Skip to content

Commit e1902c3

Browse files
Merge pull request #2067 from ShawnJackson/defender-sspm
[AQ] edit pass: Microsoft Defender for Cloud Apps SSPM articles
2 parents e59e7b5 + d425671 commit e1902c3

File tree

2 files changed

+42
-57
lines changed

2 files changed

+42
-57
lines changed

CloudAppSecurityDocs/posture-overview.md

Lines changed: 25 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,75 +1,69 @@
11
---
2-
title: SaaS security posture management (SSPM) - overview
3-
description: Learn what is SaaS security posture management (SSPM) in Microsoft Defender for cloud apps
2+
title: SaaS Security Posture Management (SSPM) - Overview
3+
description: Learn about SaaS security posture management (SSPM) in Microsoft Defender for Cloud Apps.
44
ms.topic: how-to
55
ms.date: 11/17/2024
66
---
77

8-
# SaaS security posture management (SSPM) - overview
8+
# SaaS security posture management (SSPM) overview
99

10-
> [!NOTE]
11-
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD. For these environments, it is recommended to consume SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation).
10+
One of the pillars of Microsoft Defender for Cloud Apps is SaaS security posture management (SSPM). SSPM offers detailed visibility into the security state of your software as a service (SaaS) applications. It also provides actionable guidance to help you strengthen your security posture efficiently.
1211

13-
One of Microsoft Defender for Cloud Apps’ core pillars is SaaS Security Posture Management (SSPM), which offers detailed visibility into the security state of your SaaS applications and provides actionable guidance to help you strengthen your security posture efficiently. Your SaaS application environments might be configured with a risky posture, and Defender for Cloud Apps provides risk-based security configuration assessments to help you identify and mitigate potential risks. These recommendations are shown in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) once you have a connector to an application. For example:
12+
Defender for Cloud Apps provides security configuration assessments to help you identify and mitigate potential risks in your SaaS application environments. These recommendations appear in [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) after you have a connector to an application.
1413

15-
![Screenshot of the SalesForce recommendations in Secure Score.](media/security-saas-sspm-in-secure-score-salesforce-filter.png)
14+
However, Microsoft Security Exposure Management data and capabilities are currently unavailable in US government clouds: GCC, GCC High, and DoD. For these environments, we recommend consuming SaaS security posture recommendations via [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation). The following example shows Secure Score recommendations for a Salesforce app.
1615

17-
![Screenshot of the SaaS security initiative.](media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png)
16+
:::image type="content" source="media/security-saas-sspm-in-secure-score-salesforce-filter.png" alt-text="Screenshot of Salesforce recommendations in Secure Score." lightbox="media/security-saas-sspm-in-secure-score-salesforce-filter.png" :::
1817

1918
## Prerequisites
2019

2120
- Your organization must have Microsoft Defender for Cloud Apps licenses.
22-
- Your app must be connected to Defender for Cloud Apps. For more information, see:
23-
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
24-
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
21+
- Your app must be connected to Defender for Cloud Apps. For information about connecting and about which of the app connectors provide security recommendations, see [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md).
2522

2623
## Turn on SaaS security recommendations
2724

28-
Follow these steps to ensure that your application connector is set to show data in Microsoft Security Exposure Management.
25+
To ensure that your application connector is set to show data in Microsoft Security Exposure Management, follow these steps:
2926

3027
1. In Microsoft Defender XDR, select **Settings** > **Cloud Apps** > **Connected apps** > **App Connectors**.
3128

3229
1. Use the filter to locate the application where you want to turn on security recommendations.
3330

34-
1. Open the instance drawer and note whether 'Security recommendations' are turned on or off. For example, the following example shows that 'Security recommendations' are turned on for **Okta Contoso EU** instance:
31+
1. Open the instance drawer and note whether **Security recommendations** is turned on or off. The following example shows that **Security recommendations** is turned on.
3532

36-
![Screenshot of an instance where Secure Score recommendations are turned on.](media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png)
33+
:::image type="content" source="media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png" alt-text="Screenshot of an app instance where Secure Score recommendations are turned on." lightbox="media/posture-overview/screenshot-of-an-instance-where-secure-score-recommendations-are-turned-on.png":::
3734

38-
If the instance is currently set to **Off**, select the **...** options menu and then select **Turn on 'Security recommendations'**. For example:
35+
If the instance is currently set to **Off**, select the ellipsis that denotes the options menu (**...**), and then select **Turn on Security recommendations**.
3936

40-
![Screenshot of the Turn on Secure Score or 'Exposure management' recommendations option.](media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png)
37+
:::image type="content" source="media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png" alt-text="Screenshot that shows the command for turning on security recommendations." lightbox="media/posture-overview/screenshot-of-the-turn-on-secure-score-or-exposure-management-recommendations-option.png":::
4138

4239
> [!NOTE]
43-
> If you have multiple instances of the same app, you can send security recommendations for each instance separately.
44-
> Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations.
40+
> If you have multiple instances of the same app, you can send security recommendations for each instance separately. Security recommendations for the selected instance are added to Microsoft Security Exposure Management in addition to the current recommendations.
4541
46-
Security recommendations are shown automatically in [Microsoft Security Exposure Management](/microsoft-365/security/defender/microsoft-secure-score). Recommendations are based on Microsoft benchmarks, and might take up to 24 hours to update.
42+
Security recommendations appear automatically in Microsoft Security Exposure Management. Recommendations are based on Microsoft benchmarks, and they might take up to 24 hours to update.
4743

48-
In Microsoft Secure Score, filter the **Recommended actions** tab by product to view any recommended actions. If you have multiple instances of an app, you can select to filter recommendations from specific instances only. For example:
44+
In [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score), filter the **Recommended actions** tab by product to view any recommended actions. If you have multiple instances of an app, you can choose to filter recommendations from specific instances only. The following example shows options for filtering specific instances.
4945

50-
:::image type="content" source="media/secure-score-filter.png" alt-text="Screenshot of a Secure Score filter showing multiple instances of an app.":::
46+
:::image type="content" source="media/secure-score-filter.png" alt-text="Screenshot of a Secure Score filter that shows multiple instances of an app." lightbox="media/secure-score-filter.png":::
5147

52-
Select a recommendation and then select the **Implementation** tab in the details pane for a step-by-step remediation guide.
48+
Select a recommendation, and then select the **Implementation** tab on the details pane for a step-by-step remediation guide.
5349

5450
For more information, see [Assess your security posture with Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score-improvement-actions).
5551

56-
## How to manage your organization SaaS security posture
52+
## Manage your organization's SaaS security posture
5753

58-
> [!IMPORTANT]
59-
> Since Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD, it is recommended for these environments to consume SaaS security posture recommendations in [Microsoft Secure Score](/microsoft-365/security/defender-endpoint/tvm-security-recommendation) as explained above.
54+
To effectively manage your organization's SaaS security posture, we recommend beginning with the [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative). This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, so that you can prioritize and address the most impactful recommendations for SaaS environments. The following example shows security metrics from the SaaS Security Initiative.
6055

61-
To effectively manage your organization's SaaS security posture, we recommend beginning with the SaaS Security initiative. This initiative consolidates best practices and measurable metrics specifically for securing SaaS applications, allowing you to prioritize and address the most impactful recommendations for SaaS environments. For more information, see [SaaS Security Initiative](/defender-cloud-apps/saas-security-initiative).
56+
:::image type="content" source="media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png" alt-text="Screenshot of metrics from the SaaS Security Initiative." lightbox="media/posture-overview/screenshot-of-the-saas-security-initiative-home-page.png":::
6257

63-
In addition you can find a variety of SSPM recommendations under different initiatives. Key initiatives include:
58+
You can also find a variety of SSPM recommendations under other initiatives:
6459

65-
- SaaS Security
6660
- CIS Microsoft 365 Foundations Benchmark
6761
- Ransomware Protection
6862
- Identity Security
69-
- Business Email Compromise - Financial fraud
70-
- Zero Trust (Foundational)
63+
- Business Email Compromise (financial fraud)
64+
- Zero Trust (foundational)
7165

72-
## Next steps
66+
## Next step
7367

7468
> [!div class="nextstepaction"]
7569
> [Control cloud apps with policies](control-cloud-apps-with-policies.md)
Lines changed: 17 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +1,37 @@
11
---
2-
title: SaaS security initiative
3-
description: Learn how to use the "SaaS security initiative" in Microsoft XDR
2+
title: SaaS Security Initiative
3+
description: Learn how to use the SaaS Security Initiative in Microsoft Defender XDR.
44
ms.topic: how-to
55
ms.date: 10/31/2024
66
---
7-
# SaaS Security Initiative
87

9-
> [!NOTE]
10-
> Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High and DoD.
8+
# SaaS Security Initiative
119

12-
The SaaS Security Initiative provides a centralized place for SaaS security best practices, enabling organizations to manage and prioritize security recommendations effectively. By focusing on the most impactful metrics, organizations can enhance their SaaS security posture efficiently.
10+
The SaaS Security Initiative provides a centralized place for software as a service (SaaS) security best practices, so that organizations can manage and prioritize security recommendations effectively. By focusing on the most impactful metrics, organizations can enhance their SaaS security posture.
1311

14-
![Screenshot of the SaaS security initiative home page.](media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png)
15-
16-
17-
## What is the SaaS Security Initiative?
18-
19-
The SaaS Security Initiative serves as the main hub for SaaS Security Posture Management (SSPM), consolidating best-practice recommendations into 12 measurable metrics. These metrics facilitate the management and prioritization of a large number of security recommendations.
12+
The SaaS Security Initiative serves as the main hub for SaaS security posture management (SSPM). It consolidates best-practice recommendations into 12 measurable metrics. These metrics facilitate the management and prioritization of a large number of security recommendations.
2013

2114
## Prerequisites
2215

2316
- Your organization must have Microsoft Defender for Cloud Apps licenses.
24-
- The app which you wish to see security recommendations for, must be connected.
25-
- For more information, see:
26-
- [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md)
27-
- [Learn which of the apps connectors provides security recommendations ](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md#user-app-governance-and-security-configuration-visibility)
28-
29-
## Operational Guidelines
17+
- The app for which you want to view security recommendations must be connected to Defender for Cloud Apps. For information about connecting and about which of the app connectors provide security recommendations, see [Connect apps to get visibility and control with Microsoft Defender for Cloud Apps](enable-instant-visibility-protection-and-governance-actions-for-your-apps.md).
3018

31-
To initiate the process, navigate to the **Exposure Management** blade and select **Initiatives**. Click on the **SaaS Security** initiative and then select **Open Initiative Page**.
19+
## View SaaS Security Initiative recommendations
3220

33-
On this page, you'll find 12 measurable metrics that categorize hundreds of best practice recommendations.
21+
1. In Microsoft Defender XDR, go to **Exposure Management** and select **Initiatives**.
22+
1. Select the **SaaS Security** initiative, and then select **Open Initiative Page**.
3423

35-
It's recommended to prioritize metrics with the highest **Impact on Initiative Score**, which is a composite measure that considers both the **Weight** of each recommendation and the percentage of **Non-Compliant** recommendations. To effectively monitor progress, it's advisable to set a **target score** for your organization's security posture. This target will serve as a benchmark for improvement and help track advancements over time.
24+
The page that appears lists the 12 metrics that categorize hundreds of best-practice recommendations.
3625

37-
For instance, to gain visibility into all best practice recommendations pertaining to privileged access within SaaS applications, select the metric labeled **Missing Best Practices to Secure Privileged Access in SaaS Apps**.
26+
:::image type="content" source="media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png" alt-text="Screenshot of the SaaS Security Initiative home page." lightbox="media\saas-securty-initiative\screenshot-of-the-saas-security-initiative-home-page.png":::
3827

39-
Once selected, you can click on any of the **Non-Compliant** recommendations to access the associated remediation steps.
28+
We recommend that you prioritize metrics with the highest **Impact on Initiative Score** level. This composite measure considers both the **Weight** value of each recommendation and the percentage of **Non-Compliant** recommendations.
4029

41-
## Additional Information
30+
To effectively monitor progress, set a **target score** value for your organization's security posture. This target will serve as a benchmark for improvement and help track advancements over time.
4231

43-
Each metric includes a list of associated app connectors, encouraging organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, navigate to the **Security Recommendations** tab and filter by the relevant application.
32+
For instance, to gain visibility into all best-practice recommendations that pertain to privileged access within SaaS applications, select the metric labeled **Missing Best Practices to Secure Privileged Access in SaaS Apps**. You can then select any of the **Non-Compliant** recommendations to access the associated remediation steps.
4433

45-
To learn more about Exposure Management initiatives, see [Review security initiatives](/security-exposure-management/initiatives).
34+
## Additional information
4635

36+
- Each metric includes a list of associated app connectors. The list encourages organizations to enable more connectors for enhanced visibility. If you're interested in recommendations for specific applications, go to the **Security recommendations** tab and filter by the relevant application.
37+
- To learn more about Microsoft Security Exposure Management initiatives, see [Review security initiatives](/security-exposure-management/initiatives).

0 commit comments

Comments
 (0)