1. 2. 3. 1. 2. 3. CONCERNS BENEFITS scalability increased agility flexibility Reduced costs privacy security reliability Sensitivity Terminology model 1 Terminology model 2 High Confidential Restricted Medium For internal use only Sensitive Low Public Unrestricted.

Download Report

Transcript 1. 2. 3. 1. 2. 3. CONCERNS BENEFITS scalability increased agility flexibility Reduced costs privacy security reliability Sensitivity Terminology model 1 Terminology model 2 High Confidential Restricted Medium For internal use only Sensitive Low Public Unrestricted.

1.
2.
3.
1.
2.
3.
CONCERNS
BENEFITS
scalability
increased agility
flexibility
Reduced costs
privacy
security
reliability
Sensitivity Terminology
model 1
Terminology
model 2
High
Confidential
Restricted
Medium
For internal use only
Sensitive
Low
Public
Unrestricted
Control
Areas
security policies and
procedures?
employee
change/termination
process?
security policies and
procedures?
capacity planning
efforts?
security policies
review process?
physical security
access method?
staging to production
requirements?
selects its data center
location(s)?
security program is
updated?
equipment support
contracts?
application testing
using customer data?
redundancy if utility
service outages
should occur?
personnel background
checks?
data classification
efforts?
asset inventory
program?
patch management
processes?
(NDA) requirements?
Who grants access to
data?
conducts risk
assessments?
antivirus efforts?
physical access by
role?
data retention and
recovery program?
responds to an
incident ?
firewalls to protect
data?
destroys data?
disaster recovery
plan?
time setting policies?
security policies and
procedures?
Cloud Security Readiness Tool
Promoting Understanding of Today’s Threats
www.microsoft.com/sir
Start
Release
http://aka.ms/OSA
OSA Methodology
Microsoft’s Commitment
Digital
Crimes Unit
Worldwide
Public
Sector
Trustworthy
Computing
Microsoft IT
Microsoft
Services
Criminal Law Enforcement,
Government, Industry
Solutions, Initiatives,
Innovations
Security, Reliability,
Privacy
Policy, Innovation,
Consulting
Response, Support, Risk
Assessment, Cyber
Security Services
•
•
•
Security Development Lifecycle (SDL)
Operational Security Assurance (OSA)
Investigate and respond to all security concerns
that affect Microsoft products and services.
Innovation
•
•
•
•
Identity & Access Management solutions
Protect against the latest malware threats
Business and IT Risk Management
Remote Security Incident Reporting
Partnerships
•
•
•
•
Policy & Advocacy
Fight IP Crimes, Fraud, and Child Exploitation
Provide early access to intel for security partners
Advisory Services and Risk Assessments
Fundamentals
www.microsoft.com\trustedcloud
http://channel9.msdn.com/Events/TechEd
www.microsoft.com/learning
http://microsoft.com/technet
http://microsoft.com/msdn