Accelerate GDPR compliance with the Microsoft Cloud

3 downloads 242 Views 4MB Size Report
Centralize processing in a single system, simplifying data management, governance, classification, and oversight. Protec
Accelerate GDPR compliance with the Microsoft Cloud Samuel Marín – Sr. Sales Solutions Specialist

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

What are the key changes to address the GDPR?

Personal privacy Individuals have the right to:

Controls and notifications Organizations will need to:

Access their personal data



Correct errors in their personal data





Erase their personal data





Object to processing of their personal data



Export personal data

• •



Protect personal data using appropriate security Notify authorities of personal data breaches Obtain appropriate consents for processing data Keep records detailing data processing

Transparent policies Organizations are required to: • • •

Provide clear notice of data collection Outline processing purposes and use cases Define data retention and deletion policies

IT and training Organizations will need to:



Train privacy personnel & employee



Audit and update data policies



Employ a Data Protection Officer (if required)



Create & manage compliant vendor contracts

Protecting customer privacy with GDPR

Our commitment to you To simplify your path to compliance, we are committing to GDPR compliance across our cloud services when enforcement begins on May 25, 2018. We will share our experience in complying with complex regulations such as the GDPR. Together with our partners, we are prepared to help you meet your policy, people, process, and technology goals on your journey to GDPR.

GDPR Compliance

Simplify your privacy journey

Uncover risk & take action

Leverage guidance from experts

Centralize, Protect, Comply with the Cloud

Process all in one place Centralize processing in a single system, simplifying data management, governance, classification, and oversight.

Maximize your protections Protect data with industry leading encryption and security technology that’s always up-to-date and assessed by experts.

Streamline your compliance Utilize services that already comply with complex, internationallyrecognized standards to more easily meet new requirements, such as facilitating the requests of data subjects.

The Trusted Cloud GLOBAL

Microsoft has the deepest and most comprehensive compliance coverage in the industry

REGIONAL

INDUSTRY

US GOV

ISO 27001

ISO 27018

Moderate JAB P-ATO

PCI DSS Level 1

Argentina PDPA

ISO 27017

High JAB P-ATO

CDSA

EU Model Clauses

DoD DISA SRG Level 2

MPAA

UK G-Cloud

FACT UK

China DJCP

China GB 18030

DoD DISA SRG Level 4

Shared Assessments

China TRUCS

SOC 1 Type 2

ISO 9001

ISO 22301

DoD DISA SRG Level 5

FISC Japan

Singapore MTCS

SP 800-171

HIPAA / HITECH Act

Australia IRAP/CCSL

SOC 2 Type 2

New Zealand GCIO

HITRUST

Japan My Number Act

CSA STAR Self-Assessment

SOC 3

FIPS 140-2

Section 508 VPAT

GxP 21 CFR Part 11

MARS-E

ENISA IAF

Japan CS Mark Gold

Spain ENS

ITAR

IG Toolkit UK

Spain DPA

CSA STAR Attestation

CSA STAR Certification

India MeitY

CJIS

FERPA

Canada Privacy Laws

IRS 1075

GLBA

Privacy Shield

FFIEC

Germany IT Grundschutz workbook

Shared responsibility Customer management of risk Data Classification and data accountability

Responsibility Data classification and accountability Client & end-point protection

Shared management of risk Identity & access management | End Point Devices

Identity & access management Application level controls Network controls

Provider management of risk Host Infrastructure

Physical | Networking

Physical Security Cloud Customer

Cloud Provider

On-Prem IaaS

PaaS

SaaS

How do I get started? 1

Discover

Identify what personal data you have and where it resides

2

Manage

Govern how personal data is used and accessed

3

Protect

Establish security controls to prevent, detect, and respond to vulnerabilities & data breaches

4

Report

Keep required documentation, manage data requests and breach notifications

1

Discover:

Example solutions Microsoft Azure

Microsoft Azure Data Catalog

In-scope:

Inventory:

Enterprise Mobility + Security (EMS) Microsoft Cloud App Security

Dynamics 365













• •

• • • • • •

• • •

Audit Data & User Activity Reporting & Analytics

Office & Office 365

Data Loss Prevention Advanced Data Governance Office 365 eDiscovery

SQL Server and Azure SQL Database SQL Query Language

Windows & Windows Server Windows Search

2

Manage:

Example solutions Microsoft Azure

Data governance:

Data classification:

Azure Active Directory Azure Information Protection Azure Role-Based Access Control (RBAC)

Enterprise Mobility + Security (EMS) Azure Information Protection •





























Dynamics 365

Security Concepts

Office & Office 365

Advanced Data Governance Journaling (Exchange Online)

Windows & Windows Server Microsoft Data Classification Toolkit

3

Protect:

Example solutions Microsoft Azure

Preventing data attacks:

Detecting & responding to breaches:

Azure Key Vault Azure Security Center Azure Storage Services Encryption

Enterprise Mobility + Security (EMS)



Azure Active Directory Premium Microsoft Intune



Office & Office 365

























Advanced Threat Protection Threat Intelligence

SQL Server and Azure SQL Database Transparent data encryption Always Encrypted

Windows & Windows Server

Windows Defender Advanced Threat Protection Windows Hello Device Guard

4

Report:

Example solutions Microsoft Trust Center Service Trust Portal

Record-keeping:

Reporting tools:

Microsoft Azure





Enterprise Mobility + Security (EMS) Azure Information Protection

• • • •

• • •



Azure Auditing & Logging Azure Data Lake Azure Monitor



Dynamics 365

Reporting & Analytics

Office & Office 365 Service Assurance Office 365 Audit Logs Customer Lockbox

Windows & Windows Server

Windows Defender Advanced Threat Protection

MICROSOFT CLOUD APP SECURITY

MICROSOFT INTUNE Make sure your devices are compliant and secure, while protecting data at the application level

Gain deep visibility, strong controls and enhanced threat protection for data stored in cloud apps

Classify

CONDITIONAL ACCESS

AZURE INFORMATION PROTECTION

Location Apps !

Classify, label, protect and audit data for persistent security throughout the complete data lifecycle

Access granted to data

Risk

Audit

Label

!

Device !

Protect AZURE ACTIVE DIRECTORY Ensure only authorized users are granted access to personal data using risk-based conditional access

!

MICROSOFT ADVANCED THREAT ANALYTICS Detect breaches before they cause damage by identifying abnormal behavior, known malicious attacks and security issues

Office 365 In-place Compliance Solutions Meeting organizational data compliance needs

Organization needs

Preserve vital data

Find relevant data

Monitor activity

Data Governance

eDiscovery

Auditing

Import, store, preserve and expire data

Quickly identify the most relevant data

Monitor and investigate actions taken on data

Security & Compliance Center Manage compliance for all your data across Office 365

Security and Compliance Center Powerful for experts, and easier for generalists to adopt Scenario oriented workflows with cross-cutting policies spanning features Powerful content discovery across Office 365 workloads Proactive suggestions leveraging Microsoft Security Intelligence Graph

Advanced data governance enables organizational compliance by intelligently leveraging machine assisted insights to find, import, classify, set policy and take action on the data most important to you Building Blocks of Office 365 Data Governance:

Personas of Office 365 Data Governance: IT Administrator

Compliance Officer

Records Manager

Information Worker

Import

• Intelligent import of on-premises Microsoft and 3rd party data

Classification, Policy & Sensitive Types

• Manual and autoclassification of content to apply right governance policies

Retention, Archival & Disposition

• System enforced lifecycle, disposition workflows and defensible deletion process

Dashboard, Insights & Reporting

• Monitoring, reports and intelligent trend identification and suggestions

Audit, Supervision & Defensibility

• Data investigations, forensics, automated audit alerts and notifications

Advanced Data Governance in Office 365 Leverage intelligence to automate data retention and deletion

Automatic Classification

Classify data based on automatic analysis (age, user, type, sensitive data and user provided fingerprints)

Intelligent Policies

Policy recommendations based on machine learning and cloud intelligence

Take Action

Apply actions to preserve high value data in-place and purge what’s redundant, trivial or obsolete

Beyond litigation: Investigations Wide range of scenarios

Regulatory compliance, employment law, HR, financial, internal business requirements

Secure access

Provide access based on role, delegated access and enable security filters to scope access

Self service case management tools

Investigators can create & manage cases, put data on hold, perform searches and export

Identify subjects, witnesses, custodians

Search for relevant subjects or witnesses or custodians

Identify relevant data

Search for data relevant to the investigation across Office 365 and imported data

Enable collaboration

Between investigators & attorneys overseeing the case

Office 365 eDiscovery

Quickly find what’s relevant and reduce risk with intelligent eDiscovery in Office 365

Simplified eDiscovery Streamlined data preservation and legal hold management for each case

Actionable Intelligence Organize unstructured data with machine learning to reduce volume of data for review and reduce cost

Efficient Collaboration Case workspace with roles, data permissions, and built in auditing enables collaboration across the organization

eDiscovery model implemented in Office 365

Identify and Preserve Data

Search for Documents that might be relevant

Rank documents by their relevance

Organize documents & recognize topics

Do all of these activities within a specific case

View and tag documents sorted by relevance, similarity

Why auditing is important

Increasing risk Losing intellectual property and customer data Compliance risks if data isn’t preserved

Multiple sharing options Productivity requires easier collaboration Adding online services to your environment Vendors, external partners, malicious insiders

What data is audited? Exchange Online

Admin activity, end-user (mailbox) activity

Security and Compliance Center Admin activity

Azure Active Directory

Office 365 logins, directory activity

Power BI

Admin activity

SharePoint Online and OneDrive for Business File activity, sharing activity

Customer Lockbox Meet Compliance Needs

Customer Lockbox can help customers meet compliance obligations by demonstrating that they have procedures in place for explicit data access authorization

Extended access Control

Use Customer Lockbox to control access to customer content for service operations

Visibility into actions

Actions taken by Microsoft engineers in response to Customer Lockbox requests are logged and accessible via the Management Activity API and the Security and Compliance Center

100101 011010 100011 Microsoft Approved

Submits request

Customer

Microsoft Engineer

Lockbox system

Microsoft Manager

Customer Approved

Microsoft Engineer Customer

Microsoft.com/GDPR