Microsoft 365 encompasses a wide range of software that we all use to conduct day-to-day business – everything from Word to OneDrive, from Power Point to Power Platform, and from Excel to Exchange Server. However much we may rely on it, such a large attack surface gives bad actors ample opportunity to exploit any gaps in your defences.
Validate Your Setup
Ensure your Microsoft 365 configuration aligns with best practices and correct any gaps before they become vulnerabilities.
Prove Compliance
Document adherence to regulatory standards and demonstrate your organisation’s commitment to security.
Stay Ahead of Threats
Keep pace with evolving Microsoft 365 security developments to minimise risk and maintain resilience.
Justify Investments
Gain peace of mind and provide clear evidence to support future security and technology investments.
Thousands of organisations across the UK trust us, here’s why…
CREST & CHECK Accredited
We are certified for both CREST and CHECK Green Light testing - an achievement not all testing companies can claim.
Clear and Concise Reports
We provide easy-to-understand reports with detailed findings and actionable recommendations.
CREST Infrastructure & App Testing
We are certified in both CREST Infrastructure and Application testing to the highest standards.
Specialised Testing Teams
Developer-trained testers deliver comprehensive app, API, and cloud testing for deeper, more effective results.
Experienced & Senior Consultants
Our team consists of highly experienced, senior consultants and penetration testers with over 15 years of expertise.
We Save You Time and Money
Clients consistently tell us that we deliver higher-quality testing in less time.
Outstanding Communication
We establish dedicated Teams or Slack channels to ensure seamless two-way communication between all.
Forward-Thinking Security
Our team goes beyond identifying vulnerabilities, offering proactive solutions to mitigate future risks.
Microsoft 365 encompasses a wide range of software that we all use to conduct day-to-day business – everything from Word to OneDrive, from Power Point to Power Platform, and from Excel to Exchange Server. However much we may rely on it, such a large attack surface gives bad actors ample opportunity to exploit any gaps in your defences.
Validate Your Setup
Ensure your Microsoft 365 configuration aligns with best practices and correct any gaps before they become vulnerabilities.
Prove Compliance
Document adherence to regulatory standards and demonstrate your organisation’s commitment to security.
Stay Ahead of Threats
Keep pace with evolving Microsoft 365 security developments to minimise risk and maintain resilience.
Justify Investments
Gain peace of mind and provide clear evidence to support future security and technology investments.
Thousands of organisations across the UK trust us, here’s why…
CREST & CHECK Accredited
We are certified for both CREST and CHECK Green Light testing - an achievement not all testing companies can claim.
Clear and Concise Reports
We provide easy-to-understand reports with detailed findings and actionable recommendations.
CREST Infrastructure & App Testing
We are certified in both CREST Infrastructure and Application testing to the highest standards.
Specialised Testing Teams
Developer-trained testers deliver comprehensive app, API, and cloud testing for deeper, more effective results.
Experienced & Senior Consultants
Our team consists of highly experienced, senior consultants and penetration testers with over 15 years of expertise.
We Save You Time and Money
Clients consistently tell us that we deliver higher-quality testing in less time.
Outstanding Communication
We establish dedicated Teams or Slack channels to ensure seamless two-way communication between all.
Forward-Thinking Security
Our team goes beyond identifying vulnerabilities, offering proactive solutions to mitigate future risks.
What is a Microsoft 365 Security Assessment?
Quickly validate your MS365 configuration and ensure alignment with industry security standards. Our short, remote engagement typically completes within a week. We start with a consultation between your system admin and our cyber security experts, then review your MS365 admin panel to perform a full configuration assessment. Your assessment is valid for one year from completion.
Our security consultant will ask your sysadmin some questions, then arrange access to MS365 to investigate your configuration.
The information we have gathered in stage one is mapped line-by-line against your required CIS Controls framework to identify any gaps.
Depending on your requirements, we can present the results of the assessment, or present our findings on a call.
One of our CREST, CHECK, and Cyber Scheme certified consultants will work with you to define the scope of the engagement and ensure that our tests will fulfil your requirements.
Your assigned consultant will gather information on your organisation, including:
- IP addresses of websites and MX records
- Details of e-mail addresses
- Social networks
- People search
- Job search websites
This information will assist in identifying and exploiting any vulnerabilities or weaknesses.
Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Spectacular visualize customer directed convergence without revolutionary ROI.
Efficiently unleash cross-media information without cross-media value. Quickly maximize timely deliverables for real-time schemas. Spectacular maintain clicks-and-mortar solutions without functional solutions.
CIS Controls Framework V2.0
Following the Center for Internet Security’s Microsoft 365 Foundations Benchmark v2.0.0, this framework is especially useful for clients in the NHS who are required to meet the Secure Email (DCB1596) standard.
1. Account & Authorisation
Assessing authentication, password security, access settings, and Azure policies.
2. Application Permissions
Inspecting the applications that impact on MS365, as well as native integrations, to ensure security.
3. Data Management
Reviewing file sharing configuration and policies to reduce the risk of unauthorised access.
4. Email Security & Exchange
Validating attachment, forwarding, and domain configurations to harden your email security.
5. Auditing Your Policies
Assessing your monitoring policies to ensure that you are able to proactively detect attacks.
6. Storage
Defending against data leakage by checking for misconfigurations in sharing, syncing, and whitelisting.
7. Mobile Devices
Checking your mobile password strategy and device policies to ensure the security of BYOD workers.
CIS Controls Framework V3.0
Following the Center for Internet Security’s latest Microsoft 365 Foundations Benchmark v3.0.0, this extended framework provides prescriptive guidance for establishing a secure configuration posture for Microsoft 365.

1. Microsoft 365
Assessing key security settings within the Microsoft 365 admin portal.
2. M365 Defender
Assessing security settings applied to Defender for Office and Cloud Applications.

3. M365 Purview
Settings related to compliance, data governance, information protection & risk.
4. M365 Entra
Security settings related to identity & access management within Microsoft Entra.

5. M365 Exchange
Assessing the security configuration of Microsoft Exchange Online.

6. M365 Sharepoint
Security settings related to SharePoint and OneDrive.

7. Microsoft Teams
Security settings related to Microsoft Teams.

8. Microsoft Fabric
Security settings related to Power BI configuration.
ISO 27001 is a globally recognised framework for managing information security risks. While penetration testing is not explicitly required, it plays a crucial role in meeting the standard’s risk assessment requirements by identifying weaknesses in systems and strengthening security controls.
Capitalize on low hanging fruit to identify a ballpark value added activity to beta test. Override the digital divide with additional clickthroughs from DevOps. Nanotechnology immersion along the information highway will close the loop on focusing solely on the bottom line.
Podcasting operational change management inside of workflows to establish a framework. Taking seamless key performance indicators offline to maximise the long tail. Keeping your eye on the ball while performing a deep dive on the start-up mentality to derive convergence on cross-platform integration.
Collaboratively administrate empowered markets via plug-and-play networks. Dynamically procrastinate B2C users after installed base benefits. Spectacular visualize customer directed convergence without revolutionary ROI.
Efficiently unleash cross-media information without cross-media value. Quickly maximize timely deliverables for real-time schemas. Spectacular maintain clicks-and-mortar solutions without functional solutions.
Rely on CyberLab
Experienced Security Team
With an experienced team of consultants, pen testers, and security specialists, Cyberlab can be trusted to deliver the highest standard of service.
Advice You Can Trust
We provide a trusted advisor who can understand your requirements and help guide the decision-making process.
Vendor Agnostic Advice
We are 100% vendor agnostic and will only ever recommend the best products and solutions for your businesses requirements.
Fully Bespoke Approach
We specialise in creating bespoke security solutions and testing packages around the needs of your business to maintain your security posture.
Success Stories
Microsoft 365 Assessment

NHS
This NHS Trust is now able to use Microsoft 365 to its full potential, safely and securely across the organisation.
“Having used CyberLab before in a previous Head of IT role, I had no hesitation in engaging them again to assist us with our security needs. Simply, I wouldn’t use them if they didn’t consistently deliver value.”
Microsoft 365 Assessment

MDL Marinas
Assisting Europe’s largest marina operator to implement cloud security while modernising and optimising their IT estate.
“All of the people I met were very, very good and were clearly experts in the subject. They gave me the confidence that they would do a thorough job and that the outcome of that would be as good as it could be. Everything that we’ve worked with CyberLab on – I’ve been very satisfied.”
CREST, CHECK & Cyber Scheme Certified
CREST (the Council of Registered Ethical Security Testers) is an international accreditation with a strict Codes of Conduct and Ethics. CHECK is the Government-backed accreditation from the National Cyber Security Centre (NCSC) which certifies that a company can conduct authorised penetration tests of public sector systems and networks.
All our penetration testers are certified by CREST, with senior consultants certified by CREST to the highest CCT Level. Our testers are also either CHECK Team Leaders (CTL’s) or Team Members (CTM’s).
Security testers that pass the Cyber Scheme exams demonstrate ‘competence and skill at the highest levels’ as defined by the National Technical Authority for Cyber Security (NCSC).
Our team have decades of combined experience and take pride in operating at the highest level of the industry – conducting a broad range of government and commercial tests – and always aim to go the extra mile.

Speak With an Expert
Enter your details and one of our experts will be in touch.
Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.
Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.
We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.







