Information sharing is deeply integrated into the day-to-day operation of any company. In the era of collaboration convenience and promptness have become the key aspects to consider when accessing information, and security is often overlooked. However, when providing access to partners outside the organization, security and privacy issues could arise.
Softline’s expert team has spent months understanding and mastering the possibilities provided by Microsoft 365 collaboration tools in terms of security and developed a practice on how to govern the external collaborators in an organization. External sharing can be an extremely challenging area from a security point of view, and here are the factors why:
Link sharing is too easy
As the link sharing option is allowed by default, sharing information has become natural and easy. Employees are used to the convenience it offers and rely on this solution when sending information to their partners.
Guest account management can be difficult
When guest invite is enabled, people can automatically invite any email accounts. These guests are created in the tenant, without really knowing who they are or how the guest account lifecycle management will be executed.
Information protection is a must
External sharing requires some level of protection and encryption to keep the content safe even months or years after sharing them. There are many setups available including the limitation of downloading, commenting, and editing. These settings require harmonized efforts and rules.
Collaboration governance is needed
Developing governance in a programmatic and process driven way can be another challenge. Which settings to implement on an organization level and how to control the Microsoft Teams groups should be elaborated and managed.
Must be prepared for audits
Audits can happen anytime. Although, the system captures all end-user activity, and everything is stored in Microsoft Graph, companies need to be prepared to extract the needed information for internal audits at any given time.
Too many services and tools to master
Just within the compliance service there are at least 4-5 tools to understand. Furthermore, PowerShell cross-platform task automation solution also needs to be included to harden the tenants with PowerShell scripts.
How to achieve secure external sharing
According to Microsoft best practices, Softline proposes three different levels of protection:
Tier 1: Baseline
All the external containers are private. This means that in Microsoft Teams groups, people can’t discover the external sharing groups, so they aren’t visible and only IT can create them. All the groups are audited, the content is labelled, and external sharing users are limited.
Tier 2: Sensitive
At this level, content encryption is introduced together with document watermarks and limited users of labels. When a document is shared it is encrypted and only authenticated users can use the content, and they can’t share it with others.
Tier 3: Highly sensitive
There are several documents that are needed to be shared externally but isolating and limiting the relevant users are crucial.
There are a lot of built-in data loss prevention capabilities included in Microsoft 365 services. Nevertheless, when creating and applying the rules, it is also important to factor in convenience. Zsolt Bátorfi, Softline’s Chief Cloud Adoption Advisor elaborated the importance of secure external sharing and provided new aspects to consider in the following presentation recorded at Infosek 2021 Conference.
If you are interested in tailor-made proposal on how to create a secure environment for external sharing contact our experts using the form below, and they can design a solution that is in align with your compliance and security standards.
Identiteta, končne naprave, aplikacije, omrežja, infrastruktura in podatki so pomembne povezave v celovitipovezavi varnostnega modela ničelnega zaupanja. Microsoft podpira model varnosti ničelnega zaupanja prek več obrambnih plasti. Preberite več o šestih plasteh modela ničelnega zaupanja in o tem, kako jih zaščititi.
Model ničelnega zaupanja temelji na preverjanju zaupanju. Model ničelnega zaupanja vzpostavlja strogo preverjanje identitete uporabnika in skladnosti naprave pred odobritvijo dostopa, ter zagotavlja dostop izključno pooblaščenim virom z minimalnimi pravicami.. V tem članku smo povzeli temeljne elemente modela ničelnega zaupanja.
Vsi želimo vedeti, kje vse so shranjeni naši podatki, tudi zato, da nadzorujemo, kdo jih lahko vidi ali ne. Oznake občutljivosti, ki jih zagotavlja rešitev Microsoft Information Protection, omogočajo organizacijam, da razvrščajo in varujejo svoje podatke s pomočjo oznak, ki jih digitalno dodajajo datotekam in elektronskim sporočilom.
At Softline, we help our customer achieve digital transformation and protect their business with cybersecurity technologies. During the upcoming months we deliver a series of free, English language webinars on various topics, which supports organizations along their way of digital transformation.