Security & Compliance

Zero Trust architectuur met GDAP, Microsoft Defender XDR en complete compliance coverage. Van identity protection tot data governance - wij beveiligen je complete M365 omgeving.

Zero TrustGDAP CertifiedDefender XDRGDPR/NIS2

Zero Trust Architecture

"Never trust, always verify" - elk toegangsverzoek wordt gevalideerd ongeacht locatie of netwerk. Wij implementeren Zero Trust volgens Microsoft's 6-pillar model.

Identity

Strong authentication en least-privilege access voor alle gebruikers.

MFA voor alle usersPIM just-in-time accessRisk-based Conditional AccessIdentity Protection

Devices

Alleen compliant, managed devices krijgen toegang tot corporate resources.

Intune compliance policiesDevice health attestationHybrid Azure AD joinEndpoint detection

Apps

Gecontroleerde toegang tot applicaties met app-level beveiliging.

MCAS session controlApp protection policiesApproved apps onlyOAuth app consent

Data

Data classificatie en bescherming op basis van gevoeligheid.

Sensitivity labelsDLP policiesEncryption at rest/transitInformation barriers

Infrastructure

Secure configuration van cloud en on-premises infrastructure.

Security baselinesNetwork segmentationJust-in-time accessThreat detection

Network

Network segmentation en micro-perimeters rond resources.

VPN/Always-On VPNConditional Access by locationNamed locationsIP blocking
GDAP Certified Partner

Granular Delegated Admin Privileges

GDAP vervangt legacy DAP met least-privileged, time-bound, customer-approved access. Wij implementeren een 5-tier security group structuur voor maximale controle.

0

Emergency Access

Alleen voor noodgevallen

Global Administrator (break-glass only)

Zeer restrictief - sealed credentials

1

Global Admins

Migraties en emergencies

Global Administrator

Time-bound - max 8 uur

2

Service Admins

Dagelijks beheer workloads

Exchange Admin
SharePoint Admin
Teams Admin
Intune Admin

Standard - 730 dagen met review

3

Support Desk

Tier 1 support taken

Helpdesk Admin
User Admin

Standard - password resets, basic support

4

Read-Only

Monitoring dashboards

Reports Reader
Security Reader

Read-only - geen wijzigingsrechten

Least-Privileged

Alleen de rechten die nodig zijn voor de taak

Time-Bound

Max 2 jaar met automated expiration alerts

Customer Approval

Expliciete goedkeuring voor elke GDAP relatie

Full Audit

Complete audit trail van alle partner acties

Microsoft Defender XDR

Extended Detection & Response met unified threat management. Eén platform voor endpoint, email, identity en cloud app security.

Defender for Endpoint

  • Real-time threat detection
  • Automated investigation & response
  • Attack surface reduction
  • Endpoint detection & response (EDR)
  • Threat & vulnerability management

Defender for Office 365

  • Safe Attachments (sandbox detonation)
  • Safe Links (time-of-click URL protection)
  • Advanced anti-phishing (ML-based)
  • Attack simulation training
  • Threat Explorer & hunting

Defender for Identity

  • Identity threat detection
  • Compromised credential detection
  • Lateral movement paths
  • Reconnaissance detection
  • Domain dominance alerts

Defender for Cloud Apps

  • Shadow IT discovery
  • App risk scoring
  • Session control policies
  • OAuth app governance
  • File policy enforcement

Email Security Tiers

EOP (Basis)

Inclusief

Exchange Online Protection - basis email security

  • Anti-spam filtering
  • Anti-malware
  • Zero-hour auto purge
  • Spoof protection

Plan 1

€1,80/user/mnd

Safe Attachments & Links + Advanced Anti-Phishing

  • Safe Attachments sandbox
  • Safe Links time-of-click
  • Impersonation protection
  • Mailbox intelligence

Plan 2

€4,50/user/mnd

Plan 1 + Threat Hunting + Attack Simulation

  • Threat Explorer
  • Attack simulation training
  • Automated investigation (AIR)
  • Campaign views

Security API Integration

Graph Security API voor unified alert management, threat hunting en automated response.

Security Alerts API

Unified alerts van alle Defender producten

Secure Score API

Continuous security posture assessment

Advanced Hunting

KQL query execution voor threat hunting

Automated Response

Device wipe, account lockout, session revoke

Compliance & Governance

Voldoe aan GDPR, NIS2 en andere regelgeving met Microsoft Purview en onze compliance expertise.

Microsoft Purview

Unified data governance platform voor classificatie, labeling en bescherming van gevoelige data.

Sensitivity labelsData classificationDLP policiesRetention policieseDiscovery

GDPR/AVG

Configuratie van je M365 omgeving conform Europese privacy regelgeving.

Data residency (EU)Right to be forgottenData subject requestsPrivacy settingsConsent management

NIS2 Readiness

Voorbereiding op de nieuwe Europese cybersecurity richtlijn voor kritieke infrastructuur.

Incident responseSupply chain securityEncryption requirementsMulti-factor authRisk management

Beveilig je Microsoft 365 omgeving

Laat ons je security posture analyseren en een Zero Trust roadmap opstellen.