fy17 mtc e5 briefings security

30
Security Week 27 maart – 31 maart

Upload: others

Post on 29-May-2022

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: FY17 MTC E5 Briefings Security

Security Week 27 maart – 31 maart

Page 2: FY17 MTC E5 Briefings Security

Security Week 27 maart – 31 maart

Maandag - ‘Trusted cloud’: hoe kun je de cloud vertrouwen?

Dinsdag - Office 365; beveiliging van gegevens en informatie

Woensdag - Digitaliseer veilig je organisatie in de cloud

Woensdag - Wat moet je weten over de nieuwe GDPR regelgeving?

Donderdag - Digitale Transformatie & de security voordelen

Vrijdag - Veilig mobiel werken in de cloud

Page 3: FY17 MTC E5 Briefings Security

SecurityBuilt-in Enterprise ProtectionHans van der Meer

[email protected]

Page 4: FY17 MTC E5 Briefings Security

Our commitment to trust

Page 5: FY17 MTC E5 Briefings Security

Customer challenges

160 million customer records compromised

229 days between infiltration and detection

87% of senior managers admit using personal accounts for work

50% year over year growth in electronic data

Ever-evolving industry standards across geographies

Page 6: FY17 MTC E5 Briefings Security

Our unique approach

Page 7: FY17 MTC E5 Briefings Security

Our unique approach

Page 8: FY17 MTC E5 Briefings Security

Our security platform

Page 9: FY17 MTC E5 Briefings Security

User log-ins

Unauthorized data access

Data encryption

Malware

System updates

Enterprise security

Attacks

Phishing Denial of service

User accounts

Device log-ins

Multi-factor authentication

Page 10: FY17 MTC E5 Briefings Security

300B

1B

200B

Our unique intelligence

Page 11: FY17 MTC E5 Briefings Security

Our unique approach

Page 12: FY17 MTC E5 Briefings Security

Our partnership approach

Page 13: FY17 MTC E5 Briefings Security

Reinventing productivity for the digital transformation

Page 14: FY17 MTC E5 Briefings Security

Enterprise reliability via 100+ data centers and Microsoft’s global network edge

Compliance leadership with standards including ISO 27001, FISMA, and EU Model Clauses

No standing access to data, transparent operational model, and financial-backed 99.9% SLA

Secure by design, operationalized at the physical, logical, and data layers

Global, hyper-scale, enterprise-grade infrastructure

Page 15: FY17 MTC E5 Briefings Security

Over 900 controls in the Office 365 compliance framework enable us to stay up to date with the ever-evolving industry standards across geographies.

Trust Microsoft’s verified services. Microsoft is regularly audited, submits self-assessments to independent 3rd party auditors, and holds key certifications.

Key certifications

United StatesCJIS

CSA CCM

DISA

FDA CFR Title 21 Part 11

FEDRAMP

FERPA

FIPS 140-2

FISMA

HIPPA/HITECH

HITRUST

IRS 1075

ISO/IEC 27001, 27018

MARS-E

NIST 800-171

Section 508 VPATs

SOC 1, 2

ArgentinaArgentina PDPA

CSA CCM

IRAP (CCSL)

ISO/IEC 27001, 27018

SOC 1, 2

SpainCSA CCM

ENISA IAF

EU Model Clauses

EU-U.S. Privacy Shield

ISO/IEC 27001, 27018

SOC 1, 2

Spain ENS

United KingdomCSA CCM

ENISA IAF

EU Model Clauses

ISO/IEC 27001, 27018

NIST 800-171

SOC 1, 2, 3

UK G-Cloud

JapanCSA CCM

CS Mark (Gold)

FISC

ISO/IEC 27001, 27018

Japan My Number Act

SOC 1, 2

SingaporeCSA CCM

ISO/IEC 27001, 27018

MTCS

SOC 1, 2

New ZealandCSA CCM

ISO/IEC 27001, 27018

NZCC Framework

SOC 1, 2

AustraliaCSA CCM

IRAP (CCSL)

ISO/IEC 27001, 27018

SOC 1, 2

European UnionCSA CCM

ENISA IAF

EU Model Clauses

EU-U.S. Privacy Shield

ISO/IEC 27001, 27018

SOC 1, 2,

ChinaChina GB 18030

China MLPS

China TRUCS

Page 16: FY17 MTC E5 Briefings Security

Privacy

Customer is the owner of their data.

We do not mine customer data for advertising purposes.

Privacy controls enable you to configure your company privacy policies.

Microsoft advocates for data privacy on behalf of customers.

Microsoft safeguards customer data with strong contractual commitments.

Page 17: FY17 MTC E5 Briefings Security

Transparency

Know where your data is stored.

Understand who has access your data and under what circumstances.

Monitor the state of your service, get historic view of uptime.

Integrate security events’ feeds into your company security dashboard.

Gain insight with access to service dashboards & operational reporting.

Page 18: FY17 MTC E5 Briefings Security

Security

Built-in operational security

Safeguards to prevent unauthorized access and data loss

Detect and protect against external threats

Page 19: FY17 MTC E5 Briefings Security

Operational security

Physical security with 24-hour monitoring and multi-factor authentication

Admin background checks

Zero-standing access to data

Data encryption at-rest and in-transit

Red team / Blue team penetration testing and incident response practice

Product development using Security Development Lifecycle

Bug bounty program to identify vulnerabilities

Page 20: FY17 MTC E5 Briefings Security

Safeguarding your data

Identify, label, classify, set policies to help protect information.

Encrypt your data and restrict access using Azure Information Protection.

Safeguard information with Data Loss Prevention.

Restrict unauthorized data sharing across apps with Mobile Application Management.

Prevent data leaks with support for Windows Information Protection.

Manage data on devices through built-in MDM.

Securely communicate with customers using Message Encryption.

Personal apps

Managed apps

Page 21: FY17 MTC E5 Briefings Security

Detect and protect against external threats

Block 100% of known malware and 99% of spam with Exchange Online Protection.

Provide zero-day protection against unknown malware in attachments and links with Advanced Threat Protection.

Share & integrate data across security services with Threat Intelligence.

Get alerts of suspicious behavior using Advanced Security Management.

Secure user accounts with Conditional Access and multi-factor authentication.

Page 22: FY17 MTC E5 Briefings Security

Compliance

Meet compliance obligations for data access with Customer Lockbox.

Monitor and investigate events related to your data with full audit tracking.

Reduced cost and risk with in-place intelligent Advanced eDiscovery.

Efficiently perform risk assessment with Service Assurance.

Manage data retention with Advanced Data Governance.

Page 23: FY17 MTC E5 Briefings Security

Next steps and resources

Security Blogs on Office Blogs

Compliance Blogs on Office Blogs

Take a guided tour of Office 365

FastTrack for Office 365

Office 365 E5 Trial

Office 365 Trust Center

Microsoft Trust Center

Microsoft Secure

Office 365 Roadmap

Page 24: FY17 MTC E5 Briefings Security

© 2015 Microsoft Corporation. All rights reserved.

24

Page 25: FY17 MTC E5 Briefings Security

Time-of-click protection against malicious URLs

URL reputation checks along with detonation of

attachments at destination URLs.

Zero-day protection against malicious attachments

Attachments with unknown virus signatures are

assessed using behavioral analysis.

Critical insights into external threats

Rich reporting and tracking features provide critical

insights into the targets and categories of attacks.

Integrated across apps & services

Protection across Exchange Online, SharePoint

Online, OneDrive for Business, and Office apps.

Intelligence sharing with devices

Integration with Windows Advanced Threat

Protection to correlate data across users and devices.

Advanced Threat Protection

Page 26: FY17 MTC E5 Briefings Security

Advanced Security Management

Threat detection

Identify high-risk and abnormal usage, security

incidents, and threats.

Enhanced control

Shape your Office 365 environment with granular

security controls and policies.

Discovery and insights

Gain enhanced visibility and context into your

Office 365 usage and shadow IT.

Page 27: FY17 MTC E5 Briefings Security

Customer Lockbox

Meet Compliance Needs

Customer Lockbox can help customers meet

compliance obligations by demonstrating that they

have procedures in place for explicit data access

authorization.

Extended access Control

Use Customer Lockbox to control access to

customer content for service operations.

Visibility into actions Actions taken by Microsoft engineers in response to Customer Lockbox requests are logged and accessible via the Management Activity API and the Security and Compliance Center.

Page 28: FY17 MTC E5 Briefings Security

Advanced eDiscovery

Identify relevant documents

Predictive coding enables you to train the system

to automatically distinguish between likely relevant

and non-relevant documents.

Identify data relationships

Use clustering technology to look at documents in

context and identify relationships between them.

Organize and reduce the data prior to review

Use near duplicate detection to organize the data

and reconstruct email threads from unstructured

data to reduce what’s sent to review.

Page 29: FY17 MTC E5 Briefings Security

Threat Intelligence

Broad visibility into attack trends

Billions of data points from Office, Windows, and

Azure

Integrated data from external cyber threat hunters

Proactive security policy management

Intuitive dashboards with drill-down capabilities

Page 30: FY17 MTC E5 Briefings Security

Advanced Data Governance

Leverage intelligence to automate data retention

Classify data based on age, type, user, or sensitivity

Policy recommendations based on machine

learning

Apply actions to preserve high value data

Purge redundant, obsolete, and trivial data