SlideShare a Scribd company logo
1 of 25
Microsoft Azure Security, Privacy, &
Compliance
PJ Zargarzadeh, Microsoft
Microsoft Azure
$25,000
in the cloud would cost
$100,000 on premises
Economics
Scale
30,000to
250,000
Scale from
site visitors instantly
2 weeks
to deliver new services
vs. 6-12 months with
traditional solution
Agility
Technology trends: driving cloud adoption
of CIOs will embrace a
cloud-first strategy in 2016
(IDC CIO Agenda webinar)
Cloud Trend:
70%
Drivers
ORGANIZATIONS ARE EAGER TO REALIZE CLOUD BENEFITS
Microsoft Azure
Compliance
Privacy
Security
Before cloud migration concerns
Security as the main barrier
for moving to the cloud
(Microsoft comScore Survey)
Cloud Trend:
60%
Concerns
Cloud would result in lack of
data control
(Microsoft comScore Survey)
Cloud Trend:
40%
Microsoft Azure
Compliance
Privacy
Security
After cloud migration…
Experienced security
benefits they didn’t
previously have on-prem
(Microsoft comScore survey)
Cloud Trend:
94%
Concerns
Experienced increased
privacy and data protection
as the result of moving to
the cloud
Cloud Trend:
62%
Microsoft Azure
100+ Data
Centers
Trustworthy
Computing
Initiative
Security
Development
Lifecycle
Global
Data Center
Services
Malware
Protection
Center
Microsoft Security
Response Center
Windows
Update
1st
Microsoft
Data
Center
Active
Directory
SOC 1
CSA Cloud
Controls Matrix
PCI DSS
Level 1
FedRAMP/
FISMA
UK G-Cloud
Level 2
ISO/IEC
27001:2005
HIPAA/
HITECH
Digital
Crimes
Unit
SOC 2
E.U. Data
Protection
Directive
Operations
Security
Assurance
Assume
Breach
Microsoft
Azure
Microsoft Azure
Shared responsibility
Your organization Microsoft
On-Premises IaaS PaaS SaaS
Pick your services…
Microsoft Azure
Microsoft approach in action
9
Microsoft Azure 1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
Restricted
data access
& use
Contractual
commitments
Control over
data location
Privacy by design
Microsoft Confidential
Control over data location
One of the top 3 networks in the world (coverage, speed, connections)
2 x AWS and 5x Google DC Footprint
Operational
Announced
CentralUS
Iowa
WestUS
California
NorthEurope
Ireland
EastUS
Virginia
EastUS2
Virginia
USGov
Virginia
NorthCentralUS
Illinois
USGov
Iowa
SouthCentralUS
T
exas
BrazilSouth
SaoPaulo
WestEurope
Netherlands
ChinaNorth
Beijing
ChinaSouth
Shanghai
JapanEast
Saitama
JapanWest
Osaka
IndiaWest
TBD
IndiaEat
TBD
EastAsia
HongKong
SEAsia
Singapore
Australia West
Melbourne
Australia East
Sydney
Microsoft Azure 12
Government access
No Back Doors
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
We don’t provide any
government with direct
or unfettered access to
your data
Microsoft Azure 13
Government access
No Back Doors
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
We don’t assist government
efforts to break our
encryption or provide any
government with
encryption keys used to
protect data in transit, or
stored on our servers
Microsoft Azure 14
Government access
No Back Doors
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
We don’t engineer back
doors into our products
and we take steps to
ensure 3rd parties can
independently verify this.
Microsoft Azure 15
Government access
No Back Doors
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
If, as press reports suggest,
governments are engaging
in broader surveillance of
communications, it is being
done without the
knowledge or involvement
of Microsoft
Microsoft Azure 16
Legal requests for your data
No Back Doors
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
We will redirect third
party request to the
customer
Microsoft Azure 17
Legal requests for your data
No Back Doors
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
We will promptly notify the
customer, unless legally
prohibited from doing so,
and if prohibited, will
challenge the request in
court
Microsoft Azure 18
Legal requests for your data
No Back Doors
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
We will fight legal
demands for customer
data stored in another
country
Microsoft Azure 19
Transparency
Enhanced Security
1010101010101010101010101010101010101010101010101010
10101010101010101010101010101010
We will fight legal
demands for customer
data stored in another
country
http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/
Microsoft Azure 20
Recognized for its commitments
https://www.eff.org/who-has-your-back-government-data-requests-2014
ISO/IEC 27001 SOC 1 SOC 2 PCI DSS L1 version 3 Cloud Security Alliance
Cloud Security Matrix
HIPAA
(Healthcare)
FedRAMP FIPS 140-2 Life Sciences GxP Family Educational
Rights & Privacy Act
European Union
Model Clause
China
Multi Layer Protection
Scheme
United Kingdom
G-Cloud
Singapore
Multi-Tier Cloud
Security
China
CCCPPF
Australian Signals
Directorate I-RAP
Assessment
Criminal Justice
Information System
Defense Information
Systems Agency L2
Sarbanes Oxley ITAR Defense Information
Systems Agency L3-5
ISO / IEC 27018
Simplified compliance
Microsoft Azure 22
Security
Network
Protection
Data
Protection
Infrastructure
protection
• 24-hour monitored
physical security
• Firewalls
• Patch management
• System monitoring
and logging
• Antivirus protection
• Threat detection
• Network Security
Group
• Virtual Networks
• Site-to-site VPN
• ExpressRoute
• Data in transit
• Data at rest
• Data segregation
Microsoft Azure
Trusted by leading Canadian companies
Microsoft Azure
 Microsoft Azure Trust Center
 Azure security, privacy and compliance
Whitepaper
 Azure security infographic poster
Microsoft Azure

More Related Content

Similar to Azure-cloud-presentation-Security-Privacy-EDM.pptx

Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Clouditalia Telecomunicazioni
 

Similar to Azure-cloud-presentation-Security-Privacy-EDM.pptx (20)

Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Welcome to Love Cloud London | 27th February 2018
Welcome to Love Cloud London | 27th February 2018Welcome to Love Cloud London | 27th February 2018
Welcome to Love Cloud London | 27th February 2018
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
State of the cloud, Now and Next.pptx
State of the cloud, Now and Next.pptxState of the cloud, Now and Next.pptx
State of the cloud, Now and Next.pptx
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
IoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrIoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark Torr
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching EngineCryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching Engine
 
Den digitale kunderejse
Den digitale kunderejse Den digitale kunderejse
Den digitale kunderejse
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
cloudThing GDPR Information Guide - Scott Jenkins
cloudThing GDPR Information Guide - Scott JenkinscloudThing GDPR Information Guide - Scott Jenkins
cloudThing GDPR Information Guide - Scott Jenkins
 
Module 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptxModule 1 - Evolution to Secure DevOps.pptx
Module 1 - Evolution to Secure DevOps.pptx
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 

Azure-cloud-presentation-Security-Privacy-EDM.pptx

  • 1.
  • 2. Microsoft Azure Security, Privacy, & Compliance PJ Zargarzadeh, Microsoft
  • 3. Microsoft Azure $25,000 in the cloud would cost $100,000 on premises Economics Scale 30,000to 250,000 Scale from site visitors instantly 2 weeks to deliver new services vs. 6-12 months with traditional solution Agility Technology trends: driving cloud adoption of CIOs will embrace a cloud-first strategy in 2016 (IDC CIO Agenda webinar) Cloud Trend: 70% Drivers ORGANIZATIONS ARE EAGER TO REALIZE CLOUD BENEFITS
  • 4. Microsoft Azure Compliance Privacy Security Before cloud migration concerns Security as the main barrier for moving to the cloud (Microsoft comScore Survey) Cloud Trend: 60% Concerns Cloud would result in lack of data control (Microsoft comScore Survey) Cloud Trend: 40%
  • 5. Microsoft Azure Compliance Privacy Security After cloud migration… Experienced security benefits they didn’t previously have on-prem (Microsoft comScore survey) Cloud Trend: 94% Concerns Experienced increased privacy and data protection as the result of moving to the cloud Cloud Trend: 62%
  • 6. Microsoft Azure 100+ Data Centers Trustworthy Computing Initiative Security Development Lifecycle Global Data Center Services Malware Protection Center Microsoft Security Response Center Windows Update 1st Microsoft Data Center Active Directory SOC 1 CSA Cloud Controls Matrix PCI DSS Level 1 FedRAMP/ FISMA UK G-Cloud Level 2 ISO/IEC 27001:2005 HIPAA/ HITECH Digital Crimes Unit SOC 2 E.U. Data Protection Directive Operations Security Assurance Assume Breach Microsoft Azure
  • 7. Microsoft Azure Shared responsibility Your organization Microsoft On-Premises IaaS PaaS SaaS
  • 10. Microsoft Azure 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 Restricted data access & use Contractual commitments Control over data location Privacy by design
  • 11. Microsoft Confidential Control over data location One of the top 3 networks in the world (coverage, speed, connections) 2 x AWS and 5x Google DC Footprint Operational Announced CentralUS Iowa WestUS California NorthEurope Ireland EastUS Virginia EastUS2 Virginia USGov Virginia NorthCentralUS Illinois USGov Iowa SouthCentralUS T exas BrazilSouth SaoPaulo WestEurope Netherlands ChinaNorth Beijing ChinaSouth Shanghai JapanEast Saitama JapanWest Osaka IndiaWest TBD IndiaEat TBD EastAsia HongKong SEAsia Singapore Australia West Melbourne Australia East Sydney
  • 12. Microsoft Azure 12 Government access No Back Doors Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 We don’t provide any government with direct or unfettered access to your data
  • 13. Microsoft Azure 13 Government access No Back Doors Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 We don’t assist government efforts to break our encryption or provide any government with encryption keys used to protect data in transit, or stored on our servers
  • 14. Microsoft Azure 14 Government access No Back Doors Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 We don’t engineer back doors into our products and we take steps to ensure 3rd parties can independently verify this.
  • 15. Microsoft Azure 15 Government access No Back Doors Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 If, as press reports suggest, governments are engaging in broader surveillance of communications, it is being done without the knowledge or involvement of Microsoft
  • 16. Microsoft Azure 16 Legal requests for your data No Back Doors Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 We will redirect third party request to the customer
  • 17. Microsoft Azure 17 Legal requests for your data No Back Doors Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 We will promptly notify the customer, unless legally prohibited from doing so, and if prohibited, will challenge the request in court
  • 18. Microsoft Azure 18 Legal requests for your data No Back Doors Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 We will fight legal demands for customer data stored in another country
  • 19. Microsoft Azure 19 Transparency Enhanced Security 1010101010101010101010101010101010101010101010101010 10101010101010101010101010101010 We will fight legal demands for customer data stored in another country http://www.microsoft.com/about/corporatecitizenship/en-us/reporting/transparency/
  • 20. Microsoft Azure 20 Recognized for its commitments https://www.eff.org/who-has-your-back-government-data-requests-2014
  • 21. ISO/IEC 27001 SOC 1 SOC 2 PCI DSS L1 version 3 Cloud Security Alliance Cloud Security Matrix HIPAA (Healthcare) FedRAMP FIPS 140-2 Life Sciences GxP Family Educational Rights & Privacy Act European Union Model Clause China Multi Layer Protection Scheme United Kingdom G-Cloud Singapore Multi-Tier Cloud Security China CCCPPF Australian Signals Directorate I-RAP Assessment Criminal Justice Information System Defense Information Systems Agency L2 Sarbanes Oxley ITAR Defense Information Systems Agency L3-5 ISO / IEC 27018 Simplified compliance
  • 22. Microsoft Azure 22 Security Network Protection Data Protection Infrastructure protection • 24-hour monitored physical security • Firewalls • Patch management • System monitoring and logging • Antivirus protection • Threat detection • Network Security Group • Virtual Networks • Site-to-site VPN • ExpressRoute • Data in transit • Data at rest • Data segregation
  • 23. Microsoft Azure Trusted by leading Canadian companies
  • 24. Microsoft Azure  Microsoft Azure Trust Center  Azure security, privacy and compliance Whitepaper  Azure security infographic poster