Open Nav
Sign Up

CISA Releases Microsoft 365 Secure Configuration Baselines and SCuBAGear Tool

Microsoft releases scubagear

Bar Refael

January 9, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has released the finalized Microsoft 365 Secure Configuration Baselines. This important development is aimed at enhancing the security and resilience of organizations using Microsoft 365 (M365) cloud services. Complementing this release is the updated SCuBAGear tool, designed to help organizations assess their M365 cloud services against CISA’s recommended baselines.

Microsoft 365 Secure Configuration Baselines:

  • Objective: To provide organizations with comprehensive guidelines for securely configuring their M365 environments.
  • Contents: The baselines cover a range of configurations for various M365 services, focusing on best practices in areas like identity and access management, data protection, and threat prevention.

SCuBAGear Tool:

  • Functionality: SCuBAGear is an assessment tool that evaluates the alignment of an organization’s M365 configurations with CISA’s security baselines.
  • Enhancements: The tool now features increased automation, streamlining the assessment process and reducing the effort required by organizations.

Development and Feedback Integration:

  • Stakeholder Input: The final release incorporates feedback gathered during a public comment period and a pilot program with federal agencies.
  • Improvements: Changes based on this feedback have been integrated, enhancing the effectiveness and usability of both the baselines and the SCuBAGear tool.

Recommendations for Organizations:

  • Baseline Review and Implementation: Carefully review the Microsoft 365 Secure Configuration Baselines and implement the recommended configurations for enhanced security.
  • Use of SCuBAGear Tool: Employ the SCuBAGear tool to assess and align your organization’s M365 configurations with CISA’s guidelines.
  • Stay Informed: Follow updates on CISA’s blog and reach out to CISA’s Cybersecurity Shared Services Office for further support and guidance.

The release of the Microsoft 365 Secure Configuration Baselines and the SCuBAGear tool represents a crucial step in supporting organizations to strengthen their M365 cloud service security. Adhering to these guidelines and utilizing the assessment tool can significantly improve an organization’s cybersecurity posture in the cloud.

Resources highlights

CVE-2025-55177: WhatsApp Authorization Flaw Exploited in Zero-Click Spyware Chain

WhatsApp has patched CVE-2025-55177, an authorization flaw in its linked-device synchronization feature that was exploited in the wild.  While Meta originally rated it medium severity,…

Read more >

CVE-2025-55177

Docker Issues Patch for Critical Exploit in Docker Desktop: CVE-2025-9074

On August 20, 2025, Docker released an urgent patch for CVE-2025-9074, a critical Server-Side Request Forgery (SSRF) vulnerability (CVSS 9.3) affecting Docker Desktop for Windows…

Read more >

CVE-2025-9074

CVE-2025-48384: Git Submodule Path Flaw Exploited in the Wild

CVE-2025-48384 is a client-side Git vulnerability that lets a malicious repository abuse a mismatch in how Git reads vs. writes configuration values containing a trailing…

Read more >

CVE-2025-48384

CVE-2025-43300: Apple ImageIO Zero-Day Exploited in Targeted Attacks

Apple patched CVE-2025-43300, a zero-day in the ImageIO framework used system-wide to read/write many image formats. Opening or previewing a malicious image can corrupt memory…

Read more >

CVE-2025-43300

CVE-2025-57790: Commvault Path Traversal Vulnerability Leads to RCE

On August 19th, Commvault published advisory CV_2025_08_2 for a newly-discovered path traversal flaw in the Web Server component that allows remote attackers to perform unauthorized…

Read more >

CVE-2025-57790

CVE-2025-20265: Cisco Secure Firewall Management Center (FMC) RADIUS Pre-Auth RCE

A critical (CVSS 10.0)  input-handling flaw in the RADIUS authentication subsystem of Cisco Secure Firewall Management Center (FMC), tracked as CVE-2025-20265 allows unauthenticated remote code…

Read more >

CVE-2025-20265
Under Cyber Attack?

Fill out the form and we will contact you immediately.