Skip to content

Commit d1c278d

Browse files
committed
add links
1 parent aea659e commit d1c278d

File tree

2 files changed

+20
-2
lines changed

2 files changed

+20
-2
lines changed

exposure-management/initiatives-list.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Security initiatives in Microsoft Security Exposure Management
3-
description: List of security Initiatives in Microsoft Security Exposure Management.
3+
description: Catalog of security Initiatives in Microsoft Security Exposure Management.
44
ms.author: dlanger
55
author: dlanger
66
manager: rayne-wiselman
77
ms.topic: reference
88
ms.service: exposure-management
9-
ms.date: 11/06/2024
9+
ms.date: 11/12/2024
1010
---
1111

1212
# Security Initiatives
@@ -25,10 +25,14 @@ The CIS Microsoft 365 Foundations Benchmark (v3.0.0) is a set of security assess
2525

2626
This initiative aims to reflect the status around cloud security coverage, ROI, health, configuration, and performance. It consists of measurements across multiple domains and disciplines to provide security managers with a high-level view into how posture is enforced in cloud ops.
2727

28+
[Learn more here.](https://aka.ms/xspm/MDC/docs)
29+
2830
## Critical Asset Protection [Preview]
2931

3032
Critical asset protection refers to the strategies, processes, and technologies implemented to safeguard an organization's most valuable and important assets from various threats and risks. It involves identifying, prioritizing, and applying targeted security measures to ensure the resilience and integrity of these critical assets.
3133

34+
[Learn more here.](https://aka.ms/xspm/cspm)
35+
3236
## Endpoint Security
3337

3438
Monitor the coverage and configuration of physical and virtual workstations, servers, and mobile phones.
@@ -37,14 +41,24 @@ Monitor the coverage and configuration of physical and virtual workstations, ser
3741

3842
IoT devices are often connected to endpoints, to one another or to the internet, which means they're potential targets for cyber attacks. It's imperative for businesses to monitor the security of their IoT devices, including their spread, configuration, connectivity, exposure, and behavior. This initiative provides overall visibility into the risk introduced by IoT devices in the enterprise and the resilience the organization has to mitigate it.
3943

44+
[Learn more here.](https://aka.ms/xspm/MDIoT/docs)
45+
4046
## External Attack Surface Protection
4147

4248
Microsoft Defender External Attack Surface Management (Defender EASM) continuously discovers and maps your digital attack surface to provide an external view of your online infrastructure. This visibility enables security and IT teams to identify unknowns, prioritize risk, eliminate threats, and extend vulnerability and exposure control beyond the firewall. Attack Surface Insights are generated by leveraging vulnerability and infrastructure data to showcase the key areas of concern for your organization. This initiative requires no license and is complementary.
4349

50+
[Learn more here.](https://aka.ms/xspm/EasmLearnMore)
51+
4452
## Identity Security
4553

4654
Identity security is the practice of protecting the digital identities of individuals and organizations. This includes protecting passwords, usernames, and other credentials that can be used to access sensitive data or systems. Identity security is essential for protecting against a wide range of cyber threats, including phishing, malware, and data breaches. By taking proactive steps, organizations can help to protect their digital identities and sensitive data from cyber threats.
4755

56+
## OT Security
57+
58+
Monitors and safeguards Operational Technology (OT) environments within the organization by employing network layer monitoring. This initiative identifies devices across physical sites, pinpoints their risks, and ensures comprehensive protection and security management of OT systems.
59+
60+
[Learn more here.](https://aka.ms/MDIoT_get-started_doc)
61+
4862
## Ransomware Protection
4963

5064
Ransomware attacks have become increasingly common in recent years, and they can have a devastating impact on organizations. Organizations can and should be proactive in managing a good security posture against ransomware. One of the first steps is to ensure that recommended controls are in place and are utilized and configured properly, hence reducing the risk of a successful ransomware attack making way into corporate networks and assets.
@@ -53,6 +67,8 @@ Ransomware attacks have become increasingly common in recent years, and they can
5367

5468
This initiative focuses on displaying the current state of SaaS (software as a service) security coverage, health, configuration, and performance. It consists of metrics across multiple domains and disciplines to provide security managers with a high-level view into their SaaS security posture management. To make the most of this Initiative, activate application connectors for the following: Microsoft 365, Salesforce, ServiceNow, GitHub, Okta, Citrix ShareFile, DocuSign, Dropbox, Google Workspace, NetDocuments, Workplace (preview), Zendesk, Zoom (preview), Atlassian. Learn more on connectors enablement: [https://aka.ms/AAs4lmg](https://aka.ms/AAs4lmg)
5569

70+
[Learn more here.](/defender-cloud-apps/saas-security-initiative)
71+
5672
## Vulnerability Assessment
5773

5874
This initiative serves as a central hub for security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track, and delegate vulnerabilities with in the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement. This collaborative environment ensures a holistic approach to vulnerability management, empowering stakeholders to proactively strengthen their security defenses, reduce the attack surface, and enhance overall resilience against evolving cyber threats.
@@ -61,6 +77,8 @@ This initiative serves as a central hub for security managers to continuously as
6177

6278
Zero Trust is a security strategy that follows three principles, verify explicitly, use least privilege access, and assume breach. This initiative follows Microsoft's Zero Trust adoption framework to help you identify next steps in your Zero Trust strategy. You can learn more about the Zero Trust adoption framework here.
6379

80+
[Learn more here.](https://aka.ms/xspm/zeroTrustLearnMore)
81+
6482
## Next steps
6583

6684
- [Investigate security initiative metrics](security-metrics.md)
671 KB
Loading

0 commit comments

Comments
 (0)