Securing and Monitoring Access to Office 365



Similar documents
Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

Imperva Skyfence Secures Office 365 Access for Mobile Employees at Metro Bank

The Cloud App Visibility Blindspot

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES

ForeScout MDM Enterprise

The ForeScout Difference

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

How to Secure Your SharePoint Deployment

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Copyright 2013, 3CX Ltd.

Google Identity Services for work

Mobile Device Management Version 8. Last updated:

Secure any data, anywhere. The Vera security architecture

What is OneDrive for Business?

End-to-End Application Security from the Cloud

Ensuring the security of your mobile business intelligence

Microsoft Office 365 from Vodafone. Administrator s Guide for Midsize Businesses and Enterprises

10 Building Blocks for Securing File Data

The Netskope Active Platform

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Symantec Mobile Management 7.1

Executive s Guide to Cloud Access Security Brokers

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

The problem with privileged users: What you don t know can hurt you

Privilege Gone Wild: The State of Privileged Account Management in 2015

BIG SHIFT TO CLOUD-BASED SECURITY

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Securing SharePoint 101. Rob Rachwald Imperva

OVERVIEW. Enterprise Security Solutions

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

activecho Frequently Asked Questions

Media Shuttle s Defense-in- Depth Security Strategy

Privilege Gone Wild: The State of Privileged Account Management in 2015

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Speeding Office 365 Implementation Using Identity-as-a-Service

ForeScout CounterACT. Continuous Monitoring and Mitigation

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

ALERT LOGIC FOR HIPAA COMPLIANCE

Five Best Practices for Secure Enterprise Content Mobility

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Note: Support: Never use your TruMobi application for personal use.

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Web Protection for Your Business, Customers and Data

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Advanced Configuration Steps

IBM United States Software Announcement , dated February 3, 2015

PCI Compliance for Cloud Applications

Getting Started Guide: Getting the most out of your Windows Intune cloud

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Marble & MobileIron Mobile App Risk Mitigation

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

Assessment & Monitoring

AVeS Cloud Security powered by SYMANTEC TM

Office 365 from iomart

STRONGER AUTHENTICATION for CA SiteMinder

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Symantec Mobile Management 7.1

Symantec Mobile Management 7.2

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

APERTURE. Safely enable your SaaS applications.

Egnyte Cloud File Server. White Paper

overview Enterprise Security Solutions

IT Resource Management vs. User Empowerment

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

What We Do: Simplify Enterprise Mobility

White Paper. Managing Risk to Sensitive Data with SecureSphere

Endpoint Protection Small Business Edition 2013?

Comodo Mobile Device Manager Software Version 1.0

Comodo Mobile Device Manager Software Version 3.0

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Securing Office 365 with MobileIron

Kaspersky Security for Mobile

Securing Content: The Core Currency of Your Business. Brian Davis President, Net Generation

Top. Enterprise Reasons to Select kiteworks by Accellion

When enterprise mobility strategies are discussed, security is usually one of the first topics

Microsoft Enterprise Mobility Suite

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Stay ahead of insiderthreats with predictive,intelligent security

Take Control of Identities & Data Loss. Vipul Kumra

Transcription:

WHITE PAPER Securing and Monitoring Access to Office 365 Introduction Enterprises of all sizes are considering moving some or all of their business-critical applications, such as email, CRM, or collaboration, to the cloud for operational benefits and cost savings. One of the leading players enabling this trend, Microsoft Office 365, has experienced rapid growth as organizations move to the cloud. Whether it s Exchange, Yammer, SharePoint, OneDrive, or another Microsoft application, customers are increasingly leveraging the benefits that cloud has to offer. For instance, Office 365 enables organizations to leverage all of their business-critical applications without having to hire a huge IT staff, deal with upgrades, and troubleshoot issues. Being hosted in the cloud, Office 365 customers are able to access the latest versions of Exchange, SharePoint, Lync, and several other applications. Workers can access these apps from anywhere in the world including corporate owned or BYOD mobile devices and store their content in the cloud as well. The net result is a much more efficient use of resources from both a provider and customer perspective. While Microsoft may provide the overarching infrastructure for Office 365, i.e., the host operating system and physical security of the facilities in which Office 365 operates, it s up to the customer to secure everything else. For instance, customers are responsible for managing user access to its Office 365 instance and securing the data within different services. Administrators wield much power in that they have the ability to create and edit users permissions, change configuration settings, and extract or delete entire data sets. For example, they can change the configuration of production infrastructure without a complete audit trail of all their actions. Ultimately, additional security measures are needed since Office 365 on its own is not enough. New categories of Cloud Access Security products, such as Imperva Skyfence, enable organizations to fully realize the benefits of Office 365 while ensuring that the appropriate security, access governance controls, and monitoring are in place for securing the Office 365 apps and the data stored within them.

Why Will Office 365 Become an Attractive Target for Hackers? Let s step back and take a look at some trends that may help explain why Office 365 is such an inviting target for hackers. User credentials provide ubiquitous access One of the biggest threats to any organization is the theft of account credentials to access and steal sensitive data. A study conducted by Verizon in 2014 found that credential theft was the leading cause of data breaches 1. Once the hacker gains access to someone s account credentials, this is tantamount to getting the keys to the kingdom, especially if the former gets ahold of the admin credentials for the Office 365 portal. This portal is a critical website through which admins and partners purchase and manage Office 365 services and where users access and use Office 365 collaborative tools. Many access points, including mobile Everywhere you look people are on their mobile devices. Whether from a browser or a native mobile app, employees are using these devices for work-related activity. Many of the Office 365 apps have their own ios/android mobile apps, where users can easily view their email, upload docs, and manage their day-to-day activities right from their phones or tablets. These sessions often bypass existing network security infrastructure such as perimeter firewalls creating a blind spot for IT. Rapid adoption of Office 365 Even though Google got a headstart in cloud-based productivity suites with Google Apps, Microsoft has been quickly narrowing the gap with Office 365. According to The Radicati Group, cloudbased mailboxes powered by Microsoft Exchange Server technology currently represent 31% of global business cloud mailboxes 2. And, according to Microsoft s own website, one in four Microsoft enterprise customers has Office 365 3, underscoring the marked trend towards cloud adoption. More apps moving to the cloud Microsoft s large installed base of on-premises Office applications include a large majority of global enterprise organizations. As these organizations move their Exchange, Lync, OneDrive, SharePoint, and Yammer apps to the cloud, they potentially become easier targets for hackers to infiltrate. Hackers usually follow where the data and the people are and, increasingly, this will be Office 365. 1 Verizon, 2014 Data Breach Investigations Report. 2 The Radicati Group, Inc., Microsoft Office 365, Exchange Server and Outlook Market Analysis, 2014-2018, April 2014. 3 Microsoft, Microsoft by the Numbers: The Enterprise Cloud, 2014. 2

Challenges of Securing Access to Office 365 Even though Microsoft has invested in the four pillars (i.e., Prevent Breach, Detect Breach, Respond to Breach, and Recover from Breach ) 4 for Office 365 security, substantial challenges still remain when it comes to securing Office 365 apps from attempted account takeovers and other malicious acts. 1. Lack of visibility over users, administrators, and their actions With so many ways to access cloud apps, it is very difficult to track and monitor user and admin activities. The proliferation of mobile devices and the availability of native apps for several of the Office 365 apps means there are more potential endpoints to deal with. That means a higher probability of someone stealing the credentials of an authorized user and accessing documents that he or she is not authorized to access. What s needed is a mechanism that provides real-time visibility into what s going on at the admin and user levels. Which partners and contractors have access to documents in SharePoint and OneDrive? Do that have uploading and downloading rights? Who s provisioning users for SharePoint access? Who changed the minimum password length? Is there an audit trail for admin activities on the Office 365 admin center? When one has a better understanding of the activities happening on the Office 365 admin center, you can set more effective policies based on what you know. 2. Preventing uncontrolled data proliferation to unmanaged endpoints These days, employees are not just accessing apps from their corporate devices or desktops. They are also accessing them from a wide variety of mobile devices, including their personal devices (i.e., BYOD). To compound matters, some employees access Office 365 through their browsers, while others may prefer accessing Office 365 services through rich mobile apps or home PCs. At the end of the day, IT needs a way to manage Office 365 access consistently across all these different access points with the flexibility to define different policies for corporate and personal devices. 3. Controlling and monitoring activities in Office 365 Office 365 encompasses several applications (Exchange, Lync, SharePoint, OneDrive, etc.). Within these apps, scores of actions are possible (e.g., sharing, uploading, downloading, exporting, etc.). Controlling and monitoring all these different activities on Office 365 can be quite confusing and they potentially create risk, especially in organizations that might have tens of thousands of employees. This highlights the importance of granular policy setting, especially for activity monitoring down to the document and action levels. If an admin could create policies based on specific actions or components available within Office 365, this would maximize visibility and control for IT staff. 4. Detecting malicious behavior Another challenge is insiders with malicious intent. These could be individuals who are authorized to access a particular app and likely use approved devices as well. The fact that they probably know the thresholds for alerts and notifications exacerbates the difficulties in predicting when a breach is going to happen. Ideally, to identify insiders with malicious intent, organizations need to understand what those insiders normal usage behaviors are when carrying out their job duties. Once a baseline is established, an organization will have a better foundation to identify when a specific behavior signals something out of the ordinary, which in turn may indicate a breach is imminent. 4 Microsoft, Microsoft by the Numbers: The Enterprise Cloud, 3

5. Enhancing existing MDM solutions Many organizations have deployed mobile device management (MDM) solutions to help them manage the proliferation of mobile devices that are becoming the norm in the workplace. However, MDM solutions do not address the problems of managing access to cloud apps and the misuse of stolen credentials. And, Office 365 doesn t distinguish or enforce different policies for managed endpoints and BYOD endpoints. Thus, it s critical to have a solution in place that can apply policies across all devices, including those that are managed by an organization s MDM solution and those that are not. 6. Preventing inappropriate use of stolen credentials As outlined earlier, there are several popular methods hackers employ to steal admin or user credentials for Office 365. Here are a few of the most common ones: Targeted social engineering spear-phishing with password recovery scams Network eavesdropping listening on public WiFi networks Malware activity from non-typical endpoints accessing non-typical data Brute force multiple unsuccessful logins within a short time period Password sharing e.g., a manager and assistant using the same account Similar to the insider s scenario, if an organization had a baseline of what constitutes normal behavior for a user, including the devices he or she typically uses and from which locations, this helps identify anomalous behavior automatically in the future. At that point, multifactor authentication can be enforced to confirm that the individual attempting to log in is in fact an authorized user. Service Exchange Lync SharePoint OneDrive Yammer Dynamics CRM Administrator Portal Example of Risk Was it a hacker or malicious insider who obtained valid credentials to the CFO s email account, taking over the account and disclosing confidential information to the public? Who communicated sensitive pricing info via Lync/Skype to that reseller in China? Who downloaded an HR file containing social security numbers to an unknown device? Which users have weak passwords? Which terminated employees are uploading content to Box and Dropbox? Which partner has full rights to the corporate Yammer account, instead of read-only access? Does the contractor, Doug, have access to our customer account information? What admin changes were made in the last 30 days? Do we have a record of them? 4

Skyfence for Office 365 Skyfence for Office 365 provides real-time controls to protect administrative and user accounts from hackers and malicious insiders trying to access sensitive data. Monitoring and policy enforcement capabilities include alerting on or blocking high-risk tasks or activities, preventing account takeovers, and auditing user activity in real-time. Office 365 users, admins, bad actors and cyber criminals Skyfence works seamlessly with Office 365 to give you visibility and control over all usage, and to proactively respond to suspicious and anomalous activity that could indicate a threat to your organization and confidential data. Challenge Native Office 365 Office 365 + Skyfence Access rights management for variety of endpoint devices, including BYOD Not supported Automatically or manually enroll managed devices or block/limit access from unmanaged devices Enhancement of MDM deployments Restrictions on specific actions and components Detection of malicious insiders Prevention of account takeovers User access control with action-level MFA Enforcement of separation of duties Alert delivery time/ notification Not supported Limited ability to set policies at granular level Not supported Not supported Can enable MFA on user login only Office 365 admins can disable or tamper with Office 365 logs Logs are reported within 15 minutes of the API call Leverage the MDM system to set endpoint-based access policies for Office 365 applications Ability to monitor and enforce policies that control uploads, downloads, and shares by user, location, department, device, and more Utilize automatic anomaly detection and apply risk-based, multi-factor authentication (MFA) Utilize automatic anomaly detection and MFA Can be enforced for each action or API call by endpoint type or location or automated in response to policy violations Office 365 admins don t have access or the ability to change Skyfence audit trails. These audit trails can be used for internal and external compliance auditing processes. Immediate blocking, alerting or notification in real time 5

Deployment options Imperva Skyfence can be deployed in one of several different ways for securing Office 365 access and data. How it s deployed dictates what types of features are available. Recommended Deployment Deployment Method Autodiscover DNS settings ADFS Integrations ios profile/ Android app Endpoint client PAC Configuration SWG Integrations Email Clients (Desktop/Mobile) Web Browser Based Services Office 365 Mobile Apps Office 365 Desktop Apps Yes n/a n/a n/a No Yes No No Yes Yes Yes n/a Yes Yes n/a Yes Yes Yes n/a Yes Yes Yes n/a Yes Recommended deployment Skyfence recommends the following deployment for Office 365 environments: ADFS integration to support all web browser-based services for both corporate and non-corporate devices Mobile profiles to support Office 365 mobile applications Desktop agents to support Office 365 desktop applications ADFS integration Active Directory Federation Services (ADFS) is used in many deployments as the authentication point for Office 365 users. ADFS can be configured to direct all connections after authentication to the relevant application server. Skyfence leverages this capability to force all users through its gateway without them needing to change any of their browsing habits (i.e., users can go straight to the original URL of the service). Auto-discover DNS settings Autodiscover for Exchange is a service that allows a mail client to automatically connect to an Exchange Server based on a given email address. The email client will access a specific URL, which will direct it to the mail server address. This can be applied to the initial connection or to later updates and depends on the client setup. Changing the DNS of this URL will make all email clients go through Skyfence instead of directly accessing Office 365. 6

Key features Skyfence delivers a complete picture of your Office 365 risk posture, along with the operational intelligence you need to protect your data. For instance, through a combination of analyzing Office 365 s APIs and your users data, and comparing these against information from your organizational directory, Skyfence helps you gain insights into the following questions: Which ex-employees still have access to our Office 365 apps? Do our Office 365 security settings meet PCI DSS, HIPAA, ISO, NIST, or other standards? How do our app configurations compare against Cloud Security Alliance best practices? Which users have weak passwords for their Office 365 accounts? Which contractors, partners, or external users have access to our cloud data? How many dormant (inactive) accounts do I have for each cloud app? How much money are we wasting on these inactive licenses? What specific configuration changes should I make to be more secure and compliant? Additionally, Skyfence automatically detects and blocks threats to Office 365 applications and enforces policies to mitigate that risk. For instance, Skyfence enforces separation of administrative duties to ensure that no one individual has access to both change management controls and auditing and strengthens accountability from a compliance standpoint. It employs one of several methods to guard against account takeovers and the misuse of stolen credentials, such as Dynamic User and Device Fingerprinting TM technology that quickly establishes detailed behavioral profiles based on the normal usage patterns of individuals, departments, or devices. Any access that fails a fingerprint test can be configured to immediately alert, block, or require two-factor authentication in real time. Granular activity monitoring and policy enforcement Skyfence s deep capabilities for ensuring the security of Office 365 activities and data is predicated on its comprehensive mapping of the different data objects and actions available within Office 365. By mapping all these objects and actions, Skyfence enables organizations to set very flexible and granular policies tailored to their security and compliance requirements. The following are examples of some of the actions and data objects mapped by Skyfence: Application Action(s) Data objects Outlook OnDrive SharePoint Create, delete, modify, view, upload, download Download, upload, modify, delete, view, create Download, upload, modify, delete, view, create Mail, attachments, shared folders, folder permissions File, folder, page File, folder, page SharePoint Admin Center View, create, delete Site collections 7

Customer success story London-based Bank Challenge A fast growing, UK-based Bank needed to enable its 1,400 employees across the UK to communicate and collaborate effectively. Specific challenges revolved around its deployment of the Office 365 suite: Lack of endpoint access control, including control for BYOD Monitoring actions of admins and users across Exchange, Yammer, SharePoint, OneDrive, Dynamics CRM, and the Administrator Portal Detecting malicious behavior and use of stolen credentials The Bank also managed its 500 corporate Windows and Apple mobile phones with AirWatch Mobile Device Management (MDM). The Bank wanted to improve employee productivity by enabling off-network access to Office 365 and Yammer, but even with MDM in place, felt that the move was too risky. Solution The Bank chose the Imperva Skyfence solution to provide visibility into cloud application usage, including what data has been accessed, when, and by whom. It also utilizes the security and protection features of Skyfence to detect behavioral anomalies with app usage and to alert or block suspicious events in real time. Finally, the Bank can create and enforce custom policies for any user from any endpoint, as needed. Results Ultimately, the Bank was able to meet all of its security and compliance requirements for securing Office 365 through Imperva Skyfence with the following results: Global enforcement of access controls Consistent, detailed, and clear visibility into all cloud app activity PCI DSS compliance for cloud access outside of the organization Rapid and simple deployment in the cloud 8

Get Started with Skyfence Start today by requesting a demonstration or free trial of Imperva Skyfence. About Imperva Skyfence Cloud Gateway Imperva Skyfence Cloud Gateway is a cloud-based security service that provides visibility and control over sanctioned and unsanctioned cloud apps. With Skyfence, organizations can discover SaaS applications and assess related risks, enforce controls to protect cloud accounts and data, and help ensure cloud activities comply with regulations and best practices. About Imperva Imperva (NYSE: IMPV), is a leading provider of cyber security solutions that protect business-critical data and applications. The company s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and vulnerabilities, protect information wherever it lives - on-premises and in the cloud - and comply with regulations. The Imperva Application Defense Center, a research team comprised of some of the world s leading experts in data and application security, continually enhances Imperva products with up-to-the minute threat intelligence, and publish reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. www.imperva.com 2015, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or registered trademarks of their respective holders. #WP-SECURING-MONITORING-ACCESS-OFFICE365-0315rev2