Cloud & Microsoft 365

Securely configuring and operating Microsoft 365 and cloud services

11 articles on this topic

Cloud security starts with configuration

The cloud is no longer a future topic for mid-market companies — it is everyday reality. Microsoft 365 alone is used by over one million companies in Germany, and every month more services and data migrate to the cloud. The good news: cloud providers like Microsoft invest billions in the security of their platforms. The less good news: the responsibility for secure configuration lies with you. And this is precisely where the problem lies, because the default settings of Microsoft 365 are optimized for user-friendliness, not maximum security. This topic page shows you how to configure Microsoft 365 and other cloud services to meet the requirements of your ISMS.

Understanding the shared responsibility model

The first step toward secure cloud usage is understanding the shared responsibility model. In simple terms: the cloud provider is responsible for infrastructure security — the physical data centers, the network and the hypervisor layer. You are responsible for everything you do in the cloud: user management, access rights, data backup, configuration and compliance. If an employee enters their password on a phishing site and an attacker gains access to your entire SharePoint as a result, that is not Microsoft's fault.

This model has concrete implications for your ISMS. You must include cloud services in your risk analysis just as you would on-premises systems. You need policies for cloud usage, monitoring processes for suspicious activity, and a clear strategy for data backup — because yes, cloud data needs to be backed up too.

Systematically securing Microsoft 365

Microsoft 365 offers a wealth of security features, but many of them are not activated by default or are not optimally configured. The Microsoft Secure Score is a good starting point for assessing the current security status of your environment. It evaluates your configuration against best practices and gives you concrete recommendations for improvement.

The most important levers are Conditional Access policies in Entra ID (formerly Azure Active Directory), which control access based on conditions such as location, device health and risk level. On top of that, multi-factor authentication should ideally be enabled for all users, and Microsoft Defender for Business protects endpoints, emails and identities.

Securing individual services

Each Microsoft 365 service has its own security settings and challenges. Exchange Online needs a well-thought-out anti-phishing configuration, SPF, DKIM and DMARC records, and a policy for external forwarding. SharePoint and OneDrive require a clean permissions concept and rules for external sharing so that confidential documents are not accidentally shared with the entire world. Teams has become the central communications platform and therefore deserves special attention regarding guest access, file sharing and app permissions.

Our article series walks you through the most important security settings service by service. Each article contains concrete configuration recommendations that you can implement directly in your Admin Center.

Device management with Intune

A secure cloud environment is of little use if the devices accessing it are insecure. Microsoft Intune enables centralized management of Windows PCs, Macs, iOS and Android devices. You can enforce security policies, block outdated devices from access, and remotely wipe corporate data in the event of loss or theft. For organizations already using Microsoft 365 Business Premium or E3/E5, Intune is included in the license and is thus the obvious solution for mobile device management.

Cloud backup: your responsibility

A common misconception is: "Our data is in the cloud, so it is automatically backed up." This is not true. Microsoft guarantees infrastructure availability, but not a backup of your data in the traditional sense. If an employee accidentally or intentionally deletes emails or files, they are permanently lost after the retention period expires. Our article on cloud backup for Microsoft 365 shows you which backup solutions exist and how to set up a backup strategy for your cloud data.

All articles on this topic

ISMS
ISMS

Securing Microsoft 365: The 15 Most Important Security Settings

Microsoft 365 is run out-of-the-box in most companies, yet the default settings are far from secure. This article describes the 15 most important s...

2026-04-04 22 min read
ISMS
ISMS

Conditional Access in Entra ID: Policies for SMEs

Conditional Access is the heart of access control in Microsoft 365 and Entra ID. Yet many companies shy away from setup because they fear lockouts....

2026-04-28 20 min read
ISMS
ISMS

Microsoft Defender for Business: Is Switching from a Traditional Antivirus Worth It?

Traditional antivirus scanners detect known malware, but they are blind to fileless attacks, living-off-the-land techniques and zero-day exploits. ...

2026-04-29 19 min read
ISMS
ISMS

Securing SharePoint and OneDrive: Sharing, DLP, and Data Classification

SharePoint and OneDrive are the central data stores in Microsoft 365, yet the default settings allow extensive external sharing without any control...

2026-04-30 20 min read
ISMS
ISMS

Teams Security: Guest Access, External Sharing, and Compliance

Microsoft Teams has become the central communication platform—and with it, the place where sensitive business information is exchanged. Yet the def...

2026-05-01 19 min read
ISMS
ISMS

Azure Security Basics: NSGs, Key Vault, and Security Center for SMEs

More and more mid-market companies are running workloads in Azure, but security configuration often falls by the wayside. This article explains the...

2026-05-02 21 min read
ISMS
ISMS

Securing Exchange Online: Anti-Phishing, Safe Links, and Mail Flow Rules

Email remains the number one attack vector: over 90 percent of all successful cyberattacks begin with a phishing email. Exchange Online offers exte...

2026-05-03 21 min read
ISMS
ISMS

Microsoft Secure Score: What It Measures and How to Improve It

The Microsoft Secure Score summarizes the security posture of your M365 tenant in a single number and delivers prioritized improvement recommendati...

2026-05-04 18 min read
ISMS
ISMS

Intune for Beginners: Device Management Without Enterprise Complexity

Microsoft Intune manages endpoints and protects corporate data, yet many mid-market companies shy away from its perceived complexity. This article ...

2026-05-05 22 min read
ISMS
ISMS

Cloud Security for SMEs: The Most Common Misconfigurations and How to Avoid Them

Most cloud security incidents are not caused by sophisticated attacks but by misconfigurations. Open storage accounts, missing MFA, overly broad pe...

2026-04-13 16 min read
ISMS
ISMS

Self-Hosted vs. Cloud: Data Sovereignty in Compliance Software

Compliance software manages the most sensitive data in an organization: risk assessments, security vulnerabilities, audit results. Where this data ...

2026-03-26 14 min read