Accelerate GDPR compliance with the Microsoft Cloud

9 downloads 272 Views 5MB Size Report
We take a principled approach with strong commitments to privacy, security, compliance and transparency. •. Moving to
Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

“Businesses and users are going to embrace technology only if they can trust it.” Satya Nadella Chief Executive Officer Microsoft Corporation



We take a principled approach with strong commitments to privacy, security, compliance and transparency.



Moving to the cloud makes it easier for you to become compliant with privacy regulations by managing and protecting personal data in a centralized location.



Microsoft is the industry leader in privacy and security with

extensive expertise complying with complex regulations.

COMMITMENT TO TRANSPARENCY & PRIVACY

HOLISTIC APPROACH TO SECURITY

LEADERSHIP IN COMPLIANCE

COMMITMENT TO TRANSPARENCY & PRIVACY

United Kingdom LEADERSHIP IN COMPLIANCE

Spain

CSA CCM ENISA IAF EU Model Clauses EU-U.S. Privacy Shield ISO/IEC 27001, 27018 SOC 1, 2 Spain ENS LOPD

Over 1000 controls in the Office 365 compliance framework enable us to stay up to date with the ever-evolving industry standards across geographies.

Japan

CSA CCM ENISA IAF EU Model Clauses ISO/IEC 27001, 27018 NIST 800-171 SOC 1, 2, 3 UK G-Cloud

Trust Microsoft’s verified services. Microsoft is regularly audited, submits self-assessments to independent 3rd party auditors, and holds key certifications.

CSA CCM CS Mark (Gold) FISC ISO/IEC 27001, 27018 Japan My Number Act SOC 1, 2

Singapore

CSA CCM ISO/IEC 27001, 27018 MTCS SOC 1, 2

China

China GB 18030 China MLPS China TRUCS

United States

CJIS CSA CCM DISA FDA CFR Title 21 Part 11 FEDRAMP FERPA FIPS 140-2 FISMA HIPPA/HITECH HITRUST IRS 1075 ISO/IEC 27001, 27018 MARS-E NIST 800-171 Section 508 VPATs SOC 1, 2

Argentina

Argentina PDPA CSA CCM IRAP (CCSL) ISO/IEC 27001, 27018 SOC 1, 2

European Union CSA CCM ENISA IAF EU Model Clauses EU-U.S. Privacy Shield ISO/IEC 27001, 27018 SOC 1, 2,

Australia

CSA CCM IRAP (CCSL) ISO/IEC 27001, 27018 SOC 1, 2

New Zealand

CSA CCM ISO/IEC 27001, 27018 NZCC Framework SOC 1, 2

COMMITMENT TO TRANSPARENCY & PRIVACY

We will stand behind you with contractual commitments for our cloud services that: •

Meet stringent security requirements



Support customers in managing data subject requests



Provide documentation that enables customers to demonstrate compliance for all the other requirements of the GDPR applicable to processors and more

Microsoft was the first major cloud services provider to make these commitments to its customers. Our goal is to simplify compliance for our customers with both the GDPR and other major regulations.

Platform

Intelligence

Partners

Identify relevant documents Predictive coding enables you to train the system to automatically distinguish between likely relevant and non-relevant documents. Identify data relationships Use clustering technology to look at documents in context and identify relationships between them.

Organize and reduce the data prior to review Use near duplicate detection to organize the data and reconstruct email threads from unstructured data to reduce what’s sent to review.

Messaging Rules

Conditional Access

x2.25

Lockbox

Customer Lockbox Now we want to extend Lockbox approval to you for human access to customer content 100101 011010 100011

Threat detection Identify high-risk and abnormal usage, security incidents, and threats.

Enhanced control Shape your Office 365 environment with granular security controls and policies. Discovery and insights Gain enhanced visibility and context into your Office 365 usage and shadow IT.

Advanced Threat Protection

Threat Intelligence

Broad visibility into attack trends Billions of data points from Office, Windows, and Azure Integrated data from external cyber threat hunters

Proactive security policy management Intuitive dashboards with drill-down capabilities

INTELLIGENT SECURITY GRAPH Industry Partners

Antivirus Network

CERTs

Cyber Defense Operations Center

Malware Protection Center

Cyber Hunting Teams

Security Response Center

PaaS

Digital Crimes Unit

IaaS

SaaS

Identity

Apps and Data

Infrastructure

Device

Supporting your EU GDPR compliance journey with Microsoft Enterprise Mobility + Security Grant and restrict access to data

Protect data on premises and in the cloud

!

MICROSOFT CLOUD APP SECURITY

MICROSOFT INTUNE Make sure your devices are compliant and secure, while protecting data at the application level

Gain deep visibility, strong controls and enhanced threat protection for data stored in cloud apps

Classify

CONDITIONAL ACCESS

AZURE INFORMATION PROTECTION

Location Apps !

Risk

Detect data breaches before they cause dam age

Classify, label, protect and audit data for persistent security throughout the complete data lifecycle

Access granted to data

Audit Device

Label

! !

Protect AZURE ACTIVE DIRECTORY Ensure only authorized users are granted access to personal data using risk-based conditional access

!

MICROSOFT ADVANCED THREAT ANALYTICS Detect breaches before they cause damage by identifying abnormal behavior, known malicious attacks and security issues

How to protect data on mobile devices and apps Supporting your GDPR compliance journey with Microsoft Intune

End User Transparency Terms and conditions, as well as notifications, ensure that your end users are fully aware of what data is collected and visible to IT on managed devices

Mobile Device Management (MDM)

Mobile Application Management (MAM)

Protect data at the device level and ensure devices are compliant, on both company-owned and users’ personal devices

Manage apps on enrolled devices, and keep data secure at the app level on enrolled and unenrolled devices

PC Management Keep PC endpoints secure from threats and ensure that data stays protected by enforcing firewall and malware protection policies

Manage access and control what happens to data after it’s been accessed Copy

Remotely wipe all data on lost or stolen devices

Paste

Enforce Windows Defender, Windows Information Protection, and overall device compliance to protect user and company data

Save

Save as/copy/paste restrictions

App encryption at rest

Remotely enable passcode reset, device lock, or data encryption Deploy certificates, Wi-Fi, VPN, and email profiles

App access control-PIN or credentials

App SDK and App Wrapping Tool

Not Compliant

Guide to Compliance

Incorporate Intune MAM capabilities in your mobile and line-of-business apps using the Intune App SDK and App Wrapping Tool

Multi-identity Support App-level selective wipe

Company Data

Company Data

Personal Data

Compliant

Multi-factor authentication Data encryption User accounts Device log-ins

Malware Unauthorized data access

Attacks

User log-ins

Phishing

Denial of service

System updates Enterprise security

Our unique intelligence

450B 1B 400B

Microsoft & Partners

Security

Data Platform

GDPR Workshop

Education, Awareness, Discovery: Microsoft Roadmap

Microsoft does not provide legal advice.

Cloud

Partners

Modern Workplace

Risk & Data Management Foundation

Modernize your IT Environment

Privacy

Controls Notifications

Policies

Training

GDPR Program

Discover, Manage, Protect, Report (projects based on gap analysis outcomes, and roadmap alignment)

© Copyright Microsoft Corporation. All rights reserved.