How to Secure Access Control in Office 365 Environments

26
Office 365 Security - How to Secure Access Control in Office 365 Environments How to mitigate risks in a complex Hybrid Directory environment

Transcript of How to Secure Access Control in Office 365 Environments

Page 1: How to Secure Access Control in Office 365 Environments

Office 365 Security - How to Secure Access Control in Office 365 EnvironmentsHow to mitigate risks in a complex Hybrid Directory environment

Page 2: How to Secure Access Control in Office 365 Environments

Confidential2

oMarket Trendso Infrastructure security challengesoThe solution

Agenda

Page 3: How to Secure Access Control in Office 365 Environments

Market Trends

Page 4: How to Secure Access Control in Office 365 Environments

Organizations have used AD to authenticate since 2001

2003

2013-TODAYOrganizations begin taking the cloud seriously

2007Collaboration heats up

2009Server 2008R2 -new forest level

2001AD replaces NT

2008Add new resource forest for security

2010Upgrades, M&As,BYOD, security risks

TODAYFuture-ready Windows Infrastructure

2004Email is now business critical

Page 5: How to Secure Access Control in Office 365 Environments

Office 365 adoption is growing rapidly

22 million consumers ( 55% YOY growth from 12.4 M) and 70 million commercial customers who have active Office 365 subscriptions.

In the commercial segment, Office 365 had a 57 percent month-over-month jump in the latest 2016 quarter

Year over year growth about 1 million subscribers a month adopting O365

Page 6: How to Secure Access Control in Office 365 Environments

Audience Poll – Office 365 Adoption

Page 7: How to Secure Access Control in Office 365 Environments

Confidential7

• Reduce infrastructure, licensing and maintenance costs eliminating on premise infrastructure and finding storage efficiencies

• Empower workforce to operate from anywhere from any device

• Increase scalability and business continuity

Why do organizations move to the cloud?

Page 8: How to Secure Access Control in Office 365 Environments

Confidential8

Why do organizations move to the cloud?

• Office 365 *requires* an Azure AD instance

• Azure AD provides the Directory Service for Office 365 applications

• Azure AD integrates with on-prem AD creating a HYBRID Directory environment

Page 9: How to Secure Access Control in Office 365 Environments

Hybrid Environment: Azure AD Connect Synchronization Workflow

9

Page 10: How to Secure Access Control in Office 365 Environments

Confidential10

Summary: How Hybrid Directory was ‘created’

90% of Companies use AD-On prem

O365 Adoption Growing at %70 YoY

AAD has over 10M tenants

75% of Orgs. > 500 users synch on-prem

AD AAD

Page 11: How to Secure Access Control in Office 365 Environments

How important is protecting on-prem AD resources?

75% of enterprises with more than 500 employees sync their on prem. AD accounts to AzureAD/O365 (AD on prem. is authoritative)

Page 12: How to Secure Access Control in Office 365 Environments

Hybrid Directory Security Challenges

Page 13: How to Secure Access Control in Office 365 Environments

What is the surface attack area? AD On prem

Active AD licenses

500Million

Companies using AD to authenticate

90%

95 million of those accounts are under attack every single day (Microsoft )

Daily Authentic-

ations

10 Billion

Accounts under

attack each day

95 Million

Page 14: How to Secure Access Control in Office 365 Environments

What is the surface attack area? Azure AD

Number of Azure AD accounts

Number of Azure AD tenants

Microsoft’s user identity management systems, process over 13 billion login attempts, over 10 million (per day) of these logins are cyber-attacks

Dailylogons

MS Cloud daily

Cyberattacks

10 Million

700 Million

1.3 Billion

10 Million

Page 15: How to Secure Access Control in Office 365 Environments

Business challenges

• Data Exfiltration• Insider threats• Compliance Failures• Prolonged Operational Downtime • Revenue loss due to downtime,

loss of productivity and potentially fines

• No Permission Baselining• No automatic remediation• Lack of Detailed auditing• Labor-intense/error-prone• Lack of granular delegation• Disjointed administration• Manual DR Processes

Technical challenges

Dangers and pitfalls if you don’t secure AD on-prem

Hybrid Directory Challenges faced by businesses

Page 16: How to Secure Access Control in Office 365 Environments

What’s the solution?

Page 17: How to Secure Access Control in Office 365 Environments

Quest Software AD Security Lifecycle Methodology

Page 18: How to Secure Access Control in Office 365 Environments

Continually Assess

• Who has access to what sensitive data and how did they get that access?

• Who has elevated privileged permissions in AD, servers and SQL DBs?

• What systems are vulnerable to security threats?

Page 19: How to Secure Access Control in Office 365 Environments

Detect and Alert

• How will I know if any suspicious privileged account activities have occurred?

• Have any changes occurred that could be significant of an insider threat?

• How will I know, quickly, if an intrusion has happened?

• Could we be under brute-force attack right now?

Page 20: How to Secure Access Control in Office 365 Environments

Remediate and Mitigate

• Is access control allowing those whitelisted in and blacklisted out?

• Do my users have the lowest level of user rights possible to do their jobs?

• Are my sensitive resources protected?

• How much time will it take me to manually remediate unauthorized changes?

Page 21: How to Secure Access Control in Office 365 Environments

Investigate and Recover

• How can I be sure that ‘it’ doesn’t happen again?

• How can I test my business continuity plan without going off line?

• How long will it take us to recover from an AD security incident, manually?

• What is my AD RTO after a disaster?

• Can I secure access to my DC before next time?

Page 22: How to Secure Access Control in Office 365 Environments

Active Directory Security Suite componentsIT Security Search & Recovery Manager FE• Investigate AD security Incidents

• Continuously test your AD business continuity plan

• Recover from a security incident

• Improve your RTO after a disaster

• Secure access to AD DC data

Enterprise Reporter• Report on elevated permission in

AD

• visibility of open shares across servers

• Understand Which servers have vulnerable security settings

Active Roles & GPOAdmin• Enforce permission

blacklisting/whitelisting in AD

• Implement AD least-privilege access model

• Prevent unauthorized access to sensitive resources

• Auto-Remediate unauthorized activities

Change Auditor for AD• Detect suspicious privileged AD

activities

• Alert on potential AD insider threats

• Notify in real time of unauthorized intrusions against AD

• Detect and alert on brute-force attacks

Page 23: How to Secure Access Control in Office 365 Environments

Hybrid Directory Solution protects all the way around

Page 24: How to Secure Access Control in Office 365 Environments

Confidential24

• Organizations moving to Office 365 have real and significant security challenges around Active Directory

• On-premises AD remains the core of security even in a cloud/hybrid environment

• Quest offers the only end to end AD Security solution in the market

• Don’t let your on-premises AD be your Hybrid Achilles Heel!

Secure your Active Directory to Mitigate risk in O365

Page 26: How to Secure Access Control in Office 365 Environments

Thank You!

Watch the On Demand Webcast: http://bit.ly/2jRat2b