Skip to content

Commit d6c7f0f

Browse files
authored
Update posture-overview.md
Itai - improved the overview page to reflect Secure Score as well.
1 parent a9c5e9e commit d6c7f0f

File tree

1 file changed

+38
-26
lines changed

1 file changed

+38
-26
lines changed

CloudAppSecurityDocs/posture-overview.md

Lines changed: 38 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,20 @@
11
---
2-
title: SaaS security posture management(SSPM) - overview
3-
description: Learn what is SaaS security posture management(SSPM) in Microsoft Defender for cloud apps
2+
title: SaaS security posture management (SSPM) - overview
3+
description: Learn what is SaaS security posture management (SSPM) in Microsoft Defender for cloud apps
44
ms.topic: how-to
55
ms.date: 10/31/2024
66
---
77

88
# SaaS security posture management (SSPM) - overview
99

10-
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments may be configured in a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown via [Microsoft Security Exposure Management](https://learn.microsoft.com/security-exposure-management/microsoft-security-exposure-management) in the SaaS security initiative once you have a connector to an application. For example:
11-
12-
13-
![Screenshot of the SaaS security initiative.](<media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png>)
14-
15-
## How to manage your organization SaaS security posture
16-
To effectively manage your organization’s SaaS security posture, we recommend beginning with the SaaS Security initiative in Microsoft Defender XDR. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
17-
18-
- [SaaS Security Initiative](https://learn.microsoft.com/defender-cloud-apps/saas-security-initiative)
10+
> [!NOTE]
11+
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation)
1912

20-
In addition you can find a variety of SSPM recommendations under different initiatives. Key initiatives include:
13+
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments may be configured in a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown via [Microsoft Security Exposure Management](https://learn.microsoft.com/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
2114

22-
- SaaS Security
23-
- CIS Microsoft 365 Foundations Benchmark
24-
- Ransomware Protection
25-
- Identity Security
26-
- Business Email Compromise - Financial fraud
27-
- Zero Trust (Foundational)
15+
![Screenshot of the SalesForce recommendations in Secure Score.](media/security-saas-sspm-in-secure-score-salesforce-filter.png)
2816

17+
![Screenshot of the SaaS security initiative.](<media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png>)
2918

3019
## Prerequisites
3120

@@ -34,19 +23,19 @@ In addition you can find a variety of SSPM recommendations under different initi
3423

3524
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
3625
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
26+
27+
## Turn on SaaS security recommendations
3728

38-
## Turn on SSPM recommendations
39-
40-
This procedure describes how to ensure that your connector is set to show data in Microsoft Security Exposure Management for SaaS app security posture management.
29+
This procedure describes how to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
4130

4231
1. In Microsoft Defender XDR, select **Settings** > **Cloud Apps** > **Connected apps** > **App Connectors**.
4332

44-
1. Use the filter to locate the app where you want to turn on SSPM recommendations.
33+
1. Use the filter to locate the application where you want to turn on security recommendations.
4534

46-
1. Open the instance drawer and note whether 'Secure score' or 'Exposure management' recommendations are turned on or off. For example, the following screenshot shows that 'Secure score' or 'Exposure management' recommendations are turned on for **Okta Contoso EU** instance:
35+
1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following screenshot shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance:
4736
![Screenshot of an instance where Secure Score recommendations are turned on.](<media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png>)
4837

49-
If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Secure Score' or 'Exposure management' recommendations**. For example:
38+
If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Security recommendations'**. For example:
5039
![Screenshot of the Turn on Secure Score or 'Exposure management' recommendations option.](<media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png>)
5140

5241
> [!NOTE]
@@ -55,9 +44,32 @@ Security recommendations for the selected instance are added to Microsoft Securi
5544

5645
Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and may take up to 24 hours to update.
5746

58-
In SaaS security initiative, in the **Security recommendations** filter by product to view any recommended actions. If you have multiple instances of an app, you can select to filter recommendations from specific instances only. For example:
59-
![Screenshot of a SaaS initiative filter showing multiple instances of an app.](<media\posture-overview\screenshot-of-a-saas-initiative-filter-showing-multiple-instances-of-an-app.png>)
47+
In Microsoft Secure Score, filter the **Recommended actions** tab by product to view any recommended actions. If you have multiple instances of an app, you can select to filter recommendations from specific instances only. For example:
48+
49+
:::image type="content" source="media/secure-score-filter.png" alt-text="Screenshot of a Secure Score filter showing multiple instances of an app.":::
6050

51+
Select a recommendation and then select the **Implementation** tab in the details pane for a step-by-step remediation guide.
52+
53+
For more information, see [Assess your security posture with Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score-improvement-actions).
54+
55+
56+
## How to manage your organization SaaS security posture
57+
58+
> [!IMPORTANT]
59+
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above
60+
61+
To effectively manage your organization’s SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see:
62+
63+
- [SaaS Security Initiative](https://learn.microsoft.com/defender-cloud-apps/saas-security-initiative)
64+
65+
In addition you can find a variety of SSPM recommendations under different initiatives. Key initiatives include:
66+
67+
- SaaS Security
68+
- CIS Microsoft 365 Foundations Benchmark
69+
- Ransomware Protection
70+
- Identity Security
71+
- Business Email Compromise - Financial fraud
72+
- Zero Trust (Foundational)
6173

6274

6375
## Next steps

0 commit comments

Comments
 (0)