SlideShare une entreprise Scribd logo
1  sur  56
# Time Topic
1 8:30 – 8:40 AM Introductions
2 8:40 – 9:00 AM Records Management and Compliance Scenarios
3 9:00 – 10:00 AM Cloud App Security, Azure Information Protection & Azure Rights
Management
4 10:00 – 10:15 AM BREAK
5 10:15 – 11:00 AM Advanced Data Governance
6 11:00 – 11:15 AM How to Enable the Records Management and Compliance Scenarios Using
Microsoft Technology
7 11:15 – 11:30 AM Options for Filling the Gaps
*Consult your legal council
Privacy rights
related to health
data
Implementation
of a security
management
process
Protocols and
expectations for
breaches and
HIPAA violations
Source: Office of the National Coordinator for Health Information Technology (ONC)
Source: Microsoft Trust Center
Perform good
records
management
practices
Train employees
to follow policies
and processes
Have
documented
processes in
place to protect
data
(and follow them)
Allow people to
access their data
and ensure data
integrity
Perform good
records
management
practices
Train employees
to follow policies
and processes
Have
documented
processes in
place to protect
data
(and follow them)
Allow people to
access their data
and ensure data
integrity
Risk of
Non-Disposal
Risk of Not Being
Declared a Record
Risk of Deletion
Classify Information Maintenance Dispose
Document
Created
Document
Managed
Document
Finalized
Record
Managed
Disposal
DisseminateMaintain & AdministerCreate
Manage Content
Invisible Compliance Records Management
Microsoft Trust Center
Retention
IRM
DLP
Outside Microsoft
Technologies
Microsoft
Technologies
Microsoft Cloud App Security is a CASB (Cloud Access
Security Broker) that can help you bring the protection
you have on-premises to your cloud apps, gaining
comprehensive visibility, auditing capabilities, and granular
controls to help ensure your sensitive data stays safe.
Microsoft Cloud App Security provides a comprehensive,
intelligent security solution that brings visibility, real-time
control, and security to your cloud applications.
Deep visibility
• Identify cloud apps on your network and gain visibility into Shadow IT
• Cloud App Security recognizes more than 15,000 cloud apps—no
agents required
• Evaluates the risk of these apps based on more than 60 parameters
Powerful reporting and analytics
• On-going risk detection and details on users, including
• abnormal usage patterns
• upload/download traffic
• Transactions
• help you identify anomalies right away
Data loss prevention (DLP)
• Enables granular control policies
• Single-click remediation
• Document quarantine
• Sharing restrictions
• Apply policies—out of the box or customized—to apps from Microsoft or other
vendors
• Scan and classify files in the cloud, and apply Azure Information Protection labels for
protection—including encryption
Compliance
• Supports your compliance journey with regulatory mandates such as Payment Card
Industry (PCI), Health Insurance Accountability and Portability Act (HIPAA), Sarbanes-
Oxley (SOX), General Data Protection Regulation (GDPR), and others.
• Factors compliance with regulations into the risk assessment score for each app
• Helps you further control and protect sensitive files through policies and governance
Real-time monitoring and control
• Helps you limit activities performed within user sessions in SaaS apps based on user identity,
location, device state, and detected sign-in risk level
• Allow access to SaaS apps but protect downloads from unfamiliar locations
• Block downloads of sensitive documents from unmanaged devices
Behavioral analytics
• Identify anomalies in cloud usage that may indicate a data breach
• Learns how each user interacts with each SaaS app and, through
behavioral analytics, assesses the risks in each transaction
Integration with existing SIEM and DLP solutions
• Cloud App Security helps preserve your familiar workflow
• Enables a consistent policy across on-premises and cloud activities,
while automating security procedures to better protect your cloud
applications
Mitigation of ransomware attacks
• Offers a built-in policy template to detect potential ransomware activity
• Specify governance actions to suspend suspect users and prevent
further encryption of the user’s files
https://docs.microsoft.com/en-us/cloud-app-security/risk-score
Classify ProtectLabel
Auto-applied based on
sensitive information types
Auto-applied based on a
search query
The label is a record
A user has manually
applied a label
Auto-applied based on
a location
Another label is older
Except when…
When you create
auto-apply labels for
sensitive information,
you see the same list
of policy templates as
when you create a
data loss prevention
(DLP) policy.
Query-based labels use the search
index to identify content.
• Email properties
• Site properties
• Contact properties
• Sensitive data types
• Site content shared with external users
• Site content shared within your
organization
Can only apply a default label to a
document library
Items inside a document set do
inherit the default label
If you move an item with a default
label from one library to another
library with no default label, the
old default label is removed
A label that classifies
content as a record
needs to be applied
manually; it can't be
auto-applied
For SharePoint
content, any user in
the default
Members group (the
Contribute
permission level)
can apply a record
label to content
Only the site
collection
administrator can
remove or change
that label after it's
been applied
You can apply a
label to a folder in
Exchange but not
SharePoint or
OneDrive
For SharePoint
content, any user in
the default Members
group (the Contribute
permission level) can
apply a record label
to content
If there are multiple rules that assign an auto-apply label and
content meets the conditions of multiple rules, the label for the
oldest rule is assigned.
PERIOD. NO OTHER OPTION.
Labels are
auto-applied
Label policy is synced
to locations
Status = Success (On)
Labels applied
automatically to
content within
7 days
If the label is… Then the label policy can be applied to…
Exchange SharePoint OneDrive Groups
Published to end users X X X X
Auto-applied based on sensitive
information types
X X
Auto-applied based on a query X X X X
PROS CONS THIRD PARTY TOOL
Use to identify and action sensitive
content
Application of Label can be 1-7 days
Provides real time classification
of content
A label can be used by RecordPoint to
refine a classification
No hierarchy of labels Can prioritize labels
No automatic application of labels to
sites, content types,
Has localized certifications
Generic functionality that doesn’t meet
local standards
Can use a label as input
Need to have an E5 license for
automatic labelling
Works with any SharePoint license
No automatic labelling for records
Automatic labelling of records and all
content
Have to apply document library labels to
each location
Can apply classifications from a
central location
Attached to a label. Can do the following:
• Trigger a disposition review at the end of the
retention period, so that SharePoint and
OneDrive documents must be reviewed
before they can be deleted.
• Start the retention period from when the
content was labeled, instead of the age of the
content or when it was last modified.
• Retaining content so that it can’t be permanently deleted before the end of the retention period.
• Deleting content permanently at the end of the retention period.
Entire
Locations
Include
or
Exclude
Organization Wide
(limit of 10 org-wide policies and entire-location policies combined)
SharePoint
OneDrive for
Business
Groups
Skype for
Business
Exchange
Email
Exchange
Public
Folder
Users
(up to 1000)
Groups
(up to 1000)
Locations
(up to 100 sites)
Retention wins over deletion
Longest retention period wins
Explicit inclusion wins over implicit inclusion
Shortest deletion period wins
1. If the content is modified or deleted during the retention period
2. If the content is not modified or deleted during the retention period
2
1
Preservation
Hold Library
Document
Library
First-Stage
Recycle Bin
Second-Stage
Recycle Bin
Cleanup
Retention Period
User Purge Cleanup
Permanent
Deletion
Permanent
Deletion
93 Days
7 Days
PROS CONS THIRD PARTY TOOL
Simple content clean-up for
non-records content
A limit of 10 organization wide and
location based retention policies
No limit on the number of retention
policies
Covers Skype for Business and
Exchange Content
Keeps documents for 93 days after
disposition approval
Dispose of document immediately
on approval
No certification of destruction
Provides a fully auditable
certification of destruction
Covers social feeds and file share
content, with more coming
Legal hold integrates with Office 365
Can retain content in places
Labels
Retentioning
Complex Labelling Third Party
Complex Retentioning Third Party
Manage Multiple Content Sources Third Party
Records Management Third Party
Physical Records Third Party
High Certifications (DoD) Third Party
Create a Compliance Strategy for Office 365

Contenu connexe

Tendances

OneDrive & SharePoint Better Together
OneDrive & SharePoint Better TogetherOneDrive & SharePoint Better Together
OneDrive & SharePoint Better TogetherDrew Madelung
 
Plan to Migrate to SharePoint Online
Plan to Migrate to SharePoint OnlinePlan to Migrate to SharePoint Online
Plan to Migrate to SharePoint OnlineErica Toelle
 
Getting started with with SharePoint Syntex
Getting started with with SharePoint SyntexGetting started with with SharePoint Syntex
Getting started with with SharePoint SyntexDrew Madelung
 
Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...
Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...
Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...Joanne Klein
 
Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017
Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017
Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017Drew Madelung
 
Governance in o365 share point online. yes, you can and yes, you should
Governance in o365 share point online. yes, you can and yes, you shouldGovernance in o365 share point online. yes, you can and yes, you should
Governance in o365 share point online. yes, you can and yes, you shouldDon Daubert
 
Navigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePointNavigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePointJoanne Klein
 
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesSensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesDrew Madelung
 
SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365Joanne Klein
 
OneDrive for Business: Much More Than a File Share
OneDrive for Business: Much More Than a File ShareOneDrive for Business: Much More Than a File Share
OneDrive for Business: Much More Than a File ShareErica Toelle
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365NCCOMMS
 
7 ways to auto-apply retention labels in Office 365 - THR2071
7 ways to auto-apply retention labels in Office 365 - THR20717 ways to auto-apply retention labels in Office 365 - THR2071
7 ways to auto-apply retention labels in Office 365 - THR2071Joanne Klein
 
Following the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 GroupsFollowing the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 GroupsDrew Madelung
 
Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112Joanne Klein
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLaboraDK
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
 
Everything you need to know about sharing files in SharePoint & OneDrive - SP...
Everything you need to know about sharing files in SharePoint & OneDrive - SP...Everything you need to know about sharing files in SharePoint & OneDrive - SP...
Everything you need to know about sharing files in SharePoint & OneDrive - SP...Drew Madelung
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community WebinarDrew Madelung
 
Maximizing Your Office 365 Investments With OneDrive
Maximizing Your Office 365 Investments With OneDriveMaximizing Your Office 365 Investments With OneDrive
Maximizing Your Office 365 Investments With OneDriveNetwoven Inc.
 
SharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three ActionsSharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three ActionsAdam Levithan
 

Tendances (20)

OneDrive & SharePoint Better Together
OneDrive & SharePoint Better TogetherOneDrive & SharePoint Better Together
OneDrive & SharePoint Better Together
 
Plan to Migrate to SharePoint Online
Plan to Migrate to SharePoint OnlinePlan to Migrate to SharePoint Online
Plan to Migrate to SharePoint Online
 
Getting started with with SharePoint Syntex
Getting started with with SharePoint SyntexGetting started with with SharePoint Syntex
Getting started with with SharePoint Syntex
 
Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...
Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...
Taking a Crawl-Walk-Run Approach to Office 365 Retention - Ottawa SPUG (no de...
 
Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017
Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017
Essentials for the SharePoint Power User - SharePoint Engage Raleigh 2017
 
Governance in o365 share point online. yes, you can and yes, you should
Governance in o365 share point online. yes, you can and yes, you shouldGovernance in o365 share point online. yes, you can and yes, you should
Governance in o365 share point online. yes, you can and yes, you should
 
Navigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePointNavigating the Mess of a Shared drive Migration to SharePoint
Navigating the Mess of a Shared drive Migration to SharePoint
 
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint SitesSensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
Sensitivity labels for Teams, Microsoft 365 Groups & SharePoint Sites
 
SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365SPFest Chicago - Information Management and Data Governance in Office 365
SPFest Chicago - Information Management and Data Governance in Office 365
 
OneDrive for Business: Much More Than a File Share
OneDrive for Business: Much More Than a File ShareOneDrive for Business: Much More Than a File Share
OneDrive for Business: Much More Than a File Share
 
SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365SPUnite17 Information Management and Data Governance in Office365
SPUnite17 Information Management and Data Governance in Office365
 
7 ways to auto-apply retention labels in Office 365 - THR2071
7 ways to auto-apply retention labels in Office 365 - THR20717 ways to auto-apply retention labels in Office 365 - THR2071
7 ways to auto-apply retention labels in Office 365 - THR2071
 
Following the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 GroupsFollowing the Evolution of Office 365 Groups to Microsoft 365 Groups
Following the Evolution of Office 365 Groups to Microsoft 365 Groups
 
Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112Empowering the business for eDiscovery in Office 365 - BRK2112
Empowering the business for eDiscovery in Office 365 - BRK2112
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
 
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
 
Everything you need to know about sharing files in SharePoint & OneDrive - SP...
Everything you need to know about sharing files in SharePoint & OneDrive - SP...Everything you need to know about sharing files in SharePoint & OneDrive - SP...
Everything you need to know about sharing files in SharePoint & OneDrive - SP...
 
M365 Records Management Community Webinar
M365 Records Management Community WebinarM365 Records Management Community Webinar
M365 Records Management Community Webinar
 
Maximizing Your Office 365 Investments With OneDrive
Maximizing Your Office 365 Investments With OneDriveMaximizing Your Office 365 Investments With OneDrive
Maximizing Your Office 365 Investments With OneDrive
 
SharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three ActionsSharePoint Migration Series: Success Takes Three Actions
SharePoint Migration Series: Success Takes Three Actions
 

Similaire à Create a Compliance Strategy for Office 365

SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365David Broussard
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceDavid Broussard
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarRobert Crane
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...Ajay Iyer
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365Joanne Klein
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMDrew Madelung
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Chirag Patel
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365Don Daubert
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterCraig Jahnke
 
BCS ISG 24-05-18 - labelling your data in the cloud
BCS ISG  24-05-18 - labelling your data in the cloudBCS ISG  24-05-18 - labelling your data in the cloud
BCS ISG 24-05-18 - labelling your data in the cloudPeter Baddeley
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonMicrosoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonJoel Oleson
 
SharePoint Governance 101 - Austin O365 & SharePoint User Group
SharePoint Governance 101  - Austin O365 & SharePoint User GroupSharePoint Governance 101  - Austin O365 & SharePoint User Group
SharePoint Governance 101 - Austin O365 & SharePoint User GroupJim Adcock
 

Similaire à Create a Compliance Strategy for Office 365 (20)

SPSTC18 Laying Down the Law - Governing Your Data in O365
SPSTC18  Laying Down the Law - Governing Your Data in O365SPSTC18  Laying Down the Law - Governing Your Data in O365
SPSTC18 Laying Down the Law - Governing Your Data in O365
 
HSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data GovernanceHSPUG presentation - Advanced Data Governance
HSPUG presentation - Advanced Data Governance
 
March 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know WebinarMarch 2023 CIAOPS Need to Know Webinar
March 2023 CIAOPS Need to Know Webinar
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365IRMS UG Principles of Retention in Microsoft 365
IRMS UG Principles of Retention in Microsoft 365
 
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VMSecuring Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
 
Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023Understanding Security and Compliance in Microsoft Teams M365 North 2023
Understanding Security and Compliance in Microsoft Teams M365 North 2023
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
BCS ISG 24-05-18 - labelling your data in the cloud
BCS ISG  24-05-18 - labelling your data in the cloudBCS ISG  24-05-18 - labelling your data in the cloud
BCS ISG 24-05-18 - labelling your data in the cloud
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Microsoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel OlesonMicrosoft Teams Governance and Security Best Practices - Joel Oleson
Microsoft Teams Governance and Security Best Practices - Joel Oleson
 
SharePoint Governance 101 - Austin O365 & SharePoint User Group
SharePoint Governance 101  - Austin O365 & SharePoint User GroupSharePoint Governance 101  - Austin O365 & SharePoint User Group
SharePoint Governance 101 - Austin O365 & SharePoint User Group
 

Dernier

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Dernier (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Create a Compliance Strategy for Office 365

  • 1.
  • 2.
  • 3. # Time Topic 1 8:30 – 8:40 AM Introductions 2 8:40 – 9:00 AM Records Management and Compliance Scenarios 3 9:00 – 10:00 AM Cloud App Security, Azure Information Protection & Azure Rights Management 4 10:00 – 10:15 AM BREAK 5 10:15 – 11:00 AM Advanced Data Governance 6 11:00 – 11:15 AM How to Enable the Records Management and Compliance Scenarios Using Microsoft Technology 7 11:15 – 11:30 AM Options for Filling the Gaps
  • 4.
  • 5. *Consult your legal council Privacy rights related to health data Implementation of a security management process Protocols and expectations for breaches and HIPAA violations
  • 6. Source: Office of the National Coordinator for Health Information Technology (ONC)
  • 8. Perform good records management practices Train employees to follow policies and processes Have documented processes in place to protect data (and follow them) Allow people to access their data and ensure data integrity
  • 9. Perform good records management practices Train employees to follow policies and processes Have documented processes in place to protect data (and follow them) Allow people to access their data and ensure data integrity
  • 10. Risk of Non-Disposal Risk of Not Being Declared a Record Risk of Deletion Classify Information Maintenance Dispose Document Created Document Managed Document Finalized Record Managed Disposal
  • 11. DisseminateMaintain & AdministerCreate Manage Content Invisible Compliance Records Management
  • 12.
  • 14.
  • 16.
  • 17. Microsoft Cloud App Security is a CASB (Cloud Access Security Broker) that can help you bring the protection you have on-premises to your cloud apps, gaining comprehensive visibility, auditing capabilities, and granular controls to help ensure your sensitive data stays safe. Microsoft Cloud App Security provides a comprehensive, intelligent security solution that brings visibility, real-time control, and security to your cloud applications.
  • 18. Deep visibility • Identify cloud apps on your network and gain visibility into Shadow IT • Cloud App Security recognizes more than 15,000 cloud apps—no agents required • Evaluates the risk of these apps based on more than 60 parameters Powerful reporting and analytics • On-going risk detection and details on users, including • abnormal usage patterns • upload/download traffic • Transactions • help you identify anomalies right away
  • 19.
  • 20. Data loss prevention (DLP) • Enables granular control policies • Single-click remediation • Document quarantine • Sharing restrictions • Apply policies—out of the box or customized—to apps from Microsoft or other vendors • Scan and classify files in the cloud, and apply Azure Information Protection labels for protection—including encryption Compliance • Supports your compliance journey with regulatory mandates such as Payment Card Industry (PCI), Health Insurance Accountability and Portability Act (HIPAA), Sarbanes- Oxley (SOX), General Data Protection Regulation (GDPR), and others. • Factors compliance with regulations into the risk assessment score for each app • Helps you further control and protect sensitive files through policies and governance
  • 21. Real-time monitoring and control • Helps you limit activities performed within user sessions in SaaS apps based on user identity, location, device state, and detected sign-in risk level • Allow access to SaaS apps but protect downloads from unfamiliar locations • Block downloads of sensitive documents from unmanaged devices
  • 22. Behavioral analytics • Identify anomalies in cloud usage that may indicate a data breach • Learns how each user interacts with each SaaS app and, through behavioral analytics, assesses the risks in each transaction Integration with existing SIEM and DLP solutions • Cloud App Security helps preserve your familiar workflow • Enables a consistent policy across on-premises and cloud activities, while automating security procedures to better protect your cloud applications Mitigation of ransomware attacks • Offers a built-in policy template to detect potential ransomware activity • Specify governance actions to suspend suspect users and prevent further encryption of the user’s files
  • 23.
  • 24.
  • 25.
  • 26.
  • 28.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Auto-applied based on sensitive information types Auto-applied based on a search query The label is a record A user has manually applied a label Auto-applied based on a location Another label is older Except when…
  • 37. When you create auto-apply labels for sensitive information, you see the same list of policy templates as when you create a data loss prevention (DLP) policy.
  • 38. Query-based labels use the search index to identify content. • Email properties • Site properties • Contact properties • Sensitive data types • Site content shared with external users • Site content shared within your organization
  • 39. Can only apply a default label to a document library Items inside a document set do inherit the default label If you move an item with a default label from one library to another library with no default label, the old default label is removed
  • 40. A label that classifies content as a record needs to be applied manually; it can't be auto-applied For SharePoint content, any user in the default Members group (the Contribute permission level) can apply a record label to content Only the site collection administrator can remove or change that label after it's been applied You can apply a label to a folder in Exchange but not SharePoint or OneDrive
  • 41. For SharePoint content, any user in the default Members group (the Contribute permission level) can apply a record label to content
  • 42. If there are multiple rules that assign an auto-apply label and content meets the conditions of multiple rules, the label for the oldest rule is assigned. PERIOD. NO OTHER OPTION.
  • 43. Labels are auto-applied Label policy is synced to locations Status = Success (On) Labels applied automatically to content within 7 days
  • 44.
  • 45. If the label is… Then the label policy can be applied to… Exchange SharePoint OneDrive Groups Published to end users X X X X Auto-applied based on sensitive information types X X Auto-applied based on a query X X X X
  • 46. PROS CONS THIRD PARTY TOOL Use to identify and action sensitive content Application of Label can be 1-7 days Provides real time classification of content A label can be used by RecordPoint to refine a classification No hierarchy of labels Can prioritize labels No automatic application of labels to sites, content types, Has localized certifications Generic functionality that doesn’t meet local standards Can use a label as input Need to have an E5 license for automatic labelling Works with any SharePoint license No automatic labelling for records Automatic labelling of records and all content Have to apply document library labels to each location Can apply classifications from a central location
  • 47.
  • 48.
  • 49. Attached to a label. Can do the following: • Trigger a disposition review at the end of the retention period, so that SharePoint and OneDrive documents must be reviewed before they can be deleted. • Start the retention period from when the content was labeled, instead of the age of the content or when it was last modified.
  • 50. • Retaining content so that it can’t be permanently deleted before the end of the retention period. • Deleting content permanently at the end of the retention period. Entire Locations Include or Exclude Organization Wide (limit of 10 org-wide policies and entire-location policies combined) SharePoint OneDrive for Business Groups Skype for Business Exchange Email Exchange Public Folder Users (up to 1000) Groups (up to 1000) Locations (up to 100 sites)
  • 51. Retention wins over deletion Longest retention period wins Explicit inclusion wins over implicit inclusion Shortest deletion period wins
  • 52. 1. If the content is modified or deleted during the retention period 2. If the content is not modified or deleted during the retention period 2 1 Preservation Hold Library Document Library First-Stage Recycle Bin Second-Stage Recycle Bin Cleanup Retention Period User Purge Cleanup Permanent Deletion Permanent Deletion 93 Days 7 Days
  • 53. PROS CONS THIRD PARTY TOOL Simple content clean-up for non-records content A limit of 10 organization wide and location based retention policies No limit on the number of retention policies Covers Skype for Business and Exchange Content Keeps documents for 93 days after disposition approval Dispose of document immediately on approval No certification of destruction Provides a fully auditable certification of destruction Covers social feeds and file share content, with more coming Legal hold integrates with Office 365 Can retain content in places
  • 54.
  • 55. Labels Retentioning Complex Labelling Third Party Complex Retentioning Third Party Manage Multiple Content Sources Third Party Records Management Third Party Physical Records Third Party High Certifications (DoD) Third Party

Notes de l'éditeur

  1. Also: Do the above at the lowest possible cost & prepare to be audited
  2. Note: Risks will appear on click This slide highlights some of the issues we saw on the typical solutions slide Records controls didn’t come in until after the document is finalised/declared Users needed to be “in on” the declaration process Additionally, here are some of the other risks highlighted by this process: Risk of deletion: before the document has been declared a record Risk of note being declare a record Risk of non-disposal: the content is kept too long opening us up to liability
  3. Note: 2nd and 3rd rows will appear on the 2nd and 3rd click Benefits of Managing Content as a Record The correct retention and disposition policy is applied to content from the beginning No need to reclassify information as a record later No risk of accidental deletion of content Risk of Not Using This Approach See risks of deletion and risks of non-disposal above Lengthy and cumbersome disposal approval processes Other ISO Notes X x Jeremy Comments: Would be great if we could hide the records management, then have a click through that makes it appear. Really want to call out that really all we need from the user is to manage content, and we do the rest – which then ties into next slide
  4. Manual label will always override automatic label
  5. Manual label will always override automatic label
  6. Who is it for?
  7. Who is it for?