Enterprise 3 Build 2 (E3B2) - EIG Run - Microsoft Azure AD Conditional Access (later renamed Entra Conditional Access), Microsoft Intune, Forescout eyeControl, and Forescout eyeExtend as PEs Product Guides#
Note
This page is supplementary material for the NIST SP 1800-35 publication.
This section of the practice guide contains detailed instructions for installing, configuring, and integrating all the products used to implement E3B2. For additional details on E3B2’s logical and physical architectures, please refer to Architecture and Builds. Build 2 was built on top of Build 1 and all the components in Build 1 were used in this build. For E3B1’s configuration please refer to Enterprise 3 Build 1. Below are the additional components added to Build 2.
Microsoft Azure AD Identity Protection#
This section offers a guide for setting up the various components that make up Azure AD Identity Protection in your environment.
To ensure that all users register for multifactor authentication, configure Azure AD Multifactor Authentication registration policy using the information found at Configure MFA Registration Policy.
Sign-in risk policy enables detection of and response to suspicious logon sessions and unusual logon activity. Use the information found at Configure Sign-in Risk Policy to configure the sign-in risk policy.
User-risk policy enables detection of and response to compromised user accounts. To configure this policy, use the information found at Configure User-Risk Policy.
Microsoft Azure AD Identity Governance#
Azure AD Identity Governance enables organizations to manage access to resources applying access request and approval workflows, access assignments and removals, access expiration, and access reviews.
Create an access package to encapsulate the target resources in a single object.
Create policies to define approvers and eligible requestors.
Requesting access to the access package can be done using the information found at Request access.
To approve or deny access requests, use the information found at Approve or deny request.
Microsoft Defender for Cloud Apps#
(Note that the product name Defender for Cloud Apps was later changed to Defender for Apps)
Microsoft Defender for Cloud Apps is a cloud access broker solution that protects cloud applications and on-premises web applications by monitoring session activity to those applications, ensuring compliance to defined policy and mitigating detected threats.
Login to the portal and activate your Defender for Cloud Apps tenant.
Connect your apps to Defender for Cloud Apps. For custom web applications including on-premises web applications, use the information on connecting a custom app to Defender for Cloud Apps to integrate your custom web applications.
Use the information on creating and assigning policies to provide security controls to apps, ensuring compliance and mitigating threats.
Deploy Conditional Access App Control, which leverages Azure AD conditional access policies and enforcement for connected apps.
Microsoft Azure AD Application Proxy#
Azure AD Application Proxy enables users to securely connect to internal applications via the Internet. It has two components, Application Proxy service and Application Proxy connector, which work together to provide access to the internal application.
Configure Application Proxy deployment prerequisites.
Install and register the Application Proxy connectors. Once the application proxy connectors are successfully installed and registered, the Application Proxy service will be enabled automatically.
Add your application to Application Proxy.
Microsoft Defender for Cloud#
Defender for Cloud is a SaaS-based cloud security posture management and cloud workload protection platform. It enables organizations to monitor their cloud and on-premises resources, determine differences and security issues based on benchmarks and regulations, and provide recommendations to help remediate the issues. Within Defender for Cloud, benchmarks and regulations encapsulate policies that are used as baselines to measure how compliant your environment is. This leads to the generation of a secure score.
Enable Defender for Cloud for your subscription.
To receive a secure score, which provides a numeric value indicating your point-in-time security posture, you must ensure that the Azure Security Benchmark initiative or at least one other listed regulation is selected and applied to your subscription. Azure Security Benchmark should automatically apply to your subscription. Examples of regulations include PCI DSS, HIPAA, and NIST SP 800-53. Azure Security Benchmark is comprised of a set of controls that detect security misconfigurations based on best practices from common compliance frameworks.
Defender for Cloud will list recommendations for your environment to improve the security posture. Apply the listed security recommendations.
Forescout eyeSight#
Forescout eyeSight provides asset discovery with both active and passive techniques, and through integrations with network and security infrastructure.
For installation, configuration, and integration instructions, refer to Forescout eyeSight.
Forescout eyeControl#
Forescout eyeControl enforces and automates network policies across the enterprise.
For Forescout eyeControl installation instructions, visit the Forescout Installation Overview.
Configuring a policy#
In the Forescout Console, choose a policy.
Select the network segment to which the policy will be applied.
Add Conditions to select the attributes of the hosts that the policy will be applied to.
Add Actions that will be applied to the selected hosts.
Add any additional rules that will be used in the policy.
Run the policy.
Forescout eyeSegment#
Forescout eyeSegment accelerates zero trust segmentation through visibility into traffic and transaction flows.
For Forescout eyeSegment installation instructions, visit the Forescout Installation Overview. After installation has been completed, visit the eyeSegment Application How-to Guide to configure and use eyeSegment to analyze your network traffic from a dynamic zone perspective, simplify segmentation planning, and automate access control list (ACL)/VLAN assignment.
Access the eyeSegment Dashboard#
From the Forescout Console, click Dashboards. This will launch a web browser and authenticate to the Forescout Web Client.
At the top of the Forescout Web Client, click Segmentation.
The initial dashboard is the eyeSegment Matrix. This dashboard can be used to analyze traffic and transaction flows between different network hosts, segments, and groups.
Open the eyeSegment Policy dashboard, which can be used to apply proposed zero trust rules. The effect of these rules can be seen in the eyeSegment Matrix.
Open the eyeSegment Health dashboard, which provides information about Reporting Appliances, Traffic Sensors, Endpoint Coverage, and the connection to the eyeSegment cloud.
Forescout eyeExtend#
Forescout eyeExtend automates security workflows across disparate products through integration with other security technologies.
For Forescout eyeExtend installation instructions, visit the Forescout Installation Overview. Once installation has been completed, visit the Connect Plugin Configuration Guide, which provides the capability to build custom integrations with products that are not already provided. However, Forescout also provides a wide range of integrations at the official Forescout eyeExtend repository.
Integration with Microsoft Endpoint Manager#
Integration instructions for Microsoft Endpoint Manager can be found at Forescout’s official GitHub repository: Forescout/eyeExtend-Connect.
Microsoft Azure IaaS#
Azure IaaS provides compute, networking, and storage services that enable the creation of an enterprise IT infrastructure by subscribers. The following section describes the Azure IaaS components that were deployed in this build.
Virtual Networks (VNETs) are isolated customer networks. They contain subnets and are built in Azure. We have three VNETs: a hub VNET, which provides central connectivity for other VNETs, and a GitLab VNET and a WordPress VNET, which are both designed to protect individual apps and their associated resources. Use the information at Create a VNET to create and configure a virtual network. To enable communication between the hub and other VNETs, establish peering between them.
Public VNETs are regular VNETs that have hosts with public IP addresses. The GitLab VNET is configured as a public subnet with a public IP address attached to the Application Gateway which was configured to provide load balancing and protection against common web attacks.
Private VNETs are regular VNETs that have hosts with only private IP addresses and are reachable only by internal users by default. WordPress VNET was configured as a private VNET.
Configure Azure Bastion to enable web-based SSH and remote desktop-based access to servers and virtual machines.
Instantiate and configure Azure Firewall in the hub VNET to provide protection for incoming traffic from both the Internet and the VPN traffic from on-prem clients.
Use network security groups (NSGs) to filter inbound or outbound traffic to or from Azure resources. Enable only ports that are necessary for appropriate access.
Azure App Gateway is a web traffic load balancer that can detect and stop common web attacks. The Azure App Gateway was configured to protect the GitLab application servers, and the WordPress servers. Use the information at Application Gateway Quickstart to configure the Application Gateway.