{"id":19680,"date":"2020-05-21T07:00:59","date_gmt":"2020-05-21T14:00:59","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/azuregov\/?p=19680"},"modified":"2020-06-01T10:33:17","modified_gmt":"2020-06-01T17:33:17","slug":"cmmc-with-microsoft-azure-security-assessment-situational-awareness-8-of-10","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-security-assessment-situational-awareness-8-of-10\/","title":{"rendered":"CMMC with Microsoft Azure: Security Assessment &#038; Situational Awareness (8 of 10)"},"content":{"rendered":"<p><em>This is the eighth in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into system &amp; communications protection and system &amp; information integrity. In this eighth blog of the series we will explore how to leverage Microsoft Azure for security assessment &amp; situational awareness.<\/em><\/p>\n<p><em>Please note that the information cutoff date for this post is October 2020, and that as of the date of this writing, CMMC developments and guidance are in progress. Additionally, as of the date of this writing, the CMMC Accreditation Body has not certified any the third-party assessors and guidance on the formal assessment process is still under development.\u00a0 As a result, the information herein, including our CMMC related offerings, may be enhanced in the future to align with future guidance from the DoD and CMMC Accreditation Body. Microsoft is closely tracking developments related to the CMMC.<\/em><\/p>\n<p><strong>Stay tuned for the upcoming CMMC blogs in the series:<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-access-control-1-of-10\">Access Control Maturity<\/a>\u00a0\u2013 live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-audit-accountability-management-2-of-10\">Audit &amp; Accountability Maturity<\/a>\u00a0\u2013 live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-asset-configuration-management-3-of-10\/\">Asset &amp; Configuration Management Maturity<\/a>\u00a0\u2013 live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-identification-authentication-maturity-4-of-10\">Identification &amp; Authentication Maturity<\/a>\u00a0\u2013 live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-incident-response-maturity-5-of-10\">Incident Response Maturity<\/a>\u00a0\u2013 live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-maintenance-media-protection-6-of-10\">Maintenance &amp; Media Protection Maturity<\/a>\u00a0\u2013 live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-recovery-risk-management-7-of-10\">Recovery &amp; Risk Management Maturity<\/a> &#8211; live<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-security-assessment-situational-awareness-8-of-10\/\">Security Assessment &amp; Situational Awareness Maturity<\/a> &#8211; this blog<\/li>\n<li><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/cmmc-with-microsoft-azure-system-communications-protection-9-of-10\/\">System &amp; Communications Protection Maturity<\/a> &#8211; live<\/li>\n<li>System &amp; Information Integrity Maturity (5\/28)<\/li>\n<\/ol>\n<h5><strong>What is Cybersecurity Maturity Model Certification (CMMC)?<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"wp-image-19535 alignright\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series4-WhatIsCMMC.png\" alt=\"Image CMMC Series4 WhatIsCMMC\" width=\"450\" height=\"289\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series4-WhatIsCMMC.png 759w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series4-WhatIsCMMC-300x192.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>The Defense Industrial Base (DIB) is charged with implementing <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-dfars?view=o365-worldwide\">Defense Federal Acquisition Regulation Supplement (DFARS)<\/a> 252.204-7012. DFARS requires organizations supporting the Department of Defense (DoD) to implement <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-nist-sp-800-171?view=o365-worldwide\">NIST SP 800-171<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-fedramp?view=o365-worldwide\">FedRAMP<\/a> Moderate Impact level controls. DoD has mandated CMMC with periodic assessments in order to strengthen cybersecurity across the DIB. CMMC builds upon DFARS 7012 by verifying an organization\u2019s readiness to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) such as International Traffic in Arms Regulation (ITAR) and Export Administration Regulations (EAR) export-controlled data.<\/p>\n<p>CMMC extends beyond the parent organization into sub-contractors, partners, and suppliers. The framework is intended to enforce critical thinking approaches for comprehensive security. The CMMC framework specifies 5 levels of maturity measurement from Maturity Level 1 (Basic Cyber Hygiene) to Maturity Level 5 (Proactive &amp; Advanced Cyber Practice). The Certification levels will be determined through audits from independent, third-party assessment organizations (C3PAO).<\/p>\n<h5><strong>What preparation is required for CMMC alignment to security assessment &amp; situational awareness?<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"wp-image-19520 alignleft\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-Preparation.png\" alt=\"Image CMMC Series3 Preparation\" width=\"237\" height=\"245\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-Preparation.png 440w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series3-Preparation-290x300.png 290w\" sizes=\"(max-width: 237px) 100vw, 237px\" \/><\/p>\n<p>It\u2019s important to understand that compliance is a shared responsibility between the customer and the Cloud Services Provider (CSP). The graphic on the left demonstrates the CSP responsibility in respective cloud models (On-Prem, IaaS, PaaS, SaaS) with dark blue aligning with customer responsibility and light blue aligning with CSP responsibility. For example, CMMC requirements such as Physical Protection (PE) for limiting physical access (C028) is managed by the CSP. Establishment of respective policies and procedures are the customer\u2019s responsibility. It\u2019s important to note that this blog series is aligned with setting the foundation of controls for CMMC Maturity Levels 1 &amp; 2. Once C3PAOs are identified by the CMMC Accreditation Body, customers are advised to work with their respective C3PAO for guidance on comprehensive alignment of controls, audit and certification.<\/p>\n<p>The administrative controls for the CMMC Security Assessment (CA-MC) and Situational Awareness Maturity (SA-MC) are listed here. These controls fall within the customer\u2019s responsibility. This starts with establishing polices to include security assessment &amp; situational awareness (ML2) and progresses to a documented approach across all applicable organizational units (ML5). These controls should be formally created, documented in the System Security Plan (SSP) and implemented within the organization.<\/p>\n<p><strong><img decoding=\"async\" class=\"alignnone wp-image-19697\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AdminControlsTable.png\" alt=\"Image CMMC Series8 AdminControlsTable\" width=\"600\" height=\"657\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AdminControlsTable.png 678w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AdminControlsTable-274x300.png 274w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/strong><\/p>\n<h5><strong>Microsoft Azure Security Controls Aligned to CMMC: Security Assessment &amp; Security Awareness<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19698\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-BigTable.png\" alt=\"Image CMMC Series8 BigTable\" width=\"800\" height=\"901\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-BigTable.png 4733w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-BigTable-266x300.png 266w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-BigTable-909x1024.png 909w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-BigTable-768x865.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-BigTable-1364x1536.png 1364w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-BigTable-1819x2048.png 1819w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h5><strong>Azure Security Controls Aligned to CMMC: Security Assessment &amp; Situational Awareness<\/strong><\/h5>\n<p>Microsoft Azure Government has developed a 7-step process to facilitate security assessment &amp; situational awareness with the security principles within CMMC, NIST SP 800-53 R4 and NIST SP 800-171 standards. Note this process is a starting point, as CMMC requires alignment of people, processes, policy and technology so refer to organizational requirements and respective standards for implementation. Azure has several offerings to facilitate security assessment &amp; situational awareness including <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\">Azure Security Center<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/\">Azure Sentinel<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/blueprints\/\">Azure Blueprints<\/a> and the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/graph-security-api\">Microsoft Graph Security API<\/a>.<\/p>\n<ul>\n<li><strong>Azure Security Center<\/strong> is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud &#8211; whether they&#8217;re in Azure or not &#8211; as well as on premises.<\/li>\n<li><strong>Azure Sentinel <\/strong>is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.<\/li>\n<li><strong>Azure Blueprints <\/strong>enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization&#8217;s standards, patterns, and requirements.<\/li>\n<li><strong>Microsoft Graph Security API <\/strong>simplifies integration with Microsoft and third-party security solutions. Using one endpoint, one software development kit (SDK), one schema, and one authentication mechanism, customers and partners can easily build integrated security applications, workflows and analytics.<\/li>\n<\/ul>\n<h5><strong>7 Steps to CMMC for Security Assessment &amp; Situational Awareness with Microsoft Azure<\/strong><\/h5>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19699\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-7Steps.png\" alt=\"Image CMMC Series8 7Steps\" width=\"701\" height=\"333\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-7Steps.png 1045w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-7Steps-300x142.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-7Steps-1024x486.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-7Steps-768x365.png 768w\" sizes=\"(max-width: 701px) 100vw, 701px\" \/><\/p>\n<p><strong>1) Assess Security Controls<\/strong><\/p>\n<p>Azure Security Center helps streamline the process for meeting regulatory compliance requirements, using the regulatory compliance dashboard. In the dashboard, Security Center provides insights into your compliance posture based on continuous assessments of your Azure environment. Security Center analyzes risk factors in your hybrid cloud environment according to security best practices. These assessments are mapped to compliance controls from a supported set of standards. In the Regulatory compliance dashboard, you can see the status of all the assessments within your environment in the context of a particular standard or regulation. As you act on the recommendations and reduce risk factors in your environment, your compliance posture improves. Leverage Azure Security Center to assess your regulatory compliance via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-compliance-dashboard#assess-your-regulatory-compliance\">Tutorial: Improve your regulatory compliance<\/a>.<\/p>\n<ol>\n<li>Navigate to <strong>Security Center<\/strong>.<\/li>\n<li>Select <strong>Regulatory compliance<\/strong>.<\/li>\n<li>Assess Security Control alignment to respective compliance standards. Note you can customize this dashboard by selecting <strong>Manage Compliance Policies<\/strong>.\n<img decoding=\"async\" class=\"alignnone wp-image-19700\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls1.png\" alt=\"Image CMMC Series8 AccessSecurityControls1\" width=\"799\" height=\"387\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls1.png 1490w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls1-300x145.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls1-1024x496.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls1-768x372.png 768w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/><\/li>\n<li>Select <strong>Download Report<\/strong> and specify the desired framework to generate a detailed PDF report.\n<img decoding=\"async\" class=\"alignnone wp-image-19701\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls2.png\" alt=\"Image CMMC Series8 AccessSecurityControls2\" width=\"500\" height=\"497\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls2.png 889w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls2-300x298.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls2-150x150.png 150w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-AccessSecurityControls2-768x763.png 768w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/li>\n<\/ol>\n<p><strong>2) Monitor Security Controls<\/strong><\/p>\n<p>Azure Blueprints provides an avenue to apply security controls, policies and resources. Just as a blueprint allows an engineer or an architect to sketch a project&#8217;s design parameters, Azure Blueprints enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization&#8217;s standards, patterns, and requirements. Azure Blueprints makes it possible for development teams to rapidly build and stand up new environments with trust they&#8217;re building within organizational compliance with a set of built-in components &#8212; such as networking &#8212; to speed up development and delivery. Azure Blueprints can actively apply controls with the <em>deployifnotexists<\/em> option or can be leveraged for monitoring controls passively with the <em>auditifnotexists<\/em> option. Assign an Azure Blueprint via the steps below. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/tutorials\/protect-new-resources\">Tutorial: Protect new resources with Azure Blueprints resource locks<\/a>.<\/p>\n<ol>\n<li>Select <strong>All services<\/strong> in the left pane. Search for and select <strong>Blueprints<\/strong>.<\/li>\n<li>Select the <strong>Blueprint definitions<\/strong> page on the left.<\/li>\n<li>Select <strong>Assign blueprint<\/strong> at the top of the blueprint definition page.<\/li>\n<li>Provide the parameter values for the blueprint assignment:\n<ul style=\"list-style-type: disc;\">\n<li><strong>Subscriptions<\/strong>: Select target subscription<\/li>\n<li><strong>Assignment name<\/strong>: Assign a Blueprint name. This is pre-populated if you use a default Blueprint template.<\/li>\n<li><strong>Location<\/strong>: Select a region in which to create the managed identity. Azure Blueprint uses this managed identity to deploy all artifacts in the assigned blueprint.<\/li>\n<li><strong>Blueprint definition version<\/strong>: Select the published version 1.0 of the blueprint definition.<\/li>\n<li><strong>Lock Assignment<\/strong>: Select the Read Only blueprint lock mode.<\/li>\n<li><strong>Managed Identity<\/strong>: Use default option for System Assigned.<\/li>\n<li><strong>Artifact Parameters<\/strong>: Assign respective parameters (resource names, types, locations).\n<img decoding=\"async\" class=\"alignnone wp-image-19702\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-MonitorSecurityControls.png\" alt=\"Image CMMC Series8 MonitorSecurityControls\" width=\"499\" height=\"603\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-MonitorSecurityControls.png 609w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-MonitorSecurityControls-248x300.png 248w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/><\/li>\n<\/ul>\n<\/li>\n<li>Select <strong>Assign<\/strong>.<\/li>\n<\/ol>\n<p><strong>3) Leverage Scanning Tools<\/strong><\/p>\n<p>Conducting penetration testing is a valuable tool to assessing your security posture. Penetration testing is proactive security control to test for vulnerabilities before a they\u2019re discovered by real world threats. Penetration testing falls within the customer\u2019s organizational requirements and may be conducted by internal security teams or via partnership with a third party. The Azure Marketplace provides numerous offerings for security assessment tools. These solutions are both first and third party including flexible models for free\/open source, trial, Pay As You Go (PAYG), Enterprise Agreements (EA) and Bring Your Own License (BYOL). Search the Azure Marketplace for security assessment tools via the steps below. For more information, see <a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/\">Azure Marketplace<\/a>.<\/p>\n<ol>\n<li>Sign into the <a href=\"https:\/\/portal.azure.com\/\">Azure Portal<\/a>.<\/li>\n<li>Search for and select <em>Marketplace.<\/em><\/li>\n<li>Select <strong>Security<\/strong> from the categories on the left.\n<img decoding=\"async\" class=\"alignnone wp-image-19703\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool1.png\" alt=\"Image CMMC Series8 LeverageScanningTool1\" width=\"700\" height=\"434\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool1.png 1254w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool1-300x186.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool1-1024x635.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool1-768x476.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/li>\n<li>Select a security assessment tool such as <em>Kali Linux<\/em> and select <strong>Create<\/strong>.\n<img decoding=\"async\" class=\"alignnone wp-image-19704\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool2.png\" alt=\"Image CMMC Series8 LeverageScanningTool2\" width=\"699\" height=\"285\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool2.png 1315w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool2-300x122.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool2-1024x417.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-LeverageScanningTool2-768x313.png 768w\" sizes=\"(max-width: 699px) 100vw, 699px\" \/><\/li>\n<\/ol>\n<p><strong>4) Perform Penetration Testing<\/strong><\/p>\n<p>Organizations can better prepare for the impact of current and future threats by simulating real-world attacks and exercising Tactics, Techniques and Procedures (TTPs) that determined and persistent adversaries use during breaches. Rather than simply seeking to keep security incidents from occurring, it is critical to assume that a security incident can and will occur. The information gained from Red Teaming and live site penetration testing exercises helps to significantly strengthen defenses, improve response strategies, train defenders, and drive greater effectiveness of the entire security program.<\/p>\n<p>Conducting penetration testing generally falls within the customer\u2019s responsibility of the Cloud Services Provider (CSP) responsibility model. Its important for customers to review and adhere to Microsoft\u2019s Penetration Testing Rules of Engagement prior to testing. Care must be taken to limit all penetration tests to your assets and avoid unintended consequences to other customers around you. For more information see, <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/pentest-rules-of-engagement\">Microsoft\u2019s Penetration Testing Rules of Engagement<\/a>.<\/p>\n<p>Microsoft also conducts internal red-team exercises against the Microsoft managed cloud infrastructure, services and applications. Red Teaming is above and beyond compliance accreditations or other industry requirements and provides Microsoft, and our customers, with the additional assurance that Microsoft enterprise cloud services are continuously performing security monitoring, testing, and updates to reflect the constantly changing threats that both customers and Microsoft face.\u00a0 For more information, see <a href=\"https:\/\/download.microsoft.com\/download\/C\/1\/9\/C1990DBA-502F-4C2A-848D-392B93D9B9C3\/Microsoft_Enterprise_Cloud_Red_Teaming.pdf\">Microsoft Enterprise Cloud Red Teaming<\/a>.<\/p>\n<p><strong>5) Ingest Cyber Threat Data<\/strong><\/p>\n<p>Azure Sentinel lets you import the threat indicators your organization is using, which can enhance your security analysts&#8217; ability to detect and prioritize known threats. Several features from Azure Sentinel then become available or are enhanced:<\/p>\n<ul>\n<li><strong>Analytics<\/strong> includes a set of scheduled rule templates you can enable to generate alerts and incidents based on matches of log events from your threat indicators.<\/li>\n<li><strong>Workbooks<\/strong> provide summarized information about the threat indicators imported into Azure Sentinel and any alerts generated from analytics rules that match your threat indicators.<\/li>\n<li><strong>Hunting queries<\/strong> allow security investigators to use threat indicators within the context of common hunting scenarios.<\/li>\n<li><strong>Notebooks<\/strong> can use threat indicators when you investigate anomalies and hunt for malicious behaviors.<\/li>\n<\/ul>\n<p>You can stream threat indicators to Azure Sentinel by using one of the integrated threat intelligence platform (TIP) products listed in the next section, connecting to TAXII servers, or by using direct integration with the Microsoft Graph Security tiIndicators API:<\/p>\n<ul>\n<li>MISP Open Source Threat Intelligence Platform<\/li>\n<li>Palo Alto Networks MineMeld<\/li>\n<li>ThreatConnect Platform<\/li>\n<\/ul>\n<p>Connect Azure Sentinel to your threat intelligence platform via the following steps. For more information, see <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/connect-threat-intelligence\">Connect data from threat intelligence providers<\/a>.<\/p>\n<ol>\n<li>Register an application in Azure Active Directory to get an application ID, application secret, and Azure Active Directory tenant ID. You need these values for when you configure your integrated TIP product or app that uses direct integration with Microsoft Graph Security tiIndicators API.<\/li>\n<li>Configure API permissions for the registered application: Add the Microsoft Graph Application permission <strong>ThreatIndicators.ReadWrite.OwnedBy<\/strong> to your registered application.<\/li>\n<li>Ask your Azure Active Directory tenant administrator to grant admin consent to the registered application for your organization. From the Azure portal: <strong>Azure Active Directory &gt; App registrations &gt; &lt;app name&gt; &gt; View API Permissions &gt; Grant admin consent for &lt;<em>tenant name<\/em>&gt;<\/strong>.<\/li>\n<li>Configure your TIP product or app that uses direct integration with Microsoft Graph Security tiIndicators API to send indicators to Azure Sentinel by specifying the following:\n<ol style=\"list-style-type: lower-alpha;\">\n<li>The values for the registered application&#8217;s ID, secret, and tenant ID.<\/li>\n<li>For the target product, specify Azure Sentinel.<\/li>\n<li>For the action, specify alert.<\/li>\n<\/ol>\n<\/li>\n<li>In the Azure portal, navigate to <strong>Azure Sentinel &gt; Data connectors<\/strong> and then select the <strong>Threat Intelligence Platforms (Preview)<\/strong> connector.\n<img decoding=\"async\" class=\"alignnone wp-image-19705\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-IngestCyberThreatData.png\" alt=\"Image CMMC Series8 IngestCyberThreatData\" width=\"699\" height=\"342\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-IngestCyberThreatData.png 1593w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-IngestCyberThreatData-300x147.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-IngestCyberThreatData-1024x500.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-IngestCyberThreatData-768x375.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-IngestCyberThreatData-1536x750.png 1536w\" sizes=\"(max-width: 699px) 100vw, 699px\" \/><\/li>\n<li>Select <strong>Open connector page<\/strong>, and then <strong>Connect<\/strong>.<\/li>\n<li>To view the threat indicators imported into Azure Sentinel, navigate to <strong>Azure Sentinel &#8211; Logs &gt; SecurityInsights<\/strong> and then expand <strong>ThreatIntelligenceIndicator<\/strong>.<\/li>\n<\/ol>\n<p><strong>6) Conduct Threat Hunting<\/strong><\/p>\n<p>We\u2019ve covered threat hunting with Azure Sentinel in previous blogs in the series. There are dozens of built-in hunting queries in the Azure Sentinel Hunting blade and you can customize new ones per your requirements. There is also a community forum on GitHub with several repositories of useful queries. Below is a quick-start for running an exfiltration activity hunting with Azure Sentinel. For more information, see <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\">Azure Sentinel Hunting Queries<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-19706\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHuntingGitHub.png\" alt=\"Image CMMC Series8 ConductThreatHuntingGitHub\" width=\"700\" height=\"480\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHuntingGitHub.png 1272w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHuntingGitHub-300x206.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHuntingGitHub-1024x702.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHuntingGitHub-768x526.png 768w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<ol>\n<li>Sign into the <a href=\"https:\/\/portal.azure.com\/\">Azure Portal<\/a>. Select the subscription in which Azure Sentinel will be created.<\/li>\n<li>Search for and select <em>Azure Sentinel.<\/em><\/li>\n<li>Select target <strong>Azure Sentinel workspace. <\/strong><\/li>\n<li>Select <strong>Hunting <\/strong>under <strong>Threat Management. <\/strong><\/li>\n<li>Filter <em>Tactics<\/em> to <strong>Exfiltration<\/strong>.<\/li>\n<li>Select <strong>Run Query<\/strong> on a query of choice or select <strong>Run all queries<\/strong> to view events of interest.\n<img decoding=\"async\" class=\"alignnone wp-image-19707\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHunting2.png\" alt=\"Image CMMC Series8 ConductThreatHunting2\" width=\"699\" height=\"333\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHunting2.png 1391w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHunting2-300x143.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHunting2-1024x488.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2020\/05\/CMMC-Series8-ConductThreatHunting2-768x366.png 768w\" sizes=\"(max-width: 699px) 100vw, 699px\" \/><\/li>\n<\/ol>\n<p><strong>7) Share Threat Data<\/strong><\/p>\n<p>Sharing threat data is another sign of a mature security organization. Newly formed organizations will often subscribe to external open source feeds for threat intelligence ingestion. As security organizations mature, threat intelligence teams are often formed to best leverage threat intelligence data. Threat intelligence teams will often consume multiple threat intelligence feeds from free, internal and external feeds. Threat intelligence teams often collaborate with external parties to bolster intelligence collection and sharing. Trust circles are formed between partners in similar industries for secure sharing and collaboration. For example, if you\u2019re a bank security team it would make sense to collaborate with other banks in your industry to share indications of compromise (IOCs) because it\u2019s likely the same tactics are being observed by both organizations.<\/p>\n<p>An organizational threat intelligence team is one of the many indicators of a mature security organization. Threat intelligence groups are generally aligned with proactively hunting threats, hardening the organization against known threats and collaborating with external threat intelligence partners. Azure users can leverage the Azure Sentinel Community to bolster threat intelligence teams and threat data sharing. You can access the Azure Sentinel Community on Github via the configuration blade of Azure Sentinel. The Azure Sentinel Community is a user group collaborating with templates, workbooks, analytics, hunting and automation best practice. For more information, see <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Hunting%20Queries\">Azure Sentinel Community<\/a>.<\/p>\n<h5><strong>Learn more about CMMC with Microsoft <\/strong><\/h5>\n<p>Here are some of the best resource to learn more about CMMC in the cloud with Microsoft:<\/p>\n<ul>\n<li><a href=\"https:\/\/aka.ms\/CMMCResponse\">Accelerating CMMC compliance for Microsoft cloud (in depth review)<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=sey4aWuqtvk\">CMMC-AB Standards with Regan Edens &#8211; National Conversation<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-dfars?view=o365-worldwide\">Defense Federal Acquisition Regulation Supplement (DFARS)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-itar?view=o365-worldwide\">International Traffic in Arms Regulations (ITAR)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-fedramp?view=o365-worldwide\">Federal Risk and Authorization Management Program (FedRAMP)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-ear?view=o365-worldwide\">US Export Administration Regulations (EAR)<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/offering-nist-sp-800-171?view=o365-worldwide\">NIST SP 800-171 Compliance<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/governance\/blueprints\/samples\/nist-sp-800-53-rev4\/\">Overview of the NIST SP 800-53 R4 blueprint sample<\/a><\/li>\n<\/ul>\n<p>Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a> to keep up with our expert coverage on security matters and follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a> or visit our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\">website<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>Are you a federal government agency that needs help with cybersecurity? Reach out to <a href=\"https:\/\/www.linkedin.com\/in\/tjbanasik\/\">TJ Banasik<\/a> or <a href=\"http:\/\/www.linkedin.com\/in\/marmci\">Mark McIntyre<\/a> for additional details on the content above, or if you have any other questions about Microsoft\u2019s cybersecurity investments for the federal government.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the eighth in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into system &amp; communications protection and system &amp; information integrity. In this eighth blog of the series we will explore how to leverage Microsoft Azure [&hellip;]<\/p>\n","protected":false},"author":16830,"featured_media":19682,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14],"tags":[75,95,184,3055,216,3043],"class_list":["post-19680","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-learning","tag-azure","tag-azure-government","tag-cloud-strategy","tag-cmmc","tag-cybersecurity","tag-cybersecurity-maturity-model-certification-cmmc"],"acf":[],"blog_post_summary":"<p>This is the eighth in a ten-part blog series where we\u2019ll demonstrate principles of the Cybersecurity Maturity Model Certification aligned with Microsoft Azure. Subsequent blogs in the series will delve into system &amp; communications protection and system &amp; information integrity. In this eighth blog of the series we will explore how to leverage Microsoft Azure [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/19680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/users\/16830"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/comments?post=19680"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/19680\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media\/19682"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media?parent=19680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/categories?post=19680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/tags?post=19680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}