1. 2. 3. 1. 2. 3. CONCERNS BENEFITS scalability increased agility flexibility Reduced costs privacy security reliability Sensitivity Terminology model 1 Terminology model 2 High Confidential Restricted Medium For internal use only Sensitive Low Public Unrestricted.
Download ReportTranscript 1. 2. 3. 1. 2. 3. CONCERNS BENEFITS scalability increased agility flexibility Reduced costs privacy security reliability Sensitivity Terminology model 1 Terminology model 2 High Confidential Restricted Medium For internal use only Sensitive Low Public Unrestricted.
1. 2. 3. 1. 2. 3. CONCERNS BENEFITS scalability increased agility flexibility Reduced costs privacy security reliability Sensitivity Terminology model 1 Terminology model 2 High Confidential Restricted Medium For internal use only Sensitive Low Public Unrestricted Control Areas security policies and procedures? employee change/termination process? security policies and procedures? capacity planning efforts? security policies review process? physical security access method? staging to production requirements? selects its data center location(s)? security program is updated? equipment support contracts? application testing using customer data? redundancy if utility service outages should occur? personnel background checks? data classification efforts? asset inventory program? patch management processes? (NDA) requirements? Who grants access to data? conducts risk assessments? antivirus efforts? physical access by role? data retention and recovery program? responds to an incident ? firewalls to protect data? destroys data? disaster recovery plan? time setting policies? security policies and procedures? Cloud Security Readiness Tool Promoting Understanding of Today’s Threats www.microsoft.com/sir Start Release http://aka.ms/OSA OSA Methodology Microsoft’s Commitment Digital Crimes Unit Worldwide Public Sector Trustworthy Computing Microsoft IT Microsoft Services Criminal Law Enforcement, Government, Industry Solutions, Initiatives, Innovations Security, Reliability, Privacy Policy, Innovation, Consulting Response, Support, Risk Assessment, Cyber Security Services • • • Security Development Lifecycle (SDL) Operational Security Assurance (OSA) Investigate and respond to all security concerns that affect Microsoft products and services. Innovation • • • • Identity & Access Management solutions Protect against the latest malware threats Business and IT Risk Management Remote Security Incident Reporting Partnerships • • • • Policy & Advocacy Fight IP Crimes, Fraud, and Child Exploitation Provide early access to intel for security partners Advisory Services and Risk Assessments Fundamentals www.microsoft.com\trustedcloud http://channel9.msdn.com/Events/TechEd www.microsoft.com/learning http://microsoft.com/technet http://microsoft.com/msdn