We take a principled approach with strong commitments to privacy, security, compliance and transparency. â¢. Moving to
Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera
This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.
“Businesses and users are going to embrace technology only if they can trust it.” Satya Nadella Chief Executive Officer Microsoft Corporation
•
We take a principled approach with strong commitments to privacy, security, compliance and transparency.
•
Moving to the cloud makes it easier for you to become compliant with privacy regulations by managing and protecting personal data in a centralized location.
•
Microsoft is the industry leader in privacy and security with
extensive expertise complying with complex regulations.
COMMITMENT TO TRANSPARENCY & PRIVACY
HOLISTIC APPROACH TO SECURITY
LEADERSHIP IN COMPLIANCE
COMMITMENT TO TRANSPARENCY & PRIVACY
United Kingdom LEADERSHIP IN COMPLIANCE
Spain
CSA CCM ENISA IAF EU Model Clauses EU-U.S. Privacy Shield ISO/IEC 27001, 27018 SOC 1, 2 Spain ENS LOPD
Over 1000 controls in the Office 365 compliance framework enable us to stay up to date with the ever-evolving industry standards across geographies.
Japan
CSA CCM ENISA IAF EU Model Clauses ISO/IEC 27001, 27018 NIST 800-171 SOC 1, 2, 3 UK G-Cloud
Trust Microsoft’s verified services. Microsoft is regularly audited, submits self-assessments to independent 3rd party auditors, and holds key certifications.
CSA CCM CS Mark (Gold) FISC ISO/IEC 27001, 27018 Japan My Number Act SOC 1, 2
Singapore
CSA CCM ISO/IEC 27001, 27018 MTCS SOC 1, 2
China
China GB 18030 China MLPS China TRUCS
United States
CJIS CSA CCM DISA FDA CFR Title 21 Part 11 FEDRAMP FERPA FIPS 140-2 FISMA HIPPA/HITECH HITRUST IRS 1075 ISO/IEC 27001, 27018 MARS-E NIST 800-171 Section 508 VPATs SOC 1, 2
Argentina
Argentina PDPA CSA CCM IRAP (CCSL) ISO/IEC 27001, 27018 SOC 1, 2
European Union CSA CCM ENISA IAF EU Model Clauses EU-U.S. Privacy Shield ISO/IEC 27001, 27018 SOC 1, 2,
Australia
CSA CCM IRAP (CCSL) ISO/IEC 27001, 27018 SOC 1, 2
New Zealand
CSA CCM ISO/IEC 27001, 27018 NZCC Framework SOC 1, 2
COMMITMENT TO TRANSPARENCY & PRIVACY
We will stand behind you with contractual commitments for our cloud services that: •
Meet stringent security requirements
•
Support customers in managing data subject requests
•
Provide documentation that enables customers to demonstrate compliance for all the other requirements of the GDPR applicable to processors and more
Microsoft was the first major cloud services provider to make these commitments to its customers. Our goal is to simplify compliance for our customers with both the GDPR and other major regulations.
Platform
Intelligence
Partners
Identify relevant documents Predictive coding enables you to train the system to automatically distinguish between likely relevant and non-relevant documents. Identify data relationships Use clustering technology to look at documents in context and identify relationships between them.
Organize and reduce the data prior to review Use near duplicate detection to organize the data and reconstruct email threads from unstructured data to reduce what’s sent to review.
Messaging Rules
Conditional Access
x2.25
Lockbox
Customer Lockbox Now we want to extend Lockbox approval to you for human access to customer content 100101 011010 100011
Threat detection Identify high-risk and abnormal usage, security incidents, and threats.
Enhanced control Shape your Office 365 environment with granular security controls and policies. Discovery and insights Gain enhanced visibility and context into your Office 365 usage and shadow IT.
Advanced Threat Protection
Threat Intelligence
Broad visibility into attack trends Billions of data points from Office, Windows, and Azure Integrated data from external cyber threat hunters
Proactive security policy management Intuitive dashboards with drill-down capabilities
INTELLIGENT SECURITY GRAPH Industry Partners
Antivirus Network
CERTs
Cyber Defense Operations Center
Malware Protection Center
Cyber Hunting Teams
Security Response Center
PaaS
Digital Crimes Unit
IaaS
SaaS
Identity
Apps and Data
Infrastructure
Device
Supporting your EU GDPR compliance journey with Microsoft Enterprise Mobility + Security Grant and restrict access to data
Protect data on premises and in the cloud
!
MICROSOFT CLOUD APP SECURITY
MICROSOFT INTUNE Make sure your devices are compliant and secure, while protecting data at the application level
Gain deep visibility, strong controls and enhanced threat protection for data stored in cloud apps
Classify
CONDITIONAL ACCESS
AZURE INFORMATION PROTECTION
Location Apps !
Risk
Detect data breaches before they cause dam age
Classify, label, protect and audit data for persistent security throughout the complete data lifecycle
Access granted to data
Audit Device
Label
! !
Protect AZURE ACTIVE DIRECTORY Ensure only authorized users are granted access to personal data using risk-based conditional access
!
MICROSOFT ADVANCED THREAT ANALYTICS Detect breaches before they cause damage by identifying abnormal behavior, known malicious attacks and security issues
How to protect data on mobile devices and apps Supporting your GDPR compliance journey with Microsoft Intune
End User Transparency Terms and conditions, as well as notifications, ensure that your end users are fully aware of what data is collected and visible to IT on managed devices
Mobile Device Management (MDM)
Mobile Application Management (MAM)
Protect data at the device level and ensure devices are compliant, on both company-owned and users’ personal devices
Manage apps on enrolled devices, and keep data secure at the app level on enrolled and unenrolled devices
PC Management Keep PC endpoints secure from threats and ensure that data stays protected by enforcing firewall and malware protection policies
Manage access and control what happens to data after it’s been accessed Copy
Remotely wipe all data on lost or stolen devices
Paste
Enforce Windows Defender, Windows Information Protection, and overall device compliance to protect user and company data
Save
Save as/copy/paste restrictions
App encryption at rest
Remotely enable passcode reset, device lock, or data encryption Deploy certificates, Wi-Fi, VPN, and email profiles
App access control-PIN or credentials
App SDK and App Wrapping Tool
Not Compliant
Guide to Compliance
Incorporate Intune MAM capabilities in your mobile and line-of-business apps using the Intune App SDK and App Wrapping Tool
Multi-identity Support App-level selective wipe
Company Data
Company Data
Personal Data
Compliant
Multi-factor authentication Data encryption User accounts Device log-ins
Malware Unauthorized data access
Attacks
User log-ins
Phishing
Denial of service
System updates Enterprise security
Our unique intelligence
450B 1B 400B
Microsoft & Partners
Security
Data Platform
GDPR Workshop
Education, Awareness, Discovery: Microsoft Roadmap
Microsoft does not provide legal advice.
Cloud
Partners
Modern Workplace
Risk & Data Management Foundation
Modernize your IT Environment
Privacy
Controls Notifications
Policies
Training
GDPR Program
Discover, Manage, Protect, Report (projects based on gap analysis outcomes, and roadmap alignment)
© Copyright Microsoft Corporation. All rights reserved.