intelligent security, compliance and privacy in office 365

51
Intelligent Security, Compliance and Privacy in Office 365 by Miguel Isidoro December 17 th , 2016

Upload: miguel-isidoro

Post on 12-Feb-2017

95 views

Category:

Engineering


3 download

TRANSCRIPT

Page 1: Intelligent Security, Compliance and Privacy in Office 365

Intelligent Security, Compliance and Privacy in Office 365by Miguel Isidoro

December 17th, 2016

Page 2: Intelligent Security, Compliance and Privacy in Office 365

Our SponsorsGOLD SPONSORS

SILVER SPONSORS BRONZE SPONSORS

Page 3: Intelligent Security, Compliance and Privacy in Office 365

Who Am I?Miguel IsidoroSenior SharePoint & Office 365 Consultant

[email protected]://www.linkedin.com/in/miguelisidorohttps://blogit.create.pt/miguelisidorohttp://www.create.pt

Page 4: Intelligent Security, Compliance and Privacy in Office 365

Agenda Platform Security Privacy Compliance Transparency Advanced Threat Protection Roadmap

Page 5: Intelligent Security, Compliance and Privacy in Office 365

Platform Security

Page 6: Intelligent Security, Compliance and Privacy in Office 365

Trust in Office 365

Control and Management

Privacy Compliance Security

HIGH AVAILABILITY & GLOBAL SCALABILITY

http://trust.office365.com

Transparency

99.98%

Page 7: Intelligent Security, Compliance and Privacy in Office 365

• The world's largest network of high security data centers

• Encrypted information at rest and in transit• At rest: all files are encrypted using:

• Disk level encryption - BitLocker encrypts all data on disk• Per-file encryption – files are broken down into chunks

individually encrypted with per-file unique encryption keys that are themselves encrypted and stored in a physically separate location

• In transit: every file in SharePoint and OneDrive is encrypted using TLS (1.0, 1.1 and 1.2) with 2048-bit keys

• Bring you own encryption key*

Platform Security

Page 8: Intelligent Security, Compliance and Privacy in Office 365

Privacy

Page 9: Intelligent Security, Compliance and Privacy in Office 365

• Differentiated Access Policies• Greater control over external sharing• Granular Access Controls*

Privacy

Page 10: Intelligent Security, Compliance and Privacy in Office 365

• User• Who you are, what is your role• Device• Are you accessing from a managed or unmanaged device• Location• Are you accessing from a expected or unexpected

location• Sensitivity of information• What is the sensitity of the data you are acessing?

Differentiated Access Policies

Page 11: Intelligent Security, Compliance and Privacy in Office 365

• Greater control over external sharing• Don’t allow sharing with users from blocked domains• Allow sharing with users from specific domains

External Sharing

Page 12: Intelligent Security, Compliance and Privacy in Office 365

• Sharing window duration• When sharing with external users, it is possible to set an

expiration window

External Sharing

Page 13: Intelligent Security, Compliance and Privacy in Office 365

• Allows admins to configure more granular roles for users

• Instead of just having 2 roles like before (“User” and “Global administrator”), there are now more roles available

Granular Access Controls

Page 14: Intelligent Security, Compliance and Privacy in Office 365

Compliance

Page 15: Intelligent Security, Compliance and Privacy in Office 365

• Security & Compliance Center• Data Loss Prevention (DLP)• Information Rights Management• Mobile Device Management

Compliance

Page 16: Intelligent Security, Compliance and Privacy in Office 365

• New portal for centralized management of security and compliance related policies. Includes:• Document retention

policies• In-place hold• Data Loss Prevention

(DLP)• eDiscovery• Audit log search• etc

Security & Compliance Center

Gestão centralizada de políticas de hold, eliminação e DLP no SharePoint

Page 17: Intelligent Security, Compliance and Privacy in Office 365

• Data Loss Protection (DLP) is one of the pieces of the Compliance offering in Office 365 which allows the management of compliance across Office 365, Exchange Online and SharePoint Online to protect sensitive information

• Office 365 includes more than 80 types of sensitive information out of the box and growing. Some examples:• Credit Card Number• Social Security Number• National Id Number

Data Loss Prevention

Page 18: Intelligent Security, Compliance and Privacy in Office 365

• To create a policy we must define:• What content to protect• When and how to protect• Conditions - the content must match before the rule is enforced --

for example, look only for content containing Social Security numbers that have been shared with people outside your organization

• Actions - that you want the rule to take automatically when content matching the conditions is found -- for example, block access to the document and send both the user and compliance officer an email notification

Data Loss Prevention

Page 19: Intelligent Security, Compliance and Privacy in Office 365

Data Loss Prevention (Policy Tips)

Create security policies, notify users when policy violations occur, and block access to sensitive content

Page 20: Intelligent Security, Compliance and Privacy in Office 365

DemoData Loss Prevention

Page 21: Intelligent Security, Compliance and Privacy in Office 365

• Allows admins to define policies to protect content in the following ways:

• Helps to prevent an authorized viewer from copying, modifying, printing, faxing, or copying and pasting the content for unauthorized use

• Helps to prevent an authorized viewer from copying the content by using the Print Screen feature in Microsoft Windows

• Helps to prevent an unauthorized viewer from viewing the content if it is sent in e-mail after it is downloaded from the server

• Restricts access to content to a specified period of time, after which users must confirm their credentials and download the content again

• Helps to enforce corporate policies that govern the use and dissemination of content within your organization

Important: Policies are still applied even if documents are downloaded and copied to an offline location

Information Rights Management (IRM)

Page 22: Intelligent Security, Compliance and Privacy in Office 365

• Mobile Device Management for Office 365 (~2m) – Link

Mobile Device Management for Office 365

Page 23: Intelligent Security, Compliance and Privacy in Office 365

• Allows to manage mobile devices (iPads, iPhone, Android, Windows Phone) in order to access information in Office 365 resources securely. Some features:

• Set up device policies like password requirements and security settings

• Prevent jail broken or rooted devices from connecting

• Selective Wipe

Mobile Device Management for Office 365

Page 24: Intelligent Security, Compliance and Privacy in Office 365

Mobile Device Management for Office 365

Page 25: Intelligent Security, Compliance and Privacy in Office 365

Mobile Device Management for Office 365

Page 26: Intelligent Security, Compliance and Privacy in Office 365

• Fore more advanced features, use Microsoft Intune (available through separate subscription or Enterprise Mobility + Security)

• Device management in Intune performed using Azure Portal and Intune Management Console (not in Office 365 Security & Compliance Center)

• Some of the features:• Prevent cut/copy/paste/save as of data from corporate apps to

personal apps• Management of PC devices (ex: software update management, app

deployment, etc)• Comprehensive PC management (e.g. Group Policy, login scripts,

BitLocker management, virtual desktop and power management, custom reporting, etc.)

Microsoft Intune

Page 27: Intelligent Security, Compliance and Privacy in Office 365

DemoMobile Device Management (Intune)

Page 28: Intelligent Security, Compliance and Privacy in Office 365

Transparency

Page 29: Intelligent Security, Compliance and Privacy in Office 365

• Customer Lockbox (Office 365)• SharePoint Insights

Transparency

Page 30: Intelligent Security, Compliance and Privacy in Office 365

• Customer Lockbox Video (~2m) – LinkCustomer Lockbox

Page 31: Intelligent Security, Compliance and Privacy in Office 365

• You must provide explicit permission for Microsoft to access your data

• When access is granted, it’s given on a just-in-time basis and documented for total transparency

• Microsoft engineers do not have standing access to your data

Customer Lockbox

Page 32: Intelligent Security, Compliance and Privacy in Office 365

Important: Access to content is given by the customer!

Customer Lockbox (Flow)

CustomerMicrosoft Engineer

Lockbox system

Microsoft Manager

Microsoft Engineer

Customer

Creates support ticket

Creates support ticket

Microsoft receives approval request

Microsoft approves request

Customer approves request

Page 33: Intelligent Security, Compliance and Privacy in Office 365

• Audit Log Search• DLP Policy Matches• Reports

SharePoint Insights

Page 34: Intelligent Security, Compliance and Privacy in Office 365

• Allows to search the audit logs and view:• User activity in SharePoint Online and OneDrive for Business (Ex:

Viewed Files, Downloaded Files, Deleted Files, etc)• User activity in Exchange Online• Admin activity in SharePoint Online• Admin activity in Azure Active Directory• Admin activity in Exchange Online• User and admin activity in Sway• User and admin activity in Power BI for Office 365• User and admin activity in Yammer

• Audit Log will be able to show aggregated auditing records from SharePoint Online and SharePoint Server (On-Premise)*

Audit Log Search

Page 35: Intelligent Security, Compliance and Privacy in Office 365

Audit Log Search

Page 36: Intelligent Security, Compliance and Privacy in Office 365

Audit Log Search

Page 37: Intelligent Security, Compliance and Privacy in Office 365

• Allows admins to view reports of DLP policy violations

DLP Policy Matches

Page 38: Intelligent Security, Compliance and Privacy in Office 365

• Allows admins to view several reports:• Auditing reports• Device management reports• Data Loss Prevention reports

Reports

Page 39: Intelligent Security, Compliance and Privacy in Office 365

DemoSharePoint Insights

Page 40: Intelligent Security, Compliance and Privacy in Office 365

Advanced Threat Protection

Page 41: Intelligent Security, Compliance and Privacy in Office 365

• Stay Secure with Advanced Threat Protection in Office 365 (~1m) – Link

Advanced Threat Protection

Page 42: Intelligent Security, Compliance and Privacy in Office 365

• An advanced email filtering service that provides additional protection against specific types of advanced threats

• It contains:• Safe Attachments• Safe Links

Advanced Threat Protection

Page 43: Intelligent Security, Compliance and Privacy in Office 365

• Allows the safe delivery of attachments upon a prior analysis

• Analysis is made in a sandboxed environment

Safe Attachments

Page 44: Intelligent Security, Compliance and Privacy in Office 365

• All attachments are now analysed in an sandboxed environment and files are only delived if considered safe. Sandbox looks for:

• Files running executables

• Files requesting elevation of priviligies

• Files making registry calls

Safe Attachments

Page 45: Intelligent Security, Compliance and Privacy in Office 365

• Real time, time-of-click protection against malicious URLs

• Allows links in the body of the email can be rewritten to prevent users to go to malicious URL when they click on a malicious link

Safe Links

Page 46: Intelligent Security, Compliance and Privacy in Office 365

Safe Links• If users click on malicious URL, an intermediate page is shown

Page 47: Intelligent Security, Compliance and Privacy in Office 365

Roadmap

Page 48: Intelligent Security, Compliance and Privacy in Office 365

Roadmap

New data centers: France, South Korea and USABring your own encryption keySharePoint site classificationHybrid SharePoint Auditing (preview)

Q2 and Q3 2016 Q4 2016 and 2017

New data centers: UK, Canada Customer LockboxDLP, MDM and MAMConditional Access Policies

App Discovery Dashboard Multi-factor authentication

https://fasttrack.microsoft.com/roadmap

Page 49: Intelligent Security, Compliance and Privacy in Office 365

Q&A?

Page 50: Intelligent Security, Compliance and Privacy in Office 365

Our SponsorsGOLD SPONSORS

SILVER SPONSORS BRONZE SPONSORS

Page 51: Intelligent Security, Compliance and Privacy in Office 365