The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments.
The Implementing Secure Practices for Cloud Services directive sets out three deadlines for the agencies:
“In the future, CISA may release additional SCuBA Secure Configuration Baselines for other cloud products,” the agency explained. “As of December 2024, CISA has released finalized SCBs for Microsoft 365 (which is in scope for the BOD at issuance) and draft SCBs for Google Workspace (which are anticipated to enter scope in Q2, FY 2025).”
Secure configuration baselines for Microsoft 365 cloud services include those related to Azure AD/Entra ID, Microsoft Defender, Exchange Online, Power Platform, SharePoint Online & OneDrive, and Microsoft Teams.
As new updates to mandatory SCuBA policies are released, agencies must implement them by the due dates set by CISA.
Detailed BOD 25-01 directive implementation guidelines have been provided by the agency.
“Malicious threat actors are increasingly targeting cloud environments and evolving their tactics to gain initial cloud access. The actions required by agencies in this Directive are an important step in reducing risk to the federal civilian enterprise,” CISA Director Jen Easterly noted.
“While this Directive only applies to federal civilian agencies, the threat to cloud environments extends to every sector. We urge all organizations to adopt this guidance. When it comes to reducing cyber risk and ensuring resilience, we all have a role to play.”
Jason Soroko, Senior Fellow at Sectigo, says that enforcing secure configuration baselines reduces the attack surface – a critical defensive step.
“For a typical mid-sized business, implementing similar controls is costly. Tools, consultants, and training strain budgets. They have a hard enough time understanding the merits of MFA. They typically only have IT generalists who are motivated to keep the lights on rather than go through configurations with a fine toothed comb,” he commented for Help Net Security.
“Government guidance often influences private sectors, but adoption lags. Many firms resist due to cost and complexity. Still, clear government standards can slowly shift industry norms, but it normally only works if it forces vendors who are selling into government contracts.”
A newly disclosed security vulnerability, tracked under CVE-2024-12569, has been identified in Hikvision camera drivers…
TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing…
Hackney Council has committed to growing its annual usage of Amazon Web Services’ (AWS) cloud…
Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability…
KEY SUMMARY POINTS Targeted Attacks: Sophisticated spear phishing campaigns are increasingly targeting corporate executives via…
We’re at a defining moment in cybersecurity that will determine organizational survival. Transform or be…