Kyūdō
Microsoft NativeMOFU

Defender, Sentinel, Purview, Entra: A Control-Mapping Field Guide

You have four Microsoft security products producing signals but no map of which signal proves which control, and where the gaps are.

Kyudo EditorialApril 2, 202612 min read

Your auditor just asked for evidence against 47 NIST 800-53 rev 5 controls. You know the signals exist somewhere in your Microsoft stack. Defender is producing findings. Sentinel is ingesting logs. Purview is classifying data. Entra is enforcing access policies. But when the auditor asks "show me continuous monitoring evidence for SI-4," you're opening four portals, running four queries, and hoping you pull the right artifact for the right control family.

This is the field guide that should have shipped with your E5 license. Which product proves which control family, what signal type it produces, and where the gaps live.

Why NIST 800-53 rev 5 as the baseline

800-53 rev 5 is the most granular federal control catalog: 1,189 controls across 20 families. If you can map to 800-53, you can derive SOC 2, ISO 27001, CMMC, and FedRAMP from there. Microsoft's own security baselines already reference 800-53 families. This guide completes what they started but never finished in one consumable format.

If your primary framework is SOC 2 or ISO 27001, the mapping still applies. SOC 2's CC6 maps to 800-53 AC and IA. ISO 27001's A.8 maps to SI, AU, and SC. The 800-53 mapping is the Rosetta Stone.

The master mapping table

Each row is a signal type that a Microsoft product produces, mapped to its primary NIST 800-53 family and evidence format.

Microsoft ProductSignal TypeNIST 800-53 FamilyEvidence FormatCadence
Defender XDRSecurity baseline complianceSI (System & Info Integrity)JSON compliance state per resourceContinuous (12-24h)
Defender XDRVulnerability assessmentRA (Risk Assessment)CVE-scored findingsContinuous
Defender XDRAutomated investigation verdictsIR (Incident Response)Investigation graph + timelineEvent-triggered
Defender XDRDevice compliance stateCM (Configuration Mgmt)Boolean per device policyContinuous (8h)
Defender for CloudRegulatory compliance assessmentsMultiple (SA, CM, SI)Per-control pass/failContinuous
SentinelSecurity event ingestion + retentionAU (Audit & Accountability)Normalized log tablesReal-time
SentinelAnalytic rule detectionsSI (System & Info Integrity)Alert with MITRE mappingEvent-triggered
SentinelPlaybook executionIR (Incident Response)Automation run historyEvent-triggered
SentinelThreat intelligence matchesRA (Risk Assessment)IOC correlation eventsContinuous
PurviewSensitivity label applicationsMP (Media Protection)Label audit eventsEvent-triggered
PurviewData classification scansSC (System & Comms Protection)Sensitive type counts per locationScheduled
PurviewDLP policy matchesSC (System & Comms Protection)Policy match with contextEvent-triggered
PurviewInsider risk signalsPS (Personnel Security)Risk score + activitiesContinuous
Entra IDConditional Access evaluationsAC (Access Control)Grant/deny with policy refReal-time
Entra IDPIM activationsAC (Access Control)Role activation + approvalEvent-triggered
Entra IDAccess review resultsAC (Access Control)Decisions per identityScheduled
Entra IDAuth method registrationIA (Identification & Auth)MFA inventory per userContinuous
Entra IDSign-in risk detectionsIA (Identification & Auth)Risk event + sourceReal-time
Azure PolicyResource compliance evaluationsCM (Configuration Mgmt)Compliance state per resourceContinuous (1h)
Azure PolicyDeny/audit action logsCM (Configuration Mgmt)Action with resource IDEvent-triggered
Azure PolicyGuest configurationSA (System & Services Acq)In-guest findingsScheduled (15 min)

That's 21 signal types across five products, covering nine NIST 800-53 families with continuous or near-continuous evidence.

Product-by-product highlights

Defender XDR (SI, IR, RA, CM): The security baseline findings are the highest-value signal. Each is a structured assertion: "Resource X evaluated against policy Y at time Z, result: compliant/non-compliant." For IR, automated investigation graphs provide machine-readable evidence chains mapping to IR-4 and IR-5.

Sentinel (AU, SI, IR): Primary value is proving AU-2, AU-3, AU-6, and AU-12. Logs exist, are retained, normalized, and queryable. Analytic rule detections prove SI-4 with specificity: "detected X at time Y using rule Z." Playbook execution logs prove IR-4 automation. We covered this in Sentinel Logs as Audit Evidence.

Purview (MP, SC, partial PS): The only Microsoft product covering Media Protection. Label applications prove MP-3 (Marking) and MP-5 (Transport). Classification scans address SC-28 (Protection at Rest). DLP matches prove SC-7 (Boundary Protection). Insider risk provides partial PS coverage, but PS controls largely require human processes.

Entra ID (AC, IA): Owns access control and authentication most completely. Conditional Access proves AC-2, AC-3, AC-7. PIM proves AC-5 (Separation of Duties) and AC-6 (Least Privilege). Authentication signals cover IA-2 through IA-8.

Azure Policy (CM, SA): Most systematic CM evidence available. Every resource evaluated against every assigned policy, continuously. Satisfies CM-2 (Baseline), CM-6 (Settings), CM-7 (Least Functionality), CM-8 (Inventory). Guest configuration extends into the OS layer for SA-4.

Where the gaps live

These NIST 800-53 families have minimal or zero Microsoft coverage:

Control FamilyWhy No Coverage
PE (Physical & Environmental)Cloud shared-responsibility. Microsoft covers Azure DCs, but YOUR office needs separate evidence.
PS (Personnel Security)Background checks, termination procedures. Human process, no technical signal.
PL (Planning)Security planning, SSP maintenance. Document lifecycle.
PM (Program Management)Risk strategy, leadership engagement. Governance process.
SR (Supply Chain)Procurement process. Partially addressed by Defender for DevOps.
AT (Awareness & Training)Training delivery and records. Requires LMS integration.
CP (Contingency Planning)DR testing evidence. Azure Backup provides signals, but most CP is test execution records.
MA (Maintenance)System maintenance scheduling. Operational process.

Eight families out of twenty. 40% of 800-53 where no Microsoft product produces sufficient evidence. These require organizational processes, human decisions, physical-world actions. Your team needs to know exactly where automated collection ends.

How Kyudo closes the loop

The table tells you which signals exist. It doesn't tell you how they become audit-ready evidence with provenance, freshness, and cross-framework mapping.

Kyudo's Microsoft integrations pull structured data from all five products via Microsoft Graph and Azure Resource Manager APIs. Not screenshots. The raw JSON with full metadata.

The Controls Hub stores each signal as a hashed, timestamped artifact. When a Defender finding enters, it maps automatically to every framework control it satisfies (not just 800-53, but SOC 2, ISO 27001, CMMC, PCI DSS) using the STRM Engine's relationship data.

For gap families, Kyudo assigns controls to human owners with cadence reminders. Manual evidence enters the same Evidence Hub with the same provenance chain as automated signals, but with freshness decay: stale after 30 days without renewal.

The counter-argument: "We already mapped this ourselves"

Most internal mapping documents have three problems. First, they're static. Microsoft updates product capabilities quarterly, and a spreadsheet drifts within 6 months. Second, they're incomplete: built for one framework, useless when the CMMC auditor arrives. Third, they're not evidence. The mapping tells you where to file a finding. It doesn't collect, hash, or timestamp the finding itself.

Kyudo treats mapping as executable infrastructure. When a Defender finding enters the system, the mapping is already applied. No analyst in the loop for the filing decision.

Cheat sheet: signal to control family

Evidence NeededProductSignal
AC (Access Control)Entra IDConditional Access, PIM, access reviews
AU (Audit & Accountability)SentinelRetention proof, analytics rule fire history
CM (Configuration Mgmt)Azure Policy + DefenderPolicy compliance states, baselines
IA (Identification & Auth)Entra IDMFA registration, sign-in risk, auth methods
IR (Incident Response)Defender + SentinelInvestigation graphs, playbook logs
MP (Media Protection)PurviewLabel applications, encryption
RA (Risk Assessment)Defender + SentinelVuln findings, threat intel matches
SA (System & Services Acq)Azure PolicyGuest configuration assessments
SC (System & Comms)Purview + Azure PolicyDLP matches, classification, network rules
SI (System & Info Integrity)Defender + SentinelBaselines, detections, malware findings

Families not listed (PE, PS, PL, PM, SR, AT, CP, MA): manual collection required.

Your Monday morning checklist

  1. Inventory active control families. Which of the 20 are in scope? Cross-reference against the master table to identify what you should be collecting automatically.

  2. Verify API access. Defender compliance states, Sentinel queries, Purview audit logs, Entra sign-in data. Missing permissions are the most common reason automated collection fails.

  3. Identify gap families. Which in-scope families appear in the "no coverage" table? These need manual workflows with clear owners.

  4. Test freshness. Pull one artifact per product. If the most recent Defender state in your GRC tool is 72+ hours old, your pipeline is batch, not continuous.

  5. Map cross-framework. That Entra Conditional Access evaluation proves NIST AC-3, SOC 2 CC6.1, ISO 27001 A.8.5, and CMMC AC.L2-3.1.1. If your tool stores it under one framework only, you're collecting the same signal multiple times.

The signals exist. The mapping is known. The gap between "security product output" and "audit-ready evidence" is an integration problem, not a data problem.


Kyudo's Microsoft integration layer pulls structured signals from Defender, Sentinel, Purview, Entra, and Azure Policy into a unified evidence pipeline. One signal, every framework, full provenance.

Book a demo to see your Microsoft signals mapped to controls in real time.

Next step

Book a demo

Book a demo
Microsoft security control mappingDefender compliance evidenceSentinel control mappingNIST 800-53 Microsoft