Stopping Malicious Users with Office 365 Cloud App...

23
Stopping Malicious Users with Office 365 Cloud App Security #ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM Riaz Javed Lead Architect PCM Inc.

Transcript of Stopping Malicious Users with Office 365 Cloud App...

Page 1: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

Stopping Malicious Users with Office 365 Cloud App Security

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Riaz JavedLead Architect

PCM Inc.

Page 2: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

The security landscape has changed

EmployeesPartnersCustomers

Microsoft Azure

On-premises apps and data

On-premises apps and data

Identity Devices

Apps & Data

Page 3: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Microsoft Cloud App Security

Cloud-delivered service bringing

visibility and control to cloud apps

Committed to support third-party

cloud apps

Available as: standalone and in E5

Page 4: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

What to Consider

Shadow IT ITAccess control

Access controlThreat prevention

Employee downloads customer details from an airport kiosk.

How can I detect and limit access?

An employee publicly shares a sensitive file in the cloud.How can I detect that?

How do I know if my users have been breached?

Office 365 is rolled out.How do I know which groups are using other apps?

Page 5: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Framework to Secure your Cloud Apps

Threat prevention

Clouddiscovery

Informationprotection

In-session

control

DISCOVER INVESTIGATE CONTROL PROTECT

Page 6: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

Cloud App Security Architecture

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Page 7: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Architecture and how it works

Discovery

• Use traffic logs to discover and analyze which cloud apps are in use

Sanctioning and un-sanctioning

• Sanction or block apps in your organization using the cloud app catalog

App connectors

• Leverage APIs provided by various cloud app providers

Conditional Access

• Real-time visibility and control over access to and activities performed within your cloud environment

App connectors

Cloud discovery

Cloud App Security

Proxy access + Session

Cloud apps

API

Cloud traffic

Firewalls

Proxies

Cloud traffic logs

Page 8: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Deploy Cloud App Security in 4 simple steps• Create a trial tenant

• Upload discovery logs

• Connect a sanctioned SaaS app

• Configure initial policies

Page 9: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Discovery

Anomalous usage alerts

New apps and trending apps alerts

Discover cloud apps in use across your networks

Investigate users and source IP cloud usage

Un-sanction, sanction and protect apps

Shadow IT discovery

Cloud app risk assessment

Risk scoring for 13,000+ cloud apps

60+ security and compliance risk factors

Integrates withYour network appliances

Alert on risky cloud usage

Page 10: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Information Protection for Cloud Apps

Gain cloud data visibility

Enforce DLP policies & control sharing

AIP, 3rd

party DLP

Visibility to sharing level and classification labels

Quantify exposure and risk

Detect and manage 3rd apps access

Govern data in the cloud with granular DLP policies

Leverage Microsoft and 3rd party DLP engines for classification

Identify policy violations

Investigate incidents and related activities

Quarantine and permissions removal

Page 11: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Threat detection

Behavioral analytics

Advanced investigation

Advanced incident Investigation tools

Pivot on users, file, activities and locations

Customize detections based on your findings

Support sharing level and classification labels

Quantify exposure and risk

Detect and manage 3rd apps access

Leverage Microsoft Intelligent Security Graph

Unique insights, informed by trillions of signals across Microsoft’s customer base

Microsoft Intelligent

Security Graph, 3rd

party SIEM

Page 12: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

In-Session Control

Context-aware session policies

Limit sessions of unmanaged devices

Control access to cloud apps based on user, location, device and app

Supports any SSO, any SAML-based app, any OS

Enforce browser-based “view only” mode for risky sessions

Limit access to sensitive data

Azure Active

Directory, Device

Registration Service

Page 13: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

Try Cloud App Security

www.cloudappsecurity.com

Page 14: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Cloud App Security portal overview

Page 15: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Create a Cloud Discovery snapshot report

• Export logs manually from a firewall/proxy node

• Navigate to the discovery tab and click on “upload logs”

• Fill in the report name and description

• Choose the data source according to your network appliance

• Upload the file and wait until the report is created

Page 16: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Upload discovery logs – Continuous upload

Navigate to “cloud discovery settings” under settings

Choose “Upload logs automatically”

Create a data source.

Create a log collector.

Download the log collector and run it.

Connect to the server via SSH

Run the collector_configtool

Configure the firewall/proxy to send logs to the specified port

Validate deployment by reviewing the governance log

Page 17: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

Log analysis (SaaS DB)

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Discovery Architecture

Syslog CEF

SaaS DB

Tenant DB

FirewallFirewall Web proxy

Log parser

Discovery aggregationsAzure

Network logs

Log collector

Page 18: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Connecting a Sanctioned App

Navigate to Settings > “Sanctioned apps”

Go to “Connect an app” and choose the relevant app from the list.

Login with an admin user and approve the OAuth request

Validate deployment with “Test API”

Expect initial audit logs from the app within minutes to an hour.

Page 19: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

App Connector Architecture

Audit log DBFile directory DB

App connector manager

App-specific connector

Cloud accounts DB

Azure

Activity API

File API

Users/Groups

Users Support Admins

Protected cloud apps

Page 20: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Set your First Activity Policy

Navigate to the Policies page

Create a policy and choose “activity policy”

Choose a template, for example, “Mass download by a single user”

Customize parameters, for example, change threshold to 10 downloads

Customize actions in response

Page 21: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Activity and Anomaly Detection Architecture

Users Support Admins

Protected cloud apps

Activity API

Users/Groups

Event enrichment

Azure

Alerts engine

Based on big data and machine learning- Anomaly detection- Activity policy evaluation

Geo-location database

Microsoft Threat Intelligence Center

e.g. risky IP addresses

Page 22: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Set up your first Policy

Navigate to the policies page

Create a policy and choose “file policy”

Choose a template, for example, “File containing PCI detected in the cloud”

Customize policy, for example, narrow scope for “Access level” equals Public

Customize actions in response

Page 23: Stopping Malicious Users with Office 365 Cloud App Securityfiles.informatandm.com/uploads/2018/10/Stopping_Malicious_Users… · control sharing AIP, 3rd party DLP Visibility to sharing

#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM

Files and Data Control Architecture

Files External collabor

ators

Users

Protected cloud apps

Activity API

FilesAPI

Azure

Remediation API

File directory Event processing

Scan queue

Content scan engine

Files for re-scan as part of the ongoing scan process

File notifications for new and updated files

Selected file for scan

Download file for scan

DLP engineExtracted text

3rd party DLP engine