Apps – Describe Zero Trust Principles for Microsoft 365

Apps

Applications provide both a method for individuals to accomplish tasks as well as an avenue for attackers. A zero-trust deployment model for applications includes the following:

  • Application visibility: Gaining visibility into how applications are used in your environment is critical to understanding how your users are conforming to your governance policies. Modern application platforms provide APIs that determine how users interact with the applications. MDA interrogates a wide range of application platforms and extracts usage data. MDA can also be used to audit applications for general compliance with your organization’s policies and risk tolerance.
  • Managing shadow IT: Discovering shadow IT in your organization is the first step toward guiding your users toward supported solutions. Shadow IT presents multiple avenues for compromise. For example, users not only bypass your governance policies but they may even raise additional risks by downloading applications that have malware or allow data to be intercepted by third parties.

•   Managing application access policies: You can use Microsoft Defender for Cloud Apps to determine whether applications are performing risky behaviors (such as downloading or uploading data abnormally) and then apply security policies such as suspending accounts, quarantining files, or applying sensitivity labels for encryption.

Using a cloud access security broker such as Microsoft Defender for Applications can help mitigate risks presented by both managed and unmanaged applications in your organization.

Data

Content authoring, storage, and sharing are the key components of every organization’s collaboration strategy. Data is typically viewed as the organization’s most important managed asset. When applying the principles of zero trust, it’s important to understand how the data is being created, stored, accessed, protected, and transmitted throughout the environment and then enact appropriate controls so that behavior complies with the organizational policy.

Here, administrators need to implement policies to determine the following:

  • Where will users be able to store files?
  • How and where will users be able to access files?
  • How can the files be shared inside and, if enabled, outside the organization?
  • How long will documents be retained for?
  • How can auditors find out who accessed or deleted a document or find documents that contain specific information?
  • How can documents be classified and protected?

You will now explore the following data concepts in depth:

  • Document storage
  • Sharing
  • Auditing
  • Retention
  • eDiscovery
  • Classification and protection

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

Team Insights – Describe the Analytics Capabilities of Microsoft 365

Team Insights In addition to the personal insights available to all users, individuals in managerial roles can access manager-level insights, also referred to as teamwork habits or team insights. These insights arecentered around collective data and trends derived from team members and are presented in an anonymized format. These trends may encompass work-related behaviors, such ...

Read More

Advanced Insights – Describe the Analytics Capabilities of Microsoft 365

Advanced Insights Advanced insights allow business analysts to deep-dive into the data collected by Viva Insights. For example, analysts can write custom queries to explore meeting metrics or other quantitative datasets. Advanced Insights To learn more about Advanced insights features, please see https://learn.microsoft. com/en-us/viva/insights/advanced/introduction-to-advanced-insights. Viva Insights has its own role, Viva Insights admin. With this ...

Read More

Describe Identity Concepts – Understand Identity and Access Management Solutions

Describe Identity Concepts When describing how users access Microsoft 365 services, the identity and authentication processes are the key concepts to understand. In this section, you will learn three core identity models (as well as some sub-features of each) and how they work in the context of Microsoft 365. The three models are as follows: ...

Read More