You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: unified-secops-platform/overview-posture.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,14 +14,14 @@ ms.collection:
14
14
- usx-security
15
15
ms.topic: overview
16
16
17
-
# customer intent: As a security professional, I want to understand how Microsoft's unified security operations platform, including tools like Microsoft Security Exposure Management (MSEM) and programs like Continuous Threat Exposure Management (CTEM), can enhance my organization's security posture by providing comprehensive visibility, prioritizing remediation efforts, and continuously monitoring for threats.
17
+
# customer intent: As a security professional, I want to understand how Microsoft's unified security operations platform, including tools like Microsoft Security Exposure Management (Exposure Management) and programs like Continuous Threat Exposure Management (CTEM), can enhance my organization's security posture by providing comprehensive visibility, prioritizing remediation efforts, and continuously monitoring for threats.
18
18
---
19
19
20
20
# What is security posture?
21
21
22
22
Security posture refers to an organization’s strength of protection over its networks, data, and systems (hardware and software). It measures how vulnerable your organization is to cyber-attacks or data breaches.
23
23
24
-
Microsoft Security Exposure Management (MSEM) is a proactive approach to managing and mitigating security risks. Use tools like MSEM to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities.
24
+
Microsoft Security Exposure Management (MSEM) is a proactive approach to managing and mitigating security risks. Use tools like Exposure Management to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities.
25
25
26
26
Proactively protecting your organization from potential data breaches is more effective than just doing damage control once a breach occurs.
27
27
Continuous Threat Exposure Management (CTEM) steps enhance this proactive approach by providing a structured method to identify, evaluate, and manage security risks. The CTEM steps, which include Scoping, Discovery, Prioritization, and Validation, can be integrated into your security posture management plan.
@@ -40,27 +40,27 @@ Maintain an up-to-date inventory of your assets, including on-premises resources
40
40
41
41
## Education and training
42
42
43
-
Security posture management is a complex topic that requires a wide range of technical knowledge. Continuously educate and train your operations and incident response staff on MSEM technologies and how your organization uses them. This ensures your team is prepared to handle security incidents effectively.
43
+
Security posture management is a complex topic that requires a wide range of technical knowledge. Continuously educate and train your operations and incident response staff on Exposure Management technologies and how your organization uses them. This ensures your team is prepared to handle security incidents effectively.
44
44
45
45
### Incident classification framework
46
46
47
47
Define what constitutes a "security incident" for your organization and develop a method for classifying incidents. A classification framework helps prioritize response and preparation activities, collect useful metrics, and improve the performance of your posture management program. Categories might include denial of service, malware, or unauthorized access, with impact-based severity levels such as critical, high, medium, or low.
48
48
49
49
## Assess your security posture
50
50
51
-
Use MSEM to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities. MSEM provides a 360-degree view of your security landscape, helping you understand and quantify your attack surface exposure.
51
+
Use Exposure Management to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities. Exposure Management provides a 360-degree view of your security landscape, helping you understand and quantify your attack surface exposure.
52
52
53
53
Learn more here, [What is Microsoft Security Exposure Management?](/security-exposure-management/microsoft-security-exposure-management)
54
54
55
55
## Identify attack entry points
56
56
57
-
MSEM helps you identify and map out potential attack paths, giving you visibility into critical choke points that need to be addressed. This proactive approach allows you to close down attack paths before they can be exploited.
57
+
Exposure Management helps you identify and map out potential attack paths, giving you visibility into critical choke points that need to be addressed. This proactive approach allows you to close down attack paths before they can be exploited.
58
58
59
59
Learn more here, [Overview of attack surface management](/security-exposure-management/cross-workload-attack-surfaces)
60
60
61
61
## Prioritize remediation efforts
62
62
63
-
Focus on the most critical vulnerabilities and attack paths first. MSEM provides recommendations for remediation actions to help you prioritize your efforts. This ensures that your resources are used effectively to mitigate the most significant risks.
63
+
Focus on the most critical vulnerabilities and attack paths first. Exposure Management provides recommendations for remediation actions to help you prioritize your efforts. This ensures that your resources are used effectively to mitigate the most significant risks.
64
64
65
65
Learn more here, [Review security recommendations](/security-exposure-management/security-recommendations)
66
66
@@ -70,20 +70,20 @@ Incorporate the **Validation** step to test and confirm that remediation efforts
70
70
71
71
## Key considerations for users
72
72
73
-
For users new to MSEM, it's important to understand the following benefits:
73
+
For users new to Exposure Management, it's important to understand the following benefits:
74
74
75
-
-**Comprehensive view**: MSEM provides a 360-degree view of your organization's security posture, helping you understand the overall security landscape.
75
+
-**Comprehensive view**: Exposure Management provides a 360-degree view of your organization's security posture, helping you understand the overall security landscape.
76
76
-**Prioritization**: Focus on the most critical vulnerabilities and attack paths first to maximize the impact of your remediation efforts.
77
-
-**Continuous monitoring**: MSEM continuously monitors your threat exposure and provides updates on your security posture.
77
+
-**Continuous monitoring**: Exposure Management continuously monitors your threat exposure and provides updates on your security posture.
78
78
79
79
For users with an established posture program, consider the following advanced features:
80
80
81
-
-**Integration**: MSEM integrates with existing security tools and solutions, providing a unified view of your security posture.
82
-
-**Advanced metrics**: Utilize advanced security metrics and insights provided by MSEM to fine-tune your security strategies.
81
+
-**Integration**: Exposure Management integrates with existing security tools and solutions, providing a unified view of your security posture.
82
+
-**Advanced metrics**: Utilize advanced security metrics and insights provided by Exposure Management to fine-tune your security strategies.
83
83
-**Collaboration**: Work with different teams within your organization to ensure a coordinated approach to exposure management.
84
84
85
-
A great starting point for any user is to set a specific goal. For instance, you might choose to enhance Ransomware Protection initiative by 20%. Use MSEM metrics and recommendations to identify and mitigate vulnerabilities that could be exploited by ransomware attacks to achieve this improvement.
85
+
A great starting point for any user is to set a specific goal. For instance, you might choose to enhance Ransomware Protection initiative by 20%. Use Exposure Management metrics and recommendations to identify and mitigate vulnerabilities that could be exploited by ransomware attacks to achieve this improvement.
86
86
87
87
## Ensuring your security posture
88
88
89
-
Maintaining a robust security posture is essential for safeguarding your organization's networks, data, and systems against cyber threats. By using tools like Microsoft Security Exposure Management (MSEM), you can gain a comprehensive view of your security landscape, identify critical vulnerabilities, and prioritize remediation efforts effectively. Continuous monitoring and proactive measures are key to staying ahead of potential threats and ensuring that your security posture remains strong. Following the guidelines outlined here and fostering a culture of security awareness, your organization can better protect itself from cyber-attacks and data breaches, building trust with customers and stakeholders.
89
+
Maintaining a robust security posture is essential for safeguarding your organization's networks, data, and systems against cyber threats. By using tools like Microsoft Security Exposure Management (Exposure Management), you can gain a comprehensive view of your security landscape, identify critical vulnerabilities, and prioritize remediation efforts effectively. Continuous monitoring and proactive measures are key to staying ahead of potential threats and ensuring that your security posture remains strong. Following the guidelines outlined here and fostering a culture of security awareness, your organization can better protect itself from cyber-attacks and data breaches, building trust with customers and stakeholders.
0 commit comments