Skip to content

Commit c7a13d5

Browse files
authored
Merge pull request #222891 from austinmccollum/austinmc-move-ztsentinel
Austinmc move ztsentinel
2 parents 5eacc45 + ead82a0 commit c7a13d5

File tree

7 files changed

+194
-1
lines changed

7 files changed

+194
-1
lines changed

articles/sentinel/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030
- name: Deploy and monitor decoy honeytokens
3131
href: monitor-key-vault-honeytokens.md
3232
- name: Build and monitor Zero Trust
33-
href: /security/zero-trust/integrate/sentinel-solution?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
33+
href: sentinel-solution.md
3434
- name: Integrate with Microsoft Defender for IoT
3535
items:
3636
- name: Connect Defender for IoT data with Microsoft Sentinel
197 KB
Loading
402 KB
Loading
896 Bytes
Loading
190 KB
Loading
161 KB
Loading
Lines changed: 193 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,193 @@
1+
---
2+
title: Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
3+
description: Install and learn how to use the Microsoft Sentinel Zero Trust (TIC3.0) solution for an automated visualization of Zero Trust principles, cross-walked to the Trusted Internet Connections framework.
4+
ms.date: 12/15/2021
5+
ms.service: network-access
6+
author: batamig
7+
ms.author: bagol
8+
ms.topic: how-to
9+
---
10+
11+
# Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
12+
13+
The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** enables governance and compliance teams to design, build, monitor, and respond to Zero Trust (TIC 3.0) requirements. This solution includes a workbook, analytics rules, and a playbook, which provide an automated visualization of Zero Trust principles, cross-walked to the Trust Internet Connections framework, helping organizations to monitor configurations over time.
14+
15+
This article describes how to install and use the Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** in your Microsoft Sentinel workspace.
16+
17+
While only Microsoft Sentinel is required to get started, the solution is enhanced by integrations with other Microsoft Services, such as:
18+
19+
- [Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)
20+
- [Microsoft Information Protection](https://azure.microsoft.com/services/information-protection/)
21+
- [Azure Active Directory](https://azure.microsoft.com/services/active-directory/)
22+
- [Microsoft Defender for Cloud](https://azure.microsoft.com/services/active-directory/)
23+
- [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/security/endpoint-defender)
24+
- [Microsoft Defender for Identity](https://www.microsoft.com/microsoft-365/security/identity-defender)
25+
- [Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security)
26+
- [Microsoft Defender for Office 365](https://www.microsoft.com/microsoft-365/security/office-365-defender)
27+
28+
For more information, see [Guiding principles of Zero Trust](/azure/security/integrated/zero-trust-overview#guiding-principles-of-zero-trust).
29+
30+
> [!NOTE]
31+
> Microsoft Sentinel solutions are sets of bundled content, pre-configured for a specific set of data. For more information, see [Microsoft Sentinel solutions documentation](sentinel-solutions.md).
32+
>
33+
34+
## The Zero Trust solution and the TIC 3.0 framework
35+
36+
Zero Trust and TIC 3.0 are not the same, but they share many common themes and together provide a common story. The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** offers detailed crosswalks between Microsoft Sentinel and the Zero Trust model with the TIC 3.0 framework. These crosswalks help users to better understand the overlaps between the two.
37+
38+
While the Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** provides best practice guidance, Microsoft does not guarantee nor imply compliance. All Trusted Internet Connection (TIC) requirements, validations, and controls are governed by the [Cybersecurity & Infrastructure Security Agency](https://www.cisa.gov/trusted-internet-connections).
39+
40+
The **Zero Trust (TIC 3.0)** solution provides visibility and situational awareness for control requirements delivered with Microsoft technologies in predominantly cloud-based environments. Customer experience will vary by user, and some panes may require additional configurations and query modification for operation.
41+
42+
Recommendations do not imply coverage of respective controls, as they are often one of several courses of action for approaching requirements, which is unique to each customer. Recommendations should be considered a starting point for planning full or partial coverage of respective control requirements.
43+
44+
The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** is useful for any of the following users and use cases:
45+
46+
- **Security governance, risk, and compliance professionals**, for compliance posture assessment and reporting
47+
- **Engineers and architects**, who need to design Zero Trust and TIC 3.0-aligned workloads
48+
- **Security analysts**, for alert and automation building
49+
- **Managed security service providers (MSSPs)** for consulting services
50+
- **Security managers**, who need to review requirements, analyze reporting, evaluating capabilities
51+
52+
## Prerequisites
53+
54+
Before installing the **Zero Trust (TIC 3.0)** solution, make sure you have the following prerequisites:
55+
56+
- **Onboard Microsoft services**: Make sure that you have both [Microsoft Sentinel](quickstart-onboard.md) and [Microsoft Defender for Cloud](/azure/defender-for-cloud/get-started) enabled in your Azure subscription.
57+
58+
- **Microsoft Defender for Cloud requirements**: In Microsoft Defender for Cloud:
59+
60+
- Add required regulatory standards to your dashboard. Make sure to add both the *Azure Security Benchmark* and *NIST SP 800-53 R5 Assessments* to your Microsoft Defender for Cloud dashboard. For more information, see [add a regulatory standard to your dashboard](/azure/security-center/update-regulatory-compliance-packages?WT.mc_id=Portal-fx#add-a-regulatory-standard-to-your-dashboard) in the Microsoft Defender for Cloud documentation.
61+
62+
- Continuously export Microsoft Defender for Cloud data to your Log Analytics workspace. For more information, see [Continuously export Microsoft Defender for Cloud data](/azure/defender-for-cloud/continuous-export?tabs=azure-portal).
63+
64+
- **Required user permissions**. To install the **Zero Trust (TIC 3.0)** solution, you must have access to your Microsoft Sentinel workspace with [Security Reader](/azure/active-directory/roles/permissions-reference#security-reader) permissions.
65+
66+
## Install the Zero Trust (TIC 3.0) solution
67+
68+
**To deploy the *Zero Trust (TIC 3.0)* solution from the Azure portal**:
69+
70+
1. In Microsoft Sentinel, select **Content hub** and locate the **Zero Trust (TIC 3.0)** solution.
71+
72+
1. At the bottom-right, select **View details**, and then **Create**. Select the subscription, resource group, and workspace where you want to install the solution, and then review the related security content that will be deployed.
73+
74+
When you're done, select **Review + Create** to install the solution.
75+
76+
For more information, see [Deploy out-of-the-box content and solutions](sentinel-solutions-deploy.md).
77+
78+
## Sample usage scenario
79+
80+
The following sections shows how a security operations analyst could use the resources deployed with the **Zero Trust (TIC 3.0)** solution to review requirements, explore queries, configure alerts, and implement automation.
81+
82+
After [installing](#install-the-zero-trust-tic-30-solution) the **Zero Trust (TIC 3.0)** solution, use the workbook, analytics rules, and playbook deployed to your Microsoft Sentinel workspace to manage Zero Trust in your network.
83+
84+
### Visualize Zero Trust data
85+
86+
1. Navigate to the Microsoft Sentinel **Workbooks** > **Zero Trust (TIC 3.0)** workbook, and select **View saved workbook**.
87+
88+
In the **Zero Trust (TIC 3.0)** workbook page, select the TIC 3.0 capabilities you want to view. For this procedure, select **Intrusion Detection**.
89+
90+
> [!TIP]
91+
> Use the **Guide** toggle at the top of the page to display or hide recommendations and guide panes. Make sure that the correct details are selected in the **Subscription**, **Workspace**, and **TimeRange** options so that you can view the specific data you want to find.
92+
>
93+
94+
1. **Review the control cards displayed**. For example, scroll down to view the **Adaptive Access Control** card:
95+
96+
:::image type="content" source="media/sentinel-workbook/review-query-output-sample.png" alt-text="Screenshot of the Adaptive Access Control card.":::
97+
98+
> [!TIP]
99+
> Use the **Guides** toggle at the top left to view or hide recommendations and guide panes. For example, these may be helpful when you first access the workbook, but unnecessary once you've understood the relevant concepts.
100+
>
101+
102+
1. **Explore queries**. For example, at the top right of the **Adaptive Access Control** card, select the **:** *More* button, and then select the :::image type="icon" source="media/sentinel-workbook/icon-open-in-logs.png" border="false"::: **Open the last run query in the Logs view.** option.
103+
104+
The query is opened in the Microsoft Sentinel **Logs** page:
105+
106+
:::image type="content" source="media/sentinel-workbook/explore-query-logs.png" alt-text="Screenshot of the selected query in the Microsoft Sentinel Logs page.":::
107+
108+
### Configure Zero Trust-related alerts
109+
110+
In Microsoft Sentinel, navigate to the **Analytics** area. View out-of-the-box analytics rules deployed with the **Zero Trust (TIC 3.0)** solution by searching for **TIC3.0**.
111+
112+
By default, the **Zero Trust (TIC 3.0)** solution installs a set of analytics rules that are configured to monitor Zero Trust (TIC3.0) posture by control family, and you can customize thresholds for alerting compliance teams to changes in posture.
113+
114+
For example, if your workload's resiliency posture falls below a specified percentage in a week, Microsoft Sentinel will generate an alert to detail the respective policy status (pass/fail), the assets identified, the last assessment time, and provide deep links to Microsoft Defender for Cloud for remediation actions.
115+
116+
Update the rules as needed or configure a new one:
117+
118+
:::image type="content" source="media/sentinel-workbook/edit-rule.png" alt-text="Screenshot of the Analytics rule wizard.":::
119+
120+
For more information, see [Create custom analytics rules to detect threats](detect-threats-custom.md).
121+
122+
### Respond with SOAR
123+
124+
In Microsoft Sentinel, navigate to the **Automation** > **Active playbooks** tab, and locate the **Notify-GovernanceComplianceTeam** playbook.
125+
126+
Use this playbook to automatically monitor CMMC alerts, and notify the governance compliance team with relevant details via both email and Microsoft Teams messages. Modify the playbook as needed:
127+
128+
:::image type="content" source="media/sentinel-workbook/logic-app-sample.png" alt-text="Screenshot of the Logic app designer showing a sample playbook.":::
129+
130+
For more information, see [Use triggers and actions in Microsoft Sentinel playbooks](playbook-triggers-actions.md).
131+
132+
## Frequently asked questions
133+
134+
### Are custom views and reports supported?
135+
136+
Yes. You can customize your **Zero Trust (TIC 3.0)** workbook to view data by subscription, workspace, time, control family, or maturity level parameters, and you can export and print your workbook.
137+
138+
For more information, see [Use Azure Monitor workbooks to visualize and monitor your data](monitor-your-data.md).
139+
140+
### Are additional products required?
141+
142+
Both Microsoft Sentinel and Microsoft Defender for Cloud are [required](#prerequisites).
143+
144+
Aside from these services, each control card is based on data from multiple services, depending on the types of data and visualizations being shown in the card. Over 25 Microsoft services provide enrichment for the **Zero Trust (TIC 3.0)** solution.
145+
146+
### What should I do with panels with no data?
147+
148+
Panels with no data provide a starting point for addressing Zero Trust and TIC 3.0 control requirements, including recommendations for addressing respective controls.
149+
150+
### Are multiple subscriptions, clouds, and tenants supported?
151+
152+
Yes. You can use workbook parameters, Azure Lighthouse, and Azure Arc to leverage the **Zero Trust (TIC 3.0)** solution across all of your subscriptions, clouds, and tenants.
153+
154+
For more information, see [Use Azure Monitor workbooks to visualize and monitor your data](monitor-your-data.md) and [Manage multiple tenants in Microsoft Sentinel as an MSSP](multiple-tenants-service-providers.md).
155+
156+
### Is partner integration supported?
157+
158+
Yes. Both workbooks and analytics rules are customizable for integrations with partner services.
159+
160+
For more information, see [Use Azure Monitor workbooks to visualize and monitor your data](monitor-your-data.md) and [Surface custom event details in alerts](surface-custom-details-in-alerts.md).
161+
162+
### Is this available in government regions?
163+
164+
Yes. The **Zero Trust (TIC 3.0)** solution is in Public Preview and deployable to Commercial/Government regions. For more information, see [Cloud feature availability for commercial and US Government customers](/azure/security/fundamentals/feature-availability).
165+
166+
### Which permissions are required to use this content?
167+
168+
- [Microsoft Sentinel Contributor](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-contributor) users can create and edit workbooks, analytics rules, and other Microsoft Sentinel resources.
169+
170+
- [Microsoft Sentinel Reader](/azure/role-based-access-control/built-in-roles#microsoft-sentinel-reader) users can view data, incidents, workbooks, and other Microsoft Sentinel resources.
171+
172+
For more information, see [Permissions in Microsoft Sentinel](roles.md).
173+
174+
## Next steps
175+
176+
For more information, see:
177+
178+
- [Get Started with Microsoft Sentinel](https://azure.microsoft.com/services/azure-sentinel/)
179+
- [Visualize and monitor your data with workbooks](monitor-your-data.md)
180+
- [Microsoft Zero Trust Model](https://www.microsoft.com/security/business/zero-trust)
181+
- [Zero Trust Deployment Center](/security/zero-trust/?WT.mc_id=Portal-fx)
182+
183+
Watch our videos:
184+
185+
- [Demo: Microsoft Sentinel Zero Trust (TIC 3.0) Solution](https://www.youtube.com/watch?v=OVGgRIzAvCI)
186+
- [Microsoft Sentinel: Zero Trust (TIC 3.0) Workbook Demo](https://www.youtube.com/watch?v=RpDas8fXzdU)
187+
188+
Read our blogs!
189+
190+
- [Announcing the Microsoft Sentinel: Zero Trust (TIC3.0) Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/announcing-the-microsoft-sentinel-zero-trust-tic3-0-solution/ba-p/3031685)
191+
- [Building and monitoring Zero Trust (TIC 3.0) workloads for federal information systems with Microsoft Sentinel](https://devblogs.microsoft.com/azuregov/building-and-monitoring-zero-trust-tic-3-0-workloads-for-federal-information-systems-with-microsoft-sentinel/)
192+
- [Zero Trust: 7 adoption strategies from security leaders](https://www.microsoft.com/security/blog/2021/03/31/zero-trust-7-adoption-strategies-from-security-leaders/)
193+
- [Implementing Zero Trust with Microsoft Azure: Identity and Access Management (6 Part Series)](https://devblogs.microsoft.com/azuregov/implementing-zero-trust-with-microsoft-azure-identity-and-access-management-1-of-6/)

0 commit comments

Comments
 (0)