SlideShare a Scribd company logo
Securing the Power Platform: What are my options
Juan Carlos Gonzalez | Microsoft 365 & Microsoft Teams MVP | M365 SME & Delivery Manager
#PowerConference2024
2
@jcgm1978
jcgonzalezmartin1978@hotmail.com
https://nl.linkedin.com/in/juagon
https://jcgonzalezmartin.wordpress.com/
https://www.youtube.com/@jcgonzalezmartin
#PowerConference2024
https://office365itpros.com/
3
Thank you to our great sponsors for making this
conference possible
#PowerConference2024
4
Agenda
• Protecting data and platforms is a must
• Security layers in the Power Platform
• Data Access Management, Data Security and Data Loss Prevention
• Compliance Standards and Regulations
#PowerConference2024
5
Data Protection Landscape is constantly changing
#PowerConference2024
Regulatory and
legal requirements
are constantly
evolving
Growing
sophistication of
attacks
Explosion of AI
scenarios requires a
correct and secure
access to data
Data access
demands from an
increasingly
dynamic workforce
6
How can I keep data secure?
#PowerConference2024
Controlling and
limiting access to
data
Preventing data
exfiltration
Staying
compliant with
standards and
regulations
Protecting data
from external
threats
Gaining visibility
into user activity
Doing risks
assessments
7
Security layers in the Power Platform
#PowerConference2024
Identity
management +
Network Security
User access
management + Data
level security
Data encryption and
Compliance
Prevent data
exfiltration +
Increase visibility
8
Managed Security in the Power Platform
#PowerConference2024
AI-powered detection
and monitoring to
address and prevent
security risks.
Robust controls to ensure
confidentiality and
encryption, ensuring
security of sensitive
information.
Seamless and adaptive
tools to ensure only
authorized resource and
data access.
Assured visibility and
adherence to industry
and regional regulatory
requirements.
Intelligent guidance for
scalable and efficient
enterprise-grade security.
Advanced protection for an AI-driven world
Data Protection
and Privacy
Threat Protection
Identity and Access
Management
Compliance
Security Posture
Management
Network
Isolation (v-Net)
Customer
managed keys
IP Firewall
Microsoft Sentinel
integration
Microsoft Purview Data
map integration
Lockbox
Resource sharing limits
IP cookie binding
Enforceable solution
checker
Data policies (desktop
flows)
Client app access
Data masking
Privileged Access
management
Conditional Access for
Individual Canvas Apps
Advanced connector
policies
Dataverse audit
Security guidance
9
Managed Security in the Power Platform
#PowerConference2024
Demo #1: Power Platform
Security Hub
#PowerConference2024
11
Identity Management
#PowerConference2024
• Full support for Microsoft
Entra-based identities and
access controls
• Security groups native
integration
• Automatically block
access if suspicious
activities are detected
Authentication
• Make decisions and
enforce organization
policies regarding
user/group membership,
IP location, device, risk
detection, etc.
Conditional
Access
• Restrict to/from cross
tenant connections
established via Power
Platform Apps and flows
• Allow exception through
rules based on business
needs
Tenant
Isolation
• Force user re-
authentication as
response to events such:
password change/reset,
user account deleted ,
auth token refresh, MFA
enabled, etc
• In preview for Dataverse
and Model-Driven Apps
Continuous
Access
Evaluation
12
Identity Management – Conditional Access
#PowerConference2024
Conditional Access for the Power
Platform
13
Identity Management – Conditional Access
#PowerConference2024
14
Tenant Isolation – Scenarios
#PowerConference2024
15
Tenant Isolation – Settings available
#PowerConference2024
Access Control
settings
1
Tenant Isolation
enabled in the tenant
2
Exceptions can be
configured in 1 way or 2
ways
3
16
Tenant Isolation – Impact on Apps & Flows
#PowerConference2024
Demo #2: Conditional Access
+ Tenant Isolation
#PowerConference2024
18
Continuous Access Evaluation
#PowerConference2024
19
Network Security
#PowerConference2024
Private endpoints
Azure Network Watcher
Azure Sentinel
Azure Firewall
Azure NSG
Azure Policy
Service Endpoints
Service Tags
Private DNS zones
Prevent data exfiltration
Security compliance
Gain more control
Azure vNet
Continuous Access
Evaluation
Data policies
IP based cookie binding
IP firewall
Reverse proxy
Secure identity
Secure endpoints
Secure network
Outbound connectivity
Inbound connectivity
20
Network Security
#PowerConference2024
• Filter inbound and
outbound traffic
Approved host
names & IP
ranges
• Use in network access
controls on Network
Security Groups (NSGs) or
Azure Firewall instead of
approved IP ranges
• Minimize the complexity of
frequent updates to
network security rules
Service tags
• Prevents malicious users,
outside allowed IP ranges,
from accessing your data
• Mitigate insider threats like
data exfiltration + Prevent
token replay attacks
• Current Scope: Dataverse
(Managed Environments,
OData EndPoints)
IP Firewall
21
Network Security
#PowerConference2024
• Helps to route all network
traffic from Power Platform
environments to Azure v-
Nets without routing
through the Internet
• Scope supported: Dataverse
plugins, selected connectors
Network
Isolation
• Prevents attackers using
cookies to impersonate an
authorized user
• Current Scope: Dataverse
(Managed Environments)
IP Cookie
Binding
22
Network Security
#PowerConference2024
Network
Security settings
1
IP Firewall enabled for
the environment
2
IP address or IP
addresses range
3
23
Network Security
#PowerConference2024
IP cookie binding
setting
Demo #3: Network Security
#PowerConference2024
25
Identity Management & Network Security:
Key learnings
#PowerConference2024
• Take advantage of Microsoft Entra identities native integration
• Configure Conditional Access policies for Power Apps, Power Automate, Power BI and even Copilot Studio
• Evaluate if you need to enable tenant isolation
• Restrict traffic to Power Platform resources to a specified IP range (Managed environments, up to 200 IP address)
• Limit the endpoints Power Platform resources can connect to with connection endpoint filtering
• Prevent cookie replay attacks with IP based cookie binding
• Use Azure vNet to enforce traffic to travel through your virtual private network, without the need to configure on-premises
data gateway
26
Data Access Management for Users
#PowerConference2024
• Only licensed users with a
valid Microsoft Entra ID can
log into the system
Tenant Access
• A PP environment is the
security boundary and the
unit of governance
management
• Best practice: assign
security groups to
environments to manage
user access
Environment
Access
• Access as owner/co-owner:
Edit/Share/Use
• Access to run components –
use only no edit
Resources
Access
27
Data Access Management by User Type: Tips &
Recommendations
#PowerConference2024
• Secure the default environment
• Define an environment strategy
• Limit sharing with everyone:
configure specific limits at the environment
level (managed environments)
• Define data policies
• Govern custom connectors usage
• Enable tenant isolation
• Route makers to dedicated environments
Govern Maker Access
• Everyone includes all users in Entra ID,
including guests
• Guests are treated as any other users in the
tenant
• Confirm if guests making apps in your
organization is required.
Disable if guests are not expected to be makers
• Disable guest access to Power Platform
resources using Conditional Access
• Disable share with everyone (Global vs.
Managed Environments)
• Control access using roles and permissions
• Govern administrator roles assignment to
guests
Govern GuestAccess
28
Data Access Management by User Type: Tips &
Recommendations
#PowerConference2024
Access Control
settings
1
Guest access setting 2
Enable/Disable Guest
access for the
environment
3
29
Data Access Management by User Type: Tips &
Recommendations
#PowerConference2024
• Implement security access using a
layered approach (App | Form | Record | Field)
• Use explicit authentication for shared
connections
• Cleanup of deleted users/reassign owned
records
• Licensing is not a security control
• Review Sharing limits
• Make use of Microsoft Entra security groups
• User access diagnostics and troubleshooting
Govern User Access
• Limit Power Platform administrator roles
• Enable Power Platform Admin roles
through Privileged Identity Management:
 Enforce on-demand, just-in-time
administrative access when needed
 Minimize number of privileged users
(admins) and duration of access
 Reduce risks of authorized user impact
on sensitive data
 Reduce risks of malicious user getting
access
 Be aware of current limitations in regards
of adding/removing the System
Administrator Role
Govern Admin Access
30
Data Access Management by User Type: Tips &
Recommendations
#PowerConference2024
Eligible Power Platform
Admin Role assignment
Demo #4: Data Access
Security
#PowerConference2024
33
Data Policies, Connector Actions and User Granular
Consent
#PowerConference2024
• Prevent makers to expose
corporate Information
• 2 levels of Application:
Tenant-Wide vs. Environment
Data Policies
• Prevent makers from building
apps and flows that leverage
blocked connectors
• Extended Data Policies to
support prevent creating new
connections to blocked
connectors
Data Policies in
Design Time
• Providing admins fine grain
control over which actions
within a connector are
permitted within the
environment
Connector
Action Control
• Users consents to specific
permissions required to
establish connections to data
sources.
• Accurate and concise
description of what the
connector will be executing
prior to connection creation
specific to actions executed
in the application
User Granular
Consent
34
Data Policies: Advanced Connector Policies
#PowerConference2024
Apply connector policies at scale within Environment Groups, allowing admins to block ANY connector.
35
User Granular Consent
#PowerConference2024
Granular consent
requested
Previous consent user
experience
Current consent user
experience
36
Deep Visibility into User and Application Activity
#PowerConference2024
• User access and activity
(records changes)
• Monitor system jobs
• Audit deleted jobs
• Manage log records
Dataverse
Audit
• Dataverse, Power Apps,
Power Automate,
Connectors, Data Activity
• Internal and external audit
• Audit changes to records
and user access
Activity
Logging
• Activities performed on
Environments by the Power
Platform Administrator
• Lifecycle operations,
property and setting
change activities, security
and permission change
activities
Admin Activity
Logging
• Capture, record, discover and retain your organization's unified audit log
Microsoft Purview Audit
Everything
is audited
in th PP!
Demo #5: Data Policies +
Auditing
#PowerConference2024
Data Access Management: Key learnings
#PowerConference2024
• Secure Your Power Platform Deployment best practices
• Limit sharing to business users that need to access the app
• Licensing is not a security control
• Route makers to dedicated developer environments
• Assign security groups to environments
• Manage @scale with proper environment strategy and corresponding data exfiltration prevention policies & ALM
• Configure solution checker to automate analysis against best practices rules and identify solution issues
• Educate makers regarding organization’s best practices with maker welcome content
• Leverage Dataverse fine grain security controls
• Assign administrator roles judiciously
• Leverage analytics, audit and threat detection solutions to get deep visibility into activity on the platform
38
39
Data Encryption and Compliance
#PowerConference2024
• Encryption - last and
strongest line of defense in
a multi-layered data
security strategy
• Available out of the box for
all data/storage types
Microsoft
Managed Key
• Self-manage the encryption
key
• Prevent access to customer
content when you revoke
the key access to our
services, at any time
• Private link
• Azure managed-HSM
• Automatic key rotation
Customer
Managed Key
• Protects user from
interception of their
communication and helps
ensure transaction integrity
• Protects from bulk
interception of data
• Protects from interception
or loss of data in transit
between users
Protection for
data in transit
40
Data Encryption and Compliance
#PowerConference2024
• Time bound access from
secured station by
personnel with security
clearance
• Multiple layers of approval
• Audit
JIT Access
Policies
• Extends JIT with customer
approval
• Bound to specific
environment, user and
duration
• OOB audit available to end
user
Customer
Lockbox
• Tenant home geo default
• Multi-geo support (at
environment level) to
enable global presence
• Data resiliency ensured
within geo
Data Residency
41
Data Encryption and Compliance
#PowerConference2024
• GDPR compliant
• Microsoft Trust Center
Data Privacy
• Address evolving
requirements of the public
sector
• Available based on eligibility
criteria
• Additional restrictions to
data access
Government
Hosting
• National, regional and
industry-specific regulations
for data collection and use
• E.g., FedRamp, FERPA,
HIPAA, SOC, IRS 1075, SEC
Regulation, FISC (Japan),
FACT (UK), etc
Compliance
Standards
Demo #6: Data Encryption &
Compliance
#PowerConference2024
Data Encryption and Compliance: Key learnings
#PowerConference2024
• Use Power Platform Trust Center for latest on security, privacy, compliance, and transparency
• Govern Microsoft access to sensitive data with CMK and Lockbox
• Govern AI access to sensitive data using Dataverse security controls
43
Office 365 for IT Pros
• The best way to stay up to date with Microsoft 365:
 https://o365itpros.gumroad.com/l/O365IT
#PowerConference2024
Questions?
##PowerConference2024

More Related Content

PPTX
Managed Security in the Power Platform - Advanced Protection for an AI-Driven...
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PDF
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
PDF
Patterns and Antipatterns in Enterprise Security
PDF
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
PDF
AWS Cloud Security
PDF
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
PDF
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...
Managed Security in the Power Platform - Advanced Protection for an AI-Driven...
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
Patterns and Antipatterns in Enterprise Security
cACCESS_ZTNA PRODUCT CATALOGUE IN THE FILE.pdf
AWS Cloud Security
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Comment et pourquoi maîtriser les privilèges d’administrateur local sur Windo...

Similar to Securing the Power Platform - What are my options (20)

PDF
CYB 102 – Fundamentals of Cyber Security .pdf
PDF
Lecture27 cc-security2
PDF
Cloud App Security Customer Presentation.pdf
PPT
Security Issues of Cloud Computing
PPTX
Guide to security patterns for cloud systems and data security in aws and azure
PPTX
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
PPTX
Lock it Down: Access Control for IBM i
PPTX
Cloud Computing Security
PPTX
access controtggffffffffffffffdddddl.pptx
PDF
CSS17: Houston - Azure Shared Security Model Overview
PDF
Security On The Cloud
PDF
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
PPTX
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
PDF
FixNix vCISO CyberSecurity Network Security for Covid91
PPT
Threats of Database in ECommerce
PPT
PDF
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
DOCX
AZ 500 Case Study.docx and how things are implemented
PPTX
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
PDF
How to Enable, Monitor, and Secure Your Remote Workforce
CYB 102 – Fundamentals of Cyber Security .pdf
Lecture27 cc-security2
Cloud App Security Customer Presentation.pdf
Security Issues of Cloud Computing
Guide to security patterns for cloud systems and data security in aws and azure
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
Lock it Down: Access Control for IBM i
Cloud Computing Security
access controtggffffffffffffffdddddl.pptx
CSS17: Houston - Azure Shared Security Model Overview
Security On The Cloud
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
FixNix vCISO CyberSecurity Network Security for Covid91
Threats of Database in ECommerce
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
AZ 500 Case Study.docx and how things are implemented
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
How to Enable, Monitor, and Secure Your Remote Workforce
Ad

More from Juan Carlos Gonzalez (20)

PPTX
Copilot en SharePoint & OneDrive - El camino hacia una gestión documental efi...
PPTX
Llevando la productividad al siguiente nivel: Agentes de Copilot para Sitios ...
PPTX
Llevando la Productividad al siguiente nivel - Agentes de Copilot para Sitios...
PPTX
Llevando la Productividad al siguiente nivel - Agentes de Copilot para Sitios...
PPTX
Preparate para la llegada de M365 Copilot con los controles de Gobierno de Sh...
PPTX
Seguridad en Power Platform - Que opciones tengo
PDF
Low Code y Construcción - Acelerando la Innovación Digital
PPTX
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
PPTX
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
PPTX
Gobernanza con SharePoint Premium de principio a fin
PPTX
Governance in SharePoint Premium:What's in the box?
PPTX
Seguridad en Power Platform - Que opciones tengo
PPTX
Boost your Teams Meetings to the next level with Teams Premium
PPTX
Stream en SharePoint en detalle
PPTX
Power Platform y Teams: ¿Qué platos tengo en mi menú?
PPTX
Digitaliza tus procesos de Aprobación con Approvals en Teams: ¿Qué hay de nue...
PPTX
Stream on SharePoint, an overview - JcGonzalez.pptx
PPTX
Shared channels in Microsoft Teams, an overview
PPTX
Canales Compartidos en Microsoft Teams al detalle
PPTX
Digitaliza tus Aprobaciones con Approvals en Teams - JcGonzalez .pptx
Copilot en SharePoint & OneDrive - El camino hacia una gestión documental efi...
Llevando la productividad al siguiente nivel: Agentes de Copilot para Sitios ...
Llevando la Productividad al siguiente nivel - Agentes de Copilot para Sitios...
Llevando la Productividad al siguiente nivel - Agentes de Copilot para Sitios...
Preparate para la llegada de M365 Copilot con los controles de Gobierno de Sh...
Seguridad en Power Platform - Que opciones tengo
Low Code y Construcción - Acelerando la Innovación Digital
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
Getting Ready for Copilot for Microsoft 365 with Governance Features in Share...
Gobernanza con SharePoint Premium de principio a fin
Governance in SharePoint Premium:What's in the box?
Seguridad en Power Platform - Que opciones tengo
Boost your Teams Meetings to the next level with Teams Premium
Stream en SharePoint en detalle
Power Platform y Teams: ¿Qué platos tengo en mi menú?
Digitaliza tus procesos de Aprobación con Approvals en Teams: ¿Qué hay de nue...
Stream on SharePoint, an overview - JcGonzalez.pptx
Shared channels in Microsoft Teams, an overview
Canales Compartidos en Microsoft Teams al detalle
Digitaliza tus Aprobaciones con Approvals en Teams - JcGonzalez .pptx
Ad

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
SOPHOS-XG Firewall Administrator PPT.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Assigned Numbers - 2025 - Bluetooth® Document
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
1. Introduction to Computer Programming.pptx
Tartificialntelligence_presentation.pptx
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Securing the Power Platform - What are my options

  • 1. Securing the Power Platform: What are my options Juan Carlos Gonzalez | Microsoft 365 & Microsoft Teams MVP | M365 SME & Delivery Manager #PowerConference2024
  • 3. 3 Thank you to our great sponsors for making this conference possible #PowerConference2024
  • 4. 4 Agenda • Protecting data and platforms is a must • Security layers in the Power Platform • Data Access Management, Data Security and Data Loss Prevention • Compliance Standards and Regulations #PowerConference2024
  • 5. 5 Data Protection Landscape is constantly changing #PowerConference2024 Regulatory and legal requirements are constantly evolving Growing sophistication of attacks Explosion of AI scenarios requires a correct and secure access to data Data access demands from an increasingly dynamic workforce
  • 6. 6 How can I keep data secure? #PowerConference2024 Controlling and limiting access to data Preventing data exfiltration Staying compliant with standards and regulations Protecting data from external threats Gaining visibility into user activity Doing risks assessments
  • 7. 7 Security layers in the Power Platform #PowerConference2024 Identity management + Network Security User access management + Data level security Data encryption and Compliance Prevent data exfiltration + Increase visibility
  • 8. 8 Managed Security in the Power Platform #PowerConference2024 AI-powered detection and monitoring to address and prevent security risks. Robust controls to ensure confidentiality and encryption, ensuring security of sensitive information. Seamless and adaptive tools to ensure only authorized resource and data access. Assured visibility and adherence to industry and regional regulatory requirements. Intelligent guidance for scalable and efficient enterprise-grade security. Advanced protection for an AI-driven world Data Protection and Privacy Threat Protection Identity and Access Management Compliance Security Posture Management Network Isolation (v-Net) Customer managed keys IP Firewall Microsoft Sentinel integration Microsoft Purview Data map integration Lockbox Resource sharing limits IP cookie binding Enforceable solution checker Data policies (desktop flows) Client app access Data masking Privileged Access management Conditional Access for Individual Canvas Apps Advanced connector policies Dataverse audit Security guidance
  • 9. 9 Managed Security in the Power Platform #PowerConference2024
  • 10. Demo #1: Power Platform Security Hub #PowerConference2024
  • 11. 11 Identity Management #PowerConference2024 • Full support for Microsoft Entra-based identities and access controls • Security groups native integration • Automatically block access if suspicious activities are detected Authentication • Make decisions and enforce organization policies regarding user/group membership, IP location, device, risk detection, etc. Conditional Access • Restrict to/from cross tenant connections established via Power Platform Apps and flows • Allow exception through rules based on business needs Tenant Isolation • Force user re- authentication as response to events such: password change/reset, user account deleted , auth token refresh, MFA enabled, etc • In preview for Dataverse and Model-Driven Apps Continuous Access Evaluation
  • 12. 12 Identity Management – Conditional Access #PowerConference2024 Conditional Access for the Power Platform
  • 13. 13 Identity Management – Conditional Access #PowerConference2024
  • 14. 14 Tenant Isolation – Scenarios #PowerConference2024
  • 15. 15 Tenant Isolation – Settings available #PowerConference2024 Access Control settings 1 Tenant Isolation enabled in the tenant 2 Exceptions can be configured in 1 way or 2 ways 3
  • 16. 16 Tenant Isolation – Impact on Apps & Flows #PowerConference2024
  • 17. Demo #2: Conditional Access + Tenant Isolation #PowerConference2024
  • 19. 19 Network Security #PowerConference2024 Private endpoints Azure Network Watcher Azure Sentinel Azure Firewall Azure NSG Azure Policy Service Endpoints Service Tags Private DNS zones Prevent data exfiltration Security compliance Gain more control Azure vNet Continuous Access Evaluation Data policies IP based cookie binding IP firewall Reverse proxy Secure identity Secure endpoints Secure network Outbound connectivity Inbound connectivity
  • 20. 20 Network Security #PowerConference2024 • Filter inbound and outbound traffic Approved host names & IP ranges • Use in network access controls on Network Security Groups (NSGs) or Azure Firewall instead of approved IP ranges • Minimize the complexity of frequent updates to network security rules Service tags • Prevents malicious users, outside allowed IP ranges, from accessing your data • Mitigate insider threats like data exfiltration + Prevent token replay attacks • Current Scope: Dataverse (Managed Environments, OData EndPoints) IP Firewall
  • 21. 21 Network Security #PowerConference2024 • Helps to route all network traffic from Power Platform environments to Azure v- Nets without routing through the Internet • Scope supported: Dataverse plugins, selected connectors Network Isolation • Prevents attackers using cookies to impersonate an authorized user • Current Scope: Dataverse (Managed Environments) IP Cookie Binding
  • 22. 22 Network Security #PowerConference2024 Network Security settings 1 IP Firewall enabled for the environment 2 IP address or IP addresses range 3
  • 24. Demo #3: Network Security #PowerConference2024
  • 25. 25 Identity Management & Network Security: Key learnings #PowerConference2024 • Take advantage of Microsoft Entra identities native integration • Configure Conditional Access policies for Power Apps, Power Automate, Power BI and even Copilot Studio • Evaluate if you need to enable tenant isolation • Restrict traffic to Power Platform resources to a specified IP range (Managed environments, up to 200 IP address) • Limit the endpoints Power Platform resources can connect to with connection endpoint filtering • Prevent cookie replay attacks with IP based cookie binding • Use Azure vNet to enforce traffic to travel through your virtual private network, without the need to configure on-premises data gateway
  • 26. 26 Data Access Management for Users #PowerConference2024 • Only licensed users with a valid Microsoft Entra ID can log into the system Tenant Access • A PP environment is the security boundary and the unit of governance management • Best practice: assign security groups to environments to manage user access Environment Access • Access as owner/co-owner: Edit/Share/Use • Access to run components – use only no edit Resources Access
  • 27. 27 Data Access Management by User Type: Tips & Recommendations #PowerConference2024 • Secure the default environment • Define an environment strategy • Limit sharing with everyone: configure specific limits at the environment level (managed environments) • Define data policies • Govern custom connectors usage • Enable tenant isolation • Route makers to dedicated environments Govern Maker Access • Everyone includes all users in Entra ID, including guests • Guests are treated as any other users in the tenant • Confirm if guests making apps in your organization is required. Disable if guests are not expected to be makers • Disable guest access to Power Platform resources using Conditional Access • Disable share with everyone (Global vs. Managed Environments) • Control access using roles and permissions • Govern administrator roles assignment to guests Govern GuestAccess
  • 28. 28 Data Access Management by User Type: Tips & Recommendations #PowerConference2024 Access Control settings 1 Guest access setting 2 Enable/Disable Guest access for the environment 3
  • 29. 29 Data Access Management by User Type: Tips & Recommendations #PowerConference2024 • Implement security access using a layered approach (App | Form | Record | Field) • Use explicit authentication for shared connections • Cleanup of deleted users/reassign owned records • Licensing is not a security control • Review Sharing limits • Make use of Microsoft Entra security groups • User access diagnostics and troubleshooting Govern User Access • Limit Power Platform administrator roles • Enable Power Platform Admin roles through Privileged Identity Management:  Enforce on-demand, just-in-time administrative access when needed  Minimize number of privileged users (admins) and duration of access  Reduce risks of authorized user impact on sensitive data  Reduce risks of malicious user getting access  Be aware of current limitations in regards of adding/removing the System Administrator Role Govern Admin Access
  • 30. 30 Data Access Management by User Type: Tips & Recommendations #PowerConference2024 Eligible Power Platform Admin Role assignment
  • 31. Demo #4: Data Access Security #PowerConference2024
  • 32. 33 Data Policies, Connector Actions and User Granular Consent #PowerConference2024 • Prevent makers to expose corporate Information • 2 levels of Application: Tenant-Wide vs. Environment Data Policies • Prevent makers from building apps and flows that leverage blocked connectors • Extended Data Policies to support prevent creating new connections to blocked connectors Data Policies in Design Time • Providing admins fine grain control over which actions within a connector are permitted within the environment Connector Action Control • Users consents to specific permissions required to establish connections to data sources. • Accurate and concise description of what the connector will be executing prior to connection creation specific to actions executed in the application User Granular Consent
  • 33. 34 Data Policies: Advanced Connector Policies #PowerConference2024 Apply connector policies at scale within Environment Groups, allowing admins to block ANY connector.
  • 34. 35 User Granular Consent #PowerConference2024 Granular consent requested Previous consent user experience Current consent user experience
  • 35. 36 Deep Visibility into User and Application Activity #PowerConference2024 • User access and activity (records changes) • Monitor system jobs • Audit deleted jobs • Manage log records Dataverse Audit • Dataverse, Power Apps, Power Automate, Connectors, Data Activity • Internal and external audit • Audit changes to records and user access Activity Logging • Activities performed on Environments by the Power Platform Administrator • Lifecycle operations, property and setting change activities, security and permission change activities Admin Activity Logging • Capture, record, discover and retain your organization's unified audit log Microsoft Purview Audit Everything is audited in th PP!
  • 36. Demo #5: Data Policies + Auditing #PowerConference2024
  • 37. Data Access Management: Key learnings #PowerConference2024 • Secure Your Power Platform Deployment best practices • Limit sharing to business users that need to access the app • Licensing is not a security control • Route makers to dedicated developer environments • Assign security groups to environments • Manage @scale with proper environment strategy and corresponding data exfiltration prevention policies & ALM • Configure solution checker to automate analysis against best practices rules and identify solution issues • Educate makers regarding organization’s best practices with maker welcome content • Leverage Dataverse fine grain security controls • Assign administrator roles judiciously • Leverage analytics, audit and threat detection solutions to get deep visibility into activity on the platform 38
  • 38. 39 Data Encryption and Compliance #PowerConference2024 • Encryption - last and strongest line of defense in a multi-layered data security strategy • Available out of the box for all data/storage types Microsoft Managed Key • Self-manage the encryption key • Prevent access to customer content when you revoke the key access to our services, at any time • Private link • Azure managed-HSM • Automatic key rotation Customer Managed Key • Protects user from interception of their communication and helps ensure transaction integrity • Protects from bulk interception of data • Protects from interception or loss of data in transit between users Protection for data in transit
  • 39. 40 Data Encryption and Compliance #PowerConference2024 • Time bound access from secured station by personnel with security clearance • Multiple layers of approval • Audit JIT Access Policies • Extends JIT with customer approval • Bound to specific environment, user and duration • OOB audit available to end user Customer Lockbox • Tenant home geo default • Multi-geo support (at environment level) to enable global presence • Data resiliency ensured within geo Data Residency
  • 40. 41 Data Encryption and Compliance #PowerConference2024 • GDPR compliant • Microsoft Trust Center Data Privacy • Address evolving requirements of the public sector • Available based on eligibility criteria • Additional restrictions to data access Government Hosting • National, regional and industry-specific regulations for data collection and use • E.g., FedRamp, FERPA, HIPAA, SOC, IRS 1075, SEC Regulation, FISC (Japan), FACT (UK), etc Compliance Standards
  • 41. Demo #6: Data Encryption & Compliance #PowerConference2024
  • 42. Data Encryption and Compliance: Key learnings #PowerConference2024 • Use Power Platform Trust Center for latest on security, privacy, compliance, and transparency • Govern Microsoft access to sensitive data with CMK and Lockbox • Govern AI access to sensitive data using Dataverse security controls 43
  • 43. Office 365 for IT Pros • The best way to stay up to date with Microsoft 365:  https://o365itpros.gumroad.com/l/O365IT #PowerConference2024

Editor's Notes

  • #1: Power Platform y Teams: ¿Qué platos tengo en mi menú?
  • #4: La importancia de la protección de datos y plataformas Capas de Seguridad en la Power Platform Gestión de Acceso al Dato, Seguridad del Dato y Prevención de Fuga de Datos Cumplimiento de regulaciones y normativas Conclusiones
  • #5: Growing sophistication of attacks Drive to leverage data to unlock AI-driven scenarios Data access demands from an increasingly dynamic workforce Evolving regulatory and legal requirement
  • #6: How can I control and limit access to data? How can I prevent data exfiltration? How can I stay compliant with regulations? How can I protect my data from external threats? How can I gain visibility into user activity? How can I assess the risk?
  • #7: How can I protect my data from external threats? Identity management Network Security How can I control and limit access to data? How can I prevent data exfiltration? How can I gain visibility into user activity? User access management Data level security Prevent data exfiltration Increased visibility How can I stay compliant with regulations? Data encryption Compliance How can I assess the risk?
  • #10: Power Platform Security Hub
  • #11: Authentication: Full support for Microsoft Entra-based identities and access controls Security group native integration Automatically block access if suspicious activities are detected Conditional Access Make decisions and enforce organization policies regarding user/group membership, IP location, device, risk detection, etc. Tenant Isolation Restrict to/from cross tenant connections established via Power Platform applications and flows. Allow rules based on business needs Continuous Access Evaluation Force user re-authentication as response to events such: password change/reset, user account deleted , auth token refresh, MFA enabled, etc. Current scope: Dataverse, model driven apps
  • #14: Restrict cross-tenant inbound and outbound access - Power Platform | Microsoft Learn
  • #17: Conditional Access Tenant Isolation
  • #20: Approved host names & IP ranges Filter inbound and outbound traffic Service tags Use in network access controls on Network Security Groups (NSGs) or Azure Firewall instead of approved IP ranges Minimize the complexity of frequent updates to network security rules IP Firewall IP firewall in Power Platform environments - Power Platform | Microsoft Learn Prevents malicious users, outside allowed IP ranges, from accessing your data – Mitigate insider threats like data exfiltration: A malicious user who tries to download data from Dataverse using a client tool like Excel or Power BI from a disallowed IP location is blocked from doing so in real time. Prevent token replay attacks: If a user steals an access token and tries to use it to access Dataverse from outside allowed IP ranges, Dataverse denies the attempt in real time. Current scope: Dataverse IP Cookie Binding Safeguarding Dataverse sessions with IP cookie binding - Power Platform | Microsoft Learn Prevents attackers using cookies to impersonate an authorized user Current scope: Dataverse Network Isolation Virtual Network support overview - Power Platform | Microsoft Learn Helps you route all network traffic from Power Platform environments to your v-Net without routing through internet. Scope supported: Dataverse plugins, selected connectors
  • #21: Approved host names & IP ranges Filter inbound and outbound traffic Service tags Use in network access controls on Network Security Groups (NSGs) or Azure Firewall instead of approved IP ranges Minimize the complexity of frequent updates to network security rules IP Firewall IP firewall in Power Platform environments - Power Platform | Microsoft Learn Prevents malicious users, outside allowed IP ranges, from accessing your data – Mitigate insider threats like data exfiltration: A malicious user who tries to download data from Dataverse using a client tool like Excel or Power BI from a disallowed IP location is blocked from doing so in real time. Prevent token replay attacks: If a user steals an access token and tries to use it to access Dataverse from outside allowed IP ranges, Dataverse denies the attempt in real time. Current scope: Dataverse IP Cookie Binding Safeguarding Dataverse sessions with IP cookie binding - Power Platform | Microsoft Learn Prevents attackers using cookies to impersonate an authorized user Current scope: Dataverse Network Isolation Virtual Network support overview - Power Platform | Microsoft Learn Helps you route all network traffic from Power Platform environments to your v-Net without routing through internet. Scope supported: Dataverse plugins, selected connectors
  • #24: IP Firewall IP Cookie binding
  • #26: Tenant Access Only licensed users with a valid Microsoft Entra ID can log into the system. Environment Access Environment is the security boundary and the unit of governance management Recommended to assign security groups to environments to manage user access Resources Access: Access to co-own components – edit, share, use Access to run components – use only no edit
  • #27: Govern Maker Access Secure the default environment Establish an environment strategy Limit sharing with everyone, configure specific limits Establish data loss prevention policies. Don’t forget about the new connectors. Govern custom connectors usage. Enable tenant isolation. Route makers to dedicated environments. Share best practices with maker onboarding. Govern Guests Access Everyone includes all users in Entra ID, including guests Guests are treated as any other users in the tenant Assess if guests making apps in your organization is required. Disable if guests are not expected to be makers. Disable guest access to Power Platform resources using Conditional Access Disable share with everyone Control access using roles and permissions Govern administrator roles assignment to guests
  • #29: Gobern User Access Implement security access using a layered approach Use explicit authentication for shared connections Cleanup of deleted users/reassign owned records Licensing is not a security control Sharing limits Microsoft Entra security groups User access diagnostics and troubleshooting Diagnose user access related issues by invoking ‘Run diagnostics’ in PPAC Identify license, security role, security group or Microsoft Entra related issues Get appropriate pointers to resolve the underlying problem Auto-synchronization of user information in Microsoft Entra Govern Admin Access: Limit Power Platform administrator roles Privilege Identity Management – Power Platform preview Enforce on-demand, just-in-time administrative access when needed Minimize number of privileged users (admins) and duration of access Reduce risks of authorized user impact on sensitive data Reduce risks of malicious user getting access
  • #31: Disable Guest Access at the environment level Configuring PIM to be a PP Admin Diganostics & Troubleshooting: Troubleshoot common user access issues for environments - Power Platform | Microsoft Learn
  • #32: Dataverse Security Users are associated with an environment either directly or just in-time via an Azure AD Group Access to apps, data and services is by association with one or more security roles Each security role grants discrete privileges to tables in Dataverse Dataverse data can be secured down to the column-level and records can be shared Role based security OOB and custom roles Extensible and customizable Row-level controls Action-based controls Granular level of access Fine-Grain Controls Record level sharing Hierarchical and matrix data access structure Column level security Segregate data in ‘folder’ business unit Collaborate with Teams Record and user access auditing Microsoft Purview Integration Automatically scan, classify and label sensitive data within your data estate and allows you define policies to prevent loss Define policies to keep data estate secure, reduce data exposure, and better protect sensitive data. Empower data consumers to discover valuable, trustworthy data.
  • #33: DLP Environment / tenant-wide guardrails to prevent makers from exposing organizational data DLP in design Time Prevent makers from building apps and flows that leverage blocked connectors. Extended DLP to support prevent creating new connections to blocked connectors. Connector Action Control Providing admins fine grain control over which actions within a connector are permitted within the environment. User Granular Consent Users consents to specific permissions required to establish connections to data sources. Accurate and concise description of what the connector will be executing prior to connection creation specific to actions executed in the application.
  • #34: Restrict cross-tenant inbound and outbound access - Power Platform | Microsoft Learn
  • #36: Dataverse Audit User access and activity (records changes) Monitor system jobs Audit delete jobs Manage log records Activity Logging Dataverse, Power Apps, Power Automate, Connector*, DLP activity Internal and external audit Audit changes to records and user access Admin Activity Logging Activities performed on Environments by the Power Platform Administrator Lifecycle operations, property and setting change activities, security and permission change activities Microsoft 365 Purview Audit Capture, record, discover and retain your organization's unified audit log
  • #37: Data Policies Setup Dataverse Audit Purview Audit
  • #38: Secure Your Power Platform Deployment best practices Limit sharing to business users that need to access the app Licensing is not a security control Route makers to dedicated developer environments Assign security groups to environments Mange @scale with proper environment strategy and corresponding data exfiltration prevention policies & ALM Configure solution checker to automate analysis against best practices rules and identify solution issues Educate makers regarding organization’s best practices with maker welcome content Leverage Dataverse fine grain security controls Assign administrator roles judiciously Leverage analytics, audit and threat detection solutions to get deep visibility into activity on the platform
  • #39: Microsoft Managed Key Encryption - last and strongest line of defense in a multi-layered data security strategy Available out of the box for all data/storage types Customer Managed Key Self-manage the encryption key Maintain control over your data Prevent access to customer content when you revoke the key access to our services, at any time Private link Azure managed-HSM Automatic key rotation Protection for data in transit Protects user from interception of their communication and helps ensure transaction integrity Protects from bulk interception of data Protects from interception or loss of data in transit between users
  • #40: JIT access policies Time bound access from secured station by personnel with security clearance Multiple layers of approval Audit Customer Lockbox Extendss JIT with customer approval Bound to specific environment, user and duration OOB audit available to end user Data residency: Tenant home geo default Multi-geo support (at environment level) to enable global presence Data resiliency ensured within geo Data Privacy: GDPR compliant Microsoft Trust Center Government Hosting Address evolving requirements of the public sector Available based on eligibility criteria Additional restrictions to data access Compliance standards National, regional and industry-specific regulations for data collection and use E.g., FedRamp, FERPA, HIPAA, SOC, IRS 1075, SEC Regulation, FISC (Japan), FACT (UK), etc.
  • #41: Data Privacy: GDPR compliant Microsoft Trust Center Government Hosting Address evolving requirements of the public sector Available based on eligibility criteria Additional restrictions to data access Compliance standards National, regional and industry-specific regulations for data collection and use E.g., FedRamp, FERPA, HIPAA, SOC, IRS 1075, SEC Regulation, FISC (Japan), FACT (UK), etc.
  • #42: Customer Lockbox
  • #43: Use Power Platform Trust Center for latest on security, privacy, compliance, and transparency. Govern Microsoft access to sensitive data with CMK and Lockbox Govern AI access to sensitive data using Dataverse security controls