Top Banner
Edge Pereira [email protected]
47

Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Jul 16, 2015

Download

Internet

Edge Pereira
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 2: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Our Agenda for Today (plan)

• Data Loss Prevention• eDiscovery• Auditing• Document Fingerprinting• Encrypted Emails

Page 3: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Source: Gartner Report: IT Governance, Risk, and Compliance Management Solutions, http://www.gartner.com/resId=1884814

“Faced with never-ending and expanding regulatory and industry mandates, organizations invest tremendous amounts of energy on audit, compliance, controls, and (in some cases) risk management. At the same time, they seek to free staff resources from mundane tasks such as evidence gathering and simple reporting.”

Page 4: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

“By far, the most common record type exposed in 2014 were passwords, followed by usernames, email addresses, and PII (name, address, SSN, DOB, phone number, etc.)…”

1 BillionCriminals are starting to favor PII over financial information, because it's easier to sell and leverage

Source: http://www.cio.com/article/2848593/data-breach/nearly-a-billion-records-were-compromised-in-2014.html

Records Compromised in 2014

Page 5: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Why are we here?

Page 6: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Compliance – What is it?

Page 7: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Why do we need to take compliance seriously?

Page 8: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

So what is Microsoft doing?

eDiscovery

Auditing

Encryption

Information Management

Policies

Records Management

Page 9: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Two faces of compliance in Office 365

Built-in Office 365 capabilities (global compliance)

Customer controls for compliance/internal policies

• Access Control

• Auditing and Logging

• Continuity Planning

• Incident Response

• Risk Assessment

• Communications Protection

• Identification and Authorisation

• Information Integrity

• Awareness and Training

• Data Loss Prevention

• Archiving

• eDiscovery

• Encryption

• S/MIME

• Legal Hold

• Rights Management

Page 10: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

In practise, it looks like this

Page 11: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

What does your organisation get?

Page 12: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

So what does all that boil down to for ITPro’s?

It is all about customer controls!

Remembering

“A control is a process, function, in fact anything that supports maintaining compliance”

Page 13: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Lets look at Office 365 customer controls

Identify Monitor Protect Educate

Page 14: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Data Loss Prevention

Page 15: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

50%Of the IT organizations will use security services firms that specialize in data protection, security risk management and security infrastructure management to enhance their security postures

Source: http://www.gartner.com/newsroom/id/2828722

By 2018, Data Leakage Protection

Page 16: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

What is meant by Data Loss Prevention?

in-use (endpoint actions) in-motion (network traffic) at-rest (data storage)

[1] http://en.wikipedia.org/wiki/Data_loss_prevention_software

“Quotation...”Good definition

http://csrc.nist.gov/groups/SNS/rbac/documents/data-loss.pdf

Page 17: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

In-use controls (end-point)

• Operating System and Apps fully patched and up to date • End-point security tools installed and correctly configured• Firewall enabled and correctly configured• Access to required applications only• Access to “need to know” data• Compliance Adherence Monitoring

Page 18: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

At-rest controls

Page 19: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Country PII Financial Health

USAUS State Security Breach Laws,US State Social Security Laws, COPPA

GLBA & PCI-DSS (Credit, Debit Card, Checking andSavings, ABA, Swift Code)

Limited Investment: US HIPPA, UK Health Service,Canada Health Insurance card

Rely on Partners and ISVs

GermanyEU data protection,Drivers License, Passport National Id

EU Credit, Debit Card,IBAN, VAT, BIC, Swift Code

UKData Protection Act,UK National Insurance, Tax Id, UKDriver License, Passport

EU Credit, Debit Card,IBAN, BIC, VAT, Swift Code

CanadaPIPED Act,Social Insurance, Drivers License

Credit Card,Swift Code

France

EU data protection, Data Protection Act,National Id (INSEE),Drivers License, Passport

EU Credit, Debit Card,IBAN, BIC, VAT,Swift Code

JapanPIPA, Resident Registration, Social Insurance, Passport, Driving License

Credit Card,Bank Account,Swift Code

Page 20: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Establishing DLP

Australian sensitive information types provided by Microsoft

• Bank Account Number• Driver's License Number• Medicare Account

Number• Passport Number• Tax File Number

Page 21: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

DEMO: Data Loss Prevention

Page 22: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

eDiscovery

Page 23: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

What do we means by eDiscovery?

[2] Wikipedia (http://en.wikipedia.org/wiki/Electronic_discovery)

Page 24: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

eDiscovery Process

Find relevant content (documents, emails, Lync conversions)DISCOVERY

PRESERVATION

Place content on legal hold to prevent content modificationand/or removal

Collect and send relevant content for processing

Prepare files for review

PRODUCTION

REVIEW

Lawyers determine which content will be supplied to opposition

Provide relevant content to opposition

COLLECTION

PROCESSING

Page 25: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Office 365 eDiscovery Centre

Page 26: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

In-place Hold

Page 27: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Find what you need

Page 28: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Export for action

Page 29: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

eDiscovery Considerations

• Recoverable Items quotas separate from mailbox quotas and need to be monitored

• In-Place Hold vs. Single Item Recovery vs. Retention Hold• Hybrid data sources

Page 30: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

eDiscovery Reports

Page 31: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Important Benefits

• Centrally managed proactive enforcement

• Reduced collection touch points

• Consistent and repeatable

• Transparent to users

• Minimises the need for offline copies, until they are needed

• Instantly searchable/exportable

Page 32: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

DEMO: eDiscovery

Page 33: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Auditing

Page 34: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Reporting and Auditing

Page 35: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

SharePoint – Auditing Features

Page 36: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

SharePoint Audit Reports

Page 37: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

DEMO: Document Fingerprinting

Page 38: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

DEMO: Encrypted Email

Page 39: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Q & A

Page 40: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Wrap Up

• Data Loss Prevention• eDiscovery• Auditing• Document Fingerprinting• Encrypted Emails

Page 41: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Edge [email protected]

www.facebook.com/edgepmo

www.twitter.com/superedge

www.superedge.net

Page 42: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Learn More

TechEd 2014 Office 365 Security and Compliance

https://channel9.msdn.com/Events/TechEd/Australia/2014/OSS304

Office 365 Trust Centrehttp://office.microsoft.com/en-au/business/office-365-trust-center-cloud-computing-security-FX103030390.aspx

Office Blogshttp://blogs.office.com/2013/10/23/cloud-services-you-can-trust-security-compliance-and-privacy-in-office-365/

Governance, risk management, and compliance

http://en.wikipedia.org/wiki/Governance,_risk_management,

_and_compliance

Office 365 Service Descriptions

http://technet.microsoft.com/en-

us/library/jj819284%28v=technet.10%29

Useful Links

Page 43: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud
Page 44: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

DLP extensibility points

Page 45: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Content Analysis Process

Content analysis process

Joseph F. FosterVisa: 4485 3647 3952 7352Expires: 2/2012

Get Content

4485 3647 3952 7352 a 16 digit number is detected

RegEx Analysis

1. 4485 3647 3952 7352 matches checksum2. 1234 1234 1234 1234 does NOT match

Function Analysis

1. Keyword Visa is near the number2. A regular expression for date (2/2012)

is near the number

AdditionalEvidence

1. There is a regular expression that matches a check sum

2. Additional evidence increases confidenceVerdict

Page 46: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Office 365 Message Encryption – Encrypt messages to any SMTP address

Information Rights Management – Encrypt content and restrict usage; usually within own organization or trusted partners

S/MIME – Sign and encrypt messages to users using certificates

Encryption Solutions in Office 365

Page 47: Office 365 : Data leakage control, privacy, compliance and regulations in the cloud

Registry Key Outlook Client