Security Insights

M365 + Azure Security Insights

Written by security operators who spend every day inside enterprise M365 and Azure environments. No filler, no product marketing dressed up as advice.

M365 Hardening

10 Most Common M365 Misconfigurations We See

The findings that appear in nearly every enterprise tenant we assess — default settings that open major attack surface — and exactly what remediation looks like.

Read more
Compliance

CMMC 2.0 Level 2 Readiness Checklist

110 practices, each mapped to specific M365 and Azure controls. Know exactly which gaps will fail a C3PAO assessment before you go in.

Read more
M365 Hardening

MFA Coverage: Why 95% Isn't Enough

The 5% of accounts without MFA are almost never random — they're break-glass accounts, service principals, and shared mailboxes attackers specifically target.

Read more
Threat Intel

OAuth Consent Phishing in M365 Tenants

How attackers abuse app consent grants to persist without credentials — and the exact Conditional Access and admin consent policies that stop them.

Read more
MSP

Tenant Hardening Before Your First Customer

The non-obvious baseline your MSP's own tenant must meet before you can credibly audit anyone else. Includes GDAP, admin tiers, and audit log retention.

Read more
Compliance

PCI-DSS v4.0 — What Changes for M365 Workloads

Requirement 6.4.2 now mandates automated web-app scanning. Requirement 10.7.2 expands logging scope. Here's what both mean for your M365 environment specifically.

Read more

Compliance Framework Guides

M365 + Azure security mapped to the 10 frameworks our customers report against. Each guide explains scope, common control gaps, and the rules we evaluate.

CIS Microsoft 365 Foundations Benchmark

The CIS M365 Benchmark is the consensus configuration baseline for Microsoft 365 tenants. Our scanner maps every benchmark control to a rule so you get a CIS score and remediation playbook in one pass.

Read the implementation guide

CMMC 2.0 (Levels 1 & 2)

Cybersecurity Maturity Model Certification is mandatory for the DoD contracting base. We map M365 controls to all 110 NIST 800-171 controls L2 inherits, generating C3PAO-ready evidence.

Read the compliance audit guide

FedRAMP Moderate & High

Federal Risk and Authorization Management Program requires NIST 800-53 control implementation for cloud services. Our findings tag the exact 800-53 control families M365 misconfigurations violate.

Read the regulatory deep-dive

GDPR & EU Data Protection

General Data Protection Regulation requires technical and organizational measures around personal data. M365 misconfigurations touching SharePoint, OneDrive, and Exchange create direct GDPR exposure. We map findings to Article 32.

Read the DLP guide

HIPAA Security Rule

For covered entities and business associates, the HIPAA Security Rule's 18 implementation specifications map directly to M365 administrative, technical, and physical safeguards. We generate the technical-control evidence auditors expect.

Read the healthcare guide

HITRUST CSF

HITRUST Common Security Framework is the prescriptive control set US healthcare and life-sciences favor. Findings carry HITRUST CSF control numbers so MyCSF assessor reviews accept them as evidence.

Read the healthcare guide

ISO 27001 / 27017 / 27018

Annex A controls for information security management, cloud security, and PII processing in public clouds. Our M365 audit produces Statement of Applicability evidence and gap reports against the 2022 control set.

Read the compliance audit guide

NIST SP 800-53 Rev 5

The federal control catalog underpinning FedRAMP, FISMA, and state-level "little FISMA" programs. Every rule we evaluate maps to specific 800-53 controls across the 20 families, with control-enhancement granularity.

Read the conditional-access guide

PCI-DSS v4.0

If cardholder data flows through email, Teams, or SharePoint, M365 is in scope. We map findings to Requirements 7 (access), 8 (MFA), 10 (audit trails), and 12 (policy) — the requirements most cited by QSAs reviewing M365.

Read the audit-logging guide

SOC 2 Type II

Trust Services Criteria — Security, Availability, Confidentiality, Privacy — translated to M365 configuration evidence. Findings carry CC6 and CC7 control family tags so auditors accept them directly.

Read the compliance audit guide

Monthly Security Insights

One email per month. New misconfigurations we're seeing, compliance changes that affect M365, and practitioner-level hardening guides. No filler.

No spam. Unsubscribe at any time.

Ready to see your actual posture?

Book a personalized demo and discover security gaps in your M365 and Azure environment.