SlideShare a Scribd company logo
1 of 48
M365 GURGAON
@M365Gurgaon
ManagePersonaland
confidentialdatainM365
Sébastien Paulet, Microsoft MVP, Aerow CTO
@SP_twit sebpaulet
Brought to you by
#M365Gurgaon
Powered by Microsoft 365 and Power Platform India User Group
M365 GURGAON
Disclaimer
- Check all information relatated to regulation with your local legal
council
- Microsoft license information are my understanding and may evolve.
Always check with your Microsoft licensing contact.
Powered by Microsoft 365 and Power Platform India User Group
Source IBM and Ponemon Institute's annual
"Cost of a Data Breach" report
“Companies that had security automation
technologies deployed experienced around half
the cost of a breach”
Data breach cost
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Increasing security attacks
Ransomware attacks in India increased 200%
quarter-on-quarter in April-June with 4 lakh
new cases detected during the period
Between the hammer and the anvil
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Increasing data regulation (ex : GDPR)
British Airways –$242 million
Over 330 fines for GDPR between January and August 2020
The total amount of fines issued in 2020 exceeds $181 million
SENSITIVE AND PERSONAL DATA
2018; 2019 – PDPB Personal Data Protection Bill
Applies to all Indian citizen / companies
Gov can access data
Fine: Failing to notify breach : Rs 5 crore / 2% global turnover
Unlawful data transfers : Rs 15 crore / 4% global turnover
+ criminal penalties
2018 – GDPR General Data Protection Regulation
Applies to all european citizen personal data
Restriction on data location
Fine: 20M€/4% consolidated worldwide revenue
2020 - CCPA California Consumer Privacy Act
Personnal data of californian residents
750$ / californian resident impacted + 7,5K$/violation
Sensitive data breach cost
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
“means data about or relating to a natural person who is directly or indirectly identifiable, having
regard to any characteristic, trait, attribute or any other feature of the identity of such natural person,
whether online or offline, or any combination of such features with any other information, and shall
include any inference drawn from such data for the purpose of profiling […]“ - PDPB
Samples (according GDPR) :
Name
ID / UID
Email
Location
Banking/financial data
IP address
Political, religious, caste, ethnical data, sexual orientation
Physical, medical, genetical data
Personnal data
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
CLOUD - MICROSOFT AS DATA SUBCONTRACTOR
Responsability
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Content sources in O365
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
SHAREPOINT
Teams
OneDrive
Yammer
Office 365 Groups
Planner
EXCHANGE
COMPANIES OBLIGATIONS
a) Prohibition of processing of personal data.
b) Limitation on purpose of processing of personal data.
c) Limitation on collection of personal data.
d) Requirement of notice for collection or processing of personal
data.
e) Quality of personal data processed.
f) Restriction on retention of personal data.
g) Accountability of data fiduciary.
h) Consent necessary for processing of personal data
Obligations (according to PDPB)
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING
OF PERSONAL DATA.
CONSENT NECESSARY FOR PROCESSING OF PERSONAL DATA
(1) The personal data shall not be processed, except on the consent given by the data
principal at the commencement of its processing.
(2) The consent of the data principal shall not be valid, unless such consent is—
(a) free, having regard to whether it complies with the standard specified
undersection 14 of the Indian Contract Act, 1872;
(b) informed, having regard to whether the data principal has been
provided with the information required under section 7;
(c) specific, having regard to whether the data principal can determine the scope
of consent in respect of the purpose of processing;
(d) clear, having regard to whether it is indicated through an affirmative action
that is meaningful in a given context; and
(e) capable of being withdrawn, having regard to whether the ease of such
withdrawal is comparable to the ease with which consent may be given
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Disclaimer on first login
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Azure AD P1 required
Disclaimer on first login (how to)
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Azure AD P1 required
QUALITY OF PERSONAL DATA PROCESSED.
(1) The data fiduciary shall take necessary steps to ensure that the personal data
processed is complete, accurate, not misleading and updated, having regard to the
purpose for which it is processed.
(2) While taking any steps under sub-section (1), the data fiduciary shall have regard to
whether the personal data—
(a) is likely to be used to make a decision about the data principal;
(b) is likely to be disclosed to other individuals or entities including other data
fiduciaries or processors; or
(c) is kept in a form that distinguishes personal data based on facts from personal data
based on opinions or personal assessments.
(3) Where personal data is disclosed to any other individual or entity, including other data
fiduciary or processor, and the data fiduciary finds that such data does not comply with
the requirement of sub-section (1), the data fiduciary shall take reasonable steps to
notify such individual or entity of this fact.
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Define global sensitivity levels at tenant scale
End user can manually tag content as sensitive
Available in Outlook, SharePoint, Teams, OWA and M365 Apps for Business
Sensitivity Labels
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Information Protection
O365 (O365 E3) required
Encrypt files
-> no way to read it for unallowed / non
authenticated users
Restricted permissions
-> can block copy/paste, print, screenshot, email
forward, and so on
Watermarking
-> beware limitations
Disable USB key copy / attached file in non O365
services
-> WIP (Windows Information Protection) and
Intune required
Sensitivity Labels - Actions
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Information Protection
O365 (O365 E3) required
WIP and Intune required
(EMS E3) required
Permissions are bound to the file
• Public/private key system
Files encrypted by RSA 2048 bits, and
signed with SHA-256
• Read https://docs.microsoft.com/en-
us/information-protection/understand-
explore/how-does-it-work
Based on RMS – Right Management System
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go to « Compliance » section
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center, go to « Solutions »
> « Information Protection »
In labels page, go to « Labels » > « Create a label »
Sensitivity Labels – How to create
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go to « Compliance » section
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center, go to « Solutions »
> « Information Protection »
In labels page, go to « Labels Policies» > « Publish label »
Sensitivity Labels – How to publish
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
1- Can be done while end user types (set up at label
creation)
2- Or when uploading content (based on keyword or
RegEx):
As tenant global admin, go to « Compliance » section
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center, go to « Solutions »
> « Information Protection »
In labels page, go to « Automatically apply »
> « Create application policy »
Sensitivity Labels – Automatically apply
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Rules based classification
O365 (O365 E5) required
Or based on Machine Learning (preview)
Use existing trained criterias or create your own
(50 to 500 contents to learn, up to 10,000 to test).
As tenant global admin, go to « Compliance » portal
(https://compliance.microsoft.com/ )
> « Data classification»
Sensitivity Labels – Automatically apply
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
ML based classification O365
(M365 E5 Compliance) required
ACCOUNTABILITY OF DATA FIDUCIARY.
(1) The data fiduciary shall be responsible for complying with the provisions of this Act in
respect of any processing undertaken by it or on its behalf
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
If you don’t have have EMS / AAD Premium, at least, enable MFA on admin and users
accounts
(1) Something you know (typically a password)
(2) Something you have (a trusted device that is not easily duplicated, like a phone)
(3) Something you are (biometrics)
MFA
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Enable audit logs in Office 365 (in Compliance center) and Azure AD
Audit logs are kept 90 days max (up to 365 days for “O365 E5” users)
As tenant global admin, go to « Compliance » portal
(https://compliance.microsoft.com/ ) > « Display all »
In compliance center,
go to « Solutions »
> « Audit »
Audit logs
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Enterprise Mobility + Security
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Enterprise Mobility + Security
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
• Azure Active Directory Premium
• Azure MFA
• Azure Advanced Protection
• Microsoft Cloud App Security
• Azure Information Protection Premium
• Azure Right Management Premium
• Intune
RESTRICTION ON RETENTION OF PERSONAL DATA.
(1) The data fiduciary shall not retain any personal data beyond the period necessary to
satisfy the purpose for which it is processed and shall delete the personal data at the
end of the processing.
(2) Notwithstanding anything contained in sub-section (1), the personal data may be
retained for a longer period if explicitly consented to by the data principal, or
necessary to comply with any obligation under any law for the time being in force.
(3) The data fiduciary shall undertake periodic review to determine whether it is
necessary to retain the personal data in its possession.
(4) Where it is not necessary for personal data to be retained by the data fiduciary under
sub-section (1) or sub-section (2), then, such personal data shall be deleted in such
manner as may be specified by regulations
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Retention labels
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
End user can manually apply one retention label per
file or email
A retention formula is attached to the retention label
ex : Last modification + 7Y
Retention labels can also be
set up by default per:
- Exchange folder
- SharePoint document library
Retention Policy (O365 E3)
required
Retention labels – How to create
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go « Compliance » portal
In compliance center, go to « Classification » > « Solutions » > Records Management
On RM page, go to « File Plan » > « Create a label »
Retention labels – How to publish
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
As tenant global admin, go « Compliance » portal
In compliance center, go to « Classification » > « Solutions » > Records Management
On RM page, go to « Label policies» > « Publish label »
REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING
OF PERSONAL DATA
(1) Every data fiduciary shall give to the data principal a notice, at the time of
collection of the personal data, or if the data is not collected from the data principal, as
soonas reasonably practicable, containing the following information, namely:—
(a) the purposes for which the personal data is to be processed;
(b) the nature and categories of personal data being collected;
(c) the identity and contact details of the data fiduciary and the contact details of
the data protection officer, if applicable;
(d) the right of the data principal to withdraw his consent, and the procedure for
such withdrawal, if the personal data is intended to be processed on the
basis of consent;
[…]
What are we talking about
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Search across all
Mailboxes
SharePoint
Teams
OneDrive
Based on
Content
Metadata
Labels
Export results as a .zip
DSR – Data Subject Request
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
DATA LOCATION
By default, all in a single region
ANNOUNCED : Yammer
and search indexs
also geo located.
ANNOUNCED : Availability zone
in Central India in 2021
Location
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Multi geo capability
(500 users min. 2$/users/month)
Tenant administration > Settings > Organization profile
Where is my data?
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
PS> Connect-MsolService
PS> (Get-MsolCompanyInformation).AuthorizedServiceInstances
https://docs.microsoft.com/en-us/microsoft-365/enterprise/o365-data-
locations?view=o365-worldwide#india
Where is my data?
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
https://www.microsoft.com/en-us/trust-center/compliance/
Various norms including Indian ones
• RBI (Banking)
• IRDAI (Insurance)
• MeitY (gov guidelines)
External audits
Can get audit documents
Norms compliance leader
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Patriot Act -> FBI, CIA, NSA, Army
SCA -> Justice
Can apply out of US territory
Microsoft challenged DoJ on extra SCA territoriality SCA
(Stored Communication Act) until USA Supreme Court
(cf. Cloud Act later)
Patriot Act / SCA
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
On US attorney request (ex: corruption,
business with country under US embargo)
Apply out of US territory
In case of executive agreement, opposition can
done under 14 days if :
Non USA citizen
AND goes against local law
Cloud Act
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
See O365 general conditions
“If compelled to disclose Customer Data or Personal
Data to law enforcement, Microsoft will promptly notify
Customer and provide a copy of the demand unless
legally prohibited from doing so.”
Law enforcement requests
@SP_twit #M365Gurgaon
M365 Gurgaon | 2020
Questions?
Microsoft 365 and Power
Platform India User Group

More Related Content

What's hot

Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionDavid J Rosenthal
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCloudLock
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockCloudLock
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Robert Crane
 
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Community
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityCloudLock
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantRobert Crane
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideBenedek Menesi
 
Protéger ses données, identités & appareils avec Windows 10
Protéger ses données, identités & appareils avec Windows 10Protéger ses données, identités & appareils avec Windows 10
Protéger ses données, identités & appareils avec Windows 10Microsoft Technet France
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonHistory of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonAdam Levithan
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)Priyanka Aash
 
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security AWS Chicago
 
TechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile ComputingTechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile ComputingAvtex
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)Robert Crane
 
January 2020 Microsoft 365 Need to Know Webinar
January 2020 Microsoft 365 Need to Know WebinarJanuary 2020 Microsoft 365 Need to Know Webinar
January 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
AzureThursday Mirabeau - Azure Information Protection
AzureThursday Mirabeau - Azure Information ProtectionAzureThursday Mirabeau - Azure Information Protection
AzureThursday Mirabeau - Azure Information ProtectionAlbert Hoitingh
 
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıWebinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıBGA Cyber Security
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Cristian Garcia G.
 

What's hot (20)

Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat ProtectionMicrosoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 
Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365Thr30117 - Securely logging to Microsoft 365
Thr30117 - Securely logging to Microsoft 365
 
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityStop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
How to get deeper administration insights into your tenant
How to get deeper administration insights into your tenantHow to get deeper administration insights into your tenant
How to get deeper administration insights into your tenant
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
Protéger ses données, identités & appareils avec Windows 10
Protéger ses données, identités & appareils avec Windows 10Protéger ses données, identités & appareils avec Windows 10
Protéger ses données, identités & appareils avec Windows 10
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
History of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit HoustonHistory of Content Security: Take 2 - ShareCloudSummit Houston
History of Content Security: Take 2 - ShareCloudSummit Houston
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
 
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
 
TechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile ComputingTechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile Computing
 
An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)An introduction to Office 365 Advanced Threat Protection (ATP)
An introduction to Office 365 Advanced Threat Protection (ATP)
 
January 2020 Microsoft 365 Need to Know Webinar
January 2020 Microsoft 365 Need to Know WebinarJanuary 2020 Microsoft 365 Need to Know Webinar
January 2020 Microsoft 365 Need to Know Webinar
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
AzureThursday Mirabeau - Azure Information Protection
AzureThursday Mirabeau - Azure Information ProtectionAzureThursday Mirabeau - Azure Information Protection
AzureThursday Mirabeau - Azure Information Protection
 
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım SenaryolarıWebinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
 

Similar to Manage sensitive data in M365 securely

SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandNCCOMMS
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
 
Support your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suiteSupport your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suiteSebastien Goiffon
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security OverviewRobert Crane
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesTestbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesTestbytes
 
How to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your applicationHow to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your applicationMicrosoft Tech Community
 
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft TeamsScottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft TeamsJasper Oosterveld
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Cosmos IoT – Scaleup Frugally - Techwave.pdf
Cosmos IoT – Scaleup Frugally - Techwave.pdfCosmos IoT – Scaleup Frugally - Techwave.pdf
Cosmos IoT – Scaleup Frugally - Techwave.pdfAnil
 

Similar to Manage sensitive data in M365 securely (20)

SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
Support your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suiteSupport your business objects GDPR project with 360suite
Support your business objects GDPR project with 360suite
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
How to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your applicationHow to incorporate data classification capabilities within your application
How to incorporate data classification capabilities within your application
 
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft TeamsScottish Summit 2022 - Secure and manage your data in Microsoft Teams
Scottish Summit 2022 - Secure and manage your data in Microsoft Teams
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
GDPR Compliance
GDPR ComplianceGDPR Compliance
GDPR Compliance
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Cosmos IoT – Scaleup Frugally - Techwave.pdf
Cosmos IoT – Scaleup Frugally - Techwave.pdfCosmos IoT – Scaleup Frugally - Techwave.pdf
Cosmos IoT – Scaleup Frugally - Techwave.pdf
 

More from Sébastien Paulet

aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...Sébastien Paulet
 
aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021Sébastien Paulet
 
Teams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsTeams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsSébastien Paulet
 
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Sébastien Paulet
 
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Sébastien Paulet
 
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020Sébastien Paulet
 
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesaOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesSébastien Paulet
 
aOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsaOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsSébastien Paulet
 
aOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsaOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsSébastien Paulet
 
aOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushaOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushSébastien Paulet
 
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesaOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesSébastien Paulet
 
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...Sébastien Paulet
 
Cyber security and microsoft 365 in action
Cyber security and microsoft 365 in actionCyber security and microsoft 365 in action
Cyber security and microsoft 365 in actionSébastien Paulet
 
All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020Sébastien Paulet
 
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Sébastien Paulet
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Sébastien Paulet
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...Sébastien Paulet
 
Back from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexBack from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexSébastien Paulet
 
MWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionMWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionSébastien Paulet
 
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365Sébastien Paulet
 

More from Sébastien Paulet (20)

aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
 
aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021
 
Teams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsTeams Nation - Syntex dans Teams
Teams Nation - Syntex dans Teams
 
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
 
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
 
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesaOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
 
aOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsaOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teams
 
aOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsaOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teams
 
aOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushaOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rush
 
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesaOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
 
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
 
Cyber security and microsoft 365 in action
Cyber security and microsoft 365 in actionCyber security and microsoft 365 in action
Cyber security and microsoft 365 in action
 
All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020
 
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
 
Back from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexBack from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortex
 
MWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionMWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en action
 
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
aOS Kuala Lumpur 2019 Manage sensitive and personal data in O365
 

Recently uploaded

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxnada99848
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 

Recently uploaded (20)

Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
software engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptxsoftware engineering Chapter 5 System modeling.pptx
software engineering Chapter 5 System modeling.pptx
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 

Manage sensitive data in M365 securely

  • 1. M365 GURGAON @M365Gurgaon ManagePersonaland confidentialdatainM365 Sébastien Paulet, Microsoft MVP, Aerow CTO @SP_twit sebpaulet Brought to you by #M365Gurgaon Powered by Microsoft 365 and Power Platform India User Group
  • 2. M365 GURGAON Disclaimer - Check all information relatated to regulation with your local legal council - Microsoft license information are my understanding and may evolve. Always check with your Microsoft licensing contact. Powered by Microsoft 365 and Power Platform India User Group
  • 3. Source IBM and Ponemon Institute's annual "Cost of a Data Breach" report “Companies that had security automation technologies deployed experienced around half the cost of a breach” Data breach cost @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 4. Increasing security attacks Ransomware attacks in India increased 200% quarter-on-quarter in April-June with 4 lakh new cases detected during the period Between the hammer and the anvil @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Increasing data regulation (ex : GDPR) British Airways –$242 million Over 330 fines for GDPR between January and August 2020 The total amount of fines issued in 2020 exceeds $181 million
  • 6. 2018; 2019 – PDPB Personal Data Protection Bill Applies to all Indian citizen / companies Gov can access data Fine: Failing to notify breach : Rs 5 crore / 2% global turnover Unlawful data transfers : Rs 15 crore / 4% global turnover + criminal penalties 2018 – GDPR General Data Protection Regulation Applies to all european citizen personal data Restriction on data location Fine: 20M€/4% consolidated worldwide revenue 2020 - CCPA California Consumer Privacy Act Personnal data of californian residents 750$ / californian resident impacted + 7,5K$/violation Sensitive data breach cost @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 7. “means data about or relating to a natural person who is directly or indirectly identifiable, having regard to any characteristic, trait, attribute or any other feature of the identity of such natural person, whether online or offline, or any combination of such features with any other information, and shall include any inference drawn from such data for the purpose of profiling […]“ - PDPB Samples (according GDPR) : Name ID / UID Email Location Banking/financial data IP address Political, religious, caste, ethnical data, sexual orientation Physical, medical, genetical data Personnal data @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 8. CLOUD - MICROSOFT AS DATA SUBCONTRACTOR
  • 10. Content sources in O365 @SP_twit #M365Gurgaon M365 Gurgaon | 2020 SHAREPOINT Teams OneDrive Yammer Office 365 Groups Planner EXCHANGE
  • 12. a) Prohibition of processing of personal data. b) Limitation on purpose of processing of personal data. c) Limitation on collection of personal data. d) Requirement of notice for collection or processing of personal data. e) Quality of personal data processed. f) Restriction on retention of personal data. g) Accountability of data fiduciary. h) Consent necessary for processing of personal data Obligations (according to PDPB) @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 13. REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING OF PERSONAL DATA. CONSENT NECESSARY FOR PROCESSING OF PERSONAL DATA
  • 14. (1) The personal data shall not be processed, except on the consent given by the data principal at the commencement of its processing. (2) The consent of the data principal shall not be valid, unless such consent is— (a) free, having regard to whether it complies with the standard specified undersection 14 of the Indian Contract Act, 1872; (b) informed, having regard to whether the data principal has been provided with the information required under section 7; (c) specific, having regard to whether the data principal can determine the scope of consent in respect of the purpose of processing; (d) clear, having regard to whether it is indicated through an affirmative action that is meaningful in a given context; and (e) capable of being withdrawn, having regard to whether the ease of such withdrawal is comparable to the ease with which consent may be given What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 15. Disclaimer on first login @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Azure AD P1 required
  • 16. Disclaimer on first login (how to) @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Azure AD P1 required
  • 17. QUALITY OF PERSONAL DATA PROCESSED.
  • 18. (1) The data fiduciary shall take necessary steps to ensure that the personal data processed is complete, accurate, not misleading and updated, having regard to the purpose for which it is processed. (2) While taking any steps under sub-section (1), the data fiduciary shall have regard to whether the personal data— (a) is likely to be used to make a decision about the data principal; (b) is likely to be disclosed to other individuals or entities including other data fiduciaries or processors; or (c) is kept in a form that distinguishes personal data based on facts from personal data based on opinions or personal assessments. (3) Where personal data is disclosed to any other individual or entity, including other data fiduciary or processor, and the data fiduciary finds that such data does not comply with the requirement of sub-section (1), the data fiduciary shall take reasonable steps to notify such individual or entity of this fact. What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 19. Define global sensitivity levels at tenant scale End user can manually tag content as sensitive Available in Outlook, SharePoint, Teams, OWA and M365 Apps for Business Sensitivity Labels @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Information Protection O365 (O365 E3) required
  • 20. Encrypt files -> no way to read it for unallowed / non authenticated users Restricted permissions -> can block copy/paste, print, screenshot, email forward, and so on Watermarking -> beware limitations Disable USB key copy / attached file in non O365 services -> WIP (Windows Information Protection) and Intune required Sensitivity Labels - Actions @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Information Protection O365 (O365 E3) required WIP and Intune required (EMS E3) required
  • 21. Permissions are bound to the file • Public/private key system Files encrypted by RSA 2048 bits, and signed with SHA-256 • Read https://docs.microsoft.com/en- us/information-protection/understand- explore/how-does-it-work Based on RMS – Right Management System @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 22. As tenant global admin, go to « Compliance » section (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Information Protection » In labels page, go to « Labels » > « Create a label » Sensitivity Labels – How to create @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 23. As tenant global admin, go to « Compliance » section (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Information Protection » In labels page, go to « Labels Policies» > « Publish label » Sensitivity Labels – How to publish @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 24. 1- Can be done while end user types (set up at label creation) 2- Or when uploading content (based on keyword or RegEx): As tenant global admin, go to « Compliance » section (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Information Protection » In labels page, go to « Automatically apply » > « Create application policy » Sensitivity Labels – Automatically apply @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Rules based classification O365 (O365 E5) required
  • 25. Or based on Machine Learning (preview) Use existing trained criterias or create your own (50 to 500 contents to learn, up to 10,000 to test). As tenant global admin, go to « Compliance » portal (https://compliance.microsoft.com/ ) > « Data classification» Sensitivity Labels – Automatically apply @SP_twit #M365Gurgaon M365 Gurgaon | 2020 ML based classification O365 (M365 E5 Compliance) required
  • 27. (1) The data fiduciary shall be responsible for complying with the provisions of this Act in respect of any processing undertaken by it or on its behalf What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 28. If you don’t have have EMS / AAD Premium, at least, enable MFA on admin and users accounts (1) Something you know (typically a password) (2) Something you have (a trusted device that is not easily duplicated, like a phone) (3) Something you are (biometrics) MFA @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 29. Enable audit logs in Office 365 (in Compliance center) and Azure AD Audit logs are kept 90 days max (up to 365 days for “O365 E5” users) As tenant global admin, go to « Compliance » portal (https://compliance.microsoft.com/ ) > « Display all » In compliance center, go to « Solutions » > « Audit » Audit logs @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 30. Enterprise Mobility + Security @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 31. Enterprise Mobility + Security @SP_twit #M365Gurgaon M365 Gurgaon | 2020 • Azure Active Directory Premium • Azure MFA • Azure Advanced Protection • Microsoft Cloud App Security • Azure Information Protection Premium • Azure Right Management Premium • Intune
  • 32. RESTRICTION ON RETENTION OF PERSONAL DATA.
  • 33. (1) The data fiduciary shall not retain any personal data beyond the period necessary to satisfy the purpose for which it is processed and shall delete the personal data at the end of the processing. (2) Notwithstanding anything contained in sub-section (1), the personal data may be retained for a longer period if explicitly consented to by the data principal, or necessary to comply with any obligation under any law for the time being in force. (3) The data fiduciary shall undertake periodic review to determine whether it is necessary to retain the personal data in its possession. (4) Where it is not necessary for personal data to be retained by the data fiduciary under sub-section (1) or sub-section (2), then, such personal data shall be deleted in such manner as may be specified by regulations What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 34. Retention labels @SP_twit #M365Gurgaon M365 Gurgaon | 2020 End user can manually apply one retention label per file or email A retention formula is attached to the retention label ex : Last modification + 7Y Retention labels can also be set up by default per: - Exchange folder - SharePoint document library Retention Policy (O365 E3) required
  • 35. Retention labels – How to create @SP_twit #M365Gurgaon M365 Gurgaon | 2020 As tenant global admin, go « Compliance » portal In compliance center, go to « Classification » > « Solutions » > Records Management On RM page, go to « File Plan » > « Create a label »
  • 36. Retention labels – How to publish @SP_twit #M365Gurgaon M365 Gurgaon | 2020 As tenant global admin, go « Compliance » portal In compliance center, go to « Classification » > « Solutions » > Records Management On RM page, go to « Label policies» > « Publish label »
  • 37. REQUIREMENT OF NOTICE FOR COLLECTION OR PROCESSING OF PERSONAL DATA
  • 38. (1) Every data fiduciary shall give to the data principal a notice, at the time of collection of the personal data, or if the data is not collected from the data principal, as soonas reasonably practicable, containing the following information, namely:— (a) the purposes for which the personal data is to be processed; (b) the nature and categories of personal data being collected; (c) the identity and contact details of the data fiduciary and the contact details of the data protection officer, if applicable; (d) the right of the data principal to withdraw his consent, and the procedure for such withdrawal, if the personal data is intended to be processed on the basis of consent; […] What are we talking about @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 39. Search across all Mailboxes SharePoint Teams OneDrive Based on Content Metadata Labels Export results as a .zip DSR – Data Subject Request @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 41. By default, all in a single region ANNOUNCED : Yammer and search indexs also geo located. ANNOUNCED : Availability zone in Central India in 2021 Location @SP_twit #M365Gurgaon M365 Gurgaon | 2020 Multi geo capability (500 users min. 2$/users/month)
  • 42. Tenant administration > Settings > Organization profile Where is my data? @SP_twit #M365Gurgaon M365 Gurgaon | 2020 PS> Connect-MsolService PS> (Get-MsolCompanyInformation).AuthorizedServiceInstances
  • 44. https://www.microsoft.com/en-us/trust-center/compliance/ Various norms including Indian ones • RBI (Banking) • IRDAI (Insurance) • MeitY (gov guidelines) External audits Can get audit documents Norms compliance leader @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 45. Patriot Act -> FBI, CIA, NSA, Army SCA -> Justice Can apply out of US territory Microsoft challenged DoJ on extra SCA territoriality SCA (Stored Communication Act) until USA Supreme Court (cf. Cloud Act later) Patriot Act / SCA @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 46. On US attorney request (ex: corruption, business with country under US embargo) Apply out of US territory In case of executive agreement, opposition can done under 14 days if : Non USA citizen AND goes against local law Cloud Act @SP_twit #M365Gurgaon M365 Gurgaon | 2020 See O365 general conditions “If compelled to disclose Customer Data or Personal Data to law enforcement, Microsoft will promptly notify Customer and provide a copy of the demand unless legally prohibited from doing so.”
  • 47. Law enforcement requests @SP_twit #M365Gurgaon M365 Gurgaon | 2020
  • 48. Questions? Microsoft 365 and Power Platform India User Group

Editor's Notes

  1. https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91