Industry: Communications
Size: 25 – 50 staff
Problem Summary: Our client faced a new type of vendor security screening in order to retain Client X, their largest client and a global leader.
In the past, Client X only required self assessed IT security questionnaires from everyone they do business with.
Due to rising cyber threats across the globe, Client X now requires all channel partners to pass a formal IT security audit.
To help our client create a secure environment and to meet NIST best practices, we used Azure Active Directory as the framework for connecting users, computers and cloud applications. We paired it with Apple Business Manager to control device provisioning, and extensive data loss prevention policies with Microsoft tools.
The result is a secure network and stringent company wide policies that can meet and exceed any compliance audit they may face from existing and new data security conscious clients.
Apple Business Manager connected to Entra ID and Microsoft InTune is used to bind Mac devices, applications, and managed Apple ID’s, allowing us to grant or deny access to company data hosted in the cloud. In addition, advanced compliance controls are necessary for this audit and this combination of tools allows our client to pass annual IT audits.
EntraID is Microsoft’s multi-tenant, cloud-based directory and identity management service. It combines core directory services, advanced identity governance, and application access management.
Enforcement of data labelling policies to classify files that may contain sensitive information and apply security controls to those file (i.e. tag a file as “confidential” or “Client X”, which will encrypt it, water mark it, prevent it from being shared, forwarded, printed etc).
Retention labels to maintain specific time frames for automated deletion of Client X’s files.
Data logging for any activity against any service, on any device, that may access Client X’s data.
Azure Sentinel is the SIEM – a repository for all log files generated from all devices and connected cloud services. Log files are kept for a specific length of time to investigate potential data breaches.
Microsoft Cloud App Security (CASB) is used for anomalous activity detection for connected computers and cloud services. These log files are also stored in Azure Sentinel. CASB generates security alerts and notifications with severity levels, which are actioned by TUCU.
a very high level of security
set us up to win more clients
We are a group of diversified IT security professionals providing solutions for small business & NPO teams.