{"id":110968,"date":"2018-08-30T07:47:07","date_gmt":"2018-08-30T14:47:07","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-automate\/security-governance-strategy\/"},"modified":"2018-08-30T07:47:07","modified_gmt":"2018-08-30T14:47:07","slug":"security-governance-strategy","status":"publish","type":"power-automate","link":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-automate\/security-governance-strategy\/","title":{"rendered":"Power platform Security & Governance: Deploying a Defense in Depth Strategy"},"content":{"rendered":"
A common cyber security approach used by organizations to protect their digital assets is to leverage a defense-in-depth strategy. The SANS Institute defines<\/a> defense-in-depth as \u201cprotecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack.\u201d<\/p>\n When customers ask how to best secure and govern their Power platform\u00a0environments (which includes Microsoft Flow and PowerApps), we provide similar guidance. The following list represents different layers that you can use to protect your digital assets and apply governance to ensure your organization\u2019s interests are met.<\/p>\n <\/p>\n As part of these audit events, the user who was involved in the event will be captured and in the case of create flow and edit flow events, the connectors used in these flows will also be captured.<\/p>\n <\/p>\n \u00a0<\/p>\n Additional Resources<\/strong><\/p>\n In this blog post we discussed many security layers that organizations should implement as they seek to govern and protect their environment. In addition to what we have discussed in this blog post, we also have additional resources that organizations can leverage to protect their environments.<\/p>\n \u00b7PowerShell Cmdlets for PowerApps and Microsoft Flow<\/strong> In May, we introduced<\/a> PowerShell cmdlets that provide both user and admin functions to automate Application Lifecycle Management (ALM) and administrative tasks. We continue to update these PowerShell cmdlets based upon customer feedback. Please find the latest release here<\/a>.<\/p>\n \u00b7PowerApps and Microsoft Flow Governance and Deployment Whitepaper <\/strong>was released<\/a> earlier this month and includes prescriptive guidance for deploying and managing the Power platform. Topics within the whitepaper focus on the following areas:<\/p>\n\n
\n
\n
\n
\n
\n
\n
\n
\n
\n