Ciso Workshop 3 Identity and Zero Trust User Access PDF
Ciso Workshop 3 Identity and Zero Trust User Access PDF
https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/ciso-workshop-module-3
Lunch
Your strategy Security management
learnings and principles
Kickoff and
Threat protection
(A) Identify-Protect
(B) Detect-Respond-Recover
Information protection
• Identity Security Architects
• Identity Architects
• Identity Operations Teams Joint planning
• Collaboration/Productivity Lead
3. Assets increasingly leave network
• BYOD, WFH, Mobile, and SaaS
http://aka.ms/SPAroadmap http://aka.ms/cyber-services
http://aka.ms/securitystandards
A consistent set of controls between assets and threats
Office 365
Intrusion Forward/Reverse Intranet Resources
Firewall
Detection/Prevention Proxy
Actions:
• Allow
• Block
Source: IP Address/Port Signatures Allow List
Destination: IP Address/Port Analytics Authentication
User Device
High
Medium
Actions:
Role Health/Integrity Low • Allow
Group Client • Allow Restricted
Device Config • Require MFA
Config Last seen • Block
Location Conditional • Force Remediation
Last Sign-in access risk
Office resource
User Device High
Medium
Anonymous IP
Your Pa$$word doesn't matter Unfamiliar sign-in location for this user
Customers Business
Social IDs Azure AD B2C Apps
https://aka.ms/passwordguidance
https://channel9.msdn.com/events/Ignite/Microsoft-Ignite-Orlando-2017/BRK3016