SlideShare a Scribd company logo
Security Bootcamp 2012 -
 Microsoft SharePoint Most Valuable
 Professional (2011,2012)
 Author, Writer, Trainer & Public Speaker
 Founder & Editor in Chief of SharePointVN
 Publisher
 Focus on Microsoft Security & Federation
 Identity, Infrastructure, Methodologies and
 Architecture.
 Data Compliance
 Understand the new Dynamic Access Control
  capabilities built into Windows Server 2012
 Demonstration
 Compliance is generally a response to governmental regulation,
  but it can also be a response to industry or internal
  requirements.
    The U.S. Health Insurance Portability and Accountability Act
     (HIPPA) for health providers
    Sarbanes-Oxley Act (SOX)
    The European Union Data Protection Directive
    U.S. state data breach laws



  I’m not talking about in-depth Data
compliance and privacy.
 Can you make sure that only authorized individuals can access confidential
  data?
 Do you have granular control over auditing access?
 How to reduce the number of security groups your organization has?
 Deal with regulatory standard?
…. There are many questions come up when it comes to data access control.




                                          Content Owner
                      Infrastructure                             Information
    CSO/CIO
                         Support                                   Worker
   department                             ““Is my important
                                                 data
 “I need to have                             appropriately
                       “I don’t know                           “I don’t know if I
     the right                              protected and
                      what data is in                           am complying
    compliance                              compliant with
                      my repositories                               with my
 controls to keep                            regulations –
                        and how to                              organization’s
  me out of jail”                           how do I audit
                          control it”                               polices”
                                                 this”
Distributed                     Regulatory
Storage growth                Information                     compliance                     Data leakage

   45%: File based storage      Corporate information is       New and changing              246,091,423: Total
    CAGR.                         everywhere: Desktops,           regulations (SOX, HIPPA,       number of records
                                  Branch Offices, Data            GLBA…)                         containing sensitive
   MSIT cost $1.6
                                  Centers, Cloud…                                                personal information
    GB/Month for managed                                         International and local
                                                                                                 involved in security
    servers.                     MSIT 1500 file servers          regulations.
                                                                                                 breaches in the US since
                                  with 110 different groups
   >70%: of stored data is                                      More oversight and             January 2005
                                  managing them
    stale                                                         tighter enforcement.
                                                                                                $90 to $305 per record
                                 Very hard to consistently
   Cloud cost would be                                          $15M: Settlement for           (Forrester: in “Calculating
                                  manage the information.
    approximately 25 cents                                        investment bank with           the Cost of a Security
    GB/Month                                                      SEC over record                Breach”)
                                                                  retention.
Data                            Expression-based               Expression-based
Classification                  auditing                       access conditions                 Encryption

   Classify your documents        Targeted access auditing      Flexible access control          Automatic RMS
    using resource properties       based on document              lists based on document           encryption based on
    stored in Active                classification and user        classification and                document classification.
    Directory.                      identity.                      multiple identities
                                                                   (security groups).
   Automatically classify         Centralized deployment
    documents based on              of audit policies using       Centralized access
    document content.               Global Audit Policies.         control lists using Central
                                                                   Access Policies.
Data Classification
                                 File Classification Infrastructure provides insight into your data
Data                              by automating classification processes.
Classification                   File Classification Infrastructure uses classification rules to
                                  automatically scan files and classify them according to the
   Classify your documents       contents of the file.
    using resource properties    Some examples of classification rules include:
    stored in Active
    Directory.
                                    Classify any file that contains the string “SBC12
                                       Confidential” as having high business impact.
   Automatically classify
    documents based on              Classify any file that contains at least 10 social security
    document content.                  numbers as having personally identifiable information.
                                 Data Classification Toolkit
 A content classification rule that searches a set of files for the
Data                              string “SBC12 Confidential”. If the string is found in a file, the
Classification                    Impact resource property is set to High on the file.
                                 A content classification rule that searches a set of files for a
   Classify your documents       regular expression that matches a social security number at
    using resource properties     least 10 times in one file. If the pattern is found, the file is
    stored in Active
    Directory.
                                  classified as having personally identifiable information and the
                                  Personally Identifiable Information resource property is set to
   Automatically classify
    documents based on            High.
    document content.
Expression-based access condition
                                   Manage fewer security groups by using conditional expressions
Expression-based
access conditions
                                               Country x 30
   Flexible access control
    lists based on document
    classification and
    multiple identities
    (security groups).                         Department x 20
   Centralized access
    control lists using Central
    Access Policies.
                                               Sensitive/Confidential
                                               documents
What is Central Access Policy?
 You can think of Central Access Policies as a safety
  net that your organization applies across its servers to
  enhance the local access policy
Expression-based access rules
                    Active Directory                                             File
                    Domain Services                                              server

     User claims                       Device claims            Resource properties
 User.Department = Finance       Device.Department = Finance    Resource.Department = Finance
   User.Clearance = High           Device.Managed = True           Resource.Impact = High




                                       Access policy
                                Applies to: @File.Impact = High
Allow | Read, Write | if (@User.Department == @File.Department) AND (@Device.Managed ==
                                             True)
Central access policies
                     Active Directory
                     Domain Services              Corporate
High business                                    file servers
                     Organizational
impact policy        policies                                      Characteristics
                     • High business impact                        • Composed of central access rules
                     • Personally identifiable
Personally             information                                 • Applied to file servers through Group Policy
identifiable                                                         objects
information policy
                     Finance                                       • Supplement (not replace) native file and
                     department policies                             folder access control lists from New
                                                                     Technology File System (NTFS)
                     • High business impact
Finance policy       • Personally identifiable
                       information
                     • Finance
                                                 User folders




                                                 Finance folders
Central access policy workflow

Active Directory                                          Active Directory
Domain             Create claim definitions
                                                          Domain Services
                   Create file property definitions
Services           Create central access policy
                                                          Claim definitions                 User
                   Send central access policies to file
Group Policy       servers
                                                          File property definitions
                   Apply access policy to the
                                                                                                    Allow or
                   shared folder                                                                       deny
File Server        Identify information                   Audit policy

User’s
computer           User tries to access information
                                                                                      File server
Central access policy examples



Organization-wide   Specific data
authorization       management




Departmental
authorization       Need-to-know
Expression-based Auditing
Expression-based
                                Limit auditing to data that meets specific
auditing                         classification criteria.
   Targeted access auditing
                                Limit auditing by action and by identity
    based on document
    classification and user
                                Add contextual information into the audit
    identity.                    events.
   Centralized deployment
    of audit policies using
    Global Audit Policies.
Security auditing

Active Directory                                Active Directory
Domain                                          Domain Services
                   Create claim types
Services           Create resource properties
                                                Claim definitions                 User

Group Policy       Create global audit policy
                                                File property definitions
                   Select and apply resource
                                                                                          Allow or
                   properties to the shared                                                  deny
File Server        folders                      Audit policy

User’s             User tries to access
computer           information
                                                                            File server
Audit policy examples


Audit everyone who does not have a high        Audit all vendors when they try to access
security clearance and who tries to access a   documents related to projects that they are not
document that has a high impact on business    working on
Audit | Everyone | All-Access |                Audit | Everyone | All-Access |
Resource.BusinessImpact=HBI AND                User.EmploymentStatus=Vendor AND User.Project
User.SecurityClearance!=High                   Not_AnyOf Resource.Project.
Data Encryption Challenges
 How do I protect sensitive information after it leaves my
  protected environment?
 I cannot get the users to encrypt their sensitive data.
Classification-based encryption
process
                                                          Process to encrypt a file based on
                   1
                                                          classification
                           Active Directory                    Claim definitions, file property definitions, and
                           Domain Services                     access policies are established in Active Directory
                                                               Domain Controller.
                                                               A user creates a file with the word “confidential” in
  User
                                                               the text and saves it. The classification engine
                    4                                          classifies the file as high-impact according to rules
         2
                                                               configured.
                                                               On the file server, a rule automatically applies
                                                               RMS protection to any file classified as high-
                                         3                     impact.
                        Classification       RMS server
                           engine                              The RMS template and encryption are applied to
                                                               the file on the file server and the file is encrypted.

             File server
23
Demonstration Lab
 There are two virtual machines that are involved in the
  demonstration lab.
    AD-Srv (Active Directory Domain Controller)
    File-Srv (File Server)
 There are two security groups
    Finance
    System Integration
 There are two domain users:
    thuan@sbc12.local (Finance)
    thang@sbc12.local (System Integration)
Steps
 Create a new claim
    Department
 Create resources properties and add it to resource property list
    Finance Department
 Create a new central access rule/central policies
    Resource Finance Department Exists
    Resource Finance Department Equals Value Finance
 Publish central access policy
    Configure Group Policy and enable KDC
 Install File Server Resource Manager on File server
    Update-FSRMClassificationPropertyDefinition
 Add Central Access Policy to shared folder
 Validate
Thanks for joining with us

More Related Content

What's hot

Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
Zdravko Stoychev, CISM, CRISC
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
Vormetric Inc
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Ulf Mattsson
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
Sachin Yadav
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanation
indianadvisory
 
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
Gerardo Pardo-Castellote
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Ulf Mattsson
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
SaranSwathi1
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
Валерий Коржов
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET Journal
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
Technofutur TIC
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
CloudMask inc.
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
SafeNet
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
Ulf Mattsson
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
Ulf Mattsson
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
Primend
 

What's hot (20)

Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanation
 
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data ...
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012марко Safe net@rainbow-informzashita - februar 2012
марко Safe net@rainbow-informzashita - februar 2012
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
1784 1788
1784 17881784 1788
1784 1788
 

Viewers also liked

Integrate with ldap
Integrate with ldapIntegrate with ldap
Integrate with ldap
Son Nguyen
 
Strategies for Transitioning From SharePoint On-Prem to Office 365
Strategies for Transitioning From SharePoint On-Prem to Office 365Strategies for Transitioning From SharePoint On-Prem to Office 365
Strategies for Transitioning From SharePoint On-Prem to Office 365
Kanwal Khipple
 
Developer 2.0
Developer 2.0  Developer 2.0
Developer 2.0
XP Conference India
 
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Precisely
 
Marketing automation solutions webinar (part 2)
Marketing automation solutions webinar (part 2)Marketing automation solutions webinar (part 2)
Marketing automation solutions webinar (part 2)
Acquisio
 
Gentle introduction to Machine Learning
Gentle introduction to Machine LearningGentle introduction to Machine Learning
Gentle introduction to Machine Learning
Roman Orač
 
2016 the year of machine learning 12.16.2015
2016 the year of machine learning 12.16.20152016 the year of machine learning 12.16.2015
2016 the year of machine learning 12.16.2015
Acquisio
 
Introducing Ansible
Introducing AnsibleIntroducing Ansible
Introducing Ansible
Francesco Pantano
 
Placement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environmentPlacement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environment
Kim Clark
 
How to Triple Your Speed of Development Using Automation
How to Triple Your Speed of Development Using AutomationHow to Triple Your Speed of Development Using Automation
How to Triple Your Speed of Development Using Automation
AllCloud
 
Deloitte BPM case study by WorkflowGen
Deloitte BPM case study by WorkflowGenDeloitte BPM case study by WorkflowGen
Deloitte BPM case study by WorkflowGen
Alain Bezançon
 
AI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar DeckAI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar Deck
The Digital Insurer
 
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
Frank Altenburg
 
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
Thuan Ng
 
Practical Strategies to Designing Beautiful Portals
Practical Strategies to Designing Beautiful PortalsPractical Strategies to Designing Beautiful Portals
Practical Strategies to Designing Beautiful Portals
Kanwal Khipple
 
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
Manju Devadas
 
Practical Strategies for Transitioning to Office 365 #sptechcon
Practical Strategies for Transitioning to Office 365 #sptechconPractical Strategies for Transitioning to Office 365 #sptechcon
Practical Strategies for Transitioning to Office 365 #sptechcon
Kanwal Khipple
 
Operations Playbook: Monitoring and Automation - RightScale Compute 2013
Operations Playbook: Monitoring and Automation - RightScale Compute 2013Operations Playbook: Monitoring and Automation - RightScale Compute 2013
Operations Playbook: Monitoring and Automation - RightScale Compute 2013
RightScale
 
Case Study for Project Management System Using Sharepoint
Case Study for Project Management System Using SharepointCase Study for Project Management System Using Sharepoint
Case Study for Project Management System Using Sharepoint
Mike Taylor
 
Entrepreneurship with Data, Machine Learning and AI
Entrepreneurship with Data, Machine Learning and AIEntrepreneurship with Data, Machine Learning and AI
Entrepreneurship with Data, Machine Learning and AI
Jesus Ramos
 

Viewers also liked (20)

Integrate with ldap
Integrate with ldapIntegrate with ldap
Integrate with ldap
 
Strategies for Transitioning From SharePoint On-Prem to Office 365
Strategies for Transitioning From SharePoint On-Prem to Office 365Strategies for Transitioning From SharePoint On-Prem to Office 365
Strategies for Transitioning From SharePoint On-Prem to Office 365
 
Developer 2.0
Developer 2.0  Developer 2.0
Developer 2.0
 
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
Machine Learning for Your Enterprise: Operations and Security for Mainframe E...
 
Marketing automation solutions webinar (part 2)
Marketing automation solutions webinar (part 2)Marketing automation solutions webinar (part 2)
Marketing automation solutions webinar (part 2)
 
Gentle introduction to Machine Learning
Gentle introduction to Machine LearningGentle introduction to Machine Learning
Gentle introduction to Machine Learning
 
2016 the year of machine learning 12.16.2015
2016 the year of machine learning 12.16.20152016 the year of machine learning 12.16.2015
2016 the year of machine learning 12.16.2015
 
Introducing Ansible
Introducing AnsibleIntroducing Ansible
Introducing Ansible
 
Placement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environmentPlacement of BPM runtime components in an SOA environment
Placement of BPM runtime components in an SOA environment
 
How to Triple Your Speed of Development Using Automation
How to Triple Your Speed of Development Using AutomationHow to Triple Your Speed of Development Using Automation
How to Triple Your Speed of Development Using Automation
 
Deloitte BPM case study by WorkflowGen
Deloitte BPM case study by WorkflowGenDeloitte BPM case study by WorkflowGen
Deloitte BPM case study by WorkflowGen
 
AI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar DeckAI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar Deck
 
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
IBM Connections 4.5 Integration - From Zero To Social Hero - 2.0 - with Domin...
 
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...
 
Practical Strategies to Designing Beautiful Portals
Practical Strategies to Designing Beautiful PortalsPractical Strategies to Designing Beautiful Portals
Practical Strategies to Designing Beautiful Portals
 
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
Machine Learning Application to Manufacturing using Tableau and Google by Pluto7
 
Practical Strategies for Transitioning to Office 365 #sptechcon
Practical Strategies for Transitioning to Office 365 #sptechconPractical Strategies for Transitioning to Office 365 #sptechcon
Practical Strategies for Transitioning to Office 365 #sptechcon
 
Operations Playbook: Monitoring and Automation - RightScale Compute 2013
Operations Playbook: Monitoring and Automation - RightScale Compute 2013Operations Playbook: Monitoring and Automation - RightScale Compute 2013
Operations Playbook: Monitoring and Automation - RightScale Compute 2013
 
Case Study for Project Management System Using Sharepoint
Case Study for Project Management System Using SharepointCase Study for Project Management System Using Sharepoint
Case Study for Project Management System Using Sharepoint
 
Entrepreneurship with Data, Machine Learning and AI
Entrepreneurship with Data, Machine Learning and AIEntrepreneurship with Data, Machine Learning and AI
Entrepreneurship with Data, Machine Learning and AI
 

Similar to Dynamic access control sbc12 - thuan nguyen

SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)Security Bootcamp
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
Jeremy Hilton
 
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...William LaPorte
 
A1802030104
A1802030104A1802030104
A1802030104
IOSR Journals
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 
Practical Federal Compliance Strategies and Examples
Practical Federal Compliance Strategies and ExamplesPractical Federal Compliance Strategies and Examples
Practical Federal Compliance Strategies and Examples
Amazon Web Services
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control
McOWLMarketing
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
Splunk
 
ConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public SectorConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public Sectormartingarland
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
Drew Madelung
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
CloudExpoAsia
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
Kim Cook
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
Craig Mullins
 
Security in federated integrated d bs
Security in federated integrated  d bsSecurity in federated integrated  d bs
Security in federated integrated d bs
omercomail
 
SunGard Data Profiling
SunGard Data ProfilingSunGard Data Profiling
SunGard Data Profiling
SunGard Availability Services UK
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database Technology
Jacqueline Thomas
 

Similar to Dynamic access control sbc12 - thuan nguyen (20)

SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
 
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
 
test
testtest
test
 
A1802030104
A1802030104A1802030104
A1802030104
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
Practical Federal Compliance Strategies and Examples
Practical Federal Compliance Strategies and ExamplesPractical Federal Compliance Strategies and Examples
Practical Federal Compliance Strategies and Examples
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control Info Security: Microsoft Dynamic Access Control
Info Security: Microsoft Dynamic Access Control
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
ConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public SectorConceptClassifier for SharePoint Turbo Charging the Public Sector
ConceptClassifier for SharePoint Turbo Charging the Public Sector
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
 
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza Keynote Theatre. Keynote Day 2. 16:30   Evelyn de Souza
Keynote Theatre. Keynote Day 2. 16:30 Evelyn de Souza
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Presentatio
PresentatioPresentatio
Presentatio
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
Security in federated integrated d bs
Security in federated integrated  d bsSecurity in federated integrated  d bs
Security in federated integrated d bs
 
SunGard Data Profiling
SunGard Data ProfilingSunGard Data Profiling
SunGard Data Profiling
 
History Of Database Technology
History Of Database TechnologyHistory Of Database Technology
History Of Database Technology
 

More from Thuan Ng

Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
 
Accelerating Digital Transformation With Microsoft Azure And Cognitive Services
Accelerating Digital Transformation With Microsoft Azure And Cognitive ServicesAccelerating Digital Transformation With Microsoft Azure And Cognitive Services
Accelerating Digital Transformation With Microsoft Azure And Cognitive Services
Thuan Ng
 
An initiative to healthcare analytics with office 365 and power bi spsparis2017
An initiative to healthcare analytics with office 365 and power bi spsparis2017An initiative to healthcare analytics with office 365 and power bi spsparis2017
An initiative to healthcare analytics with office 365 and power bi spsparis2017
Thuan Ng
 
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Thuan Ng
 
Lotus Notes Transition To Office 365
Lotus Notes Transition To Office 365Lotus Notes Transition To Office 365
Lotus Notes Transition To Office 365
Thuan Ng
 
Search Solution in SharePoint 2013
Search Solution in SharePoint 2013Search Solution in SharePoint 2013
Search Solution in SharePoint 2013
Thuan Ng
 
Planning and deploying_share_point_farm_in_azure_gabsg_2016
Planning and deploying_share_point_farm_in_azure_gabsg_2016Planning and deploying_share_point_farm_in_azure_gabsg_2016
Planning and deploying_share_point_farm_in_azure_gabsg_2016
Thuan Ng
 
B365 saturday practical guide to building a scalable search architecture in s...
B365 saturday practical guide to building a scalable search architecture in s...B365 saturday practical guide to building a scalable search architecture in s...
B365 saturday practical guide to building a scalable search architecture in s...
Thuan Ng
 
SharePoint 2013 Document Management Features
SharePoint 2013 Document Management FeaturesSharePoint 2013 Document Management Features
SharePoint 2013 Document Management Features
Thuan Ng
 
SharePoint 2010 Intranet Presentation
SharePoint 2010 Intranet PresentationSharePoint 2010 Intranet Presentation
SharePoint 2010 Intranet Presentation
Thuan Ng
 
Make a better social collaboration platform with share point 2013
Make a better social collaboration platform with share point 2013Make a better social collaboration platform with share point 2013
Make a better social collaboration platform with share point 2013Thuan Ng
 
Explanation of sp in crazy way
Explanation of sp in crazy wayExplanation of sp in crazy way
Explanation of sp in crazy wayThuan Ng
 
SharePoint Development with Visual Studio 2012
SharePoint Development with Visual Studio 2012SharePoint Development with Visual Studio 2012
SharePoint Development with Visual Studio 2012
Thuan Ng
 
A glance at share point 2013 social features
A glance at share point 2013 social featuresA glance at share point 2013 social features
A glance at share point 2013 social features
Thuan Ng
 
Sp administration-training-prism
Sp administration-training-prismSp administration-training-prism
Sp administration-training-prismThuan Ng
 
Share point 2010 indoctrination
Share point 2010 indoctrinationShare point 2010 indoctrination
Share point 2010 indoctrination
Thuan Ng
 
Basics of project management - Week 1
Basics of project management - Week 1Basics of project management - Week 1
Basics of project management - Week 1
Thuan Ng
 
Designing service applications architecture
Designing service applications architectureDesigning service applications architecture
Designing service applications architecture
Thuan Ng
 
Sharepoint 2010 the medicine for your business hsu
Sharepoint 2010 the medicine for your business   hsuSharepoint 2010 the medicine for your business   hsu
Sharepoint 2010 the medicine for your business hsuThuan Ng
 
Sharepoint 2010 overview for student in university
Sharepoint 2010 overview for student in universitySharepoint 2010 overview for student in university
Sharepoint 2010 overview for student in university
Thuan Ng
 

More from Thuan Ng (20)

Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
 
Accelerating Digital Transformation With Microsoft Azure And Cognitive Services
Accelerating Digital Transformation With Microsoft Azure And Cognitive ServicesAccelerating Digital Transformation With Microsoft Azure And Cognitive Services
Accelerating Digital Transformation With Microsoft Azure And Cognitive Services
 
An initiative to healthcare analytics with office 365 and power bi spsparis2017
An initiative to healthcare analytics with office 365 and power bi spsparis2017An initiative to healthcare analytics with office 365 and power bi spsparis2017
An initiative to healthcare analytics with office 365 and power bi spsparis2017
 
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
 
Lotus Notes Transition To Office 365
Lotus Notes Transition To Office 365Lotus Notes Transition To Office 365
Lotus Notes Transition To Office 365
 
Search Solution in SharePoint 2013
Search Solution in SharePoint 2013Search Solution in SharePoint 2013
Search Solution in SharePoint 2013
 
Planning and deploying_share_point_farm_in_azure_gabsg_2016
Planning and deploying_share_point_farm_in_azure_gabsg_2016Planning and deploying_share_point_farm_in_azure_gabsg_2016
Planning and deploying_share_point_farm_in_azure_gabsg_2016
 
B365 saturday practical guide to building a scalable search architecture in s...
B365 saturday practical guide to building a scalable search architecture in s...B365 saturday practical guide to building a scalable search architecture in s...
B365 saturday practical guide to building a scalable search architecture in s...
 
SharePoint 2013 Document Management Features
SharePoint 2013 Document Management FeaturesSharePoint 2013 Document Management Features
SharePoint 2013 Document Management Features
 
SharePoint 2010 Intranet Presentation
SharePoint 2010 Intranet PresentationSharePoint 2010 Intranet Presentation
SharePoint 2010 Intranet Presentation
 
Make a better social collaboration platform with share point 2013
Make a better social collaboration platform with share point 2013Make a better social collaboration platform with share point 2013
Make a better social collaboration platform with share point 2013
 
Explanation of sp in crazy way
Explanation of sp in crazy wayExplanation of sp in crazy way
Explanation of sp in crazy way
 
SharePoint Development with Visual Studio 2012
SharePoint Development with Visual Studio 2012SharePoint Development with Visual Studio 2012
SharePoint Development with Visual Studio 2012
 
A glance at share point 2013 social features
A glance at share point 2013 social featuresA glance at share point 2013 social features
A glance at share point 2013 social features
 
Sp administration-training-prism
Sp administration-training-prismSp administration-training-prism
Sp administration-training-prism
 
Share point 2010 indoctrination
Share point 2010 indoctrinationShare point 2010 indoctrination
Share point 2010 indoctrination
 
Basics of project management - Week 1
Basics of project management - Week 1Basics of project management - Week 1
Basics of project management - Week 1
 
Designing service applications architecture
Designing service applications architectureDesigning service applications architecture
Designing service applications architecture
 
Sharepoint 2010 the medicine for your business hsu
Sharepoint 2010 the medicine for your business   hsuSharepoint 2010 the medicine for your business   hsu
Sharepoint 2010 the medicine for your business hsu
 
Sharepoint 2010 overview for student in university
Sharepoint 2010 overview for student in universitySharepoint 2010 overview for student in university
Sharepoint 2010 overview for student in university
 

Dynamic access control sbc12 - thuan nguyen

  • 2.  Microsoft SharePoint Most Valuable Professional (2011,2012)  Author, Writer, Trainer & Public Speaker  Founder & Editor in Chief of SharePointVN Publisher  Focus on Microsoft Security & Federation Identity, Infrastructure, Methodologies and Architecture.
  • 3.  Data Compliance  Understand the new Dynamic Access Control capabilities built into Windows Server 2012  Demonstration
  • 4.  Compliance is generally a response to governmental regulation, but it can also be a response to industry or internal requirements.  The U.S. Health Insurance Portability and Accountability Act (HIPPA) for health providers  Sarbanes-Oxley Act (SOX)  The European Union Data Protection Directive  U.S. state data breach laws I’m not talking about in-depth Data compliance and privacy.
  • 5.  Can you make sure that only authorized individuals can access confidential data?  Do you have granular control over auditing access?  How to reduce the number of security groups your organization has?  Deal with regulatory standard? …. There are many questions come up when it comes to data access control. Content Owner Infrastructure Information CSO/CIO Support Worker department ““Is my important data “I need to have appropriately “I don’t know “I don’t know if I the right protected and what data is in am complying compliance compliant with my repositories with my controls to keep regulations – and how to organization’s me out of jail” how do I audit control it” polices” this”
  • 6. Distributed Regulatory Storage growth Information compliance Data leakage  45%: File based storage  Corporate information is  New and changing  246,091,423: Total CAGR. everywhere: Desktops, regulations (SOX, HIPPA, number of records Branch Offices, Data GLBA…) containing sensitive  MSIT cost $1.6 Centers, Cloud… personal information GB/Month for managed  International and local involved in security servers.  MSIT 1500 file servers regulations. breaches in the US since with 110 different groups  >70%: of stored data is  More oversight and January 2005 managing them stale tighter enforcement.  $90 to $305 per record  Very hard to consistently  Cloud cost would be  $15M: Settlement for (Forrester: in “Calculating manage the information. approximately 25 cents investment bank with the Cost of a Security GB/Month SEC over record Breach”) retention.
  • 7. Data Expression-based Expression-based Classification auditing access conditions Encryption  Classify your documents  Targeted access auditing  Flexible access control  Automatic RMS using resource properties based on document lists based on document encryption based on stored in Active classification and user classification and document classification. Directory. identity. multiple identities (security groups).  Automatically classify  Centralized deployment documents based on of audit policies using  Centralized access document content. Global Audit Policies. control lists using Central Access Policies.
  • 8.
  • 9. Data Classification  File Classification Infrastructure provides insight into your data Data by automating classification processes. Classification  File Classification Infrastructure uses classification rules to automatically scan files and classify them according to the  Classify your documents contents of the file. using resource properties  Some examples of classification rules include: stored in Active Directory.  Classify any file that contains the string “SBC12 Confidential” as having high business impact.  Automatically classify documents based on  Classify any file that contains at least 10 social security document content. numbers as having personally identifiable information.  Data Classification Toolkit
  • 10.  A content classification rule that searches a set of files for the Data string “SBC12 Confidential”. If the string is found in a file, the Classification Impact resource property is set to High on the file.  A content classification rule that searches a set of files for a  Classify your documents regular expression that matches a social security number at using resource properties least 10 times in one file. If the pattern is found, the file is stored in Active Directory. classified as having personally identifiable information and the Personally Identifiable Information resource property is set to  Automatically classify documents based on High. document content.
  • 11.
  • 12. Expression-based access condition  Manage fewer security groups by using conditional expressions Expression-based access conditions Country x 30  Flexible access control lists based on document classification and multiple identities (security groups). Department x 20  Centralized access control lists using Central Access Policies. Sensitive/Confidential documents
  • 13. What is Central Access Policy?  You can think of Central Access Policies as a safety net that your organization applies across its servers to enhance the local access policy
  • 14. Expression-based access rules Active Directory File Domain Services server User claims Device claims Resource properties User.Department = Finance Device.Department = Finance Resource.Department = Finance User.Clearance = High Device.Managed = True Resource.Impact = High Access policy Applies to: @File.Impact = High Allow | Read, Write | if (@User.Department == @File.Department) AND (@Device.Managed == True)
  • 15. Central access policies Active Directory Domain Services Corporate High business file servers Organizational impact policy policies Characteristics • High business impact • Composed of central access rules • Personally identifiable Personally information • Applied to file servers through Group Policy identifiable objects information policy Finance • Supplement (not replace) native file and department policies folder access control lists from New Technology File System (NTFS) • High business impact Finance policy • Personally identifiable information • Finance User folders Finance folders
  • 16. Central access policy workflow Active Directory Active Directory Domain Create claim definitions Domain Services Create file property definitions Services Create central access policy Claim definitions User Send central access policies to file Group Policy servers File property definitions Apply access policy to the Allow or shared folder deny File Server Identify information Audit policy User’s computer User tries to access information File server
  • 17. Central access policy examples Organization-wide Specific data authorization management Departmental authorization Need-to-know
  • 18. Expression-based Auditing Expression-based  Limit auditing to data that meets specific auditing classification criteria.  Targeted access auditing  Limit auditing by action and by identity based on document classification and user  Add contextual information into the audit identity. events.  Centralized deployment of audit policies using Global Audit Policies.
  • 19. Security auditing Active Directory Active Directory Domain Domain Services Create claim types Services Create resource properties Claim definitions User Group Policy Create global audit policy File property definitions Select and apply resource Allow or properties to the shared deny File Server folders Audit policy User’s User tries to access computer information File server
  • 20. Audit policy examples Audit everyone who does not have a high Audit all vendors when they try to access security clearance and who tries to access a documents related to projects that they are not document that has a high impact on business working on Audit | Everyone | All-Access | Audit | Everyone | All-Access | Resource.BusinessImpact=HBI AND User.EmploymentStatus=Vendor AND User.Project User.SecurityClearance!=High Not_AnyOf Resource.Project.
  • 21. Data Encryption Challenges  How do I protect sensitive information after it leaves my protected environment?  I cannot get the users to encrypt their sensitive data.
  • 22. Classification-based encryption process Process to encrypt a file based on 1 classification Active Directory Claim definitions, file property definitions, and Domain Services access policies are established in Active Directory Domain Controller. A user creates a file with the word “confidential” in User the text and saves it. The classification engine 4 classifies the file as high-impact according to rules 2 configured. On the file server, a rule automatically applies RMS protection to any file classified as high- 3 impact. Classification RMS server engine The RMS template and encryption are applied to the file on the file server and the file is encrypted. File server
  • 23. 23
  • 24. Demonstration Lab  There are two virtual machines that are involved in the demonstration lab.  AD-Srv (Active Directory Domain Controller)  File-Srv (File Server)  There are two security groups  Finance  System Integration  There are two domain users:  thuan@sbc12.local (Finance)  thang@sbc12.local (System Integration)
  • 25. Steps  Create a new claim  Department  Create resources properties and add it to resource property list  Finance Department  Create a new central access rule/central policies  Resource Finance Department Exists  Resource Finance Department Equals Value Finance  Publish central access policy  Configure Group Policy and enable KDC  Install File Server Resource Manager on File server  Update-FSRMClassificationPropertyDefinition  Add Central Access Policy to shared folder  Validate