CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Common Question Who can benefit from Cloud? Every enterprise today can benefit from Cloud.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
DCIM-B221
Provide a platform built on security, privacy, and trust Maintain an evergreen service Offer highly configurable and scalable services.
Security Controls – What Works
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Pre-adoption concern 60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control.
2 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Windows Azure Windows Azure: Security, Privacy, ComplianceTitle: Country Mgrs., Account Mgrs., BG leads, BG execs & speakers Speaker: BDM, ITDMs Audience:
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
HIPAA PRIVACY AND SECURITY AWARENESS.
Xiaoyue Jiu, Fola Oyediran, Eboni Strawder | Group 10
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Security Best-in-class security with over a decade of experience building Enterprise software & Online services Physical and data security with access.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Mark Estberg, John Howie Senior Directors Microsoft Corporation SESSION CODE: SIA317.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
James Lewis and Simon Waight Office 365 security: everywhere you need it to be PRD33 1.
Trusting Office 365 Privacy Transparency Compliance Security.
Example First: Cost savings conversation Cloud-First Dynamics AX Architecture Microsoft Dynamics AX Data Management Services AX MorphX Dev Tools.
Clouding with Microsoft Azure
OFFICE 365 APP BUILDER PROFILE: Druva
Principles Identified - UK DfT -
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
The time to address enterprise mobility is now
Deployment Planning Services
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Encrypted from CDS Office Technologies
Deployment Planning Services
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
VIRTUALIZATION & CLOUD COMPUTING
New Heights by Guiding Them into the Cloud
Microsoft 365 Get help with regulatory compliance
Deployment Planning Services
HIPAA.
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Service Organization Control (SOC)
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Veeam Backup Repository
That Saves Money and Preserves Opportunities
Accelerate your compliance journey Key customer concerns Product value
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Interlake Hybrid Cloud Management Suite
Data Security for Microsoft Azure
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Employee Privacy and Privacy of Employee Information
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
MICROSOFT AZURE ISV PROFILE: ONEBE
Microsoft Azure, RightsWATCH Help Users Keep Sensitive Information Safe from Security Breaches Resulting from Accidental or Malicious Disclosure MICROSOFT.
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Microsoft Data Insights Summit
Modern benefits administration and HR software, supported by us.
Cloud Computing for Wireless Networks
Presentation transcript:

CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD Microsoft Trusted Cloud Version 1 February 2016 CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD Customer profile Customer is considering going to the cloud but has concerns over putting their data in the cloud. Work with your customer to overcome security objections and sell Microsoft cloud services Did you Know? On behalf of Office 365, Microsoft are willing to sign with each customer data processing terms, a HIPAA business associate agreement, and EU model clauses. We also comply with standards like ISO 27001, ISO 27018, FISMA, and FedRAMP. For more information please visit the continuous compliance section of the Office 365 trust center. Upselling opportunities Understanding customers key concerns over security and the cloud and knowing how to overcome these objections will help you sell Microsoft cloud services Microsoft Trusted Cloud – Eliminate Customer Security Concerns Security Privacy Compliance Transparency COMMON SECURITY CONCERNS I want to know that my data is safe and secure when it is in the cloud I know where my data is when it is physically sitting on a server in my office. I want to be able to control my data I need peace of mind that there are regulatory controls about how my data is managed/protected in the cloud I want to be able to know how my data is being handled when it is in the cloud TOP BUSINESS NEEDS For your data to be kept safe and secure You own and control your data Ensure cloud service provider conforms to global standards To have visibility into cloud service providers practices WHY ENTRUST YOUR DATA TO MICROSOFT CLOUD? We help ensure that the Microsoft Cloud is protected at the physical, network, host, application, and data layers so that our online services are resilient to attack: **Watch Tour of Microsoft datacenter under resources below Physical security. 24-hour monitoring, and all employees must use multifactor authentication, including biometric scanning, to enter them Network security. Provides infrastructure necessary to securely connect services Logical security. Port scanning, perimeter vulnerability scanning, and intrusion by preventing or detecting cyberattacks. Dedicated threat management teams proactively hunt for, prevent, and mitigate malicious attacks Data security. Customer data encrypted when stored on servers and when it is being transmitted. Customer data is protected from tampering by threat management, security monitoring and files and data integrity Encryption. The Microsoft cloud uses encryption to safeguard customer data Identity. Azure Active Directory helps secure to your data in on-premises and cloud application, and simplifies the management of users and groups Threat management. Microsoft Antimalware is built for cloud and additional antimalware protections for specific services Microsoft Azure, Exchange Online, Dynamics CRM Online, and Microsoft Intune Our time-tested approach to privacy and data protection is grounded in our commitment to give you control of the collection, use, and distribution of your information. With the Microsoft Cloud, you are the owner of your customer data You are in control of you data. In the Microsoft cloud, you know where your customer data is located, who can access it and under what circumstances, and how it is responsibility protected, transferred, and deleted. You control access to your customer data and you control your customer data if you leave the service. You have options to control the security of your customer data We do not use customer data for advertising We use logical isolation to segregate each customer’s data from that of others We do not offer direct access to customer data. We believe that you should control your own data. Microsoft does not give any third party (including law enforcement, other government entity, or civil litigant direct or unfettered access to customer data except as you direct We build privacy into the features and services of the Microsoft cloud. Microsoft contractual commitments back our privacy best practices Privacy protections in the Microsoft Cloud are grounded in the Microsoft Privacy Standard which includes addressing privacy requirements in the process of developing software Services within the Microsoft Cloud meet key international and industry-specific compliance standards, such as ISO/IEC 27001 and ISO/IEC 27018, FedRAMP, and SOC 1 and SOC 2. Health Insurance Portability and Accountability Act (HIPAA): HIPAA imposes on our customers that may be “covered entities" under the law security, privacy, and reporting requirements regarding the processing of electronic protected health information Health Information Trust Alliance (HITRUST): standard by U.S. healthcare organizations, HITRUST has established the Common Security Framework (CSF), a certifiable framework for organizations that create, access, store, or exchange personal health and financial information Federal Information Security Management Act (FISMA) requires U.S. federal agencies to develop, document, and implement controls to secure their information and information systems Federal Risk and Authorization Program (FedRAMP) is a federal risk management program that provides a standardized approach for assessing and monitoring the security of cloud products and services. European Union (EU) Model Clauses: a key instrument of EU privacy and human rights law, requires our customers in the EU to legitimize the transfer of personal data outside of the EU ISO 27001: ISO 27001 is one of the best security benchmarks available in the world. Office 365 has been verified to meet the rigorous set of physical, logical, process and management controls You must know, through clearly stated and readily available policies and procedures, where your customer data is stored and how we help secure it, as well as who can access it and under what circumstances You know what we do to help secure your data: We start by building security into software code using the Security Development Lifecycle. This company-wide, mandatory development process embeds security requirements into the entire software lifecycle, from planning through deployment You know where your data is stored and how it is used: Microsoft Cloud customers know the location, in our datacenters around the globe, where their customer data is stored. Each Microsoft cloud service has its own location policies for customer data: You know who can access you data and under what conditions: The Online Services Terms offer contractual commitments that govern access to your data in the Microsoft Cloud, including the use of subcontractors and disclosure of data We are transparent about how we respond to government requests for data: When a government or law enforcement make a lawful demand for customer data from Microsoft, we are committed to transparency and limit what we disclose You can review the standards certifications for Microsoft cloud services: To demonstrate that Microsoft Cloud controls deliver compliance that you can rely on, our enterprise cloud services are independently validated through certifications and attestations, as well as third-party audits. COMMON QUESTIONS AND OBJECTIONS Who owns the data we store in your service? Will you use our data to build advertising products? Can we get our data out of your service? You own and control your data. We do not use your data for anything other than providing you with the service that you have subscribed for. As a service provider, we do not scan your email or documents for advertising purposes. You own your data and retain all rights. During and for 90 days after your subscription, you can download a copy of all your data at any time and for any reason Do we have visibility into where you store our data? Are you transparent with the way you use and access our data? We are transparent about where your data is located. You can visit: Where is my data in the Office 365 Trust Center. We also share important aspects of data storage, such as where your data resides in terms of geographic location, who at Microsoft can access it, and what we do with that information internally. You can visit: Who can access your data section of the Office 365 Trust Center What is your approach to security and which security features do you offer to protect your service from external attacks? When it comes to security features, there are broadly two types of categories: 1) built-in security and 2) customer controls. Built-in security represents all the measures that Microsoft takes on behalf of all Office 365 customers to protect your information and run a highly available service. Customer controls are features that enable you to customize Office 365 to meet the specific needs of your organization. You can get details about both types of security features in the Security section of the Office 365 Trust How do you ensure that your service is reliable and what are your commitments here? We apply best practices in design and operations, such as redundancy, resilience, distributed services, and monitoring to name a few. We recently started publishing our quarterly uptime numbers for the service. The uptime number for the most recent quarter exceeds 99.9%. We offer 99,9% uptime via a financially backed service level agreement. If a customer experiences monthly uptime that is less than 99.9% we compensate that customer through service credits RESOURCES Microsoft Trust Center **Tour of Microsoft Datacenter. Watch this video Microsoft Azure Trust Center Office 365 Trust Center Microsoft Dynamics Online Trust Connect to Information Remotely Enable Mobile Workforce Track all customer interactions Understand customers/the business Respond quickly to customers needs