What’s included? Progress tracker for each business scenario Track recommended tasks across four stages Read the included instructions to use the tracking features Customize these for your organization Stakeholder teams for each business scenario Example stakeholder teams for each business scenario Customize the team for your organization Also download this Excel workbook to track owners and tasks
Using the progress trackers Shields have three states: Not Started In Progress Complete Diamonds have two states: Incomplete Complete To change the state, delete the icon. This will reveal the next state underneath. The progress bar indicates the stage on which the client is primarily focused. Hold shift and drag the marker to move it along the progress bar. “Invisible” blocks beneath the bar can be used to precisely align the marker to each stage. Please familiarize yourself with the deck and ensure the slide is hidden before presenting. This slide is for internal use only. When all stages are complete, delete the line, marker, and checkmark to reveal the checkmark’s Finished state.
Using the stakeholder slide Stakeholder info is shown in cards. To change the photo Click twice on the placeholder photo. Navigate to Picture Format > Change Picture. Adjust positioning with the Crop tool if needed. To change any text Click on the placeholder text and replace it. Overset text will resize to fit within the card. Please familiarize yourself with the deck and ensure the slide is hidden before presenting. This slide is for internal use only. These cards are made for a 4x3 grid. To add cards, copy and paste the template or hold Ctrl and drag the template to create a duplicate. Six or fewer stakeholders? Leave the top row blank. More than nine? Add another Stakeholder slide, repeating the primary stakeholders, like project leads, who are shown in the sidebar. Want to go an extra mile on your design? Use Shift+Enter to keep the last word of a paragraph from being alone on a line. A description of their responsibilities pertaining to this project, written in two to five lines of text. Role First Lastname
Rapidly modernize your security posture
Identify risks to your organization Stage 1 Identify gaps in your security posture Set leadership expectations Implement basic hygiene practices Stage 2 Visualize your security posture using audience-appropriate dashboards Stage 3 Document and manage shadow IT using Microsoft Defender for Cloud Apps Stage 4 Rapidly modernize your security posture Continuously educate users Continue to manage risk Update your status for Secure Score Develop a methodology for patching and updating systems Evolve your organization’s SecOps capability Capture your initial Secure Score status Inventory your digital estate Identify regulatory requirements Capture your status in Compliance Manager Develop a response readiness plan
Overall engagement, resources, timeline and schedule, communications, and other elements. Project Lead Name The strategy for protecting organization data on devices, including managing devices Device management architect Name Tenant environment ( preparation , testing , configuration). Services admins Name Strategy, steering, escalation, approvals, business alignment, and management coordination. Sponsor Name Security and governance of identities, devices, and apps. Owns risk and policy determination, tracking and reporting CISO Name Tech requirements, architecture, reviews, decisions, and prioritization Architecture Lead Name Your users’ needs and feedback. End user security and usability (EUC) lead Name Need and feedback from your business units. Business Unit Representative Name Prioritization and tech requirements for app investments, including bringing apps up to standards with modern authentication and Entra Conditional Access policies. App management lead Name Security posture stakeholders Card template A description of their responsibilities pertaining to this project, written in two to five lines of text. Role Name
Secure remote and hybrid work
Verify and secure every identity with strong authentication Stage 1 Integrate SaaS apps with Entra ID for single sign-on Register devices with Entra ID Stage 2 Implement Zero Trust starting point identity and device access policies Enroll devices into management and apply recommended security protections Stage 3 Monitor device configuration drift Stage 4 Secure remote and hybrid work New applications that are deployed use modern authentication Use App Proxy with on-prem apps for single sign-on Allow only compliant and trusted devices to access data Implement passwordless authentication
Card template A description of their responsibilities pertaining to this project, written in two to five lines of text. Role Name Manage overall engagement, resources, timeline and schedule, communications, etc. Project Lead Name Implements the strategy for protecting organization data on devices, including managing devices Device management architect Name Tech requirements, and prioritization of app investments — bringing apps up to standards with modern authentication and coordinating apps with conditional access rules App management lead Name Tenant/environment, preparation, configuration, testing M365 admins Name Strategy, steering, escalation, approvals, business alignment, management coordination Sponsor Name Security and governance of identities, devices, and apps; risk and policy determination, tracking and reporting CISO Name Tech requirements, architecture, reviews, decisions, and prioritization Arch Lead Name Determines required controls to address tech and architecture requirements; implements these Identity architect Name Secure remote and hybrid work stakeholders
Identify and protect sensitive business data
Discover and identify sensitive business data Stage 1 Discover non-sanctioned SaaS apps Encrypt network communication Develop and test a classification schema Stage 2 Set up secure Teams for sharing data internally and externally with business partners Add protection to labels Stage 3 Extend labels and protection to data in SaaS apps, including DLP Stage 4 Identify and protect sensitive business data Extend automated classification to all services Extend labels and protection to data in on-premises repositories Apply labels to data across Microsoft 365 Introduce basic DLP policies Introduce automatic & recommended labeling Extend DLP policies across Microsoft 365 Implement key insider risk management policies Protect organization data in cloud infrastructure
Card template A description of their responsibilities pertaining to this project, written in two to five lines of text. Role Name Manage overall engagement, resources, timeline and schedule, communications, etc. Project Lead Name Data classification and sensitive data identification, controls and remediation Information Protection Manager Name Tech requirements, architecture, reviews, decisions & prioritization Arch Lead Name Tenant/environment, preparation, configuration, testing M365 admins Name Strategy, steering, escalation, approvals, business alignment, management coordination Sponsor Name Protection and governance of data assets and systems; risk and policy determination, tracking and reporting CISO Name Determines required controls to address compliance and protection requirements IT Compliance Manager Name Investigation and reporting in cooperation with compliance and protection leads Investigation and audit roles Name Information protection stakeholders
Prevent or reduce damage from a breach
Secure privileged accounts Stage 1 Implement Microsoft 365 Backup and Azure Backup for critical business data Stage 2 Stage 3 Stage 4 Implement security breach prevention and recovery infrastructure Implement Azure Site Recovery for critical workload continuity Segment your network Implement a patching plan Create honeypot resources Implement Microsoft 365 Backup and Azure Backup for all business data Gain visibility to network traffic Discontinue legacy network security technology Practice threat and BCDR response Encrypt network communication Get started with Microsoft Purview Insider Risk Management Design threat and business continuity/disaster recovery (BCDR) response Implement Azure Site Recovery for all workloads
Card template A description of their responsibilities pertaining to this project, written in two to five lines of text. Role Name Manage overall engagement, resources, timeline and schedule, communications, etc. Project Lead Name Technical requirements and implementation of network security standards and practices Network Architect Name Compliance requirements and determination of insider risks to detect and manage Compliance Officers Name Policy and requirements compliance Security Governance Lead Name Strategy, steering, escalation, approvals, business alignment, management coordination Sponsor Name Protection and governance of business digital assets and systems; risk and policy determination, tracking and reporting CISO Name Configuration and standards for identities, networking, and honeypot resources Security Architect Name Configuration and maintenance of honeypot resources, patching and system updates, and BCDR procedures IT Lead Name Breach prevention and recovery stakeholders
Turn on XDR tools: - Defender for Endpoint - Defender for Office 365 - Microsoft Entra ID Protection - Defender for Identity - Defender for Cloud Apps Stage 1 Investigate and respond to threats using Microsoft Defender XDR Stage 2 Stage 3 Stage 4 Implement threat protection and XDR Turn on Defender for Cloud Define internal process for security operations (SecOps) Turn on Defender for IoT Design a Microsoft Sentinel workspace and ingest XDR signals Proactively hunt for threats Evolve SecOps as a discipline in your organization Leverage automation to reduce load on your SecOps analysts Monitor business critical and honeypot resources with XDR tools
Card template A description of their responsibilities pertaining to this project, written in two to five lines of text. Role Name Manage overall engagement, resources, timeline and schedule, communications, etc. Project Lead Name Advise on, implement, and manage business critical and honeypot resources Security for IT Lead Name Strategy, steering, escalation, approvals, business alignment, management coordination Sponsor Name Protection and governance of business digital assets and systems, tracking and reporting security breaches CISO Name Advise on incident response strategies and practices, and XDR tools and infrastructure Security Architect Name Implement incident response procedures, XDR infrastructure configuration, incident response automation, and SecOps discipline evolution SecOps Lead Name Threat protection and XDR stakeholders
Meet regulatory and compliance requirements
Identify regulatory requirements Stage 1 Review current guidance for regulations that apply to your organization. Use Compliance Manager to assess compliance and plan remediation for identified gaps Implement communication compliance policies (if applicable) Stage 2 Use content explorer to identify regulated data Stage 3 Re-assess compliance using Compliance Manager and address remaining gaps Stage 4 Meet regulatory and compliance requirements Use Microsoft Sentinel to build reports to continuously assess and inventory the compliance status of your information Assess requirements for information protection and implement retention and sensitivity labels Implement DLP policies Set up partitioning and isolation controls (if applicable) Extend data lifecycle management policies with automation Use Compliance Manager to identify and remediate remaining gaps and meet the requirements of new or updated regulations Implement container labeling, automatic and mandatory labeling, and stricter DLP policies
Card template A description of their responsibilities pertaining to this project, written in two to five lines of text. Role Name Overall management of engagement, resources, timeline and schedule, communications, and others. Project Lead Name Data classification and sensitive data identification, controls, and remediation. Information Protection Manager Name Technical requirements, architecture, reviews, decisions, and prioritization. Arch Lead Name Tenant and environment, preparation, configuration, and testing. Microsoft 365 admins Name Strategy, steering, escalation, approvals, business alignment, and coordination management Sponsor Name Protection and governance of data assets and systems, such as risk and policy determination and tracking and reporting. CISO Name Determination of required controls to address compliance and protection requirements. IT Compliance Manager Name Investigation and reporting in cooperation with compliance and protection leads. Investigation and audit roles Name Regulatory Compliance Stakeholders