{"id":21105,"date":"2022-05-17T06:00:08","date_gmt":"2022-05-17T13:00:08","guid":{"rendered":"https:\/\/devblogs.microsoft.com\/azuregov\/?p=21105"},"modified":"2022-05-16T13:27:45","modified_gmt":"2022-05-16T20:27:45","slug":"announcing-the-microsoft-sentinel-nist-sp-800-53-solution","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/azuregov\/announcing-the-microsoft-sentinel-nist-sp-800-53-solution\/","title":{"rendered":"Announcing the Microsoft Sentinel: NIST SP 800-53 Solution"},"content":{"rendered":"<p>Today, we\u2019re announcing the Microsoft Sentinel: NIST SP 800-53 Solution which enables compliance teams, architects, SecOps analysts, and consultants to understand their cloud security posture related to Special Publication (SP) 800-53 guidance issued by the National Institute of Standards and Technology (NIST).<\/p>\n<p>This workbook is designed to augment staffing through automation, visibility, assessment, monitoring, and remediation. Content features includes an intuitive user interface, policy-based assessments, control cards for guiding alignment with control requirements, alerting rules to monitor configuration drift, and playbook automations for response.<\/p>\n<p>The resulting NIST SP 800-53 solution is a single pane of glass for gathering and managing data to address NIST SP 800-53 control requirements. The power of this solution lies in its ability to aggregate at big data scale across first- and third-party products to provide maximum visibility into cloud, hybrid, on-premises, and multi-cloud workloads.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-1-NIST-SP-800-53.gif\"><img decoding=\"async\" class=\"wp-image-21112 aligncenter\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-1-NIST-SP-800-53-300x146.gif\" alt=\"Image Image 1 8211 NIST SP 800 53\" width=\"564\" height=\"274\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-1-NIST-SP-800-53-300x146.gif 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-1-NIST-SP-800-53-1024x499.gif 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-1-NIST-SP-800-53-768x374.gif 768w\" sizes=\"(max-width: 564px) 100vw, 564px\" \/><\/a><\/p>\n<p><strong>What is NIST SP 800-53?<\/strong><\/p>\n<p>NIST SP 800-53 provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect organizational operations. NIST SP 800-53 addresses a diverse set of security and privacy requirements across the federal government and critical infrastructure, derived from legislation, Executive Orders, policies, directives, regulations, standards, and\/or mission\/business needs. NIST SP 800-53 also sets the foundation for numerous compliance frameworks including Federal Information Security Modernization Act (FISMA), FedRAMP, NIST Cybersecurity Framework (CSF), and the Azure Security Benchmark. See <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-53r4.pdf\">NIST SP 800-53<\/a> for more information.<\/p>\n<p><a href=\"https:\/\/youtu.be\/ju9hxtYnj7s\">\n<img decoding=\"async\" class=\"wp-image-21123 aligncenter\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Blog-Thumbnail-NIST-SP-800-53-Solution-300x161.jpg\" alt=\"Image Blog Thumbnail NIST SP 800 53 Solution\" width=\"565\" height=\"303\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Blog-Thumbnail-NIST-SP-800-53-Solution-300x161.jpg 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Blog-Thumbnail-NIST-SP-800-53-Solution-768x412.jpg 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Blog-Thumbnail-NIST-SP-800-53-Solution.jpg 1021w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 10pt;\"><em>In this video, we demo and discuss the Microsoft Sentinel: NIST SP 800-53 Solution.\u00a0<\/em><\/span><\/p>\n<p><strong>Solution benefits<\/strong><\/p>\n<ul>\n<li>Design &amp; build compliant architectures<\/li>\n<li>Quantifiable framework for measuring security maturity<\/li>\n<li>Monitoring &amp; alerting of security posture, compliance drift, and blind spots<\/li>\n<li>Response via Security Orchestration Automation &amp; Response (SOAR) playbooks<\/li>\n<li>Remediation with Cloud Security Posture Management (CSPM)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-2-NIST-800-53-Solution.png\"><img decoding=\"async\" class=\"wp-image-21113 aligncenter\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-2-NIST-800-53-Solution-300x151.png\" alt=\"Image Image 2 8211 NIST 800 53 Solution\" width=\"482\" height=\"242\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-2-NIST-800-53-Solution-300x151.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-2-NIST-800-53-Solution.png 742w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/a><\/p>\n<p><strong>Solution content<\/strong><\/p>\n<p><strong>Microsoft Sentinel: NIST SP 800-53 Workbook:<\/strong> Provides a mechanism for viewing log queries, azure resource graph, and policies aligned to NIST SP 800-53 controls aggregated at big data scale across first- and third-party products to provide maximum visibility into cloud, hybrid, on-premises, and multi-cloud workloads. This workbook enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness visibility for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective NIST SP 800-53 requirements and best practices.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-3-NIST-800-53-Solution.png\"><img decoding=\"async\" class=\"wp-image-21114 aligncenter\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-3-NIST-800-53-Solution-300x110.png\" alt=\"Image Image 3 8211 NIST 800 53 Solution\" width=\"565\" height=\"207\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-3-NIST-800-53-Solution-300x110.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-3-NIST-800-53-Solution-1024x374.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-3-NIST-800-53-Solution-768x281.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-3-NIST-800-53-Solution-1536x561.png 1536w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-3-NIST-800-53-Solution-2048x748.png 2048w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><\/a><\/p>\n<p><strong>Microsoft Sentinel: NIST SP 800-53 analytics rule<\/strong><strong>:<\/strong> This alert is designed to monitor Azure policies aligned to the NIST SP 800-53 Regulatory Compliance Initiative. The alert triggers if policy compliance falls below 70 percent within a 1-week timeframe. For more information, see the <a href=\"https:\/\/docs.microsoft.com\/azure\/governance\/policy\/samples\/nist-sp-800-53-\">Microsoft Defender for Cloud: NIST SP 800-53 Rev. 4 Regulatory Compliance initiative<\/a>.<\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-4-NIST-800-53-Solution.png\"><img decoding=\"async\" class=\"wp-image-21115 aligncenter\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-4-NIST-800-53-Solution-300x89.png\" alt=\"Image Image 4 8211 NIST 800 53 Solution\" width=\"480\" height=\"142\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-4-NIST-800-53-Solution-300x89.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-4-NIST-800-53-Solution-768x227.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-4-NIST-800-53-Solution.png 888w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/a><\/p>\n<p><strong>Playbooks<\/strong><strong>:<\/strong> Drive consistent and automation responses, ensuring security teams can focus their time on what\u2019s important: providing remediation and response based on collected insights from Microsoft Sentinel, rather than navigating across portals for relevant data. Separation of duties is a central security requirement as security monitoring teams such as the Security Operations Center (SOC) often don\u2019t have the respective security privileges to implement changes in the environment. Automations allow you to notify impacted teams of findings via email\/Teams chat and documenting change requirements within IT service management tooling such as Azure DevOps and JIRA to ensure changes are implemented and documented within your configuration management requirements<\/p>\n<ul>\n<li><strong>Notify governance compliance team: <\/strong>Notifies the governance compliance team of respective details via Teams chat and exchange email.<\/li>\n<li><strong>Open DevOps task: <\/strong>Alert triggers an Azure DevOps task to address the Microsoft Defender for Cloud policy recommendations.<\/li>\n<li><strong>Open JIRA ticket: <\/strong>Alert triggers a JIRA Ticket to address the Microsoft Defender for Cloud policy recommendations.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><strong>Getting started<\/strong><\/p>\n<p><strong><u>Prerequisites<\/u><\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/compliance.microsoft.com\/compliancemanager?viewid=Assessments\">Access Microsoft 365 Compliance Manager: Assessments<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/sentinel\/quickstart-onboard\">Onboard Microsoft Sentinel<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/security-center\/security-center-get-started\">Onboard Microsoft Defender for Cloud<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/security-center\/update-regulatory-compliance-packages#add-a-regulatory-standard-to-your-dashboard\">Add the Microsoft Defender for Cloud: NIST SP 800-53 R4 &amp; R5 Assessments to Your Dashboard<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/security-center\/continuous-export\">Continuously Export Security Center Data to Log Analytics Workspace<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/sentinel\/extend-sentinel-across-workspaces-tenants\">Extend Microsoft Sentinel Across Workspaces and Tenants<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/defender-for-cloud\/enable-data-collection\">Configure Auto Provisioning of Microsoft Defender for Cloud Agents<\/a><\/li>\n<li><a href=\"https:\/\/servicetrust.microsoft.com\/\">Review Microsoft Service Trust Portal<\/a><\/li>\n<\/ul>\n<p><strong><u>Deployment<\/u><\/strong><\/p>\n<ul>\n<li>Microsoft Sentinel &gt; Content Hub &gt; Search \u201cNIST SP 800-53\u201d &gt; Install &gt; Create &gt; Configure Options &gt; Review + Create<\/li>\n<li>Review Content\n<ol>\n<li>Microsoft Sentinel &gt; Workbooks &gt; Search \u201cNIST SP 800-53\u201d<\/li>\n<li>Microsoft Sentinel &gt; Analytics &gt; Search \u201cNIST SP 800-53\u201d<\/li>\n<li>Microsoft Sentinel &gt; Automation &gt; Active Playbooks &gt; Search \u201cNotify-GovernanceComplianceTeam\u201d, \u201cOpen-JIRA-Ticket\u201d, \u201cCreate Azure DevOps Task\u201d<\/li>\n<\/ol>\n<\/li>\n<li>Review: <a href=\"https:\/\/github.com\/Azure\/Azure-Sentinel\/tree\/master\/Solutions\/NISTSP80053\">ReadMe<\/a> for additional Getting Started requirements.<\/li>\n<li>Feedback: <a href=\"https:\/\/forms.office.com\/r\/nEbCCA5rcn\">Let us know what you think in the survey<\/a><\/li>\n<\/ul>\n<p><strong><u>Print\/export report<\/u><\/strong><\/p>\n<ul>\n<li>Open NIST SP 800-53 Workbook &gt; Select Subscriptions\/Workspaces\/Time &gt; Select Options &gt; Workbook prints what\u2019s visible for custom reporting requirements<\/li>\n<li>Set Background Theme: Settings &gt; Appearance &gt; Theme: Azure &gt; Apply<\/li>\n<li>Print\/Export Report: More Content Actions (&#8230;) &gt; Print Content<\/li>\n<li>Settings: Layout (Landscape), Pages (All), Print (One Sided), Scale (60), Pages Per Sheet (1), Quality (1,200 DPI), Margins (None) &gt; Print<\/li>\n<li>Executive Summary: Microsoft Defender for Cloud &gt; Regulatory Compliance &gt; Download Report &gt; Report Standard (NIST SP 800-53), Format (PDF)<\/li>\n<\/ul>\n<p><strong>Use case example<\/strong><\/p>\n<p><a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-5-NIST-800-53-Solution.png\"><img decoding=\"async\" class=\"wp-image-21111 aligncenter\" src=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-5-NIST-800-53-Solution-300x171.png\" alt=\"Image Image 5 8211 NIST 800 53 Solution\" width=\"559\" height=\"319\" srcset=\"https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-5-NIST-800-53-Solution-300x171.png 300w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-5-NIST-800-53-Solution-1024x584.png 1024w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-5-NIST-800-53-Solution-768x438.png 768w, https:\/\/devblogs.microsoft.com\/azuregov\/wp-content\/uploads\/sites\/43\/2022\/05\/Image-5-NIST-800-53-Solution.png 1095w\" sizes=\"(max-width: 559px) 100vw, 559px\" \/><\/a><\/p>\n<p><strong>Frequently asked questions<\/strong><\/p>\n<ul>\n<li>Are additional products required?\n<ul>\n<li>No, this solution leverages your existing Microsoft Security architecture. The recommended products provide additional use case enrichments, but only Microsoft Sentinel and Microsoft Defender for Cloud are required to get started.<\/li>\n<\/ul>\n<\/li>\n<li>Are multi-subscription, multi-cloud &amp; multi-tenant supported?\n<ul>\n<li>Yes, via <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/azure-monitor\/visualize\/workbooks-parameters\">Workbook Parameters<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/lighthouse\/overview\">Azure Lighthouse<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-arc\/\">Azure Arc<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Are third-party products supported?\n<ul>\n<li>Yes, via Microsoft Sentinel Incidents aggregation of alerting.<\/li>\n<\/ul>\n<\/li>\n<li>Is custom reporting available?\n<ul>\n<li>Yes, via guide, time, workspace, &amp; subscription parameters.<\/li>\n<\/ul>\n<\/li>\n<li>Is this available in government regions?\n<ul>\n<li>Yes, this solution is deployable to all clouds<\/li>\n<\/ul>\n<\/li>\n<li>Are blank panels bad?\n<ul>\n<li>No, they\u2019re an opportunity to explore\/address the requirements<\/li>\n<\/ul>\n<\/li>\n<li>Can this content be exported as a report?\n<ul>\n<li>Yes, via <em>Print Workbooks<\/em> and <em>Download Artifacts<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Learn more about NIST SP 800-53 with Microsoft Security<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/compliance\/offerings\/offering-nist-800-53\">National Institute of Standards and Technology (NIST) SP 800-53<\/a><\/li>\n<li><a href=\"https:\/\/docs.microsoft.com\/azure\/governance\/policy\/samples\/nist-sp-800-53-r4\">NIST SP 800-53 Rev. 4 Regulatory Compliance built-in initiative<\/a><\/li>\n<li><a href=\"https:\/\/servicetrust.microsoft.com\/\">Microsoft Cloud Service Trust Portal<\/a><\/li>\n<\/ul>\n<p><span style=\"font-size: 8pt;\">Each control below is associated with one or more Azure Policy definitions. These policies may help you Assess Compliance with the control; however, there often is not a one-to-one or complete match between a control and one or more policies. As such, Compliant in Azure Policy refers only to the policy definitions themselves; this doesn&#8217;t ensure you&#8217;re fully compliant with all requirements of a control. In addition, the compliance standard includes controls that aren&#8217;t addressed by any Azure Policy definitions at this time. Therefore, compliance in Azure Policy is only a partial view of your overall compliance status. The associations between compliance domains, controls, and Azure Policy definitions for this compliance standard may change over time.<\/span><\/p>\n<p><span style=\"font-size: 8pt;\">Customer experience will vary by user and some panels may require additional configurations for operation. Recommendations do not imply coverage of respective controls as they are often one of several courses of action for approaching requirements which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective requirements. This workbook does not address all controls within the framework. It should be considered a supplemental tool to gain visibility of technical controls within cloud, multi-cloud, and hybrid networks. For the full listing of respective controls, see the Microsoft Cloud Service Trust Portal.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, we\u2019re announcing the Microsoft Sentinel: NIST SP 800-53 Solution which enables compliance teams, architects, SecOps analysts, and consultants to understand their cloud security posture related to Special Publication (SP) 800-53 guidance issued by the National Institute of Standards and Technology (NIST). This workbook is designed to augment staffing through automation, visibility, assessment, monitoring, and [&hellip;]<\/p>\n","protected":false},"author":62910,"featured_media":21123,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1,14,29],"tags":[75,189,216,316,3460,429,3464],"class_list":["post-21105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements","category-azuregov","category-learning","category-security","tag-azure","tag-compliance","tag-cybersecurity","tag-government-cloud","tag-microsoft-sentinel","tag-nist","tag-nist-800-53"],"acf":[],"blog_post_summary":"<p>Today, we\u2019re announcing the Microsoft Sentinel: NIST SP 800-53 Solution which enables compliance teams, architects, SecOps analysts, and consultants to understand their cloud security posture related to Special Publication (SP) 800-53 guidance issued by the National Institute of Standards and Technology (NIST). This workbook is designed to augment staffing through automation, visibility, assessment, monitoring, and [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/21105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/users\/62910"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/comments?post=21105"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/posts\/21105\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media\/21123"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/media?parent=21105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/categories?post=21105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/azuregov\/wp-json\/wp\/v2\/tags?post=21105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}