Page 102 - Cyber Defense eMagazine Annual RSA Edition for 2024
P. 102

Moving Beyond MFA: A Layered Security Approach

            Although MFA is one of the best security measures for O365 applications, it is vulnerable to certain types
            of cyberattacks. Defending your data with more advanced threat protection measures is imperative.

            For an effective cybersecurity defence, you need a layered security approach, also known as defense in
            depth. This approach simply means applying multiple countermeasures alongside MFA to substantially
            bolster your cyber defenses. It helps prevent single points of failure and provides multiple opportunities
            to deactivate a threat more efficiently.


            A layered approach enables your business to prevent, detect, and respond to risks through organised
            threat intelligence, risk mitigation strategies, and continuous improvement based on attack history.

            Leaving your O365 data vulnerable is not a wise step. Go beyond MFA and maximise your data protection
            with these additional security protocols:



            Data Loss Prevention (DLP)


            The DLP layer comprises people, tools, and processes that help prevent data loss, unauthorised access,
            and  intentional  or  accidental  data  leakage  by  limiting  access  to  sensitive  data. The  O365  platforms
            provide DLP tools that you can access to set rules for detecting, tracking, and automatically securing
            sensitive data.

            Consider this: In July 2023, a Chinese threat actor group exploited a validation flaw in Azure AD of the
            M365 cloud to access unclassified emails in several US government agencies. Had they implemented
            DLP processes, they could have restricted access to sensitive data and monitored outgoing emails for
            suspicious activity.



            User Behavior Analytics (UBA)

            With UBA, you can gather and analyse user activities to establish benchmarks for their behaviour. For
            example, you can track logins, data transfers, document accesses, and system usage. It helps you detect
            suspicious behaviour such as:

               •  Logins at unusual times or locations
               •  Multiple failed login attempts
               •  Suspicious data access/transfers by unauthorised employees
               •  Unauthorised cloud storage or traffic spikes

            Further, you can assess these activities against the benchmarks to detect compromised accounts, insider
            threats, or other malicious activities and stop them from escalating into a full-blown attack.









                                                                                                            102
   97   98   99   100   101   102   103   104   105   106   107