to be a UK or - SharePoint Saturday Events

advertisement
Edge Pereira
edge.pereira@avanade.com
Twitter: @superedge
Our Agenda for Today (plan)
•
•
•
•
•
Data Loss Prevention
eDiscovery
Auditing
Document Fingerprinting
Encrypted Emails
“Faced with never-ending and expanding regulatory and industry
mandates, organizations invest tremendous amounts of energy on
audit, compliance, controls, and (in some cases) risk management.
At the same time, they seek to free staff resources from mundane
tasks such as evidence gathering and simple reporting.”
Source: Gartner Report: IT Governance, Risk, and Compliance Management Solutions, http://www.gartner.com/resId=1884814
Records Compromised in 2014
“By far, the most common record type exposed in 2014 were passwords, followed by usernames, email addresses, and PII (name,
address, SSN, DOB, phone number, etc.)…”
1 Billion
Criminals are starting to favor PII
over financial information, because
it's easier to sell and leverage
Source: http://www.cio.com/article/2848593/data-breach/nearly-a-billion-records-were-compromised-in-2014.html
Why are we here?
Compliance – What is it?
Why do we need to take compliance seriously?
So what is Microsoft doing?
eDiscovery
Encryption
Information
Management
Policies
Records Management
Auditing
Two faces of compliance in Office 365
Built-in Office 365 capabilities
(global compliance)
Customer controls for
compliance/internal policies
•
Access Control
•
Data Loss Prevention
•
Auditing and Logging
•
Archiving
•
Continuity Planning
•
eDiscovery
•
Incident Response
•
Encryption
•
Risk Assessment
•
S/MIME
•
Communications Protection
•
Legal Hold
•
Identification and Authorisation
•
Rights Management
•
Information Integrity
•
Awareness and Training
In practise, it looks like this
What does your organisation get?
•
•
•
•
•
•
So what does all that boil down to for ITPro’s?
It is all about customer controls!
Remembering
“A control is a process, function, in fact anything that supports
maintaining compliance”
Lets look at Office 365 customer controls
Identify
Monitor
Protect
Educate
Data Loss
Prevention
By 2018, Data Leakage Protection
50%
Of the IT organizations will use security services firms that
specialize in data protection, security risk management and
security infrastructure management to enhance their security
postures
Source: http://www.gartner.com/newsroom/id/2828722
What is meant by Data Loss Prevention?
(network traffic)
at-rest (data storage)
in-use (endpoint actions) in-motion
“Quotation...”
Good definition
http://csrc.nist.gov/groups/SNS/rbac/documents/data-loss.pdf
[1]
http://en.wikipedia.org/wiki/Data_loss_prevention_software
In-use controls (end-point)
•
•
•
•
•
•
Operating System and Apps fully patched and up to date
End-point security tools installed and correctly configured
Firewall enabled and correctly configured
Access to required applications only
Access to “need to know” data
Compliance Adherence Monitoring
At-rest controls
Country
PII
Financial
USA
US State Security Breach Laws,
US State Social Security Laws, COPPA
GLBA & PCI-DSS
(Credit, Debit Card, Checking
and
Savings, ABA, Swift Code)
Germany
EU data protection,
Drivers License, Passport National Id
EU Credit, Debit Card,
IBAN, VAT, BIC, Swift Code
UK
Canada
France
Japan
Data Protection Act,
UK National Insurance, Tax Id, UK
Driver License, Passport
EU Credit, Debit Card,
IBAN, BIC, VAT, Swift Code
PIPED Act,
Social Insurance, Drivers License
Credit Card,
Swift Code
EU data protection,
Data Protection Act,
National Id (INSEE),
Drivers License, Passport
EU Credit, Debit Card,
IBAN, BIC, VAT,
Swift Code
PIPA,
Resident Registration, Social
Insurance, Passport, Driving License
Credit Card,
Bank Account,
Swift Code
Health
Limited Investment:
US HIPPA,
UK Health Service,
Canada Health Insurance
card
Rely on Partners and ISVs
Establishing DLP
•
•
•
Australian sensitive
information types
provided by Microsoft
• Bank Account Number
• Driver's License Number
• Medicare Account
Number
• Passport Number
• Tax File Number
DEMO: Data Loss
Prevention
eDiscovery
What do we means by eDiscovery?
[2]
Wikipedia (http://en.wikipedia.org/wiki/Electronic_discovery)
eDiscovery Process
DISCOVERY
Find relevant content (documents, emails, Lync conversions)
PRESERVATION
Place content on legal hold to prevent content modification
and/or removal
COLLECTION
Collect and send relevant content for processing
PROCESSING
Prepare files for review
REVIEW
PRODUCTION
Lawyers determine which content will be
supplied to opposition
Provide relevant content to opposition
Office 365 eDiscovery Centre
In-place Hold
Find what you need
•
•
Export for action
eDiscovery Considerations
•
•
•
Recoverable Items quotas separate from mailbox quotas and
need to be monitored
In-Place Hold vs. Single Item Recovery vs. Retention Hold
Hybrid data sources
eDiscovery Reports
Important Benefits
•
•
•
Centrally managed proactive enforcement
Reduced collection touch points
Consistent and repeatable
•
•
•
Transparent to users
Minimises the need for offline copies, until they are needed
Instantly searchable/exportable
DEMO:
eDiscovery
Auditing
Reporting and Auditing
SharePoint – Auditing Features
SharePoint Audit Reports
DEMO: Document
Fingerprinting
DEMO: Encrypted
Email
Q&A
Wrap Up
•
•
•
•
•
Data Loss Prevention
eDiscovery
Auditing
Document Fingerprinting
Encrypted Emails
Edge Pereira
edge@superedge.net
www.facebook.com/edgepmo
www.twitter.com/superedge
www.superedge.net
DLP extensibility points
Content Analysis Process
Get
Content
Joseph F. Foster
Visa: 4485 3647 3952 7352
Expires: 2/2012
RegEx
Analysis
4485 3647 3952 7352  a 16 digit number
is detected
Function
Analysis
1. 4485 3647 3952 7352  matches checksum
2. 1234 1234 1234 1234  does NOT match
Additional
Evidence
1. Keyword Visa is near the number
2. A regular expression for date (2/2012)
is near the number
Verdict
1. There is a regular expression that matches
a check sum
2. Additional evidence increases confidence
Content analysis process
Encryption Solutions in Office 365
Office 365 Message Encryption – Encrypt messages to any SMTP address
Information Rights Management – Encrypt content and restrict usage; usually
within own organization or trusted partners
S/MIME – Sign and encrypt messages to users using certificates
Registry Key Outlook Client
Download