Skip to content

Commit 9e3c07c

Browse files
committed
list of initiatives
1 parent ecf3086 commit 9e3c07c

File tree

1 file changed

+14
-15
lines changed

1 file changed

+14
-15
lines changed
Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,43 +1,45 @@
11
---
2-
title: Review security initiatives in Microsoft Security Exposure Management
3-
description: Learn how to work with security Initiatives in Microsoft Security Exposure Management.
2+
title: Security initiatives in Microsoft Security Exposure Management
3+
description: List of security Initiatives in Microsoft Security Exposure Management.
44
ms.author: dlanger
55
author: dlanger
66
manager: rayne-wiselman
7-
ms.topic: overview
7+
ms.topic: reference
88
ms.service: exposure-management
99
ms.date: 10/09/2024
1010
---
1111

1212
# Security Initiatives
1313

14+
This is a list of security initiatives in Microsoft Security Exposure Management. Each initiative is designed to help you manage and improve the security posture of your organization.
15+
1416
## Business Email Compromise - Financial fraud
1517

16-
Business email compromise (BEC) financial fraud is a social engineering attack that aims to steal money or sensitive information. The attacker tricks the target into believing they are interacting with a trusted entity to conduct either personal or professional business. After deceiving the target, the attacker persuades them to share valuable information or process a payment.
18+
Business email compromise (BEC) financial fraud is a social engineering attack that aims to steal money or sensitive information. The attacker tricks the target into believing they're interacting with a trusted entity to conduct either personal or professional business. After deceiving the target, the attacker persuades them to share valuable information or process a payment.
1719

18-
## CIS M365 Foundations Benchmark
20+
## CIS Microsoft 365 Foundations Benchmark
1921

2022
The CIS Microsoft 365 Foundations Benchmark (v3.0.0) is a set of security assessments developed by the Center for Internet Security (CIS). It provides prescriptive guidance for establishing a secure baseline configuration for Microsoft 365. The benchmark includes configuration baselines and best practices for securely configuring a system. The benchmark is internationally recognized as a security standard for defending IT systems and data against cyber attacks. This initiative contains a subset of security assessments recommended by the CIS
2123

2224
## Cloud Security [Preview]
2325

24-
This initiative aims to reflects the status around cloud security coverage, ROI, health, configuration and performance. It consists of measurements across multiple domains and disciplines to provide security managers with a high-level view into how posture is enforced in cloud ops.
26+
This initiative aims to reflect the status around cloud security coverage, ROI, health, configuration, and performance. It consists of measurements across multiple domains and disciplines to provide security managers with a high-level view into how posture is enforced in cloud ops.
2527

2628
## Critical Asset Protection [Preview]
2729

2830
Critical asset protection refers to the strategies, processes, and technologies implemented to safeguard an organization's most valuable and important assets from various threats and risks. It involves identifying, prioritizing, and applying targeted security measures to ensure the resilience and integrity of these critical assets.
2931

3032
## Cryptographic Assessment
3133

32-
The Cryptographic Assessment initiative involves discovering and managing cryptographic assets inside your organization to ensure cryptographic risk management, post quantum safety and cryptographic agility. It addresses the complexity of cryptography dispersed throughout IT architectures, embedded into various components across your organization.
34+
The Cryptographic Assessment initiative involves discovering and managing cryptographic assets inside your organization to ensure cryptographic risk management, post quantum safety, and cryptographic agility. It addresses the complexity of cryptography dispersed throughout IT architectures, embedded into various components across your organization.
3335

3436
Endpoint Security
3537

36-
Monitor the coverage and configuration of physical and virtual workstations, servers and mobile phones.
38+
Monitor the coverage and configuration of physical and virtual workstations, servers, and mobile phones.
3739

3840
## Enterprise IoT Security
3941

40-
IoT devices are often connected to endpoints, to one another or to the internet, which means they are potential targets for cyberattacks. It's imperative for businesses to monitor the security of their IoT devices, including their spread, configuration, connectivity, exposure, and behavior. This initiative will provide overall visibility into the risk introduced by IoT devices in the enterprise and the resilience the organization has to mitigate it.
42+
IoT devices are often connected to endpoints, to one another or to the internet, which means they're potential targets for cyberattacks. It's imperative for businesses to monitor the security of their IoT devices, including their spread, configuration, connectivity, exposure, and behavior. This initiative provides overall visibility into the risk introduced by IoT devices in the enterprise and the resilience the organization has to mitigate it.
4143

4244
## External Attack Surface Protection
4345

@@ -57,19 +59,16 @@ Ransomware attacks have become increasingly common in recent years, and they can
5759

5860
## SaaS Security
5961

60-
This initiative focuses on displaying the current state of SaaS (software as a service) security coverage, health, configuration and performance. It consists of metrics across multiple domains and disciplines to provide security managers with a high-level view into their SaaS security posture management. To make the most of this Initiative, activate application connectors for the following: Microsoft 365, Salesforce, ServiceNow, GitHub, Okta, Citrix ShareFile, DocuSign, Dropbox, Google Workspace, NetDocuments, Workplace (preview), Zendesk, Zoom (preview), Atlassian. Learn more on connectors enablement: https://aka.ms/AAs4lmg
62+
This initiative focuses on displaying the current state of SaaS (software as a service) security coverage, health, configuration, and performance. It consists of metrics across multiple domains and disciplines to provide security managers with a high-level view into their SaaS security posture management. To make the most of this Initiative, activate application connectors for the following: Microsoft 365, Salesforce, ServiceNow, GitHub, Okta, Citrix ShareFile, DocuSign, Dropbox, Google Workspace, NetDocuments, Workplace (preview), Zendesk, Zoom (preview), Atlassian. Learn more on connectors enablement: https://aka.ms/AAs4lmg
6163

6264
## Vulnerability Assessment
6365

64-
This initiative serves as a central hub for security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track and delegate vulnerabilities with in the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement. This collaborative environment ensures a holistic approach to vulnerability management, empowering stakeholders to proactively strengthen their security defenses, reduce the attack surface, and enhance overall resilience against evolving cyber threats.
66+
This initiative serves as a central hub for security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track, and delegate vulnerabilities with in the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement. This collaborative environment ensures a holistic approach to vulnerability management, empowering stakeholders to proactively strengthen their security defenses, reduce the attack surface, and enhance overall resilience against evolving cyber threats.
6567

6668
## Zero Trust (Foundational)
6769

6870
Zero Trust is a security strategy that follows three principles, verify explicitly, use least privilege access, and assume breach. This initiative follows Microsoft's Zero Trust adoption framework to help you identify next steps in your Zero Trust strategy. You can learn more about the Zero Trust adoption framework here.
6971

7072
## Next steps
7173

72-
- [Improve security insights with exposure insights overview](exposure-insights-overview.md)
73-
- [Review security metrics](security-metrics.md)
74-
- [Explore security events](security-events.md)
75-
- [Review security recommendations](security-recommendations.md)
74+
- [Investigate security initiative metrics](security-metrics.md)

0 commit comments

Comments
 (0)