Important Updates
April 2024 Update: Microsoft has released a comprehensive set of configuration guidelines aimed at UK government and public sector organizations for safeguarding OFFICIAL data in their SaaS applications. Since the security standards for OFFICIAL information align closely with those required by large UK private firms, private sector entities may find these guidelines useful as well. Further details about this guidance are available on GOV.UK: https://www.gov.uk/guidance/microsoft-365-guidance-for-uk-government.
If you have questions regarding best practices for securing your data in a SaaS application like Microsoft 365, we encourage you to consult our guidance on Using SaaS securely and reach out to your service provider for assistance.
As of April 2024, this blog will no longer receive updates.
October 2023 Update: Microsoft has developed a collection of configuration guides for UK government and public sector organizations. For more information about this guidance, please visit GOV.UK: https://www.gov.uk/guidance/microsoft-365-guidance-for-uk-government
Last December, we issued an advisory that outlined how to protect Office 365 accounts from credential theft attacks that have been on the rise.
We believe that all Office 365 account holders can greatly benefit from following the security recommendations outlined in this advisory. From small businesses to large enterprises, prioritizing measures such as Multi-factor Authentication (MFA) should be a key focus.
This blog post provides an overview of some of these recommendations and highlights significant new security guidance released by Microsoft.
Growth of Cloud Computing
The adoption of cloud computing by businesses continues to skyrocket. For context, EuroStat reported that 42% of UK enterprises used cloud computing services in 2018, compared to 24% in 2014.
As expected, cyber attackers are also adapting, shifting their focus toward the cloud while employing established tactics such as password guessing and phishing schemes to execute their attacks.
With the rapid expansion of Office 365 adoption across organizations of all sizes, it has become a prime target for malicious actors. Our advisory and Microsoft’s guidelines aim to mitigate the increasing security risks associated with its popularity.
Implement Multi-factor Authentication (MFA)
Before diving into Microsoft’s security advice, we strongly advocate for the use of Multi-factor Authentication. Utilizing MFA for accessing cloud services is essential.
Sometimes referred to as two-factor authentication or 2FA, if you have not yet implemented this, it’s imperative to start immediately.
MFA typically relies on single-use codes generated by apps. However, as our MFA guidelines outline, there are alternative methods to achieve MFA. For example, logging in from a trusted IP address or from a device pre-registered in Azure AD are two viable methods.
Enterprises can leverage Conditional Access to enforce MFA usage. Smaller organizations and individuals should ensure that each account has a second factor enabled.
New Office 365 Guidance from Microsoft
Microsoft’s updated security guidance offers up-to-date advice on configuring Office 365 installations to align with NCSC’s cloud security principles.
This guidance is recommended for both public and private sector enterprises, as it is designed to assist UK public sector organizations in configuring Office 365 to adhere to the OFFICIAL classification.
The guidance encompasses all Office 365 services, thereby ensuring that you can confidently utilize both newer cloud-only features and established services like SharePoint and Exchange.
Microsoft’s guidance is split into two parts:
- The first document responds to NCSC’s 14 cloud security principles and details how specific configurations map to these principles.
- The second document outlines recommended configurations for Office 365 services, complete with step-by-step implementation instructions.
In the second document, Microsoft categorizes the recommendations into good, better, and best.
The NCSC suggests that enterprises aim to implement all recommendations in the good category and aspire to include those in the better category, which are available with the Office 365 E3 license.
Transitioning to Cloud-Native Authentication
This new guidance introduces a significant recommendation that may prompt discussion.
We now advise that hybrid environments utilizing both Active Directory and Azure AD should consider native Azure AD authentication over ADFS.
In Microsoft terminology, this is known as ‘Seamless SSO with Password Hash Sync,’ which can be configured to use per-user or Conditional Access MFA.
While synchronizing passwords with the cloud may seem daunting, we believe that organizations using Azure AD as the primary authentication source will reduce their risks in comparison to ADFS. The rationale includes the following points:
- The hashing of password hashes sent to Azure AD prevents the reusable NTLM hashes that are often associated with “pass the hash” attacks. (Further details can be found in the Azure AD Connect documentation). Thus, the credentials sent to Azure AD cannot be used for authentication against on-premise infrastructure reliant on Active Directory.
- Trust is already placed in Azure AD for access control decisions that regulate data visibility in Office 365. Storing password hashes does not compromise this security requirement.
- The availability of Office 365 will not be impacted by any outages or downtime occurring within your on-premise ADFS or Active Directory systems.
- Microsoft’s full suite of credential protection technologies operates solely on accounts fully synchronized with the cloud. Benefits include identifying users with easily guessed passwords and flagging accounts with reused passwords that have been compromised through data breaches.
- Future enhancements to Conditional Access that incorporate device health assessments may only be accessible to users authenticating directly to Azure AD.
The guidance delves deeper into relevant authentication options and services, including implementation strategies.
Acting on New Guidance
We encourage organizations already utilizing Office 365 to evaluate their deployments against both the NCSC advisory and the new guidance provided by Microsoft, treating their recommendations as essential.
For smaller organizations, the mitigations outlined in the advisory will be especially relevant, while larger organizations and public sector bodies should also leverage the detailed guidance.
If you have not yet implemented measures against password guessing and leaked credentials through MFA or Conditional Access, it is important to start this process immediately!
Future Considerations
The landscape of cloud products and our usage of them will continue to evolve over the coming years. Thus, it is crucial to periodically review your organization’s configurations for all SaaS instances, ensuring to verify if vendors have updated their recommendations.
Andrew A
NCSC Cloud Security Research Lead
Based on an article from https://www.ncsc.gov.uk/blog-post/securing-office-365-with-better-configuration