Module 2: Managing Data Protection Enterprise Device Infrastructure Camp Dan Stolts Chief Technology Strategist Microsoft [email protected] Twitter: @ITProGuru.

Download Report

Transcript Module 2: Managing Data Protection Enterprise Device Infrastructure Camp Dan Stolts Chief Technology Strategist Microsoft [email protected] Twitter: @ITProGuru.

Module 2: Managing Data
Protection
Enterprise Device Infrastructure Camp
Dan Stolts
Chief Technology Strategist
Microsoft
[email protected] Twitter: @ITProGuru
Data
at Rest
Data
in Use
Data in
Motion
AppLocker
BitLocker
User Profiles
AD FS
Work Folders
Right Management Services
Active Directory
Dynamic Access Control
Web Application Proxy
Encrypting File System
Microsoft Azure AD
Exchange DLP
Microsoft Azure RMS
Window Server FCI
IPv6
SSL
BitLocker to Go
Microsoft Azure MFA
Remote Business Data Removal
Success Is…
Users can work
from anywhere on
their device with
access to their
corporate resources.
Users can enroll devices for
access to the Company Portal
for easy access to corporate
applications
IT can publish Desktop
Virtualization (VDI)
for access to centralized
resources
IT can publish access to
resources with the Web
Application Proxy
based on device
awareness and the users
identity
Users can register
devices for single
sign-on and access to
corporate data with
Workplace Join
IT can provide seamless
corporate access with
DirectAccess and
automatic VPN
connections.
BitLocker enhancements
Full Disk Encryption Going Mainstream
• Changing landscape
• Traditionally only on business editions of Windows
• Critical for business; Increasing demand for consumer
• BYOD putting consumer devices in business scenarios
• Being used to protect system itself, not just the data
• Challenges in making it pervasive
• TPM will soon become standard equip, but not there yet
• Performance on low end devices not sufficient
• Microsoft’s direction
• Device Encryption now available on all editions of Windows
• Requires InstantGo (Connected Standby) certified devices
Device Encryption vs. BitLocker
 Device Encryption




Encryption of OS volume is automatic and configured out of the box
Protection is enabled once an administrator uses a Microsoft Account to sign-in
If unmanaged Recovery Key Password is stored in the SkyDrive
Can quickly be configured to use BitLocker features (Pro and Ent only)
 BitLocker and BitLocker To Go – Windows Pro, and Enterprise




Enables encryption of fixed disk (BitLocker) and removable disks (BitLocker to Go)
Protection is enabled through imaging, mgmt solutions (e.g.: MBAM), or end user
Recovery Keys can be stored in AD or mgmt solutions (e.g.: MBAM)
FIPS Support
Unified Extensible Firmware Interface
A modern replacement for traditional BIOS
A Windows Certification Requirement (UEFI 2.3.1)
architecture-independent solution
initializes device and enables operation (e.g.; mouse, apps)
Secure Boot - Supported by Windows 8, Linux, …
Eliminates Bootkit threat by securing the boot process
Encrypted Drive support for Windows
Network unlock support for BitLocker
Trusted and Measured Boot
Trusted Boot
•
•
•
End to end boot process protection (Bootloader to Windows Sign-In)
ELAM complaint antimalware driver is protected, first 3rd party code to start
Automatic remediation/self-healing if compromised
Windows 78
Windows
Measured Boot and Remote Attestation
•
•
Creates comprehensive set of measurements based on Trusted Boot execution
Can offer measurements to a Remote Attestation Service for analysis
Introducing Remote Business Data Removal (RBDR)
• RBDR is a platform feature that:
•
•
•
•
enables services to request that corp data be secured
server requests client uses EFS to protect data sent to client from server
offers more control to organizations that are unable to invest in full DLP
offers platform capability that can simplify DLP solution implementations
• How it works
•
•
•
•
•
Server app implements API which can be used to set SW policy
Client apps implements API. Client receives policy and protects data (EFS)
EAS and OMA-DM can be used to trigger RBDR revoke access command
Revoke command destroys encryption key making data inaccessible
Client app may be implemented to delete data as well
RBDR in 8.1 and Beyond
• Ship the following end to end scenarios:
• Wipe Mail app data via EAS
• Wipe Mail attachments saved locally via EAS or OMA-DM
• Wipe WorkFolders data via EAS or OMA-DM
• Secure adoption commitments with MSFT apps
• Drive adoption with 3rd party apps and DLP products
Remote Business Data Removal requires that apps and
management systems take advantage of the RBDR API.
RBDR API
Server components (e.g.: Exchange ) will use the EAS
or OMA-DM protocol to communicate policy to the
client indicating that the data it sends to the client
must be encrypted via RBDR. Once the client
acknowledges RBDR capability data transfer can begin.
EAS or OMA-DM
Applications (e.g.: Mail) will use the RBDR API to
encrypt the data as it is received from the server.
RBDR API
Management system (e.g.: Intune/Airwatch) will use
EAS or OMA-DM to provision a wipe command to the
client when needed.
EAS or OMA-DM
RBDR API
Work
Folders
Simple access to corporate data
Enable offline access to files and folders stored
on a Windows Server 2012 R2 file server
Simple Group Policy configuration for domainjoined computers, with easy discoverability for
BYOD systems, as well
Leverages Web protocols (HTTP) for easy
synchronization through firewalls
A complement to OneDrive and OneDrive Pro
IT can selectively wipe the
corporate data from
Windows 8.1 clients
Devices
Users can sync
their work data to
their devices.
Users can register
their devices to be
able to sync data
when IT enforces
conditional access.
IT can configure a file server to
provide Work Folder sync
shares for each user to store
data that syncs to their devices,
including integration with
rights management
Active Directory
discoverability
provides users Work
Folders location
Apps and data
IT can publish access directly
through a reverse proxy, or
conditional access can be
enforced via device
registration through the
Web Application Proxy
20
Windows 7 support
http://support.microsoft.com/kb/2891638
Lab
Work Folders in Windows 8.1
Users with even the best intentions will use
devices and break policy to get their jobs done.
Controlling which peripherals can and can’t be
used on their devices maybe be required to
protect organizations and their data
Device Installation Restriction policies can put IT
back in control of which peripherals can and can not
be used using policy based white and black lists.
Unify your environment
Comprehensive application and device management
Single admin console
User
Mobile Data Protection – Managed Productivity
LoB
Protected
Browser
Native
E-mail
LoB
Layer 1 –
Mobile device lockdown via MDM
Protects corporate
data by…
Gaps it
leaves open
Restricting device behaviors:
PIN, encryption, wipe, disable
screen capture and cloud
backup, track compliance, etc.
Apps may share corporate
data with other apps outside
IT control
Provisioning credentials that
enable corporate resource
access control
Apps may save corporate data
to consumer cloud services
Mobile Data Protection – Managed Productivity
LoB
Protected
Browser
Native
E-mail
LoB
Layer 2 – Application and data
containers (aka “managed mobile productivity”)
Protects corporate
data by…
Gaps it
leaves open
Preventing apps from sharing
data with other apps outside
of IT control
Only protects corporate data
that resides on devices. Cannot
protect data beyond a device.
Preventing apps from saving
data to stores outside of
IT control
Applies same protection to all
data that an app touches. Does
not allow for specific
protection per document.
Encrypting app data to
supplement device encryption
Mobile Data Protection – Managed Productivity
Layer 3 – Data wrapping
LoB
Protected
Browser
Native
E-mail
LoB
Protects corporate
data by…
Gaps it
leaves open
Protecting data
wherever it resides
Requires enlightened
applications
Providing granular, content
specific protection – e.g. time
bomb vision docs
Requires all data to be
protected if not complemented
by Layers 1 and 2
Mobile Data Protection – Managed Productivity
Protected
Browser
Native
E-mail
1.
Susan tries to set up her new unmanaged tablet to connect to Exchange
and is blocked
2.
She enrolls the tablet into Microsoft Intune and is then granted access to Exchange
3.
Susan tries to save attachment to OneDrive, and is blocked since OneDrive is not
managed by IT
4.
She saves attachment to OneDrive for Business, which is allowed since it is
managed by IT
5.
She then tries to copy/paste content to a PowerPoint slide, and is successful
6.
Susan tries to copy text from her attachment and paste it into another,
unmanaged app
7.
Susan later leaves the company, and a selective wipe is done on her tablet,
removing corporate apps and data, leaving her personal content on the device
Protect data with rights management
Take advantage of
hybrid options across
Windows Server and
Azure Rights
Management service
Integrate Microsoft
SharePoint and
Microsoft Exchange
Server
Automatically identify
and classify data
based on content with
automatic encryption
More securely share
documents with
colleagues and
business partners
Improve ease of use
through integration
with Office 2010/13,
Windows Shell
extensions, and crossplatform clients
Connectors and Connections
RMS SDKs (apps coming) on popular
mobile platforms including
Windows, iOS, Android, Windows
Phone and Mac OS
Azure RMS provides the Rights Management
capabilities for Office 365, providing easy
enablement and enforcement of information
protection policies
Connect to Windows
Server File Services for
FCI and DAC integration
Leverage a common identity across Active
Directory and Azure Active Directory
Connect to on-premises Exchange and
SharePoint for the simplest way to get
Rights Management running in your
organization
Automatically
identify and classify
data based on
content. Classification
applies as files are
created or modified.
File classification, access
policies and automated
Rights Management
works against client
distributed data through
Work Folders.
Centrally manage
access control and
audit polices from
Windows Server
Active Directory.
Integration with
Active Directory
Rights Management
Services provides
automated
encryption of
documents.
Central access and audit
policies can be applied
across multiple file servers,
with near real-time
classification and processing
of new and modified
documents.
Example Workload: Single sign-on to 2000+ SaaS Apps
Directory Sync
When an Active Directory user logs
on, their synchronized credentials
are used to authenticate against
Azure Active Directory
SaaS App
Cloud Identity
A user with a cloud only identity can sign in
to the SaaS app using their Azure Active
Directory credentials
Federated Identity
When an Active Directory user logs
on, the authentication is passed
back and validated against Windows
Server Active Directory
For a the most updated content of the application gallery see:
http://www.windowsazure.com/en-us/gallery/active-directory
Putting it all together
BYO Cloud or
Partner
Next steps
Download evaluation software
Download free Microsoft software trials today at the TechNet Evaluation Center.
http://aka.ms/CampEval
Learn more
Boost your technical skills with free expert-led technical training on Windows 8 from Microsoft Virtual Academy.
http://aka.ms/CampMVAWin
Get certified
Get hired, get recognized, and get ahead with the MCSA Windows 8 certifications from Microsoft.
http://aka.ms/CampCertWin
Evaluate online
Test Microsoft’s newest products and technologies in a virtual environment for free at the Microsoft Virtual Labs.
http://aka.ms/CampVlabs