NIS2 Compliance with Microsoft Security and METCLOUD & Chorus MXDR

Page 1


NIS2Compliance withMicrosoftSecurityand

NIS2isthenewEuropeancybersecuritydirectivethataimstoestablishabaselineofsecuritymeasurestomitigatethethreatof risingcyberattacksandtoimprovetheoveralllevelofcybersecurityintheEuropeanUnion NIS2buildsupontheexistingNIS directiveandwillcomeintoeffectfrom17thOctober2024

Today organisations and facing rising cyber threats with attacks becoming more frequent and more sophisticated. With multicloud environments, remote and hybrid working and increasing devices, organisations need to adopt a modern zero trust strategy. As a result, good cybersecurity hygiene is vital. Whilst this should be a priority for all organisation regardless, NIS2 enforces this at legislation and brings worse repercussions for both organisations and individuals with high fines and managementbeingheldresponsiblefornon-compliance.

NIS2CompliancewithMicrosoft

NIS2Requirements&Objectives

A3:Asset Management Managesecurityrisk

A1: Governance

A4:Supply Chain A2:Risk Management

Protectingagainstcyber attacks

B1:Service Protection Policies& Processes

B3:Data Security

B5:Resilient Networks& Systems

B2:Identity &Access Control

B3:System Security

B6:Staff Awareness& Training

C1:Security Monitoring Detectingcybersecurity incidents

C2:Proactive Security Event Discovery

Minimisingtheimpactof cybersecurityincidents

D1:Response &Recovery Planning

HowMETCLOUD&ChorusMDR&MXDRservicessupportNIS2compliance NIS2objectivesareessentiallysplitintotwoareas:

• Prevention:A)ManagingsecurityriskandB)Protectingagainstcyberattacks

D2:Lessons Learned

Response:C)Detectingcybersecurity incidentsandD)Minimisingtheimpactofcybersecurityincidents

AsanMSSPprovidingMDR&MXDRservices,wedetectandrespondtosecuritythreatstohelpminimisetheimpact ofcybersecurityincidents Bypartneringwithus,wehelporganisationsmeetobjectivesC&D

C:Detectingsecurityincidents

C1:SecurityMonitoring

Duringonboarding,wesetupallthenecessary configurationstepswithinyourtenancytocollate logsfromallofyouressentialfunctions Weprovide extensivemonitoringofalluseranddeviceactivity withinyourorganisation Logsarereviewedinrealtimeandalertsareconsistentlyinvestigatedbyour teamofsecurityexperts.

C2:ProactiveSecurity

EventDiscoveryThroughmultiplethreat intelligencefeedsandbehaviouralanalysis,we analysesuspectedattackvectorsandproactively respondtounknownthreatsbeforetheytakeafoot hold METCLOUD&Chorusregularlyperform threathuntingexercisestoprovidecontinuous serviceimprovement

D:Minimisingtheimpactofsecurityincidents

D1:ResponseandRecoveryPlanning

Weuseresponseplaybooksduringincidentinvestigationto containthreatsandlimitthelateralmovementofanattack WhilstMETCLOUD&Chorushaveanextensiveincident responseplan,weworkwithyourorganisationtofeed directlyintoyourIncidentResponseandDisasterRecovery plans.

D2:LessonsLearned AllCSOCrolesaredefinedbyaRACImatrixsosecurity personnelunderstandtheirresponsibilities Afterevery incident,rootcauseanalysisisundertakenbyleadanalysts toassessanyvulnerabilitiesthattheattackerleveraged, whichthenfeedsintoarobustchangemanagement process Notonlyarethetechnicalelementsassessedinthe rootcauseanalysisbutalsopost-incidenttheentireincident timelineisreviewedina“LessonsLearned”meetingto maintainthehighestpossiblelevelofintegrity

NIS2ComplianceMicrosoft

UsingMicrosofttechnologiestohelpmeetNIS2requirements

AsleaderinMicrosoftsecurity,wehelporganisationsmaximisethevaluefromtheirMicrosoftlicensingandensurebestpractice implementationofavailablesecuritytooling OurMDR&MXDRservicesarebuiltonMicrosoftSentinelandMicrosoftDefender XDRandaspartofserviceonboardingwecanalsosupporttheimplementationofthevarioustoolswithinMicrosoft365,which supportwithmeetingtheprincipleswithinB

ThefollowingtableshowswhatMicrosoftsolutionscanbeusedtohelpmeetNIS2principles.

NIS2Principles

Governance

RiskManagement

AssetManagement

SupplyChain

ServiceProtection

Identity&Access

DataSecurity

SystemSecurity

ResilientNetworks

StaffAwareness

SecurityMonitoring

ProactiveSecurity

Response&Recovery

LessonsLearned

DefenderCSPM,Entra

DefenderXDRandPurviewComplianceManagerandInsiderRiskManagement

DefenderCSPM,DefenderforEndpoint

DefenderXDR,EntraandDevOps

DefenderforAPI

Entra

Microsoft365Purview(InformationProtection,DataLossPrevention,InsiderRiskManagement)

DefenderforEndpoint,DefenderforIoTandIntune

AzureNetworkSecurity

O365PhishingSimulation,LearningPaths,PolicyTipsinPurview MicrosoftSentinel

DefenderXDR

ManagedDetection&Response(MDR)or ManagedExtendedDetection&Response (MXDR) DefenderXDR,AzureBackupandRecovery

N/A

WhilstthesesolutionswillhelpyourjourneytoNIS2compliance,itisimportanttonotethattechnologyalonedoesnotmeet theserequirements HavingthecorrectpoliciesandproceduresareacorepartofNIS2complianceandorganisationsneedto coverpeople,processesandtechnologies

Aspartoftheonboardingprocess,wewillcovervariousaspectsofObjectiveB;however,ifwedonotsatisfythe objectiveinitsentirety,wewillbeabletoadviseonhowyoucanachieveit Theelementsoftheonboarding configurationwillcoveraspectssuchas:

IdentityverificationsuchasMulti-FactorAuthentication(MFA)willbeenforced

UserriskandSign-Inriskdependingonthelicense

Dedicatedmanageddevicesandconditionalaccesswillalsoprovideassurancesagainstdevicecompliance

Constantmonitoringofelevatedprivileges

DataSecurity

Wearesecurebydesignandprovidesecureconfigurationsettings

VulnerabilityManagement

NIS2ComplianceMicrosoft

NIS2FAQs

HowdoIbecomeNIS2compliant?Thefirststepistocarryoutaselfassessmentonyourorganisationtounderstandwhereyourweaknesses exist Followingthis,carryoutariskassessmentofthesefindingsand mitigatetheserisksaccordingly Thiswillbeasecurityimprovementjourney inwhichtheorganisationwillliaisewiththeircomplianceauthorityatregular intervals Ifyouneedanyhelpwiththisthenpleasereachouttous IsNIS2applicableintheUK?

NIS2willnotapplytotheUKdirectly,howevertheUKisplanningits ownNISchanges,whichareexpectedin2024

WhereshouldIstartwithmyNIS2journey?

ReachouttoNCSC(NationalCyberSecurityCentre)oryour CertifyingAuthoritytodownloadaselfassessmentform

NIS2comesintoeffect17October 2024.Ifyouwouldliketochatabout howtogetready,pleasereachoutto us

METCLOUDstandsattheforefrontofinnovation,harnessingcutting-edgetechnologies,includingsophisticatedcyberdefense,surveillance, ArtificialIntelligence(AI),andMachineLearning(ML) Thisformidablearsenalempowersorganisationstofortifytheirdigitaldefences,ensuringa secure,resilient,andefficientoperation OurMicrosoftMDR&MXDRServices

AdvancedManagedthreat detectionandcontainmentservice forendpointprotectionwith MicrosoftDefenderforEndpoints

Extendedthreatdetectionand containmentacrossidentity, network,email,infrastructure,data andapplicationsusingMicrosoft securitytooling

Extendedthreatdetection& containmentacrossidentity,network, email,infrastructure,dataand applicationsusingMicrosoftsecurityand thirdpartytooling

Ifyouhaveanyquestionsorwishtofindoutmoreabout ourservices,pleasecontactus.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.