Wednesday, December 18, 2024
HomeCyber Security NewsCISA Releases Secure Practices for Microsoft 365 Cloud Services

CISA Releases Secure Practices for Microsoft 365 Cloud Services

Published on

SIEM as a Service

The Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive (BOD) 25-01: Implementing Secure Practices for Cloud Services, to enhance the cybersecurity posture of Federal Civilian Executive Branch (FCEB) agencies utilizing cloud services, including Microsoft 365.

This directive, unveiled on December 17, 2024, introduces a set of Secure Configuration Baselines and assessment tools under the Secure Cloud Business Applications (SCuBA) project.

A Blueprint for Secure Cloud Practices

The SCuBA configurations mandate consistent and effective security protocols tailored for cloud environments.

- Advertisement - SIEM as a Service

The directive requires FCEB agencies to meet these Secure Cloud Baselines, deploy automated compliance assessment tools, and remediate deviations.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Agencies adopting the most up-to-date version of the SCuBA Assessment Tool can efficiently evaluate their security configurations, generating a report identifying non-compliance areas.

Microsoft 365, a cornerstone of cloud productivity for many government agencies, is among the platforms covered under this directive.

SCuBA’s baseline configurations ensure agencies maintain robust security for email, collaboration, and file-sharing services, reducing vulnerabilities and preventing cyber threats from exploiting them.

Although BOD 25-01 is mandatory for federal agencies under the FCEB umbrella, CISA strongly encourages broader adoption across other organizations.

By implementing the SCuBA guidelines and assessment tools, stakeholders can bolster their cybersecurity defenses, reduce risk, and contribute to collective resilience in the face of increasingly sophisticated cyber threats.

CISA’s guidance comes amidst growing concerns over cyberattacks targeting cloud services, which are critical to modern operations.

Effective configuration management and regular assessments, as outlined in SCuBA, are key to mitigating these risks.

Agencies and organizations can visit CISA’s webpage to download the SCuBA Assessment Tool and access step-by-step instructions for compliance.

This ensures seamless implementation of the configurations necessary to secure Microsoft 365 and other cloud platforms.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one...

RiseLoader Attack Windows By Employed A VMProtect To Drop Multiple Malware Families

RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

Careto – A legendary Threat Group Targets Windows By Deploy Microphone Recorder And Steal Files

Recent research has linked a series of cyberattacks to The Mask group, as one...