Mcra April 2025
Mcra April 2025
Microsoft Cybersecurity
Reference Architectures
(MCRA)
Plan your end-to-end security
architecture using Zero Trust principles
SAF Overview
Whiteboard – Current Security Architecture
End to End Reference Strategy, Architecture, & Implementation using Zero Trust principles
Business Scenarios Security Disciplines - Reference architectures, plans, and more Technology
Promised Outcomes Implementation
CEO Business
Transformation Engaging Business
Leaders on Security
Business Leadership
Digital
CIO CISO
Transformation CISO Workshop
We are here Security Strategy and Program
Technical Leadership
Security Strategy,
Programs, & Epics
Microsoft Cybersecurity Reference Architectures (MCRA)
End to End Security Architecture Using Zero Trust Principles
Architecture and
Policy
Architects & Technical Managers Access and Security Infrastructure & Data Security OT and IoT
Technical
Planning Identity Operations Development Security
(SecOps/SOC) Security
Implementation
> > > > > > > > > > > > > >
and Operation
Implementation and Operation Technology Implementation & Optimization
Security Capability Adoption Planning (SCAP)
Includes
Reference Plans
Security must be integrated everywhere
and stay on a journey of continuous improvement
Block Cheap and Easy Attacks Find and kick them out fast
Increase cost and friction for well known & Reduce dwell time (mean time to remediate)
proven attack methods (or easy to block options) with rapid detection and remediation
Data Security
Low
Data
Attackers have a lot of options
People Application
Ø Forcing security into a holistic
Infrastructure
complex approach
Assume Compromise
All attacks can be prevented
Continuously reduce blast radius and attack surface through prevention and detection/response/recovery
DECIDE
ACT
Attack Chain
Coverage Zero Trust Privileged Access
Security Operations
Development / DevSecOps
Device Types
Patch Microsoft 365 E5 Standards Mapping
Modernization
Securing Digital
Transformation Engaging Business
Leaders on Security
Business and
Security
Integration Security Strategy and Program
Security Strategy,
Programs, and
Epics Zero Trust Architecture
Implementation
and Operation
Includes
Reference Plans
Recommend combination of:
Where do you want to go next? •
•
Context – Strategy/Architecture
Action – Technical Implementation
Engagements help navigate the vast complexity of security
Capabilities Review
Security Capability Adoption Planning (SCAP) Technical Architecture and Planning
Access and Modern Infrastructure & Data Security
Identity Security Development
How are we doing today? Operations Security
(SecOps/SOC)
End to End Security Assessment
Microsoft Product and Technology Implementation
Enterprise Security Assessment (ESA)
Defender Purview Entra
5
Security Resources
Security Adoption Framework Security Hub
aka.ms/saf aka.ms/SecurityDocs
Secure Access and Modern Security Infrastructure & Data Security IoT and OT Security
Identities Operations (SecOps/SOC) Development Security
• Securing Privileged Access (SPA) • Incident Response - aka.ms/IR • Security Development Lifecycle (SDL) • Secure data with Zero Trust • Ninja Training
Guidance • CDOC Case Study - aka.ms/ITSOC • Security Controls • Ninja Training • Defender for IoT Training
aka.ms/SPA • Ninja Training • Microsoft Cloud Security Benchmark • Microsoft Purview Information Protection • MCRA Videos
aka.ms/benchmarkdocs aka.ms/MIPNinja • MCRA Video OT & IIoT Security
• Access Control Discipline • Microsoft 365 Defender
aka.ms/m365dninja • Well Architected Framework (WAF)
• Microsoft Purview Data Loss Prevention • Defender for IoT Documentation
• Ninja Training aka.ms/DLPNinja
• Microsoft Defender for Identity
• Microsoft Sentinel • aka.ms/wafsecure • Microsoft Purview Insider Risk
aka.ms/D4IoTDocs
aka.ms/sentinelninja
aka.ms/mdininja
• Microsoft Defender for Office 365 • Azure Security Top 10 Management
• Insider Risk Management
• MCRA Video aka.ms/mdoninja • aka.ms/azuresecuritytop10
• Data Security for SOC
• Zero Trust User Access • Microsoft Defender for Endpoint • Ninja Training aka.ms/NinjaDSforSOC
• Microsoft Entra Documentation aka.ms/mdeninja
• Defender for Cloud
• Microsoft Cloud App Security
aka.ms/entradocs • MCRA Video • Microsoft Purview Documentation
aka.ms/mcasninja
aka.ms/purviewdocs
• MCRA Videos • Infrastructure Security
• Security Operations • Defender for Cloud Documentation
• SecOps Integration
Product Capabilities Security Product Documentation Microsoft Security Response Center (MSRC)
www.microsoft.com/security/business Azure | Microsoft 365 www.microsoft.com/en-us/msrc
Key Industry References and Resources
Microsoft
Mapping
Zero Trust Model Rapidly Report
Capabilities
Microsoft Regulatory Compliance
Identity and Adaptive Access Management (IAAM)
Architecture
Building
Blocks (ABBs)
Microsoft
Mapping
Capabilities
Asset-Centric Security Operations (ACSO)
Capabilities
ACSO-1
Asset-Centric ACSO-1.1.1 - Incident Investigation, Containment, and Remediation
Security Operations ACSO-1.1.2 - Incident Impact and Root Cause Analysis
ACSO-1.1.3 - Case Management
ACSO-1.1 - Rapid Incident Response
ACSO-1.1.4 - Major Incident Management
ACSO-1.5 - SecOps Data Analysis and Automation ACSO-1.5.1 - Common Attack Technique Detection
ACSO-1.5.2 - Data Aggregation, Storage, Correlation, and Analysis
ACSO-1.5.3 - SecOps Process Automation
ACSO-1.5.4 - Technical Threat Data Integration
ACSO-1.5.5 - SecOps Custom Development
Asset-Centric Security Operations Platform (ACSOP)
Architecture Building Blocks (ABBs) ACSOP-1.1.1.1 - User Interaction Process
ACSOP-1.1.1 - Incident Investigation and Forensic Analysis Process ACSOP-1.1.1.2 - Technology Team Interaction
ACSOP-1 Process
ACSOP-1.1.2 - Incident Containment and Asset Recovery Process
Asset-Centric Security ACSOP-1.1.3 - Incident Summarization Process ACSOP-1.1.5.1 - Technical Coordination Process
Operations Platform
ACSOP-1.1.4 - Incident Impact and Root Cause Analysis Process ACSOP-1.1.5.2 - Business Coordination Process
ACSOP-1.1.5 - Major Incident Management Process
ACSOP-1.1.6.1 - SecOps Trend and Pattern
ACSOP-1.1.6 - Operational Excellence Process
ACSOP-1.1 - SecOps Analysis Process
Core Reactive Processes ACSOP-1.2.1 - SecOps Data Management Process ACSOP-1.1.6.2 - SecOps Change Management
Process
ACSOP-1.2.2 - Custom Detection Engineering Process
ACSOP-1.2.3 - Threat Hunting Process ACSOP-1.1.6.3 - Detection Source Management
ACSOP-1.2 - SecOps
Proactive Processes ACSOP-1.2.4 - Threat Intelligence Development & Dissemination Process ACSOP-1.1.6.4 - User Reporting Process
IAAM-1.1 -
Authentication (Known) IAAM-1.2.1 - Subject Security Status Determination
IAAM-1.2.2.1 - Adaptive Policy Determination For Subjects
IAAM-1.2.2 - Policy Decisioning IAAM-1.2.2.2 - Adaptive Policy Determination for Sessions
IAAM-1.2 - Trust IAAM-1.2.2.3 - Policy Enforcement
Validation (Trusted)
IAAM-1.3.1 - Subject Entitlements to Workloads/Assets
IAAM-1.3.2 - Workload-Specific Access Entitlements
IAAM-1.3 -
Authorization (Allowed) IAAM-1.3.3 - Identity Consent Management
IAAM-1.4.2.1 - Identity authority management
IAAM-1.4.4 - Access Monitoring & Anomaly Detection IAAM-1.4.2.5 - Data Identity Assignment
IAAMP-1 IAAMP-1.1.1 - Identity lifecycle management Process IAAMP-1.1.2.1 - Organizational access management process
Identity and Adaptive IAAMP-1.1.2.2 - App access & Consent management process
Access Management IAAMP-1.1.2 - Access Policy Lifecycle Management Process
Platform IAAMP-1.1.3 - Identity Protocol management IAAMP-1.1.4.1 - Access Trend, Pattern, and Problem
Management Process
IAAMP-1.1.4 - Access Management Operational Excellence Process
IAAMP-1.1.4.2 - Access Change Management Process
IAAMP-1.1 IAAMP-1.1.5 - Consent Management Lifecycle Process
Identity and Access IAAMP-1.1.4.3 - Access Problem Management Process
Management Processes IAAMP-1.1.6 - Access Management Integration Process
IAAMP-1.1.6.1 - Posture Management Integration Process
IAAMP-1.1.6.2 - SecOps Integration Process
IAAMP-1.2.1 - Adaptive Policy Information Point (PIP)
IAAMP-1.1.6.3 - Development Integration Process
IAAMP-1.2 IAAMP-1.2.2 - Adaptive Policy Decision Point (PDP)
Adaptive Access IAAMP-1.1.6.4 - Infrastructure Integration Process
Control Platform IAAMP-1.2.3 - Adaptive Policy Enforcement Point (PEP) IAAMP-1.1.6.5 - Data Integration Process
IAAMP-1.2.4 - Adaptive Policy Manager
IAAMP-1.2.5 - Policy Signal Source
Verify Explicitly
Protect assets against attacker control by explicitly validating that all trust and security
decisions use all relevant available information and telemetry.
Access and Identity Infrastructure & IoT and OT Modern Security Data Security
Development Security Security Operations (SecOps/SOC)
Zero Trust Principles
Business Enablement
Align security to the organization’s mission, priorities, risks, and processes
Assume Breach (Assume Compromise)
Assume attackers can and will successfully attack anything (identity, network, device, app, infrastructure, etc.) and plan accordingly
à Transforms from “defend the network” to “enable secure productivity on any network”
US National Institute of
Standards and
The Open Group Technology (NIST)
Focused on integration Focused on architecture
with business and and implementation with
IT/Enterprise/Security available technology
architecture
Many organizations are contributing valuable perspectives and guidance like the Cybersecurity and
Infrastructure Security Agency (CISA), Cloud Security Alliance (CSA), and some technology vendors
Key Zero Trust Models and Architectures
Digital Ecosystems
Data/Information
Distributed Policy
Enforcement Points (PEPs) Apps & Systems
Security Zones
Microsoft Security Capability Mapping
The Open Group Zero Trust Components
Microsoft Entra ID
ID Protection
Workload ID Governance Microsoft Security
Exposure Management
Visibility and Policy
Entra ID Governance
Access Control Asset Protection
Defender for Identity
Classification, Protection, Tokenization
Identity and Network - Multi-factor Authentication
Digital Ecosystems
Data/Information
Microsoft Entra
Conditional Access Microsoft Purview
Microsoft Priva
Entra Internet Access
Entra Private Access
Distributed Policy
Enforcement Points (PEPs) Apps & Systems
Innovation
Defender for Cloud
Security
Defender for
Azure Arc
APIs
Intune
Device Management 78+ Trillion signals per GitHub Advanced Security
day of security context & Azure DevOps Security
Security Zones
Defender for Endpoint Secure development and
software supply chain
Endpoint Detection and Microsoft Entra
Response (EDR) Conditional Access
Asset-Centric Azure Firewall (Illumio partnership)
Security Operations
Security telemetry from across the environment
Microsoft Sentinel
Microsoft Defender • Security Information and Event
Management (SIEM)
Data Security
Microsoft Zero Trust Capability Mapping Implemented as part of the NIST ZT
Architecture guide (published August 2024)
Key
Security Analytics
NIST Area
NIST Sub-Area Microsoft Sentinel
• Sub-Area
Microsoft Defender XDR • Security Information and Event
Management (SIEM)
Identities
Strong
Human authentication
Non-human
Apps
Zero Trust Policies Network
Request Adaptive SaaS
enhancement Public Access
Evaluation
On-premises
Traffic filtering Private
Enforcement
& segmentation
(as available)
Endpoints Infrastructure
Device Risk
compliance assessment Serverless
Corporate
Runtime Containers
Personal
control
IaaS
Threat Protection PaaS
Continuous Assessment Internal Sites
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment
architecture
Governance
Compliance
Data
Classify,
Security Posture Assessment label, Emails & documents
encrypt Structured data
Productivity Optimization
Microsoft Sentinel
Telemetry/analytics/assessment
Microsoft Defender • Security Information and Event
Management (SIEM)
JIT & Version Control • Security Orchestration, Automation,
Defender for Endpoint Defender for Office 365 Defender for Identity Defender for Cloud Apps Defender for Cloud and Response (SOAR)
Managing Information/Cyber Risk April 2025 - https://aka.ms/SecurityRoles
Security responsibilities or “jobs to be done”
Incident
Response
Incident
Management
Threat
Hunting
Microsoft security capability mapping
Which roles typically use which capabilities https://aka.ms/MCRA
Identity Admin, Identity Architect, Incident preparation Security architecture Infrastructure and endpoint security,
Microsoft Entra
Microsoft Purview
Network Security relational databases Data security • Azure Sphere
• Azure Firewall • Microsoft Defender for Azure
Cosmos DB • Microsoft Purview
• Azure Firewall Manager • Microsoft Security Copilot • Information Protection
• Azure DDoS
• Azure Web Application Firewall
• Microsoft Sentinel • Data Loss Prevention
• Microsoft 365 Defender
Innovation Security
• Microsoft Security Experts
• Azure Networking Design • Microsoft Incident Response • Microsoft Defender for Cloud Apps Integrate Security into DevSecOps
• Virtual Network, NSG, ASG, VPN, etc. Detection and Response Team (DART)
• PrivateLink / Private EndPoint processes. Align security, development,
People security and operations practices.
• Attack Simulator
Endpoint / Device Admin • Insider Risk Management Application security and DevSecOps
Threat intelligence Analyst
• Microsoft Intune • (Same as Infrastructure Roles)
• Configuration Management • Microsoft Defender Threat Privacy Manager • GitHub Advanced Security
• Microsoft Defender for Endpoint Intelligence (Defender TI) • Microsoft Priva • Azure DevOps Security
• Microsoft Sentinel
Security accountabilities & responsibilities across the organization
People Security
Organizational Leadership & Oversight • Security Education and Engagement
• Member of Board of Directors Technical Leadership • Insider Risk Management
• Chief Executive Officer (CEO)
CEO • Chief Digital Officer (CDO)
• Chief Financial Officer (CFO) • Chief Information Officer (CIO) Security Posture Management
• Chief Operating Officer (COO) • Chief Technology Officer (CTO) • Security Posture Management
• Chief Legal Officer (CLO) • Chief Information Security Officer (CISO) • Security Governance & Compliance Management
• Product and Business Line Leaders • Software Delivery Vice President (VP)
• Technology Directors Technical Engineering and Operations
Business Management and Operations • Security Directors • Technology Managers
• Product Line Managers / Directors • Security Strategy, Integration, and Governance • Security Managers
• Product Owners • Software Development Directors • Automation Engineering
• Business Architects • Identity
• Business Analysts Architects • Network
• Information Worker / Frontline Worker • Enterprise Architects • User Endpoints
• Security Architects • User Productivity and Support
Security-Adjacent Disciplines • Infrastructure Architects • Infrastructure/Platform (Cloud, On-Prem, CI/CD, etc.)
• Chief Security Officer (CSO) and team • Data and Artificial Intelligence (AI) Architects • Data and Artificial Intelligence (AI)
• Chief Risk Officer (CRO) and team • Access Architects (Identity, Network, App, etc.) • Operational Technology (OT)
• Chief Privacy Officer (CPO) and team • Solution Architects • Security Engineering
• Data Officer / Data Governance and team • Software / Application Architects
• Compliance and Audit team Security Operations (SecOps/SOC)
• Anti-Fraud Team Application & Product Development • Security Operations (SecOps) Managers
• Technology Delivery Managers • Triage Analyst
Other Cross-Functional Disciplines • Software Testing/Quality Managers • Investigation Analyst (Digital Forensics)
• Legal Team • Software Security Engineers • Reverse Engineering
• Finance Team • Software Developers (including AI) • Threat Hunting and Detection Engineering
• Procurement & Acquisition • Software Testers • SecOps Platform and Data Engineering
• Human Resources • DevOps Leads • Attack Simulation (Red & Purple Teaming)
• Communications / Public Relations • Supply Chain Security • Incident Coordination and Management
• Organizational Readiness / Training • Internet of Things (IoT) • Threat Intelligence
Role Example – CEO proposed draft text for security
roles and glossary standard
Security Chief Executive Officer (CEO) – The CEO establishes the culture and strategic direction of the
responsibilities/ organization that guides everyone in the organization on how to prioritize funding, time, and energy across all aspects of the
accountabilities business, including security risk. The security accountabilities for a CEO include:
• Prioritizing security in the organization’s culture and sponsoring the Zero Trust transformation by embedding security in business decisions at all
levels (which may require shifting revenue vs. risk tradeoffs).
• Establish or correct security accountability structure - The CEO must ensure that anyone making a decision that impacts the organization’s
security risk is accountable for the full consequence of those decisions including the security risk implications of them.
• Position security team as an enabler - The CEO must empower the CISO and security team to provide the required security context to business and
technology roles across the organization (and hold them accountable for this enablement). This includes providing expertise to enable risk prevention,
management of incidents that do happen, and supporting the continuous learning by providing tailored recommendations to avoid or mitigate future
incidents.
• Sponsor or approve security-aware procurement and open source policy - The CEO must ensure that organizational policy requires analyzing the
security characteristics of all new software before the organization commits to purchasing or integrating it into their systems. Any software can
introduce organizational risk if it isn’t properly developed, tested, implemented, and maintained. A security review of software and vendors can
discover and mitigate security risks early and cost-effectively before the organization has invested into product implementation and integration.
This must be applied generally to all procurement because software is included in a high percentage of products purchased by organizations
(including many different types and sizes of equipment). Additionally, most technology and AI projects typically include open source software that
can introduce security risks to the organization (outside of purchasing process)
Consequences of Without the CEO prioritizing cybersecurity across the organization, the security team is often positioned as a scapegoat,
not doing this (or getting the accountability and blame for security incidents resulting from decisions made by other teams. This causes all non-security roles to lack understanding
and accountability for the security impacts of decisions they make, resulting in higher risk with every decision and action.
well /completely) This results in more security incidents, higher severity and business impact per incident, inability to accurately judge the organization’s actual risk, inability to
recruit security leaders / professionals, and reduced business agility because security teams often try to slow or block business initiatives for fear of being blamed.
Asset Scope and The CEO is ultimately accountable for all • Standard cybersecurity skills for information workers
Required Attack organizational assets of all types in
• Organizational security threats, risks, and challenges
Knowledge aggregate.
Microsoft Security Experts
Microsoft Entra
Discover
Monitor Classify
Protect
Azure Backup
Security & Other Services
aka.ms/SPA
Microsoft Entra
Discover
Monitor Classify
Protect
Azure Backup
Security & Other Services
aka.ms/SPA
S3
https://aka.ms/MCRA
S3
Azure Arc
Access Management Capabilities
Can be implemented today using Microsoft and partner capabilities
Employee
Partner
Customer
Direct Application Access
Core adaptive access policy
Workload
Customer
Direct Application Access
Core adaptive access policy
Workload
https://aka.ms/MCRA
Business Critical Assets
Intermediaries
Intermediaries
Enterprise Assets – Multiple generations of technology spanning clouds, Devices, Operating Systems, Applications, Data Formats, and more
https://aka.ms/MCRA
https://aka.ms/MCRA
Analysts
and Hunters
Azure Analytics
Cloud • Native plug-in for Microsoft Defender for IoT
Blended cybersecurity attacks are 3rd party 3rd party
driving convergence of IT, OT, and IoT Analytics
IoT Hub, PowerBI, Azure Edge,
Digital Twins, and more
Environments Analytics Microsoft Sentinel
• Native OT investigation & remediation playbooks
• Correlation with other data sources and
Strategic Threat intelligence (attack groups & context)
security architectures and capabilities
©Microsoft Corporation
Azure
Zero Trust Principles - Assume breach, verify explicitly, Use least privilege access (identity and network)
https://aka.ms/MCRA
Azure Resources/Data
MITRE ATT&CK Framework Detailed model for technical detection coverage assessments and planning
Lockheed Martin Kill Chain Legacy Reference Model (missing lateral traversal)
Actions on the
Reconnaissance Weaponization Delivery Exploitation Installation Command and Control
Objective
1. Prevalent
• Used against you
• Used on similar
organizations
(industry peers,
similar/related data,
A bottomless pit, but an expensive one
etc.)
Attackers have potentially infinite ability to
abuse complex systems, but each new approach
Common for everyone
1. Phishing
2. Proven costs time/resources/money or increased
2. Pass the hash/ticket • Works in the wild chances for failure/detection.
3. Password spray somewhere against
4. Password re-use from dissimilar
known breaches
organizations 3. Potential
• Possible but not recently used in active attacks
What’s in Microsoft 365 E5
Product
Licensing
Details https://aka.ms/MCRA
Product Name (& Previous Product Names) Product Category(ies) Security Modernization Initiative(s)
Extended Detection and Response (XDR) • Modern Security Operations
Microsoft Defender for Endpoint (MDE) Endpoint Detection and Response (EDR)
Formerly Microsoft Defender ATP, Windows Defender ATP, Threat and Vulnerability Management (TVM)
• Infrastructure and Development
Windows Defender Antivirus Endpoint Protection Platforms (EPP) • Security Hygiene: Backup and Patching
Microsoft Defender for Identity (MDI) Extended Detection and Response (XDR)
• Modern Security Operations
Formerly Azure ATP
Microsoft Defender for Office (MDO) Extended Detection and Response (XDR) • Modern Security Operations
Formerly Office 365 ATP
• Access and Identity
Microsoft Defender for Cloud Apps (MDCA) Cloud App Security Broker (CASB)
• Modern Security Operations
Formerly Microsoft Cloud App Security Extended Detection and Response (XDR)
• Data Security
Entra ID (Formerly Azure AD)
• Multifactor Authentication
• Microsoft Entra Conditional Access • Access and Identity
• Self-service password management Access Management
• Modern Security Operations
• Identity Protection
• Identity Governance
• Privileged Identity Management (PIM)
Microsoft Purview
• Compliance Management
• Data Lifecycle Management • Data Security
• eDiscovery and auditing
• Insider Risk Management
• Information Protection
Windows 10 & Windows 11
• Windows Hello for Business • Access and Identity
• Windows AutoPilot
• Advanced Windows Security
Microsoft Intune Unified Endpoint Management (UEM) • Access and Identity
Product Families Enable Modernization Initiatives
Access and Identity Infrastructure & IoT and OT Modern Security Data Security
Development Security Security Operations (SecOps/SOC)
Security Copilot
Unmanaged Internet
Basic network monitoring for guests,
partners, new/unmanaged devices
Managed Internet
Monitored network for validated devices to communicate
peer to peer (patching, collaboration, etc.)
Unmanaged Internet
Basic network monitoring for guests,
partners, new/unmanaged devices
Managed Internet
Microsoft Entra
Monitored network for validated devices to communicate application proxy
peer to peer (patching, collaboration, etc.)
Unmanaged Internet
Basic network monitoring for guests,
Low Impact IoT/OT
partners, new/unmanaged devices Printers, VoIP phones, etc.
Managed Internet
Microsoft Entra
Monitored network for validated devices to communicate application proxy
peer to peer (patching, collaboration, etc.)
Managed Devices
Specialized Accounts Specialized Devices
Sensitive System users,
developers, & admins Adaptive
Enterprise Accounts Access Control Enterprise Devices
Employee Partner
T
O
/
T
o
I
t
c
a
p
m
w
I
o
L
Provide policy Expect, plan for, and
and education track attacker use of AI
Protect AI data
and applications
Adopt AI security
capabilities
New/different interface Elevates Focus on Data Requires new controls
AI Usage
AI Application
Model
AI Platform Dependent
Establish clarity: Implement responsible Prioritize greatest needs and
Your data is your data AI principles opportunities for security
Guidance for incident response, including
Investigate and directions for triage, investigation, containment,