Perform Service Hardening
(Back)
Objective
Minimize available services and control connectivity by disabling services as well as removing unnecessary accounts from systems. Configure the Office 365 service and the devices from which it is accessed to attempt to filter out and reduce the impact of attempted attacks.
Key Considerations
- Configure External collaboration settings
- Configure Azure Information protection
- Ensure O365 ATP SafeLinks for Office Applications is Enabled
- Disable macros where they’re not used
- Disable high-risk macro capabilities
- Configure macro execution scanning
- Disable macros unless they are in trusted files - Trusted files (signature or location)
- Block macros from the Internet
- Configure anti-malware protection in the tenant
- Ensure third party integrated applications are not allowed
Teams
- Ensure that users understand the categorization of the Teams site (e.g. Team sites may only be approved for unclassified information)
- Ensure that users understand their responsibilities for managing information including saving decisions made in the departmental IM repository
- Owners of team sites are responsible for the management of their Office 365 groups which are the security access control groups that allow access to the team site
- Ensure you review the Microsoft Apps, Third party Apps and Tenant App that your organization will allow to use within teams
- Disable external access unless your organization requires collaboration from external users. Configure external access policies to enable collaboration with approved domains.
- Disable guest access unless is required by your organization. Limit the number of guest users to the environment ensuring conformance to the guest user access policy and procedures defined as part of the Managed Identity and Access guardrail.
- Disable file sharing services (ShareFile, Dropbox, Box, Google Drive) if they have not been approved for use in your organization
Exchange Online
- Ensure modern authentication for Exchange Online is enabled
- Ensure calendar details sharing with external users is disabled
- Configure connection filtering
- Ensure Exchange Online Spam and Protection Policies are set correctly
- Ensure the Common Attachment Types Filter is enabled for malware protection
- Ensure mail transport rules do not forward email to external domains
- Ensure mail transport rules do not whitelist specific domains
- Ensure that an anti-phishing policy has been created
- Ensure notifications for internal users sending malware is Enabled
- Ensure the Advanced Threat Protection Safe Links policy is enabled
- Disable unused services per mailbox
- Configure Transport rule for ransomware to block file extensions that are commonly used for ransomware, or to warn users who receive these attachments in email
- Authorize all sending IP addresses in Sender Policy Framework (SPF) and ensure that DKIM is enabled for all Exchange Online Domains
- Apply Domain Keys Identified Mail (DKIM) signatures to all outbound messages for all Exchange Online Domains
- Establish a minimum Domain-based Message Authentication, Reporting & Conformance (DMARC) policy of “p=none” with at least one address defined as a recipient of aggregate reports, as outlined in CCCS’s Implementation Guidance for Email Domain Protection
- Add the Canadian Centre for Cyber Security (CCCS) as an aggregate report recipient in the DMARC records. The address that must be included is dmarc@cyber.gc.ca
Additional Considerations
- Use Office Message Encryption to provide protection options when sending mail marked as “Do not forward” or “Encrypt”
- Consider enabling the Advanced Threat Protection Safe Attachments policy
- Where possible, use automated incident handling and remediation of O365 threats
- Explore the use of threat intelligence services to assist in the hardening of O365 Advanced Threat Protection
- Consider enhancing monitoring and control of the cloud environment by using services such as Cloud Access Security Broker (CASB) and User and Entity Behavior Analytics (UEBA) services
- Ensure product updates and features are reviewed and configured as they become available and where appropriate
Validation
- TBD
References
- Directive on Security Management - Appendix B: Mandatory Procedures for Information Technology Security Control, subsections B.2.3.3, B.2.3.7
- SPIN 2017-01, subsection 6.2.3
- CSE Top 10 #3
- Refer to CCCS ITSP.30.031 V2 User Authentication Guidance for Information Technology Systems
- Refer to the Guidance on Cloud Authentication for the Government of Canada
- Refer to the Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain
- Related security controls: AC‑2, AC‑2(1), AC‑3, AC‑5, AC‑6, AC‑6(5), AC‑6(10), AC‑7, AC‑9, AC‑19, AC‑20(3), IA‑2, IA‑2(1), IA‑2(2), IA‑2(11), IA‑4, IA‑5, IA‑5(1), IA‑5(6), IA‑5(7), IA‑5(13), IA‑6, IA‑8
Page details
- Date modified: