|
1 | 1 | ---
|
2 |
| -title: SaaS security posture management (SSPM) - overview |
3 |
| -description: Learn what is SaaS security posture management (SSPM) in Microsoft Defender for cloud apps |
| 2 | +title: SaaS Security Posture Management (SSPM) - Overview |
| 3 | +description: Learn about SaaS security posture management (SSPM) in Microsoft Defender for Cloud Apps. |
4 | 4 | ms.topic: how-to
|
5 | 5 | ms.date: 11/17/2024
|
6 | 6 | ---
|
7 | 7 |
|
8 |
| -# SaaS security posture management (SSPM) - overview |
| 8 | +# SaaS security posture management (SSPM) overview |
9 | 9 |
|
10 |
| -> [!NOTE] |
11 |
| -> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation). |
| 10 | +One of the pillars of Microsoft Defender for Cloud Apps is SaaS security posture management (SSPM). SSPM offers detailed visibility into the security state of your software as a service (SaaS) applications. It also provides actionable guidance to help you strengthen your security posture efficiently. |
12 | 11 |
|
13 |
| -One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example: |
| 12 | +Defender for Cloud Apps provides security configuration assessments to help you identify and mitigate potential risks in your SaaS application environments. These recommendations appear in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) after you have a connector to an application. |
14 | 13 |
|
15 |
| - |
| 14 | +However, Microsoft Security Exposure Management data and capabilities are currently unavailable in US government clouds: GCC, GCC High, and DoD. For these environments, we recommend consuming SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation). The following example shows Secure Score recommendations for a Salesforce app. |
16 | 15 |
|
17 |
| - |
| 16 | +:::image type="content" source="media/security-saas-sspm-in-secure-score-salesforce-filter.png" alt-text="Screenshot of Salesforce recommendations in Secure Score." lightbox="media/security-saas-sspm-in-secure-score-salesforce-filter.png" ::: |
18 | 17 |
|
19 | 18 | ## Prerequisites
|
20 | 19 |
|
21 | 20 | - Your organization must have Microsoft Defender for Cloud Apps licenses.
|
22 |
| -- Your app must be connected to Defender for Cloud Apps. For more information, see: |
23 |
| - - [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md) |
24 |
| - - [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility) |
| 21 | +- Your app must be connected to Defender for Cloud Apps. For information about connecting and about which of the app connectors provide security recommendations, see [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md). |
25 | 22 |
|
26 | 23 | ## Turn on SaaS security recommendations
|
27 | 24 |
|
28 |
| -Follow these steps to ensure that your application connector is set to show data in Microsoft Security Exposure Management. |
| 25 | +To ensure that your application connector is set to show data in Microsoft Security Exposure Management, follow these steps: |
29 | 26 |
|
30 | 27 | 1. In Microsoft Defender XDR, select **Settings** > **Cloud Apps** > **Connected apps** > **App Connectors**.
|
31 | 28 |
|
32 | 29 | 1. Use the filter to locate the application where you want to turn on security recommendations.
|
33 | 30 |
|
34 |
| -1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following example shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance: |
| 31 | +1. Open the instance drawer and note whether **Security recommendations** is turned on or off. The following example shows that **Security recommendations** is turned on. |
35 | 32 |
|
36 |
| -  |
| 33 | + :::image type="content" source="media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png" alt-text="Screenshot of an app instance where Secure Score recommendations are turned on." lightbox="media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png"::: |
37 | 34 |
|
38 |
| - If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Security recommendations'**. For example: |
| 35 | + If the instance is currently set to **Off**, select the ellipsis that denotes the options menu (**...**), and then select **Turn on Security recommendations**. |
39 | 36 |
|
40 |
| -  |
| 37 | + :::image type="content" source="media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png" alt-text="Screenshot that shows the command for turning on security recommendations." lightbox="media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png"::: |
41 | 38 |
|
42 | 39 | > [!NOTE]
|
43 |
| - > If you have multiple instances of the same app, you can send security recommendations for each instance separately. |
44 |
| - > Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations. |
| 40 | + > If you have multiple instances of the same app, you can send security recommendations for each instance separately. Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations. |
45 | 41 |
|
46 |
| -Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and might take up to 24 hours to update. |
| 42 | +Security recommendations appear automatically in Microsoft Security Exposure Management. Recommendations are based on Microsoft benchmarks, and they might take up to 24 hours to update. |
47 | 43 |
|
48 |
| -In Microsoft Secure Score, filter the **Recommended actions** tab by product to view any recommended actions. If you have multiple instances of an app, you can select to filter recommendations from specific instances only. For example: |
| 44 | +In [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score), filter the **Recommended actions** tab by product to view any recommended actions. If you have multiple instances of an app, you can choose to filter recommendations from specific instances only. The following example shows options for filtering specific instances. |
49 | 45 |
|
50 |
| -:::image type="content" source="media/secure-score-filter.png" alt-text="Screenshot of a Secure Score filter showing multiple instances of an app."::: |
| 46 | +:::image type="content" source="media/secure-score-filter.png" alt-text="Screenshot of a Secure Score filter that shows multiple instances of an app." lightbox="media/secure-score-filter.png"::: |
51 | 47 |
|
52 |
| -Select a recommendation and then select the **Implementation** tab in the details pane for a step-by-step remediation guide. |
| 48 | +Select a recommendation, and then select the **Implementation** tab on the details pane for a step-by-step remediation guide. |
53 | 49 |
|
54 | 50 | For more information, see [Assess your security posture with Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score-improvement-actions).
|
55 | 51 |
|
56 |
| -## How to manage your organization SaaS security posture |
| 52 | +## Manage your organization's SaaS security posture |
57 | 53 |
|
58 |
| -> [!IMPORTANT] |
59 |
| -> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations in [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above. |
| 54 | +To effectively manage your organization's SaaS security posture, we recommend beginning with the [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative). This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, so that you can prioritize and address the most impactful recommendations for SaaS environments. The following example shows security metrics from the SaaS Security Initiative. |
60 | 55 |
|
61 |
| -To effectively manage your organization's SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative). |
| 56 | +:::image type="content" source="media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png" alt-text="Screenshot of metrics from the SaaS Security Initiative." lightbox="media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png"::: |
62 | 57 |
|
63 |
| -In addition you can find a variety of SSPM recommendations under different initiatives. Key initiatives include: |
| 58 | +You can also find a variety of SSPM recommendations under other initiatives: |
64 | 59 |
|
65 |
| -- SaaS Security |
66 | 60 | - CIS Microsoft 365 Foundations Benchmark
|
67 | 61 | - Ransomware Protection
|
68 | 62 | - Identity Security
|
69 |
| -- Business Email Compromise - Financial fraud |
70 |
| -- Zero Trust (Foundational) |
| 63 | +- Business Email Compromise (financial fraud) |
| 64 | +- Zero Trust (foundational) |
71 | 65 |
|
72 |
| -## Next steps |
| 66 | +## Next step |
73 | 67 |
|
74 | 68 | > [!div class="nextstepaction"]
|
75 | 69 | > [Control cloud apps with policies](control-cloud-apps-with-policies.md)
|
|
0 commit comments