SlideShare a Scribd company logo
1 of 12
Security in Business Productivity Online Suite Updated June 1, 2010 Presented  to you by:
Agenda What is Business Productivity Online Suite Microsoft Online Services Risk Management Security Privacy & Regulatory Service Continuity Compliance Management Customer Benefits Q&A
Business Productivity Online Suite Some existing customers
Risk Management Program 4 Information Security Policy Security Privacy Service Continuity Compliance Management
Security Program A risk-based, multi-dimensional approach to help safeguard services and data Security Management  Security Monitoring & Response, Threat & Vulnerability Management Data Access Control & Monitoring, File/Data Integrity User Account Management, Training & Awareness, Screening Application Secure Development Lifecycle, Access Control & Monitoring, Anti-Malware Host Access Control & Monitoring, Anti-Malware, Patch & Config Mgmt Internal Network Dual-factor Authentication, Intrusion Detection, Vulnerability Scanning Network perimeter Facility Edge Routers, Firewalls, Intrusion Detection, Vulnerability Scanning Video Surveillance, biometrics, Access Control 5
Privacy Program Designed to establish consistent "high bar" privacy practices that support global standards for data handling and transfer Documented & enforced privacy requirements  ,[object Object]
Microsoft Online Services Privacy and Regulatory Divisional Requirements Specific to Software + Services
Corporate-level Privacy Guidelines for Service DevelopmentPrivacy disclosures & transparency ,[object Object]
EU Safe Harbor Certification6
Service Continuity Program Business Impact Assessment Single point of failure and dependency analysis Defined recovery objectives Documented recovery plans and procedures Recovery exercises 7
Compliance Management 8 Rationalize and harmonize requirements Microsoft internal Corporate (security & privacy policies, etc.) Microsoft Online Services (security & privacy policies) Trustworthy Computing (SDL, Engineering Excellence, etc.) Industry & regulatory Industry best practices: ISO/IEC 27001:2005, NIST SP 800-53 Customer requirements: SOX, HIPAA, FISMA, GLBA, PCI DSS Data protection laws Remove non-applicable, harmonize redundant, identify conditional Inputs Common Baseline Requirements Conditional Requirements
Compliance Monitoring & Assessment Internal monitoring Technical compliance (patch and configuration mgmt, vulnerability scans, penetration tests, etc.) Personnel compliance (training and awareness, screening, etc.) Process compliance (business process evaluation, change control, access management, etc.) Physical security compliance (CCTV monitoring, access control and logging, etc.) Third Party validation Facilities & infrastructure services – ISO cert + SAS 70 BPOS Dedicated – ISO aligned + SAS 70 BPOS Standard – ISO aligned 9 Future plans call for formal ISO and SAS 70 Type II certification for all BPOS services

More Related Content

Viewers also liked

建设有中国特色的“山寨”网站
建设有中国特色的“山寨”网站   建设有中国特色的“山寨”网站
建设有中国特色的“山寨”网站
wucang
 
Co pa power point
Co pa power pointCo pa power point
Co pa power point
krnprjp
 

Viewers also liked (9)

Derechos de los pueblos indígenas
Derechos de los pueblos indígenasDerechos de los pueblos indígenas
Derechos de los pueblos indígenas
 
Zene
ZeneZene
Zene
 
moataz_cvvvvv
moataz_cvvvvvmoataz_cvvvvv
moataz_cvvvvv
 
Bredbury hall cs
Bredbury hall csBredbury hall cs
Bredbury hall cs
 
建设有中国特色的“山寨”网站
建设有中国特色的“山寨”网站   建设有中国特色的“山寨”网站
建设有中国特色的“山寨”网站
 
Productivity analysis of Burried/underground cable laying Activity
Productivity analysis of Burried/underground cable laying ActivityProductivity analysis of Burried/underground cable laying Activity
Productivity analysis of Burried/underground cable laying Activity
 
10 advantages of ecommerce website
10 advantages of ecommerce website10 advantages of ecommerce website
10 advantages of ecommerce website
 
Org Design with Meta Programs
Org Design with Meta ProgramsOrg Design with Meta Programs
Org Design with Meta Programs
 
Co pa power point
Co pa power pointCo pa power point
Co pa power point
 

Recently uploaded

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Recently uploaded (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

Microsoft Online Services Risk Management

  • 1. Security in Business Productivity Online Suite Updated June 1, 2010 Presented to you by:
  • 2. Agenda What is Business Productivity Online Suite Microsoft Online Services Risk Management Security Privacy & Regulatory Service Continuity Compliance Management Customer Benefits Q&A
  • 3. Business Productivity Online Suite Some existing customers
  • 4. Risk Management Program 4 Information Security Policy Security Privacy Service Continuity Compliance Management
  • 5. Security Program A risk-based, multi-dimensional approach to help safeguard services and data Security Management Security Monitoring & Response, Threat & Vulnerability Management Data Access Control & Monitoring, File/Data Integrity User Account Management, Training & Awareness, Screening Application Secure Development Lifecycle, Access Control & Monitoring, Anti-Malware Host Access Control & Monitoring, Anti-Malware, Patch & Config Mgmt Internal Network Dual-factor Authentication, Intrusion Detection, Vulnerability Scanning Network perimeter Facility Edge Routers, Firewalls, Intrusion Detection, Vulnerability Scanning Video Surveillance, biometrics, Access Control 5
  • 6.
  • 7. Microsoft Online Services Privacy and Regulatory Divisional Requirements Specific to Software + Services
  • 8.
  • 9. EU Safe Harbor Certification6
  • 10. Service Continuity Program Business Impact Assessment Single point of failure and dependency analysis Defined recovery objectives Documented recovery plans and procedures Recovery exercises 7
  • 11. Compliance Management 8 Rationalize and harmonize requirements Microsoft internal Corporate (security & privacy policies, etc.) Microsoft Online Services (security & privacy policies) Trustworthy Computing (SDL, Engineering Excellence, etc.) Industry & regulatory Industry best practices: ISO/IEC 27001:2005, NIST SP 800-53 Customer requirements: SOX, HIPAA, FISMA, GLBA, PCI DSS Data protection laws Remove non-applicable, harmonize redundant, identify conditional Inputs Common Baseline Requirements Conditional Requirements
  • 12. Compliance Monitoring & Assessment Internal monitoring Technical compliance (patch and configuration mgmt, vulnerability scans, penetration tests, etc.) Personnel compliance (training and awareness, screening, etc.) Process compliance (business process evaluation, change control, access management, etc.) Physical security compliance (CCTV monitoring, access control and logging, etc.) Third Party validation Facilities & infrastructure services – ISO cert + SAS 70 BPOS Dedicated – ISO aligned + SAS 70 BPOS Standard – ISO aligned 9 Future plans call for formal ISO and SAS 70 Type II certification for all BPOS services
  • 13. Commitment in Action What we provide Services are designed, engineered and operated with security as core tenet Privacy of customer data is respected Audits demonstrate independent validation Service resiliency and service and data recoverability are fundamental to service operations 99.9% uptime SLA Customer benefits Mature and comprehensive security management Service upgrades and security updates Comprehensive security monitoring and response Customer control over customer data Compliance management capabilities available to customers 10
  • 14.
  • 15. Technical information on TechNet http://technet.microsoft.com/msonline
  • 16.

Editor's Notes

  1. Today, I want to do a quick refresher on what the Business Productivity Online Suite is, then dive right into our Risk Management Program. There are four components of the Microsoft Online Services Risk Management Program, and we’ll explore each one in some detail. Then we’ll pop back up to the high level to talk about what this all means to you.
  2. Microsoft Online Services is a set of enterprise class software delivered as subscription services hosted by Microsoft and sold with partners. Our goal is to create a service option for every one of our business software products. The Business Productivity Online Suite is the initial set of services we are offering under that umbrella. It includes email, collaboration, conferencing, and instant messaging capabilities: Exchange Online, SharePoint Online, Office Live Meeting, and Office Communications Online.There are more than 500,000 seats under management by Microsoft Online Services today. Customers subscribing to the Business Productivity Online Suite include:Ingersoll-RandDoosanAvivaBlockbusterTycoEddie BauerXL CapitalEnergizerCoca-Cola EnterprisesAutodeskCeridianPitney Bowes
  3. When we think about security for Microsoft Online Services, we do so in the context of the Microsoft Online Services Risk Management Program. This includes the intertwined disciplines of security, privacy, continuity, and compliance. In a nutshell, the objective of the program is to helpprotect the availability, confidentiality, and integrity of Microsoft Online Services and customer data. We do that by uniformly managing security, privacy, continuity and compliance under a single, centrally managed Program.In designing the program, we adopted and maturedthe best practices that had already been developing within Microsoft for years. The Global Foundation Services (GFS) arm of Microsoft has been operating online services since the launch of MSN in 1994. That team brings a deep and rich security capability to today’s Microsoft Online Services. We extend the framework that GFS has in place for maintaining certifications against industry standards, which I’ll talk about in more depth later. In 2002, the company formed the Trustworthy Computing initiative with Bill Gates committing Microsoft to fundamentally changing its mission and strategy in key areas. Today, Trustworthy Computing is a core corporate value at Microsoft, guiding nearly everything the company does. At the foundation of this initiative are these four pillars: Privacy, Security, Reliability, and Business Practices. The rigorous security practices employed by development teams at Microsoft were formalized into a process called the Security Development Lifecycle (SDL) in 2004. We’ve extended those practices to the development and operation of Microsoft Online Services. We’ve adapted and extended Microsoft’s corporate Enterprise Risk Management practices, and we maintain alignment with the ISO 27001 framework. All these ingredients helped us develop a robust Risk Management Program and get the benefit of the breadth and depth of Microsoft’s experience.There are a few common elements shared across all components of the Program:Information Security Policy – which represents an aggregate of requirements based on internal policies and external standardsRisk Assessment – through which we identify and address unique risks to services and customers by means of a comprehensive assessment and management methodologyTraining & Awareness – to ensure personnel are aware of the Program objectives and associated Policy, they understand their roles & responsibilities and they are adequately trained on critical procedures.Why is it so important that we have this centralized Risk Management Program? First, it helps us create a common security “bar” for all our services to meet. It allows us to use standardized solutions for better consistency, reduced complexity and by extension reduced risk. It provides us centralized monitoring and response, so we can get both service-specific and aggregated views of the health and status of our services, which helps us provide better visibility of health and status to our customers.
  4. The Security Program takes a risk-based, multi-dimensional approach to putting in place the necessary & adequate safeguards across all aspects of a service. The Program aims to define security requirements applicable to people, processes and technology, and implement corresponding controls & capabilities across the services themselves, the supporting platform and infrastructure components, as well as the hosting facilities and the hardware residing within them. Role & Responsibility of the Security Program: Help ensure services are developed in a secure manner. Microsoft’s Secure Development Lifecycle plays a critical role here. Help ensure the services are operated in a secure environment. Security controls exist across and within all layers of a given service, which supports the principle of defense-in-depth.Help ensure that services and infrastructure are monitored for configuration errors, vulnerabilities, security events and anomalous behavior.Help ensure incidents are promptly detected and a mature incident management process not only addresses the immediate issue, but identifies and corrects the cause.Help ensure personnel are adequately prepared and trained to identify security issues and provide notification through the appropriate procedure.
  5. Privacy is a complex issue, and one that we recognize is absolutely critical to customers in considering online services. Our privacy program takes in the customer requirements we’ve heard, and the broad set of international standards for data handling and transfer. From those inputs, it establishes a set of privacy policies and practices that are designed to consistently meet or exceed all the requirements.The Microsoft Online Services Privacy Statement is designed specifically for Microsoft enterprise Software + Services customers – it is not a one-size-fits-all policy. We believe our relationship with enterprise customers is materially different from our relationship with consumers. All customers’ privacy is equally important, but the ways we interact with them are markedly different.The Microsoft Online Services Privacy Statement is standardized across all Microsoft Online standard services, keeping things simple for the customer. Our privacy policy is based on a few core concepts that are shared with the Safe Harbor framework: Notice – so that customers are notified of our policyChoice – enabling customers to choose whether they want to enter into a relationship with usDisclosure – so customers know how we will and won’t use their data
  6. The Service Continuity Program is based on industry best practices for business continuity and ensures a standardized approach is taken by all BPOS services for recovery.The SCM Program Phases are: 1.  GovernanceManagement and oversight to all phases of the Service Continuity Program help to ensure consistent methodology, terminology, templates and tool sets.  2.  Business Impact AnalysisA process designed to prioritize business functions by assessing the potential financial and non-financial impact that might result if an organization was to experience a business continuity event for a specific service. 3.  Dependency AnalysisA process in which we identify time-critical functions, their recovery priorities, and inter-dependencies so that recovery time objectives can be established. 4.  Gap Analysis & ReportingA process that identifies current or estimated capability versus the recovery time objective.  In this phase, the team identifies any gaps associated with the people, process, technical and facilities components. 5. Strategies & SolutionsBased on the results of the previous phases, the team develops appropriate business continuity strategies. The strategies are designed to meet the recovery time and point objectives in support of the organization’s critical functions. 6.  PlanningIn this phase, we design, develop, and implement Business Continuity Plans that provide continuity and/or recovery. 7. Maintaining & ExercisingThis is a critical process. We establish an exercise/testing program which documents plan exercise requirements including the planning, scheduling, facilitation, communications, auditing and post review documentation. After we establish such program, we carry out those exercises on a regular basis according to our documented plan.   8. Awareness and TrainingPolicies and processes don’t work if the people behind them aren’t trained. We create and maintain corporate awareness and enhance the skills which are required to develop and implement Service Continuity Management.         Definitions Recovery Time Objective (RTO)The period of time within which systems, applications, or functions must be recovered after an outage (e.g. one business day). RTO’s are often used as the basis for the development of recovery strategies, and as a determinant as to whether or not to implement the recovery strategies during a disaster situation.Recovery Point Objective (RPO) The maximum amount of data loss an organization can sustain during an event. 
  7. The Compliance Management Program acts as a sort of glue, binding the programs and associated requirements together into a cohesive control-set. This Program helps to collect, rationalize and harmonize the requirements derived from a number of internal and external sources, ensuring that similar or redundant requirements are collapsed into a single control, and that requirements that must be met in specific situations are identified and addressed appropriately. As in our privacy program, we strive to create “high bar” standards that meet or exceed all the requirements we’ve taken in. This optimized control set helps ensure that all requirements are met appropriately, but also helps to reduce complexity and costs. Where common requirements exist across multiple services, the compliance program helps to identify a standard solution that can be used by all services. The SDL is a good example of a common process that helps all services meet requirements related to secure software development. Another example is a common change management process and supporting tool.The control framework can also document identified risks and provide a means through which to track and monitor the associate mitigations.
  8. Using the extensible control framework provided by the Compliance Management Program, a custom control set can be created for each online service. This control set helps to document the requirements the service must meet, and serves as a checklist of sorts that can be used to validate compliance. We validate compliance when we first launch the service, as well as periodically on an ongoing basis. Assessment occurs at the procedural level, through standardized monitoring of the service environment, as well as through assessments conducted during subsequent service updates, assessments performed by the Risk Management team, and assessments conducted by Microsoft’s internal audit team.In addition to these internal assessments, Microsoft Online Services undergo review and assessment by independent third-party organizations. The facilities that BPOS services run out of, as well as the infrastructure used to support the services, have obtained ISO 27001 certification, as well as SAS 70 type II audit reports. The BPOS Dedicated offering has successfully obtained SAS 70 type II reports for several years, and is pursuing formal ISO certification by the end of 2009. The BPOS Standard offering is pursuing both a SAS 70 report and ISO certification by the end of the year. The BPOS strategy is to leverage ISO as a vehicle to provide broad assessment of our security, privacy and continuity capabilities, while relying upon the increased level of scrutiny provided by SAS 70 for critical or key controls. Microsoft believes this approach serves to demonstrate that our capabilities and practices are well defined, and that they have been implemented appropriately and are operating effectively.As the ISO and SAS certifications are achieved, customers can use those to determine whether the BPOS services have sufficient controls and practices in place for them to meet their own compliance obligations.
  9. When a customer purchases the BPOS services, they not only get the enhanced business productivity services, they also get the added benefits of having Microsoft manage the security of the services, including:upgrading the application software and applying security updates. operation of critical security infrastructurecomprehensive monitoring and logging capabilities, as well as mature incident management. More importantly, customers retain control over their own data, as well as their ability to manage and meet their own compliance obligations.