While remote work is a common feature of modern workplaces, it’s become an imperative in light of the current worldwide Corona virus (COVID-19) outbreak. Where it’s feasible, enabling work to happen from homes is a keyway to help keep our employees, customers, partners, and communities healthy and safe.
For those of you using Azure Active Directory (which includes everyone using Office 365), a number of capabilities enable remote work while helping you keep your organization secured.
Here is our list of recommendations for enabling remote work:
[Strategies]
-
Network protections ( Link)
-
Zero Trust Security ( Link)
- Network perimeter -> Identity perimeter
- Cloud security, endpoint security
-
Prevention of unauthorized access
- Azure AD SSO (Link) through Azure AD App Registration (Link) and Application Proxy (Link)
-
Azure AD Conditional Access ( Link)
- Block Legacy Authentication (Link)
- Azure MFA (Link)
-
Control of authorized user access
- Intune (Device enrollment, Device compliance) w/ AAD Conditional Access (Link)
- Azure AD Identity Protection (Link)
- Tenant restrictions (Link)
-
DLP
- Office 365 DLP (SPO/ODFB, EXO, Teams) (Link1, Link2)
- Endpoint DLP (Private Preview)
- MCAS – Conditional Access App Control (Link)
- Intune – Block file download/transfer (Link)
-
Malware detection
- Antivirus for SPO/ODFB (Link)
- Antivirus and spam filter for EXO (Link)
- O365 ATP – Advanced Threat Protection for files and links in SPO/ODFB/EXO/Teams (Link)
- MDATP – Advanced Threat Protection for endpoints (Link)
- Azure ATP – User and Entity Behavior Analytics (Link)
- MCAS – Threat Detection on SaaS (Link)
-
Additional resources (Long-term strategies)
- Azure AD Privileged Identity Management (Link)
- Azure AD B2B Collaboration (Link) w/ Access Review (Link)
- Insider Risk Management (Link)
-
Microsoft Information Protection ( Link)
|
[Tip]
- Microsoft Teams as a virtual office
- Video instead of email, which is harder to spoof (Link)
- Self-service Password Reset (Link)
-
Windows Virtual Desktop for developers ( Link)
- Conditional Access or MFA with WVD (Link)
- File save and share based on ODFB
- Training (O365 Attack Simulator, Original URL) (Link)
- Securing privileged access (Link)
[3rd Party References]
*Department of Homeland Security Cyber-security and Infrastructure Security Agency (Link)
*Department of Commerce National Institute of Standards and Technology (Link)
*Harvard Kennedy School – Cyber-security Campaign Handbook (Link)
[Microsoft References]
*Top 5 ways your Azure AD can help you enable remote work (Link)
*Alternative ways for security professionals and IT to achieve modern security controls in today’s unique remote work scenarios (Link)
*Work remotely, stay secure – guidance for CISOs (Link)
*Running on VPN: How Microsoft is keeping its remote workforce connected (Link)
*The top 9 ways Microsoft IT is enabling emote work for its employees (Link)
*Making it easier for your remote workforce to securely access all the apps they need, from anywhere (Link)
*Top 12 tasks for security teams to support working from home (Link)
*Support remote workers using Microsoft Teams (Link)
*Common identity and device access policies (Link) |
Like this:
Like Loading...