{"id":19575,"date":"2020-05-11T16:05:05","date_gmt":"2020-05-11T23:05:05","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/azuregov\/?p=19575"},"modified":"2020-06-01T10:54:46","modified_gmt":"2020-06-01T17:54:46","slug":"cmmc-with-microsoft-azure-incident-response-maturity-5-of-10","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-incident-response-maturity-5-of-10\/","title":{"rendered":"CMMC with Microsoft Azure: Incident Response Maturity (5 of 10)"},"content":{"rendered":"<p><em>This is the fifth in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into maintenance &amp; media protection, recovery &amp; risk management, security assessment &amp; risk management, system &amp; communications protection and system &amp; information integrity. In this fifth blog of the series we will explore how to leverage Microsoft Azure for incident response maturity.<\/em><\/p>\n<p><em>Please note that the information cutoff date for this post is October 2020, and that as of the date of this writing, CMMC developments and guidance are in progress. Additionally, as of the date of this writing, the CMMC Accreditation Body has not certified any the third-party assessors and guidance on the formal assessment process is still under development.\u00a0 As a result, the information herein, including our CMMC related offerings, may be enhanced in the future to align with future guidance from the DoD and CMMC Accreditation Body. Microsoft is closely tracking developments related to the CMMC.<\/em><\/p>\n<p><strong>Stay tuned for the upcoming CMMC blogs in the series:<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-access-control-1-of-10\">Access Control Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-audit-accountability-management-2-of-10\">Audit &amp; Accountability Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-asset-configuration-management-3-of-10\/\">Asset &amp; Configuration Management Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-identification-authentication-maturity-4-of-10\/\">Identification &amp; Authentication Maturity<\/a> \u2013 live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-incident-response-maturity-5-of-10\">Incident Response Maturity<\/a> \u2013 this blog<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-maintenance-media-protection-6-of-10\/\">Maintenance &amp; Media Protection Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-recovery-risk-management-7-of-10\/\">Recovery &amp; Risk Management Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-security-assessment-situational-awareness-8-of-10\/\">Security Assessment &amp; Situational Awareness Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-system-communications-protection-9-of-10\/\">System &amp; Communications Protection Maturity<\/a> &#8211; live<\/li>\n<li>System &amp; Information Integrity Maturity &#8211; 5\/28<\/li>\n<\/ol>\n<h5><strong>What is Cybersecurity Maturity Model Certification (CMMC)?<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"wp-image-19535 alignright\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series4-WhatIsCMMC.png\" alt=\"Image CMMC Series4 WhatIsCMMC\" width=\"425\" height=\"273\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series4-WhatIsCMMC.png 759w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series4-WhatIsCMMC-300x192.png 300w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/>The Defense Industrial Base (DIB) is charged with implementing <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-dfars?view=o365-worldwide\">Defense Federal Acquisition Regulation Supplement (DFARS)<\/a> 252.204-7012. DFARS requires organizations supporting the Department of Defense (DoD) to implement <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-nist-sp-800-171?view=o365-worldwide\">NIST SP 800-171<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-fedramp?view=o365-worldwide\">FedRAMP<\/a> Moderate Impact level controls. DoD has mandated CMMC with periodic assessments in order to strengthen cybersecurity across the DIB. CMMC builds upon DFARS 7012 by verifying an organization\u2019s readiness to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) such as International Traffic in Arms Regulation (ITAR) and Export Administration Regulations (EAR) export-controlled data.<\/p>\n<p>CMMC extends beyond the parent organization into sub-contractors, partners, and suppliers. The framework is intended to enforce critical thinking approaches for comprehensive security. The CMMC framework specifies 5 levels of maturity measurement from Maturity Level 1 (Basic Cyber Hygiene) to Maturity Level 5 (Proactive &amp; Advanced Cyber Practice). The Certification levels will be determined through audits from independent, third-party assessment organizations (C3PAO).<\/p>\n<h5><strong>What preparation is required for CMMC alignment to incident response management?<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"wp-image-19520 alignleft\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-Preparation.png\" alt=\"Image CMMC Series3 Preparation\" width=\"292\" height=\"302\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-Preparation.png 440w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-Preparation-290x300.png 290w\" sizes=\"(max-width: 292px) 100vw, 292px\" \/><\/p>\n<p>It\u2019s important to understand that compliance is a shared responsibility between the customer and the Cloud Services Provider (CSP). The graphic on the left demonstrates the CSP responsibility in respective cloud models (On-Prem, IaaS, PaaS, SaaS) with dark blue aligning with customer responsibility and light blue aligning with CSP responsibility. For example, CMMC requirements such as Physical Pro<\/p>\n<p>tection (PE) for limiting physical access (C028) is managed by the CSP. Establishment of respective policies and procedures are the customer\u2019s responsibility. It\u2019s important to note that this blog series is aligned with setting the foundation of controls for CMMC Maturity Levels 1 &amp; 2. Once C3PAOs are identified by the CMMC Accreditation Body, customers are advised to work with their respective C3PAO for guidance on comprehensive alignment of controls, audit and certification.<\/p>\n<p>The administrative controls for the CMMC Incident Response Capability (IR-MC) are listed here. These controls fall within the customer\u2019s responsibility. This starts with establishing polices to include incident response management (ML2) and progresses to a documented approach across all applicable organizational units (ML5). These controls should be formally created, documented in the System Security Plan (SSP) and implemented within the organization.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19578\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AdminControlsTable.png\" alt=\"Image CMMC Series5 AdminControlsTable\" width=\"557\" height=\"328\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AdminControlsTable.png 677w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AdminControlsTable-300x177.png 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><\/p>\n<h5><strong>Microsoft Azure Security Controls Aligned to CMMC: Incident Response<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19579\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-BigTable.png\" alt=\"Image CMMC Series5 BigTable\" width=\"796\" height=\"910\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-BigTable.png 4733w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-BigTable-263x300.png 263w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-BigTable-896x1024.png 896w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-BigTable-768x878.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-BigTable-1344x1536.png 1344w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-BigTable-1792x2048.png 1792w\" sizes=\"(max-width: 796px) 100vw, 796px\" \/><\/p>\n<h5><strong>Azure Security Controls Aligned to CMMC: Incident Response Maturity<\/strong><\/h5>\n<p>Microsoft Azure Government has developed an 8-step process to facilitate incident response maturity with the security principles within CMMC, NIST SP 800-53 R4 and NIST SP 800-171 standards. Note this process is a starting point, as CMMC requires alignment of people, processes, policy and technology so refer to organizational requirements and respective standards for implementation. Azure has several offerings to facilitate incident response including <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\">Azure Sentinel<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\">Azure Security Center<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/logic-apps\/\">Azure Logic Apps<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/learn\/quick-create-workspace\">Log Analytics Workspace<\/a> and the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/graph-security-api\">Microsoft Graph Security API<\/a>.<\/p>\n<ul>\n<li><strong>Azure Sentinel <\/strong>is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.<\/li>\n<li><strong>Azure Security Center <\/strong>is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud &#8211; whether they&#8217;re in Azure or not &#8211; as well as on premises.<\/li>\n<li><strong>Azure Logic Apps <\/strong>is a cloud service that helps you schedule, automate, and orchestrate tasks, business processes, and workflows when you need to integrate apps, data, systems and services across enterprises or organizations.<\/li>\n<li><strong>Log Analytics Workspace<\/strong> is a unique environment for Azure Monitor log data. Each workspace has its own data repository and configuration. Data sources and solutions are configured to store their data in a workspace.<\/li>\n<li><strong>Microsoft Graph Security API <\/strong>simplifies integration with Microsoft and third-party security solutions. Using one endpoint, one software development kit (SDK), one schema, and one authentication mechanism, customers and partners can easily build integrated security applications, workflows and analytics.<\/li>\n<\/ul>\n<h5><strong>8 Steps to CMMC for Incident Response Maturity with Microsoft Azure<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19580\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-8steps.png\" alt=\"Image CMMC Series5 8steps\" width=\"701\" height=\"364\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-8steps.png 1117w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-8steps-300x156.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-8steps-1024x532.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-8steps-768x399.png 768w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/p>\n<p><strong>1) Establish an Incident Response Capability<\/strong><\/p>\n<p>Establishing an incident response capability is the foundation of combating threats to your environment. Incident response is geared to protect the organization&#8217;s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g., plans, defined roles, training, communications, management oversight) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker&#8217;s presence, and restoring the integrity of the network and systems. Developing this capability is a customer responsibility, but there are Microsoft security tools to facilitate building this capability. Azure Security Center provides a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) capability for hardening your resources and responding to threats. Azure Sentinel is a cloud native security information event management (SIEM) platform. Azure Sentinel combines threat intelligence, analysis, orchestration, automation, and response into a single pane of glass to support your incident response requirements. Enable Azure Security Center and Azure Sentinel via the steps below.<\/p>\n<p>Azure Security Center provides unified security management and threat protection across your hybrid cloud workloads. While the Free tier offers limited security for your Azure resources only, the Standard tier extends these capabilities to on-premises and other clouds. Azure Security Center Standard helps you find and fix security vulnerabilities, apply access and application controls to block malicious activity, detect threats using analytics and intelligence, and respond quickly when under attack. Enabling Azure Security Center Standard is accomplished via the steps below:<\/p>\n<ol>\n<li>Under the Security Center main menu, select <strong>Getting started<\/strong>.<\/li>\n<li>Under <strong>Upgrade<\/strong>, Security Center lists subscriptions and workspaces eligible for onboarding.<\/li>\n<li>Click <strong>Start trial<\/strong> to start your trial on the selected subscriptions<\/li>\n<\/ol>\n<p>Security Center collects data from your Azure VMs and non-Azure computers to monitor for security vulnerabilities and threats. Data is collected using the Microsoft Monitoring Agent, which reads various security-related configurations and event logs from the machine and copies the data to your workspace for analysis. By default, Security Center will create a new workspace for you. When automatic provisioning is enabled, Security Center installs the Microsoft Monitoring Agent on all supported Azure VMs and any new ones that are created. Automatic provisioning is strongly recommended. To enable automatic provisioning of the Microsoft Monitoring Agent:<\/p>\n<ol>\n<li>Sign into the <a href=\"https:\/\/portal.azure.com\/\">Azure Portal<\/a>. Select the subscription in which Azure Sentinel will be created.<\/li>\n<li>Search for and select <em>Azure Security Center.<\/em><\/li>\n<li>Under the Security Center main menu, select <strong>Pricing &amp; settings<\/strong>.<\/li>\n<li>On the row of the subscription, click on the subscription on which you&#8217;d like to change the settings<\/li>\n<li>In the <strong>Data Collection<\/strong> tab, set <strong>Auto provisioning<\/strong> to <strong>On<\/strong>.<\/li>\n<li>Select <strong>Save<\/strong>.\n<img decoding=\"async\" class=\"alignnone wp-image-19581\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EstablishIncidentResponseCapability2.png\" alt=\"Image CMMC Series5 EstablishIncidentResponseCapability2\" width=\"501\" height=\"140\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EstablishIncidentResponseCapability2.png 720w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EstablishIncidentResponseCapability2-300x84.png 300w\" sizes=\"(max-width: 501px) 100vw, 501px\" \/><\/li>\n<\/ol>\n<p>With this new insight into your Azure VMs; Azure Security Center can provide additional recommendations related to system update status, OS security configurations, and endpoint protection, as well as generate additional security alerts. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-get-started\">Quickstart: Onboard your Azure subscription to Security Center Standard<\/a><\/p>\n<p>To onboard Azure Sentinel, you first need to <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-data-sources\">connect to your security sources<\/a>. Azure Sentinel comes with a number of connectors for Microsoft solutions, available out of the box and providing real-time integration, including Microsoft Threat Protection solutions, and Microsoft 365 sources, including Office 365, Azure AD, Azure ATP, and Microsoft Cloud App Security, and more. Enabling Azure Sentinel is accomplished via the steps below:<\/p>\n<ol>\n<li>Sign into the <a href=\"https:\/\/portal.azure.com\/\">Azure Portal<\/a>. Select the subscription in which Azure Sentinel will be created.<\/li>\n<li>Search for and select <em>Azure Sentinel.<\/em><\/li>\n<li>Select <strong>Add<\/strong><\/li>\n<li>Select the workspace you want to use or create a new one. You can run Azure Sentinel on more than one workspace, but the data is isolated to a single workspace.\n<img decoding=\"async\" class=\"alignnone wp-image-19582\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-DetectReportEvents1.png\" alt=\"Image CMMC Series5 DetectReportEvents1\" width=\"550\" height=\"370\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-DetectReportEvents1.png 578w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-DetectReportEvents1-300x202.png 300w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/li>\n<li>Select <strong>Add Azure Sentinel<\/strong>.<\/li>\n<li>Click <strong>Data collection<\/strong>.<\/li>\n<li>Select your respective data sources. Not there are tiles for each data source you can connect. For example, click Azure Active Directory. If you connect this data source, you stream all the logs from Azure AD into Azure Sentinel. You can select what type of logs you want to get &#8211; sign-in logs and\/or audit logs.<\/li>\n<li>Select desired workbooks to get pre-built security insight dashboards for your data sources.<\/li>\n<\/ol>\n<p>After your data sources are connected, your data starts streaming into Azure Sentinel and is ready for you to start working with. You can view the logs in the built-in dashboards and start building queries in Log Analytics to investigate the data. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/quickstart-onboard\">Quickstart: On-board Azure Sentinel<\/a><\/p>\n<p><strong>2) Leverage Knowledge of Attacker Tactics<\/strong><\/p>\n<p>Knowledge of attacker tactics is critical when defending your enterprise. Azure provides several capabilities aligned with building awareness of threat tactics. These capabilities include Azure Sentinel\u2019s hunting feature and threat intelligence connectors. Leveraging knowledge of attacker tactics enables blue team defenders to rapidly detect threats in proactive security models.<\/p>\n<p>Azure Sentinel&#8217;s hunting search-and-query tools are based on the MITRE framework, which enable you to proactively hunt for security threats across your organization\u2019s data sources, before an alert is triggered. After you discover which hunting query provides high-value insights into possible attacks, you can also create custom detection rules based on your query, and surface those insights as alerts to your security incident responders. While hunting, you can create bookmarks for interesting events, enabling you to return to them later, share them with others, and group them with other correlating events to create a compelling incident for investigation.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19611\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics1.png\" alt=\"Image CMMC Series5 LeverageKnowledgeAttackerTactics1\" width=\"801\" height=\"107\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics1.png 1663w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics1-300x40.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics1-1024x137.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics1-768x103.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics1-1536x205.png 1536w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/p>\n<p>You can sort hunting queries by attacker tactics via the steps below:<\/p>\n<ol>\n<li>In the Azure Sentinel portal, click <strong>Hunting<\/strong>.<\/li>\n<li>When you open the <strong>Hunting<\/strong> page, all the hunting queries are displayed in a single table. The table lists all the queries written by Microsoft&#8217;s team of security analysts as well as any additional query you created or modified.<\/li>\n<li>Select the <em>Tactics<\/em> data filter<\/li>\n<li>Select one or several tactics to filter Azure Sentinel hunting queries aligned to the attacker tactics. Tactics include: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Exfiltration, Command and Control, and Impact.\n<img decoding=\"async\" class=\"alignnone wp-image-19612\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics2.png\" alt=\"Image CMMC Series5 LeverageKnowledgeAttackerTactics2\" width=\"800\" height=\"616\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics2.png 926w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics2-300x231.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics2-768x591.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/li>\n<\/ol>\n<p>You can also incorporate knowledge of threat tactics by integrating threat intelligence with you Azure Sentinel Instance. Azure Sentinel lets you import the threat indicators your organization is using, which can enhance your security analysts&#8217; ability to detect and prioritize known threats. Several features from Azure Sentinel then become available or are enhanced including analytics, workbooks, hunting, and notebooks. Connect your threat intelligence platform to Azure Sentinel via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-threat-intelligence\">Connect Data from Threat Intelligence Providers<\/a><\/p>\n<ol>\n<li>Register your threat intelligence application in Azure Active Directory to get an application ID and application secret. Also make note of your Azure Active Directory tenant ID.<\/li>\n<li>Configure API permissions for the application. Add the Microsoft Graph Application permission <em>ThreatIndicators.ReadWhite.Owned<\/em> by to your registered application.<\/li>\n<li>Grant admin consent for the application. From the Azure portal: <strong>Azure Active Directory<\/strong> &gt; <strong>App registrations<\/strong> &gt; <strong>&lt;app name&gt;<\/strong> &gt; <strong>View API Permissions<\/strong> &gt; <strong>Grant admin consent for &lt;tenant name&gt;.<\/strong><\/li>\n<li>Configure threat intelligence platform or application for direct integration with Microsoft Graph Security tiInidcators API and send data to Azure Sentinel by specifying the following:\n<ol style=\"list-style-type: lower-alpha;\">\n<li>The values for the registered application\u2019s ID, secret, and tenant ID.<\/li>\n<li>For the target product, specify Azure Sentinel.<\/li>\n<li>For the action, specify alert<\/li>\n<\/ol>\n<\/li>\n<li>In the Azure portal, navigate to Azure Sentinel &gt; Data connectors and then select the <strong>Threat Intelligence Platforms (Preview) <\/strong>connector.\n<img decoding=\"async\" class=\"alignnone wp-image-19613\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics3.png\" alt=\"Image CMMC Series5 LeverageKnowledgeAttackerTactics3\" width=\"500\" height=\"796\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics3.png 502w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics3-188x300.png 188w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/li>\n<li>Select <strong>Open connector page<\/strong>, and then <strong>Connect<\/strong>.<\/li>\n<li>To view the threat indicators imported into Azure Sentinel, navigate to <strong>Azure Sentinel &#8211; Logs &gt; SecurityInsights<\/strong>, and then expand <strong>ThreatIntelligenceIndicator<\/strong>.\n<img decoding=\"async\" class=\"alignnone size-full wp-image-19614\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics4.png\" alt=\"Image CMMC Series5 LeverageKnowledgeAttackerTactics4\" width=\"631\" height=\"115\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics4.png 631w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-LeverageKnowledgeAttackerTactics4-300x55.png 300w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/><\/li>\n<\/ol>\n<p><strong>3) Detect &amp; Report Events<\/strong><\/p>\n<p>Azure Sentinel enables blue teams and incident responders to leverage data sources, machine learning and threat intelligence to detect, respond and eradicate the threat. Azure Sentinel enables incident responders to move from reactive to proactive incident response with hunting queries. To help security analysts look proactively for new anomalies that weren&#8217;t detected by your security apps, Azure Sentinel&#8217;s built-in hunting queries guide you into asking the right questions to find issues in the data you already have on your network. With Azure Sentinel hunting, you can take advantage of the following capabilities:<\/p>\n<ul>\n<li><strong>Built-in queries<\/strong>: These built-in hunting queries are developed by Microsoft security researchers on a continuous basis, adding new queries, and fine-tuning existing queries to provide you with an entry point to look for new detections and figure out where to start hunting for the beginnings of new attacks.<\/li>\n<li><strong>Powerful query language with IntelliSense<\/strong>: Built on top of a query language that gives you the flexibility you need to take hunting to the next level.<\/li>\n<li><strong>Create your own bookmarks<\/strong>: Bookmarks let you save items for later, to be used to create an incident for investigation. For more information about bookmarks, see Use bookmarks in hunting.<\/li>\n<li><strong>Use notebooks to automate investigation<\/strong>: Notebooks encapsulate all the hunting steps in a reusable playbook that can be shared with others in your organization.<\/li>\n<li><strong>Query the stored data<\/strong>: The data is accessible in tables for you to query. For example, you can query process creation, DNS events, and many other event types.<\/li>\n<li><strong>Links to community<\/strong>: Leverage the power of the greater community to find additional queries and data sources.<\/li>\n<\/ul>\n<p>Start hunting with Azure Sentinel via the steps below:<\/p>\n<ol>\n<li>In the Azure Sentinel portal, click <strong>Hunting<\/strong>.<\/li>\n<li>When you open the <strong>Hunting<\/strong> page, all the hunting queries are displayed in a single table. The table lists all the queries written by Microsoft&#8217;s team of security analysts as well as any additional query you created or modified.<\/li>\n<li>Click <strong>Run query<\/strong> in the hunting query details page to run any query without leaving the hunting page. The number of matches is displayed within the table. Review the list of hunting queries and their matches. Check out which stage in the kill chain the match is associated with.<\/li>\n<li>Perform a quick review of the underlying query in the query details pane or click <strong>View query result<\/strong> to open the query in Log Analytics. At the bottom, review the matches for the query.<\/li>\n<li>Click on the row and select <strong>Add bookmark<\/strong> to add the rows to be investigated &#8211; you can do this for anything that looks suspicious.<\/li>\n<li>Then, go back to the main <strong>Hunting<\/strong> page and click the Bookmarks tab to see all the suspicious activities.<\/li>\n<li>Select a bookmark and then click <strong>Investigate<\/strong> to open the investigation experience. You can filter the bookmarks. For example, if you&#8217;re investigating a campaign, you can create a tag for the campaign and then filter all the bookmarks based on the campaign.<\/li>\n<\/ol>\n<p>After you\u2019ve discovered which hunting query provides high value insights into possible attacks, you can also create custom detection rules based on your query and surface those insights as alerts to your security incident responders. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/hunting\">Hunt for threats with Azure Sentinel<\/a>.<\/p>\n<p><strong>4) Analyze &amp; Triage Events<\/strong><\/p>\n<p>An incident can include multiple alerts. It&#8217;s an aggregation of all the relevant evidence for a specific investigation. An incident is created based on analytic rules that you created in the Analytics page. The properties related to the alerts, such as severity, and status, are set at the incident level. After you let Azure Sentinel know what kinds of threats you&#8217;re looking for and how to find them, you can monitor detected threats by investigating incidents. Investigate incidents in Azure Sentinel via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/tutorial-investigate-cases\">Tutorial: Investigate incidents with Azure Sentinel<\/a>.<\/p>\n<ol>\n<li>Sign into the <a href=\"https:\/\/portal.azure.com\/\">Azure Portal<\/a>. Select the subscription in which Azure Sentinel will be created.<\/li>\n<li>Search for and select <em>Azure Sentinel.<\/em><\/li>\n<li>Select <strong>Incidents<\/strong>. The <strong>Incidents<\/strong> page lets you know how many incidents you have, how many are open, how many you&#8217;ve set to <em>In progress<\/em>, and how many are <em>closed<\/em>. For each incident, you can see the time it occurred, and the status of the incident. Look at the severity to decide which incidents to handle first.\n<img decoding=\"async\" class=\"alignnone wp-image-19583\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents1.png\" alt=\"Image CMMC Series5 AnalyzeTriageEvents1\" width=\"801\" height=\"370\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents1.png 1365w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents1-300x139.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents1-1024x473.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents1-768x355.png 768w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/li>\n<li>You can filter the incidents as needed, for example by status or severity.<\/li>\n<li>To begin an investigation, select a specific incident. On the right, you can see detailed information for the incident including its severity, summary of the number of entities involved, the raw events that triggered this incident, and the incident\u2019s unique ID.<\/li>\n<li>To view more details about the alerts and entities in the incident, select <strong>View full details<\/strong> in the incident page and review the relevant tabs that summarize the incident information. In the <strong>Alerts<\/strong> tab, review the alert itself. You can see all relevant information about the alert \u2013 the query that triggered the alert, the number of results returned per query, and the ability to run playbooks on the alerts.\n<img decoding=\"async\" class=\"alignnone wp-image-19584\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents2.png\" alt=\"Image CMMC Series5 AnalyzeTriageEvents2\" width=\"800\" height=\"659\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents2.png 840w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents2-300x247.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-AnalyzeTriageEvents2-768x633.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/li>\n<li>Select <strong>Investigate<\/strong> to view the investigation map.<\/li>\n<\/ol>\n<p><strong>5) Gather Incident Artifacts<\/strong><\/p>\n<p>Once an incident is confirmed, incident responders must gather relevant artifacts and assess the scope of the incident. There are several processes required for artifact and forensic evidence collection which are outside the scope of this blog. Azure Sentinel has a helpful tool for keeping track of data during threat hunting and incident investigations.<\/p>\n<p>Hunting bookmarks in Azure Sentinel help you do this, by preserving the queries you ran in Azure Sentinel &#8211; Logs, along with the query results that you deem relevant. You can also record your contextual observations and reference your findings by adding notes and tags. Bookmarked data is visible to you and your teammates for easy collaboration.<\/p>\n<p>You can revisit your bookmarked data at any time on the Bookmarks tab of the Hunting pane. You can use filtering and search options to quickly find specific data for your current investigation. Alternatively, you can view your bookmarked data directly in the <em>HuntingBookmark<\/em> table in your Log Analytics workspace. Add a hunting bookmark via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/bookmarks\">Keep track of data during hunting with Azure Sentinel<\/a>.<\/p>\n<ol>\n<li>In the Azure portal, navigate to <strong>Sentinel <\/strong>&gt; <strong>Threat management<\/strong> &gt; <strong>Hunting<\/strong> to run queries for suspicious and anomalous behavior.<\/li>\n<li>Select one of the hunting queries and on the right, in the hunting query details, select Run Query.<\/li>\n<li>Select <strong>View query results<\/strong> which opens the <strong>Logs<\/strong> pane.\n<img decoding=\"async\" class=\"alignnone wp-image-19585\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts1.png\" alt=\"Image CMMC Series5 GatherIncidentArtifacts1\" width=\"351\" height=\"464\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts1.png 584w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts1-227x300.png 227w\" sizes=\"(max-width: 351px) 100vw, 351px\" \/><\/li>\n<li>From the log query results list, use the checkboxes to select one or more rows that contain the information you find interesting.<\/li>\n<li>Select <strong>Add bookmark\n<img decoding=\"async\" class=\"alignnone wp-image-19586\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts2.png\" alt=\"Image CMMC Series5 GatherIncidentArtifacts2\" width=\"799\" height=\"276\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts2.png 1379w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts2-300x104.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts2-1024x353.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts2-768x265.png 768w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/>\n<\/strong><\/li>\n<li>On the right, in the <strong>Add bookmark<\/strong> pane, optionally, update the bookmark name, add tags, and notes to help you identify what was interesting about the item.<\/li>\n<li>In the Query Information section, use the drop-down boxes to extract information from the query results for the <strong>Account<\/strong>, <strong>Host<\/strong>, and <strong>IP address<\/strong> entity types. This action maps the selected entity type to a specific column from the query result.\n<img decoding=\"async\" class=\"alignnone wp-image-19587\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts3.png\" alt=\"Image CMMC Series5 GatherIncidentArtifacts3\" width=\"350\" height=\"437\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts3.png 422w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-GatherIncidentArtifacts3-240x300.png 240w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/><\/li>\n<li>Click <strong>Save<\/strong> to commit your changes and add the bookmark.<\/li>\n<\/ol>\n<p><strong>6) Conduct Incident Reporting<\/strong><\/p>\n<p>Conducting incident reporting is another customer responsibility which is aligned to the established incident response plan and organizational requirements. There are two features in Azure Sentinel which facilitate incident reporting. The first feature is Azure Sentinel Workbooks. Workbooks provide a dashboard to summarize security data visually. Azure Sentinel includes numerous default dashboards and customizable templates to facilitate incident reporting. View Azure Sentinel Workbooks via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/quickstart-get-visibility\">Quickstart: Get started with Azure Sentinel<\/a>.<\/p>\n<ol>\n<li>In the Azure portal, navigate to <strong>Sentinel <\/strong>&gt; <strong>Threat management<\/strong> &gt; <strong>Workbooks<\/strong> to view available workbooks and templates.\n<img decoding=\"async\" class=\"alignnone wp-image-19588\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting1.png\" alt=\"Image CMMC Series5 ConductIncidentReporting1\" width=\"800\" height=\"411\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting1.png 1591w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting1-300x154.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting1-1024x525.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting1-768x394.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting1-1536x788.png 1536w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/li>\n<li>Select a <strong>Workbook<\/strong> from <strong>My Workbooks<\/strong> or from <strong>Templates<\/strong> (Custom). In this example, we\u2019ll select the <em>Identity and Access Workbook<\/em>.\n<img decoding=\"async\" class=\"alignnone wp-image-19589\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting2.png\" alt=\"Image CMMC Series5 ConductIncidentReporting2\" width=\"801\" height=\"385\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting2.png 1559w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting2-300x144.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting2-1024x493.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting2-768x369.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting2-1536x739.png 1536w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/li>\n<li>Select <strong>Edit<\/strong> to customize for your reporting requirements.<\/li>\n<li>Select <strong>Share<\/strong> to collaborate with peers or partner organizations.<\/li>\n<\/ol>\n<p>Another Azure Sentinel tool for incident reporting is integration with Jupyter notebooks. The foundation of Azure Sentinel is the data store; it combines high performance querying, dynamic schema, and scales to massive data volumes. The Azure portal and all Azure Sentinel tools use a common API to access this data store. The same API is also available for external tools such as Jupyter notebooks and Python. While many common tasks can be carried out in the portal, Jupyter extends the scope of what you can do with this data. It combines full programmability with a huge collection of libraries for machine learning, visualization, and data analysis. These attributes make Jupyter a compelling tool for security investigation and hunting. Run a notebook from Azure Sentinel via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/notebooks\">Use Jupyter notebooks to hunt for security threats<\/a>.<\/p>\n<ol>\n<li>From the Azure portal, navigate to <strong>Azure Sentinel<\/strong> &gt; <strong>Threat management<\/strong> &gt; <strong>Notebooks<\/strong>, where you can see notebooks that Azure Sentinel provides.<\/li>\n<li>Select individual notebooks to read their descriptions, required data types, and data sources. For example:\n<img decoding=\"async\" class=\"alignnone wp-image-19590\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting3.png\" alt=\"Image CMMC Series5 ConductIncidentReporting3\" width=\"801\" height=\"458\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting3.png 946w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting3-300x172.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-ConductIncidentReporting3-768x439.png 768w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/li>\n<li>Select the notebook you want to use, and then select <strong>Launch Notebook (Preview)<\/strong> to clone and configure the notebook into a new Azure Notebooks project that connects to your Azure Sentinel workspace. When the process is complete, the notebook opens within Azure Notebooks for you to run.<\/li>\n<\/ol>\n<p><strong>7) Employ Automated Responses<\/strong><\/p>\n<p>A security playbook is a collection of procedures that can be run from Azure Sentinel in response to an alert. A security playbook can help automate and orchestrate your response and can be run manually or set to run automatically when specific alerts are triggered. Security playbooks in Azure Sentinel are based on Azure Logic Apps, which means that you get all the power, customizability, and built-in templates of Logic Apps. Each playbook is created for the specific subscription you choose, but when you look at the Playbooks page, you will see all the playbooks across any selected subscriptions.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19591\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EmployAutomatedResponses1.png\" alt=\"Image CMMC Series5 EmployAutomatedResponses1\" width=\"801\" height=\"478\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EmployAutomatedResponses1.png 1318w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EmployAutomatedResponses1-300x179.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EmployAutomatedResponses1-1024x611.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series5-EmployAutomatedResponses1-768x458.png 768w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/p>\n<p>Follow these steps to create a new security playbook in Azure Sentinel:<\/p>\n<ol>\n<li>Open the <strong>Azure Sentinel<\/strong> dashboard.<\/li>\n<li>Under <strong>Management<\/strong>, select <strong>Playbooks<\/strong>.<\/li>\n<li>In the <strong>Azure Sentinel &#8211; Playbooks (Preview)<\/strong> page, click Add button.<\/li>\n<li>In the <strong>Create Logic app<\/strong> page, type the requested information to create your new logic app, and click <strong>Create<\/strong>.<\/li>\n<li>Select <strong>Blank Logic App<\/strong>.<\/li>\n<li>You are taken to the Logic App Designer where you can either build new or edit the template. For more information on creating a playbook with Logic Apps.<\/li>\n<li>Type <em>Azure Sentinel<\/em> in the <strong>Search all connectors field<\/strong> and select <strong>When a response to an Azure Sentinel alert is triggered<\/strong>.<\/li>\n<li>Use the <strong>Get entities<\/strong> functions, which enable you to get the relevant entities from inside the <strong>Entities<\/strong> list, such as accounts, IP addresses and hosts.<\/li>\n<li>Now you can define what happens when you trigger the playbook. You can add an action, logical condition, switch case conditions, or loops. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/tutorial-respond-threats-playbook\">Tutorial: Set up automated threat responses in Azure Sentinel<\/a>.<\/li>\n<\/ol>\n<p><strong>8) Conduct Root Cause Analysis<\/strong><\/p>\n<p>Root Cause Analysis (RCA) is one of the closing steps on the incident response process. Its important for incident responders to understand how the attack occurred and what mitigations are required to remediate the weakness. Azure Sentinel provides the investigation graph to deep dive incidents to provide a timeline of events, associated artifacts and relationship visualization.<\/p>\n<p>The investigation graph enables analysts to ask the right questions for each investigation. The investigation graph helps you understand the scope, and identify the root cause, of a potential security threat by correlating relevant data with any involved entity. You can dive deeper and investigate any entity presented in the graph by selecting it and choosing between different expansion options.<\/p>\n<p>The investigation graph provides you with:<\/p>\n<ul>\n<li><strong>Visual context from raw data<\/strong>: The live, visual graph displays entity relationships extracted automatically from the raw data. This enables you to easily see connections across different data sources.<\/li>\n<li><strong>Full investigation scope discovery<\/strong>: Expand your investigation scope using built-in exploration queries to surface the full scope of a breach.<\/li>\n<li><strong>Built-in investigation steps<\/strong>: Use predefined exploration options to make sure you are asking the right questions in the face of a threat.<\/li>\n<\/ul>\n<p>For more information on using Azure Sentinel Investigation graph to deep dive incidents, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/tutorial-investigate-cases\">Tutorial: Investigate incidents with Azure Sentinel<\/a>.<\/p>\n<h5><strong>Learn more about CMMC with Microsoft <\/strong><\/h5>\n<p>Here are some of the best resource to learn more about CMMC in the cloud with Microsoft:<\/p>\n<ul>\n<li><a href=\"https:\/\/aka.ms\/CMMCResponse\">Accelerating CMMC compliance for Microsoft cloud (in depth review)<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=sey4aWuqtvk\">CMMC-AB Standards with Regan Edens &#8211; National Conversation<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-dfars?view=o365-worldwide\">Defense Federal Acquisition Regulation Supplement (DFARS)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-itar?view=o365-worldwide\">International Traffic in Arms Regulations (ITAR)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-fedramp?view=o365-worldwide\">Federal Risk and Authorization Management Program (FedRAMP)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-ear?view=o365-worldwide\">US Export Administration Regulations (EAR)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-nist-sp-800-171?view=o365-worldwide\">NIST SP 800-171 Compliance<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/samples\/nist-sp-800-53-rev4\/\">Overview of the NIST SP 800-53 R4 blueprint sample<\/a><\/li>\n<\/ul>\n<p>Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a> to keep up with our expert coverage on security matters and follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a> or visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\">website<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>Are you a federal government agency that needs help with cybersecurity? Reach out to <a href=\"https:\/\/www.linkedin.com\/in\/tjbanasik\/\">TJ Banasik<\/a> or <a href=\"http:\/\/www.linkedin.com\/in\/marmci\">Mark McIntyre<\/a> for additional details on the content above, or if you have any other questions about Microsoft\u2019s cybersecurity investments for the federal government.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the fifth in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into maintenance &amp; media protection, recovery &amp; risk management, security assessment &amp; risk management, system &amp; communications protection and system &amp; information integrity. In this [&hellip;]<\/p>\n","protected":false},"author":16830,"featured_media":19593,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14],"tags":[75,95,216,3043,3125],"class_list":["post-19575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-learning","tag-azure","tag-azure-government","tag-cybersecurity","tag-cybersecurity-maturity-model-certification-cmmc","tag-incident-response-maturity"],"acf":[],"blog_post_summary":"<p>This is the fifth in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into maintenance &amp; media protection, recovery &amp; risk management, security assessment &amp; risk management, system &amp; communications protection and system &amp; information integrity. In this [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/19575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/users\/16830"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/comments?post=19575"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/19575\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media\/19593"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media?parent=19575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/categories?post=19575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/tags?post=19575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}