CIS Microsoft 365 Foundations E3 L2 v1.4.0

Audit Details

Name: CIS Microsoft 365 Foundations E3 L2 v1.4.0

Updated: 8/11/2022

Authority: CIS

Plugin: microsoft_azure

Revision: 1.0

Estimated Item Count: 21

File Details

Filename: CIS_Microsoft_365_v1.4.0_E3_Level_2.audit

Size: 56.3 kB

MD5: 95726ec729d5d55196c745704ab76bb2
SHA256: 1711ae16f49e06dcad7fc6af99281ed22085738bc182067c910c069bba67265e

Audit Items

DescriptionCategories
1.1.2 Ensure multifactor authentication is enabled for all users in all roles

IDENTIFICATION AND AUTHENTICATION

1.1.12 Ensure that only organizationally managed/approved public groups exist

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.1.13 Ensure that collaboration invitations are sent to allowed domains only

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.1.14 Ensure that LinkedIn contact synchronization is disabled.

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

1.1.16 Ensure the option to stay signed in is disabled

IDENTIFICATION AND AUTHENTICATION

2.1 Ensure third party integrated applications are not allowed

CONFIGURATION MANAGEMENT

2.2 Ensure calendar details sharing with external users is disabled

ACCESS CONTROL, MEDIA PROTECTION

2.6 Ensure user consent to apps accessing company data on their behalf is not allowed

ACCESS CONTROL, MEDIA PROTECTION

2.7 Ensure the admin consent workflow is enabled

CONFIGURATION MANAGEMENT

2.8 - Ensure users installing Outlook add-ins is not allowed

CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Ensure SharePoint Online Information Protection policies are set up and used

ACCESS CONTROL, MEDIA PROTECTION, RISK ASSESSMENT

3.3 Ensure external domains are not allowed in Skype or Teams

ACCESS CONTROL

3.6 Ensure that external users cannot share files, folders, and sites they do not own

ACCESS CONTROL, MEDIA PROTECTION

3.7 Ensure external file sharing in Teams is enabled for only approved cloud storage services

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

4.12 Ensure MailTips are enabled for end users

AWARENESS AND TRAINING, PROGRAM MANAGEMENT

5.4 Ensure the Application Usage report is reviewed at least weekly

AUDIT AND ACCOUNTABILITY

6.1 Ensure document sharing is being controlled by domains with whitelist or blacklist

ACCESS CONTROL, MEDIA PROTECTION

6.2 Block OneDrive for Business sync from unmanaged devices

ACCESS CONTROL, CONFIGURATION MANAGEMENT, MEDIA PROTECTION

6.4 Ensure external storage providers available in Outlook on the Web are restricted

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT, RISK ASSESSMENT

7.5 Ensure mobile devices are set to wipe on multiple sign-in failures to prevent brute force compromise

ACCESS CONTROL

7.12 Ensure mobile device management policies are required for email profiles

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION