MSPs have privileged access into their customer’s IT infrastructure, but this puts them on the hitlist for cybercriminals who attack vulnerabilities in MSP software, enabling them to compromise a range of customers. In November 2022, it was announced that there was to be a change in NIS regulations, originally derived when the UK was part of the EU, but since leaving the EU, are now able to change this legislation to better suit the cybersecurity needs of the UK.
The updates to these laws are part of the government’s £2.6 billion National Cyber Strategy which is taking a stronger approach to improving UK businesses’ cyber resilience and making our digital economy more secure and prosperous. The proposal brings MSPs into the scope of regulations to ensure that the UK’s digital supply chains remain secure and will be made as soon as parliamentary time allows. This would mean that outsourced IT providers would be financially liable for their customer’s infrastructure, and if they experience a breach, then the provider can be fined up to £17 million for non-compliance.
Microsoft has also updated their CSP agreements and Microsoft policy, which holds the CSP partner financially responsible for their customers’ fraudulent purchases. In most situations, Microsoft is not making exceptions to the policy.
With this change in policy and legislation, it’s more important than ever for partners to ensure they’re following security best practices and providing their customers with robust security solutions to protect their environments and prevent cyber-attacks.
Act now and apply the five principles from the cybersecurity bell curve to protect your customers’ tenants.
1. Enable Multifactor Authentication (MFA)
2. Apply zero trust principles
Hear more from Microsoft on how you can start implementing Zero Trust principles.
3. Use modern anti-malware
4. Keep up to date
5. Protect data
Microsoft CSP Best Practices
Microsoft has also put together a set of best practices for Cloud Solution Providers (CSPs) with the recommendation that they follow the security guidance in the article to protect themselves and their customers with similar guidance for customers also.
The most highly recommended steps to act on are:
- Add a security contact for security-related issue notifications in the Partner Center tenant.
- Check your identity secure score in Microsoft Azure Active Directory (Azure AD) and take the appropriate actions to raise your score.
- Review and implement the guidance documented in Managing nonpayment, fraud, or misuse.
- Familiarise yourself with the NOBELIUM threat actor and related materials.
Security contact
Identity secure score
How aligned are you with Microsoft's Secure Score? Discover more below.
Review and Implement
NOBELIUM threat actor
Other Considerations
By implementing zero trust principles and following the best practices highlighted above, you can take a proactive approach to protecting your customers in a world of evolving threats.
For further guidance on anything you have read, please get in touch!