cisagov / ScubaGear

Automation to assess the state of your M365 tenant against CISA's baselines
https://www.cisa.gov/resources-tools/services/secure-cloud-business-applications-scuba-project
Creative Commons Zero v1.0 Universal
1.71k stars 222 forks source link

Consider Decoupling EXO/Teams from Defender #401

Open adhilto opened 1 year ago

adhilto commented 1 year ago

💡 Summary

Currently, for EXO/Teams controls that are implemented in Defender (or optionally by third party software), ScubaGear simply informs the user to check the Defender report and doesn't perform the appropriate check in-place. In the interest of reducing the number of grayed out results, we could consider performing the appropriate checks in-place, with a config option that switches off the tests if they are using a third party.

image

Motivation and context

Pros of doing the checks in-place:

Cons of doing the checks in-place:

Acceptance criteria

schrolla commented 1 year ago

I'd note that in future releases, now that Security & Compliance is nearly fully moved to REST API, the extra login for Connect-IPPSSession will go away. Just not yet, but once we update our requirements to use v3.2.0 or newer cmdlet and update our code to login to Defender using REST APIs (perhaps in Flipper).

tkol2022 commented 1 year ago

@schrolla @buidav This doesn't seem like something we are going to resolve in time for Emerald. Please place into the backlog if it makes sense.

schrolla commented 2 days ago

@adhilto Are there any updates needed for this to be workable? Things like policy omission are now configurable and may meet some of the requirements, for example.