Unemployable Graduate
Advertisement
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us
No Result
View All Result
Unemployable Graduate
No Result
View All Result
Home Public Policy

​​Microsoft releases CMMC guidance to raise the security and identity baseline for the Defense Industrial Base​​

May 18, 2023
in Public Policy
0
​​Microsoft releases CMMC guidance to raise the security and identity baseline for the Defense Industrial Base​​
190
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Related articles

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

April 10, 2024


Today we’re going to share with you some new guidance for configuring Azure Active Directory (Azure AD) to meet the Cybersecurity Maturity Model Certification (CMMC) Level 1 and Level 2 requirements.  

 

Identity continues to be the most common way bad actors get through cyber defenses. Therefore, identity controls are one of the most fundamental aspects of CMMC and this post is going to focus on Azure AD as a way of meeting CMMC’s identity requirements.  

 

Azure AD is Microsoft’s cloud-based identity and access management service that helps your employees sign in and access resources in your organization. Azure AD also provides a range of security features that can help you protect your identity data and meet the CMMC requirements related to identity and access management. 

 

We’re excited to share new our new guidance for configuring Azure AD to meet CMMC Level 1 and Level 2. This guidance is part of our larger series of identity focused compliance guidance we have created. Guidance may differ slightly in some areas based on the CMMC level of maturity required for your organization.  

 

CMMC Level 1 requires organizations to perform basic cyber hygiene practices to protect Federal Contract Information (FCI), which is any information provided by or generated for the DoD that is not intended for public release. 

 

In CMMC Level 1, there are 3 domains that have one or more practices related to identity:  

 

  1. Access Control (AC) 
  2. Identification and Authentication (IA) 
  3. System and Information integrity (SI) 

 

CMMC Level 2 is the intermediate level of cybersecurity that requires you to establish and document 72 practices across 13 domains. These practices are intended to protect Controlled Unclassified Information (CUI), which is any information that requires safeguarding or dissemination controls pursuant to federal law or regulation. The 13 domains that have one or more practices related to identity are: 

  

  1. Access Control  
  2. Audit & Accountability  
  3. Configuration Management  
  4. Identification & Authentication  
  5. Incident Response  
  6. Maintenance  
  7. Media Protection  
  8. Personnel Security  
  9. Physical Protection  
  10. Risk Assessment  
  11. Security Assessment 
  12. System and Communications Protection  
  13. System and Information Integrity  

 

Our CMMC identity guidance is designed to be consumed by both administrators and auditors, and to highlight how Azure AD features can be configured to meet CMMC requirements. A good starting point is our comprehensive Azure compliance documentation landing page that enables  a deeper dive into  multiple guidelines/regulations for configuring your Microsoft platform to demonstrate compliance. In combination with our Zero Trust Guidance Center, our comprehensive set of security guidance enables you to make the right decisions for your environment to both meet regulatory audit requirements while accelerating your Zero Trust journey. 

 

In addition to the Cybersecurity Maturity Model Certification (CMMC) Levels 1 and 2 required by the Defense Industrial Base to compete for US government contracts, our set of Azure AD compliance documentation includes the following: 

 

  • National Institute of Standards and Technology (NIST) authenticator assurance levels (AALs) 1, 2, and 3 
    • In this guidance we map authentication methods in Azure AD to NIST terminology and describe why you may want to use even more secure methods than required by standard 
  • Federal Risk and Authorization Management Program (FedRAMP) High Impact level 
    • Required by cloud service providers that provide service to government customers, this guidance describes the identity requirements for using Azure AD, including what is Microsoft’s responsibility, what is shared, what is the customers responsibility. 
  • Executive Order on Improving the Nation’s Cybersecurity and diving into Memorandum 22-09 identity requirements. 

 

We approach our guidance holistically, for each control and its applicability to identity. We developed prescriptive guidance to help you understand the Azure AD features and configurations needed to meet the requirement. We briefly describe what must be demonstrated and provide links to detailed guidance to make changes. For example, in the following guidance from our CMMC Level 1 Access Control guidance, we include CMMC AC.L1-3.1.1, provide the verbatim practice statement and objectives from CMMC, and then provide specific guidance and recommendations on using Azure AD to meet the requirements. Our guidance for each identity related CMMC practice is structured in this way.  

 

 

KBrewerMSFT_0-1684340516272.png

 

 

Additionally, in case you missed it, we want to highlight new features released that increase your security posture, specifically: 

 

  • Conditional Access – Authentication Strength: Use built-in strengths or a custom authentication strength in your conditional access policies to restrict external access to the most sensitive applications and data in your organization 
  • Passwordless authentication: Increase security and reduce user complexity by enabling phishing resistant multi-factor authentication with passwordless forms of authentication 
  • Cross-tenant access settings: Azure AD organizations can use External Identities cross-tenant access settings to manage how they collaborate with other Azure AD organizations and other Microsoft Azure clouds through B2B collaboration and B2B direct connect. These settings let you trust multi-factor authentication (MFA) and device claims (compliant claims and hybrid Azure AD joined claims) from other Azure AD organizations. 
  • Microsoft Cloud Settings for B2B collaboration: When Azure AD organizations in separate Microsoft Azure clouds need to collaborate, they can use Microsoft cloud settings to enable Azure AD B2B collaboration. 

 

We hope you find these features and guidance helpful in enabling you to comply with CMMC. We would love your feedback on this identity focused guidance as it relates to your need to comply with your compliance requirements. Please send your thoughts/feedback to IdentityCompliance@microsoft.com and let us know so that we can get better at helping you comply with guidelines/requirements with Azure AD. 





Source link

Share76Tweet48

Related Posts

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
0

By Leah McCabe Women’s movements often play a crucial role in highlighting the problem of violence against women and girls...

Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

Never Worry about Home Security Again: Discover SFR’s Revolutionary Solution

April 10, 2024
0

Leading telecommunications company SFR has partnered with Europ Assistance to introduce a brand new self-monitoring offer, “Maison Sécurisée”. This innovative...

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

April 10, 2024
0

By Shiva StellaApril 9, 2024 Today, Motion Picture Association Chairman and CEO Charles Rivkin delivered remarks confirming the organization is...

Discover VerifEye, the App That Sees Through Your Lies

Discover VerifEye, the App That Sees Through Your Lies

April 9, 2024
0

Free app VerifEye, developed by Converus, purports to detect dishonesty with an impressive 80% success rate, already making waves in...

AI Gone Rogue: Sparks of War from Fake News

AI Gone Rogue: Sparks of War from Fake News

April 9, 2024
0

April 5, 2024, marked a significant incident in the realm of digital misinformation when a fake news story about an...

Load More
  • Trending
  • Comments
  • Latest
Hilarious video explains principles of economics

Hilarious video explains principles of economics

August 21, 2022
HVAC Maintenance Checklist Templates: Download & Print for Free!

HVAC Maintenance Checklist Templates: Download & Print for Free!

May 18, 2023
Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

Public Knowledge Responds to MPA Chairman and CEO Charles Rivkin on Site-blocking

April 10, 2024
Policy & Politics Journal Blog

Policy & Politics Journal Blog

August 14, 2022
Policy & Politics Journal Blog

Policy & Politics Journal Blog

0
Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

Spotlighting interpretive approaches to public policy scholarship – Dr Tiffany Manuel on intersectionality – Policy & Politics Journal Blog

0
Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

Policy & Politics Highlights collection on policy and regulation August 2022 – October 2022 –free to access – Policy & Politics Journal Blog

0
Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

Special issue blog series on Transformational Change through Public Policy. – Policy & Politics Journal Blog

0
Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024
Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

Economic Surprises Could Fuel Fed Deja Vu for the 2010s – The Wall Street Journal

April 11, 2024
Building a Standout Employer Brand:Strategies for HR Teams

Building a Standout Employer Brand:Strategies for HR Teams

April 11, 2024

Recent News

Bernstein, The greatest 5 min. in music education

Bernstein, The greatest 5 min. in music education

April 11, 2024
The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

The policy impact of dissension within the Violence Against Women and Girls Movement – Policy & Politics Journal Blog

April 11, 2024

Categories

  • Economics
  • Education
  • Public Policy
  • Videos
  • Workforce

Newsletter

© 2022 All right reserved by unemployablegraduate.com

No Result
View All Result
  • Home
  • Education
  • Economics
  • Public Policy
  • Workforce
  • Videos
  • Privacy Policy
  • Contact Us

© 2022 All right reserved by unemployablegraduate.com

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT