History of
Content Security
Part II
Adam Levithan
14 octobre 2017
#SPSParis
Community Member
Since 2007
@collabadam
Adam Levithan
Senior Product Manager
Secure Collaboration
Copyright 2017 Exostar LLC | All Rights Reserved 3
Merci pour votre soutien
PART I
Copyright 2017 Exostar LLC | All Rights Reserved | Proprietary and Confidential 6
PART I
Copyright 2017 Exostar LLC | All Rights Reserved | Proprietary and Confidential 7
PART I I
Threat Landscape
82,000
cyber incidents impacting
global organizations1
225
organizations
impacted daily1
$4 million
lost per breach2
Threat Landscape
Customers are sharing more than ever
MALICIOUS
INSIDER
ACCIDENTAL
DATA EXPOSURE
MALICIOUS
OUTSIDER
59% 23% 14%
SOURCE OF BREACH DATA – 2013-2017 – breachlevelindex.com
How Do Data Leaks Happen?
Balancing end user and IT expectations
History of Security Part II
Know Your Users Track EverythingProtect Your Content
History of Security Part II
Know Your Users ClassifyTrack EverythingProtect Your Content
IDENTIFY ACCESS
?
Life Sciences Scenario – Authentication Explosion
Life Sciences Scenario – Single Sign On
On-premises /
Private cloud
Secure your organization’s identity
Require two-factor authentication
Prevents stolen credentials from accessing Office 365 resources
Enable on a per-person basis in the Office 365 admin center
Authenticate via SMS, phone call, certificate, or hardware token
Control Content Sharing
Prevents accidental data leakage
Enable at multiple levels, Tenant, Site Collection and Sites (coming soon)
Track policies are being followed through Security & Compliance Center & Powershell
Govern your organization’s access
Consider device-based conditional access
Require a healthy device in addition to a trusted identity
Limit functionality when an unmanaged device accesses SharePoint through the browser
Health determined via domain join status or Intune compliance
Force sign-out of idle sessions
Prevents accidental exposure on shared devices
Currently in preview, available for all customers in 2018
Evaluate the need for IP-based conditional access
Simulate restricted access model of an on-premises deployment
Restricts SharePoint access to specific client IP ranges that you configure
Limit risk of untrusted devices
Restrict sync to trusted devices
Prevent data from being stored locally on unmanaged devices
Policy allows sync to only devices joined to your domain
Safeguard data on mobile devices with Mobile Device Management
Limit exposure of data accessed via the OneDrive and SharePoint mobile apps
Disallow opening content in other apps, downloading files
Encrypt app data when device is locked, prevent app data from being backed up
History of Security Part II
ProtectProtect Your Content
CONTENT APPLICATIONNETWORKPHYSICAL
Know Your Users Track Everything
Things to Consider
Known Vulnerabilities
• Enable business apps
• Block “bad” apps
• Limit app functions
• Limit file types
• Block websites
• Exploits
• Malware
Unknown Vulnerabilities
• Detect Malicious websites
• Bad domains
• Stolen credentials
• Dynamic analysis
• Static analysis
• Attack techniques
• Anomaly detection
• Analytics
Physical and logical isolation
Limited datacenter access
Restricted to essential personnel only
Multiple factors of authentication including smart cards and biometrics
On-premise security officers, motion sensors, video surveillance
Intrusion detection alerts include anomalous activity by datacenter engineers
Isolated network and identity
Networks are isolated from the Microsoft corporate network
Administered with dedicated Active Directory domains
No domain trust outside of the service, no domain trust between test and production
Further partitioned into isolated domains for management and security
Protected in transit
Encrypted between client and service
TLS 1.2 with Perfect Forward Secrecy, 2048-bit key
TLS 1.0 is minimum supported protocol
Connection will negotiate the most secure protocol supported by your client
Only secure access is permitted
SharePoint Online requires HTTPS for all authenticated connections
HSTS header prevents HTTP downgrade on untrusted networks
Encrypted within the service
Customer content is always encrypted in transit between datacenters
Application security
Security Development Lifecycle
All engineers receive security training annually
Code review and static analysis required for every change
Microsoft Security Response Center
Dedicated team for vulnerability report assessment and response
Skilled engineers triage reports and evaluate mitigations
Online Services Bug Bounty
Incentivizes vulnerability hunting by external researchers
Researchers receive credit and financial reward when they disclose responsibly
Service Encryption
Application-level encryption
Service uses per-file keys to protect SharePoint content
Microsoft manages these keys
Service automatically creates them when a file is uploaded or edited
Microsoft can transparently roll them or upgrade them as needed
Defense-in-depth
Ensures separation between server admins, Azure admins, and customer content
Service Encryption with Customer Key
Customer Keys Tenant Intermediate Key Site Encryption Key File Chunk Keys
Content security
Volume encryption
BitLocker encryption protects drives where content is stored
Renders content unreadable if drive is removed from the server
Per-file encryption
Contents of each file encrypted with a unique key
Large files are stored in parts with a unique key per part
Encrypted contents, encryption keys, file part mapping are stored separately
DETECT
PROTECT
CLASSIFYMONITOR
MICROSOFT’S
INFORMATION
PROTECTION
TECHNOLOGIES
WINDOWS INFORMATION
PROTECTION
OFFICE 365 ADVANCED
SECURITY MANAGEMENT
MICROSOFT CLOUD APP
SECURITY
MESSAGE ENCRYPTION
CONDITIONAL ACCESS
OFFICE APPS
AZURE INFORMATION
PROTECTION
OFFICE 365 DLP
3rd PARTY DLP
OFFICE 365 ADVANCED
DATA GOVERNANCE
SHAREPOINT & GROUPS
Information Protection Labeling
A label is a simplified way for end-users to classify
& protect their content
Today, may require configuration in multiple places
& add-in for Office client apps
GOAL: Consistent & persistent labeling across
information protection solutions
COMING SOON Consistent label configuration
and application
COMING SOON Built-in native labeling
support for Office apps – Mac and web to start;
Windows, iOS & Android thereafter
Data Loss Prevention
Detect sensitive information across Office 365
Choose from 80+ sensitive information types – or
create your own
Customize policies, exclusions and actions
Block accidental sharing and educate users
View and monitor reports, alerts, events
NEW Custom sensitive information types
NEW HIPAA sensitive information types
NEW Large dictionary support
Data GovernanceLeverage intelligence to automate data retention and deletion
Advanced Data Governance
NEW Consistently manage records that have retention
periods associated with specific
event triggers
NEW Manual disposition review to defensibly delete
what’s redundant, trivial or obsolete
NEW Supervise employee communications to comply
with security and regulatory guidelines
Automate data retention by leveraging
recommendations driven by machine learning
Automatically classify the data most relevant for your
organization or industry
Policy recommendations (delete, move, encrypt, or
share) based on data insights and intelligence
History of Security Part II
Know Your Users ClassifyTrack EverythingProtectProtect Your Content
Copyright 2017 Exostar LLC | All Rights Reserved | Proprietary and Confidential 35
Compliance in Aerospace & Defense
TechnologyNon-Technology
Control Families
- Access Control
- Awareness and Training
- Audit and Accountability
- Configuration Management
- Identification and
Authentication
- Incident Response
- Maintenance
- Media Protection
- Physical Protection
- Personnel Security
- System and Communications
Protection
- System and Information
Integrity
Documents not supported by DLP
Control Families
- Access Control
- Awareness and Training
- Audit and Accountability
- Incident Response
- Media Protection
- Personnel Security
- Risk Assessment
- Security Assessment
- System and Information Integrity
Documents Stored in Team Collaboration & supported by DLP
Identity &
Access
Management
Team
Collaboration
DLP
Cloud
Know when policy is violated
Incident report and alert emails inform you in real time when content
violates policy.
See the effectiveness of your policies
Built-in reports help you see historical information and tune policies.
Take action to correct violations
Investigate violations in your organization and take remediation
actions.
Integrates with other systems
Leverage the Activity Management API to pull information into SIEM
and workflow tools.
Monitor and Remediate
Meet your regulatory requirements
Audit Office 365 activity
Search and download audit logs from the Office 365 Security Center
Configure activity alerts on specific audit event criteria
Configure an eDiscovery Center
Supports full lifecycle of electronic discovery across SharePoint, Exchange, and Skype
Create cases, add content sources, run keyword queries, place holds
Apply retention policies
Retain content for a minimum period of time or delete content that exceeds a timespan
Policy can be scoped to content containing specific keywords or sensitive information
Unified
Auditing
Pipeline
Compliance Center
Office 365 Activity Report
PowerShell cmdlet
Long-term
Auditing Storage
in O365
Azure AD
SharePoint Online
Exchange Online
OneDrive for Business
Office 365 Activity API
Third party application
Management
Activity API
Leverage actionable insights
Actionable insights and management control
Security and Compliance Center
Powerful for experts, and easier for generalists to
adopt
Scenario oriented workflows with cross-cutting
policies spanning features
Powerful content discovery across Office 365
workloads
Proactive suggestions leveraging Microsoft Security
Intelligence Graph
Confidence through operational security
tools to help you understand and investigate
cyber-threats and take action to protect your
organization from them
History of Security Part II
Know Your Users ClassifyTrack EverythingProtectProtect Your Content
QUESTIONS Adam Levithan
Adam.levithan@Exostar.com
@collabadam
Thank you, for your for #SPSParis
B2 - The History of Content Security: Part 2 - Adam Levithan

More Related Content

PPTX
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
PDF
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
PDF
Microsoft Enterprise Mobility and Security EMS
PDF
One name unify them all
PPSX
Thread Legal and Microsoft 365 Security
PDF
Power Saturday 2019 E1 - Office 365 security
PPTX
Microsoft Cloud Application Security Overview
PDF
Introduction to Microsoft Enterprise Mobility + Security
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Microsoft Enterprise Mobility and Security EMS
One name unify them all
Thread Legal and Microsoft 365 Security
Power Saturday 2019 E1 - Office 365 security
Microsoft Cloud Application Security Overview
Introduction to Microsoft Enterprise Mobility + Security

What's hot (20)

PPTX
Overview of Microsoft Enterprise Mobility & Security(EMS)
PDF
Azure Information Protection
PDF
Learn how to protect against and recover from data breaches in Office 365
PDF
Information protection & classification
PDF
SD-WAN - comSpark 2019
PDF
Microsoft Azure Rights Management
PDF
Azure information protection_datasheet_en-us
PDF
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
PDF
SharePoint Security Playbook [eBook]
PDF
File Security in Microsoft SharePoint and OneDrive
PDF
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
PPTX
2 Modern Security - Microsoft Information Protection
PPTX
Azure information protection
PDF
Emma Aubert | Information Protection
PPTX
cyber-security-reference-architecture
PDF
Daniel Grabski | Microsofts cybersecurity story
PDF
Microsoft Office 365 Security and Compliance
PDF
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PDF
Microsoft 365 Security and Compliance
PPTX
Primend praktiline konverents - Office 365 turvalisus
Overview of Microsoft Enterprise Mobility & Security(EMS)
Azure Information Protection
Learn how to protect against and recover from data breaches in Office 365
Information protection & classification
SD-WAN - comSpark 2019
Microsoft Azure Rights Management
Azure information protection_datasheet_en-us
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
SharePoint Security Playbook [eBook]
File Security in Microsoft SharePoint and OneDrive
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
2 Modern Security - Microsoft Information Protection
Azure information protection
Emma Aubert | Information Protection
cyber-security-reference-architecture
Daniel Grabski | Microsofts cybersecurity story
Microsoft Office 365 Security and Compliance
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
Microsoft 365 Security and Compliance
Primend praktiline konverents - Office 365 turvalisus
Ad

Similar to B2 - The History of Content Security: Part 2 - Adam Levithan (20)

PPTX
Intelligent Security, Compliance and Privacy in Office 365
PPTX
History of Content Security: Take 2 - ShareCloudSummit Houston
PPTX
Security and compliance in Office 365 -Part 1
PPTX
Intro to Office 365 Security & Compliance Center
PDF
Office 365 Security - MacGyver, Ninja or Swat team
PPTX
Securing SharePoint & OneDrive in Office 365
PPTX
Security and Compliance with SharePoint and Office 365
PPTX
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
PPTX
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
PPTX
Microsoft Information Protection: Your Security and Compliance Framework
PDF
Security and Compliance
PDF
May 2020 Microsoft 365 Need to Know Webinar
PDF
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
PPTX
SC-900 Capabilities of Microsoft Compliance Solutions
PPTX
Office 365 Saturday - Office 365 Security Best Practices
PPTX
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
PDF
December 2019 Microsoft 365 Need to Know Webinar
PPTX
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
PPTX
3_Microsoft Security Overview.pptx revisiones
PDF
Brk30010 - With so many different ways to secure data across the Office 365 p...
Intelligent Security, Compliance and Privacy in Office 365
History of Content Security: Take 2 - ShareCloudSummit Houston
Security and compliance in Office 365 -Part 1
Intro to Office 365 Security & Compliance Center
Office 365 Security - MacGyver, Ninja or Swat team
Securing SharePoint & OneDrive in Office 365
Security and Compliance with SharePoint and Office 365
Securing Team, SharePoint, and OneDrive in Microsoft 365 - M365VM
What's new in Security and Compliance in SharePoint , OneDrive for Business &...
Microsoft Information Protection: Your Security and Compliance Framework
Security and Compliance
May 2020 Microsoft 365 Need to Know Webinar
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
SC-900 Capabilities of Microsoft Compliance Solutions
Office 365 Saturday - Office 365 Security Best Practices
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
December 2019 Microsoft 365 Need to Know Webinar
St. Louis SharePoint User Group - Security and Compliance in O365 for SharePo...
3_Microsoft Security Overview.pptx revisiones
Brk30010 - With so many different ways to secure data across the Office 365 p...
Ad

More from SPS Paris (20)

PDF
I6 - State of the art SharePoint PowerShell Nation 2017 - Spencer Harbar
PPTX
B4 - Teams, groups, SharePoint, Yammer - what should i use and when - Dux Ray...
PPTX
B6 - An initiative to healthcare analytics with Office 365 & PowerBI - Thuan ...
PDF
U2 - Déployer Microsoft Teams avec succès
PDF
B5 - Introduction à Microsoft Flow - Isabelle Van Campenhoudt, Sabrine chouk,...
PDF
B3 - Building Humanitarian Applications with PowerApps, Flow and Office 365 -...
PDF
U6 - Modern collaboration in teams and projects powered by Office 365 - Jaspe...
PDF
U5 Qu'est-ce que VOUS obtenez de SharePoint hybride ? - Vlad Catrinescu
PDF
U1 - Quoi de neuf avec le Microsoft Graph - Vincent Biret
PDF
D6 - Les nouveautés SPFx - Olivier Carpentier
PDF
D5 - Getting up to speed with type script development - Elio Struyf
PPTX
D3 - SharePoint framework – une nouvelle expérience de développement - Gaetan...
PPTX
D2 - Automate Custom Solutions Deployment on Office 365 and Azure - Paolo Pia...
PDF
D1 - Building Great Client-side Web Parts with SPFx, PnP-JS-Core, ReactJS and...
PPTX
I5 - Bring yourself up to speed with power shell
PPTX
I4 - Méthodes d'audit et d'optimisation pour votre tenant Office 365 - Joelle...
PPTX
I3 - Running SharePoint 2016 in Azure the do's and dont's - Jasjit Chopra
PDF
I2 - SharePoint Hybrid Search Start to Finish - Thomas Vochten
PPTX
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
PDF
SPS Paris 2017 agenda
I6 - State of the art SharePoint PowerShell Nation 2017 - Spencer Harbar
B4 - Teams, groups, SharePoint, Yammer - what should i use and when - Dux Ray...
B6 - An initiative to healthcare analytics with Office 365 & PowerBI - Thuan ...
U2 - Déployer Microsoft Teams avec succès
B5 - Introduction à Microsoft Flow - Isabelle Van Campenhoudt, Sabrine chouk,...
B3 - Building Humanitarian Applications with PowerApps, Flow and Office 365 -...
U6 - Modern collaboration in teams and projects powered by Office 365 - Jaspe...
U5 Qu'est-ce que VOUS obtenez de SharePoint hybride ? - Vlad Catrinescu
U1 - Quoi de neuf avec le Microsoft Graph - Vincent Biret
D6 - Les nouveautés SPFx - Olivier Carpentier
D5 - Getting up to speed with type script development - Elio Struyf
D3 - SharePoint framework – une nouvelle expérience de développement - Gaetan...
D2 - Automate Custom Solutions Deployment on Office 365 and Azure - Paolo Pia...
D1 - Building Great Client-side Web Parts with SPFx, PnP-JS-Core, ReactJS and...
I5 - Bring yourself up to speed with power shell
I4 - Méthodes d'audit et d'optimisation pour votre tenant Office 365 - Joelle...
I3 - Running SharePoint 2016 in Azure the do's and dont's - Jasjit Chopra
I2 - SharePoint Hybrid Search Start to Finish - Thomas Vochten
I1 - Securing Office 365 and Microsoft Azure like a rockstar (or like a group...
SPS Paris 2017 agenda

Recently uploaded (20)

DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPT
Geologic Time for studying geology for geologist
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PPTX
Internet of Everything -Basic concepts details
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
Basics of Cloud Computing - Cloud Ecosystem
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
A review of recent deep learning applications in wood surface defect identifi...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
sustainability-14-14877-v2.pddhzftheheeeee
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
OpenACC and Open Hackathons Monthly Highlights July 2025
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Comparative analysis of machine learning models for fake news detection in so...
Geologic Time for studying geology for geologist
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Early detection and classification of bone marrow changes in lumbar vertebrae...
Internet of Everything -Basic concepts details
The influence of sentiment analysis in enhancing early warning system model f...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...

B2 - The History of Content Security: Part 2 - Adam Levithan

  • 1. History of Content Security Part II Adam Levithan 14 octobre 2017 #SPSParis
  • 2. Community Member Since 2007 @collabadam Adam Levithan Senior Product Manager Secure Collaboration Copyright 2017 Exostar LLC | All Rights Reserved 3
  • 5. Copyright 2017 Exostar LLC | All Rights Reserved | Proprietary and Confidential 6 PART I
  • 6. Copyright 2017 Exostar LLC | All Rights Reserved | Proprietary and Confidential 7 PART I I
  • 7. Threat Landscape 82,000 cyber incidents impacting global organizations1 225 organizations impacted daily1 $4 million lost per breach2
  • 9. Customers are sharing more than ever
  • 10. MALICIOUS INSIDER ACCIDENTAL DATA EXPOSURE MALICIOUS OUTSIDER 59% 23% 14% SOURCE OF BREACH DATA – 2013-2017 – breachlevelindex.com How Do Data Leaks Happen?
  • 11. Balancing end user and IT expectations
  • 12. History of Security Part II Know Your Users Track EverythingProtect Your Content
  • 13. History of Security Part II Know Your Users ClassifyTrack EverythingProtect Your Content IDENTIFY ACCESS ?
  • 14. Life Sciences Scenario – Authentication Explosion
  • 15. Life Sciences Scenario – Single Sign On
  • 17. Secure your organization’s identity Require two-factor authentication Prevents stolen credentials from accessing Office 365 resources Enable on a per-person basis in the Office 365 admin center Authenticate via SMS, phone call, certificate, or hardware token Control Content Sharing Prevents accidental data leakage Enable at multiple levels, Tenant, Site Collection and Sites (coming soon) Track policies are being followed through Security & Compliance Center & Powershell
  • 18. Govern your organization’s access Consider device-based conditional access Require a healthy device in addition to a trusted identity Limit functionality when an unmanaged device accesses SharePoint through the browser Health determined via domain join status or Intune compliance Force sign-out of idle sessions Prevents accidental exposure on shared devices Currently in preview, available for all customers in 2018 Evaluate the need for IP-based conditional access Simulate restricted access model of an on-premises deployment Restricts SharePoint access to specific client IP ranges that you configure
  • 19. Limit risk of untrusted devices Restrict sync to trusted devices Prevent data from being stored locally on unmanaged devices Policy allows sync to only devices joined to your domain Safeguard data on mobile devices with Mobile Device Management Limit exposure of data accessed via the OneDrive and SharePoint mobile apps Disallow opening content in other apps, downloading files Encrypt app data when device is locked, prevent app data from being backed up
  • 20. History of Security Part II ProtectProtect Your Content CONTENT APPLICATIONNETWORKPHYSICAL Know Your Users Track Everything
  • 21. Things to Consider Known Vulnerabilities • Enable business apps • Block “bad” apps • Limit app functions • Limit file types • Block websites • Exploits • Malware Unknown Vulnerabilities • Detect Malicious websites • Bad domains • Stolen credentials • Dynamic analysis • Static analysis • Attack techniques • Anomaly detection • Analytics
  • 22. Physical and logical isolation Limited datacenter access Restricted to essential personnel only Multiple factors of authentication including smart cards and biometrics On-premise security officers, motion sensors, video surveillance Intrusion detection alerts include anomalous activity by datacenter engineers Isolated network and identity Networks are isolated from the Microsoft corporate network Administered with dedicated Active Directory domains No domain trust outside of the service, no domain trust between test and production Further partitioned into isolated domains for management and security
  • 23. Protected in transit Encrypted between client and service TLS 1.2 with Perfect Forward Secrecy, 2048-bit key TLS 1.0 is minimum supported protocol Connection will negotiate the most secure protocol supported by your client Only secure access is permitted SharePoint Online requires HTTPS for all authenticated connections HSTS header prevents HTTP downgrade on untrusted networks Encrypted within the service Customer content is always encrypted in transit between datacenters
  • 24. Application security Security Development Lifecycle All engineers receive security training annually Code review and static analysis required for every change Microsoft Security Response Center Dedicated team for vulnerability report assessment and response Skilled engineers triage reports and evaluate mitigations Online Services Bug Bounty Incentivizes vulnerability hunting by external researchers Researchers receive credit and financial reward when they disclose responsibly
  • 25. Service Encryption Application-level encryption Service uses per-file keys to protect SharePoint content Microsoft manages these keys Service automatically creates them when a file is uploaded or edited Microsoft can transparently roll them or upgrade them as needed Defense-in-depth Ensures separation between server admins, Azure admins, and customer content
  • 26. Service Encryption with Customer Key Customer Keys Tenant Intermediate Key Site Encryption Key File Chunk Keys
  • 27. Content security Volume encryption BitLocker encryption protects drives where content is stored Renders content unreadable if drive is removed from the server Per-file encryption Contents of each file encrypted with a unique key Large files are stored in parts with a unique key per part Encrypted contents, encryption keys, file part mapping are stored separately
  • 28. DETECT PROTECT CLASSIFYMONITOR MICROSOFT’S INFORMATION PROTECTION TECHNOLOGIES WINDOWS INFORMATION PROTECTION OFFICE 365 ADVANCED SECURITY MANAGEMENT MICROSOFT CLOUD APP SECURITY MESSAGE ENCRYPTION CONDITIONAL ACCESS OFFICE APPS AZURE INFORMATION PROTECTION OFFICE 365 DLP 3rd PARTY DLP OFFICE 365 ADVANCED DATA GOVERNANCE SHAREPOINT & GROUPS
  • 29. Information Protection Labeling A label is a simplified way for end-users to classify & protect their content Today, may require configuration in multiple places & add-in for Office client apps GOAL: Consistent & persistent labeling across information protection solutions COMING SOON Consistent label configuration and application COMING SOON Built-in native labeling support for Office apps – Mac and web to start; Windows, iOS & Android thereafter
  • 30. Data Loss Prevention Detect sensitive information across Office 365 Choose from 80+ sensitive information types – or create your own Customize policies, exclusions and actions Block accidental sharing and educate users View and monitor reports, alerts, events NEW Custom sensitive information types NEW HIPAA sensitive information types NEW Large dictionary support
  • 31. Data GovernanceLeverage intelligence to automate data retention and deletion
  • 32. Advanced Data Governance NEW Consistently manage records that have retention periods associated with specific event triggers NEW Manual disposition review to defensibly delete what’s redundant, trivial or obsolete NEW Supervise employee communications to comply with security and regulatory guidelines Automate data retention by leveraging recommendations driven by machine learning Automatically classify the data most relevant for your organization or industry Policy recommendations (delete, move, encrypt, or share) based on data insights and intelligence
  • 33. History of Security Part II Know Your Users ClassifyTrack EverythingProtectProtect Your Content
  • 34. Copyright 2017 Exostar LLC | All Rights Reserved | Proprietary and Confidential 35 Compliance in Aerospace & Defense TechnologyNon-Technology Control Families - Access Control - Awareness and Training - Audit and Accountability - Configuration Management - Identification and Authentication - Incident Response - Maintenance - Media Protection - Physical Protection - Personnel Security - System and Communications Protection - System and Information Integrity Documents not supported by DLP Control Families - Access Control - Awareness and Training - Audit and Accountability - Incident Response - Media Protection - Personnel Security - Risk Assessment - Security Assessment - System and Information Integrity Documents Stored in Team Collaboration & supported by DLP Identity & Access Management Team Collaboration DLP Cloud
  • 35. Know when policy is violated Incident report and alert emails inform you in real time when content violates policy. See the effectiveness of your policies Built-in reports help you see historical information and tune policies. Take action to correct violations Investigate violations in your organization and take remediation actions. Integrates with other systems Leverage the Activity Management API to pull information into SIEM and workflow tools. Monitor and Remediate
  • 36. Meet your regulatory requirements Audit Office 365 activity Search and download audit logs from the Office 365 Security Center Configure activity alerts on specific audit event criteria Configure an eDiscovery Center Supports full lifecycle of electronic discovery across SharePoint, Exchange, and Skype Create cases, add content sources, run keyword queries, place holds Apply retention policies Retain content for a minimum period of time or delete content that exceeds a timespan Policy can be scoped to content containing specific keywords or sensitive information
  • 37. Unified Auditing Pipeline Compliance Center Office 365 Activity Report PowerShell cmdlet Long-term Auditing Storage in O365 Azure AD SharePoint Online Exchange Online OneDrive for Business Office 365 Activity API Third party application Management Activity API
  • 38. Leverage actionable insights Actionable insights and management control
  • 39. Security and Compliance Center Powerful for experts, and easier for generalists to adopt Scenario oriented workflows with cross-cutting policies spanning features Powerful content discovery across Office 365 workloads Proactive suggestions leveraging Microsoft Security Intelligence Graph
  • 40. Confidence through operational security tools to help you understand and investigate cyber-threats and take action to protect your organization from them
  • 41. History of Security Part II Know Your Users ClassifyTrack EverythingProtectProtect Your Content QUESTIONS Adam Levithan [email protected] @collabadam
  • 42. Thank you, for your for #SPSParis

Editor's Notes

  • #9: 8
  • #11: 10
  • #12: 11
  • #13: 12
  • #22: Perimeter security Strong authentication Geo-redundancy Isolated subnets Isolated domain Domain partitioning BitLocker Per-file encryption Disaster recovery Security training Code reviews Static analysis
  • #24: Microsoft Ignite 2016
  • #25: Microsoft Ignite 2016
  • #28: Microsoft Ignite 2016
  • #29: Microsoft Ignite 2016
  • #33: Microsoft Worldwide Partner Conference 2016
  • #38: Microsoft Ignite 2016
  • #39: 38
  • #41: Microsoft Tech Summit FY17