Categories: HelpnetSecurity

CISA orders federal agencies to secure their Microsoft cloud environments


The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a binding operational directive (BOD 25-01) requiring federal civilian agencies to secure their (Microsoft) cloud environments.

About the CISA BOD 25-01 directive

The Implementing Secure Practices for Cloud Services directive sets out three deadlines for the agencies:

  • By February 21, 2025, they have to identify all cloud tenants within the scope of the directive and report to CISA.
  • By April 25th, 2025, they must deploy all available tools provided by CISA for automating the assessment of the state of configurations for in-scope cloud tenants. The tools compare tenant configurations to CISA’s Secure Configuration Baselines and provide reports that point out instances of non-compliance. The results must be reported to CISA, either by integrating the tool results feeds with CISA’s continuous monitoring solution, or manually (every quarter).
  • By June 20th, 2025,, they must implement secure cloud baselines as outlined here and “begin continuous monitoring for new cloud tenants prior to granting an Authorization to Operate (ATO)”

“In the future, CISA may release additional SCuBA Secure Configuration Baselines for other cloud products,” the agency explained. “As of December 2024, CISA has released finalized SCBs for Microsoft 365 (which is in scope for the BOD at issuance) and draft SCBs for Google Workspace (which are anticipated to enter scope in Q2, FY 2025).”

Secure configuration baselines for Microsoft 365 cloud services include those related to Azure AD/Entra ID, Microsoft Defender, Exchange Online, Power Platform, SharePoint Online & OneDrive, and Microsoft Teams.

As new updates to mandatory SCuBA policies are released, agencies must implement them by the due dates set by CISA.

Detailed BOD 25-01 directive implementation guidelines have been provided by the agency.

The offered guidance can also help other organizations

“Malicious threat actors are increasingly targeting cloud environments and evolving their tactics to gain initial cloud access. The actions required by agencies in this Directive are an important step in reducing risk to the federal civilian enterprise,” CISA Director Jen Easterly noted.

“While this Directive only applies to federal civilian agencies, the threat to cloud environments extends to every sector. We urge all organizations to adopt this guidance. When it comes to reducing cyber risk and ensuring resilience, we all have a role to play.”

Jason Soroko, Senior Fellow at Sectigo, says that enforcing secure configuration baselines reduces the attack surface – a critical defensive step.

“For a typical mid-sized business, implementing similar controls is costly. Tools, consultants, and training strain budgets. They have a hard enough time understanding the merits of MFA. They typically only have IT generalists who are motivated to keep the lights on rather than go through configurations with a fine toothed comb,” he commented for Help Net Security.

“Government guidance often influences private sectors, but adoption lags. Many firms resist due to cost and complexity. Still, clear government standards can slowly shift industry norms, but it normally only works if it forces vendors who are selling into government contracts.”




Source link

Cybernoz

Share
Published by
Cybernoz

Recent Posts

Hikvision Camera Driver Vulnerability Records Login details in Log files

A newly disclosed security vulnerability, tracked under CVE-2024-12569, has been identified in Hikvision camera drivers…

2 minutes ago

Hackers Weaponizing LNK Files To Create Scheduled Task And Deliver Malware Payload

TA397, also known as Bitter, targeted a Turkish defense organization with a spearphishing email containing…

10 minutes ago

AWS offers Hackney Council ‘minimum 22%’ discount on cloud services through OGVA 2.0

Hackney Council has committed to growing its annual usage of Amazon Web Services’ (AWS) cloud…

22 minutes ago

Malicious Supply Chain Attacking Moving From npm Community To VSCode Marketplace

Researchers have identified a rise in malicious activity on the VSCode Marketplace, highlighting the vulnerability…

48 minutes ago

New Mobile Phishing Targets Executives with Fake DocuSign Links

KEY SUMMARY POINTS Targeted Attacks: Sophisticated spear phishing campaigns are increasingly targeting corporate executives via…

52 minutes ago

The AI Threat: It’s Real, and It’s Here

We’re at a defining moment in cybersecurity that will determine organizational survival. Transform or be…

54 minutes ago