https://store-images.s-microsoft.com/image/apps.1189.6f17d76f-0520-4eb7-a952-c571596ca444.05109b80-641d-428d-82e2-e882f7f6d209.c148cff7-af35-4844-b367-244fddf15dc6

Assessment-Implementation Plan for Information Protection: 3-Months Assesment

Cipher (Prosegur Ciberseguridad SL)

From Cipher we will accompany you in the security of your Azure environments, creating and executing a completely customized security action plan that will guarantee the increase of your security.

Cipher will be your organization's partner for security and compliance management in the Microsoft 365 environment. You are responsible for protecting your data, identities, and devices, while Microsoft vigorously protects Microsoft 365 services. You can use Microsoft 365 and Enterprise Mobility + Security (EMS) (or Microsoft E5) to help you achieve the right level of protection for your organization. To achieve an adequate level of protection in your organization, Cipher will follow these steps:.

• Step 1: Review capabilities Based on best practices, you need to perform a review of the information protection capabilities within your Microsoft 365 instance. To do this, Cipher will review the applicable legislation in the organization, these regulations may require you to protect, manage, provide rights and control over the information stored in your IT infrastructure, even on-premises and in the cloud. For example, GDPR Microsoft tools help align local legislations with tools

• Step 2: Check your security score After you set up your Microsoft 365 subscription and review its capabilities. Relying on Secure Score tools, Cipher reverts settings to increase its score. Secure Score helps organizations to: • Report on the current status of the organization's security posture. • Improve your level of security by providing discoverability, visibility, guidance and control. • Compare with benchmarks and establish key performance indicators (KPIs).

• Step 3: Access protection for identity and devices We will perform the necessary tasks to protectaccess to your Microsoft 365 data and services, it is crucial to defend against cyber attacks and protect against data loss.

• Step 4: Data protection based on data sensitivity Cipher's team of professionals will review file protection capabilities organized by three levels of protection and plan them for any future modifications.

• Step 5: Microsoft 365 Security and Compliance Center Cipher using the Security and Compliance Center will give you a single view of the controls you'll use to manage the Microsoft 365 security spectrum, including threat management, data governance, and search and investigation.

• Step 6: Use end-to-end security scenarios as starting points Using best configurations and best practice guides, as a starting point for sophisticated or enterprise-scale access security scenarios. For example, the shall be defined: • Secure email policies and settings • User policies in Azure infrastructure • Multifactor

Sekilas

https://store-images.s-microsoft.com/image/apps.20841.6f17d76f-0520-4eb7-a952-c571596ca444.05109b80-641d-428d-82e2-e882f7f6d209.a4b194a9-abdb-415d-89ff-9400b977ea4c
/staticstorage/a2b1fad/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.65394.6f17d76f-0520-4eb7-a952-c571596ca444.05109b80-641d-428d-82e2-e882f7f6d209.d915d1f1-211d-4a12-b256-7d3c7d6b97d4
https://store-images.s-microsoft.com/image/apps.6630.6f17d76f-0520-4eb7-a952-c571596ca444.05109b80-641d-428d-82e2-e882f7f6d209.3da9cad2-d3ad-4fe7-ae26-68dae582733e
https://store-images.s-microsoft.com/image/apps.31888.6f17d76f-0520-4eb7-a952-c571596ca444.05109b80-641d-428d-82e2-e882f7f6d209.63704fe6-70d3-41ea-b9c6-b0d940cacdcd
https://store-images.s-microsoft.com/image/apps.13569.6f17d76f-0520-4eb7-a952-c571596ca444.05109b80-641d-428d-82e2-e882f7f6d209.dc45cf18-dcd9-4708-83f6-2157e5680d0d
https://store-images.s-microsoft.com/image/apps.58479.6f17d76f-0520-4eb7-a952-c571596ca444.05109b80-641d-428d-82e2-e882f7f6d209.1ea42478-5627-49bf-8ac1-3ecfbb5033d1