U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Microsoft Teams - SCuBA 1.4.0 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Microsoft Teams cpe:/a:microsoft:teams:- (View CVEs)

Checklist Highlights

Checklist Name:
Microsoft Teams - SCuBA
Checklist ID:
1087
Version:
1.4.0
Type:
Compliance
Review Status:
Final
Authority:
Governmental Authority: Cybersecurity and Infrastructure Security Agency (CISA)
Original Publication Date:
12/20/2023

Checklist Summary:

Microsoft 365 (M365) Teams is a cloud-based text and live chat workspace that supports video calls, chat messaging, screen sharing, and file sharing. This secure configuration baseline (SCB) provides specific policies to strengthen Microsoft Teams’ security.

Checklist Role:

  • Application Server
  • Office Software

Known Issues:

Not Provided

Target Audience:

The Secure Cloud Business Applications (SCuBA) project run by the Cybersecurity and Infrastructure Security Agency (CISA) provides guidance and capabilities to secure federal civilian executive branch (FCEB) agencies’ cloud business application environments and protect federal information that is created, accessed, shared, and stored in those environments.

Target Operational Environment:

  • Managed
  • Standalone

Testing Information:

Not Provided

Regulatory Compliance:

Not Provided

Comments/Warnings/Miscellaneous:

Not Provided

Disclaimer:

The information in this document is being provided “as is” for INFORMATIONAL PURPOSES ONLY. CISA does not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial entities or commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoritism by CISA. This document does not address, ensure compliance with, or supersede any law, regulation, or other authority. Entities are responsible for complying with any recordkeeping, privacy, and other laws that may apply to the use of technology. This document is not intended to, and does not, create any right or benefit for anyone against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

Product Support:

CyberSharedServices@cisa.dhs.gov

Point of Contact:

CyberSharedServices@cisa.dhs.gov

Sponsor:

Not Provided

Licensing:

Portions of this document are adapted from documents in Microsoft’s M365 and Azure GitHub repositories. The respective documents are subject to copyright and are adapted under the terms of the Creative Commons Attribution 4.0 International license. Sources are linked throughout this document. The United States government has adapted selections of these documents to develop innovative and scalable configuration standards to strengthen the security of widely used cloud-based software services.

Change History:

checklist approved - 2/12/2024
updated to final - 3/11/2024
Updated References - 08/30/2024
Changes Approved - 11/29/2024

Dependency/Requirements:

URL Description

References:

Reference URL Description
https://learn.microsoft.com/en-us/defender-office-365/recommended-settings-for-eop-and-office365?view=o365-worldwide Recommended settings for EOP and Microsoft Defender for Office 365 security
https://learn.microsoft.com/en-us/defender-office-365/safe-links-policies-configure?view=o365-worldwide Set up Safe Links policies in Microsoft Defender for Office 365

NIST checklist record last modified on 11/29/2024