Skip to content

Commit 4a1460d

Browse files
authored
Merge branch 'main' into gary-fix-links-4
2 parents 33eb5db + ec98fcb commit 4a1460d

File tree

2 files changed

+14
-15
lines changed

2 files changed

+14
-15
lines changed

CloudAppSecurityDocs/posture-overview.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: SaaS security posture management (SSPM) - overview
2+
title: SaaS security posture management (SSPM) - overview
33
description: Learn what is SaaS security posture management (SSPM) in Microsoft Defender for cloud apps
44
ms.topic: how-to
55
ms.date: 11/17/2024
66
---
77

8-
# SaaS security posture management (SSPM) - overview
8+
# SaaS security posture management (SSPM) - overview
99

1010
> [!NOTE]
1111
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation).
@@ -20,10 +20,9 @@ One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Postur
2020

2121
- Your organization must have Microsoft Defender for Cloud Apps licenses.
2222
- Your app must be connected to Defender for Cloud Apps. For more information, see:
23+
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
24+
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
2325

24-
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
25-
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
26-
2726
## Turn on SaaS security recommendations
2827

2928
Follow these steps to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
@@ -57,7 +56,7 @@ For more information, see [Assess your security posture with Microsoft Secure Sc
5756
> [!IMPORTANT]
5857
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations in [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above.
5958
60-
To effectively manage your organizations SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
59+
To effectively manage your organization's SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
6160

6261
- [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative)
6362

@@ -70,7 +69,6 @@ In addition you can find a variety of SSPM recommendations under different initi
7069
- Business Email Compromise - Financial fraud
7170
- Zero Trust (Foundational)
7271

73-
7472
## Next steps
7573

7674
> [!div class="nextstepaction"]

CloudAppSecurityDocs/saas-security-initiative.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,13 @@ description: Learn how to use the "SaaS security initiative" in Microsoft XDR
44
ms.topic: how-to
55
ms.date: 10/31/2024
66
---
7-
# SaaS Security Initiative
7+
# SaaS Security Initiative
88

99
> [!NOTE]
1010
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD.
1111
1212
The SaaS Security Initiative provides a centralized place for SaaS security best practices, enabling organizations to manage and prioritize security recommendations effectively. By focusing on the most impactful metrics, organizations can enhance their SaaS security posture efficiently.
13+
1314
![Screenshot of the SaaS security initiative home page.](media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png)
1415

1516

@@ -22,24 +23,24 @@ The SaaS Security Initiative serves as the main hub for SaaS Security Posture Ma
2223
- Your organization must have Microsoft Defender for Cloud Apps licenses.
2324
- The app which you wish to see security recommendations for, must be connected.
2425
- For more information, see:
25-
26-
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
27-
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
26+
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
27+
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
2828

2929
## Operational Guidelines
30+
3031
To initiate the process, navigate to the **Exposure Management** blade and select **Initiatives**. Click on the **SaaS Security** initiative and then select **Open Initiative Page**.
3132

32-
On this page, you'll find 12 measurable metrics that categorize hundreds of best practice recommendations.
33+
On this page, you'll find 12 measurable metrics that categorize hundreds of best practice recommendations.
3334

34-
It's recommended to prioritize metrics with the highest **Impact on Initiative Score**, which is a composite measure that considers both the **Weight** of each recommendation and the percentage of **Non-Compliant** recommendations. To effectively monitor progress, it's advisable to set a **target score** for your organizations security posture. This target will serve as a benchmark for improvement and help track advancements over time.
35+
It's recommended to prioritize metrics with the highest **Impact on Initiative Score**, which is a composite measure that considers both the **Weight** of each recommendation and the percentage of **Non-Compliant** recommendations. To effectively monitor progress, it's advisable to set a **target score** for your organization's security posture. This target will serve as a benchmark for improvement and help track advancements over time.
3536

3637
For instance, to gain visibility into all best practice recommendations pertaining to privileged access within SaaS applications, select the metric labeled **Missing Best Practices to Secure Privileged Access in SaaS Apps**.
3738

3839
Once selected, you can click on any of the **Non-Compliant** recommendations to access the associated remediation steps.
3940

4041
## Additional Information
4142

42-
- Each metric includes a list of associated app connectors, encouraging organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, navigate to the **Security Recommendations** tab and filter by the relevant application.
43-
- To learn more about Exposure Management initiatives, see [Review security initiatives](/security-exposure-management/initiatives).
43+
Each metric includes a list of associated app connectors, encouraging organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, navigate to the **Security Recommendations** tab and filter by the relevant application.
4444

45+
To learn more about Exposure Management initiatives, see [Review security initiatives](/security-exposure-management/initiatives).
4546

0 commit comments

Comments
 (0)