SlideShare a Scribd company logo
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Fighting Secrecy Challenge -
Azure Rights Management
Riwut Libinuko
1
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Event Sponsors
2
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Participate with us and stand a chance to win prizes!
Survey:
http://j.mp/abcsg-2016
Tweet Tag:
#GlobalAzure #GABSG
3
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Agenda
• Why we need Rights Management?
• Different between traditional protection and rights management
• Managing Azure RMS
• Demo
4
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Connect with Me
http://blog.libinuko.com
@cakriwut
http://www.youtube.com/user/cakriwut/
Riwut Libinuko
Microsoft Office Server Service MVP, Master
degree in Computer System Engineering, with
more than 15 years in IT industry.
Active contributors to MSDN Forum, Code Sample
Gallery, Curah, Nuget, Codeplex and many more.
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Introduction
6
“The Panama Papers are a leaked set of 11.5 million confidential documents that provide detailed
information about more than 214,000 offshore companies listed by the Panamanian corporate service
provider Mossack Fonseca,..”
(Source: Wikipedia, https://en.wikipedia.org/wiki/Panama_Papers)
The Ponemon study found “..the average consolidated total cost of a data breach is $3.8 million
representing a 23% increase since 2013. The study also reports that the cost incurred for each lost
or stolen record containing sensitive and confidential information increased six percent from a
consolidated average of $145 to $154.”
(Source: IBM, Ponemon , http://www-03.ibm.com/security/data-breach/)
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Introduction
7
1. 74% report loss of customers
2. 59% faced potential litigation
3. 33% faced potential fines
4. 32% declined in share value
(Source: http://www.scottandscottllp.com/main/business_impact_of_data_breach.aspx)
(Source: https://en.wikipedia.org/wiki/Data_breach#2015)
•In October 2015, the British telecommuncations provider TalkTalk suffered a data
breach when a group of 15-years old hackers stole information on its 4 million
customers. The stock price of the company fell substantially due to the issue –
around 12% – owing largely to the bad publicity surrounding the leak.[11]
•In July 2015, adult website Ashley Madison suffered a data breach when a hacker
group stole information on its 37 million users. The hackers threatened to reveal
user names and specifics if Ashley Madison and a fellow site, EstablishedMen.com,
did not shut down permanently.[12]
•In February 2015, Anthem suffered a data breach of nearly 80 million records,
including personal information such as names, Social Security numbers, dates of
birth, and other sensitive details.[13]
•In June 2015, The Office of Personnel Management of the U.S. government
suffered a data breach in which the records of 4 million current and former federal
employees of the United States were hacked and stolen.
Major incident in 2015
Business Impact
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Traditional Protection
8
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Unprotected document
Encrypt
010101010100
010101010100
010101010101
Encrypted document
Decrypt
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USDSecret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Controlled Access doc
Unprotected document
Access GrantedFile Permission
Unprotected Protected Unprotected
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Information Rights Management
• Information Protection technology
– Protection is persisted with the data, content can travel anywhere (desktops, file shares, USB keys,
cloud drives, network and devices)
• Combines encryption and usage restrictions
– Prevent accidental disclosure of sensitive data by applying usage polices (cannot forward, cannot
print, read-only)
• Simple to use
– Authors just select a policy option, consumers just open documents
– Administrators can configure policies to protect content automatically
– Securely share data with individuals within organization
Source: https://mva.microsoft.com/en-
US/training-courses/encryption-in-office-365-
8404
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Rights Management Protection
10
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Unprotected document
Protect
010101010100
010101010100
010101010101
Encrypted document
Policy
ContentKey&
Rights
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Decrypt
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Activate Azure RMS
• Using Office 365 Admin center , if you
have O365 with RMS subscription
(E3,E4,ES,A3,A4,AS,G3,G4)
• Using Azure Classic Portal site
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Install RMS Sharing Apps
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Azure RMS Key (Default)
15
Source : https://technet.microsoft.com/en-
us/library/dn440580.aspx
By default, Microsoft will generate your tenant
key and manage it. In this case you don’t need
to do any configuration.
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Azure RMS Key (BYOK)
16
Source : https://technet.microsoft.com/en-
us/library/dn440580.aspx
Azure RMS also support tenant’s
managed key by Thales HSM.
However BYOK is not compatible with
Exchange Online.
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect data with Rights Management
Source : https://mva.microsoft.com/en-
US/training-courses/azure-rights-
management-services-core-skills-10500
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect SharePoint Online
Activate IRM protection at SharePoint
Admin
Configure Document Library/List to
use the IRM proection
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect Exchange Online
• Use PowerShell
• Tell Exchange Online where to find the Azure
RMS key for your location - example:
• Set-IRMConfiguration -
RMSOnlineKeySharingLocation
"https://sp-
rms.na.aadrm.com/TenantManagement/S
ervicePartner.svc"
• Import the key
• Import-RMSTrustedPublishingDomain -
RMSOnline -name "RMS Online"
• Enable IRM functionality
• Set-IRMConfiguration -
InternalLicensingEnabled $true
• Detailed procedures at
https://technet.microsoft.com/en-
us/library/dn151475(v=exchg.150).aspx
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect File Share (OnPrem)
Automated RMS in File
Classification policies
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Manage RMS Template
25
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Complete Azure RMS Fabric
Integration
BYO Key
Sync
Azure RMS
Connector
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Resources
27
http://channel9.msdn.com/
Microsoft Azure
http://azure.microsoft.com
http://msdn.microsoft.com https://mva.microsoft.com
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Thank You
28

More Related Content

What's hot

File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
Eric Inch
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
David J Rosenthal
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 

What's hot (20)

Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...
 
Azure information protection_datasheet_en-us
Azure information protection_datasheet_en-usAzure information protection_datasheet_en-us
Azure information protection_datasheet_en-us
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 

Similar to Global Azure Bootcamp 216 - Azure Rights Management

Ants - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeedAnts - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeed
Dinh Le Dat (Kevin D.)
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 

Similar to Global Azure Bootcamp 216 - Azure Rights Management (20)

Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
 
March 2021 Microsoft 365 Need to Know Webinar
March 2021 Microsoft 365 Need to Know WebinarMarch 2021 Microsoft 365 Need to Know Webinar
March 2021 Microsoft 365 Need to Know Webinar
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
Ants - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeedAnts - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeed
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Global Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultGlobal Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key Vault
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know Webinar
 
May 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarMay 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know Webinar
 
July 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know WebinarJuly 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know Webinar
 
Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18
 
Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool Again
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know Webinar
 
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
 
Beating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSBeating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWS
 

More from Riwut Libinuko

Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrexPesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Riwut Libinuko
 

More from Riwut Libinuko (8)

Prototyping Office AddIns using ScriptLab
Prototyping Office AddIns using ScriptLabPrototyping Office AddIns using ScriptLab
Prototyping Office AddIns using ScriptLab
 
Azure DevOps Deployment Group
Azure DevOps Deployment GroupAzure DevOps Deployment Group
Azure DevOps Deployment Group
 
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On LabGlobal Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
 
Azure automation for SharePoint SelfHosted CI/CD
Azure automation for SharePoint SelfHosted CI/CDAzure automation for SharePoint SelfHosted CI/CD
Azure automation for SharePoint SelfHosted CI/CD
 
GAB2017 - Azure function to build serverless SharePoint apps
GAB2017 - Azure function to build serverless SharePoint appsGAB2017 - Azure function to build serverless SharePoint apps
GAB2017 - Azure function to build serverless SharePoint apps
 
O365 Saturday - Deepdive SharePoint Client Side Rendering
O365 Saturday - Deepdive SharePoint Client Side RenderingO365 Saturday - Deepdive SharePoint Client Side Rendering
O365 Saturday - Deepdive SharePoint Client Side Rendering
 
SSAS Azure RemoteApp
SSAS Azure RemoteAppSSAS Azure RemoteApp
SSAS Azure RemoteApp
 
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrexPesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 

Global Azure Bootcamp 216 - Azure Rights Management

  • 1. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Fighting Secrecy Challenge - Azure Rights Management Riwut Libinuko 1
  • 2. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Event Sponsors 2
  • 3. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Participate with us and stand a chance to win prizes! Survey: http://j.mp/abcsg-2016 Tweet Tag: #GlobalAzure #GABSG 3
  • 4. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Agenda • Why we need Rights Management? • Different between traditional protection and rights management • Managing Azure RMS • Demo 4
  • 5. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Connect with Me http://blog.libinuko.com @cakriwut http://www.youtube.com/user/cakriwut/ Riwut Libinuko Microsoft Office Server Service MVP, Master degree in Computer System Engineering, with more than 15 years in IT industry. Active contributors to MSDN Forum, Code Sample Gallery, Curah, Nuget, Codeplex and many more.
  • 6. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Introduction 6 “The Panama Papers are a leaked set of 11.5 million confidential documents that provide detailed information about more than 214,000 offshore companies listed by the Panamanian corporate service provider Mossack Fonseca,..” (Source: Wikipedia, https://en.wikipedia.org/wiki/Panama_Papers) The Ponemon study found “..the average consolidated total cost of a data breach is $3.8 million representing a 23% increase since 2013. The study also reports that the cost incurred for each lost or stolen record containing sensitive and confidential information increased six percent from a consolidated average of $145 to $154.” (Source: IBM, Ponemon , http://www-03.ibm.com/security/data-breach/)
  • 7. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Introduction 7 1. 74% report loss of customers 2. 59% faced potential litigation 3. 33% faced potential fines 4. 32% declined in share value (Source: http://www.scottandscottllp.com/main/business_impact_of_data_breach.aspx) (Source: https://en.wikipedia.org/wiki/Data_breach#2015) •In October 2015, the British telecommuncations provider TalkTalk suffered a data breach when a group of 15-years old hackers stole information on its 4 million customers. The stock price of the company fell substantially due to the issue – around 12% – owing largely to the bad publicity surrounding the leak.[11] •In July 2015, adult website Ashley Madison suffered a data breach when a hacker group stole information on its 37 million users. The hackers threatened to reveal user names and specifics if Ashley Madison and a fellow site, EstablishedMen.com, did not shut down permanently.[12] •In February 2015, Anthem suffered a data breach of nearly 80 million records, including personal information such as names, Social Security numbers, dates of birth, and other sensitive details.[13] •In June 2015, The Office of Personnel Management of the U.S. government suffered a data breach in which the records of 4 million current and former federal employees of the United States were hacked and stolen. Major incident in 2015 Business Impact
  • 8. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Traditional Protection 8 Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Unprotected document Encrypt 010101010100 010101010100 010101010101 Encrypted document Decrypt Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USDSecret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Controlled Access doc Unprotected document Access GrantedFile Permission Unprotected Protected Unprotected
  • 9. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Information Rights Management • Information Protection technology – Protection is persisted with the data, content can travel anywhere (desktops, file shares, USB keys, cloud drives, network and devices) • Combines encryption and usage restrictions – Prevent accidental disclosure of sensitive data by applying usage polices (cannot forward, cannot print, read-only) • Simple to use – Authors just select a policy option, consumers just open documents – Administrators can configure policies to protect content automatically – Securely share data with individuals within organization Source: https://mva.microsoft.com/en- US/training-courses/encryption-in-office-365- 8404
  • 10. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Rights Management Protection 10 Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Unprotected document Protect 010101010100 010101010100 010101010101 Encrypted document Policy ContentKey& Rights Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Decrypt
  • 11. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 12. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Activate Azure RMS • Using Office 365 Admin center , if you have O365 with RMS subscription (E3,E4,ES,A3,A4,AS,G3,G4) • Using Azure Classic Portal site
  • 13. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 14. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Install RMS Sharing Apps
  • 15. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Azure RMS Key (Default) 15 Source : https://technet.microsoft.com/en- us/library/dn440580.aspx By default, Microsoft will generate your tenant key and manage it. In this case you don’t need to do any configuration.
  • 16. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Azure RMS Key (BYOK) 16 Source : https://technet.microsoft.com/en- us/library/dn440580.aspx Azure RMS also support tenant’s managed key by Thales HSM. However BYOK is not compatible with Exchange Online.
  • 17. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect data with Rights Management Source : https://mva.microsoft.com/en- US/training-courses/azure-rights- management-services-core-skills-10500
  • 18. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 19. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect SharePoint Online Activate IRM protection at SharePoint Admin Configure Document Library/List to use the IRM proection
  • 20. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 21. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect Exchange Online • Use PowerShell • Tell Exchange Online where to find the Azure RMS key for your location - example: • Set-IRMConfiguration - RMSOnlineKeySharingLocation "https://sp- rms.na.aadrm.com/TenantManagement/S ervicePartner.svc" • Import the key • Import-RMSTrustedPublishingDomain - RMSOnline -name "RMS Online" • Enable IRM functionality • Set-IRMConfiguration - InternalLicensingEnabled $true • Detailed procedures at https://technet.microsoft.com/en- us/library/dn151475(v=exchg.150).aspx
  • 22. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 23. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect File Share (OnPrem) Automated RMS in File Classification policies
  • 24. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 25. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Manage RMS Template 25
  • 26. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Complete Azure RMS Fabric Integration BYO Key Sync Azure RMS Connector
  • 27. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Resources 27 http://channel9.msdn.com/ Microsoft Azure http://azure.microsoft.com http://msdn.microsoft.com https://mva.microsoft.com
  • 28. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Thank You 28