Office 365 Security Review
Office 365 is a critical resource for organizations, holding important user accounts, data, and email. As a vital component of daily operations, any security breach or data loss can have serious consequences, impacting revenue and reputation. Therefore, it is crucial to ensure that Office 365 is secured with strong security measures to safeguard these valuable assets and ensure the organisation’s long-term success.
77% of cloud breaches feature stolen or misused user accounts. Therefore the first part of our Office 365 Penetration Test will assess whether user accounts, passwords, and privileges are managed well in the organisation.
Business Email Compromise attacks have skyrocketed in recent years. Appropriate email configuration can help reduce this risk. Misconfigurations can also accidentally share sensitive data to more people than intended. Therefore, the second part of our review will assess the configuration against the recommendations from the Centre for Information Security.
We Will Check
We will check:
- Protection of users accounts such as:
- Password policies and compliance with those
- Appropriate onboarding and offboarding of employees
- Authentication controls in place
- Appropriate use of least-privilege
- Additional protections for administrator accounts
- Check for the existence of shared accounts
- Email security configuration
- DMARC, SPF and DKIM Spoofing protections
- Email scanning and phishing protections
- Email forwarding configuration
- Service Hardening
- Defaults permissions for sharing of calendars and files
- Controls for reducing risk of accidental sharing outside of the organisation
- Review of teamsites and activity
- Review of activity reports and alerts for suspicious activity
- Review policies for access from managed devices
- Review of external apps with access to your account
- Review of audit logging configuration
Before we start any testing, we’ll agree on a formal testing Scope document with you. In this, we’ll agree on the Microsoft 365 tenancies that are in-scope. As a Microsoft Partner, we will typically request that you grant us access to the configuration through Microsoft’s Granular Delegated Access Permissions. Alternatively you can provide a user-account with the required audit administration roles in Azure AD.
Once our testing is complete, we’ll provide you with a report with detailed findings, their impact and how to fix them. We can also provide consultancy to help fix these if that is useful to you.