{"id":19477,"date":"2020-05-05T07:00:08","date_gmt":"2020-05-05T14:00:08","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/azuregov\/?p=19477"},"modified":"2020-06-01T15:40:11","modified_gmt":"2020-06-01T22:40:11","slug":"cmmc-with-microsoft-azure-asset-configuration-management-3-of-10","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-asset-configuration-management-3-of-10\/","title":{"rendered":"CMMC with Microsoft Azure: Asset &#038; Configuration Management (3 of 10)"},"content":{"rendered":"<p><em>This is the third in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into identification &amp; authentication, incident response, maintenance &amp; media protection, recovery &amp; risk management, security assessment &amp; risk management, system &amp; communications protection and system &amp; information integrity. In this third blog of the series we will explore how to leverage Microsoft Azure for asset and configuration management.<\/em><\/p>\n<p><em>Please note that the information cutoff date for this post is October 2020, and that as of the date of this writing, CMMC developments and guidance are in progress. Additionally, as of the date of this writing, the CMMC Accreditation Body has not certified any the third-party assessors and guidance on the formal assessment process is still under development.\u00a0 As a result, the information herein, including our CMMC related offerings, may be enhanced in the future to align with future guidance from the DoD and CMMC Accreditation Body. Microsoft is closely tracking developments related to the CMMC.<\/em><\/p>\n<p><strong>Stay tuned for the published and upcoming CMMC blogs in the series:<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-access-control-1-of-10\">Access Control Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-audit-accountability-management-2-of-10\">Audit &amp; Accountability Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-asset-configuration-management-3-of-10\/\">Asset &amp; Configuration Management Maturity<\/a> \u2013 this blog<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-identification-authentication-maturity-4-of-10\/\">Identification &amp; Authentication Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-incident-response-maturity-5-of-10\/\">Incident Response Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-maintenance-media-protection-6-of-10\/\">Maintenance &amp; Media Protection Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-recovery-risk-management-7-of-10\/\">Recovery &amp; Risk Management Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-security-assessment-situational-awareness-8-of-10\/\">Security Assessment &amp; Situational Awareness Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-system-communications-protection-9-of-10\/\">System &amp; Communications Protection Maturity<\/a> &#8211; live<\/li>\n<li>System &amp; Information Integrity Maturity (5\/28)<\/li>\n<\/ol>\n<p><strong>What is Cybersecurity Maturity Model Certification (CMMC)?<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-19526 alignright\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-WhatIs.png\" alt=\"Image CMMC Series3 WhatIs\" width=\"348\" height=\"218\" \/><\/p>\n<p>The Defense Industrial Base (DIB) is charged with implementing <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-dfars?view=o365-worldwide\">Defense Federal Acquisition Regulation Supplement (DFARS)<\/a> 252.204-7012. DFARS requires organizations supporting the Department of Defense (DoD) to implement <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-nist-sp-800-171?view=o365-worldwide\">NIST SP 800-171<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-fedramp?view=o365-worldwide\">FedRAMP<\/a> Moderate Impact level controls. DoD has mandated CMMC with periodic assessments in order to strengthen cybersecurity across the DIB. CMMC builds upon DFARS 7012 by verifying an organization\u2019s readiness to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) such as International Traffic in Arms Regulation (ITAR) and Export Administration Regulations (EAR) export-controlled data.<\/p>\n<p>CMMC extends beyond the parent organization into sub-contractors, partners, and suppliers. The framework is intended to enforce critical thinking approaches for comprehensive security. The CMMC framework specifies 5 levels of maturity measurement from Maturity Level 1 (Basic Cyber Hygiene) to Maturity Level 5 (Proactive &amp; Advanced Cyber Practice). The Certification levels will be determined through audits from independent, third-party assessment organizations (C3PAO).<\/p>\n<p><strong>What preparation is required for CMMC alignment to access &amp; configuration management?<\/strong><\/p>\n<p><img decoding=\"async\" class=\"wp-image-19520 alignleft\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-Preparation.png\" alt=\"Image CMMC Series3 Preparation\" width=\"232\" height=\"232\" \/><\/p>\n<p>It\u2019s important to understand that compliance is a shared responsibility between the customer and the Cloud Services Provider (CSP). The graphic on the left demonstrates the CSP responsibility in respective cloud models (On-Prem, IaaS, PaaS, SaaS) with dark blue aligning with customer responsibility and light blue aligning with CSP responsibility. For example, CMMC requirements such as Physical Protection (PE) for limiting physical access (C028) is managed by the CSP. Establishment of respective policies and procedures are the customer\u2019s responsibility. It\u2019s important to note that this blog series is aligned with setting the foundation of controls for CMMC Maturity Levels 1 &amp; 2. Once C3PAOs are identified by the CMMC Accreditation Body, customers are advised to work with their respective C3PAO for guidance on comprehensive alignment of controls, audit and certification.<\/p>\n<p>The administrative controls for the CMMC Asset Management Maturity Capability (AM-MC) and Configuration Management Maturity (CM-MC) are listed here. These controls fall within the customer\u2019s responsibility. This starts with establishing polices to include asset &amp; configuration management (ML2) and progresses to a documented approach across all applicable organizational units (ML5). These controls should be formally created, documented in the System Security Plan (SSP) and implemented within the organization.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19506\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-AssetMgmtMaturityTable.png\" alt=\"Image CMMC Series3 AssetMgmtMaturityTable\" width=\"476\" height=\"538\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-AssetMgmtMaturityTable.png 678w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-AssetMgmtMaturityTable-265x300.png 265w\" sizes=\"(max-width: 476px) 100vw, 476px\" \/><\/p>\n<p><strong>Microsoft Azure Security Controls Aligned to CMMC: Asset &amp; Configuration Management<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19507\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-BigTable.png\" alt=\"Image CMMC Series3 BigTable\" width=\"700\" height=\"747\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-BigTable.png 4733w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-BigTable-281x300.png 281w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-BigTable-960x1024.png 960w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-BigTable-768x819.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-BigTable-1440x1536.png 1440w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-BigTable-1919x2048.png 1919w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p><strong>\u00a0<\/strong><strong>Azure Security Controls Aligned to CMMC: Asset &amp; Configuration Management<\/strong><\/p>\n<p>Microsoft Azure Government has developed a 9-step process to facilitate asset &amp; configuration management with the security principles within CMMC, NIST SP 800-53 R4 and NIST SP 800-171 standards. Note this process is a starting point, as CMMC requires alignment of people, processes, policy and technology so refer to organizational requirements and respective standards for implementation. Azure has several offerings to facilitate asset &amp; configuration management including <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\">Azure Security Center<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\">Azure Active Directory<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/privileged-identity-management\/pim-configure\">Azure AD Privileged Identity Management<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/policy\/overview\">Azure Policy<\/a> and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/information-protection\/\">Azure Information Protection<\/a><\/p>\n<ul>\n<li><strong>Azure Security Center<\/strong> is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection across your hybrid workloads in the cloud &#8211; whether they&#8217;re in Azure or not &#8211; as well as on premises.<\/li>\n<li><strong>Azure Active Directory<\/strong> is an identity and access management-as-a-service (IDaaS) solution that combines single-on capabilities to any cloud and on-premises application with advanced protection.<\/li>\n<li><strong>Azure AD Privileged Identity Management <\/strong>is a service that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online Services like Office 365 or Microsoft Intune.<\/li>\n<li><strong>Azure Policy <\/strong>helps you manage and prevent IT issues with policy definitions that enforce rules and effects for your resources.<\/li>\n<li><strong>Azure Information Protection <\/strong>helps secure email, documents, and sensitive data that you share outside your company.<\/li>\n<\/ul>\n<p><strong>9 Steps to CMMC for Asset &amp; Configuration Management with Microsoft Azure<\/strong><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19527\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-9Steps-1.png\" alt=\"Image CMMC Series3 9Steps\" width=\"701\" height=\"378\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-9Steps-1.png 1191w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-9Steps-1-300x162.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-9Steps-1-1024x552.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-9Steps-1-768x414.png 768w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/p>\n<p><strong>1) Protect Confidential Data<\/strong><\/p>\n<p>You can secure confidential data and control information flows with Azure Information Protection. Azure Information Protection (sometimes referred to as AIP) is a cloud-based solution that helps an organization to classify and optionally, protect its documents and emails by applying labels. Labels can be applied automatically by administrators who define rules and conditions, manually by users, or a combination where users are given recommendations. Configure an AIP policy via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/information-protection\/configure-policy-settings\">How to configure the policy settings for Azure Information Protection<\/a>.<\/p>\n<ol>\n<li>Sign into the <a href=\"https:\/\/portal.azure.com\/\">Azure portal<\/a>.<\/li>\n<li>Navigate to the <strong>Azure Information Protec<\/strong>tion pane.<\/li>\n<li>From the <strong>Classifications &gt; Policies<\/strong> menu option: On the <strong>Azure Information Protection &#8211; Policies<\/strong> pane, select <strong>Global<\/strong> if the settings that you want to configure will apply to all users.<\/li>\n<li>On the <strong>Policy<\/strong> pane, configure the settings:\n<img decoding=\"async\" class=\"alignnone wp-image-19508\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ConfigurePolicySettings-1.png\" alt=\"Image CMMC Series3 ConfigurePolicySettings\" width=\"600\" height=\"441\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ConfigurePolicySettings-1.png 1165w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ConfigurePolicySettings-1-300x220.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ConfigurePolicySettings-1-1024x752.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ConfigurePolicySettings-1-768x564.png 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<ul style=\"list-style-type: disc;\">\n<li><strong>Select the default label:<\/strong> When you set this option, select the label to assign to documents and emails that do not have a label. You cannot set a label as the default if it has sublabels.<\/li>\n<li><strong>Send audit data to Azure Information Protection analytics:<\/strong> Before you create an Azure Log Analytics workspace for Azure Information analytics, the values for this setting display <strong>Off<\/strong> and <strong>Not configured<\/strong>. When you create the workspace, the values change to <strong>Off<\/strong> and <strong>On<\/strong>.<\/li>\n<li><strong>All documents and emails must have a label:<\/strong> When you set this option to <strong>On<\/strong>, all saved documents and sent emails must have a label applied. The labeling might be manually assigned by a user, automatically as a result of a condition, or be assigned by default (by setting the <strong>Select the default label<\/strong> option). In this example we\u2019ll select <em>Confidential<\/em>.\n<img decoding=\"async\" class=\"alignnone wp-image-19525\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectDefaultLabel-1.png\" alt=\"Image CMMC Series3 SelectDefaultLabel\" width=\"600\" height=\"123\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectDefaultLabel-1.png 1025w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectDefaultLabel-1-300x61.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectDefaultLabel-1-768x157.png 768w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/li>\n<li>Select additional policy settings based on use case and select<strong> Save <\/strong>to implement.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>2) Inventory Systems<\/strong><\/p>\n<p>There are several methods to inventory your systems and software in Azure. One of the most straightforward methods is navigating to Azure and selecting <em>All resources<\/em> to display a list of all the assets within your tenants and subscriptions. This blade provides reporting by selecting the <em>Export to CSV<\/em> icon at the top of the page.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19518\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-InventorySystems-1.png\" alt=\"Image CMMC Series3 InventorySystems\" width=\"700\" height=\"394\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-InventorySystems-1.png 1396w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-InventorySystems-1-300x169.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-InventorySystems-1-1024x577.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-InventorySystems-1-768x432.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>You can also export this report with Azure Command Line Interface (ACLI) or Powershell for operations at scale. Below is a snapshot of the Powershell Command, for more information see <a href=\"https:\/\/microsoft.github.io\/AzureTipsAndTricks\/blog\/tip137.html\">Export Azure Resources to CSV Files with Powershell<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19519\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-PowerShellCommandLine-1.png\" alt=\"Image CMMC Series3 PowerShellCommandLine\" width=\"601\" height=\"220\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-PowerShellCommandLine-1.png 847w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-PowerShellCommandLine-1-300x110.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-PowerShellCommandLine-1-768x281.png 768w\" sizes=\"(max-width: 601px) 100vw, 601px\" \/><\/p>\n<p><strong>3) Establish System Baselines<\/strong><\/p>\n<p>You can establish and maintain system baselines with Azure virtual machine with inventory collection. You can enable inventory tracking for an Azure virtual machine from the virtual machine&#8217;s resource page. You can collect and view the following inventory information on your computers:<\/p>\n<ul>\n<li>Windows software (Windows applications and Windows updates), services, files, and Registry keys<\/li>\n<li>Linux software (packages) daemons, and files<\/li>\n<\/ul>\n<p>This method provides a browser-based user interface for setting up and configuring inventory collection. Enable inventory collection via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/automation\/automation-vm-inventory\">Manage an Azure virtual machine with inventory collection<\/a>.<\/p>\n<ol>\n<li>In the left pane of the Azure portal, select <strong>Virtual machines<\/strong>.<\/li>\n<li>In the list of virtual machines, select a virtual machine.<\/li>\n<li>On the <strong>Resource<\/strong> menu, under <strong>Operations<\/strong>, select <strong>Inventory<\/strong>.<\/li>\n<li>Select a Log Analytics workspace for storing your data logs. If no workspace is available to you for that region, you are prompted to create a default workspace and automation account.<\/li>\n<li>To start onboarding your computer, select <strong>Enable<\/strong>.\n<img decoding=\"async\" class=\"alignnone wp-image-19512\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnableConsistentControl-1.png\" alt=\"Image CMMC Series3 EnableConsistentControl\" width=\"401\" height=\"228\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnableConsistentControl-1.png 615w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnableConsistentControl-1-300x171.png 300w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/><\/li>\n<li>In the Inventory view, select the Edit Settings button at the top of the window.<\/li>\n<li>To add a new collection setting, go to the setting category that you want to add by selecting the Windows Registry, Windows Files, and Linux Files tabs.<\/li>\n<li>Select the appropriate category and click Add at the top of the window.\n<img decoding=\"async\" class=\"alignnone wp-image-19524\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectAppropriateCategory.png\" alt=\"Image CMMC Series3 SelectAppropriateCategory\" width=\"700\" height=\"312\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectAppropriateCategory.png 1001w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectAppropriateCategory-300x134.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-SelectAppropriateCategory-768x342.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/li>\n<\/ol>\n<p><strong>4) Enforce System Least Privileges<\/strong><\/p>\n<p>Maintaining system privileges and enforcing least privilege in on-premises networks is a challenging endeavor. Managed identities are a feature in Azure Active Directory (Azure AD) which solves this problem. The feature provides Azure services with an automatically managed identity in Azure AD. You can use the identity to authenticate to any service that supports Azure AD authentication, including Key Vault, without exposing credentials. The managed identities for Azure resources feature is free with Azure AD for Azure subscriptions and there&#8217;s no additional cost. There are two types of system managed identities and below is a diagram detailing how Azure role-based access is applies to these accounts. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/managed-identities-azure-resources\/overview\">What are managed identities for Azure resources?<\/a><\/p>\n<ul>\n<li>A <strong>system-assigned managed identity<\/strong> is enabled directly on an Azure service instance. When the identity is enabled, Azure creates an identity for the instance in the Azure AD tenant that&#8217;s trusted by the subscription of the instance. After the identity is created, the credentials are provisioned onto the instance. The lifecycle of a system-assigned identity is directly tied to the Azure service instance that it&#8217;s enabled on. If the instance is deleted, Azure automatically cleans up the credentials and the identity in Azure AD.<\/li>\n<li>A <strong>user-assigned managed identity<\/strong> is created as a standalone Azure resource. Through a create process, Azure creates an identity in the Azure AD tenant that&#8217;s trusted by the subscription in use. After the identity is created, the identity can be assigned to one or more Azure service instances. The lifecycle of a user-assigned identity is managed separately from the lifecycle of the Azure service instances to which it&#8217;s assigned.\n<img decoding=\"async\" class=\"alignnone wp-image-19515\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSystemLeastPrivileges-1.png\" alt=\"Image CMMC Series3 EnforceSystemLeastPrivileges\" width=\"700\" height=\"373\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSystemLeastPrivileges-1.png 999w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSystemLeastPrivileges-1-300x160.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSystemLeastPrivileges-1-768x410.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/li>\n<\/ul>\n<p><strong>5) Control User-Installed Software<\/strong><\/p>\n<p>There are several methods to controlling user-installed software in Azure. Step 8 (Restrict Software Execution) details how to apply adaptive application controls with Azure Security Center and Step 9 (Employ Application Whitelisting) details how to apply application whitelisting configurations with Azure Policy. One of the most effective methods for controlling user-installed software is enforcing least privilege, role-based access control (RBAC) and tightly controlling administrative rights. Azure Active Directory Privileged Identity Management allows you to manage administrator access for users and groups. Administrative rights can be time bound for change windows and eligibility periods. They can also enforce conditional access requirements such as multi-factor authentication (MFA) and trusted locations. Apply Azure AD Privileged Identity Management via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/privileged-identity-management\/pim-deployment-plan\">Deploy Azure AD Privileged Identity Management (PIM)<\/a>.<\/p>\n<ol>\n<li>Navigate to the <strong>Azure Active Directory<\/strong> Blade.<\/li>\n<li>Select <strong>Identity Governance<\/strong>.<\/li>\n<li>Select <strong>Manage Role Assignments<\/strong> under <strong>Privileged Identity Management<\/strong>.<\/li>\n<li>Select <strong>Manage<\/strong> under <strong>Manage Access<\/strong>.<\/li>\n<li>Select <strong>+Add Member<\/strong>.<\/li>\n<li>Set <strong>Scope<\/strong>, this can be tailored to <strong>Directory (Default)<\/strong> or more granular to assets based on your requirements.\n<img decoding=\"async\" class=\"alignnone wp-image-19509\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ControlUserInstalledSoftware1-1.png\" alt=\"Image CMMC Series3 ControlUserInstalledSoftware1\" width=\"317\" height=\"390\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ControlUserInstalledSoftware1-1.png 588w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ControlUserInstalledSoftware1-1-243x300.png 243w\" sizes=\"(max-width: 317px) 100vw, 317px\" \/><\/li>\n<li><strong>Select a role<\/strong> based on RBAC groups. For this example, we\u2019ve selected Application Administrator rights. Under <strong>Select a member<\/strong>, we\u2019ve selected user John Doe.<\/li>\n<li><strong>Select a role<\/strong> based on RBAC groups. For this example, we\u2019ve selected Application Administrator rights. Under <strong>Select a member<\/strong>, we\u2019ve selected user John Doe.\n<img decoding=\"async\" class=\"alignnone wp-image-19510\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ControlUserInstalledSoftware2-1.png\" alt=\"Image CMMC Series3 ControlUserInstalledSoftware2\" width=\"318\" height=\"390\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ControlUserInstalledSoftware2-1.png 581w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-ControlUserInstalledSoftware2-1-245x300.png 245w\" sizes=\"(max-width: 318px) 100vw, 318px\" \/><\/li>\n<li><strong>Set membership settings, <\/strong>in this example John Doe will be temporarily eligible to request Application Administrator rights within the notional change window of 8-10PM.<\/li>\n<li>Click <strong>Save <\/strong>to deploy PIM configuration.<\/li>\n<\/ol>\n<p><strong>6) Enforce Security Configurations<\/strong><\/p>\n<p>Azure Security Center provides the Secure Score calculation to provide visibility and management of your security configurations. This is another offering included in the Azure Security Free SKU. Security Center mimics the work of a security analyst, reviewing your security recommendations, and applying advanced algorithms to determine how crucial each recommendation is. Azure Security center constantly reviews your active recommendations and calculates your Secure Score based on them, the score of a recommendation is derived from its severity and security best practices that will affect your workload security the most. Security Center also provides you with an Overall Secure Score.<\/p>\n<p><em>Overall Secure Score<\/em> is an accumulation of all your recommendation scores. You can view your overall Secure Score across your subscriptions or management groups, depending on what you select. The score will vary based on subscription selected and the active recommendations on these subscriptions. To check which recommendations impact your Secure Score most, you can view the top three most impactful recommendations in the Security Center dashboard or you can sort the recommendations in the recommendations list blade using the Secure Score impact column. View your overall Secure Score via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-secure-score\">Improve your secure score in Azure Security Center<\/a>.<\/p>\n<ol>\n<li>In the Azure dashboard, click <strong>Security Center<\/strong> and then click <strong>Secure Score<\/strong>.<\/li>\n<li>At the top you can see Secure Score highlights:\n<ul style=\"list-style-type: disc;\">\n<li>The <strong>Overall Secure Score<\/strong> represents the score per policies, per selected subscription<\/li>\n<li><strong>Secure Score by category<\/strong> shows you which resources need the most attention<\/li>\n<li><strong>Top recommendations by Secure Score impact<\/strong> provides you with a list of the recommendations that will improve your Secure Score the most if you implement them.\n<img decoding=\"async\" class=\"alignnone wp-image-19513\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig1-1.png\" alt=\"Image CMMC Series3 EnforceSecurityConfig1\" width=\"699\" height=\"244\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig1-1.png 1294w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig1-1-300x105.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig1-1-1024x357.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig1-1-768x268.png 768w\" sizes=\"(max-width: 699px) 100vw, 699px\" \/><\/li>\n<\/ul>\n<\/li>\n<li>In the table below, you can see each of your subscriptions and the overall Secure Score for each.<\/li>\n<li>Click <strong>View recommendations<\/strong> to see the recommendations for that subscription that you can remediate to improve your Secure Score.<\/li>\n<li>In the list of recommendations, you can see that for each recommendation there is a column that represents the <strong>Secure Score impact<\/strong>. This number represents how much your overall Secure Score will improve if you follow the recommendations. For example, in the screen below, if you <strong>Remediate vulnerabilities in container security configurations<\/strong>, your Secure Score will increase by 35 points.\n<img decoding=\"async\" class=\"alignnone wp-image-19514\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig2-1.png\" alt=\"Image CMMC Series3 EnforceSecurityConfig2\" width=\"700\" height=\"281\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig2-1.png 1134w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig2-1-300x120.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig2-1-1024x411.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EnforceSecurityConfig2-1-768x308.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/li>\n<\/ol>\n<p><strong>7) Restrict Ports &amp; Protocols<\/strong><\/p>\n<p>Azure Security Center (ASC) provides numerous recommendations for both monitoring, auditing, and restricting your environments ports and protocols. These recommendations provide both visibility and steps for remediation. The recommendations roll up into your <em>Overall Secure Score<\/em> which is detailed in the previous step. Below are commonly enforced network security controls in ASC. For a complete listing of Azure Security Center Recommendations, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/recommendations-reference\">Security recommendations &#8211; a reference guide<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19521\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictPortsProtocols-1.png\" alt=\"Image CMMC Series3 RestrictPortsProtocols\" width=\"500\" height=\"373\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictPortsProtocols-1.png 644w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictPortsProtocols-1-300x224.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><strong>8) Restrict Software Execution<\/strong><\/p>\n<p>Restricting software execution is a critical requirement for meeting cybersecurity maturity models. Adaptive application control is an intelligent, automated, end-to-end solution from Azure Security Center which helps you control which applications can run on your Azure and non-Azure machines (Windows and Linux). Among other benefits, this helps harden your machines against malware. Security Center uses machine learning to analyze the applications running on your machines and creates an allow list from this intelligence. This capability greatly simplifies the process of configuring and maintaining application allow list policies, enabling you to:<\/p>\n<ul>\n<li>Block or alert on attempts to run malicious applications, including those that might otherwise be missed by antimalware solutions.<\/li>\n<li>Comply with your organization&#8217;s security policy that dictates the use of only licensed software.<\/li>\n<li>Avoid unwanted software to be used in your environment.<\/li>\n<li>Avoid old and unsupported apps to run.<\/li>\n<li>Prevent specific software tools that are not allowed in your organization.<\/li>\n<li>Enable IT to control the access to sensitive data through app usage.<\/li>\n<\/ul>\n<p>Enable adaptive application controls via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-adaptive-application\">Adaptive application controls<\/a>.<\/p>\n<ol>\n<li>Sign into the <a href=\"https:\/\/portal.azure.com\/\">Azure portal<\/a>.<\/li>\n<li>Open the <strong>Security Center<\/strong> dashboard.<\/li>\n<li>In the left pane, select <strong>Adaptive application controls<\/strong> located under <strong>Advanced cloud defense<\/strong>.\n<img decoding=\"async\" class=\"alignnone wp-image-19522\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution1-1.png\" alt=\"Image CMMC Series3 RestrictSoftwareExecution1\" width=\"700\" height=\"519\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution1-1.png 1248w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution1-1-300x222.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution1-1-1024x759.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution1-1-768x569.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/li>\n<li>The <strong>adaptive application controls<\/strong> page appears with respective recommendations:\n<img decoding=\"async\" class=\"alignnone wp-image-19523\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution2-1.png\" alt=\"Image CMMC Series3 RestrictSoftwareExecution2\" width=\"701\" height=\"522\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution2-1.png 1000w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution2-1-300x224.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-RestrictSoftwareExecution2-1-768x572.png 768w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/li>\n<\/ol>\n<p><strong>9) Employ Application Whitelisting<\/strong><\/p>\n<p>Applying application whitelisting is an effective control to prevent malicious application execution. The previous step outlined the process of applying adaptive application control in Azure Security Center, but this configuration is also enforceable with Azure Policy. This configuration assigns an Azure Policy definition that helps you monitor virtual machines where an application whitelist is recommended but has not yet been configured:<\/p>\n<ul>\n<li><em>Adaptive Application Controls should be enabled on virtual machines<\/em><\/li>\n<\/ul>\n<p>Azure Policy is highly versatile and can be created with the Azure portal, Azure CLI, Powershell and Azure Resource Manager (ARM) templates. Creating an Azure Policy in the portal is accomplished via the following steps:<\/p>\n<ol>\n<li>In the <strong>Policy<\/strong> portal, select <strong>Assignments<\/strong><\/li>\n<li>Select <strong>Assign Policy <\/strong>from the top of the Policy &#8211; Assignments page.\n<img decoding=\"async\" class=\"alignnone wp-image-19511\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EmployAppWhitelisting-1.png\" alt=\"Image CMMC Series3 EmployAppWhitelisting\" width=\"700\" height=\"459\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EmployAppWhitelisting-1.png 760w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-EmployAppWhitelisting-1-300x197.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/li>\n<li>On the <strong>Assign Policy<\/strong> page, select the <strong>Scope<\/strong> by clicking the ellipsis and selecting either a management group or subscription.<\/li>\n<li>Select the <strong>Policy definition<\/strong> ellipsis, search for the desired policy definition and click <strong>Select<\/strong>.<\/li>\n<li>Set an <strong>Assignment name<\/strong>, <strong>Description, <\/strong>and set<strong> Policy Enforcement <\/strong>to<strong> Enabled<\/strong>.<\/li>\n<li>Click <strong>Assign<\/strong>.<\/li>\n<\/ol>\n<p>It\u2019s important to note that Azure Policies can be active for automated enforcement or passive for auditing requirements. It is recommended to test all policies with the <em>AuditIfNotExists<\/em> effects prior to moving to automated policy enforcement with the <em>DeployIfNotExists<\/em> effect. For automated policy enforcement check <strong>Create a Managed Identity<\/strong> from the <strong>Assign Policy<\/strong> blade and set a <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/policy\/concepts\/effects#deployifnotexists\">DeployIfNotExists<\/a> Effect in the policy parameters. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/policy\/assign-policy-portal\">Quickstart: Create a policy assignment to identify non-compliant resources<\/a>.<\/p>\n<p><strong>Learn more about CMMC with Microsoft <\/strong><\/p>\n<p>Here are some of the best resource to learn more about CMMC in the cloud with Microsoft:<\/p>\n<ul>\n<li><a href=\"https:\/\/aka.ms\/CMMCResponse\">Accelerating CMMC compliance for Microsoft cloud (in depth review)<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=sey4aWuqtvk\">CMMC-AB Standards with Regan Edens &#8211; National Conversation<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-dfars?view=o365-worldwide\">Defense Federal Acquisition Regulation Supplement (DFARS)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-itar?view=o365-worldwide\">International Traffic in Arms Regulations (ITAR)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-fedramp?view=o365-worldwide\">Federal Risk and Authorization Management Program (FedRAMP)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-ear?view=o365-worldwide\">US Export Administration Regulations (EAR)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-nist-sp-800-171?view=o365-worldwide\">NIST SP 800-171 Compliance<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/samples\/nist-sp-800-53-rev4\/\">Overview of the NIST SP 800-53 R4 blueprint sample<\/a><\/li>\n<\/ul>\n<p>Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a> to keep up with our expert coverage on security matters and follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a> or visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\">website<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>Are you a federal government agency that needs help with cybersecurity? Reach out to <a href=\"https:\/\/www.linkedin.com\/in\/tjbanasik\/\">TJ Banasik<\/a> or <a href=\"http:\/\/www.linkedin.com\/in\/marmci\">Mark McIntyre<\/a> for additional details on the content above, or if you have any other questions about Microsoft\u2019s cybersecurity investments for the federal government.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the third in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into identification &amp; authentication, incident response, maintenance &amp; media protection, recovery &amp; risk management, security assessment &amp; risk management, system &amp; communications protection and system [&hellip;]<\/p>\n","protected":false},"author":16830,"featured_media":19490,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14],"tags":[75,95,3055,216,3054,502],"class_list":["post-19477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-learning","tag-azure","tag-azure-government","tag-cmmc","tag-cybersecurity","tag-cybersecurity-maturity-model-certification","tag-security"],"acf":[],"blog_post_summary":"<p>This is the third in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into identification &amp; authentication, incident response, maintenance &amp; media protection, recovery &amp; risk management, security assessment &amp; risk management, system &amp; communications protection and system [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/19477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/users\/16830"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/comments?post=19477"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/19477\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media\/19490"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media?parent=19477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/categories?post=19477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/tags?post=19477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}