You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/mssp-protect-intellectual-property.md
+19-12Lines changed: 19 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -25,34 +25,40 @@ This article describes several methods that managed security service providers (
25
25
26
26
## Cloud Solutions Providers (CSP)
27
27
28
-
If you're reselling Azure as a Cloud Solutions Provider (CSP), you're managing the customer's Azure subscription. Specified users from your MSSP tenant are granted with **Owner** access to the customer's Azure subscription, and the customer has no access by default.
28
+
If you're reselling Azure as a Cloud Solutions Provider (CSP), you're managing the customer's Azure subscription. Thanks to [Admin-On-Behalf-Of (AOBO)](/partner-center/azure-plan-manage), users in the Admin Agents group from your MSSP tenant are granted with Owner access to the customer's Azure subscription, and the customer has no access by default.
29
29
30
30
If you need to provide customer users with access to the Azure environment, we recommend that you grant them access at the level of the *resource group* so that you can show / hide parts of the environment as needed.
31
31
32
32
For example:
33
33
34
34
- You might grant the customer with access to several resource groups where their applications are located, but still keep the Azure Sentinel environment in a separate resource group, where the customer has no access.
35
35
36
-
- Use this method to enable customers to view *Workbooks*and *Playbooks*, which are separate resources that can reside in their own resource group.
36
+
- Use this method to enable customers to view selected workbooks and playbooks, which are separate resources that can reside in their own resource group.
37
37
38
-
In such cases, we recommend that you use [Azure Lighthouse](multiple-tenants-service-providers.md) to provide customer access, which enables you to grant users or groups with access to a specific scope, such as a resource group or subscription, using one of the built-in roles.
38
+
If other users from the MSSP tenant, outside of the Admin Agents group, need to access the customer environment, we recommend that you use [Azure Lighthouse](multiple-tenants-service-providers.md). This enables you to grant users or groups with access to a specific scope, such as a resource group or subscription, using one of the built-in roles.
39
39
40
40
> [!TIP]
41
41
> Alternately, if you need to provide your customers with access to the entire subscription, see [Enterprise Agreements (EA) / Pay-as-you-go (PAYG)](#enterprise-agreements-ea--pay-as-you-go-payg).
42
-
>
42
+
>
43
43
44
-
### Sample CSP architecture
44
+
### Sample CSP architecture
45
45
46
46
The following image describes how permissions might work when providing access to CSP customers:
47
47
48
48
:::image type="content" source="media/mssp-protect-intellectual-property/csp-customers.png" alt-text="Protect your Azure Sentinel intellectual property with CSP customers.":::
49
49
50
-
In this image, the users granted with **Owner** access are the users in the Admin Agents group, in the MSSP Azure AD tenant attached to the CSP contract. Typically, **Owner** access is provided to MSSP tenant users using the [Admin-On-Behalf-Of (AOBO)](/partner-center/azure-plan-manage) mechanism.
50
+
In this image:
51
+
52
+
- The users granted with **Owner** access are the users in the Admin Agents group, in the MSSP Azure AD tenant attached to the CSP contract.
53
+
- Other groups from the MSSP get access to the customer environment via Azure Lighthouse.
54
+
- Customer access is managed by Azure RBAC.
55
+
56
+
With this setup, MSSPs can hide protect their analytics rules, hunting queries and selected workbooks and playbooks.
51
57
52
58
> [!NOTE]
53
59
> - Sometimes, the MSSP Azure AD tenant attached to the CSP contract is separate from the MSSP's main tenant.
54
60
>
55
-
> - Even with granting access at the level of the resource group, customers will still have access to log data for the resources they can access, such as logs from a VM, even without access to Azure Sentinel. For more information, see [Manage access to Azure Sentinel data by resource](resource-context-rbac.md).
61
+
> - Even with granting access at the resource group level, customers will still have access to log data for the resources they can access, such as logs from a VM, even without access to Azure Sentinel. For more information, see [Manage access to Azure Sentinel data by resource](resource-context-rbac.md).
56
62
>
57
63
58
64
For more information, also see the [Azure Lighthouse documentation](/azure/lighthouse/concepts/cloud-solution-provider).
@@ -67,9 +73,9 @@ Instead, protect your intellectual property that you've developed in Azure Senti
67
73
68
74
Analytics rules and hunting queries are both contained within Azure Sentinel, and therefore cannot be separated from the Azure Sentinel resource or workspace.
69
75
70
-
Even if a user has Azure Sentinel Reader permissions, they'll still be able to view the query. In this case, we recommend hosting your Analytics rules and hunting queries in your own MSSP tenant, instead of the customer tenant.
76
+
Even if a user only has Azure Sentinel Reader permissions, they'll still be able to view the query. In this case, we recommend hosting your Analytics rules and hunting queries in your own MSSP tenant, instead of the customer tenant.
71
77
72
-
To do this, you'll need a workspace in your own tenant with Azure Sentinel, and you'll also need to see the customer workspace via [Azure Lighthouse](multiple-tenants-service-providers.md).
78
+
To do this, you'll need a workspace in your own tenant with Azure Sentinel enabled, and you'll also need to see the customer workspace via [Azure Lighthouse](multiple-tenants-service-providers.md).
73
79
74
80
To ensure that the rule or query can be run in the customer workspace, make sure to specify the workspace where the query is run against. For example, use a workspace statement in your rule as follows:
When adding a workspace statement to your analytics rules, consider the following:
82
88
83
-
-**No alerts in the customer workspace**. Using this method means that there are no alerts in the customer's workspace, and therefore no incidents either. Both alerts and incidents will exist in your, MSSP workspace only.
89
+
-**No alerts in the customer workspace**. Rules created in this manner, won’t create alerts or incidents. Both alerts and incidents will exist in your MSSP workspace only.
84
90
85
-
-**Create separate alerts for each customer**. This method also requires that you use a separate alert for each customer and detection, as the workspace statement will be different in each case.
91
+
-**Create separate alerts for each customer**. This method also requires that you use separate alerts for each customer and detection, as the workspace statement will be different in each case.
86
92
87
93
You can add the customer name to the alert rule name to easily identify the customer when the alert is triggered. Separate alerts may result in a large number of rules, which you might want to manage using scripting, or [Azure Sentinel as Code](https://techcommunity.microsoft.com/t5/azure-sentinel/deploying-and-managing-azure-sentinel-as-code/ba-p/1131928).
88
94
89
95
For example:
90
96
91
97
:::image type="content" source="media/mssp-protect-intellectual-property/mssp-rules-per-customer.png" alt-text="Create separate rules in your MSSP workspace for each customer.":::
92
98
93
-
-**Create separate MSSP workspaces for each customer**. Creating separate rules for each customer and detection may cause you to reach the maximum number of analytics rules for your workspace. If you have many customers and expect to reach this limit, you may want to create a separate MSSP workspace for each customer.
99
+
-**Create separate MSSP workspaces for each customer**. Creating separate rules for each customer and detection may cause you to reach the maximum number of analytics rules for your workspace (512). If you have many customers and expect to reach this limit, you may want to create a separate MSSP workspace for each customer.
94
100
95
101
For example:
96
102
@@ -136,6 +142,7 @@ You can protect your playbooks as follows, depending on where the playbook's ana
136
142
137
143
For more information, see:
138
144
145
+
-[Azure Sentinel Technical Playbook for MSSPs](https://cloudpartners.transform.microsoft.com/download?assetname=assets/Azure-Sentinel-Technical-Playbook-for-MSSPs.pdf&download=1)
139
146
-[Manage multiple tenants in Azure Sentinel as an MSSP](multiple-tenants-service-providers.md)
140
147
-[Extend Azure Sentinel across workspaces and tenants](extend-sentinel-across-workspaces-tenants.md)
141
148
-[Tutorial: Visualize and monitor your data](tutorial-monitor-your-data.md)
0 commit comments