Download presentation
Presentation is loading. Please wait.
Published byFrancisco Fernández Mendoza Modified over 6 years ago
1
Office 365 Security Assessment Workshop
Close-out Presentation <Presenter Name>
2
1 2 3 4 Agenda Introduction Engagement Overview Engagement Tools
Next steps and Actions 2 3 4
3
Close-out Presentation
Example Close-out Presentation The purpose of this meeting is to: Review vision, objectives and assessment approach Review and agree on recommendations and roadmap Discuss and agree on next steps and actions
4
Engagement Overview
5
Office 365 Security Assessment Workshop
Phase 1 Kick Off Phase 2 Assessment Phase 3 Education Phase 4 Roadmap Project scope Pre-assessment questionnaire Requirements Stakeholders Review questionnaire Secure Score Identify gaps Possible Advanced Security Management proxy log import Provide up to 3 hrs. of education on security topics Utilizes sessions from Office University training events Demonstrate SaaS application use through Advanced Security Management Provide detailed roadmap as prescribed by Secure Score Identify customers security roadmap and next steps Partner opportunity to help close identified gaps
6
Approach Secure Score Prioritize Build Roadmap Design/Deploy
Use Office 365 Secure Score to understand current security baseline Track score improvements over time Track configuration drift, using scheduled reviews Security Awareness Consulting and solution recommendation Implementation and configuration Prioritize Prioritize the security actions from Secure Score based on user impact and implementation cost Secure Score Prioritize: -User impact -Implementation cost Build Roadmap Design/Deploy Build Roadmap Build a roadmap for the implementation of the prioritized security actions Design/Deploy Design and deploy the recommended security actions in the roadmap Not in scope as part of this engagement
7
Recommendations and Roadmap
8
Security Action Score Summary
Example Current State Office 365 Secure Score Security Action Prioritization Summary Office 365 Secure Score Security Action Score Summary User Impact Implementation Cost Office 365 Secure Score Security Action Category Summary
9
Key Recommendations Example Quick Wins 0-3 Months Low user impact
Low implementation cost 3-6 Months Moderate implementation cost 6 Months and beyond Moderate user impact Low and moderate implementation cost Enable MFA for all global admins Set strong outbound spam policy Review signs-ins after multiple failures report weekly Enable audit data recording Review signs-ins from multiple geographies report weekly Enable Information Rights Management (IRM) services Enable Advanced Security Management Console Enable MFA for all users Enable Advanced Threat Protection safe attachments policy Enable Advanced Threat Protection safe links policy Do not allow anonymous calendar sharing Require passwords to be reset at least every 60 days Enable mobile device management services Enable Data Loss Prevention policies SPO Sites have classification policies IRM protections applied to documents IRM protections applied to
10
How we can help Example User impact: Implementation cost: 0-3 Months
6 Months and beyond Protect Enable audit data recording Enable Advanced Threat Protection safe attachments policy Enable MFA for all users Enable mobile device management services IRM protections applied to documents IRM protections applied to Enable MFA for all global admins Set strong outbound spam policy Enable Advanced Threat Protection safe links policy Enable Data Loss Prevention policies Establish education program for IT staff and end-users On-going service: Security Assessment Detect Managed security service: Monitoring, account and credential abuse Managed security service : Reporting Managed security service : Threat detection Enable Advanced Security Management Console Respond Managed security service : Incident response User impact: Low Moderate Implementation cost:
11
Next Steps and Actions
12
Next Steps and Actions Example Party Responsible Completion Date
Next Step, Action Notes
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.