Ms o365 privacy in the public cloud - 12-12-11 final standard
O365 security and privacy de_novo_event_july2014
Click here to load reader
-
Upload
alexey-vlasenko -
Category
Software
-
view
85 -
download
2
description
Transcript of O365 security and privacy de_novo_event_july2014
![Page 1: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/1.jpg)
![Page 2: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/2.jpg)
- Forbes, 2013
Is cloud computing secure?
Where is my data and do I have access?security
What does privacy mean?
Is my data used for advertising? privacy
How do you support
my compliance needs? compliance
![Page 3: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/3.jpg)
Security Best-in-class security with over a decade of experience building Enterprise software & Online
services
• Physical and data security with access control, encryption and strong authentication
• Security best practices like penetration testing, Defense-in-depth to protect against cyber-threats
• Unique customer controls with Rights Management Services to empower customers to protect information
Compliance Commitment to industry standards and organizational compliance
• Enable customers to meet global compliance standards in ISO 27001, EUMC, HIPAA, FISMA
• Contractually commit to privacy, security and handling of customer data through Data Processing Agreements
• Admin Controls like Data Loss Prevention, Legal Hold, E-Discovery to enable organizational compliance
Privacy Privacy by design with complete separation of Enterprise and Consumer services
• No mining of data for advertising
• Transparency with the location of customer data, who has access and under what circumstances
• Customer have greater control over privacy to enable or regulate sharing based on organizational needs
![Page 4: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/4.jpg)
Security best practices like penetration testing,
Defense-in-depth to protect against cyber-
threats
Built in Capabilities Flexible Customer Controls
• Physical and data security with access control,
encryption and strong authentication
• Unique customer controls with Rights
Management Services to empower customers
to protect information
![Page 5: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/5.jpg)
Network perimeter
Internal network
Host
Application
Data
User
Facility
Threat and vulnerability management, monitoring, and response
Edge routers, intrusion detection, vulnerability scanning
Dual-factor authentication, intrusion detection, vulnerability scanning
Access control and monitoring, anti-malware, patch and configuration management
Secure engineering (SDL), access control and monitoring, anti-malware
Access control and monitoring, file/data integrity
Account management, training and awareness, screening
Physical controls, video surveillance, access control
![Page 6: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/6.jpg)
Office 365 is built with a focus on privacy and
security that allows us to obtain important
industry certifications and enables customers to
meet international laws and regulations
3rd party certification and audits.
Built in CapabilitiesCustomer controls for
compliance
• Data Loss Prevention (DLP)
• Archiving and Legal Hold
• E-Discovery
![Page 7: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/7.jpg)
Microsoft Certification StatusCERT MARKET REGION
Queued or
In Progress
Relevant Certification by Region
![Page 8: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/8.jpg)
No Advertising Transparency
• No advertising products out of
Customer Data
• No scanning of email or
documents to build analytics or
mine data
Privacy controls
• Access to information about
geographical location of data,
who has access and when
• Notification to customers about
changes in security, privacy and
audit information
• Various customer controls at
admin and user level to enable
or regulate sharing
• If the customer decides to
leave the service, they get to
take to take their data and
delete it in the service
![Page 9: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/9.jpg)
Your Privacy Matters
Leadership in Transparency
Relentless on Security
Independently Verified
Service Continuity
We respect your privacy
You know ‘where’ data resides, ‘who’ can access it and ‘what’ we do with it
Excellence in cutting edge security practices
Compliance with Industry standards verified by 3rd parties
We financially back our guarantee of 99.9% uptime.
![Page 10: O365 security and privacy de_novo_event_july2014](https://reader038.fdocuments.net/reader038/viewer/2022100605/559ac4df1a28abdd138b4582/html5/thumbnails/10.jpg)