last sync: 2025-Apr-29 17:16:02 UTC

Microsoft Managed Control 1615 - System And Communications Protection Policy And Procedures | Regulatory Compliance - System and Communications Protection

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1615 - System And Communications Protection Policy And Procedures
Id f35e02aa-0a55-49f8-8811-8abfa7e6f2c0
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this System and Communications Protection control
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '1.0.0'
Repository: Azure-Policy f35e02aa-0a55-49f8-8811-8abfa7e6f2c0
Additional metadata Name/Id: ACF1615 / Microsoft Managed Control 1615
Category: System and Communications Protection
Title: System And Communications Protection Policy And Procedures - Creating Policy And Procedures
Ownership: Customer, Microsoft
Description: The organization: Develops, documents, and disseminates to personnel with system and communication roles and responsibilities: A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and
Requirements: Azure addresses the system and communications policy as part of the Microsoft security policies, of which there are two sets: the Microsoft Security Policy (MSP) that is applicable to all personnel, and the Microsoft Security Program Policy (MSPP), which is applicable to all personnel that have a responsibility for security. The Microsoft Information Risk Management Council (IRMC) is the governance body with review and approval responsibility for the MSP and MSPP. Within Azure, the MSPP specifically applies to all personnel involved in designing, building, and operating Azure and across all information and processes used in the conduct of Microsoft business. All Azure personnel are accountable and responsible for complying with these guiding principles within their designated roles. The policy addresses the following: * Communications security * Communications across networks * Secure communications channels * Network design Additionally, the policy addresses the purpose, scope, roles, responsibilities, compliance requirements, and required coordination among the various Microsoft organizations that provide some level of support to all services. The policies indicate Microsoft management’s commitment and are a component of the risk management strategy which provides Azure personnel with a current set of clear and concise information security requirements. C+AI Security has published additional standards that facilitate and support the implementation of systems and communications protection controls in the Azure environment. These documents include: * Azure Access Control SOP * Azure Asset Management SOP * Azure Cryptographic Control SOP * Key Management Standard * Asset Classification Standard * Asset Protection Standards The MSP is available to all Microsoft personnel on the Microsoft Policy website on the Microsoft intranet, and the MSPP and Security Standards are available through the Liquid tool, also on the Microsoft intranet. The Azure SOPs are stored in the Azure Security, Privacy & Compliance SharePoint site. This SharePoint site is accessible to all Azure personnel. Service teams may supplement the Azure policies and procedures with offering-specific policies and procedures. Service-team-specific policies and procedures associated with system and communications are documented and stored within internal Azure SharePoint sites. Only personnel with authorized credentials, adequate levels of permission, legitimate need to know, and specific roles and responsibilities are given access to the service-team-specific policies or procedures.
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Compliance
The following 2 compliance controls are associated with this Policy definition 'Microsoft Managed Control 1615 - System And Communications Protection Policy And Procedures' (f35e02aa-0a55-49f8-8811-8abfa7e6f2c0)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
NIS2 DP._Data_Protection_8 NIS2_DP._Data_Protection_8 NIS2_DP._Data_Protection_8 DP. Data Protection Policies and procedures regarding the use of cryptography and, where appropriate, encryption n/a In order to safeguard the security of public electronic communications networks and publicly available electronic communications services, the use of encryption technologies, in particular end-to-end encryption as well as data-centric security concepts, such as cartography, segmentation, tagging, access policy and access management, and automated access decisions, should be promoted. Where necessary, the use of encryption, in particular end-to-end encryption should be mandatory for providers of public electronic communications networks or of publicly available electronic communications services in accordance with the principles of security and privacy by default and by design for the purposes of this Directive. The use of end-to-end encryption should be reconciled with the Member States’ powers to ensure the protection of their essential security interests and public security, and to allow for the prevention, investigation, detection and prosecution of criminal offences in accordance with Union law. However, this should not weaken end-to-end encryption, which is a critical technology for the effective protection of data and privacy and the security of communications. 32
NIS2 ES._Endpoint_Security_6 NIS2_ES._Endpoint_Security_6 NIS2_ES._Endpoint_Security_6 ES. Endpoint Security Policies and procedures to assess the efficacy of cybersecurity risk management measures Customer Alert personnel of information spillage Entities should evaluate their own cybersecurity capabilities and, where appropriate, pursue the integration of cybersecurity enhancing technologies, such as artificial intelligence. For the purpose of demonstrating compliance with cybersecurity risk-management measures and in the absence of appropriate European cybersecurity certification schemes adopted in accordance with Regulation (EU) 2019/881 of the European Parliament and of the Council (18), Member States should, in consultation with the Cooperation Group and the European Cybersecurity Certification Group, promote the use of relevant European and international standards by essential and important entities or may require entities to use certified ICT products, ICT services and ICT processes. 17
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
[Preview]: NIS2 32ff9e30-4725-4ca7-ba3a-904a7721ee87 Regulatory Compliance Preview BuiltIn unknown
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC