SlideShare a Scribd company logo
1 of 17
11:26
Donnerstag, 21. April 2016
Microsoft Trusted Cloud
Security,Privacy&Control,Compliance, Transparency
DI. Harald Leitenmüller
Chief Technology Officer
Microsoft Österreich GmbH.
#ftAustria
Sind meine Daten sicher?
Gehören meine Daten mir?
Hab ich die Kontrolle?
Was bedeutet das Ende von
Safe Harbor?
“The court of justice declares that the
Commission’s US Safe Harbor Decision is invalid”
Press Release No 117/15
EU-US Privacy Shield
Private Cloud
Konsolidierte Daten
Operationen
MICROSOFT SOLUTIONS
Windows Server
System Center
Windows Azure Pack
Microsoft Cloud Portfolio - EUROPE
4
Konsistente Platformen und Anwendungen | Eine einzige Management Konsole
Public Cloud
“Europa”
Hohe Skalierung,
Flexibilität und
Kosteneffizienz
MICROSOFT SOLUTIONS
Microsoft Azure
Office 365
Dynamics CRM Online
Public Cloud
“Deutschland”
Hohe Skalierung,
Flexibilität und Deutsche
Datentreuhand
MICROSOFT SOLUTIONS
Microsoft Azure Deutschland
Office 365 Deutschland
Dynamics CRM Online Deutschland
Hybrid Cloud
Schritt in die Cloud
MICROSOFT SOLUTIONS
Risk Assessment and Data
Governance services
5
Unsere “Trust Principles”
New: https://trustportal.office.com
Readable customer data
disclosed to a third party
Customer data disclosed
to a third party
Accidental data spillage
1
1.1.1
1.1
Customer data is
readable
1.2
AND
Data disclosure due to
law enforcement /
intelligence request
1.1.2
Deliberate compromise
leading to disclosure of
customer data
1.1.3
Cloud service provider
(CSP) infrastructure
compromised
1.1.3.1
Customer infrastructure
compromised
1.1.3.2
Compromise of systems
outside cloud provider
or customer control
1.1.3.3
Customer data
permanently lost
2
Disruption of cloud service
3
Threat Tree 1 : Overview
Threat Tree 3
Threat Tree 2
Threat Tree 4 Threat Tree 5
Threat Tree 6
Threat Tree 7
Root Risk
Event
Conditions
Technical
Controls
Process
Controls
Legend:
Consumer
Applied
Control
Customer data is
readable
1.2
Data is not encrypted
1.2.1
Encryption keys become
known
1.2.2
Data is weakly encrypted
1.2.3
Encryption keys lost by
the cloud provider
1.2.2.1
Encryption keys lost by
the customer
1.2.2.2
Customer infrastructure
compromised
1.2.2.2.1
Breakdown in key
management enabling
attacker access to keys
1.2.2.2.2
AND
Link: 1.1.3.2
Threat Tree 5
Cloud provider
infrastructure
compromised
1.2.2.1.1
Breakdown in key
management enabling
attacker access to keys
1.2.2.2.2
AND
Link: 1.1.3.1
Threat Tree 4
Protected Key
Storage
Key
Management
Practices
Protected Key
Storage
Key
Management
Practices
Encryption at
Rest
Data
Classification
Encryption in
Transit
Cryptographic
standards
Policy on Use of
Cryptographic
Controls
Threat Tree 1.2 : Customer Data is Readable
Local Data
Encryption
Root Risk
Event
Conditions
Technical
Controls
Process
Controls
Legend:
Consumer
Applied
Control
8
Ihre Daten sind sicher Ihre Daten gehören Ihnen Sie haben die Kontrolle
 Encryption of all data at rest
 Encryption of all data in transit
 Enhanced event and admin /
service access logging
 Advanced security monitoring
and threat management
 Clear guidelines on data location
 Greater transparency and
simplicity of data use policies and
choices
 Data accessed only to improve
customer experience
 Law enforcement requests
redirected to the customer
 Notification of customers of
lawful requests for information;
challenging of gag orders
 Ability of customers to hold
encryption key and revoke
Microsoft copy
 Complete deletion of data on
customer request and on
contract termination
 Customer choice of data
location
 Customer option to limit
Microsoft access to data
Microsoft Trusted Cloud
Microsoft Cloud Verträge
MIOL
(Microsoft
Irland)
Kunde in
Österreich
Microsoft
Corporation
(USA)
European
Economic Area
(EEA)
EU Model Clauses*
Safe Harbor
Auftraggeber
Dienstleister
OST
(Online Services Terms)
EU-US Privacy Shield
Betroffene
* vorab genehmigungspflichtig
Article 29 WP Letter: http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2014/20140402_microsoft.pdf
EMEA Data Maps
http://o365datacentermap.azurewebsites.net/
Standardvertragsklausel für Online Dienste
Gibt es auch andere legale Möglichkeiten
personenbezogene Daten in die USA zu senden?
Quelle: http://www.dsb.gv.at/site/6218/default.aspx
Compliance
sorgfältige
MicrosoftCustomer
Zertifizierung & EU Standardvertragsklauseln
Yes
ISO 27018
Standard für digital Privatsphäre in der Cloud
6 Prinzipien für Cloud Service Provide
1. Keine Datenverwendung ohne
Zustimmung
2. Transparenz: Speicherort, Nutzung
3. Kunde behält Kontrolle über
Datennutzung
4. Information über Rückgabe und
Datenlöschprinzipien von Kundendaten
5. Breach Notification von
personenbezogenen Daten
6. Unabhängiger Audit
Weiterführende Links
Brad Smiths Blog
The collapse of the US-EU Safe Harbor
http://blogs.microsoft.com/on-the-issues/2015/10/20/the-collapse-of-the-us-eu-safe-harbor-solving-the-new-
privacy-rubiks-cube
A message to our customers
http://blogs.microsoft.com/on-the-issues/2015/10/06/a-message-to-our-customers-about-eu-us-safe-harbor/
EU Article 29 WP Letter
http://ec.europa.eu/justice/data-protection/article-29/documentation/other-
document/files/2014/20140402_microsoft.pdf
Stellungnahme der öst. Datenschutzbehörde
http://www.dsb.gv.at/site/6218/default.aspx
Online Service Terms
http://www.microsoftvolumelicensing.com/DocumentSearch.aspx?Mode=3&DocumentTypeId=31
Microsoft Cloud in Deutschland
http://aka.ms/MSCloudDE
Trust-Portal: https://trustportal.office.com
Trust-Center: https://www.microsoft.com/en-us/TrustCenter/default.aspx
Microsoft Cloud Assurance: http://www.microsoftcloudassurance.com/
http://www.guara.org/
Ihre Daten sind sicher!
Ihre Daten gehören Ihnen!
Sie haben die Kontrolle!

More Related Content

What's hot

M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...Patrick Guimonet
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterDavid J Rosenthal
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365Bitglass
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Seb Matthews
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowRichard Harbridge
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
M365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvM365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvAhmad Almarzouk
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Citrix
 

What's hot (20)

Ms webfourm nettskyen okt2010
Ms webfourm   nettskyen okt2010Ms webfourm   nettskyen okt2010
Ms webfourm nettskyen okt2010
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
The future of managed services
The future of managed servicesThe future of managed services
The future of managed services
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem Poster
 
MS CLOUD DECK
MS CLOUD DECKMS CLOUD DECK
MS CLOUD DECK
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Advantages of containerization
Advantages of containerizationAdvantages of containerization
Advantages of containerization
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
M365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvM365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nv
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
 

Viewers also liked

Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 
Microsoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic RecordingMicrosoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic RecordingMicrosoft Österreich
 
CIO Summit talk: EU GDPR
CIO Summit talk: EU GDPRCIO Summit talk: EU GDPR
CIO Summit talk: EU GDPRJohn Culkin
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementMarkit
 
Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)Palladium Hotel Group
 
Guia Alojamientos Calpe
Guia Alojamientos CalpeGuia Alojamientos Calpe
Guia Alojamientos CalpeTurismoCalp
 
Enero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpfEnero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpfJacinto Parga
 
Catalogue de formation : Lean Partners
Catalogue de formation : Lean PartnersCatalogue de formation : Lean Partners
Catalogue de formation : Lean PartnersSafa BOUDHRIOUA
 
Social Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de AbrilSocial Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de AbrilUniclickDigital
 
el aceite de argan que es
el aceite de argan que esel aceite de argan que es
el aceite de argan que esaceite de argan
 
Political Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeoplePolitical Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeopleJulian Ausserhofer
 
Presentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información GeográficaPresentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información GeográficaPablo Cabrera
 
Rfid factsheet es (1)
Rfid factsheet es (1)Rfid factsheet es (1)
Rfid factsheet es (1)RFIDPOINT
 

Viewers also liked (20)

Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Microsoft Lizenzierung – Server
Microsoft Lizenzierung – ServerMicrosoft Lizenzierung – Server
Microsoft Lizenzierung – Server
 
Microsoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic RecordingMicrosoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic Recording
 
CIO Summit talk: EU GDPR
CIO Summit talk: EU GDPRCIO Summit talk: EU GDPR
CIO Summit talk: EU GDPR
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk management
 
Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)
 
Guia Alojamientos Calpe
Guia Alojamientos CalpeGuia Alojamientos Calpe
Guia Alojamientos Calpe
 
Nota reteintercomunalearo
Nota reteintercomunalearoNota reteintercomunalearo
Nota reteintercomunalearo
 
Kava turismo
Kava turismoKava turismo
Kava turismo
 
Enero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpfEnero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpf
 
Medizinrecht2
Medizinrecht2Medizinrecht2
Medizinrecht2
 
45 hosta dinner
45 hosta dinner45 hosta dinner
45 hosta dinner
 
Catalogue de formation : Lean Partners
Catalogue de formation : Lean PartnersCatalogue de formation : Lean Partners
Catalogue de formation : Lean Partners
 
Social Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de AbrilSocial Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de Abril
 
el aceite de argan que es
el aceite de argan que esel aceite de argan que es
el aceite de argan que es
 
Calidad
CalidadCalidad
Calidad
 
Political Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeoplePolitical Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and People
 
Presentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información GeográficaPresentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información Geográfica
 
Rfid factsheet es (1)
Rfid factsheet es (1)Rfid factsheet es (1)
Rfid factsheet es (1)
 
Sdh
SdhSdh
Sdh
 

Similar to Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft)

CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted CloudMicrosoft
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Microsoft Österreich
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandNCCOMMS
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...Amazon Web Services
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudHostway|HOSTING
 
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudMartin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudContent Guru Benelux
 
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureBrad Brown
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
CRM privacy whitepaper final
CRM privacy whitepaper finalCRM privacy whitepaper final
CRM privacy whitepaper finalZero2Ten
 
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlinePrivacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlineNerea
 

Similar to Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft) (20)

CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted Cloud
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
GDPR
GDPRGDPR
GDPR
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 
Trustworthy Cloud
Trustworthy CloudTrustworthy Cloud
Trustworthy Cloud
 
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudMartin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
 
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
CRM privacy whitepaper final
CRM privacy whitepaper finalCRM privacy whitepaper final
CRM privacy whitepaper final
 
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlinePrivacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
 

More from Microsoft Österreich

Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 JahreDigitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 JahreMicrosoft Österreich
 
Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"Microsoft Österreich
 
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...Microsoft Österreich
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...Microsoft Österreich
 
Modernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedModernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedMicrosoft Österreich
 
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, TransparencyMicrosoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, TransparencyMicrosoft Österreich
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&TEnable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&TMicrosoft Österreich
 
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOneIMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOneMicrosoft Österreich
 
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics Microsoft Österreich
 
Der Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractiveDer Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractiveMicrosoft Österreich
 
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...Microsoft Österreich
 
Bring your data to life with Power BI
Bring your data to life with Power BIBring your data to life with Power BI
Bring your data to life with Power BIMicrosoft Österreich
 
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...Microsoft Österreich
 

More from Microsoft Österreich (20)

Shape the Future
Shape the FutureShape the Future
Shape the Future
 
Information Security @ AVL
Information Security @ AVLInformation Security @ AVL
Information Security @ AVL
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 JahreDigitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
 
Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"
 
Smart Buildings & IoT
Smart Buildings & IoTSmart Buildings & IoT
Smart Buildings & IoT
 
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
 
Modernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedModernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future Decoded
 
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, TransparencyMicrosoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&TEnable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
 
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOneIMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
 
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
 
New World of Work - Solvion
New World of Work - SolvionNew World of Work - Solvion
New World of Work - Solvion
 
Der Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractiveDer Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractive
 
Der neue Office 365 Plan E5
Der neue Office 365 Plan E5Der neue Office 365 Plan E5
Der neue Office 365 Plan E5
 
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
 
ACP Referenz Österreich Werbung
ACP Referenz Österreich WerbungACP Referenz Österreich Werbung
ACP Referenz Österreich Werbung
 
Bring your data to life with Power BI
Bring your data to life with Power BIBring your data to life with Power BI
Bring your data to life with Power BI
 
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
 

Recently uploaded

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 

Recently uploaded (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 

Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft)

  • 1. 11:26 Donnerstag, 21. April 2016 Microsoft Trusted Cloud Security,Privacy&Control,Compliance, Transparency DI. Harald Leitenmüller Chief Technology Officer Microsoft Österreich GmbH. #ftAustria
  • 2. Sind meine Daten sicher? Gehören meine Daten mir? Hab ich die Kontrolle? Was bedeutet das Ende von Safe Harbor?
  • 3. “The court of justice declares that the Commission’s US Safe Harbor Decision is invalid” Press Release No 117/15 EU-US Privacy Shield
  • 4. Private Cloud Konsolidierte Daten Operationen MICROSOFT SOLUTIONS Windows Server System Center Windows Azure Pack Microsoft Cloud Portfolio - EUROPE 4 Konsistente Platformen und Anwendungen | Eine einzige Management Konsole Public Cloud “Europa” Hohe Skalierung, Flexibilität und Kosteneffizienz MICROSOFT SOLUTIONS Microsoft Azure Office 365 Dynamics CRM Online Public Cloud “Deutschland” Hohe Skalierung, Flexibilität und Deutsche Datentreuhand MICROSOFT SOLUTIONS Microsoft Azure Deutschland Office 365 Deutschland Dynamics CRM Online Deutschland Hybrid Cloud Schritt in die Cloud MICROSOFT SOLUTIONS Risk Assessment and Data Governance services
  • 5. 5 Unsere “Trust Principles” New: https://trustportal.office.com
  • 6. Readable customer data disclosed to a third party Customer data disclosed to a third party Accidental data spillage 1 1.1.1 1.1 Customer data is readable 1.2 AND Data disclosure due to law enforcement / intelligence request 1.1.2 Deliberate compromise leading to disclosure of customer data 1.1.3 Cloud service provider (CSP) infrastructure compromised 1.1.3.1 Customer infrastructure compromised 1.1.3.2 Compromise of systems outside cloud provider or customer control 1.1.3.3 Customer data permanently lost 2 Disruption of cloud service 3 Threat Tree 1 : Overview Threat Tree 3 Threat Tree 2 Threat Tree 4 Threat Tree 5 Threat Tree 6 Threat Tree 7 Root Risk Event Conditions Technical Controls Process Controls Legend: Consumer Applied Control
  • 7. Customer data is readable 1.2 Data is not encrypted 1.2.1 Encryption keys become known 1.2.2 Data is weakly encrypted 1.2.3 Encryption keys lost by the cloud provider 1.2.2.1 Encryption keys lost by the customer 1.2.2.2 Customer infrastructure compromised 1.2.2.2.1 Breakdown in key management enabling attacker access to keys 1.2.2.2.2 AND Link: 1.1.3.2 Threat Tree 5 Cloud provider infrastructure compromised 1.2.2.1.1 Breakdown in key management enabling attacker access to keys 1.2.2.2.2 AND Link: 1.1.3.1 Threat Tree 4 Protected Key Storage Key Management Practices Protected Key Storage Key Management Practices Encryption at Rest Data Classification Encryption in Transit Cryptographic standards Policy on Use of Cryptographic Controls Threat Tree 1.2 : Customer Data is Readable Local Data Encryption Root Risk Event Conditions Technical Controls Process Controls Legend: Consumer Applied Control
  • 8. 8 Ihre Daten sind sicher Ihre Daten gehören Ihnen Sie haben die Kontrolle  Encryption of all data at rest  Encryption of all data in transit  Enhanced event and admin / service access logging  Advanced security monitoring and threat management  Clear guidelines on data location  Greater transparency and simplicity of data use policies and choices  Data accessed only to improve customer experience  Law enforcement requests redirected to the customer  Notification of customers of lawful requests for information; challenging of gag orders  Ability of customers to hold encryption key and revoke Microsoft copy  Complete deletion of data on customer request and on contract termination  Customer choice of data location  Customer option to limit Microsoft access to data Microsoft Trusted Cloud
  • 9. Microsoft Cloud Verträge MIOL (Microsoft Irland) Kunde in Österreich Microsoft Corporation (USA) European Economic Area (EEA) EU Model Clauses* Safe Harbor Auftraggeber Dienstleister OST (Online Services Terms) EU-US Privacy Shield Betroffene * vorab genehmigungspflichtig Article 29 WP Letter: http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2014/20140402_microsoft.pdf
  • 12. Gibt es auch andere legale Möglichkeiten personenbezogene Daten in die USA zu senden? Quelle: http://www.dsb.gv.at/site/6218/default.aspx
  • 14. Zertifizierung & EU Standardvertragsklauseln Yes
  • 15. ISO 27018 Standard für digital Privatsphäre in der Cloud 6 Prinzipien für Cloud Service Provide 1. Keine Datenverwendung ohne Zustimmung 2. Transparenz: Speicherort, Nutzung 3. Kunde behält Kontrolle über Datennutzung 4. Information über Rückgabe und Datenlöschprinzipien von Kundendaten 5. Breach Notification von personenbezogenen Daten 6. Unabhängiger Audit
  • 16. Weiterführende Links Brad Smiths Blog The collapse of the US-EU Safe Harbor http://blogs.microsoft.com/on-the-issues/2015/10/20/the-collapse-of-the-us-eu-safe-harbor-solving-the-new- privacy-rubiks-cube A message to our customers http://blogs.microsoft.com/on-the-issues/2015/10/06/a-message-to-our-customers-about-eu-us-safe-harbor/ EU Article 29 WP Letter http://ec.europa.eu/justice/data-protection/article-29/documentation/other- document/files/2014/20140402_microsoft.pdf Stellungnahme der öst. Datenschutzbehörde http://www.dsb.gv.at/site/6218/default.aspx Online Service Terms http://www.microsoftvolumelicensing.com/DocumentSearch.aspx?Mode=3&DocumentTypeId=31 Microsoft Cloud in Deutschland http://aka.ms/MSCloudDE Trust-Portal: https://trustportal.office.com Trust-Center: https://www.microsoft.com/en-us/TrustCenter/default.aspx Microsoft Cloud Assurance: http://www.microsoftcloudassurance.com/ http://www.guara.org/
  • 17. Ihre Daten sind sicher! Ihre Daten gehören Ihnen! Sie haben die Kontrolle!