In this module
AD7.7 Audit Readiness and Security Assessments
Figure AD7.7 — Your deployed controls address the core requirements of every major security framework. The controls are universal; the framework labels are regional. One evidence base serves all assessments — you translate the evidence into each framework's language as needed.
The five universal security domains
Every security framework — regardless of region or industry — evaluates the same five domains. Your program covers all five:
1. Access Control (Who can access what) Your controls: MFA for all users (CA001), admin MFA (CA002), device compliance enforcement (CA003), break-glass accounts, least-privilege admin roles. Framework equivalents: ISO 27001 A.9, NIST CSF PR.AC, Cyber Essentials "Access Control," Essential Eight "Restrict Admin Privileges" + "MFA."
2. Threat Protection (How you block attacks) Your controls: Safe Links, Safe Attachments, anti-phishing policies, SPF/DKIM/DMARC, Defender Antivirus, network protection. Framework equivalents: ISO 27001 A.12.2, NIST CSF PR.DS + DE.CM, Cyber Essentials "Malware Protection," Essential Eight "Application Control" + "Email Filtering."
3. Endpoint Security (How you protect devices) Your controls: Intune compliance policies, BitLocker encryption, Windows Firewall verification, OS patching via Windows Update, BYOD app protection. Framework equivalents: ISO 27001 A.6.2 + A.10.1, NIST CSF PR.DS + PR.IP, Cyber Essentials "Firewalls" + "Secure Configuration" + "Patching," Essential Eight "Patch Applications" + "Patch OS."
4. Data Protection (How you classify and protect data) Your controls: 4-tier sensitivity labels with encryption, DLP policies, SharePoint sharing restrictions, external access controls. Framework equivalents: ISO 27001 A.8.2 + A.13.2, NIST CSF PR.DS, GDPR Articles 5/32, PIPEDA Principle 7.
5. Detection and Response (How you find and fix incidents) Your controls: Monday security review, alert notifications, sign-in log monitoring, incident response procedures, evidence preservation, post-incident review. Framework equivalents: ISO 27001 A.12.4 + A.16, NIST CSF DE + RS. All frameworks require monitoring and incident response capability.
When an assessor asks about any security domain, you map their question to one of these five domains and reference your deployed controls. The framework label changes; the underlying control doesn't.
Building the evidence collection package
Create an evidence folder that supports any assessment:
SecurityEvidence/
├── 01-AccessControl/
│ ├── CA001-AllUsers-MFA-Policy.png
│ ├── CA002-AdminMFA-Policy.png
│ ├── CA003-CompliantDevice-Policy.png
│ ├── MFA-Registration-Report.csv
│ ├── Admin-Role-Assignments.csv
│ └── BreakGlass-Documentation.docx
├── 02-ThreatProtection/
│ ├── SafeLinks-Policy.png
│ ├── SafeAttachments-Policy.png
│ ├── AntiPhishing-Policy.png
│ ├── DMARC-DNS-Record.png
│ └── ThreatProtection-Stats.csv
├── 03-EndpointSecurity/
│ ├── Compliance-Policy-Windows.png
│ ├── Compliance-Rate-Report.csv
│ ├── BitLocker-Encryption-Report.csv
│ ├── WindowsUpdate-Ring-Config.png
│ └── BYOD-AppProtection-Policy.png
├── 04-DataProtection/
│ ├── SensitivityLabels-Config.png
│ ├── DLP-Policies.png
│ ├── SharePoint-SharingConfig.csv
│ └── LabelAdoption-Report.csv
├── 05-DetectionAndResponse/
│ ├── MondayReview-Checklist.pdf
│ ├── AlertNotification-Config.png
│ ├── WeeklySecurityLog.csv
│ ├── IncidentResponsePlan.pdf
│ └── ProcedureTesting-Log.txt
├── 06-Governance/
│ ├── AcceptableUsePolicy.pdf
│ ├── PasswordAuthPolicy.pdf
│ ├── DataClassificationPolicy.pdf
│ ├── QuarterlyReports/
│ └── ProgramSummary.pdf
└── EvidenceIndex.mdThe EvidenceIndex.md maps each evidence file to framework controls:
EVIDENCE INDEX
File: CA001-AllUsers-MFA-Policy.png
ISO 27001: A.9.4.2 | NIST CSF: PR.AC-7
Cyber Essentials: Access Control | Essential Eight: MFA
File: BitLocker-Encryption-Report.csv
ISO 27001: A.10.1.1 | NIST CSF: PR.DS-1
Cyber Essentials: Secure Config | GDPR: Article 32(1)(a)Automated evidence collection
# Collect-SecurityEvidence.ps1
$evidenceDir = "C:\SecurityEvidence-$(Get-Date -Format 'yyyyMMdd')"
New-Item -Path $evidenceDir -ItemType Directory -Force | Out-Null
Connect-MgGraph -Scopes "Policy.Read.All","DeviceManagementManagedDevices.Read.All" -NoWelcome
# Access Control evidence
$acDir = "$evidenceDir\01-AccessControl"
New-Item -Path $acDir -ItemType Directory -Force | Out-Null
Get-MgIdentityConditionalAccessPolicy -All |
Select-Object DisplayName, State, CreatedDateTime,
@{N="GrantControls";E={$_.GrantControls.BuiltInControls -join ", "}} |
Export-Csv "$acDir\ConditionalAccessPolicies.csv" -NoTypeInformation
# Endpoint Security evidence
$esDir = "$evidenceDir\03-EndpointSecurity"
New-Item -Path $esDir -ItemType Directory -Force | Out-Null
Get-MgDeviceManagementManagedDevice -All |
Select-Object DeviceName, ComplianceState, OperatingSystem,
OsVersion, IsEncrypted, UserPrincipalName |
Export-Csv "$esDir\DeviceCompliance.csv" -NoTypeInformation
# Secure Score
$score = Get-MgSecuritySecureScore -Top 1
$pct = [math]::Round($score.CurrentScore / $score.MaxScore * 100, 1)
Write-Host "Secure Score: $pct%" -ForegroundColor Green
Write-Host "Evidence collected to: $evidenceDir" -ForegroundColor GreenRun quarterly alongside report data collection. CSV exports plus portal screenshots form the complete evidence package.
Regional framework quick reference
Your controls are universal. Here's how they map to frameworks your learners may encounter:
UK — Cyber Essentials: 5 controls (firewalls, secure config, access control, malware, patching). Your program covers all 5. Cost: £300-500 Basic, £1,500-3,500 Plus.
Australia — Essential Eight: 8 mitigation strategies. Your program fully addresses MFA, patch applications, patch OS, restrict admin privileges. Partially addresses application control, restrict Office macros, user application hardening. Does not address daily backups (outside M365 scope).
US — NIST CSF: 5 functions (Identify, Protect, Detect, Respond, Recover). Your program covers Identify (Intune asset management), Protect (access control, email, data), Detect (monitoring), Respond (IR procedures). Recover is partially covered.
EU — NIS2: Requires risk management, incident handling, business continuity, supply chain security, training. Your program addresses risk management, incident handling, and awareness. Business continuity and supply chain are outside course scope.
Global — ISO 27001: 93 controls across 4 themes. Your program covers approximately 60-70%. See AD7.8 for detailed gap analysis.
The key insight: every framework asks the same fundamental questions. "Do you use MFA?" "Do you protect against malware?" "Do you monitor for threats?" Your answers are the same. Only the reference numbers change.
A client sends a security questionnaire based on ISO 27001 Annex A. Your organization isn't ISO 27001 certified. How do you respond?
Option A: "We're not ISO 27001 certified, so we can't answer this questionnaire."
Option B: "We're not ISO 27001 certified, but our security program addresses the relevant Annex A controls. Here's our response mapping each question to our deployed controls and evidence." Use the evidence collection and control mapping to answer each question with specific references to your policies, configurations, and reports. Many clients accept demonstrated controls as evidence of security maturity even without formal certification.
The correct answer is Option B. Certification is one form of assurance. Demonstrated controls with documented evidence are another. The program summary, quarterly reports, and evidence folder provide comprehensive demonstration of security maturity regardless of certification status.
Try it: Build your evidence collection package
1. Create the evidence folder structure from this subsection 2. Run Collect-SecurityEvidence.ps1 to populate CSV exports 3. Take screenshots of each major policy (CA policies, compliance, DLP, Safe Links/Attachments) 4. Create EvidenceIndex.md mapping each file to at least 2 framework references 5. Identify which regional framework is most relevant to your organization
Initial collection: 45-60 minutes. Subsequent quarterly collections: 15-20 minutes.
You're reading the free modules of M365 Security: From Admin to Defender
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.