Security and Compliance on the Microsoft Business

advertisement
OSP214
SECURITY
PRIVACY
COMPLIANCE
RELIABILITY & SERVICE CONTINUITY
Information Security Policy
Security
Privacy &
Regulatory
Service
Continuity
Compliance Management
3
Microsoft Confidential
4
Strategy: employ a risk-based, multi-dimensional approach to safeguarding services and data
Security Management
Threat & Vulnerability Management, Monitoring & Response
Data
Access Control & Monitoring, File/Data Integrity
User
Account Mgmt, Training & Awareness, Screening
Application
Host
Internal Network
Network perimeter
Facility
Secure Engineering (SDL), Access Control & Monitoring, Anti-Malware
Access Control & Monitoring, Anti-Malware, Patch & Config Mgmt
Dual-factor Auth, Intrusion Detection, Vulnerability scanning
Edge Routers, Firewalls, Intrusion Detection, Vulnerability scanning
Physical controls, video surveillance, Access Control
5
Microsoft believes that delivering secure software requires Executive commitment
SDL a mandatory policy at Microsoft since 2004
Education
Technology and Process
Ongoing Process Improvements
Accountability
Services
(BPOS and FOPE)
Data
Centers
Microsoft
• ISO 27001
• SAS 70 Type I (BPOS-S)
• SAS 70 Type II (BPOS-D)
• ISO 27001
• SAS 70 Type II
• Safe Harbor
7
•
•
•
•
Solution
•
•
8
9
10
11
12
13
14
Microsoft Confidential
15
Business Rules for protecting information and systems
which store and process information
A process or system to assure the implementation of
policy
System or procedural specific
requirements that must be met
Step by step procedures
16
17
18
Microsoft Confidential
19
•
•
•
•
•
•
•
•
20
21
22
• Secondary mailbox
with separate quota
• Appears in Outlook
and Outlook Web
App
• Automated and time-
• Capture deleted and
based criteria
• Set policies at item or
folder level
• Expiry date shown in
email message
edited email
messages
• Search primary,
archive, and
recoverable items
• Offers single item
restore
• Notify user on hold
• EWS Support
• Web-based UI
• Delegate through
roles-based admin
• Annotate content
• De-duplication after
discovery
MailTips
• Alert sender about
possible risks or policy
violations
• Option of customized
MailTips
Transport Rules
• Inspect both messages and
attachments
• Apply controls to all email
sent and received
• Delegate through rolesbased admin
IRM Integration
• Apply IRM automatically
• Access messages in OWA, EAS
• Decrypt protected messages to
enable search, filtering,
journaling, transport rules
• Protect sensitive voicemail
• Extend access to partners
www.microsoft.com/online
http://office365.microsoft.com
http://blogs.technet.com/msonline
http://www.facebook.com/MicrosoftOnlineServices
http://www.youtube.com/user/msonlineservices
http://twitter.com/msonline
Download