Summer Regulatory Summit eBook
Risks of 365 Configuration Gaps
• Overprivileged Administrator Roles : • Too many Global Administrators with extensive permissions • If compromised, can result in unauthorized access and backdoors • Lack of Multi-Factor Authentication : • Exploitation of weak/stolen credentials without additional layer of authentication • Phishing Attacks : • Inadequately configured environments become targets • Exploit enterprise applications to gain access to data or compromise user accounts • Audit Log Neglect : • Lack of monitoring audit logs leave organizations blind to suspicious activity • Detection of anomalies and security incidents • Authorization Misconfiguration : • Potentially allow external parties unauthorized access to applications • Crucial to preventing data exposure
12
Made with FlippingBook Digital Publishing Software