Update level names and graphics, add additional descriptive text on intro page per issue 3252

This commit is contained in:
Chris Jackson 2019-05-27 16:27:50 -05:00
parent f76baac8bd
commit 0cec6d6878
5 changed files with 29 additions and 18 deletions

Binary file not shown.

Before

Width:  |  Height:  |  Size: 62 KiB

After

Width:  |  Height:  |  Size: 235 KiB

View File

@ -14,7 +14,7 @@ ms.topic: conceptual
ms.date: 04/05/2018 ms.date: 04/05/2018
--- ---
# Level 3 enterprise high security configuration # Level 3 Enterprise High Security configuration
**Applies to** **Applies to**

View File

@ -14,7 +14,7 @@ ms.topic: conceptual
ms.date: 04/05/2018 ms.date: 04/05/2018
--- ---
# Level 4 enterprise standard security configuration # Level 4 Enterprise Enhanced Security configuration
**Applies to** **Applies to**

View File

@ -14,7 +14,7 @@ ms.topic: conceptual
ms.date: 04/05/2018 ms.date: 04/05/2018
--- ---
# Level 5 enterprise basic security configuration # Level 5 Enterprise Basic Security configuration
**Applies to** **Applies to**

View File

@ -20,22 +20,19 @@ ms.date: 04/05/2018
- Windows 10 - Windows 10
Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. Security configuration is complex. When hardening your deployment of Windows 10, how should you prioritize the hardware you buy, policies you enforce, controls you configure, and behavior your staff exhibit?
Its not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of some security lockdowns.
Because of this, with each release of Windows, Microsoft publishes [Windows security baselines](https://docs.microsoft.com/windows/security/threat-protection/windows-security-baselines), an industry-standard configuration that is broadly known and well-tested. Even when configuring policies, With thousands of policies available in Windows, choosing the “best” setting is difficult. Its not always obvious which permutations of policies are required to implement a complete scenario, and there are often unintended consequences of security lockdowns. Because of this, with each release of Windows, Microsoft publishes [Windows security baselines](https://docs.microsoft.com/windows/security/threat-protection/windows-security-baselines), an industry-standard configuration that is broadly known and well-tested. However, many organizations have discovered that this baseline sets a very high bar for some scenarios.
However, many organizations have discovered that this baseline sets a very high bar.
While appropriate for organizations with very high security needs such as those persistently targeted by Advanced Persistent Threats, some organizations have found that the cost of navigating the potential compatibility impact of this configuration is prohibitively expensive given their risk appetite.
They cant justify the investment in that very high level of security with an ROI.
As such, Microsoft is introducing a new taxonomy for security configurations for Windows 10. To help you prioritize your endpoint hardening work, Microsoft is introducing a new taxonomy for security configurations for Windows 10. In this initial preview, we are simply listing recommended hardware, policies, controls, and behaviors in order to gather feedback from more customers and security experts in order to refine the framework and prioritize opportunities to automate.
This new security configuration framework, which we call the SECCON framework (remember "WarGames"?), organizes devices into one of 5 distinct security configurations.
This new security configuration framework, which we affectionately nickname the SecCon framework (remember "WarGames"?), organizes devices into one of 5 distinct security configurations.
![SECCON Framework](images/seccon-framework.png) ![SECCON Framework](images/seccon-framework.png)
- [Level 5 Enterprise Security](level-5-enterprise-security.md) We recommend this configuration as the minimum security configuration for an enterprise device. Recommendations for this level are generally straightforward and are designed to be deployable within 30 days. - [Level 5 Enterprise Basic Security](level-5-enterprise-security.md) We recommend this configuration as the minimum security configuration for an enterprise device. Recommendations for this level are generally straightforward and are designed to be deployable within 30 days.
- [Level 4 Enterprise High Security](level-4-enterprise-high-security.md) We recommend this configuration for devices where users access sensitive or confidential information. Some of the controls may have an impact to app compat, and therefore will often go through an audit-configure-enforce workflow. Recommendations for this level are generally accessible to most organizations and are designed to be deployable within 90 days. - [Level 4 Enterprise Enhanced Security](level-4-enterprise-high-security.md) We recommend this configuration for devices where users access sensitive or confidential information. Some of the controls may have an impact to app compat, and therefore will often go through an audit-configure-enforce workflow. Recommendations for this level are generally accessible to most organizations and are designed to be deployable within 90 days.
- [Level 3 Enterprise VIP Security](level-3-enterprise-vip-security.md) We recommend this configuration for devices run by an organization with a larger or more sophisticated security team, or for specific users or groups who are at uniquely high risk (as one example, one organization identified users who handle data whose theft would directly and seriously impact their stock price). An organization likely to be targeted by well-funded and sophisticated adversaries should aspire to this configuration. Recommendations for this level can be complex (for example, removing local admin rights for some organizations can be a long project in and of itself) and can often go beyond 90 days. - [Level 3 Enterprise High Security](level-3-enterprise-vip-security.md) We recommend this configuration for devices run by an organization with a larger or more sophisticated security team, or for specific users or groups who are at uniquely high risk (as one example, one organization identified users who handle data whose theft would directly and seriously impact their stock price). An organization likely to be targeted by well-funded and sophisticated adversaries should aspire to this configuration. Recommendations for this level can be complex (for example, removing local admin rights for some organizations can be a long project in and of itself) and can often go beyond 90 days.
- [Level 2 DevOps Workstation](level-2-enterprise-devops-security.md) We recommend this configuration for developers and testers, who are an attractive target both for supply chain attacks and access to servers and systems containing high value data or where critical business functions could be disrupted. Level 2 guidance is coming soon! - [Level 2 DevOps Workstation](level-2-enterprise-devops-security.md) We recommend this configuration for developers and testers, who are an attractive target both for supply chain attacks and access to servers and systems containing high value data or where critical business functions could be disrupted. Level 2 guidance is coming soon!
- [Level 1 Administrator Workstation](level-1-enterprise-administrator-security.md) Administrators (particularly of identity or security systems) present the highest risk to the organization, through data theft, data alteration, or service disruption. Level 1 guidance is coming soon! - [Level 1 Administrator Workstation](level-1-enterprise-administrator-security.md) Administrators (particularly of identity or security systems) present the highest risk to the organization, through data theft, data alteration, or service disruption. Level 1 guidance is coming soon!
@ -49,16 +46,30 @@ Level 5 should be considered the minimum baseline for an enterprise device, and
## Security control classification ## Security control classification
The recommendations are grouped into three categories. The recommendations are grouped into four categories.
![Security Control Classifications](images/security-control-classification.png)
| Hardware | Policies | Controls | Behaviors |
|----------|----------|----------|-----------|
| Microsoft recommends acquiring hardware that supports the specified hardware features, in order to support Windows security features | Microsoft recommends enforcing the configuration of the specified policies in the manner described, to harden Windows to the designated level of security | Microsoft recommends enabling the security controls specified in the manner described, to provide protections appropriate to the designated level of security. | Microsoft recommends changing organizational behavior towards the endpoints in the manner described. |
## Security control deployment methodologies ## Security control deployment methodologies
The way Microsoft recommends implementing these controls depends on the The way Microsoft recommends implementing these controls depends on the
auditability of the controlthere are two primary methodologies. auditability of the controlthere are two primary methodologies.
![Security Control Deployment methodologies](images/security-control-deployment-methodologies.png) ### Rings
Security controls which don't support an audit mode should be deployed gradually. A typical deployment methodology:
1. Test ring - deploy to a lab to validate "must test" apps prior to enforcement of any configuration
2. Pilot ring - deploy to a representative sample of 2-5% of the environment
3. Fast ring - deploy to the next 25% of the environment
4. Slow ring - deploy to the remainder of the organization
### Audit / Enforce
Security controls which support an audit mode can be deployed using the following methodology:
1. Audit - enable the control in audit mode, and gasther audit data in a centralized location
2. Review - review the audit data to assess potential impact (both positive and negative) and configure any exemptions from the security control you need to configure
3. Enforce - deploy the configuration of any exemptions and convert the control to enforce mode