Skip to content

Control 3.7: PPAC Security Posture Assessment - Verification & Testing

This playbook provides verification and testing procedures for Control 3.7.


Verification Steps

1. Security Dashboard Access

  • Navigate to PPAC > Security
  • Verify all four tabs are accessible
  • Confirm recommendations are displayed

2. Recommendation Accuracy

  • Review each recommendation
  • Verify status reflects actual configuration
  • Confirm risk levels are appropriate

3. Report Generation

  • Run posture assessment script
  • Verify scores calculate correctly
  • Confirm report includes all environments

Compliance Checklist

Item Required For Status
Monthly posture review Governance policy
All high-risk recommendations addressed Security baseline
Managed environments enabled Zone 2-3
DLP policies applied to all environments Data protection
Security scores tracked over time Trend analysis

Test Cases

Test Case 1: Recommendation Status Update

Objective: Verify recommendations update when addressed

Steps:

  1. Note a specific recommendation
  2. Implement the recommended change
  3. Refresh Security dashboard
  4. Verify status changed to "Completed"

Expected Result: Recommendation reflects completed status

Test Case 2: Score Calculation

Objective: Verify security score accuracy

Steps:

  1. Run security posture assessment
  2. Manually verify each security control
  3. Compare calculated score to expected

Expected Result: Scores accurately reflect configuration

Test Case 3: DLP Coverage Detection

Objective: Verify DLP coverage analysis

Steps:

  1. Create environment without DLP
  2. Run DLP coverage check
  3. Verify environment flagged as uncovered
  4. Apply DLP policy
  5. Re-run check

Expected Result: Coverage detection is accurate


Evidence Collection

For audits, collect:

  • Monthly security posture reports
  • Recommendation completion history
  • Security score trend data
  • DLP coverage documentation

Next Steps


SSPM Configuration Verification

Security Posture Assessment Test Cases

The following test cases validate configuration points flagged by security posture assessments. Each test maps to a specific setting in the Configuration Hardening Baseline.

Test ID Configuration Point Expected Result Portal Path Evidence
SSPM-3.7-01 Hardening baseline review Review completed per documented cadence (weekly Zone 3, bi-weekly Zone 2, monthly Zone 1) N/A (process-based) Review log
SSPM-3.7-02 Configuration drift No unresolved configuration drift items N/A (process-based) Drift report
SSPM-3.7-03 Evidence archival Evidence archived with SHA-256 hash per review cycle N/A (process-based) Hash manifest
SSPM-3.7-04 Blocked attachment extensions Dangerous file extensions configured per environment PPAC > Env > Settings > Privacy + Security Extension list screenshot
SSPM-3.7-05 Blocked MIME types High-risk MIME types blocked per environment PPAC > Env > Settings > Privacy + Security MIME type list screenshot
SSPM-3.7-06 Inactivity timeout Enabled with duration ≤ 120 minutes per environment PPAC > Env > Settings > Privacy + Security Timeout configuration screenshot
SSPM-3.7-07 Session expiration Custom session timeout ≤ 1440 minutes per environment PPAC > Env > Settings > Privacy + Security Session config screenshot
SSPM-3.7-08 Content Security Policy CSP enforcement enabled for model-driven apps PPAC > Env > Settings > Privacy + Security > Content security policy CSP config screenshot

Test Procedures

SSPM-3.7-01: Hardening Baseline Review Cadence

  1. Locate the most recent hardening baseline review record (see Configuration Hardening Baseline)
  2. Verify the review was completed within the required cadence:
    • Zone 1 (Personal Productivity): Monthly review
    • Zone 2 (Team Collaboration): Bi-weekly review
    • Zone 3 (Enterprise Managed): Weekly review
  3. Pass criteria: Most recent review date falls within the cadence window for each applicable zone
  4. Evidence: Review log showing reviewer name, date, and zone coverage

SSPM-3.7-02: Configuration Drift

  1. Review the most recent hardening baseline assessment output
  2. Identify any configuration items flagged as drifted from expected values
  3. Verify all drift items have either been remediated or have documented exceptions
  4. Pass criteria: No unresolved configuration drift items — all findings are remediated or accepted with documented risk
  5. Evidence: Drift report showing all items in compliant or accepted-risk state

SSPM-3.7-03: Evidence Archival

  1. Locate the evidence archive for the most recent review cycle
  2. Verify each archived evidence file has a SHA-256 hash recorded
  3. Verify the hash manifest is stored alongside the evidence package
  4. Pass criteria: Evidence package is complete with SHA-256 hash manifest for the current review cycle
  5. Evidence: Hash manifest file showing filenames and corresponding SHA-256 values

SSPM-3.7-04: Blocked Attachment Extensions

  1. Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
  2. Locate the Blocked Attachments field
  3. Verify the extension list includes at minimum: ade;adp;app;asa;asp;bat;cdx;cmd;com;cpl;crt;csh;dll;exe;hta;inf;ins;jar;js;jse;lnk;mda;mdb;mde;msc;msi;msp;mst;pcd;pif;reg;scr;sct;shb;shs;tmp;url;vb;vbe;vbs;ws;wsc;wsf;wsh
  4. Pass criteria: Blocked extensions list is present and includes the critical file types listed above
  5. Evidence: Screenshot of the blocked attachments configuration

SSPM-3.7-05: Blocked MIME Types

  1. Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
  2. Locate the Blocked MIME Types field
  3. Verify the blocked list includes at minimum: application/javascript, application/x-javascript, text/javascript, application/hta, application/msaccess, text/scriplet, application/xml, application/prg
  4. Pass criteria: Blocked MIME types list is present and includes the high-risk types listed above
  5. Evidence: Screenshot of the MIME type restriction configuration

SSPM-3.7-06: Inactivity Timeout

  1. Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
  2. Locate the Inactivity Timeout section
  3. Verify the timeout is enabled and the duration is set to 120 minutes or less
  4. Pass criteria: Inactivity timeout is enabled with duration ≤ 120 minutes
  5. Evidence: Screenshot of the inactivity timeout configuration

SSPM-3.7-07: Session Expiration

  1. Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
  2. Locate the Session Expiration section
  3. Verify "Set custom session timeout" is enabled and the maximum session length is ≤ 1440 minutes
  4. Pass criteria: Custom session timeout enabled with maximum session length ≤ 1440 minutes
  5. Evidence: Screenshot of the session expiration configuration

SSPM-3.7-08: Content Security Policy Enforcement

  1. Navigate to PPAC > Environments > [Environment] > Settings > Privacy + Security
  2. Locate the Content security policy section under Model Driven
  3. Verify "Enforce content security policy" is enabled
  4. Pass criteria: CSP enforcement toggle is enabled for model-driven apps
  5. Evidence: Screenshot of the Content Security Policy configuration

Updated: February 2026 | Version: v1.3 | Classification: Verification Testing