| 1 minute read

Why You May Need a Microsoft 365 Best Practices Security Assessment

office workers using cloud services

Microsoft 365 (previously Office 365) offers a wealth of tools, including Teams, SharePoint, OneDrive, PowerPoint, Excel, and more, that help your team work and collaborate easily and efficiently from anywhere in the world. And, since the platform is cloud-based, your business has access to all these resources, yet doesn’t have to host the infrastructure.

But, regarding security, keep in mind that Microsoft 365 is a shared security model. Microsoft does provide security features that can be enabled and configured by your IT team, such as encrypted email, data loss prevention, and advanced threat analytics (ATA). However, you are responsible for assessing your security posture to decide which of these services and controls you need to administer. How? By having a Microsoft 365 best practices security assessment conducted.

Here’s How Avalon Cyber Assesses Your Microsoft 365 Security Controls

Our Objectives:

To assess the security settings and policies you currently have in place and identify where improvements can be made to protect your instance and sensitive and business-critical data.

Avalon Cyber meets these objectives by completing the following:

  • Comparing your current settings and configurations to known best practices, such as those of the Center for Internet Security (CIS), the National Institute of Standards and Technology (NIST), and the Cybersecurity and Infrastructure Security Agency (CISA), as well as Microsoft’s standard security/settings best practices
  • Outlining our findings in a detailed report identifying whether the settings you have in place passes, fails, or is in a warning state based on industry best practices
  • Providing strategic recommendations to address any settings and configuration shortcomings and rationales regarding why certain settings can pose a risk

Our Methodology:

For assessing areas of potential risk within Microsoft 365, we combine manual review and automation to verify all relevant settings through authenticated view-only admin access. We utilize the standards mentioned above (CIS, NIST, etc.) and test the following products, applications, and frameworks:

  • Azure Active Directory
  • Security & Compliance
  • Exchange
  • Microsoft 365
  • SharePoint
  • Teams

Microsoft 365 offers many advantages for your team, but like any other software or platform, is not without its challenges. Engaging a trained and knowledgeable cybersecurity team to perform an assessment is an easy way to help identify areas of risk within the cloud that require attention.

To learn more or to schedule a Microsoft 365 best practices security assessment, contact the experts at Avalon today.

Blog Articles

The CDK Incident and Recommended Actions from Avalon Cyber

Thousands of car dealerships’ operations slowed to a halt last Wednesday as their core dealer management system, CDK, shut down. CDK Global announced that they were investigating a cyber incident and “Out of an abundance of caution and concern for our customers, we have shut down most of our systems and are working diligently to get everything up and running as quickly as possible” according to spokesperson, Lisa Finney. The company said later that day that most of their critical systems were back online, but the next day they announced that another incident had happened.

Get Ready for the New 36-Hour Cyber Breach Notification Rule for Financial Institutions

If you’re in the financial sector, no doubt you’ve already heard, and hopefully, are prepared or preparing for, the new federal banking rule regarding cyber breach notifications. This new rule, which took effect April 1, 2022, with full compliance required by May 1, 2022, requires banking organizations and bank service providers to notify banking regulators within 36 hours after a notification event, which is the tightest timeframe in U.S. history.

Cybercriminals Never Sleep (And Neither Do We)

According to the latest cybersecurity industry research, market demand for Managed Detection and Response (MDR) services continues to climb. In fact, experts forecast that by 2024, 40% of midsize enterprises will use MDR as their only managed security service. That might sound like a large percentage, but because of the continued escalation of cyberattacks, more and more companies are realizing the importance of hiring experts to boost their cybersecurity posture.