and information


A.7.2.2 security personnel, based
Physical and information
on their very roles, must
security personnel
understand and take very
understand roles &
seriously their responsibilities
responsibilities
related to protecting systems,
applications and data.
Credential theft attacks can
be particularly concerning.
To help thwart a critical
element of credential theft
attacks—the inadvertent
exposure of administrative
credentials—the Microsoft
Enhanced Security
Administrative Environment
(ESAE) service utilizes
advanced technologies and
recommended practices to
provide an administrative
environment and
workstations with enhanced
security protection.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 19


Identify Protect Detect Respond

PR.DS: Data Security


Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.DS-1 17 A.8.2.3 Windows Server 2016: Full disk Encryption with BitLocker – Microsoft offers encryption
Data-at-rest is protected How to install and data backup solutions
within its on premise (e.g.
Windows 10 Full disk encryption – BitLocker
Windows server, Windows 10
Shielded VMs in Windows Server 2016 device) and cloud (e.g. Azure,
Azure disk encryption for IaaS VMs Office 365) offerings and
services to protect data-at-rest.
Azure Storage Service Encryption for data at rest
Azure Storage Security Guide
SQL Server Encryption
AIP – File Classification and Protection
Windows Information Protection
Encryption in Office 365
Azure Backup Data Encryption
Microsoft Trust Center – Encryption
Secure Mobile Devices with Microsoft Intune
CAS – Govern Connected SaaS apps
Azure SQL Transparent Data Encryption
PAW | ESAE | DIAD | AIP
Full Volume Encryption – Windows BitLocker Drive Encryption

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 20


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.DS-2 17 A.8.2.3, Azure VPN Gateway Microsoft offers encryption


Data-at-rest is protected A.13.1.1, Azure ExpressRoute solutions and services (for
A.13.2.1, Azure cloud and cloud
Office 365 Message Encryption
services such as Office 365,
A.13.2.3,
Data Encryption in OneDrive for Business and Sharepoint Online OneDrive for Business) to
A.14.1.2,
SMB Encryption protect data-in-transit.
A.14.1.3
Remote Desktop Protocol Encryption
Encrypting Connections to SQL Server
Microsoft Trust Center – Encryption
Internet Protocol Security (IPSec)
ESAE

PR.DS-3 A.8.2.3, Protecting Data in Azure (Page 18, Media Destruction) Microsoft enables data
Assets are formally managed A.8.3.1, ESAE management in Azure,
throughout removal, A.8.3.2, and Microsoft Enhanced
transfers, and disposition Security Administrative
A.8.3.3,
Environment (ESAE) service
A.11.2.7
enables improved security
and management of
administrative accounts
across the lifecycle (removal,
transfers and disposition).

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 21


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.DS-4 A.12.3.1 Azure Subscription Service Limits Microsoft offers options to


Adequate capacity to ensure Server 2016 Locks and Limits adjust the capacity of resources
availability is maintained within Azure/SQL Server 2016
Exchange Online Limits
or higher to ensure availability.
SQL Server 2016 Limits

PR.DS-5 17 A.6.1.2, Office 365 Data Loss Prevention (DLP) Microsoft data loss prevention,
Protections against data A.7.1.1, Windows Information Protection information protection
leaks are implemented A.7.1.2, and credential theft attack
Microsoft CAS and DLP
prevention capabilities built
A.7.3.1,
Microsoft Intune Mobile Application Management and DLP into various products and
A.8.2.2,
ESAE services help protect against
A.8.2.3, data leaks.
A.9.1.1,
A.9.1.2,
A.9.2.3,
A.9.4.1,
A.9.4.4,
A.9.4.5,
A.13.1.3,
A.13.2.1,
A.13.2.3,
A.13.2.4,
A.14.1.2,
A.14.1.3

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 22


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.DS-6 A.12.2.1, Windows Device Guard Microsoft performs integrity


Integrity checking A.12.5.1 Introduction to Code Signing checking to verify software
mechanisms are used to and firmware and information
Signing PowerShell scripts, Part 1
verify software, firmware, and integrity for products. It
Signing PowerShell scripts, Part 2 also offers built-in security
information integrity
Deploying code integrity policies with Windows Defender features to maintain integrity.
For instance, Device Guard
Application Control (WDAC)
helps keep a Windows 10
ESAE device from running malware
or other untrusted apps.
Furthermore, Microsoft
offers input on code signing
for determining integrity of
software, provides instructions
on signing PowerShell Scripts,
WDAC provides control over
a computer running Windows
10 by specifying whether a
driver or application is trusted
and can be run, and ESAE
service helps with credential
theft-based attacks.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 23


Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.DS-7 A.12.1.4 Azure DevTest Labs Microsoft provides Azure-


The development and Use DevOps environments effectively for your web apps based tools for testing only,
testing environment(s) are input on setting up staging
MSDN/Visual Studio subscription (Dev/Test tools, licenses, and
separate from the production environments in Azure App
cloud services) Service, and setting up staging
environment
ESAE environments in Azure App
Service, development tools
for MSDN/Visual Studio,
and the Enhanced Security
Administrative Environment
(ESAE) service that enforces
credential hygiene by separating
administrative accounts from
normal user accounts (for
email and web browsing)
and compartmentalizing
logon access for each type of
administrative account.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 24


Identify Protect Detect Respond

PR.IP: Information Protection Processes and Procedures


Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes,
and procedures are maintained and used to manage protection of information systems and assets.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.IP-1 3, 10 A.12.1.2, Windows Security Baseline Microsoft offers security


A baseline configuration of A.12.5.1 Azure Automation Desired State Configuration baselines for various
information technology/ information technology
PowerShell Desired State Configuration
industrial control systems is products. A security baseline
Compliance Settings in SCCM is a group of Microsoft-
created and maintained
Change Tracking with Log Analytics recommended configuration
settings that explains their
Azure Security Center – Common Configuration Identifiers and
security impact. These settings
Baseline Rules are based on feedback from
Continuous Assurance with Secure DevOps Kit for Azure Microsoft security engineering
(AzSDK) teams, product groups,
partners, and customers.
PAW
ESAE
DIAD

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 25


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.IP-2 A.6.1.5, Microsoft Security Development Lifecycle The Microsoft Security


A System Development Life A.14.1.1, Security Development Lifecycle Tools Development Lifecycle (SDL)
Cycle to manage systems is A.14.2.1, is a software development
Secure Development with AzSDK
implemented process that helps developers
A.14.2.5
build more secure software
and address security
compliance requirements
while reducing development
cost. Microsoft offers several
SDL tools to developers.

PR.IP-3 A.12.1.2, Change Management for Enterprise: Office 365 Microsoft offers advice
Configuration change control A.12.5.1, Configuring Change and Activity Management with System on organizational change
processes are in place A.12.6.2, management for an
Center Service Manager
enterprise, which focuses on
A.14.2.2,
How Microsoft IT approaches Organization Change the people side of change:
A.14.2.3,
Management how people’s behaviors
A.14.2.4 influence operational changes,
Managing Changes and Activities with System Center
and how changes impact the
intended audience. Microsoft
also offers some controls
within product (System
Center) for operational
change management, which
focuses on the physical aspect
of a change, for example,
infrastructure, software,
hardware, or environmental
changes.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 26


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.IP-4 A.12.3.1, System Center Data Protection Manager Microsoft offers the ability
Backups of information are A.17.1.2, Azure Backup to perform backups of
conducted, maintained, and A.17.1.3, information. Furthermore, the
ESAE
tested periodically Microsoft Enhanced Security
A.18.1.3
Administrative Environment
(ESAE) solution may be
deployed to protect all
administrative accounts or
only higher privilege domain
administrator accounts. These
accounts typically have access
to information that should
be periodically backed up
to prevent compromise
and/or loss.

PR.IP-5 A.11.1.4, Azure Security, Privacy, and Compliance Whitepaper Microsoft Azure and
Policy and regulations A.11.2.1 Office 365 have been built
regarding the physical A.11.2.2 with security, privacy and
operating environment for compliance with regulations
A.11.2.3
organizational assets are met in mind.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 27


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.IP-5 continued A.11.1.4, Security and Compliance in Office 365 Azure code development
Policy and regulations A.11.2.1 ESAE adheres to Microsoft’s Security
regarding the physical A.11.2.2 Development Lifecycle (SDL).
operating environment for Managing security and
A.11.2.3
organizational assets are met compliance is a partnership. The
organization using Microsoft
services such as Office 365
is responsible for protecting
data, identities, and devices,
while Microsoft vigorously
protects Office 365 services.
Microsoft offers several tips and
recommendations on how to
achieve the appropriate level of
protection for your organization.
Furthermore, the Microsoft
Enhanced Security Administrative
Environment (ESAE) solution
may be deployed to protect
all administrative accounts or
only higher privilege domain
administrator accounts. These
accounts typically access sensitive
organizational assets to which
access should be regulated.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 28


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.IP-6 A.8.2.3, Retention Policies in Office 365 Compliance Center Microsoft offers options
Data is destroyed according A.8.3.1, Protecting Data in Microsoft Azure (See Media Destruction and in Office 365 and Azure to
to policy A.8.3.2, destroy (delete) data (virtually/
Data Deletion)
physically stored) based on
A.11.2.7
security policy.

PR.IP-7 Office 365 Secure Score Microsoft enables tools and


Protection processes are Microsoft Enterprise Cloud Red Teaming (PDF download) tips for assessing the security
continuously improved posture of an organization
Penetration testing of your Azure hosted Applications
against best practice security
controls and measures.
Microsoft also offers rules
of engagement to perform
penetration testing of the
Microsoft cloud should an
organization so desire to do
so. This information can help
an organization continuously
assess and improve its
protection processes.

PR.IP-8 A.16.1.6
Effectiveness of protection
technologies is shared with
appropriate parties

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 29


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.IP-9 A.16.1.1, Microsoft Azure Security Response in the Cloud Microsoft offers incident
Response plans (Incident A.17.1.1, Office 365 Security Incident Management response controls in Azure,
Response and Business A.17.1.2 Office 365 and Windows
Windows Defender ATP – response actions
Continuity) and recovery plans Defender Advanced Threat
Responding to IT Security Incidents Protection. Microsoft also
(Incident Recovery and Disaster
Recovery) are in place and Azure Site Recovery offers advice on responding
managed to security incidents and a
Cybersecurity Operations Service
pre-incident response service
called Cybersecurity Operations
Service in which the Microsoft
Detection and Response
team will provide the strategic
guidance needed to properly
harden environments against
advanced and
persistent attacks.

PR.IP-10 A.17.1.3 Test Failover to Azure in Site Recovery Microsoft offers the option to
Response and recovery plans run a disaster recovery drill
are tested to Azure.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 30


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.IP-11 A.7.1.1,
Cybersecurity is included in A.7.3.1,
human resources practices A.8.1.4
(e.g., deprovisioning,
personnel screening)
PR.IP-12 A.12.6.1, Vulnerability Assessment in Azure Security Center Microsoft checks if VMs in Azure
A vulnerability management A.18.2.2 Vulnerabilities detected by Azure AD Identity Protection are running a vulnerability
plan is developed and assessment solution, Azure
SCCM Vulnerability Assessment
implemented Active Directory Identity
Protection detects and reports
on vulnerabilities (e.g. MFA
registration not configured,
unmanaged cloud apps)
and SCCM Vulnerability
Assessment allows you to scan
managed systems for common
missing security updates and
misconfigurations which might
make client computers more
vulnerable to attack.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 31


Identify Protect Detect Respond

PR.MA: Maintenance
Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.MA-1 A.11.1.2, Windows Automatic Maintenance Microsoft offers automatic


Maintenance and repair A.11.2.4, Azure Security and Audit Log Management maintenance for Windows that
of organizational assets is A.11.2.5 helps maintain the health and
performed and logged in a performance of a Windows PC.
timely manner, with approved The security logs in Microsoft
and controlled tools Azure Cloud Services (which
provides Platform as a
Service or PaaS) and Virtual
Machines (which provides
Infrastructure as a Service or
IaaS) contain vital information
that can provide intelligence
and powerful insights into
the following security issues:
policy violations, internal and
external threats, regulatory
compliance and network, host,
and user activity anomalies.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 32


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.MA-2 A.11.2.4, Azure AD B2B Microsoft has tools and services


Remote maintenance of A.15.1.1, Azure Security and Audit Log Management for ensuring only authorized
organizational assets is approved, A.15.2.1 access to organizational assets
PAW
logged, and performed (e.g. apps and data, including
ESAE credentials).
in a manner that prevents
unauthorized access DIAD

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 33


Identify Protect Detect Respond

PR.PT: Protective Technology


Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.PT-1 14 A.12.4.1, Azure Security and Audit Log Management Microsoft builds audit/log
Audit/log records are A.12.4.2, Microsoft Azure log integration and Security Information and records for Azure, Azure AD,
determined, documented, A.12.4.3, Office 365, Cloud App Security,
Event Management (SIEM) systems
implemented, and reviewed SQL Server, and Dynamics.
A.12.4.4,
Office 365 Audit logs
in accordance with policy A.12.7.1
Azure log analytics
AD Auditing
Windows Server 2016 Security Auditing
AIP Logging
CAS – Governance and Audit for Microsoft and 3rd party SaaS apps
CAS SIEM integration
SQL Server Audit
Microsoft Dynamics Auditing Overview
PAW
DIAD

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 34


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.PT-2 A.8.2.2, BitLocker Policy reference – Windows 10 (Removable Drive Microsoft enables controls for
Removable media is A.8.2.3, section) securing against removable
protected and its use A.8.3.1, media based cyber threats,
Control Access to Removable Media (Group Policy)
restricted according to policy preventing data compromise
A.8.3.3,
Full Volume Encryption – Windows BitLocker Drive Encryption from decommissioned
A.11.2.9
computers and other purposes.

PR.PT-3 A.9.1.2 Application Whitelisting with Configuration Manager and Microsoft offers capabilities in
Access to systems and assets Windows 10 Windows 10, Server 2016 and
is controlled, incorporating through services (PAW, ESAE,
AppLocker: Application Whitelisting
the principle of least DIAD) to enable controlled
Server 2016 Hardening Guideline access to systems and assets
functionality
PAW (e.g. devices and apps).
ESAE
DIAD

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 35


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

PR.PT-4 7 A.13.1.1, Creating and using network isolated environments (System When you create a SCVMM
Communications and control A.13.2.1 Center Virtual Machine Manager or SCVMM, Hyper-V) environment, you can enable
networks are protected network isolation, which
Introduction to Server and Domain Isolation (reference)
allows you to run multiple
Azure Network Security Whitepaper identical copies (or “clones”)
PAW of the environment. With the
Microsoft Windows operating
ESAE
systems (Windows Server 2008
DIAD and Vista), you can isolate your
domain and server resources
to limit access to authenticated
and authorized computers.
For Azure, each deployment
can be isolated from the other
deployments at the network
level. Each virtual network is
isolated from the other virtual
networks. Additionally, some
Microsoft services (PAW, ESAE,
DIAD) enable controlled access.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 36


Identify Protect Detect Respond

DE.AE: Anomalies and Events


Anomalous activity is detected in a timely manner and the potential impact of events is understood.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.AE-1 Advanced Threat Analytics (See question regarding baseline) When relevant, Microsoft
A baseline of network Advanced Threat Analytics Implementation Services (ATAIS) products and services help
operations and expected data with establishing a baseline for
Microsoft CAS – Anomaly Detection – SaaS Apps
flows for users and systems is cyber security operations and
Office 365 CAS – Anomaly Detection expected data flows for users
established and managed
Azure Security Center – see Anomaly Detection and systems. With Microsoft
Advanced Threat Analytics,
PAW
there is no need to create rules,
DIAD thresholds, or baselines and
then fine-tune. ATA analyzes
the behaviors among users,
devices, and resources—as
well as their relationship to
one another—and can detect
suspicious activity and known
attacks fast. With Microsoft
Cloud App Security and Office
365 Cloud App Security, the
anomaly detection policies
are automatically enabled,

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 37


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.AE-1 continued Advanced Threat Analytics (See question regarding baseline) but Cloud App Security has
A baseline of network Advanced Threat Analytics Implementation Services (ATAIS) an initial learning period of
operations and expected data seven days during which not
Microsoft CAS – Anomaly Detection – SaaS Apps
flows for users and systems is all anomaly detection alerts
Office 365 CAS – Anomaly Detection are raised. After that, each
established and managed
Azure Security Center – see Anomaly Detection session is compared to the
activity, when users were active,
PAW
IP addresses, devices, etc.
DIAD detected over the past month
and the risk score of these
activities. These detections
are part of the heuristic
anomaly detection engine that
profiles your environment and
triggers alerts with respect to
a baseline that was learned on
your organization’s activity.
With Microsoft Azure Security
Center, anomaly detection uses
statistical profiling to build a
historical baseline. It alerts on
deviations from established
baselines that conform to
a potential attack vector.
Additionally, some Microsoft
services (PAW and DIAD)
enable controlled access based
on users and roles (privileges).

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 38


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.AE-2 A.16.1.1, Azure Log Analytics - Log Searches Microsoft has various tools
Detected events are analyzed A.16.1.4 Advanced Threat Analytics – working with suspicious activities and services for searching
to understand attack targets logs, as well as analyzing
Advanced Threat Analytics Implementation Services (ATAIS)
and methods suspicious activities. Microsoft
Services help organizations
get the most out of their
investment in threat
detection services through
preparation, design, and the
implementation of Microsoft
Advanced Threat Analytics
(ATA), including assistance
with reviewing events that
are identified by ATA after
installation to help address
false positive events.
DE.AE-3 Azure Log Analytics - Log Searches
Event data are aggregated Advanced Threat Analytics – SIEM integration
and correlated from multiple Advanced Threat Analytics Implementation Services (ATAIS)
sources and sensors
Azure logs – SIEM integration
SIEM integration – CAS
PAW
DIAD
ESAE

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 39


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.AE-4 Azure AD Risk Events Discovering compromised


Impact of events is Cybersecurity Operations Service identities is no easy task.
determined Azure Active Directory uses
adaptive machine learning
algorithms and heuristics
to detect suspicious actions
related to user accounts
and each action is stored in
a record called risk event.
The Microsoft Cybersecurity
Operations Service is a pre-
incident response service
in which the Microsoft
Detection and Response team
will provide the strategic
guidance needed to properly
harden environments
against advanced and
persistent attacks.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 40


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.AE-5 Creating alert rules in Log Analytics Microsoft offers capabilities


Incident alert thresholds are Office 365 – creating security and audit alerts and services for establishing
established alert thresholds based on user
Azure AD Privileged Identity Management – Creating Alerts
activity (suspicious, unsafe),
Azure AD Risk Events breaches, devices (infected),
Azure Security Center – managing alerts risky cloud apps, an IP address,
and/or other criteria.
CAS – Control cloud apps with policies (fine tuning thresholds)
Advanced Threat Analytics – working with suspicious activities
Advanced Threat Analytics Implementation Services (ATAIS)
PAW
DIAD
Cybersecurity Operations Service

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 41


Identify Protect Detect Respond

DE.CM: Security Continuous Monitoring


The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.CM-1 14, 16 Azure Log Analytics Microsoft provided capabilities


The network is monitored to Index of Security related information from SCOM for detection of potential
detect potential cybersecurity cybersecurity events in
Advanced Threat Analytics – Events Detected
events products such as Azure
Advanced Threat Analytics Implementation Services (ATAIS) Log Analytics (manage and
Azure Network Security protect on-premises and
cloud infrastructure), SCOM,
Advanced Threat Analytics
(detect the following various
phases of an advanced
attack: reconnaissance,
credential compromise,
lateral movement, privilege
escalation, domain dominance,
and others), Azure network
security functions like DDoS
defense system that is
part of Azure’s continuous
monitoring process, and is
continually improved through
penetration-testing. Azure’s
DDoS defense system is
designed to not only withstand
attacks from the outside, but
also from other Azure tenants.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 42


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.CM-2 Azure Security and Compliance (See Infrastructure Protection Azure runs in geographically
section) distributed Microsoft facilities,
The physical environment
each designed to run 24x7x365
monitored to detect potential
and employs various measures
cybersecurity events
to help protect operations
from power failure, physical
intrusion, and network
outages. These datacenters
comply with industry standards
(such as ISO 27001) for physical
security and availability and
are managed, monitored, and
administered by Microsoft
operations personnel.

DE.CM-3 A.12.4.1 Microsoft CAS – Anomaly Detection – SaaS Apps Microsoft Cloud App Security
Personnel activity is Azure Events – Audit Logs monitors anomalous personnel
monitored to detect potential user activity related to cloud
O365 – Audit Logging
cybersecurity events apps to detect potential
Windows Security Audit Events cybersecurity events. For
Azure, the Audit Logs provides
a view of many of the events
that occurred against the
subscription (who has access,
what kind of access, and
who gained/lost access). For
Office 365, the Audit logs can
be used to search for event

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 43


Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.CM-3 continued A.12.4.1 Microsoft CAS – Anomaly Detection – SaaS Apps information (date and time
Personnel activity is Azure Events – Audit Logs when event occurred, device IP
monitored to detect potential address, user who performed
O365 – Audit Logging
cybersecurity events action that triggered the vent,
Windows Security Audit Events user activity, item created
or modified (if applicable)
and detail) for investigation
purposes. For Windows, the
security and system logs can
be used to record and store
collected security events so
that an administrator can
track key system and network
activities to monitor potentially
harmful behaviors and to
mitigate those risks.

DE.CM-4 5 A.12.2.1 Office 365 Advanced Threat Protection (ATP) Microsoft offers products
Malicious code is detected Windows Defender Advanced Threat Protection (ATP) and services for detection of
unsafe attachments, malicious
Antimalware for Azure Services and VMs
links, malware or unwanted
System Center – Endpoint Protection software attempting to install
Microsoft Intune: Protecting Windows PCs against malware or run on Azure systems.
When System Center 2012
threats
Endpoint Protection is used
with Microsoft System Center
2012 Configuration Manager.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 44


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.CM-4 continued 5 A.12.2.1 Office 365 Advanced Threat Protection (ATP) it provides a comprehensive
Malicious code is detected Windows Defender Advanced Threat Protection (ATP) enterprise management
solution that lets an
Antimalware for Azure Services and VMs
organization do several things,
System Center – Endpoint Protection including configuring default
Microsoft Intune: Protecting Windows PCs against malware and custom antimalware
policies that apply to groups
threats
of computers. Microsoft Intune
can help an organization
quickly protect and monitor
managed Windows PCs against
malware threats.

DE.CM-5 A.12.5.1 Blacklisting/whitelisting apps for KNOX Microsoft offers blacklisting of


Unauthorized mobile code Blacklisting/whitelisting apps on iOS with Intune mobile apps (blocking them on
is detected the device).
Compliant/noncompliant apps on Android with Intune

DE.CM-6 A.14.2.7, Microsoft Incident Response in the Cloud (see Customer For Azure services, if during
External service provider A.15.2.1 Security Incident Notification section) the investigation of a security
activity is monitored to detect event, Microsoft becomes
potential cybersecurity events aware that customer data has
been accessed by an unlawful
or unauthorized party, the
security incident manager will
immediately begin execution
of the Customer Security
Incident Notification Process.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 45


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.CM-7 Microsoft Azure AD: Conditional Access Microsoft offers built-in


Monitoring for unauthorized Advanced Threat Analytics: Threats Detected capabilities for Azure AD,
personnel, connections, devices, Advanced Threat Analytics
Advanced Threat Analytics Implementation Services (ATAIS)
and software is performed and Windows to monitor
AppLocker Overview – Application Auditing/Restrictions for unauthorized personnel,
Windows Security Audit Events connections, devices, and
software (e.g. applications).

DE.CM-8 A.12.6.1 Vulnerability Assessment in Azure Security Center The vulnerability assessment
Vulnerability scans are SCCM Vulnerability Assessment in Azure Security Center
performed is part of the Security
Scan cloud application (Azure resources) for continuous
Center virtual machine
assurance with AzSDK (VM) recommendations. If
Security Center doesn’t find
a vulnerability assessment
solution installed on your
VM, it recommends that you
install one. SCCM Vulnerability
Assessment allows scanning
managed systems for common
missing security updates and
misconfigurations which might
make client computers more
vulnerable to attack. It is also
possible to perform scanning
of Azure workloads using
Secure DevOps Kit for Azure.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 46


Identify Protect Detect Respond

DE.DP: Detection Processes


Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.DP-1 5 A.6.1.1
Roles and responsibilities for
detection are well defined to
ensure accountability

DE.DP-2 A.18.1.4
Detection activities
comply with all applicable
requirements

DE.DP-3 A.14.2.8 Microsoft Cloud – Red Teaming (Blog and link to whitepaper) To help combat emerging
Detection processes are tested threats, Microsoft employs
an innovative Assume Breach
strategy and leverages highly
specialized groups of security
experts, known as the Red
Team, to strengthen threat
detection, response and
defense for its enterprise
cloud services.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 47


Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

DE.DP-4 A.16.1.2
Event detection information
is communicated to
appropriate parties

DE.DP-5 A.16.1.6 Azure AD Identity Protection (See section on using machine Microsoft Azure AD and
learning for continuous improvement) Windows Defender ATP
Detection processes are
use machine learning to
continuously improved Windows Defender ATP – using threat intel to improve detection
continuously learn of anomalies
and suspicious incidents—
thereby continuously
improving detection.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 48


Identify Protect Detect Respond

RS.RP: Response Planning


Response processes and procedures are executed and maintained, to ensure timely response to detected cybersecurity events.

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.RP-1 18 A.16.1.5 Microsoft Azure Security Response in the Cloud Microsoft provides: built-
Response plan is executed Microsoft Incident Response and Shared Responsibility Incident in capabilities in Azure
during or after an event for security response,
Response Guide
written guidance on shared
Responding to IT Security Incidents responsibility between
Azure AD role in Incident Response Microsoft and customer for
incident response (IR), advice
Leverage Azure Security Center and Azure Log Analytics
on responding to incidents,
(formerly Operations Management Suite) for Incident Response and shares Azure AD’s role
(video) in IR, how to use Azure
Security Incident Management in Office 365 Security Center and Azure
Log Analytics for IR, and how
Microsoft handles security
incidents in Office 365. An
organization may benefit
from using some of the Azure
capabilities for its response
plan.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 49


Identify Protect Detect Respond

RS.CO: Communications
Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.CO-1 A.6.1.1,
Personnel know their roles and A.16.1.1
order of operations when a
response is needed

RS.CO-2 A.6.1.3,
Events are reported consistent A.16.1.2
with established criteria

RS.CO-3 A.16.1.2
Information is shared consistent
with response plans

RS.CO-4
Coordination with stakeholders
occurs consistent with
response plans

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 50


Identify Protect Detect Respond

CCS ISO/IEC
NIST CSF Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.CO-5 Microsoft Active Protections Program The Microsoft Active


Voluntary information Protections Program (MAPP) is
sharing occurs with external a program for security software
stakeholders to achieve providers that gives them
broader cybersecurity early access to vulnerability
situational awareness information so that they can
provide updated protections
to customers faster.

RS.AN: Analysis
Analysis is conducted to ensure adequate response and support recovery activities.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.AN-1
Notifications from detection A.12.4.1,
systems are investigated A.12.4.3,
A.16.1.5

RS.AN-2 A.16.1.6 Microsoft Incident Response and Recovery Process Services Microsoft provides human-
The impact of the incident is based assistance with incident
understood response, to determine the
impact of an incident, among
other things.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 51


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.AN-3 A.16.1.7 A guide to Windows Forensics Microsoft provides guidance


Forensics are performed Windows Security and Forensics course and help through an online
(free) tutorial on Windows
Forensics.

RS.AN-4 A.16.1.4
Incidents are categorized
consistent with response plans

RS.MI: Mitigation
Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.MI-1 A.16.1.5 Responding to IT Security Incidents Microsoft provides advice on


Incidents are contained Microsoft Incident Response and Recovery Process Services and human-based assistance
with incident response. In
Windows Defender ATP – response actions
addition, Windows Defender
ATP offers controls to help
quickly respond to detected
attacks so that an organization
can contain or reduce and
prevent further damage
caused by malicious attackers.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 52


Identify Protect Detect Respond

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.MI-2 A.12.2.1, Responding to IT Security Incidents Microsoft provides advice on


Incidents are mitigated A.16.1.5 Microsoft Incident Response and Recovery Process Services and human-based assistance
with incident response.
RS.MI-3 A.12.6.1
Newly identified vulnerabilities
are mitigated or documented
as accepted risks

RS.IM: Improvements
Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.

ISO/IEC
NIST CSF CCS Microsoft Cyber Offerings that Help Explanation of Microsoft Offerings
27001:2013

RS.IM-1 A.16.1.6
Response plans incorporate
lessons learned

RS.IM-2
Response strategies are
updated

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 53


Identify Protect Detect Respond

This document is a commentary on the NIST Cybersecurity Framework, as Microsoft interprets it, as of the date of publication. Microsoft has spent a lot of time
implementing the framework and considering opportunities for Microsoft technology to help organizations with their cybersecurity capabilities, but cybersecurity
is highly fact-specific and this paper addresses only generally applicable concepts and may not perfectly align with all of your organization’s needs.

MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.”
Information and views expressed in this document, including URL and other Internet website references, may change without notice. This document is provided
for informational purposes only and should not be relied upon as legal advice or to determine how to precisely implement any specific aspect of the framework in
a compliant manner. We encourage you to work with a legally qualified professional to discuss how best to ensure compliance and cybersecurity with applicable
standards and regulations.

This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your
internal, reference purposes only.

Mapping Microsoft Cyber Offerings to NIST Cybersecurity Framework Subcategories | 54


Published 6/8/2018
Version 2.0
© 2018 Microsoft Corporation. All rights reserved.

Вам также может понравиться