Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 2900105

Browse files
committedMar 22, 2021
javiers feedback
1 parent a106bbe commit 2900105

File tree

2 files changed

+19
-12
lines changed

2 files changed

+19
-12
lines changed
 
Loading

‎articles/sentinel/mssp-protect-intellectual-property.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -25,34 +25,40 @@ This article describes several methods that managed security service providers (
2525

2626
## Cloud Solutions Providers (CSP)
2727

28-
If you're reselling Azure as a Cloud Solutions Provider (CSP), you're managing the customer's Azure subscription. Specified users from your MSSP tenant are granted with **Owner** access to the customer's Azure subscription, and the customer has no access by default.
28+
If you're reselling Azure as a Cloud Solutions Provider (CSP), you're managing the customer's Azure subscription. Thanks to [Admin-On-Behalf-Of (AOBO)](/partner-center/azure-plan-manage), users in the Admin Agents group from your MSSP tenant are granted with Owner access to the customer's Azure subscription, and the customer has no access by default.
2929

3030
If you need to provide customer users with access to the Azure environment, we recommend that you grant them access at the level of the *resource group* so that you can show / hide parts of the environment as needed.
3131

3232
For example:
3333

3434
- You might grant the customer with access to several resource groups where their applications are located, but still keep the Azure Sentinel environment in a separate resource group, where the customer has no access.
3535

36-
- Use this method to enable customers to view *Workbooks* and *Playbooks*, which are separate resources that can reside in their own resource group.
36+
- Use this method to enable customers to view selected workbooks and playbooks, which are separate resources that can reside in their own resource group.
3737

38-
In such cases, we recommend that you use [Azure Lighthouse](multiple-tenants-service-providers.md) to provide customer access, which enables you to grant users or groups with access to a specific scope, such as a resource group or subscription, using one of the built-in roles.
38+
If other users from the MSSP tenant, outside of the Admin Agents group, need to access the customer environment, we recommend that you use [Azure Lighthouse](multiple-tenants-service-providers.md). This enables you to grant users or groups with access to a specific scope, such as a resource group or subscription, using one of the built-in roles.
3939

4040
> [!TIP]
4141
> Alternately, if you need to provide your customers with access to the entire subscription, see [Enterprise Agreements (EA) / Pay-as-you-go (PAYG)](#enterprise-agreements-ea--pay-as-you-go-payg).
42-
>
42+
>
4343
44-
### Sample CSP architecture
44+
### Sample CSP architecture
4545

4646
The following image describes how permissions might work when providing access to CSP customers:
4747

4848
:::image type="content" source="media/mssp-protect-intellectual-property/csp-customers.png" alt-text="Protect your Azure Sentinel intellectual property with CSP customers.":::
4949

50-
In this image, the users granted with **Owner** access are the users in the Admin Agents group, in the MSSP Azure AD tenant attached to the CSP contract. Typically, **Owner** access is provided to MSSP tenant users using the [Admin-On-Behalf-Of (AOBO)](/partner-center/azure-plan-manage) mechanism.
50+
In this image:
51+
52+
- The users granted with **Owner** access are the users in the Admin Agents group, in the MSSP Azure AD tenant attached to the CSP contract.
53+
- Other groups from the MSSP get access to the customer environment via Azure Lighthouse.
54+
- Customer access is managed by Azure RBAC.
55+
56+
With this setup, MSSPs can hide protect their analytics rules, hunting queries and selected workbooks and playbooks.
5157

5258
> [!NOTE]
5359
> - Sometimes, the MSSP Azure AD tenant attached to the CSP contract is separate from the MSSP's main tenant.
5460
>
55-
> - Even with granting access at the level of the resource group, customers will still have access to log data for the resources they can access, such as logs from a VM, even without access to Azure Sentinel. For more information, see [Manage access to Azure Sentinel data by resource](resource-context-rbac.md).
61+
> - Even with granting access at the resource group level, customers will still have access to log data for the resources they can access, such as logs from a VM, even without access to Azure Sentinel. For more information, see [Manage access to Azure Sentinel data by resource](resource-context-rbac.md).
5662
>
5763
5864
For more information, also see the [Azure Lighthouse documentation](/azure/lighthouse/concepts/cloud-solution-provider).
@@ -67,9 +73,9 @@ Instead, protect your intellectual property that you've developed in Azure Senti
6773

6874
Analytics rules and hunting queries are both contained within Azure Sentinel, and therefore cannot be separated from the Azure Sentinel resource or workspace.
6975

70-
Even if a user has Azure Sentinel Reader permissions, they'll still be able to view the query. In this case, we recommend hosting your Analytics rules and hunting queries in your own MSSP tenant, instead of the customer tenant.
76+
Even if a user only has Azure Sentinel Reader permissions, they'll still be able to view the query. In this case, we recommend hosting your Analytics rules and hunting queries in your own MSSP tenant, instead of the customer tenant.
7177

72-
To do this, you'll need a workspace in your own tenant with Azure Sentinel, and you'll also need to see the customer workspace via [Azure Lighthouse](multiple-tenants-service-providers.md).
78+
To do this, you'll need a workspace in your own tenant with Azure Sentinel enabled, and you'll also need to see the customer workspace via [Azure Lighthouse](multiple-tenants-service-providers.md).
7379

7480
To ensure that the rule or query can be run in the customer workspace, make sure to specify the workspace where the query is run against. For example, use a workspace statement in your rule as follows:
7581

@@ -80,17 +86,17 @@ workspace('<customer-workspace>').SecurityEvent
8086

8187
When adding a workspace statement to your analytics rules, consider the following:
8288

83-
- **No alerts in the customer workspace**. Using this method means that there are no alerts in the customer's workspace, and therefore no incidents either. Both alerts and incidents will exist in your, MSSP workspace only.
89+
- **No alerts in the customer workspace**. Rules created in this manner, won’t create alerts or incidents. Both alerts and incidents will exist in your MSSP workspace only.
8490

85-
- **Create separate alerts for each customer**. This method also requires that you use a separate alert for each customer and detection, as the workspace statement will be different in each case.
91+
- **Create separate alerts for each customer**. This method also requires that you use separate alerts for each customer and detection, as the workspace statement will be different in each case.
8692

8793
You can add the customer name to the alert rule name to easily identify the customer when the alert is triggered. Separate alerts may result in a large number of rules, which you might want to manage using scripting, or [Azure Sentinel as Code](https://techcommunity.microsoft.com/t5/azure-sentinel/deploying-and-managing-azure-sentinel-as-code/ba-p/1131928).
8894

8995
For example:
9096

9197
:::image type="content" source="media/mssp-protect-intellectual-property/mssp-rules-per-customer.png" alt-text="Create separate rules in your MSSP workspace for each customer.":::
9298

93-
- **Create separate MSSP workspaces for each customer**. Creating separate rules for each customer and detection may cause you to reach the maximum number of analytics rules for your workspace. If you have many customers and expect to reach this limit, you may want to create a separate MSSP workspace for each customer.
99+
- **Create separate MSSP workspaces for each customer**. Creating separate rules for each customer and detection may cause you to reach the maximum number of analytics rules for your workspace (512). If you have many customers and expect to reach this limit, you may want to create a separate MSSP workspace for each customer.
94100

95101
For example:
96102

@@ -136,6 +142,7 @@ You can protect your playbooks as follows, depending on where the playbook's ana
136142

137143
For more information, see:
138144

145+
- [Azure Sentinel Technical Playbook for MSSPs](https://cloudpartners.transform.microsoft.com/download?assetname=assets/Azure-Sentinel-Technical-Playbook-for-MSSPs.pdf&download=1)
139146
- [Manage multiple tenants in Azure Sentinel as an MSSP](multiple-tenants-service-providers.md)
140147
- [Extend Azure Sentinel across workspaces and tenants](extend-sentinel-across-workspaces-tenants.md)
141148
- [Tutorial: Visualize and monitor your data](tutorial-monitor-your-data.md)

0 commit comments

Comments
 (0)
Please sign in to comment.