Continuous monitoring plan
This Continuous Monitoring Plan has been prepared to support assessment of the ongoing security posture of the DTA CloudSystem. Throughout, this document provides continuous monitoring guidance including:
- Developing an agency-specific continuous monitoring plan;
- Overview of Microsoft’s tools for monitoring security posture and compliance;
- Collecting data relating to areas of security that the Agency is responsible for managing;
- Aggregating collected monitoring data for analysis;
- Analysing monitoring information to identify and assess the severity of security weaknesses; and
- Responding to identified security weaknesses.
Throughout this document several security monitoring tools are identified. While continuous monitoring and security monitoring are not identical, some overlap exists between the two in their purpose. Security monitoring tools gather and record information that enables identification of potential vulnerabilities that arise in a system. This information is useful in assessing the system’s overall health and security posture.
Purpose
The Information Security Manual (ISM) requires agencies to create a Continuous Monitoring Plan as one of the system-specific documents prior to a system’s operation. This is to assist agencies in identifying, prioritising and responding to security vulnerabilities.
To meet this requirement, this Continuous Monitoring Plan provides agencies leveraging the CloudSystem with an outline of implemented technologies that produce continuous monitoring data. This plan also provides guidance for monitoring the security posture of the system and verifying implemented security controls remain fit-for-purpose for the system’s operating and threat environment.
The three most common types of continuous monitoring activities are: vulnerability assessments; vulnerability scans; and penetration tests. These are not always possible or appropriate for systems that consume cloud services, such as the CloudSystem. Therefore, agencies should utilise this plan to consider what mechanisms are available to them to provide appropriate ongoing monitoring.
Scope
The scope of this Continuous Monitoring Plan is specific to monitoring security controls involved with the Agency’s use of Microsoft 365 services as part of the CloudSystem. As the CloudSystem is implemented in collaboration with Microsoft as the Cloud Service Provider (CSP), responsibility for continuous monitoring is shared between the Agency and Microsoft.
In the context of the Blueprint CloudSystem, the following responsibilities are managed by Microsoft and are therefore out of scope of this document:
- Vulnerability scanning of the Microsoft 365 platform and software
- Penetration testing of the Microsoft 365 platform and software, and
- Vulnerability assessment activities pertaining to the Microsoft 365 platform and software.
This document covers continuous monitoring responsibilities owned by the Agency or jointly owned between the Agency and Microsoft.
The CloudSystem Continuous Monitoring Plan is a living document. It is therefore anticipated that, over time, amendments and updates may be applied to the plan in the event of changes to the CloudSystem or the Agency.
Developing a Continuous Monitoring Plan
Agencies are free to develop the structure of their CMP as appropriate for their organisation. The ISM (security control 1163) specifies only that Agencies must:
- conduct vulnerability scans for systems at least monthly;
- conduct vulnerability assessments or penetration tests for systems at least annually;
- analysing identified security vulnerabilities to determine their potential impact and appropriate mitigations based on effectiveness, cost and existing security controls; and
- using a risk-based approach to prioritise the implementation of identified mitigations.
Whilst agencies will be able to undertake these activities in relation to their on-premise equipment, there is limited ability to conduct vulnerability assessments, vulnerability scans and penetration tests against Cloud Service Provider (CSP) infrastructure. This document aims to assist agencies in identifying mechanisms which are available to them to provide ongoing monitoring across their implementation of the CloudSystem Blueprint.
The National Institute of Standards and Technology (NIST) outlines a standard process for conducting continuous monitoring which includes the following initiatives, which agencies can utilise when developing their continuous monitoring strategy:
- Define a continuous monitoring strategy based on risk tolerance that maintains clear visibility into assets and awareness of vulnerabilities, up-to-date threat information and business impacts.
- Establish metrics and measures, status monitoring frequencies, control assessment frequencies, and where needed a technical architecture.
- Implement a continuous monitoring program to collect the security related data required for the defined metrics and measures. Automate collection, analysis and reporting of data where possible.
- Analyze the data gathered and Report findings, determining the appropriate response. It may become necessary to collect additional information to clarify or supplement existing monitoring data.
- Respond to findings with technical, management, and operational mitigating activities or acceptance, transference/sharing, or avoidance/rejection.
- Review and Update the monitoring program, revising the continuous monitoring strategy and maturing measurement capabilities to increase visibility into assets and awareness of vulnerabilities; further enhance data driven control of the security of an organization’s information infrastructure; and increase organizational flexibility.
Continuous Monitoring Plan structure
The following section provides suggested inclusions for CMP’s which an agency may wish to consider.
Roles and responsibilities
The CMP should document relevant roles and responsibilities associated with performing continuous monitoring and maintaining the capabilities within the Agency. Roles and responsibilities associated with continuous monitoring that may require documentation include:
- Chief Information Security Officer;
- System Owner;
- Authorising Officer;
- Security Operations Centres;
- Vulnerability Management Teams;
- Desktop Support Teams; and
- Cloud Operations Teams.
Information sources
The CMP should list any sources of information that are needed as part continuous monitoring, how it will be collected, the purpose it is collected for and relevant details such corporate business owners.
Corporate Desktop environments generate vast quantities of digital information from sources such as network devices, databases, servers and endpoints. Agencies will need to consider which information sources they require to maintain aware of the current state of their environment.
Cloud based systems are able to generate a wide range of information about their operation and use. Later sections within this document the various information sources available from Microsoft that agencies may collect and monitor to provide visibility of their Microsoft Office 365 and Azure instances.
Information storage and management
The CMP should document how information required for continuous monitoring will be stored and managed. This should include where information will be stored and relevant parties responsible for the information.
To enhance the ability to identify inappropriate or unusual activity, organisations may wish to integrate the analysis of vulnerability scanning information, network monitoring, and system log information through the use of Security Information Event Management tools.
Measurements and metrics
The CMP should outline the metrics and measures that the Agency will use to evaluate whether security controls are working as intended and whether it is managing risk associated with the CloudSystem appropriately. Metrics should align with specific security objectives and should aid in providing decision makers with an understanding of how security is performing within the system. Metrics and Measures that could be relevant to agencies using the CloudSystem could include things such as:
- Unpatched endpoints;
- Administrator accounts created;
- Failed logon attempts; and
- Suspected phishing emails received.
Timeframes and frequencies
The CMP should outline when and how often reviews and testing will be performed.
For CloudSystem infrastructure within Office 365 and Azure, the Agency should specify when reviews will be conducted of various information sources. This should include the information sources that will be reviewed and how often that will occur. For example, the Agency may specify tasks such as:
- Desktop Support teams will review Intune reports monthly; and
- Office 365 administrators will review Active Directory weekly.
Analysis
The CMP should document procedures for conducting analysis and reviews, this could take the form of things like runbooks or work instructions which allow agency personnel to conduct the necessary analysis in repeatable and consistent ways to identify potential vulnerabilities or weaknesses within the system.
Assessment and response
Assessment
The CMP should set out the process for how identified system weaknesses and vulnerabilities will be assessed and prioritised for response. The outcome of the assessment should be a determination of the risk to the system and the agency.
The Agency should undertake analysis which allows them to reach a thorough understanding of the potential impacts of identified vulnerabilities and the risk that is posed to the Agency. This may include asking questions such as:
- What happens/what is the impact if the vulnerability is exploited?
- What are the available mitigation techniques?
- How effective are those mitigations likely to be?
- Who is responsible for implementing any mitigations?
- What will the cost of implementing the mitigations be?
Information that agencies can use to assist with assessing vulnerabilities includes vendor security bulletins or the severity ratings assigned to security vulnerabilities under schemes such as the Common Vulnerability Scoring System.
Assessments should be conducted by suitably skilled personnel, where possible, independent of the system owner or developer, or by a third party who is independent of the target of the assessment. Assessments may be performed by either using automated assessment tools or manually by appropriately skilled ICT professionals.
Prioritisation
The CMP should outline how identified weaknesses and vulnerabilities will be prioritised based on their assessed risk or impact and the timeframes within which actions will be taken.
The Agency may wish to take into consideration the timeframes specified within the ISM (Information Security Manual. [14.11.2020]. Guidelines for System Management.) under which action must be taken as outlined in Table 1.
Table 1: Information Security Manual vulnerability remediation timeframes
| Vulnerability Risk | Timeframe |
|---|---|
| Extreme | 48 hours |
| High | Two weeks |
| Moderate | Four weeks |
| Low | Four weeks |
Response
The CMP should document response processes, including change management and documentation requirements, as well as approval processes.
The Agency response to assessed vulnerability may include risk mitigation, risk acceptance, risk avoidance/rejection, or risk sharing/transfer, in accordance with organizational risk tolerance.
Depending on the vulnerability identified and it’s severity, action maybe required immediately or maybe implemented over a period of time. Agencies should ensure that they have in place the processes to track the progress of remediation actions as they occur.
Reporting
The CMP should document requirements of reporting in relation to continuous monitoring.
This should include the specific staff and roles to generate and receive reports, the content and format of the reports, the frequency of reports, and any tools to be used.
Review and update
The CMP should outline when and under what conditions review and updates to the continuous monitoring strategy and approach will occur.
Continuous monitoring processes should not be static, they should adapt based on changes in organisational threat and risk and when changes are made to CloudSystem technology and architecture. The CMP should be reviewed to ensure that it supports the organisation in operating within its acceptable risk tolerance levels, that chosen metrics remain relevant, and that data is current and complete.
The Agency should review the contents of the CMP annually or bi-annually as required by the Agencies processes.
Microsoft Security and Compliance Center
Microsoft 365 Security Center and Microsoft 365 Compliance Center are virtual security management workspaces provided by Microsoft’s Customer Security and Compliance teams. These solutions are integrated across Microsoft 365 services and provide actionable insights to help reduce risks and safeguard Microsoft 365 deployments.
Microsoft 365 Security Center is designed to allow for the monitoring and management of security across various identities, data, applications and infrastructure. Agencies can utilise Security Center to view alerts and incidents related to their infrastructure, as well as reports and metrics such as Microsoft Secure Score. Agencies can utilise Secure Score to determine the security baseline of their Microsoft 365 configuration. Secure Score can scan a Microsoft environment, assign an overall security score to the environment’s configuration and provide recommendations to improve the security of the environment.
Microsoft 365 Compliance Center is provided by Microsoft to assist with managing system security compliance requirements, including against specific compliance frameworks. Agencies can use Compliance Center to track specific compliance issues and risks. Compliance Center also provides customisable policies which can alert agencies when Microsoft 365 contravenes a particular policy.
Using Microsoft’s security tools can assist agencies in identifying a wide range of common security risks and misconfigurations. Examples of issues that Security Center and Compliance Center may assist with identifying include:
- Administrator accounts without Multifactor Authentication enabled;
- Applications using high risk protocols to connect to Azure Active Directory;
- Endpoints without BitLocker enabled; and
- Disabled Microsoft Defender functions.
Microsoft 365 Security Center and Microsoft 365 Compliance Center can assist with aggregating, consuming and analysis of some of the system data detailed within this document.
Collecting continuous monitoring information
The CloudSystem implements various technologies capable of monitoring security control areas that the Agency is responsible for managing as a consumer of Microsoft’s cloud products. Data gathering technologies provide the capability to observe, detect, prevent or log security threats and vulnerabilities.
The Agency’s security personnel can leverage technologies defined throughout this section to collect monitoring information relating to areas of security they are responsible for as a consumer of Microsoft’s cloud products, including:
- User Authorisation and Authentication;
- Information Protection;
- Application Security; and
- Network Security.
User authorisation and authentication monitoring
The Agency leveraging the CloudSystem is responsible for ongoing management of the authentication and authorisation of their users. As a result of this, the Agency is also responsible for monitoring the effectiveness of user authorisation and authentication activities within the CloudSystem. The Agency can collect continuous monitoring data pertaining to user authorisation and authentication through the following technologies:
- Azure Active Directory Identity Protection;
- Azure Advanced Threat Protection; and
- Microsoft Cloud App Security.
Azure Active Directory Identity Protection
Identification of identity configuration weaknesses
Azure Active Directory (AD) Identity Protection is configured to monitor, detect and provide automated responses to anomalous authorisation and authentication activity within the CloudSystem environment. Azure AD Identity Protection provides continuous monitoring of access and authorisation to identify vulnerabilities in identity management configuration and policies to detect actions identified as atypical to standard user behaviour, including:
- User Risk Policy – assesses the probability that a user account has been compromised by detecting risk events that are atypical of a user’s behaviour.
- Sign-in Risk Policy – analyses each sign-in of a user with aim to detect suspicious actions associated with the sign-in. Automated actions can be configured to occur if high-risk behaviour is detected. Refer to Azure AD Identity Protection documentation.
Azure Advanced Threat Protection
Detecting suspicious authentication activities
Microsoft Azure Advanced Threat Protection (Azure ATP) monitors Active Directory (AD) traffic and provides alerts when suspicious authentication-related activities occur. Azure ATP provides User Entity Behavioural Analytics by monitoring authentication requests to on-premises AD Domain Controllers. Refer to What is Microsoft Defender for Identity?
Microsoft Cloud App Security
Microsoft Cloud App Security (MCAS) is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy.
Monitoring and control of application access
The Agency can configure MCAS access policies to provide monitoring and control of user logins to identified cloud applications. This information is displayed in the MCAS dashboard.
Information protection monitoring
The Agency leveraging the CloudSystem is responsible for managing their user’s access to and handling of sensitive information. As a result of this, the Agency is responsible for monitoring the security of sensitive information transmitted to and stored within the CloudSystem. Agencies can collect continuous monitoring data of information protection controls through technologies implemented as part of the CloudSystem including:
- Azure Information Protection; and
- Microsoft Cloud App Security.
Azure Information Protection
Information classification and sensitive information detection
Azure Information Protection (AIP) provides document and email classification labelling, and protections based on those labels. MCAS can be configured to scan for AIP classification labels and content inspection warning when new files are detected in connected apps.
Microsoft Cloud App Security
MCAS components that provide information protection capabilities include:
- File Policies – can be configured to detect sensitive information stored within cloud apps.
- Admin Quarantine – creates alerts when files are matched against an MCAS file policy and stored for administrative review.
- Activity policies – monitors user activities within cloud applications15.
- Session policy – provides real-time monitoring and control of user activities within authenticated sessions to identified cloud apps16.
Application security monitoring
Microsoft provides resources for patching the CloudSystem’s operating system and Microsoft’s O365 applications. The Agency is responsible for configuring and deploying software applications to the operating system. As a result, the Agency is responsible for security controls of applications including:
- Application discovery;
- Conditional application access; and
- Application Control.
Agencies can collect continuous monitoring data of application security controls through technologies implemented as part of the CloudSystem including:
- Microsoft Cloud App Security; and
- Windows Defender Application Control.
Microsoft Cloud App Security
Application discovery
MCAS utilises application discovery policies to monitor and discover new unapproved cloud applications and detect anomalous activities within connected, approved cloud applications. Refer to Create Cloud Discovery policies.
Conditional application access
MCAS integrates with Azure AD Conditional Access to provide conditional application access controls. Agencies can configure access and session control policies to provide users with access to applications based on specific conditions (e.g. device compliance) and monitor a user’s session whilst interacting with applications18.
Windows Defender application control
Application Control
Windows Defender Application Control (WDAC) provides the Agency with policies to detect and restrict unapproved applications that users are attempting to run, as well as restrict the code that runs in the System Core (kernel). WDAC policies can be run in audit mode to discover any applications that were installed or run since the policy was created.
Network security monitoring
The Agency leveraging the CloudSystem is responsible for configuration and ongoing management of the network rules and network security requirements within the CloudSystem. As a result of this, the Agency is also responsible for monitoring the effectiveness of network security controls within the CloudSystem including:
- Endpoint Malware Detection;
- Host-based Firewalls; and
- Device Monitoring and Management.
The Agency can collect continuous monitoring data pertaining to user network security through technologies defined in this section.
Microsoft Defender Antivirus
Microsoft Defender Antivirus provides anti-malware and spyware protection of client devices. These protections include utilising always-on scanning, scanning of downloaded files, dedicated protection updates and cloud-delivered protection.
Endpoint Malware Detection
- Microsoft Defender Exploit Guard – provides Host-based Intrusion Protection System (HIPS) capabilities21.
- Microsoft Defender SmartScreen – provides malware and phishing website protection including validating sites against a list of known malicious sites and downloaded files against a dynamic list of common files22.
Host-based Firewall
- Microsoft Defender Firewall – provides stateful inspection and blocking of network traffic. Windows Defender Firewall blocks unauthorised network traffic flowing into and out of the client endpoint reducing the attack surface of the device.
Microsoft Cloud App Security
Microsoft Cloud App Security (MCAS) is a Cloud Access Security Broker (CASB) that supports various deployment modes including log collection, API connectors, and reverse proxy.
Device identification
MCAS and Conditional Access App Control can identify managed devices within the organisation. Devices that are present in Intune are automatically synchronised to MCAS.
Microsoft’s security advisories
As a consumer of Microsoft’s cloud products, the Agency is responsible for collecting Microsoft’s security advisories and assessing potential impact to the system’s ongoing authorisation. Security advisories should be assessed in accordance with the system’s time and event driven authorisation processes. Refer to Anatomy of a Cloud Assessment and Authorisation.
Security testing and assurance activities
To identify potential vulnerabilities, the Agency should perform penetration tests and vulnerability assessments on endpoint devices permitted to access the CloudSystem. When determining the required frequency for security testing and assurance activities, agencies should consider their current threat environment and risk tolerance. In line with ISM requirements, vulnerability assessments and penetration tests should be performed on endpoints at least annually. Refer to Guidelines for Security Documentation.
As a consumer of Microsoft’s cloud products, the Agency is not able to perform testing and assurance on system components managed by Microsoft. The Agency can verify Microsoft’s IRAP assessment status via Microsoft’s Service Trust Portal.
Aggregation of continuous monitoring information
Continuous monitoring information is aggregated into security management dashboards to facilitate monitoring performed by the Agency’s security team. Additionally, technologies within the CloudSystem can integrate with the Azure Sentinel Security Information and Event Management (SIEM) solution.
Security management dashboards
Security management dashboards facilitate the aggregation of security alerts for analysis.
Microsoft Cloud App Security
MCAS integrates with Microsoft Defender ATP, Azure AD Identity Protection, Azure AD Conditional Access, Azure Information Protection and Windows Defender Application Control to provide a centralised dashboard containing system security alerts and other continuous monitoring information including:
- Number of open alerts;
- Discovered apps;
- Users with high investigation priority;
- Application sessions and actions;
- Malware-infected files;
- Azure security configuration recommendations; and
- DLP alerts.
The Agency can utilise the MCAS security management dashboard to monitor the ongoing security posture of the CloudSystem and collect information for reporting.
Microsoft Defender ATP Security Centre
In addition to the MCAS integration, Microsoft Defender ATP also provides its own dashboard to aggregate and display events originating from:
- Microsoft Defender Antivirus;
- Windows Defender Application Guard;
- Windows Defender Device Guard;
- Windows Defender Exploit Guard; and
- Windows Defender SmartScreen.
Other host-based events such as registry, memory allocation and process events are discoverable in Microsoft Defender ATP Security Centre.
SIEM integration
For the purposes of aggregating continuous monitoring data for analysis, the Agency is able to integrate CloudSystem technologies with the Azure Sentinel SIEM product. Azure Sentinel gathers logs and system monitoring information and provides alert detection and visibility of system events.29
Microsoft Cloud App Security
In cloud-native implementations, MCAS supports native integration with Azure Sentinel and the Microsoft Security Graph API. Azure Sentinel is Microsoft’s cloud native SIEM offering, while the Security Graph API provides additional partner integration solutions e.g. the Microsoft Graph Security API Add-On for Splunk.
Analysing monitoring information
Performing analysis
Continuous monitoring information should be analysed to determine if there are vulnerabilities in the CloudSystem’s configuration or deficiencies in the CloudSystem’s security controls. When a vulnerability or control deficiency is identified, the Agency should use a risk-based approach to analysis. A risk assessment should be performed on the vulnerability or control deficiency in accordance with the Agency’s risk assessment process defined in their Security Risk Management Plan (SRMP).
Once the risk has been identified and assessed, the risk’s rating should be compared against the Agency’s risk tolerance levels. Next actions and mitigation options should be considered according to their ability to meet an acceptable level of risk.
Responding to vulnerabilities and deficiencies
Applying risk treatments
Once a risk-based analysis of the identified system security deficiencies has been performed, the Agency should decide their next actions in accordance with their risk appetite. The Agency may choose to:
- Mitigate;
- Accept;
- Transfer; or
- Avoid the risk.
Patching technologies
Many security weaknesses identified through monitoring and assurance activities are resolved through installing software patches. If patches are required to mitigate a system vulnerability, the following CloudSystem technologies can deploy software updates and security patches:
- Windows Server Update Service – WSUS enables administrators to deploy the most recent Microsoft updates, control what updates are applied and when.
- Microsoft Intune – Windows Update for Business provides management policies for several types of updates to Windows 10 devices:
- Feature updates: security and quality revisions, significant feature additions and changes;
- Quality updates: traditional operating system updates, including security, critical, and driver updates. Windows Update for Business also treats non-Windows updates (such as those for Microsoft Office or Visual Studio) as quality updates;
- Driver updates: non-Microsoft drivers that are applicable to managed devices; and o Microsoft product updates: updates for other Microsoft products, such as Office.