

Mechanisms for label inheritance shall be implemented for objects that act as aggregate containers for data. Policies and procedures shall be established for the labeling, handling, and security of data and objects which contain data. Be applied when new systems are configured and verified as in place before or immediately after a system component is connected to a production environment. Be updated as new vulnerability issues are identified, as defined in Requirement 6.3.1. Be consistent with industry-accepted system hardening standards or vendor hardening recommendations. Address all known security vulnerabilities. Ĭonfiguration standards are developed, implemented, and maintained to: Cover all system components.

Requesting MFA for both users and administrators, especially when a user accesses privileged portals.Users will have 14 days to comply before being required to do so. Requiring users to register for MFA using the Authenticator app.Security Defaults are now activated by default in all the newly created tenants since October 2019, and Microsoft is rolling them out to existing tenants who don’t have Conditional Access Policies enabled. If you wish to learn more about Conditional Access, I wrote a post about it: Also, Conditional Access Policies require Azure Active Directory Premium P1, and only some organizations are licensed for it. In more complex environments, going the Conditional Access way can be trickier to manage but provide more benefits, such as the ability to require access from known and compliant devices.

If you are currently using Conditional Access Policies, Security Defaults are probably not for you.

These settings are aimed at small and medium businesses that might not have an IT team with the knowledge or resources to manually set the standard for their environment. They can be enabled on a tenant with just one click. Security defaults are a set of security settings to help you protect your organization from the most common security threats. Security Defaults are one of the ways to establish a fundamental identity security baseline for your tenant.
