Back

Microsoft Flow Security - Plugging Leaks in Flow (Video)

Microsoft Flow security is probably an afterthought for most people migrating to Office 365servicesmicrosoftoffice365cloudmigration Unfort...

5 min read
Published on Jun 7, 2019
microsoft-flow-security-plugging-leaks-in-flow-video-2

Microsoft Flow security is probably an afterthought for most people migrating to Office 365. Unfortunately, there are security concerns around Flow and how it manages data, particularly email. A recent article at Practical 365 discussed how Flow, using user impersonation, makes it incredibly difficult to identify emails being forwarded out of the company domain. The article provided a number of workarounds to disable Flow, but failed to discuss the available tools to secure it.

The issue with Flow is that it offers connectors that allow users to potentially link information between your domain and services that reside outside of your control. The first impulse might be to just disable Flow Licensing. However, in Microsoft’s Flow Q&A documentation they state, “The Microsoft Flow Free license is included only for tracking purposes. As covered in the first section, it is not possible to prevent another person from using Microsoft Flow for individual purposes. Thus, the presence of a Microsoft Flow Free license does not actually grant or remove any capabilities.” Removing licensing from users does not stop them from creating flows!

Microsoft Flow Security Settings

Thankfully, it is a fairly straightforward task to segment and secure your organization’s applications and block Flow’s ability to share company data with unsanctioned applications and services.

Prerequisites:

In order to manage Flow, the user must:

  • Have either environment or tenant admin permissions.
  • Must have a Microsoft Flow P2 license. ($15/user/month) (Only the person configuring the environment needs this license)

Accessing the Flow Admin Center

The flow admin center can be accessed in two ways:

Setting Up an Environment in Microsoft Flow

One environment will exist by default, named for the primary tenant. This default environment is where all of your user-created flows will exist. You can set company-wide rules in this environment, but it is advisable to create a secondary environment, so you can create exception rules for users who should not be subject to the controls you are about to enable. Similarly, you can create group environments for business units such as HR, Marketing, Leadership, etc or groups of services such as Azure, SQL, Office 365, etc.

By default, you start with the environment view from the Flow Admin Center.

  • To create a new environment, click the [+ New environment] link in the upper right-hand corner. You will be prompted to provide:
    • Environment name
    • Region
    • Environment type

Microsoft Flow Data Policies

Once your environment is created, you will create data policies for the environment. Flow Admin Center breaks your data groups into two classes; “Business Data Only” and “No Business Data Allowed”. This is slightly misleading at first glance. Data connectors must be placed in “Business Data Only” in order to get blocked from “No business data allowed”. A good way to think of this is that the two boxes are segmented buckets that are isolated from one another. Again, this is relatively simple.

  • Click “Data policies” in the left-hand menu
  • Click [+ New Policy] in the upper right hand of the screen
  • Select where these policies should apply.
    • ALL Environments
    • ONLY selected environments
    • All environments EXCEPT selected

Understand Data Groups in MS Flow

Within the data groups section, you will find two boxes. “Business Data Only” and “No Business Data Allowed”. At first, you may think that everything is locked down, since all available apps are in the “No Business Data Allowed” box. However, since SharePoint and One Drive are in that box, they can freely interact with any other app in that box, since, “no business data is allowed”. Yes, this labeling is a bit confusing. A better way to understand it is to think of the boxes are walled gardens or secure perimeters. Apps in the “Business Data Only” box can freely interact with each other but not “no business data allowed” and likewise with the “No Business Data Allowed” Box.

In order to start securing your company data, add your relevant apps to the Business Data Only box, probably starting with SharePoint, OneDrive, but making sure to include any applications that users interact with customer data from, such as Word, Excel, Outlook, etc…

The User Experience

Even after you set your Microsoft Flow security settings, a user will see all of the apps in Flow. However, if they attempt to connect a “business data only” application with a “no business data allowed” app, they will just get a warning stating “Your flow was created, but is currently suspended since it uses a combination of connectors that conflict with company data loss prevention policies or billing restrictions”. Since the flow is saved, your users can consult with IT leadership to determine if an application should be permitted or not, preventing unintentional shadow IT scenarios.

About Agile IT Tech Talks

Tech Talks are a service for Agile IT’s MSP and CSP clients. Each week we feature a subject matter expert who highlights a feature, platform, or function in a “Demo Heavy, PowerPoint Light” format. The presentation and demo is then followed by a closed Q&A period where clients can engage directly with the expert to have their specific business needs addressed in a private, confidential open forum. If you are interested in the added value Agile IT provides with CSP licensing or managed services, tell us a bit about your environment, and a Cloud Service Advisor will contact you to discuss your available options.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Risks of not using a CMMC RPO

The Risks of Not Using a CMMC RPO for Compliance and Certification Readiness

A CMMC RPO helps organizations prepare for certification and avoid compliance failures. Learn why working with an RPO is essential for achieving CMMC compliance.

Mar 20, 2025
8 min read
CMMC 2.0 Require GCC High for Compliance

Does CMMC 2.0 Require GCC High for Compliance?

Does CMMC 2.0 require GCC High? Learn the cloud options for compliance, data security, and protecting CUI under NIST 800-171 and DFARS.

Mar 17, 2025
10 min read
Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

CMMC RPO vs a C3PAO: Understanding Their Roles in Compliance

Understanding the difference between an RPO and a C3PAO is crucial for CMMC compliance. Learn why they should be separate and how an RPO helps prepare for certification.

Mar 15, 2025
6 min read
Can You Meet CMMC with Google Workspace?

Can You Meet CMMC with Google Workspace?

Is Google Workspace CMMC compliant? Learn about its DFARS, NIST 800-171, and ITAR limitations and how migrating to GCC High ensures full compliance.

Mar 4, 2025
7 min read
Is Maintaining a GCC High Tenant Worth It for Non-Government

Evaluating the Need for a GCC High Tenant in Non-Government Organizations

Explore whether maintaining a GCC High tenant is necessary for organizations not involved in government work. Understand the pros and cons, costs, and compliance considerations.

Feb 25, 2025
7 min read
Top 10 Reasons to Partner with an MSP for Security and Compliance

Top 10 Reasons to Partner with an MSP for Security and Compliance

Discover why partnering with an MSP for security and compliance is critical for organizations navigating FAR CUI and CMMC requirements.

Feb 21, 2025
8 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation