Skip to content

Commit 8056bad

Browse files
authored
Merge pull request #236286 from v-edmckillop/patch-157
Update memo-22-09-other-areas-zero-trust.md
2 parents 638f066 + 6112dbd commit 8056bad

File tree

1 file changed

+58
-53
lines changed

1 file changed

+58
-53
lines changed

articles/active-directory/standards/memo-22-09-other-areas-zero-trust.md

Lines changed: 58 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -10,97 +10,102 @@ author: gargi-sinha
1010
ms.author: gasinh
1111
manager: martinco
1212
ms.reviewer: martinco
13-
ms.date: 3/10/2022
13+
ms.date: 04/28/2023
1414
ms.custom: it-pro
1515
ms.collection: M365-identity-device-management
1616
---
1717

1818
# Other areas of Zero Trust addressed in memorandum 22-09
1919

20-
The other articles in this guidance set address the identity pillar of Zero Trust principles, as described in the US federal government's Office of Management and Budget (OMB) [memorandum 22-09](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf). This article covers areas of the Zero Trust maturity model that are beyond the identity pillar.
21-
22-
This article addresses the following cross-cutting themes:
23-
24-
* Visibility and analytics
20+
The other articles in this guidance address the identity pillar of Zero Trust principles, as described in the US Office of Management and Budget (OMB) [M 22-09 Memorandum for the Heads of Executive Departments and Agencies](https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf). This article covers Zero Trust maturity model areas beyond the identity pillar, and it addresses the following themes:
2521

22+
* Visibility
23+
* Analytics
2624
* Automation and orchestration
27-
2825
* Governance
2926

3027
## Visibility
3128

32-
It's important to monitor your Azure Active Directory (Azure AD) tenant. You must adopt an "assume breach" mindset and meet compliance standards in memorandum 22-09 and [memorandum 21-31](https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf). Three primary log types are used for security analysis and ingestion:
33-
34-
* [Azure audit logs](../reports-monitoring/concept-audit-logs.md). Used for monitoring operational activities of the directory itself, such as creating, deleting, updating objects like users or groups. Also used for making changes to configurations of Azure AD, like modifications to a conditional access policy.
35-
36-
* [Azure AD sign-in logs](../reports-monitoring/concept-all-sign-ins.md). Used for monitoring all sign-in activities associated with users, applications, and service principals. The sign-in logs contain specific categories of sign-ins for easy differentiation:
29+
It's important to monitor your Azure Active Directory (Azure AD) tenant. Assume a breach mindset and meet compliance standards in memorandum 22-09 and [Memorandum 21-31](https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf). Three primary log types are used for security analysis and ingestion:
3730

38-
* Interactive sign-ins: Shows user successful and failed sign-ins for failures, the policies that might have been applied, and other relevant metadata.
31+
* **Azure audit logs** to monitor operational activities of the directory, such as creating, deleting, updating objects like users or groups
32+
* Use also to make changes to Azure AD configurations, like modifications to a Conditional Access policy
33+
* See, [Audit logs in Azure AD](../reports-monitoring/concept-audit-logs.md)
34+
* **Provisioning logs** have information about objects synchronized from Azure AD to applications like Service Now with Microsoft Identity Manager
35+
* See, [Provisioning logs in Azure Active Directory](../reports-monitoring/concept-provisioning-logs.md)
36+
* **Azure AD sign-in logs** to monitor sign-in activities associated with users, applications, and service principals.
37+
* Sign-in logs have categories for differentiation
38+
* Interactive sign-ins show successful and failed sign-ins, policies applied, and other metadata
39+
* Non-interactive user sign-ins show no interaction during sign-in: clients signing in on behalf of the user, such as mobile applications or email clients
40+
* Service principal sign-ins show service principal or application sign-in: services or applications accessing services, applications, or the Azure AD directory through the REST API
41+
* Managed identities for Azure resource sign-in: Azure resources or applications accessing Azure resources, such as a web application service authenticating to an Azure SQL back end.
42+
* See, [Sign-in logs in Azure Active Directory (preview)](../reports-monitoring/concept-all-sign-ins.md)
3943

40-
* Non-interactive user sign-ins: Shows sign-ins where a user did not perform an interaction during sign-in. These sign-ins are typically clients signing in on behalf of the user, such as mobile applications or email clients.
44+
In Azure AD free tenants, log entries are stored for seven days. Tenants with an Azure AD premium license retain log entries for 30 days.
4145

42-
* Service principal sign-ins: Shows sign-ins by service principals or applications. Typically, these are headless and done by services or applications that are accessing other services, applications, or the Azure AD directory itself through the REST API.
46+
Ensure a security information and event management (SIEM) tool ingests logs. Use sign-in and audit events to correlate with application, infrastructure, data, device, and network logs.
4347

44-
* Managed identities for Azure resource sign-ins: Shows sign-ins from resources with Azure managed identities. Typically, these are Azure resources or applications that are accessing other Azure resources, such as a web application service authenticating to an Azure SQL back end.
48+
We recommend you integrate Azure AD logs with Microsoft Sentinel. Configure a connector to ingest Azure AD tenant logs.
4549

46-
* [Provisioning logs](../reports-monitoring/concept-provisioning-logs.md). Shows information about objects synchronized from Azure AD to applications like Service Now by using Microsoft Identity Manager.
50+
Learn more:
4751

48-
Log entries are stored for 7 days in Azure AD free tenants. Tenants with an Azure AD premium license retain log entries for 30 days.
52+
* [What is Microsoft Sentinel?](../../sentinel/overview.md)
53+
* [Connect Azure AD to Microsoft Sentinel](../../sentinel/connect-azure-active-directory.md)
4954

50-
It's important to ensure that your logs are ingested by a security information and event management (SIEM) tool. Using a SIEM tool allows sign-in and audit events to be correlated with application, infrastructure, data, device, and network logs for a holistic view of your systems.
55+
For the Azure AD tenant, you can configure the diagnostic settings to send the data to an Azure Storage account, Azure Event Hubs, or a Log Analytics workspace. Use these storage options to integrate other SIEM tools to collect data.
5156

52-
We recommend that you integrate your Azure AD logs with [Microsoft Sentinel](../../sentinel/overview.md) by configuring a connector to ingest your Azure AD tenant logs. For more information, see [Connect Azure Active Directory to Microsoft Sentinel](../../sentinel/connect-azure-active-directory.md).
57+
Learn more:
5358

54-
You can also configure the [diagnostic settings](../reports-monitoring/overview-monitoring.md) on your Azure AD tenant to send the data to an Azure Storage account, Azure Event Hubs, or a Log Analytics workspace. These storage options allow you to integrate other SIEM tools to collect the data. For more information, see [Plan an Azure Active Directory reporting and monitoring deployment](../reports-monitoring/plan-monitoring-and-reporting.md).
59+
* [What is Azure AD monitoring?](../reports-monitoring/overview-monitoring.md)
60+
* [Azure AD reporting and monitoring deployment dependencies](../reports-monitoring/plan-monitoring-and-reporting.md)
5561

5662
## Analytics
5763

5864
You can use analytics in the following tools to aggregate information from Azure AD and show trends in your security posture in comparison to your baseline. You can also use analytics to assess and look for patterns or threats across Azure AD.
5965

60-
* [Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) actively analyzes sign-ins and other telemetry sources for risky behavior. Identity Protection assigns a risk score to a sign-in event. You can prevent sign-ins, or force a step-up authentication, to access a resource or application based on risk score.
61-
62-
* [Microsoft Sentinel](../../sentinel/get-visibility.md) offers the following ways to analyze information from Azure AD:
63-
64-
* Microsoft Sentinel has [User and Entity Behavior Analytics (UEBA)](../../sentinel/identify-threats-with-entity-behavior-analytics.md). UEBA delivers high-fidelity, actionable intelligence on potential threats that involve user, host, IP address, and application entities. This intelligence enhances events across the enterprise to help detect anomalous behavior in users and systems.
65-
66-
* You can use specific analytics rule templates that hunt for threats and alerts found in your Azure AD logs. Your security or operation analyst can then triage and remediate threats.
67-
68-
* Microsoft Sentinel has [workbooks](../../sentinel/top-workbooks.md) that help you visualize multiple Azure AD data sources. These workbooks can show aggregate sign-ins by country, or applications that have the most sign-ins. You can also create or modify existing workbooks to view information or threats in a dashboard to gain insights.
69-
70-
* [Azure AD usage and insights reports](../reports-monitoring/concept-usage-insights-report.md) show information similar to Azure Sentinel workbooks, including which applications have the highest usage or sign-in trends over a time period. The reports are useful for understanding aggregate trends in your enterprise that might indicate an attack or other events.
66+
* **Azure AD Identity Protection** analyzes sign-ins and other telemetry sources for risky behavior
67+
* Identity Protection assigns a risk score to sign-in events
68+
* Prevent sign-ins, or force a step-up authentication, to access a resource or application based on risk score
69+
* See, [What is Identity Protection?](../identity-protection/overview-identity-protection.md)
70+
* **Azure AD usage and insights reports** have information similar to Azure Sentinel workbooks, including applications with highest usage or sign-in trends.
71+
* Use reports to understand aggregate trends that might indicate an attack or other events
72+
* See, [Usage and insights in Azure AD](../reports-monitoring/concept-usage-insights-report.md)
73+
* **Microsoft Sentinel** analyze information from Azure AD:
74+
* Microsoft Sentinel User and Entity Behavior Analytics (UEBA) delivers intelligence on potential threats from user, host, IP address, and application entities.
75+
* Use analytics rule templates to hunt for threats and alerts in your Azure AD logs. Your security or operation analyst can triage and remediate threats.
76+
* Microsoft Sentinel workbooks help visualize Azure AD data sources. See sign-ins by country, region, or applications.
77+
* See, [Commonly used Microsoft Sentinel workbooks](../../sentinel/top-workbooks.md)
78+
* See, [Visualize collected data](../../sentinel/get-visibility.md)
79+
* See, [Identify advanced threats with UEBA in Microsoft Sentinel](../../sentinel/identify-threats-with-entity-behavior-analytics.md)
7180

7281
## Automation and orchestration
7382

74-
Automation is an important aspect of Zero Trust, particularly in remediation of alerts that occur because of threats or security changes in your environment. In Azure AD, automation integrations are possible to help remediate alerts or perform actions that can improve your security posture. Automations are based on information received from monitoring and analytics.
83+
Automation in Zero Trust helps remediate alerts due to threats or security changes. In Azure AD, automation integrations help clarify actions to improve your security posture. Automation is based on information received from monitoring and analytics.
84+
85+
Use Microsoft Graph API REST calls to access Azure AD programmatically. This access requires an Azure AD identity with authorizations and scope. With the Graph API, integrate other tools.
7586

76-
[Microsoft Graph API](/graph/overview) REST calls are the most common way to programmatically access Azure AD. This API-based access requires an Azure AD identity with the necessary authorizations and scope. With the Graph API, you can integrate Microsoft's and other tools. Follow the principles outlined in this article when you're performing the integration.
87+
We recommend you set up an Azure function or an Azure logic app to use a system-assigned managed identity. The logic app or function has steps or code to automate actions. Assign permissions to the managed identity to grant the service principal directory permissions to perform actions. Grant managed identities minimum rights.
7788

78-
We recommend that you set up an Azure function or an Azure logic app to use a [system-assigned managed identity](../managed-identities-azure-resources/overview.md). Your logic app or function contains the steps or code necessary to automate the desired actions. You assign permissions to the managed identity to grant the service principal the necessary directory permissions to perform the required actions. Grant managed identities only the minimum rights necessary.
89+
Learn more: [What are managed identities for Azure resources?](../managed-identities-azure-resources/overview.md)
7990

80-
Another automation integration point is [Azure AD PowerShell](/powershell/azure/active-directory/overview) modules. PowerShell is a useful automation tool for administrators and IT integrators who are performing common tasks or configurations in Azure AD. PowerShell can also be incorporated into Azure functions or Azure Automation runbooks.
91+
Another automation integration point is Azure AD PowerShell modules. Use PowerShell to perform common tasks or configurations in Azure AD, or incorporate into Azure functions or Azure Automation runbooks.
8192

8293
## Governance
8394

84-
It's important that you understand and document clear processes for how you intend to operate your Azure AD environment. Azure AD has features that allow for governance-like functionality to be applied to scopes within Azure AD. Consider the following guidance to help with governance via Azure AD:
95+
Document your processes for operating the Azure AD environment. Use Azure AD features for governance functionality applied to scopes in Azure AD.
8596

86-
* [Azure Active Directory governance operations reference guide](../fundamentals/active-directory-ops-guide-govern.md).
87-
* [Azure Active Directory security operations guide](../fundamentals/security-operations-introduction.md). It can help you secure your operations and understand how security and governance overlap.
97+
Learn more:
8898

89-
After you understand operational governance, you can use [governance features](../governance/identity-governance-overview.md) to implement portions of your governance controls. These include features mentioned in [Meet authorization requirements of memorandum 22-09](memo-22-09-authorization.md).
99+
* [Azure AD governance operations reference guide](../fundamentals/active-directory-ops-guide-govern.md)
100+
* [Azure AD security operations guide](../fundamentals/security-operations-introduction.md)
101+
* [What is Microsoft Entra Identity Governance?](../governance/identity-governance-overview.md)
102+
* [Meet authorization requirements of memorandum 22-09](memo-22-09-authorization.md).
90103

91104

92105
## Next steps
93106

94-
The following articles are part of this documentation set:
95-
96-
[Meet identity requirements of memorandum 22-09](memo-22-09-meet-identity-requirements.md)
97-
98-
[Enterprise-wide identity management system](memo-22-09-enterprise-wide-identity-management-system.md)
99-
100-
[Multifactor authentication](memo-22-09-multi-factor-authentication.md)
101-
102-
[Authorization](memo-22-09-authorization.md)
103-
104-
For more information about Zero Trust, see:
105-
106-
[Securing identity with Zero Trust](/security/zero-trust/deploy/identity)
107+
* [Meet identity requirements of memorandum 22-09 with Azure AD](memo-22-09-meet-identity-requirements.md)
108+
* [Enterprise-wide identity management system](memo-22-09-enterprise-wide-identity-management-system.md)
109+
* [Meet multifactor authentication requirements of memorandum 22-09](memo-22-09-multi-factor-authentication.md)
110+
* [Meet authorization requirements of memorandum 22-09](memo-22-09-authorization.md)
111+
* [Securing identity with Zero Trust](/security/zero-trust/deploy/identity)

0 commit comments

Comments
 (0)