{"id":20486,"date":"2022-10-27T09:01:18","date_gmt":"2022-10-27T17:01:18","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/10\/27\/news-14219\/"},"modified":"2022-10-27T09:01:18","modified_gmt":"2022-10-27T17:01:18","slug":"news-14219","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/10\/27\/news-14219\/","title":{"rendered":"Discover Microsoft Security solutions for SLTT government grant readiness"},"content":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Thu, 27 Oct 2022 16:00:00 +0000<\/strong><\/p>\n<p>As part of the Bipartisan Infrastructure Law, also known as the Infrastructure Investment and Jobs Act of 2021, the United States federal government announced a <a href=\"https:\/\/www.fema.gov\/fact-sheet\/department-homeland-security-notice-funding-opportunity-fiscal-year-2022-state-and-local\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity grant program<\/a> for state, local, territorial, and tribal (SLTT) governments to fund allocation of USD1 billion over the next four years for the improvement and creation of cybersecurity programs. The Department of Homeland Security will implement the grant program, with the Cybersecurity and Infrastructure Security Agency (CISA) serving as subject matter experts and the Federal Emergency Management Agency (FEMA) administering the funds.<\/p>\n<p>To qualify for funding, the following strategic elements are required to be included in Cybersecurity Plans, based upon the National Institute of Standards and Technologies (NIST) Cybersecurity Framework (CSF):<\/p>\n<ul>\n<li>Implement <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/azure-active-directory-mfa-multi-factor-authentication\">multifactor authentication<\/a> (MFA).<\/li>\n<li>Implement enhanced logging.<\/li>\n<li>Data encryption for data at rest and in transit.<\/li>\n<li>End the use of unsupported or end-of-life software and hardware that are accessible from the internet.<\/li>\n<li>Prohibit the use of known, fixed, or default passwords and credentials.<\/li>\n<\/ul>\n<p>SLTT governments have many options across a variety of vendors for the products and solutions that meet the above criteria. It is essential to have a detailed plan and well-structured strategy to advance applications for federal funding. In support of these efforts, we want to call attention to the following offerings from Microsoft that can help SLTT governments make their case for federal funding in these key areas.<\/p>\n<h2>Implement multifactor authentication<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/identity-access\/azure-active-directory\">Microsoft Azure Active Directory<\/a> (Azure AD), part of Microsoft Entra, offers an array of MFA methods, be it in the form of a single multifactor authenticator or the form of two single-factor authenticators (read the full list of supported <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/standards\/nist-authenticator-assurance-level-2\" target=\"_blank\" rel=\"noreferrer noopener\">multifactor authentication methods<\/a>). To set the bar higher, SLTT governments can further strengthen their MFA and enforce the use of phishing-resistant MFA using <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/concept-certificate-based-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">Azure AD certificate-based authentication<\/a>, <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/concept-authentication-passwordless#fido2-security-keys\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO2 security keys<\/a>, <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/conditional-access\/howto-conditional-access-policy-authentication-strength-external\" target=\"_blank\" rel=\"noreferrer noopener\">Conditional Access Authentication Strengths<\/a>, or <a href=\"https:\/\/learn.microsoft.com\/windows\/security\/identity-protection\/hello-for-business\/hello-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Hello for Business<\/a>. Products like <a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-management\/microsoft-intune\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Intune<\/a> can make it easy to <a href=\"https:\/\/learn.microsoft.com\/mem\/intune\/protect\/identity-protection-windows-settings#windows-hello-for-business\" target=\"_blank\" rel=\"noreferrer noopener\">configure Windows Hello for Business<\/a>, supporting your organization\u2019s move to MFA. Azure AD\u2019s <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/external-identities\/cross-tenant-access-overview\" target=\"_blank\" rel=\"noreferrer noopener\">External Identities cross-tenant access settings<\/a> are an ideal way to securely collaborate with external users coming from other Azure AD organizations and other Microsoft Azure clouds. Cross-tenant access settings give you granular control over how external users from other Azure AD organizations collaborate with you (inbound access) and how your users collaborate with other Azure AD organizations (outbound access). These settings also let you trust MFA and device claims (compliant claims and hybrid Azure AD joined claims) from other Azure AD organizations.<\/p>\n<h2>Implement enhanced logging<\/h2>\n<p><a href=\"https:\/\/azure.microsoft.com\/products\/microsoft-sentinel\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a> provides capabilities to centralize log data from other software and systems to track incidents and events across the enterprise. An expansive hub of rich integrations allows for the ingestion, enrichment, and delivery of log data, including cloud access security broker, identity, endpoint, network and operational technology (OT) security, and IT capabilities with bi-directional integrations. Archived logs allow for the storage of data for up to seven years to meet compliance requirements.<\/p>\n<p>For Windows devices, you can <a href=\"https:\/\/learn.microsoft.com\/mem\/intune\/remote-actions\/collect-diagnostics\" target=\"_blank\" rel=\"noreferrer noopener\">collect diagnostic logs<\/a> remotely and without interrupting the user with Microsoft Intune by device or in bulk. &nbsp;<\/p>\n<h2>Data encryption for data at rest and in transit<\/h2>\n<p>Data at rest encryption for <a href=\"https:\/\/www.microsoft.com\/microsoft-365\">Microsoft 365<\/a> provides Customer Key-based encryption across multiple Microsoft 365 workloads. Tenant administrators can configure a single data encryption policy using customer-managed keys and assign it to the tenant. Once assigned, the tenant-level encryption policy starts encrypting all customer data for multiple Microsoft 365 workloads.<\/p>\n<p>With Microsoft Purview Advanced Message Encryption, you can control sensitive emails shared outside the organization with automatic policies. You configure these policies to identify sensitive information types, such as personally identifiable information, financial, or health IDs, or you can use keywords to enhance protection. Once configured, you can pair policies with custom-branded email templates and then add an expiration date for extra control of emails that fit the policy. &nbsp;<\/p>\n<p>Microsoft Intune also helps you enforce data protection on your devices to be compliant with your organization\u2019s policies. This combined with Conditional Access policies helps verify that when data leaves your organization, it can only go to compliant devices that are encrypted and meet the standards defined by your organization (including data-at-rest protection). Intune also can configure and enforce encryption on Windows endpoints with BitLocker specifically and require encryption across the mobile device landscape.<\/p>\n<h2>Prohibit use of known, fixed, or default passwords and credentials<\/h2>\n<p>SLTT governments are required to change password policies that are proven ineffective, such as complex passwords that are rotated often. This includes the removal of the requirement for special characters and numbers, along with time-based password rotation policies. Instead, consider doing the following:<\/p>\n<ul>\n<li>Use <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/concept-password-ban-bad\" target=\"_blank\" rel=\"noreferrer noopener\">password protection<\/a> to enforce the blocking of a common list of weak passwords that Microsoft maintains. You can also add custom banned passwords.<\/li>\n<li>Use <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/authentication\/tutorial-enable-sspr\" target=\"_blank\" rel=\"noreferrer noopener\">self-service password reset<\/a> to help users reset passwords as needed, such as after an account recovery or credential compromise.<\/li>\n<li>Use <a href=\"https:\/\/learn.microsoft.com\/azure\/active-directory\/identity-protection\/concept-identity-protection-risks\" target=\"_blank\" rel=\"noreferrer noopener\">Azure AD Identity Protection<\/a> to be alerted about compromised credentials so you can take immediate action.<\/li>\n<\/ul>\n<h2>How Microsoft Security solutions help support grant applicants<\/h2>\n<p>The products mentioned are several suggested offerings of which SLTT governments can take advantage when considering their applications for federal cybersecurity grant funding. For further information on other required elements and how Microsoft solutions map to the NIST CSF, organizations can read the <a href=\"https:\/\/info.microsoft.com\/US-SCITL-CNTNT-FY23-09Sep-08-US-Cybersecurity-Grant-Readiness-Assessment-Microsoft-Technical-Reference-Guide-SRGCM7668_LP01-Registration---Form-in-Body.html\" target=\"_blank\" rel=\"noreferrer noopener\">US Cybersecurity Grant Readiness Assessment and Microsoft Technical Reference Guide<\/a>.<\/p>\n<p>Microsoft partners with governments around the world to ensure the safety and integrity of their critical systems. We are committed to assisting our SLTT government customers in improving the state of cybersecurity for their regions and the people they serve.<\/p>\n<p>Additional resources for SLTT customers:\u00a0<\/p>\n<ul>\n<li>Register for the upcoming webinar, <a href=\"https:\/\/forms.office.com\/Pages\/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbRwz_iy9cVNlAktE9fart_PFUNzVaSTdESDdNVlcwSENQT1ZPSjU4MVZHSC4u\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity for State and Local Government Agencies<\/a>,\u00a0on October 31, 2022.<\/li>\n<li>Download the <a href=\"https:\/\/info.microsoft.com\/US-SCITL-CNTNT-FY23-09Sep-08-US-Cybersecurity-Grant-Readiness-Assessment-Microsoft-Technical-Reference-Guide-SRGCM7668_LP01-Registration---Form-in-Body.html\" target=\"_blank\" rel=\"noreferrer noopener\">US Cybersecurity Grant Readiness Assessment &amp; Microsoft Technical Reference Guide<\/a>.\u00a0<\/li>\n<li>Check out the webinar with <a href=\"https:\/\/info.conquestcyber.com\/iija-grant-program\" target=\"_blank\" rel=\"noreferrer noopener\">Conquest and Microsoft<\/a> discussing this IIJA state and local cybersecurity grant program.<\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/27\/discover-microsoft-security-solutions-for-sltt-government-grant-readiness\/\">Discover Microsoft Security solutions for SLTT government grant readiness<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/27\/discover-microsoft-security-solutions-for-sltt-government-grant-readiness\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christine Barrett| Date: Thu, 27 Oct 2022 16:00:00 +0000<\/strong><\/p>\n<p>Products and solutions from Microsoft can help state, local, and territorial governments improve their cybersecurity and secure federal grant funding.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/27\/discover-microsoft-security-solutions-for-sltt-government-grant-readiness\/\">Discover Microsoft Security solutions for SLTT government grant readiness<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500],"class_list":["post-20486","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20486"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20486\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}