SlideShare a Scribd company logo
1 of 39
•
•
•
•
•
•
•
•
•
•
Governance Framework
Executive stakeholders Business division leaders
Financial stakeholders Software development leaders
IT managers Technical specialists
Trainers Influential information workers
Information architects or taxonomists Compliance officers
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Communications
Sponsor roadmap
Training
Coaching
Resistance management
Change
management
tools
Individual phases
of change
(ADKAR®
)
Awareness
Desire
Reinforcement™
Knowledge
Ability
Transparency and Control
Office 365
Continuous Compliance in Office 365
Built-in capabilities for
compliance with standards
Enable customers to meet global compliance standards
in ISO 27001, EUMC, HIPAA, FISMA
Contractually commit to privacy, security and handling
of customer data through Data Processing Agreements
Customer controls for compliance
with internal policies
Admin Controls like Data Loss Prevention, Archiving, E-
Discovery to enable organizational compliance
SSAE/SOC
ISO27001
EUMC
FERPA
FISMA/FedRAMP
HIPAA
HITECH
ITAR
HMG IL2
CJIS
Article 29 +
SOC 2
Global
Global
Europe
U.S.
U.S.
U.S.
U.S.
U.S.
UK
U.S.
Europe
Global
Finance
Global
Europe
Education
Government
Healthcare
Healthcare
Defense
Government
Law Enforcement
Europe
Global
Standards
Certifications
Market Region
+EU Data Protection Authorities validate Microsoft’s approach to privacy
How Office 365 does Compliance
Physical
Security
Security Best
Practices
Secure
Network Layer
Data
Encryption
Office 365 Service | Control Sets | Certifications
DLP
OME
SMIME
RBAC
RMS
Account
Mgmt.
Incident
Monitoring
Data
Encryption
Encryption of
stored data
and more…
Data
Minimization
& Retention
New
Cert’s
and
more…
Access
Control
Built-in Capabilities
Customer Controls
0.43M
1.53M
3.94M
9.50M
39 122
172
313
457
653
Compliance Controls
ISO27001 HIPAA
BAA
DPASAS70
FedRAMP CJIS SOC 2
Type 2
ISO27018 MLPS OFFICIAL
IRS1075
DISA
IL2
1017
3 3 3
4
9
10
13
Workloads in Boundary
Transparency Milestones
Proof of ISO report
FISMA quarterly contmon reports
Finserv summits
FedRAMP monthly contmon reports
Control sharing, deep contmon,
trust.microsoft.com for finserv
2010
2011
2013
2014
2015
ITARMT
BPOS-D
FERPA
SOC 1
Type 2
EU Model
Clauses
FISMA
EU Safe
Harbor
2008 2009 2010 2011 2012 2013 2014 201x
3 4 5 8 9 17
Total
certifications /
standards
compliant to
2
Risk Confidentiality Integrity Availability
On Premises Cloud On Premises Cloud On Premises Cloud
Mitigate Customer Shared Customer Microsoft Customer Microsoft
Accept Customer Shared Customer Shared Customer Shared
Transfer -
Microsoft
(Contracts &
Compliance)
-
Microsoft
(Contracts &
Compliance)
-
Microsoft
(SLA)
http://trust.office365.com – direct link at Data Maps
Ever Evolving Approach to Compliance
Market &
Competitive
Intelligence
Compliance
Management
Framework
Regulatory
Impact
Analysis (RSIA)
Define
Security,
and Privacy
controls
Determine
Implementation
Requirements
Implement
Controls
Document
Implementation
Continuous
Monitoring
Independent
verification
(Audits)
Remediation
Prioritize
Have services independently audited for
compliance with this standard
Key Principles - Cloud providers must:
Not use data for advertising or
marketing unless express consent is
obtained
Be transparent about data location and
how data is handled
Be accountable to determine if customer
data was impacted by a breach of
information security
Communicate to customers and
regulators in the event of a breach
Provide customers with control over how
their data is used
How Office 365 does Compliance
Physical
Security
Security Best
Practices
Secure
Network Layer
Data
Encryption
Office 365 Service | Control Sets | Certifications
DLP
OME
SMIME
RBAC
RMS
Account
Mgmt.
Incident
Monitoring
Data
Encryption
Encryption of
stored data
and more…
Data
Minimization
& Retention
New
Cert’s
and
more…
Access
Control
Built-in Capabilities
Customer Controls
Control Effectiveness Assessment (Audit) Schedule
Nov
2014
Dec
2015
Jan
2015
Feb
2015
Mar
2015
Apr
2015
May
2015
Jun
2015
Jul
2015
Aug
2015
Sep
2015
Oct
2015
Nov
2015
ISO FedRAMP MT ISAE3402/SOC ITAR ISO
Control Effectiveness Assessment (Audit) Schedule
Nov
2014
Dec
2015
Jan
2015
Feb
2015
Mar
2015
Apr
2015
May
2015
Jun
2015
Jul
2015
Aug
2015
Sep
2015
Oct
2015
Nov
2015
ISO FedRAMP MT ISAE3402/SOC ISO
Audit cadence
Trust but verify
Share latest audit reports
(Third-party verification)
Compliance Program
(Right to Examine*)
Transparency and Control through Continuous monitoring
* For larger highly regulated customers
 Part of the responsibility for the secure management of the service lies with each customer.
Managing Risk
Office 365 supports a high degree of customer configuration
• Account Management
• Access control
• Segregation of duties
• Awareness and training
• Support requests
• Use flexible customer controls in Office 365
Customers must put the following controls in place to ensure the
security of their data
Compliance controls
Helps to
Identify monitor protect
Sensitive data through
deep content analysis
Identify
Protect
Monitor
End user education
ALERT
CLASSIFY
ENCRYPT
APPEND OVERRIDE
REVIEW
REDIRECT
BLOCK
Flexible tools for policy
enforcement that provide the
right level of control
Transport Rules
Rights Management
Data Loss Prevention
Email archiving and retention
Preserve Search
Secondary mailbox with
separate quota
Managed through EAC
or PowerShell
Available on-premises,
online, or through EOA
Automated and time-
based criteria
Set policies at item or
folder level
Expiration date shown
in email message
Capture deleted and
edited email messages
Time-Based In-Place
Hold
Granular Query-Based
In-Place Hold
Optional notification
Web-based eDiscovery Center
and multi-mailbox search
Search primary, In-Place
Archive, and recoverable items
Delegate through roles-based
administration
De-duplication after discovery
Auditing to ensure controls
are met
In-Place Archive Governance Hold eDiscovery
Privacy by design means that we do not use your information for anything
other than providing you services
No advertising products out
of Customer Data
No scanning of email or documents to build
analytics or mine data
Various customer controls at admin and user
level to enable or regulate sharing
If the customer decides to leave the service,
they get to take to take their data and delete it
in the service
Access to information about geographical
location of data, who has access and when
Notification to customers about changes in
security, privacy and audit information
Office 365 Trust Center http://trust.office365.com
Office 365 Blog http://blogs.office.com/
• Enabling transparency and control
• Enhancing transparency and control for Office 365 customers
• Customer Lockbox
• Office 365 management activity API for security and compliance
monitoring
Whitepapers
Overview of Security
http://aka.ms/securitywhitepaper
Overview of Security and Compliance in Office 365
Customer controls for Information Protection
http://aka.ms/customercontrolsm
Law Enforcement Requests Report
http://www.microsoft.com/about/corporatecitizenship/en-
us/reporting/transparency/
SharePoint Governance and Compliance
SharePoint Governance and Compliance

More Related Content

What's hot

Inevitability of Multi-Tenancy & SAAS in Product Engineering
Inevitability of Multi-Tenancy & SAAS in Product EngineeringInevitability of Multi-Tenancy & SAAS in Product Engineering
Inevitability of Multi-Tenancy & SAAS in Product EngineeringPrashanth Panduranga
 
Software Infrastructure requirements elicitation and design roadmap - Innovat...
Software Infrastructure requirements elicitation and design roadmap - Innovat...Software Infrastructure requirements elicitation and design roadmap - Innovat...
Software Infrastructure requirements elicitation and design roadmap - Innovat...Innovate Vancouver
 
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSWebinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSAPPSeCONNECT
 
Webinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECTWebinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECTAPPSeCONNECT
 
Using standards, open-source and advances in technology to bring down soft co...
Using standards, open-source and advances in technology to bring down soft co...Using standards, open-source and advances in technology to bring down soft co...
Using standards, open-source and advances in technology to bring down soft co...Infiswift Solutions
 
Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...APPSeCONNECT
 
Embedded SQL Reporting on Databases from Any Application
Embedded SQL Reporting on Databases from Any ApplicationEmbedded SQL Reporting on Databases from Any Application
Embedded SQL Reporting on Databases from Any ApplicationJReport
 
Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paasAtlas Systems
 
Integrate Report Engine, Dashboards & Analysis Into Your Application
Integrate Report Engine, Dashboards & Analysis Into Your ApplicationIntegrate Report Engine, Dashboards & Analysis Into Your Application
Integrate Report Engine, Dashboards & Analysis Into Your ApplicationJReport
 
Which Embedded Analytics is Right for You?
Which Embedded Analytics is Right for You?Which Embedded Analytics is Right for You?
Which Embedded Analytics is Right for You?OpenText
 
Azure Web Apps - Deep Dive
Azure Web Apps - Deep DiveAzure Web Apps - Deep Dive
Azure Web Apps - Deep DiveBizTalk360
 
WSO2Con USA 2017: Positioning WSO2 for Quicker Uptake
WSO2Con USA 2017: Positioning WSO2 for Quicker UptakeWSO2Con USA 2017: Positioning WSO2 for Quicker Uptake
WSO2Con USA 2017: Positioning WSO2 for Quicker UptakeWSO2
 
Embedded Reporting Tools to Enhance Your Application
Embedded Reporting Tools to Enhance Your ApplicationEmbedded Reporting Tools to Enhance Your Application
Embedded Reporting Tools to Enhance Your ApplicationBob Report
 
Integrating Customized Reports, Dashboards & Analysis into Your Application
Integrating Customized Reports, Dashboards & Analysis into Your ApplicationIntegrating Customized Reports, Dashboards & Analysis into Your Application
Integrating Customized Reports, Dashboards & Analysis into Your ApplicationMia Yuan Cao
 
Tech Tuesdays SAP Connectivity
Tech Tuesdays SAP ConnectivityTech Tuesdays SAP Connectivity
Tech Tuesdays SAP ConnectivityInformatica Cloud
 
WSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API ArchitectureWSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API ArchitectureWSO2
 
What is the right SharePoint Cloud Strategy for My Business?
What is the right SharePoint Cloud Strategy for My Business? What is the right SharePoint Cloud Strategy for My Business?
What is the right SharePoint Cloud Strategy for My Business? Sparkhound Inc.
 

What's hot (20)

Inevitability of Multi-Tenancy & SAAS in Product Engineering
Inevitability of Multi-Tenancy & SAAS in Product EngineeringInevitability of Multi-Tenancy & SAAS in Product Engineering
Inevitability of Multi-Tenancy & SAAS in Product Engineering
 
Software Infrastructure requirements elicitation and design roadmap - Innovat...
Software Infrastructure requirements elicitation and design roadmap - Innovat...Software Infrastructure requirements elicitation and design roadmap - Innovat...
Software Infrastructure requirements elicitation and design roadmap - Innovat...
 
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaSWebinar: Accelerate Business Automation with APPSeCONNECT iPaaS
Webinar: Accelerate Business Automation with APPSeCONNECT iPaaS
 
Webinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECTWebinar: Embracing REST APIs through APPSeCONNECT
Webinar: Embracing REST APIs through APPSeCONNECT
 
Using standards, open-source and advances in technology to bring down soft co...
Using standards, open-source and advances in technology to bring down soft co...Using standards, open-source and advances in technology to bring down soft co...
Using standards, open-source and advances in technology to bring down soft co...
 
Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...Webinar: Salesforce Customization using Visualforce and Lightning Component F...
Webinar: Salesforce Customization using Visualforce and Lightning Component F...
 
Embedded SQL Reporting on Databases from Any Application
Embedded SQL Reporting on Databases from Any ApplicationEmbedded SQL Reporting on Databases from Any Application
Embedded SQL Reporting on Databases from Any Application
 
Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paas
 
Integrate Report Engine, Dashboards & Analysis Into Your Application
Integrate Report Engine, Dashboards & Analysis Into Your ApplicationIntegrate Report Engine, Dashboards & Analysis Into Your Application
Integrate Report Engine, Dashboards & Analysis Into Your Application
 
Cloud Forge Rock
Cloud Forge RockCloud Forge Rock
Cloud Forge Rock
 
Which Embedded Analytics is Right for You?
Which Embedded Analytics is Right for You?Which Embedded Analytics is Right for You?
Which Embedded Analytics is Right for You?
 
Azure Web Apps - Deep Dive
Azure Web Apps - Deep DiveAzure Web Apps - Deep Dive
Azure Web Apps - Deep Dive
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
 
WSO2Con USA 2017: Positioning WSO2 for Quicker Uptake
WSO2Con USA 2017: Positioning WSO2 for Quicker UptakeWSO2Con USA 2017: Positioning WSO2 for Quicker Uptake
WSO2Con USA 2017: Positioning WSO2 for Quicker Uptake
 
Embedded Reporting Tools to Enhance Your Application
Embedded Reporting Tools to Enhance Your ApplicationEmbedded Reporting Tools to Enhance Your Application
Embedded Reporting Tools to Enhance Your Application
 
Integrating Customized Reports, Dashboards & Analysis into Your Application
Integrating Customized Reports, Dashboards & Analysis into Your ApplicationIntegrating Customized Reports, Dashboards & Analysis into Your Application
Integrating Customized Reports, Dashboards & Analysis into Your Application
 
BD Thomson Reuters
BD Thomson ReutersBD Thomson Reuters
BD Thomson Reuters
 
Tech Tuesdays SAP Connectivity
Tech Tuesdays SAP ConnectivityTech Tuesdays SAP Connectivity
Tech Tuesdays SAP Connectivity
 
WSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API ArchitectureWSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API Architecture
 
What is the right SharePoint Cloud Strategy for My Business?
What is the right SharePoint Cloud Strategy for My Business? What is the right SharePoint Cloud Strategy for My Business?
What is the right SharePoint Cloud Strategy for My Business?
 

Viewers also liked

Scaling SharePoint 2016 Farms with MinRole & Other Tools
Scaling SharePoint 2016 Farms with MinRole & Other ToolsScaling SharePoint 2016 Farms with MinRole & Other Tools
Scaling SharePoint 2016 Farms with MinRole & Other ToolsSPC Adriatics
 
OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)
OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)
OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)SPC Adriatics
 
SharePoint 2016 Hybrid Sites Inside Out
SharePoint 2016 Hybrid Sites Inside OutSharePoint 2016 Hybrid Sites Inside Out
SharePoint 2016 Hybrid Sites Inside OutSPC Adriatics
 
Role based views in Project and Resource Center
Role based views in Project and Resource CenterRole based views in Project and Resource Center
Role based views in Project and Resource CenterSPC Adriatics
 
Faster than a flash behind the scenes of patching SharePoint Online
Faster than a flash   behind the scenes of patching SharePoint OnlineFaster than a flash   behind the scenes of patching SharePoint Online
Faster than a flash behind the scenes of patching SharePoint OnlineSPC Adriatics
 
How the Cloud Changes Business Solution Design and Delivery
How the Cloud Changes Business Solution Design and DeliveryHow the Cloud Changes Business Solution Design and Delivery
How the Cloud Changes Business Solution Design and DeliverySPC Adriatics
 
Office Online Server 2016 - a must for on-premises installation for SharePoin...
Office Online Server 2016 - a must for on-premises installation for SharePoin...Office Online Server 2016 - a must for on-premises installation for SharePoin...
Office Online Server 2016 - a must for on-premises installation for SharePoin...SPC Adriatics
 
CBAP 複習討論(四) 20150523
CBAP 複習討論(四) 20150523CBAP 複習討論(四) 20150523
CBAP 複習討論(四) 20150523moris lee
 
A compartmental model_for_the_bicoid_gradient
A compartmental model_for_the_bicoid_gradientA compartmental model_for_the_bicoid_gradient
A compartmental model_for_the_bicoid_gradientMadhur Mangalam
 
Top Latin American Private Companies in 2015
Top Latin American Private Companies in 2015Top Latin American Private Companies in 2015
Top Latin American Private Companies in 2015PrivCo
 
Modules and injector
Modules and injectorModules and injector
Modules and injectorEyal Vardi
 
PHARMACOLOGY OF PEPTIC ULCER
PHARMACOLOGY OF PEPTIC ULCERPHARMACOLOGY OF PEPTIC ULCER
PHARMACOLOGY OF PEPTIC ULCERlove yogi
 
Creating Workflows in Project Online
Creating Workflows in Project OnlineCreating Workflows in Project Online
Creating Workflows in Project OnlineSPC Adriatics
 
From analyses to successful Implementation
From analyses to successful ImplementationFrom analyses to successful Implementation
From analyses to successful ImplementationSPC Adriatics
 
SharePoint 2013 Search Operations
SharePoint 2013 Search OperationsSharePoint 2013 Search Operations
SharePoint 2013 Search OperationsSPC Adriatics
 

Viewers also liked (18)

Scaling SharePoint 2016 Farms with MinRole & Other Tools
Scaling SharePoint 2016 Farms with MinRole & Other ToolsScaling SharePoint 2016 Farms with MinRole & Other Tools
Scaling SharePoint 2016 Farms with MinRole & Other Tools
 
OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)
OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)
OneDrive, TwoDrive, Whiterive, BlueDrive (hahaha)
 
SharePoint 2016 Hybrid Sites Inside Out
SharePoint 2016 Hybrid Sites Inside OutSharePoint 2016 Hybrid Sites Inside Out
SharePoint 2016 Hybrid Sites Inside Out
 
Role based views in Project and Resource Center
Role based views in Project and Resource CenterRole based views in Project and Resource Center
Role based views in Project and Resource Center
 
Faster than a flash behind the scenes of patching SharePoint Online
Faster than a flash   behind the scenes of patching SharePoint OnlineFaster than a flash   behind the scenes of patching SharePoint Online
Faster than a flash behind the scenes of patching SharePoint Online
 
How the Cloud Changes Business Solution Design and Delivery
How the Cloud Changes Business Solution Design and DeliveryHow the Cloud Changes Business Solution Design and Delivery
How the Cloud Changes Business Solution Design and Delivery
 
Office 365 Video
Office 365 VideoOffice 365 Video
Office 365 Video
 
Office Online Server 2016 - a must for on-premises installation for SharePoin...
Office Online Server 2016 - a must for on-premises installation for SharePoin...Office Online Server 2016 - a must for on-premises installation for SharePoin...
Office Online Server 2016 - a must for on-premises installation for SharePoin...
 
CBAP 複習討論(四) 20150523
CBAP 複習討論(四) 20150523CBAP 複習討論(四) 20150523
CBAP 複習討論(四) 20150523
 
A compartmental model_for_the_bicoid_gradient
A compartmental model_for_the_bicoid_gradientA compartmental model_for_the_bicoid_gradient
A compartmental model_for_the_bicoid_gradient
 
Top Latin American Private Companies in 2015
Top Latin American Private Companies in 2015Top Latin American Private Companies in 2015
Top Latin American Private Companies in 2015
 
Modules and injector
Modules and injectorModules and injector
Modules and injector
 
Leppmi 2016
Leppmi  2016Leppmi  2016
Leppmi 2016
 
PHARMACOLOGY OF PEPTIC ULCER
PHARMACOLOGY OF PEPTIC ULCERPHARMACOLOGY OF PEPTIC ULCER
PHARMACOLOGY OF PEPTIC ULCER
 
Creating Workflows in Project Online
Creating Workflows in Project OnlineCreating Workflows in Project Online
Creating Workflows in Project Online
 
From analyses to successful Implementation
From analyses to successful ImplementationFrom analyses to successful Implementation
From analyses to successful Implementation
 
SharePoint 2013 Search Operations
SharePoint 2013 Search OperationsSharePoint 2013 Search Operations
SharePoint 2013 Search Operations
 
Tocixity studies
Tocixity studiesTocixity studies
Tocixity studies
 

Similar to SharePoint Governance and Compliance

Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Managementjadams6
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014Alexey Vlasenko
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3Abe Newton
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Frameworkssuser65fa31
 
Using information management to support data driven actions
Using information management to support data driven actionsUsing information management to support data driven actions
Using information management to support data driven actionsManoj Vig
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionKesavan Munuswamy
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010prevalentnetworks
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of ITICAB - ITK Chapter 3 Class 9-10 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of ITMohammad Abdul Matin Emon
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?boldonjames
 
Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And ComplianceMicrosoft
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 

Similar to SharePoint Governance and Compliance (20)

Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Management
 
O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014O365 security and privacy de_novo_event_july2014
O365 security and privacy de_novo_event_july2014
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
Using information management to support data driven actions
Using information management to support data driven actionsUsing information management to support data driven actions
Using information management to support data driven actions
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
 
Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010Lunch and Learn: June 29, 2010
Lunch and Learn: June 29, 2010
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Security audit
Security auditSecurity audit
Security audit
 
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of ITICAB - ITK Chapter 3 Class 9-10 - Management of IT
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?Boldon James - SharePoint: information security's weakest link?
Boldon James - SharePoint: information security's weakest link?
 
Office 365 Security And Compliance
Office 365 Security And ComplianceOffice 365 Security And Compliance
Office 365 Security And Compliance
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
 

More from SPC Adriatics

How to secure your data in Office 365
How to secure your data in Office 365 How to secure your data in Office 365
How to secure your data in Office 365 SPC Adriatics
 
Do you know, where your sensitive data is?
Do you know, where your sensitive data is?Do you know, where your sensitive data is?
Do you know, where your sensitive data is?SPC Adriatics
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSPC Adriatics
 
The key to a successful Office 365 implementation is adoption
The key to a successful Office 365 implementation is adoptionThe key to a successful Office 365 implementation is adoption
The key to a successful Office 365 implementation is adoptionSPC Adriatics
 
Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?
Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?
Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?SPC Adriatics
 
What's New for the BI workload in SharePoint 2016 and SQL Server 2016
What's New for the BI workload in SharePoint 2016 and SQL Server 2016What's New for the BI workload in SharePoint 2016 and SQL Server 2016
What's New for the BI workload in SharePoint 2016 and SQL Server 2016SPC Adriatics
 
Creating a Great User Experience in SharePoint
Creating a Great User Experience in SharePointCreating a Great User Experience in SharePoint
Creating a Great User Experience in SharePointSPC Adriatics
 
Introduction to AngularJS with the Microsoft Graph
Introduction to AngularJS with the Microsoft GraphIntroduction to AngularJS with the Microsoft Graph
Introduction to AngularJS with the Microsoft GraphSPC Adriatics
 
Alternative Approaches to Solution Development in SharePoint and Office 365
Alternative Approaches to Solution Development in SharePoint and Office 365Alternative Approaches to Solution Development in SharePoint and Office 365
Alternative Approaches to Solution Development in SharePoint and Office 365SPC Adriatics
 
SharePoint Add-In Model:The Good, The Bad, The Ugly
SharePoint Add-In Model:The Good, The Bad, The UglySharePoint Add-In Model:The Good, The Bad, The Ugly
SharePoint Add-In Model:The Good, The Bad, The UglySPC Adriatics
 
An Introduction to the Office 365 Patterns and Practices Project
An Introduction to the Office 365 Patterns and Practices ProjectAn Introduction to the Office 365 Patterns and Practices Project
An Introduction to the Office 365 Patterns and Practices ProjectSPC Adriatics
 
Getting started with the PnP Provisioning Engine
Getting started with the PnP Provisioning EngineGetting started with the PnP Provisioning Engine
Getting started with the PnP Provisioning EngineSPC Adriatics
 
Introduction to Office 365 PnP- Reusable solutions
Introduction to Office 365 PnP- Reusable solutionsIntroduction to Office 365 PnP- Reusable solutions
Introduction to Office 365 PnP- Reusable solutionsSPC Adriatics
 
Office 365 Connectors
Office 365 ConnectorsOffice 365 Connectors
Office 365 ConnectorsSPC Adriatics
 
Connecting to External Data On-Prem in Office 365 SharePoint Online
Connecting to External Data On-Prem in Office 365 SharePoint OnlineConnecting to External Data On-Prem in Office 365 SharePoint Online
Connecting to External Data On-Prem in Office 365 SharePoint OnlineSPC Adriatics
 
Getting Started with Project Online
Getting Started with Project OnlineGetting Started with Project Online
Getting Started with Project OnlineSPC Adriatics
 
It's not about the tool, it's about productivity
It's not about the tool, it's about productivityIt's not about the tool, it's about productivity
It's not about the tool, it's about productivitySPC Adriatics
 

More from SPC Adriatics (17)

How to secure your data in Office 365
How to secure your data in Office 365 How to secure your data in Office 365
How to secure your data in Office 365
 
Do you know, where your sensitive data is?
Do you know, where your sensitive data is?Do you know, where your sensitive data is?
Do you know, where your sensitive data is?
 
Securing Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management ServicesSecuring Intellectual Property using Azure Rights Management Services
Securing Intellectual Property using Azure Rights Management Services
 
The key to a successful Office 365 implementation is adoption
The key to a successful Office 365 implementation is adoptionThe key to a successful Office 365 implementation is adoption
The key to a successful Office 365 implementation is adoption
 
Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?
Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?
Microsoft BI demystified: SharePoint 2016 BI or for PowerBI v2?
 
What's New for the BI workload in SharePoint 2016 and SQL Server 2016
What's New for the BI workload in SharePoint 2016 and SQL Server 2016What's New for the BI workload in SharePoint 2016 and SQL Server 2016
What's New for the BI workload in SharePoint 2016 and SQL Server 2016
 
Creating a Great User Experience in SharePoint
Creating a Great User Experience in SharePointCreating a Great User Experience in SharePoint
Creating a Great User Experience in SharePoint
 
Introduction to AngularJS with the Microsoft Graph
Introduction to AngularJS with the Microsoft GraphIntroduction to AngularJS with the Microsoft Graph
Introduction to AngularJS with the Microsoft Graph
 
Alternative Approaches to Solution Development in SharePoint and Office 365
Alternative Approaches to Solution Development in SharePoint and Office 365Alternative Approaches to Solution Development in SharePoint and Office 365
Alternative Approaches to Solution Development in SharePoint and Office 365
 
SharePoint Add-In Model:The Good, The Bad, The Ugly
SharePoint Add-In Model:The Good, The Bad, The UglySharePoint Add-In Model:The Good, The Bad, The Ugly
SharePoint Add-In Model:The Good, The Bad, The Ugly
 
An Introduction to the Office 365 Patterns and Practices Project
An Introduction to the Office 365 Patterns and Practices ProjectAn Introduction to the Office 365 Patterns and Practices Project
An Introduction to the Office 365 Patterns and Practices Project
 
Getting started with the PnP Provisioning Engine
Getting started with the PnP Provisioning EngineGetting started with the PnP Provisioning Engine
Getting started with the PnP Provisioning Engine
 
Introduction to Office 365 PnP- Reusable solutions
Introduction to Office 365 PnP- Reusable solutionsIntroduction to Office 365 PnP- Reusable solutions
Introduction to Office 365 PnP- Reusable solutions
 
Office 365 Connectors
Office 365 ConnectorsOffice 365 Connectors
Office 365 Connectors
 
Connecting to External Data On-Prem in Office 365 SharePoint Online
Connecting to External Data On-Prem in Office 365 SharePoint OnlineConnecting to External Data On-Prem in Office 365 SharePoint Online
Connecting to External Data On-Prem in Office 365 SharePoint Online
 
Getting Started with Project Online
Getting Started with Project OnlineGetting Started with Project Online
Getting Started with Project Online
 
It's not about the tool, it's about productivity
It's not about the tool, it's about productivityIt's not about the tool, it's about productivity
It's not about the tool, it's about productivity
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

SharePoint Governance and Compliance

  • 1.
  • 2.
  • 3.
  • 6. Executive stakeholders Business division leaders Financial stakeholders Software development leaders IT managers Technical specialists Trainers Influential information workers Information architects or taxonomists Compliance officers
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15. Communications Sponsor roadmap Training Coaching Resistance management Change management tools Individual phases of change (ADKAR® ) Awareness Desire Reinforcement™ Knowledge Ability
  • 16.
  • 18. Continuous Compliance in Office 365 Built-in capabilities for compliance with standards Enable customers to meet global compliance standards in ISO 27001, EUMC, HIPAA, FISMA Contractually commit to privacy, security and handling of customer data through Data Processing Agreements Customer controls for compliance with internal policies Admin Controls like Data Loss Prevention, Archiving, E- Discovery to enable organizational compliance
  • 19. SSAE/SOC ISO27001 EUMC FERPA FISMA/FedRAMP HIPAA HITECH ITAR HMG IL2 CJIS Article 29 + SOC 2 Global Global Europe U.S. U.S. U.S. U.S. U.S. UK U.S. Europe Global Finance Global Europe Education Government Healthcare Healthcare Defense Government Law Enforcement Europe Global Standards Certifications Market Region +EU Data Protection Authorities validate Microsoft’s approach to privacy
  • 20. How Office 365 does Compliance Physical Security Security Best Practices Secure Network Layer Data Encryption Office 365 Service | Control Sets | Certifications DLP OME SMIME RBAC RMS Account Mgmt. Incident Monitoring Data Encryption Encryption of stored data and more… Data Minimization & Retention New Cert’s and more… Access Control Built-in Capabilities Customer Controls
  • 21. 0.43M 1.53M 3.94M 9.50M 39 122 172 313 457 653 Compliance Controls ISO27001 HIPAA BAA DPASAS70 FedRAMP CJIS SOC 2 Type 2 ISO27018 MLPS OFFICIAL IRS1075 DISA IL2 1017 3 3 3 4 9 10 13 Workloads in Boundary Transparency Milestones Proof of ISO report FISMA quarterly contmon reports Finserv summits FedRAMP monthly contmon reports Control sharing, deep contmon, trust.microsoft.com for finserv 2010 2011 2013 2014 2015 ITARMT BPOS-D FERPA SOC 1 Type 2 EU Model Clauses FISMA EU Safe Harbor 2008 2009 2010 2011 2012 2013 2014 201x 3 4 5 8 9 17 Total certifications / standards compliant to 2
  • 22.
  • 23. Risk Confidentiality Integrity Availability On Premises Cloud On Premises Cloud On Premises Cloud Mitigate Customer Shared Customer Microsoft Customer Microsoft Accept Customer Shared Customer Shared Customer Shared Transfer - Microsoft (Contracts & Compliance) - Microsoft (Contracts & Compliance) - Microsoft (SLA)
  • 25. Ever Evolving Approach to Compliance Market & Competitive Intelligence Compliance Management Framework Regulatory Impact Analysis (RSIA) Define Security, and Privacy controls Determine Implementation Requirements Implement Controls Document Implementation Continuous Monitoring Independent verification (Audits) Remediation Prioritize
  • 26. Have services independently audited for compliance with this standard Key Principles - Cloud providers must: Not use data for advertising or marketing unless express consent is obtained Be transparent about data location and how data is handled Be accountable to determine if customer data was impacted by a breach of information security Communicate to customers and regulators in the event of a breach Provide customers with control over how their data is used
  • 27. How Office 365 does Compliance Physical Security Security Best Practices Secure Network Layer Data Encryption Office 365 Service | Control Sets | Certifications DLP OME SMIME RBAC RMS Account Mgmt. Incident Monitoring Data Encryption Encryption of stored data and more… Data Minimization & Retention New Cert’s and more… Access Control Built-in Capabilities Customer Controls
  • 28. Control Effectiveness Assessment (Audit) Schedule Nov 2014 Dec 2015 Jan 2015 Feb 2015 Mar 2015 Apr 2015 May 2015 Jun 2015 Jul 2015 Aug 2015 Sep 2015 Oct 2015 Nov 2015 ISO FedRAMP MT ISAE3402/SOC ITAR ISO Control Effectiveness Assessment (Audit) Schedule Nov 2014 Dec 2015 Jan 2015 Feb 2015 Mar 2015 Apr 2015 May 2015 Jun 2015 Jul 2015 Aug 2015 Sep 2015 Oct 2015 Nov 2015 ISO FedRAMP MT ISAE3402/SOC ISO Audit cadence
  • 29. Trust but verify Share latest audit reports (Third-party verification) Compliance Program (Right to Examine*) Transparency and Control through Continuous monitoring * For larger highly regulated customers
  • 30.  Part of the responsibility for the secure management of the service lies with each customer. Managing Risk Office 365 supports a high degree of customer configuration • Account Management • Access control • Segregation of duties • Awareness and training • Support requests • Use flexible customer controls in Office 365 Customers must put the following controls in place to ensure the security of their data
  • 31. Compliance controls Helps to Identify monitor protect Sensitive data through deep content analysis Identify Protect Monitor End user education
  • 32. ALERT CLASSIFY ENCRYPT APPEND OVERRIDE REVIEW REDIRECT BLOCK Flexible tools for policy enforcement that provide the right level of control Transport Rules Rights Management Data Loss Prevention
  • 33. Email archiving and retention Preserve Search Secondary mailbox with separate quota Managed through EAC or PowerShell Available on-premises, online, or through EOA Automated and time- based criteria Set policies at item or folder level Expiration date shown in email message Capture deleted and edited email messages Time-Based In-Place Hold Granular Query-Based In-Place Hold Optional notification Web-based eDiscovery Center and multi-mailbox search Search primary, In-Place Archive, and recoverable items Delegate through roles-based administration De-duplication after discovery Auditing to ensure controls are met In-Place Archive Governance Hold eDiscovery
  • 34.
  • 35.
  • 36. Privacy by design means that we do not use your information for anything other than providing you services No advertising products out of Customer Data No scanning of email or documents to build analytics or mine data Various customer controls at admin and user level to enable or regulate sharing If the customer decides to leave the service, they get to take to take their data and delete it in the service Access to information about geographical location of data, who has access and when Notification to customers about changes in security, privacy and audit information
  • 37. Office 365 Trust Center http://trust.office365.com Office 365 Blog http://blogs.office.com/ • Enabling transparency and control • Enhancing transparency and control for Office 365 customers • Customer Lockbox • Office 365 management activity API for security and compliance monitoring Whitepapers Overview of Security http://aka.ms/securitywhitepaper Overview of Security and Compliance in Office 365 Customer controls for Information Protection http://aka.ms/customercontrolsm Law Enforcement Requests Report http://www.microsoft.com/about/corporatecitizenship/en- us/reporting/transparency/