End to End email protection with Microsoft 365–Part 2

This is part of a series of articles about email security in Microsoft 365.

End to End email protection with Microsoft 365 – Part 1

These articles are based on a model I have previously created, which you can read about here:

CIAOPS Cyber protection model

designed to help better explain expansive security included with Microsoft 365.

image

In the previous part of this series I spoke about DNS and Exchange Online Protection (EOP) and the role they play in email security as well as how to configure these in your service. I haven’t as yet spoken about the best practices settings that you should employ. The initial objective here is to help you understand the flow as well as all the security services that can be utilised in Microsoft 365 to better help you protect your data.

If you look at the above diagram, you’ll see that data is flowing via the email connector in and out of our Microsoft 365 environment (the ‘Service’). Through which, so far, we have talked about DNS and EOP, now it is time to move onto Defender for Office 365 (D4O). However, just before we do let, me point out somethings that you may not appreciate. Firstly, via the process far, inbound email data has not yet come to rest. That is, it hasn’t as yet been stored inside a users mailbox, it is still being ‘processed’ by the security feature set of Microsoft 365 (i.e. the ‘Service’). Secondly, and more importantly for security considerations, what we have examined so far largely only ‘scans’ the data and makes security decisions as data passed through that service. It doesn’t generally continue to protect the data once it has been processed by that service. For example, with spam filtering inbound emails are scanned by the anti spam service in EOP, appropriate action taken based on the policies in place but then the data exits the service. Once an email has exited the anti spam service in EOP it will no longer be scanned by the service. To distinguish these type of security services going forward, let’s refer to them as ‘pass through’ security services being that they only handle the data once during its transit through a connector.

So after DNS and EOP have ‘processed’ the inbound email it is time for Defender for Office 365 (D4O) to do it’s job.

image

Defender for Office 365 is an add-on to existing plans like Microsoft 365 Business Basic and Business Standard but included in Microsoft Business Premium. Interestingly, it is not part of Microsoft 365 E3 but is part of Microsoft 365 E5. In short, we’ll assume the plan here is Microsoft Business Premium.

Defender for Office 365 also has two plans

Gains with Defender for Office 365, Plan 1 (to date):

Technologies include everything in EOP plus:

  • Safe attachments

  • Safe links

  • Microsoft Defender for Office 365 protection for workloads (ex. SharePoint Online, Teams, OneDrive for Business)

  • Time-of-click protection in email, Office clients, and Teams

  • Anti-phishing in Defender for Office 365

  • User and domain impersonation protection

  • Alerts, and SIEM integration API for alerts
  • SIEM integration API for detections

  • Real-time detections tool
  • URL trace
  • So, Microsoft Defender for Office 365 P1 expands on the prevention side of the house, and adds extra forms of detection.

    Gains with Defender for Office 365, Plan 2 (to date):

    Technologies include everything in EOP, and Microsoft Defender for Office 365 P1 plus:

  • Threat Explorer
  • Threat Trackers

  • Campaign views
  • Automated Investigation and Response (AIR)

  • AIR from Threat Explorer

  • AIR for compromised users

  • SIEM Integration API for Automated Investigations
  • So, Microsoft Defender for Office 365 P2 expands on the investigation and response side of the house, and adds a new hunting strength. Automation.

    The above is from The Office 365 security ladder from EOP to Microsoft Defender for Office 365.

    Microsoft Business Premium includes Defender for Office 365 P1, while Microsoft 365 E5 includes Defender for Office 365 P2.

    Unlike EOP, you’ll also note that Defender for Office 365 extends protection actually into the data container as well as providing initial scanning of data as it passes through the service. This effectively means that Defender for Office 365 is monitoring email data inside user email boxes and providing additional protection even after an item is delivered. This is very important to appreciate because once most emails are delivered they are generally no longer protected by scanning technologies like anti-spam policies, especially third party offerings. Therefore, a major of value of using Microsoft 365 is that it can ensure the security of data even after it has been delivered using technology like Defender for Office 365.

    Another point that the above diagram illustrates is that Defender for Office 365 largely applies only to inbound email data. all the policies in Defender for Office 365 are focused at emails being delivered to, not from, mailboxes.

    Finally it is also important to note that previous components in the data flow chain impact Defender for Office 365, DNS probably being the more influential. This is why it is so important to ensure that you have your DNS records (especially SPF, DKIM and DMARC) configured correctly because their impact is more than on a single service in Microsoft 365.

    Defender for Office 365 is composed of three unique components:

    – Safe Attachments

    – Safe Links

    – Anti-Phishing

    Safe Attachments

    As Safe Attachments in Microsoft Defender for Office 365 notes:

    Safe Attachments uses a virtual environment to check attachments in email messages before they’re delivered to recipients (a process known as detonation).

    In short, it will open suspect attachments in a virtual environment and check to see whether they activate any malicious activity such as encrypting data (i.e. cryptolocker attack), changing registry settings and so on.

    Safe Attachments protection for email messages is controlled by Safe Attachments policies. There is no default Safe Attachments policy. Please note that, there is NO default Safe Attachments policy by default! Thus, ensure you have set one up if you are using Defender for Office 365.

    Set up Safe Attachments policies in Microsoft Defender for Office 365

    Safe Attachments will continue to provide protection even after the data has been delivered. This is because the maliciousness of the attachment is evaluated not only at the time the user opens it but also continually as they sit as data in users mailbox. Thus, you need to consider Safe Attachments as protection both during transit and at rest. This is generally different from the role of EOP.

    I will also briefly note here that Safe Attachments protection extends beyond just emails, but I’ll cover that in a later article.

    Safe Links

    As Safe Links in Microsoft Defender for Office 365 notes:

    Safe Links is a feature in Defender for Office 365 that provides URL scanning and rewriting of inbound email messages in mail flow, and time-of-click verification of URLs and links in email messages and other locations.

    In short, it routes any link clicked on in an email through a reputation proxy to ensure that it is safe prior to proceeding. This provides protection against malicious content, downloads, phishing and more.

    Safe Links settings for email messages

    How Safe Links works in email messages

    Safe Links can be configured to provide customised protection:

    Set up Safe Links policies in Microsoft Defender for Office 365

    Safe Links will continue to provide protection even after the data has been delivered. This is because the maliciousness of links is evaluated not only at the time the user clicks on them but also continually as they sit as data in users mailbox. Thus, you need to consider Safe Links as protection both during transit and at rest. This is generally different from the role of EOP.

    I will also briefly note here that Safe Links protection extends beyond just emails, but I’ll cover that in a later article.

    Anti-phishing

    Phishing is when attackers try to trick users into providing secure details in an effort to compromise that account. A common ‘trick’ is to attempt to impersonate a ‘familiar’ email address and try to have the recipient take an action that will result in an account compromise.

    Protection via Defender for Office 365 is again provided by a policy:

    Exclusive settings in anti-phishing policies in Microsoft Defender for Office 365

    Anti-phishing will continue to provide protection even after the data has been delivered. This is because the maliciousness of email content is evaluated not only at the time the user views  them but also continually as they sit as data in users mailbox. Thus, you need to consider Anti-phishing as protection both during transit and at rest. This is generally different from the role of EOP.

    In addition to the above Defender for Office 365 P1 also provides:

    Threat Explorer and Real-time detections

    while Defender for Office 365 P2 additionally provides:

    Threat Trackers

    Automated investigation and response (AIR) in Microsoft Defender for Office 365

    Attack Simulator in Microsoft Defender for Office 365

    Summary

    Inbound email data flows into Defender for Office 365 after it has been processed by EOP. Here additional protection policies are applied. All of these policies can be configured by the user and have capabilities that extend into protecting data even after it has been delivered. This means that a major benefit of Defender for Office 365 is that it not only scans email data during inbound transit but also while it is being stored in the users mailbox over the life of that data item for both current and future threats.

    It is also important to note that many of the Defender for Office 365 do not have appropriate default policies in place and it is up to the user to configure these to suit their environment.

    The inbound email data has yet further protection configurations to be applied to it after being processed by Defender for Office 365 thanks to the capabilities of Microsoft 365. Please follow that process with the next article:

    End to End email protection with Microsoft 365–Part 3

    Need to Know podcast–Episode 262

    Security is big this week and you’ll get it all here. Our cloud news will provide you with all the latest information you’ll need to understand the Solar Winds attack. in this episode we also speak with Daniel Chronlund around Conditional Access. Daniel shares his extensive knowledge around this service and how it can improve your security posture. He also has some great scripts available on his Github repository, so check them out!

    I take this opportunity to wish listeners happy holidays. Stay safe and thanks for all your support in 2020. Onwards to 2021 we go, hi ho, hi ho.

    This episode was recorded using Microsoft Teams and produced with Camtasia 2020.

    Take a listen and let us know what you think – feedback@needtoknow.cloud

    You can listen directly to this episode at:

    https://ciaops.podbean.com/e/episode-262-daniel-chronlund/

    Subscribe via iTunes at:

    https://itunes.apple.com/au/podcast/ciaops-need-to-know-podcasts/id406891445?mt=2

    The podcast is also available on Stitcher at:

    http://www.stitcher.com/podcast/ciaops/need-to-know-podcast?refid=stpr

    Don’t forget to give the show a rating as well as send us any feedback or suggestions you may have for the show.

    Resources

    @danielchronlund

    Daniel’s blog

    Daniel’s GitHub

    @directorcia

    A moment of reckoning: the need for a strong and global cybersecurity response

    Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect

    SolarWinds Post-Compromise Hunting with Azure Sentinel

    Ensuring customers are protected from Solorigate

    Microsoft Defender for Office 365 investigation improvements coming soon

    A “quick wins” approach to securing Azure Active Directory and Office 365 and improving your security posture

    4 ways Microsoft 365 is improving the experience for Mac users

    Sleeping Tabs in Microsoft Edge: Delivering better browser performance

    Guest Access in Yammer using Azure AD B2B is now in preview!

    Stay current with in-demand skills through free certification renewals

    Microsoft Clarity | Free behavioral analytics product for website managers

    CIAOPS Patron community

    End to End email protection with Microsoft 365–Part 1

    image

    I’ve talked about the

    CIAOPS Cyber protection model

    before and you can see it above.

    image

    Now it is time to start applying it directly to Microsoft 365 to help understand the security Microsoft 365 provides and what can be configured to provide enhanced security.

    image

    I’ve therefore started by breaking the Email connector from my model into two components, Inbound and Outbound, as shown above. The left hand side (outside the box) is the Internet, while inside the box on the right hand side, is Microsoft 365.

    Outside the box, on the Internet, there are three user configurable items: SPF, DKIM and DMARC. You’ll see arrow from these three items away and further into the Internet as well as back into the Microsoft 365 service. This is because these three DNS records will affect both sent and received emails and should be considered the first item on your email security check list. Some articles that may help on this include:

    SPF, DKIM, DMARC and Exchange Online

    Set up SPF to help prevent spoofing

    Support for validation of DKIM signed messages

    Use DKIM to validate outbound email sent from your custom domain

    Use DMARC to validate email

    When others send email to Microsoft 365, the following articles may help:

    Sending mail to Microsoft 365

    Services for non-customers sending mail to Microsoft 365

    Inbound email is received into Microsoft 365 via Exchange Online. A component of this service is Exchange Online Protection (EOP).

    Exchange Online Protection overview

    EOP features

    Inbound emails

    The first stage of a message progressing through Exchange Online Protection is for it to traverse the Edge Protections as shown above. These are basically policies and configuration managed and maintained by Microsoft. A user is unable to alter them but information about these can be found at:

    Use Directory Based Edge Blocking to reject messages sent to invalid recipients

    Backscatter in EOP

    How EOP validates the From address to prevent phishing

    It is important to note that DNS records like SPF play an important role in helping secure email data, which is why it is important to configure them.

    How Microsoft 365 uses Sender Policy Framework (SPF) to prevent spoofing

    After the Edge Protection phase is complete, any inbound email is then sent to Exchange Online Protection (EOP) for further processing. It is here that there are many policies and settings that can be configured by the user. The sequence in which these take place can be found here:

    Order and precedence of email protection

    Generally, first to be processed is the Connection filtering.

    Configure connection filtering

    Then Malware filtering.

    Configure anti-malware policies in EOP

    Then Transport rules.

    Mail flow rules (transport rules) in Exchange Online

    Next are any Data Loss Prevention (DLP) policies.

    Data Loss prevention

    Spam filtering follows.

    Anti-spam protection in EOP

    Configure anti-spam policies in EOP

    Anti-spam message headers in Microsoft 365

    Bulk complaint level (BCL) in Exchange Online Protection EOP

    Finally inbound email will be checked for phishing and spoofing.

    Anti-phishing policies in Microsoft 365

    Configure spoof intelligence policy

    After all these the inbound email will continue to be processed by any additional protection options and features like Defender for Office 365 which will be covered in an upcoming article, so don’t think that email protection stops with EOP, it continues with Defender for Office 365 right through to the email app on the device which will all be covered in upcoming articles.

    Outbound emails

    If we now turn our attention to outbound emails and work from right to left, along the bottom arrow, we see that the email has a lot less policies to travel through. The main one is the Outbound spam filter.

    Configure outbound spam filtering in EOP

    However, it will also go through the DLP policy:

    Data Loss prevention

    and then Transport rules:

    Mail flow rules (transport rules) in Exchange Online

    You can also use

    Message Encryption

    if you wish to protect the contents of emails sent from Microsoft 365.

    Summary

    Remember, what is covered here is only the first part of the full range of protection capabilities that Microsoft 365 provides for emails. You will also see that a significant amount of these capabilities provide the ability of customisation. For the items that are user configurable in the diagram, a good rule of thumb is to implement and configure from left to right, top to bottom. Once you have all that done, then you can move onto the next stage which will be covered in the next article on this topic.

    End to End email protection with Microsoft 365 – Part 2

    Azure AD Sign-in error code look up

    image

    When you are looking at various entries in the Azure AD logs you will find, under the Basic Info tab, a Sign-in error code and directly below that a Failure reason field as shown above.

    image

    The above, shows you these fields in more detail.

    You may not be aware but if you navigate to the web site:

    https://login.microsoftonline.com/error

    image

    and plug in the Sign-in error code from the event, you should see information like that shown above. Most of it should match what the Failure reason field says. There can however, also be additional information in there that may help you when it comes to troubleshooting these events.


    A little bit more security

    Security is never an absolute and is largely about defence in depth. That is, adding more layers of protection. With this in mind, I was recently made aware of this little gem that can help provide just a little more protection for inbound emails, especially against inbound malicious attachments.

    image

    Exchange Online has a Malware policy that you can configure. You’ll find it in the Microsoft 365 security center under policies. When you edit that policy, as shown above, you’ll see an option for Common attachment types filter. You should ensure that this is set to On. If so, you can then select the Choose type button to select which attachment types will be blocked.

    image

    You’ll see there are about ten default file types that will be blocked. What you may not be aware of is that if you press the Add button at the top of the page, as shown above,

    image

    There are an additional 86 file types that Microsoft allows you to directly add.

    image

    Just select them all and Add them.

    image

    You should then see a total of 96 file types listed in the policy as shown.

    I was a little puzzled why Microsoft wouldn’t have added more of the 86 optional files types to the standard 10? Most of the option 86 seem to be developer focused so maybe that is why? Many of the optional 86 are quite antiquated but that doesn’t mean they couldn’t be used somehow to compromise an environment. Thus, it is therefore probably a very good idea to block all these 86 option file types on top of the default 10 it seems.

    I also had a quick look at what all these filetype typically refer to and provide this summary for you:

    – ade https://www.file-extensions.org/gadget-file-extension

    – adp https://www.file-extensions.org/adp-file-extension

    – asp https://www.file-extensions.org/asp-file-extension

    – bas https://www.file-extensions.org/bas-file-extension

    – bat https://www.file-extensions.org/bat-file-extension

    – cer https://www.file-extensions.org/cer-file-extension-internet-security-certificate

    – chm https://www.file-extensions.org/chm-file-extension

    – cmd https://www.file-extensions.org/cmd-file-extension

    – com https://www.file-extensions.org/com-file-extension

    – cpl https://www.file-extensions.org/cpl-file-extension

    – crt https://www.file-extensions.org/crt-file-extension

    – csh https://www.file-extensions.org/csh-file-extension-csh-script

    – der https://www.file-extensions.org/der-file-extension

    – dll https://www.file-extensions.org/dll-file-extension

    – dos https://www.file-extensions.org/dos-file-extension

    – fxp https://www.file-extensions.org/fxp-file-extension-adobe-flash-builder-project

    – gadget https://www.file-extensions.org/gadget-file-extension

    – hlp https://www.file-extensions.org/hlp-file-extension

    – Hta https://www.file-extensions.org/hta-file-extension

    – Inf https://www.file-extensions.org/inf-file-extension

    – Ins https://www.file-extensions.org/ins-file-extension

    – Isp https://www.file-extensions.org/lsp-file-extension-autolisp-language-source-code

    – Its https://www.file-extensions.org/its-file-extension-internet-document

    – js https://www.file-extensions.org/js-file-extension

    – Jse https://www.file-extensions.org/jse-file-extension

    – Ksh https://www.file-extensions.org/ksh-file-extension

    – Lnk https://www.file-extensions.org/lnk-file-extension

    – mad https://www.file-extensions.org/mad-file-extension

    – maf https://www.file-extensions.org/maf-file-extension

    – mag https://www.file-extensions.org/mag-file-extension-microsoft-access-diagram-shortcut

    – mam https://www.file-extensions.org/mam-file-extension

    – maq https://www.file-extensions.org/maq-file-extension

    – mar https://www.file-extensions.org/mar-file-extension

    – mas https://www.file-extensions.org/mas-file-extension

    – mat https://www.file-extensions.org/mat-file-extension

    – mau https://www.file-extensions.org/mau-file-extension

    – mav https://www.file-extensions.org/mav-file-extension

    – maw https://www.file-extensions.org/maw-file-extension

    – mda https://www.file-extensions.org/mda-file-extension

    – mdb https://www.file-extensions.org/mdb-file-extension

    – mde https://www.file-extensions.org/mde-file-extension

    – mdt https://www.file-extensions.org/mdt-file-extension

    – mdw https://www.file-extensions.org/mdw-file-extension

    – mdz https://www.file-extensions.org/mdz-file-extension

    – msc https://www.file-extensions.org/msc-file-extension

    – msh https://www.file-extensions.org/msh-file-extension

    – msh1 https://www.file-extensions.org/msh1-file-extension

    – msh1xml https://www.file-extensions.org/msh1xml-file-extension

    – msh2 https://www.file-extensions.org/msh2-file-extension

    – msh2xml https://www.file-extensions.org/msh2xml-file-extension

    – mshxml https://www.file-extensions.org/mshxml-file-extension

    – msi https://www.file-extensions.org/msi-file-extension

    – msp https://www.file-extensions.org/msp-file-extension

    – mst https://www.file-extensions.org/msstyles-file-extension

    – obj https://www.file-extensions.org/obj-file-extension-microsoft-visual-studio-object

    – ops https://www.file-extensions.org/oxps-file-extension

    – os2 https://www.file-extensions.org/os2-file-extension

    – pcd https://www.file-extensions.org/pcd-file-extension-microsoft-visual-test-data

    – pif https://www.file-extensions.org/pif-file-extension

    – plg https://www.file-extensions.org/plg-file-extension

    – prf https://www.file-extensions.org/prf-file-extension-microsoft-outlook-profile

    – prg https://www.file-extensions.org/prg-file-extension-program

    – ps1 https://www.file-extensions.org/ps1-file-extension

    – ps1xml https://www.file-extensions.org/ps1xml-file-extension

    – ps2 https://www.file-extensions.org/ps2-file-extension

    – ps2xml https://www.file-extensions.org/ps2xml-file-extension

    – psc1 https://www.file-extensions.org/psc1-file-extension

    – psc2 https://www.file-extensions.org/psc2-file-extension

    – pst https://www.file-extensions.org/pst-file-extension

    – rar https://www.file-extensions.org/library-ms-file-extension

    – scf https://www.file-extensions.org/scf-file-extension

    – sct https://www.file-extensions.org/sct-file-extension

    – shb https://www.file-extensions.org/shb-file-extension

    – shs https://www.file-extensions.org/shs-file-extension-microsoft-windows-shell-scrap-object

    – tmp https://www.file-extensions.org/tmp-file-extension

    – url https://www.file-extensions.org/url-file-extension

    – vb https://www.file-extensions.org/vb-file-extension

    – vsmacros https://www.file-extensions.org/vsmacros-file-extension

    – vsw – https://www.file-extensions.org/vsw-file-extension

    – vxd – https://www.file-extensions.org/vxd-file-extension

    – w16 – https://www.file-extensions.org/w16-file-extension

    – ws – https://www.file-extensions.org/ws-file-extension

    – wsc – https://www.file-extensions.org/wsc-file-extension

    – wsf – https://www.file-extensions.org/wsf-file-extension

    – wsh – https://www.file-extensions.org/wsh-file-extension

    – xnk – https://www.file-extensions.org/xnk-file-extension

    Thus, I’d recommend you update your Exchange Online policy to include the complete of file types that Microsoft provides protection for, even if most aren’t enabled.

    December poll

    ask-blackboard-chalk-board-chalkboard-356079

    For December I’m asking people:

    What methods are your accounts using as their primary method of multi-factor (MFA) verification?

    which I greatly appreciate you thoughts here:

    https://bit.ly/ciasurvey202012

    You can view the results during the month here:

    https://bit.ly/ciaresults202012

    and I’ll post a summary at the end of the month here on the blog.

    Please feel free to share this survey with as many people as you can so we can get better idea on this question.

    CIAOPS Cyber protection model update

    image

    If you’ve been following along at home, I’ve been working on a simplified security model for the Microsoft cloud. After further thought, I’ve come to the conclusion that firstly, the browser is not an independent connector, it is in fact an app. Thus, I have replaced it as a connector with a User connector. The inclusion of a specific user (basically a real live person) came about after concluding that an identity and a user are actually two separate things. This is  because a user can actually have multiple identities, for example to on premise infrastructure which maybe different from  the cloud.

    So, the current model starts with containers where data flows:

    1. Service – e.g. Microsoft 365

    2. Device – e.g PC or phone

    3. Identity – e.g. Azure AD

    4. Data – e.g. files, folders

    Through and into these containers flows data from connectors like:

    1. Email

    2. Connections – e.g. LANs, Internet

    3. Apps – e.g. Microsoft Office, Browser

    4. User

    image

    Since I have now replaced the browser connector by a user connector, let’s work through an interactions here to test my logic out.

    To use a browser the user (i.e. John) will need to login to a device. Assuming that device is Azure AD connected, it means that they will be using a device inside the service (Microsoft 365) as shown above. Remember also, that as each interaction crosses a container boundary logs will be written. To gain access to a device managed by the Microsoft 365 (the service), the John (the user) will need to verify their identity with Azure AD. This process can be protected with features like multi factor authentication (MFA) and Conditional Access (CA). Once the user has successfully completed this process they can access both the data in the inner container, the device and any applications, like the browser, on the device.

    If the John (the user) wants to access the data within the service they can do so securely. Remember, that any access to data via an app like a browser crosses a container boundary and thus logs are captured. In this case, those events will be captured and available in the unified audit log.

    Of course, John (the user) is also typically going to want to access data from outside Microsoft 365 (the service) and there needs to be as much protection as possible provided during that process.  The first step in that protection process is to protect the application, that is the browser. This can be achieved via the Microsoft Edge baseline settings for Intune. Also, because the browser is an application running on the device that also should be protected. That can be done via the Windows 10 Security baseline, which is part of Endpoint Manager as well as Microsoft Defender SmartScreen. Further protection can be layered on with Windows Defender for Endpoint. If the user saves information into SharePoint, OneDrive for Business or Teams (i.e. the data container) it is protected via Defender for Office 365.

    Data can also be protected via Azure Information Protection (AIP) and Windows Information protection (WIP). These features of Microsoft 365 (i.e. the service) allow the business to determine whether information can be stored on a device and what protection it should have no matter where it is stored. If the user is allowed to save information onto the device it can also be protected via Bitlocker which can be enforced via Endpoint Manager policies.

    Now, if John (the user) was to access the service from a device that was not Azure AD joined they could do this but because the data still resides inside the service it can still be protected using things like control access from unmanaged devices.

    Ok, I’m becoming happier that this model fits the bill. Each container provides layers of protection such as:

    Service – Alerts, Log searching, Microsoft Cloud App security, Exchange online filtering, etc., etc.

    Device – Bitlocker, Endpoint manager policies, etc

    Identity – MFA, CA, Azure identity Protection, etc

    Data – AIP, WIP, encryption at rest, etc

    and crossing each boundary also generates separate sets of logs for the interaction.

    I feel pretty confident with this security model in place I can now start attaching the specific security features the Microsoft Cloud provides in each location and explaining the role they play. I have mentioned a few here just to give you an idea and verify to myself that the model works but now I think it is time to take this mode and run with it! What do you think? Love to hear your thoughts.

    CIAOPS Cyber Protection Model

    I have started on a journey to nut out a unique protection model with the aim of applying it to the Microsoft Cloud to simplify the application and understanding of cybersecurity for people. My initial thoughts are here:

    A simplified protection model

    With input from a few, I’ve now progressed my thinking.

    image

    The latest model is shown above. The containers are:

    1. Service – For example: Microsoft 365 or Gmail, etc

    2. Device – For example: Windows 10 desktop, iPhone, Android phone, Mac PC, etc

    3. Identity – For example: Azure AD credentials, Google or Apple account, etc

    4. Data – For example: Files, folders, email messages, etc

    Through and into these containers flows data from connectors like:

    1. Email

    2. Connections – For example: networked devices, the Internet, etc

    3. Apps – For example: desktop apps like Office, accounting apps, etc

    4. Browser – For example: Edge, Firefox, Chrome, etc

    image

    Let’s just focus on the email connector initially, as shown above. You see that in the above model that the device container is missing. This is because email can be delivered without the need of a device. That is an email can be sent to Exchange Online in Microsoft 365, received, verified that a user with that identity exists, and then finally delivered to the users inbox. That can all happen without the interaction of the user and without the need of a device.

    image

    If we expend this out one level the inbound email received by Exchange Online (Service B) has to have been sent by another email service (Service A shown above). Service A must contain an identity (i.e. the sender of the email) and the actual message (i.e data).

    This however, still hasn’t involved a user. It has simply been a ‘service to service’ process.

    image

    At the end of the chain will be a device (a Windows 10 PC say), logged into via a user account (identity), that created that data with an app (say Outlook). That data (email message) is then moved by the email connector firstly to Service A which then again uses an email connector to move it to Service B as shown above.

    image

    Putting specific identifiers on things you get the above.

    image

    So the model seems to scale but we need to re-focus it on protection. Looking at the above, it is clear that you can only control so much of the ‘chain’, as you see highlighted by the ‘control boundary’. Therefore, we should focus our efforts on only what we can control and protect.

    image

    With said focus, we can now start to map capabilities to protect the environment. For example, with email, we can ensure we have appropriate DNS records. This capability lies outside the Service boundary (here M365) but still within our control boundary. When data passes over any security boundary it creates logs. In the case of emails, this would be information that could be examined using features like Message trace in Microsoft 365.

    After the data, flowing through the connector, passes across a boundary and writes log data, security features of that container can now be applied to the data. In the example, once an email is delivered to Exchange Online in Microsoft 365 it then typically has anti-spam and anti-malware as well as other filtering policies applied. Additional protection can also be provided in the form of Microsoft Defender for Office 365 (shown as ATP in the above image to keep things short).

    So, that is just my brief thinking around the Email connector but I feel that the model works well so far helping to simplify security I hope. I’ll keep expanding what I have and begin to incorporate more specific examples of where Microsoft Cloud security products fit into this model. Hopefully, the more built out the model becomes the easier for people it will be to understand the total breadth of Microsoft can offer to help protect your environment.

    As always, love to hear your thoughts and feedback on what I’m developing here, so don’t be shy. Look out for future model enhancements coming soon!