Control 3.7: PPAC Security Posture Assessment - Verification & Testing
This playbook provides verification and testing procedures for Control 3.7.
Verification Steps
1. Security Dashboard Access
- Navigate to PPAC > Security
- Verify all four tabs are accessible
- Confirm recommendations are displayed
2. Recommendation Accuracy
- Review each recommendation
- Verify status reflects actual configuration
- Confirm risk levels are appropriate
3. Report Generation
- Run posture assessment script
- Verify scores calculate correctly
- Confirm report includes all environments
Compliance Checklist
| Item | Required For | Status |
|---|---|---|
| Monthly posture review | Governance policy | |
| All high-risk recommendations addressed | Security baseline | |
| Managed environments enabled | Zone 2-3 | |
| DLP policies applied to all environments | Data protection | |
| Security scores tracked over time | Trend analysis |
Test Cases
Test Case 1: Recommendation Status Update
Objective: Verify recommendations update when addressed
Steps:
- Note a specific recommendation
- Implement the recommended change
- Refresh Security dashboard
- Verify status changed to "Completed"
Expected Result: Recommendation reflects completed status
Test Case 2: Score Calculation
Objective: Verify security score accuracy
Steps:
- Run security posture assessment
- Manually verify each security control
- Compare calculated score to expected
Expected Result: Scores accurately reflect configuration
Test Case 3: DLP Coverage Detection
Objective: Verify DLP coverage analysis
Steps:
- Create environment without DLP
- Run DLP coverage check
- Verify environment flagged as uncovered
- Apply DLP policy
- Re-run check
Expected Result: Coverage detection is accurate
Evidence Collection
For audits, collect:
- Monthly security posture reports
- Recommendation completion history
- Security score trend data
- DLP coverage documentation
Next Steps
- Portal Walkthrough - Manual configuration
- PowerShell Setup - Automation scripts
- Troubleshooting - Common issues
SSPM Configuration Verification
Security Posture Assessment Test Cases
The following test cases validate configuration points flagged by security posture assessments. Each test maps to a specific setting in the Configuration Hardening Baseline.
| Test ID | Configuration Point | Expected Result | Portal Path | Evidence |
|---|---|---|---|---|
| SSPM-3.7-01 | Hardening baseline review | Review completed per documented cadence (weekly Zone 3, bi-weekly Zone 2, monthly Zone 1) | N/A (process-based) | Review log |
| SSPM-3.7-02 | Configuration drift | No unresolved configuration drift items | N/A (process-based) | Drift report |
| SSPM-3.7-03 | Evidence archival | Evidence archived with SHA-256 hash per review cycle | N/A (process-based) | Hash manifest |
| SSPM-3.7-04 | Blocked attachment extensions | Dangerous file extensions configured per environment | PPAC > Env > Settings > Privacy + Security | Extension list screenshot |
| SSPM-3.7-05 | Blocked MIME types | High-risk MIME types blocked per environment | PPAC > Env > Settings > Privacy + Security | MIME type list screenshot |
| SSPM-3.7-06 | Inactivity timeout | Enabled with duration ≤ 120 minutes per environment | PPAC > Env > Settings > Privacy + Security | Timeout configuration screenshot |
| SSPM-3.7-07 | Session expiration | Custom session timeout ≤ 1440 minutes per environment | PPAC > Env > Settings > Privacy + Security | Session config screenshot |
| SSPM-3.7-08 | Content Security Policy | CSP enforcement enabled for model-driven apps | PPAC > Env > Settings > Privacy + Security > Content security policy | CSP config screenshot |
Test Procedures
SSPM-3.7-01: Hardening Baseline Review Cadence
- Locate the most recent hardening baseline review record (see Configuration Hardening Baseline)
- Verify the review was completed within the required cadence:
- Zone 1 (Personal Productivity): Monthly review
- Zone 2 (Team Collaboration): Bi-weekly review
- Zone 3 (Enterprise Managed): Weekly review
- Pass criteria: Most recent review date falls within the cadence window for each applicable zone
- Evidence: Review log showing reviewer name, date, and zone coverage
SSPM-3.7-02: Configuration Drift
- Review the most recent hardening baseline assessment output
- Identify any configuration items flagged as drifted from expected values
- Verify all drift items have either been remediated or have documented exceptions
- Pass criteria: No unresolved configuration drift items — all findings are remediated or accepted with documented risk
- Evidence: Drift report showing all items in compliant or accepted-risk state
SSPM-3.7-03: Evidence Archival
- Locate the evidence archive for the most recent review cycle
- Verify each archived evidence file has a SHA-256 hash recorded
- Verify the hash manifest is stored alongside the evidence package
- Pass criteria: Evidence package is complete with SHA-256 hash manifest for the current review cycle
- Evidence: Hash manifest file showing filenames and corresponding SHA-256 values
SSPM-3.7-04: Blocked Attachment Extensions
- Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
- Locate the Blocked Attachments field
- Verify the extension list includes at minimum:
ade;adp;app;asa;asp;bat;cdx;cmd;com;cpl;crt;csh;dll;exe;hta;inf;ins;jar;js;jse;lnk;mda;mdb;mde;msc;msi;msp;mst;pcd;pif;reg;scr;sct;shb;shs;tmp;url;vb;vbe;vbs;ws;wsc;wsf;wsh - Pass criteria: Blocked extensions list is present and includes the critical file types listed above
- Evidence: Screenshot of the blocked attachments configuration
SSPM-3.7-05: Blocked MIME Types
- Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
- Locate the Blocked MIME Types field
- Verify the blocked list includes at minimum:
application/javascript,application/x-javascript,text/javascript,application/hta,application/msaccess,text/scriplet,application/xml,application/prg - Pass criteria: Blocked MIME types list is present and includes the high-risk types listed above
- Evidence: Screenshot of the MIME type restriction configuration
SSPM-3.7-06: Inactivity Timeout
- Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
- Locate the Inactivity Timeout section
- Verify the timeout is enabled and the duration is set to 120 minutes or less
- Pass criteria: Inactivity timeout is enabled with duration ≤ 120 minutes
- Evidence: Screenshot of the inactivity timeout configuration
SSPM-3.7-07: Session Expiration
- Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
- Locate the Session Expiration section
- Verify "Set custom session timeout" is enabled and the maximum session length is ≤ 1440 minutes
- Pass criteria: Custom session timeout enabled with maximum session length ≤ 1440 minutes
- Evidence: Screenshot of the session expiration configuration
SSPM-3.7-08: Content Security Policy Enforcement
- Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
- Locate the Content security policy section under Model Driven
- Verify "Enforce content security policy" is enabled
- Pass criteria: CSP enforcement toggle is enabled for model-driven apps
- Evidence: Screenshot of the Content Security Policy configuration
Updated: February 2026 | Version: v1.3 | Classification: Verification Testing