M365 Workspace & Access Policy


Document Number: ISMS-POL-M365-01

Classification: L1 — Policy (Domain)

Version: 0.3.0

Effective Date: March 1, 2026

Author: Lucas Shin — Security Director

Approved By: Richard — CISO

Next Review Date: February 2027

Parent Policy: Information Security Policy (ISMS-POL-ISP-01)


1. Purpose

This policy defines the access control, data classification, and security control structure for Cybercraft within the Microsoft 365 environment.

It establishes how the M365 platform structure — specifically licence tiers, Teams team/channel membership, and Entra ID configuration — serves as the primary mechanism for implementing information security controls.

1.1 Design Principle: Platform = Policy

This policy is built on the principle established in the Information Security Policy (L1 Master):

🏗️
The Microsoft 365 platform structure itself is the implementation of security policy. Data classification is determined by where data resides (channel structure), not by user judgement. Access control is enforced through licence tier assignment and Teams membership, not through separate systems.

2. Scope

2.1 Applicable Systems

2.2 Applicable Users

2.3 Out of Scope


3. Data Classification

3.1 Classification Scheme — Two Levels

Cybercraft adopts a two-level data classification scheme. This is a deliberate design decision based on the principle that classification must be enforceable by platform structure, not dependent on user judgement.

ClassificationDefinitionLocationExamples
ConfidentialData whose unauthorised disclosure would cause serious harm to Cybercraft, its clients, or partnersTeam type dependent — see §5.3. Internal Only teams: Standard Channel. Internal Mixed teams: Private Channel. External teams: not placed (use Confidential External Sharing procedure)Client engagement data, contracts, audit materials, financial records, internal strategy, credentials
GeneralAll other business dataStandard ChannelsMeeting notes, general work documents, internal communications, marketing materials, published content

3.2 Classification Principles

  1. "Where it is" = "What it is" — Data classification is determined by its location in the Teams channel structure. The applicable rule depends on team type (see §5.3): in Internal Only teams, all Standard Channel data may be Confidential; in Internal Mixed teams, Private Channel = Confidential, Standard Channel = General.
  2. No user-level classification decisions — Users are not required to assess or label individual documents. The channel structure enforces classification automatically.
  3. No Sensitivity Labels — Microsoft Purview Sensitivity Labels are not deployed. For a 3–5 person SMB, label-based classification creates user burden without proportionate benefit. This decision will be reviewed if Cybercraft exceeds 10 personnel or if client contracts require it.
  4. Confidential data placement follows team type rules — In Internal Mixed or External Collaboration teams, Confidential data shall not be placed in Standard Channels. In Internal Only teams (all Level 1), Standard Channels may contain Confidential data. Violation of the applicable rule constitutes a security incident.

3.3 External Sharing

🔒
SPO/ODB external sharing is set to "Only people in your organization." External sharing links cannot be created by any user. External file sharing is only possible via email attachment or Teams Guest channel.

4. Licence Tier Structure

4.1 Licence Tiers — Service Access Matrix

Six licence tiers are available (Exchange Only, Teams Essentials, Email+Teams, M365 Basic, M365 Standard, M365 Premium), each providing a different combination of Exchange, Teams, SharePoint/OneDrive, Office apps, and security controls (CA, Intune, Defender). Security-relevant features (CA, Intune, Defender) are Premium-only.

Full licence-service matrix: See ISMS-CONF-M365-01 §2.1. Note: Email+Teams ($8) is not recommended — use M365 Basic ($7) instead.

4.2 Prohibited SKU: Business Standard

Business Standard is prohibited for all Cybercraft users. If desktop Office apps are required, assign Business Premium instead.

Security rationale: Standard includes desktop Office app licences but does not include Entra ID P1 (Conditional Access). This means desktop app sign-in cannot be controlled by CA — creating an unmanaged access path that bypasses the "Platform = Policy" data control model.

Cost rationale: Standard ($14) + Entra ID P1 add-on ($7) = $21/user/month — only $1 less than Premium ($22), which additionally includes Intune, Defender for Business, and the full security stack.

Design principle: Users who do not need desktop apps → Business Basic + P1. Users who need desktop apps → Business Premium. Standard occupies a middle ground that only creates a security gap.

4.3 Licence Assignment Principle

⚖️
Security classification determines licence assignment, and licence assignment determines available services and security controls. There is no middle ground — either a user requires Premium-level technical controls, or policy-level controls are sufficient.

Add-on guidance:

4.4 Teams File Access — Case-by-Case Definition

File access behaviour differs depending on access path and licence. The following matrix defines each case:

File access behaviour differs by access path (Teams Files tab, SharePoint direct access, Private Channel) and licence tier. Key distinctions: Teams Essentials/Email+Teams have limited edit capability; SharePoint licence features (full editing, OneDrive, DLP) require Basic or above; Private Channel access is member-controlled across all tiers.

Full file access case matrix: See ISMS-CONF-M365-01 §2.2

5. Teams Structure & Access Control

5.1 Access Control Tiers — Based on Trust Model

Cybercraft's Teams access control follows a three-tier trust model:

LevelDefinitionEntra ID StatusInformation AccessRecommended Licence
Level 1 — InternalCybercraft directors and employees. Full trust. Devices managed by ADUE (macOS) or MAM/Full MDM (Windows).MemberFull Access — all teams and channels (including Private Channels as assigned). SPO/ODB direct access permitted (compliant device).Premium
Level 2 — Trusted GuestTrusted external personnel with ongoing business relationship (e.g., CISO, contracted specialists). Bring own device. Attest to minimum viable controls.MemberChannel-Scoped — multiple teams and channels as required by role. SPO access limited to Teams membership scope. Session Control restricts download/sync/print on unmanaged devices.Basic + P1
Level 3 — Collaboration PartnerExternal parties with limited engagement scope (clients, suppliers, project-based collaborators).External Guest (#EXT#)Guest — dedicated external collaboration team only. MFA required (CA-Permit-Guest-MFA). Access scoped to channel membership within the dedicated team.No Cybercraft licence (Guest)

5.2 Channel Types and Guardrail Principles

Cybercraft adopts a guardrail approach to Teams channel governance: the policy defines channel type principles and data classification rules; specific channel structures are determined by Team Owners based on business need.

Channel Type Definitions

Channel TypeData ClassificationMembershipGuest AccessSharePoint
PrivateConfidential + InternalOwner-controlled — only explicitly added members can access❌ Not permittedSeparate SharePoint site (auto-created)
StandardTeam type dependent (see §5.3)All team members (including Guests if present in the team)Visible to Guests if they are team membersTeam default SharePoint site
SharedB2B Direct ConnectN/A (no Guest account created)Separate SharePoint site
Shared Channels: Currently not in use at Cybercraft (B2B Direct Connect not configured). Reserved as a future option for cross-tenant collaboration without Guest account creation.

Channel Governance Principles

  1. Channel type = data classification guardrail. The channel type determines what data classification is permitted within it. Users follow channel-type rules rather than making per-file classification decisions.
  2. Team Owners control channel structure. Owners create channels based on business need within the guardrail framework. Security Director provides guidance; prescriptive channel lists are not mandated.
  3. Team and channel creation restricted. Team creation requires Security Director approval. Channel creation is restricted to Team Owner role.
  4. Guest invitation authority. Only Security Director holds the Guest Inviter role in Entra ID. General members cannot invite Guests.
  5. File sync is prohibited by default. OneDrive sync to local devices is not permitted for unmanaged devices (enforced by CA-Restrict-SPO-Unmanaged Session Control). ADUE-managed devices (macOS Premium) may sync within the Managed Volume.

5.3 Team Operational Model

Channel type rules vary based on the team's composition and purpose:

Team TypeGuestPrivate ChannelStandard Channel ClassificationConfidential Data Location
Internal Only (all members are Level 1 leadership — current Cybercraft)❌ Not requiredUp to ConfidentialStandard Channel
Internal Mixed (Level 1 + Level 2 members)✅ Primary work channelInternal / GeneralPrivate Channel
External Collaboration (Guest members present)Optional (for internal-only discussions)General onlyNot placed in this team
Confidential External Sharing (per-engagement)Confidential (via procedure)Standard Channel (controlled via M365 Operations Procedure ISMS-PROC-M365-01)
📌
Current state: Cybercraft is currently an Internal Only team (3 members: CEO, Security Director, CISO — all Level 1). Private Channels are not required at this stage. When general members (Level 2) join, the team transitions to Internal Mixed, and Private Channels become the primary location for Confidential data.

Owner Structure

5.4 Guest Governance and External Sharing

Guest Access Principles

SPO/ODB External Sharing Policy

🔒
SPO and ODB external sharing: "Only people in your organization" — no external sharing links can be created. External file sharing is only possible via email attachment or Teams Guest channel (Owner-controlled).

Confidential External Sharing

When Confidential data must be shared with external parties, the Confidential External Sharing Procedure (defined in M365 Operations Procedure ISMS-PROC-M365-01) must be followed. This involves creating a dedicated per-engagement team with controlled Guest access. Direct SPO link sharing is not available due to the "Only people in your organization" setting.


6. Security Controls by Licence Tier

Security Control Architecture — Quick Reference

Three approved SKU configurations map to specific security control sets across platforms. Business Standard is prohibited (see §4.2).

Full SKU-to-control mapping table: See ISMS-CONF-M365-01 §3.1

Key principle: No desktop apps needed → Basic + P1. Desktop apps needed → Premium. There is no middle ground (Standard prohibited).

SKU decision flowchart: See Annex A, Figure 1.

CA Access Control Overview

The 3-policy CA structure evaluates access requests in the following logical flow — see Annex A, Figure 2.

상세 흐름도 (플랫폼별 분기, 기술적 조건 포함)는 Access Control & Data Protection Procedure (ISMS-PROC-BYOD-03) §2.3 참조.

6.1 Premium Users — Technical Controls

Premium licence includes Entra ID P1 (Conditional Access) + Intune + Defender as a bundle.

Conditional Access (CA) — 3-Policy Structure:

Application Protection — by Platform: iOS/Android (MAM APP — full DLP including copy/paste block), Windows (MAM Edge only — org data protection), macOS (ADUE — OS-level Managed Volume isolation, no APP).

Defender for Business: Endpoint threat protection, anti-malware, web filtering, vulnerability management on enrolled devices.

Detailed platform protection matrix: See ISMS-CONF-M365-01 §3.2

6.2 Level 2 — Trusted Guest Controls (Basic + P1)

Level 2 users are assigned Business Basic + Entra ID P1 add-on ($14/user/month). This provides Conditional Access for data control but does not include Intune, MAM, ADUE, or Defender.

Technical control — Conditional Access (via P1 add-on):

No device-level technical controls:

Compensating policy controls:

ControlMethod
Data access scopeTeams membership management — users only access channels they are added to
Data handling obligationInformation handling policy + NDA + disciplinary consequences for violation
Minimum Viable Controls attestationDevice meets minimum security standards (OS updated, screen lock, no jailbreak/root). Attested annually or on personnel change.
Access monitoringEntra ID sign-in logs — anomaly alerts + weekly/monthly review reports
Level 2 security relies on CA (Compliant/APP requirement + Session Control) + SPO site permissions (= Teams membership) + policy controls. There is no device-level work/personal separation or app-level data leakage prevention. Teams membership scope, CA-enforced session restrictions, and policy obligations are the primary controls.

Exchange Online Plan 1 accounts ($4/user/month): Email-only accounts with no Teams, SharePoint, or OneDrive access. These fall outside the scope of Teams-based data controls. Security Defaults (MFA) apply. No CA, as these accounts do not access data subject to the "Platform = Policy" model.

6.3 Conditional Access — Prerequisite for "Platform = Policy"

🔑
Conditional Access is not optional — it is a mandatory prerequisite for the Teams-based data control model to function.

The "Platform = Policy" model (Section 1.1) relies on the following enforcement layers:

  1. Data resides in SharePoint/OneDrive — Teams channel files are stored in SharePoint behind the scenes
  2. SPO site permissions = Teams membership — users can only access SharePoint sites for teams they are a member of, even via direct URL navigation (sharepoint.com). Non-members are denied access regardless of authentication. This is the primary access scope limiter
  3. CA enforces device/app complianceCA-Require-AllApps-CompliantOrAPP ensures only compliant (ADUE) or APP-protected (Edge) sessions access M365 services. Unmanaged/non-compliant sessions are blocked
  4. Session Control restricts unmanaged devicesCA-Restrict-SPO-Unmanaged blocks download/sync/print for non-compliant devices, limiting unmanaged sessions to browser-only viewing
  5. CA requires Entra ID P1 — therefore, even Level 2 users (Basic) need P1 to be subject to CA policies

Why Level 2 users need P1 (Business Basic + P1):

CA Architecture — 3-Policy Structure:

PolicyTargetGrant / SessionEffect
CA-Require-AllApps-CompliantOrAPPAll users, all cloud appsRequire Compliant Device OR Require APPmacOS: ADUE compliant ✅ / Windows Edge: APP ✅ / Unmanaged: blocked
CA-Restrict-SPO-UnmanagedAll users, SPO + ODBSession: "Use app enforced restrictions"Unmanaged devices: download/sync/print blocked (browser-only view)
CA-Permit-Guest-MFAExternal Guests (#EXT#)Require MFAGuest access with MFA; scope limited to channel membership

6.4 Why No Middle Ground

Combining security add-ons with Business Standard is not cost-effective:


7. Administration & Roles

7.1 Administrative Roles

RolePersonResponsibilitiesAccount
CEOFarahExecutive sponsor of ISMS. Final authority on business risk acceptance and resource allocation for security initiatives.Premium user account
Systems AdministratorLucas ShinM365 admin console: user management, licence assignment, Entra ID, Intune/CA configuration, Teams policy settingsAdmin account (admin.lucas) — separate from user account
CISORichardPolicy approval, risk acceptance, exception approval, annual reviewStandard user account
Team ManagerDesignated per teamChannel membership management, file management within assigned teams. Cannot create teams or channels.Standard user account

7.2 Admin Account Separation

7.3 Teams Governance


8. Monitoring & Audit Evidence

All structures defined in this policy must be demonstrably operational for audit purposes.

8.1 Ongoing Monitoring

ActivityFrequencyOwnerEvidence
Entra ID sign-in log reviewWeeklySecurity DirectorLog export / anomaly report
Teams membership reviewMonthlySecurity Director + Team ManagersMembership list snapshot per team/channel
Licence assignment reviewQuarterlySecurity DirectorM365 admin centre licence report
Level 2 Minimum Viable Controls attestationAnnually (or on personnel change)Security DirectorSigned attestation forms
Intune compliance status (Premium users)WeeklySecurity DirectorIntune compliance dashboard export

8.2 Audit Evidence Mapping

When an auditor asks:

Auditor QuestionEvidence Location
"How do you classify data?"Section 3 — Two-level classification (Confidential/General) enforced by channel structure
"How do you control access?"Section 4 (licence matrix) + Section 5 (Teams trust model + membership)
"What security controls are applied?"Section 6 — Premium: technical controls / Non-Premium: policy controls
"Who administers the system?"Section 7 — Admin roles, account separation, Teams governance
"How do you monitor compliance?"Section 8.1 — Monitoring schedule with evidence types
"Show me the access control structure"Section 5.1 (L1/L2/L3 trust model) + Teams membership snapshots

9. Compliance Mapping

ISO 27001 ControlRequirementCovered By
A.5.1Policies for information securityThis policy + Information Security Policy (L1 Master)
A.5.10Acceptable use of information and assetsSection 3.2 (classification principles) + Section 5.2 (channel structure)
A.5.12Classification of informationSection 3 (two-level classification scheme)
A.5.13Labelling of informationSection 3.2 — channel location replaces labelling (documented rationale for no Sensitivity Labels)
A.5.15Access controlSection 4 (licence matrix) + Section 5 (Teams trust model)
A.5.16Identity managementSection 5.1 (Entra ID status per level) + Section 7 (admin accounts)
A.5.17Authentication informationSection 6 — Security Defaults (MFA) for all; CA for Premium
A.5.18Access rightsSection 5 (membership management) + Section 7.3 (Teams governance)
A.8.2Privileged access rightsSection 7 (admin account separation, role definition)
A.8.3Information access restrictionSection 5.3 (team operational model — data placement by team type) + Section 5.4 (Guest governance and external sharing)

10. Document Control

VersionDateAuthorChanges
0.1.02026-02-18Lucas ShinInitial release — licence-access matrix, Teams trust model (L1/L2/L3), data classification (2-level), security controls by tier, audit evidence mapping
0.1.12026-02-20Lucas ShinDocument number changed from ISMS-POL-M365-01 to ISMS-POL-M365-01 (L2 policy reordering). Updated all cross-reference document numbers.
0.1.22026-02-20Lucas ShinAdded §4.2 Prohibited SKU: Business Standard. Added §6.3 Conditional Access prerequisite. Added §6 Quick Reference table and SKU decision flowchart.
0.1.32026-02-20Lucas ShinUpdated §5.1 Level 2 recommended licence: "Basic / Standard" → "Basic + P1".
0.1.42026-02-20Lucas ShinUpdated all SKU pricing to Microsoft 2026.7.1 scheduled increases: Basic $6→$7, Standard $12.50→$14, Entra P1 $6→$7. Updated §4.3 cost comparison (Standard + Intune now identical to Premium at $22).
0.1.52026-02-20Lucas ShinRemoved BYOL references from §5.1. Restructured §6.2: "Non-Premium Users" → "Level 2 — Trusted Guest Controls (Basic + P1)" with CA as applied technical control. Added Exchange Online Plan 1 scope note. Clarified §4.3 and §6.4 add-on guidance (P1 add-on with Basic is standard configuration).
0.2.02026-03-01Lucas ShinPhase 2-1~2-4 ISMS mapping (major revision). (1) Error #37 correction: Replaced "CA Default Block / Allow Policy" with 3-policy CA architecture (CA-Require-AllApps-CompliantOrAPP, CA-Restrict-SPO-Unmanaged, CA-Permit-Guest-MFA) throughout §6. (2) §5 restructured: Teams channel guardrail model (§5.2), 4 team types (§5.3), Guest governance + SPO external sharing policy (§5.4). (3) §3 updated: Data classification location now team-type-dependent; §3.3 External Sharing updated to "Only people in your organization". (4) macOS references corrected: "ADUE + MAM" → "ADUE + VPP" (APP not supported on macOS). (5) Procedural content to be moved to M365 Operations Procedure (ISMS-PROC-M365-01, new document).
0.2.12026-03-01Lucas ShinAdded CA Access Control Overview diagram (간략 개요도) to §6 — logical flow visualization of 3-policy structure (Assignment → Grant → Session Control). Cross-reference to ISMS-PROC-BYOD-03 §2.3 for detailed platform-specific flowchart.
0.3.02026-03-03Lucas ShinPhase 4 슬림화: §4.1 licence-service matrix, §4.4 file access matrix, §6 SKU control matrix, §6.1 APP platform table → ISMS-CONF-M365-01로 추출. §6 Mermaid 다이어그램 2개 → Annex A로 이동. 정책서에는 요약 + 참조 유지.

Review Schedule


Annex A — Diagrams

Figure 1 — SKU Decision Flowchart

flowchart TD
    Start["Does the user need\nOffice desktop apps?"] -->|No| Basic["Business Basic + P1\n\$14/user/month"]
    Start -->|Yes| NeedMAM["Is BYOD sufficient?\n(Edge web apps only on Windows)"]
    NeedMAM -->|"Yes (macOS or web-only)"| Premium["Business Premium\n\$22/user/month"]
    NeedMAM -->|"Need Windows desktop apps"| Join["Business Premium\n+ Entra Join + Full MDM"]
    
    Basic --> BasicControl["SPO site permissions scope\n+ Session Control\nNo MAM/Intune"]
    Premium --> PremiumControl["macOS: ADUE + VPP + CA\nWindows: Edge APP + CA"]
    Join --> JoinControl["Full MDM + Compliance\n= BYOD Full MDM Exception"]

    style Start fill:#f9f,stroke:#333
    style Basic fill:#4CAF50,color:#fff
    style Premium fill:#2196F3,color:#fff
    style Join fill:#FF9800,color:#fff

Figure 2 — CA Access Control Overview

flowchart LR
    A["사용자 접근 시도"] --> B{"Assignment<br>누구인가?"}
    B -->|"Break-glass"| C["✅ Exclude<br>무제한"]
    B -->|"Guest"| D["MFA 요구<br>(CA-Permit-Guest-MFA)"]
    B -->|"내부 사용자"| E{"Grant 평가<br>Compliant OR APP?"}
    E -->|"충족"| F{"SPO/ODB?"}
    E -->|"미충족"| G["❌ 차단"]
    F -->|"No"| H["✅ 접근 허용"]
    F -->|"Yes"| I{"Session Control<br>디바이스 상태?"}
    I -->|"Managed"| J["✅ 전체 기능"]
    I -->|"Unmanaged"| K["⚠️ 제한 접근"]
    style C fill:#51cf66,color:#fff
    style D fill:#74c0fc,color:#fff
    style G fill:#ff6b6b,color:#fff
    style H fill:#51cf66,color:#fff
    style J fill:#51cf66,color:#fff
    style K fill:#ffd43b,color:#333

[End of Policy Document]