Skip to content

Commit

Permalink
Integrate OCC review feedback into Power Platform baseline (#717)
Browse files Browse the repository at this point in the history
* Updated with OCC comments

* Update baselines/powerplatform.md

Co-authored-by: David Bui <[email protected]>

* missed formatting for instructions

* removing acknowledgements section

* Update baselines/powerplatform.md

Co-authored-by: David Bui <[email protected]>

* Updated 1.2.1 instructions

---------

Co-authored-by: David Bui <[email protected]>
  • Loading branch information
ahuynhMITRE and buidav authored Dec 13, 2023
1 parent f313fed commit 291150d
Showing 1 changed file with 4 additions and 42 deletions.
46 changes: 4 additions & 42 deletions baselines/powerplatform.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,11 +8,7 @@ The Secure Cloud Business Applications (SCuBA) project run by the Cybersecurity

The CISA SCuBA SCBs for M365 help secure federal information assets stored within M365 cloud business application environments through consistent, effective, and manageable security configurations. CISA created baselines tailored to the federal government’s threats and risk tolerance with the knowledge that every organization has different threat models and risk tolerance. Non-governmental organizations may also find value in applying these baselines to reduce risks.

The information in this document is provided "as is" for INFORMATIONAL PURPOSES ONLY. CISA does not endorse any commercial product or service, including any
subjects of analysis. Any reference to specific commercial entities or commercial
products, processes, or services by service mark, trademark, manufacturer, or
otherwise does not constitute or imply endorsement, recommendation, or favoritism
by CISA.
The information in this document is being provided "as is" for INFORMATIONAL PURPOSES ONLY. CISA does not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial entities or commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoritism by CISA. This document does not address, ensure compliance with, or supersede any law, regulation, or other authority. Entities are responsible for complying with any recordkeeping, privacy, and other laws that may apply to the use of technology. This document is not intended to, and does not, create any right or benefit for anyone against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

> This document is marked TLP:CLEAR. Recipients may share this information without restriction. Information is subject to standard copyright rules. For more information on the Traffic Light Protocol, see https://www.cisa.gov/tlp.
Expand Down Expand Up @@ -127,7 +123,7 @@ The ability to create trial environments SHALL be restricted to admins.
**Only specific admins.**

#### MS.POWERPLATFORM.1.2v1 Instructions
1. Follow the instructions the MS.POWERPLATFORM.1.1v1 instructions up to step **3**.
1. Follow the MS.POWERPLATFORM.1.1v1 instructions up to step **3**.

2. Under **Who can create trial environments**, select **Only specific admins.**

Expand Down Expand Up @@ -167,7 +163,7 @@ A DLP policy SHALL be created to restrict connector access in the default Power
<!--Policy: MS.POWERPLATFORM.2.1v1; Criticality: SHALL -->
- _Rationale:_ All users in the tenant have access to the default Power Platform environment. Those users may inadvertently use connectors that share sensitive information with others who should not have access to it. Users requiring Power Apps should be directed to conduct development in other Power Platform environments with DLP connector policies customized to suit the user's needs while also maintaining the agency's security posture.
- _Last Modified:_ June 2023
- _Note:_ The following connectors drive core Power Platform functionality and enable core Office customization scenarios: Approvals, Dynamics 365 Customer Voice, Excel Online (Business), Microsoft DataverseMicrosoft Dataverse (legacy), Microsoft Teams, Microsoft To-Do (Business), Office 365 Groups, Office 365 Outlook, Office 365 Users, OneDrive for Business, OneNote (Business), Planner, Power Apps Notification, Power BI, SharePoint, Shifts for Microsoft Teams, and Yammer. As such these connectors remain non-blockable to ensure core user scenarios remain fully functional.
- _Note:_ The following connectors drive core Power Platform functionality and enable core Office customization scenarios: Approvals, Dynamics 365 Customer Voice, Excel Online (Business), Microsoft DataverseMicrosoft Dataverse (legacy), Microsoft Teams, Microsoft To-Do (Business), Office 365 Groups, Office 365 Outlook, Office 365 Users, OneDrive for Business, OneNote (Business), Planner, Power Apps Notification, Power BI, SharePoint, Shifts for Microsoft Teams, and Yammer. As such these connectors remain non-blockable to maintain core user scenario functions.

#### MS.POWERPLATFORM.2.2v1
Non-default environments SHOULD have at least one DLP policy affecting them.
Expand Down Expand Up @@ -291,7 +287,7 @@ An inbound/outbound connection allowlist SHOULD be configured.
3. Set the slider in the center of the screen to **On** then click **Save**
on the bottom of the screen.

#### MS.POWERPLATFORM.3.2v1 instructions:
#### MS.POWERPLATFORM.3.2v1 Instructions
1. Follow steps **1 and 2** in **MS.POWERPLATFORM.3.1v1 instructions** to
arrive at the same page.

Expand Down Expand Up @@ -381,38 +377,4 @@ Discover the valid endpoint parameter [here](https://learn.microsoft.com/en-us/p
Set-TenantSettings -RequestBody @{ “disablePortalsCreationByNonAdminUsers” = $true }
```

# Acknowledgements

In addition to acknowledging the important contributions of a diverse
team of Cybersecurity and Infrastructure Security Agency (CISA) experts,
CISA thanks the following federal agencies and private sector
organizations that provided input during the development of the Secure
Cloud Business Application's security configuration baselines in
response to Section 3 of [Executive Order 14028, *Improving the
Nation's
Cybersecurity*](https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity):

- The MITRE Corporation
- Sandia National Laboratories (Sandia)

The SCBs were informed by materials produced by the following organizations:

- Center for Internet Security (CIS)
- Internet Engineering Task Force (IETF)
- Mandiant
- Microsoft
- U.S. Defense Information Systems Agency (DISA)
- U.S. National Institute of Standards and Technology (NIST)
- U.S. Office of Management and Budget (OMB)

The cross-agency collaboration and partnerships developed during this initiative serve as an example for solving complex problems faced by the federal government. CISA also thanks the Cybersecurity Innovation Tiger Team (CITT) for its leadership and the following federal agencies that provided input during the development of the baselines:

- Consumer Financial Protection Bureau (CFPB)
- U.S. Department of the Interior (DOI)
- National Aeronautics and Space Administration (NASA)
- U.S. Office of Personnel Management (OPM)
- U.S. Small Business Administration (SBA)
- U.S. Census Bureau (USCB)
- U.S. Geological Survey (USGS)

**`TLP:CLEAR`**

0 comments on commit 291150d

Please sign in to comment.