Microsoft 365 encompasses a wide range of software that we all use to conduct day-to-day business – everything from Word to OneDrive, from Power Point to Power Platform, and from Excel to Exchange Server. However much we may rely on it, such a large attack surface gives bad actors ample opportunity to exploit any gaps in your defences.

Validate Your Setup

Ensure your Microsoft 365 configuration aligns with best practices and correct any gaps before they become vulnerabilities.

Prove Compliance

Document adherence to regulatory standards and demonstrate your organisation’s commitment to security.

Stay Ahead of Threats

Keep pace with evolving Microsoft 365 security developments to minimise risk and maintain resilience.

Justify Investments

Gain peace of mind and provide clear evidence to support future security and technology investments.


Thousands of organisations across the UK trust us, here’s why…

CREST & CHECK Accredited

We are certified for both CREST and CHECK Green Light testing - an achievement not all testing companies can claim.

Clear and Concise Reports

We provide easy-to-understand reports with detailed findings and actionable recommendations.

CREST Infrastructure & App Testing

We are certified in both CREST Infrastructure and Application testing to the highest standards.

Specialised Testing Teams

Developer-trained testers deliver comprehensive app, API, and cloud testing for deeper, more effective results.

Experienced & Senior Consultants

Our team consists of highly experienced, senior consultants and penetration testers with over 15 years of expertise.

We Save You Time and Money

Clients consistently tell us that we deliver higher-quality testing in less time.

Outstanding Communication

We establish dedicated Teams or Slack channels to ensure seamless two-way communication between all.

Forward-Thinking Security

Our team goes beyond identifying vulnerabilities, offering proactive solutions to mitigate future risks.


Microsoft 365 encompasses a wide range of software that we all use to conduct day-to-day business – everything from Word to OneDrive, from Power Point to Power Platform, and from Excel to Exchange Server. However much we may rely on it, such a large attack surface gives bad actors ample opportunity to exploit any gaps in your defences.

Validate Your Setup

Ensure your Microsoft 365 configuration aligns with best practices and correct any gaps before they become vulnerabilities.

Prove Compliance

Document adherence to regulatory standards and demonstrate your organisation’s commitment to security.

Stay Ahead of Threats

Keep pace with evolving Microsoft 365 security developments to minimise risk and maintain resilience.

Justify Investments

Gain peace of mind and provide clear evidence to support future security and technology investments.


Thousands of organisations across the UK trust us, here’s why…

CREST & CHECK Accredited

We are certified for both CREST and CHECK Green Light testing - an achievement not all testing companies can claim.

Clear and Concise Reports

We provide easy-to-understand reports with detailed findings and actionable recommendations.

CREST Infrastructure & App Testing

We are certified in both CREST Infrastructure and Application testing to the highest standards.

Specialised Testing Teams

Developer-trained testers deliver comprehensive app, API, and cloud testing for deeper, more effective results.

Experienced & Senior Consultants

Our team consists of highly experienced, senior consultants and penetration testers with over 15 years of expertise.

We Save You Time and Money

Clients consistently tell us that we deliver higher-quality testing in less time.

Outstanding Communication

We establish dedicated Teams or Slack channels to ensure seamless two-way communication between all.

Forward-Thinking Security

Our team goes beyond identifying vulnerabilities, offering proactive solutions to mitigate future risks.

What is a Microsoft 365 Security Assessment?

Quickly validate your MS365 configuration and ensure alignment with industry security standards. Our short, remote engagement typically completes within a week. We start with a consultation between your system admin and our cyber security experts, then review your MS365 admin panel to perform a full configuration assessment. Your assessment is valid for one year from completion.

Our security consultant will ask your sysadmin some questions, then arrange access to MS365 to investigate your configuration.

The information we have gathered in stage one is mapped line-by-line against your required CIS Controls framework to identify any gaps.

Depending on your requirements, we can present the results of the assessment, or present our findings on a call.

Speak with an Expert

One of our CREST, CHECK, and Cyber Scheme certified consultants will work with you to define the scope of the engagement and ensure that our tests will fulfil your requirements.

Your assigned consultant will gather information on your organisation, including:

  • IP addresses of websites and MX records
  • Details of e-mail addresses
  • Social networks
  • People search
  • Job search websites

This information will assist in identifying and exploiting any vulnerabilities or weaknesses.

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Spectacular visualize customer directed convergence without revolutionary ROI.

Efficiently unleash cross-media information without cross-media value. Quickly maximize timely deliverables for real-time schemas. Spectacular maintain clicks-and-mortar solutions without functional solutions.

Empty section. Edit page to add content here.
Empty section. Edit page to add content here.
Empty section. Edit page to add content here.

CIS Controls Framework V2.0

Following the Center for Internet Security’s Microsoft 365 Foundations Benchmark v2.0.0, this framework is especially useful for clients in the NHS who are required to meet the Secure Email (DCB1596) standard.

1. Account & Authorisation

Assessing authentication, password security, access settings, and Azure policies.

2. Application Permissions

Inspecting the applications that impact on MS365, as well as native integrations, to ensure security.

3. Data Management

Reviewing file sharing configuration and policies to reduce the risk of unauthorised access.

4. Email Security & Exchange

Validating attachment, forwarding, and domain configurations to harden your email security.

5. Auditing Your Policies

Assessing your monitoring policies to ensure that you are able to proactively detect attacks.

6. Storage

Defending against data leakage by checking for misconfigurations in sharing, syncing, and whitelisting.

7. Mobile Devices

Checking your mobile password strategy and device policies to ensure the security of BYOD workers.

CIS Controls Framework V3.0

Following the Center for Internet Security’s latest Microsoft 365 Foundations Benchmark v3.0.0, this extended framework provides prescriptive guidance for establishing a secure configuration posture for Microsoft 365.

1. Microsoft 365

Assessing key security settings within the Microsoft 365 admin portal.

2. M365 Defender

Assessing security settings applied to Defender for Office and Cloud Applications.

3. M365 Purview

Settings related to compliance, data governance, information protection & risk.

4. M365 Entra

Security settings related to identity & access management within Microsoft Entra.

5. M365 Exchange

Assessing the security configuration of Microsoft Exchange Online.

6. M365 Sharepoint

Security settings related to SharePoint and OneDrive.

7. Microsoft Teams

Security settings related to Microsoft Teams.

8. Microsoft Fabric

Security settings related to Power BI configuration.

ISO 27001 is a globally recognised framework for managing information security risks. While penetration testing is not explicitly required, it plays a crucial role in meeting the standard’s risk assessment requirements by identifying weaknesses in systems and strengthening security controls.

Capitalize on low hanging fruit to identify a ballpark value added activity to beta test. Override the digital divide with additional clickthroughs from DevOps. Nanotechnology immersion along the information highway will close the loop on focusing solely on the bottom line.

Podcasting operational change management inside of workflows to establish a framework. Taking seamless key performance indicators offline to maximise the long tail. Keeping your eye on the ball while performing a deep dive on the start-up mentality to derive convergence on cross-platform integration.

Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Spectacular visualize customer directed convergence without revolutionary ROI.

Efficiently unleash cross-media information without cross-media value. Quickly maximize timely deliverables for real-time schemas. Spectacular maintain clicks-and-mortar solutions without functional solutions.

Empty section. Edit page to add content here.
Empty section. Edit page to add content here.
Empty section. Edit page to add content here.

Rely on CyberLab

Experienced Security Team

With an experienced team of consultants, pen testers, and security specialists, Cyberlab can be trusted to deliver the highest standard of service.

Advice You Can Trust

We provide a trusted advisor who can understand your requirements and help guide the decision-making process.

Vendor Agnostic Advice

We are 100% vendor agnostic and will only ever recommend the best products and solutions for your businesses requirements.

Fully Bespoke Approach

We specialise in creating bespoke security solutions and testing packages around the needs of your business to maintain your security posture.

Success Stories

Microsoft 365 Assessment


NHS Success Story

NHS

This NHS Trust is now able to use Microsoft 365 to its full potential, safely and securely across the organisation.

“Having used CyberLab before in a previous Head of IT role, I had no hesitation in engaging them again to assist us with our security needs. Simply, I wouldn’t use them if they didn’t consistently deliver value.”

Read Success Story

Microsoft 365 Assessment


MDL Marinas Success Story

MDL Marinas

Assisting Europe’s largest marina operator to implement cloud security while modernising and optimising their IT estate.

“All of the people I met were very, very good and were clearly experts in the subject. They gave me the confidence that they would do a thorough job and that the outcome of that would be as good as it could be. Everything that we’ve worked with CyberLab on – I’ve been very satisfied.”

Read Success Story

CREST, CHECK & Cyber Scheme Certified

CREST (the Council of Registered Ethical Security Testers) is an international accreditation with a strict Codes of Conduct and Ethics. CHECK is the Government-backed accreditation from the National Cyber Security Centre (NCSC) which certifies that a company can conduct authorised penetration tests of public sector systems and networks.

All our penetration testers are certified by CREST, with senior consultants certified by CREST to the highest CCT Level. Our testers are also either CHECK Team Leaders (CTL’s) or Team Members (CTM’s).

Security testers that pass the Cyber Scheme exams demonstrate ‘competence and skill at the highest levels’ as defined by the National Technical Authority for Cyber Security (NCSC).

Our team have decades of combined experience and take pride in operating at the highest level of the industry – conducting a broad range of government and commercial tests – and always aim to go the extra mile.

CyberLab-Certifications-Square

Speak With an Expert

Enter your details and one of our experts will be in touch.

Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.

Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.

We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.