65

Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Embed Size (px)

Citation preview

Page 1: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 2: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Selling to the Strengths of Security & Compliance with Office 365 & the Cloud Nigel GibbonsExecutive ChairmanUniTech tm

BL13

Lisa SlimMicrosoft Alliance Business Manager

Hewlett-PackardMPN partner since 1989HP Enterprise Business

Ro Kolakowski

Company Partner

6th Street Consulting

MPN partner since 2006

SharePoint

Page 3: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 4: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 5: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Chartered IT Professional (CITP)Microsoft Buisness Value Planning (MBVP)

Certified Information Systems Auditor (CISA)Certified Information Systems Security Professional(CISSP)

Microsoft Certified Inromation Technology Professional (MCITP)

Strategic Business Planning & Audit.IAMCP UK & International Board MemberMicrosoft Partner Advisory CouncilMicrosoft Executive Partner Board

Cloud Security Alliance - UK & IrelandInsititute of Information Security Professionals (IISP)Information Security Audit & Control Association (ISACA)International Information Systems Security Certification Consortium or (ISC)2

EuroCloudVoices for Innovation

http://nigelgibbons.net #NRG_fx

Nigel GibbonsExecutive Chairman – UniTech tm

Page 6: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Benefit

Number of slide

NRG ‘PB’ Curve(Presentation Benefits)

Page 7: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Overview

• Customers• Security in Context• Microsoft & Office 365 / Azure

Cloud Security

• Engagement Framework & References

• Real World application

Frameworks

Page 8: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Excited Opportunities to reduce Capital costsChance to divest themselves of infrastructure managementFocus on core competenciesAgility offered from on-demand provisioningMore readily align IT with Business Strategy

…….. BUT

Customer is KingTo keep you head, listen to what the king says!

Page 9: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

BUT …….

Nervous About the risksLoss of ‘direct’ control of systemsSystems for which they are accountable

Customer is KingTo keep you head, listen to what the king says!

……. Security

Page 10: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Different Things to Different People

(submitted by Antii Roppola)

Page 11: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

SecurityRisk

Trust

Security

Page 12: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 13: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 14: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Criminal leverage of cloud resourcesCloud providers TargetedIaaS offerings have hosted:

Zeus botnet, InfoStealer trojan horsesbotnets command & control

Impact = IaaS blacklisting

Threat #1Abuse and Nefarious Use of Cloud Computing

Page 15: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Exposed software interfaces or APIsSecurity and availability of services dependent upon the security of these.Exposures:

unknown service or API dependencies.clear-text authenticationData unencrypted to process

Threat #2Insecure Interfaces and APIs

Page 16: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Level of access means impact considerableLack of hiring standardsLegislative frictionImpact:

Brand damage, Financial lossProductivity downtime

Threat #3Malicious Insiders

Page 17: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Multi-tenant architecture challenge hardware technologies & hypervisorsInappropriate levels of control or influence on the underlying platformExamples:

Joanna Rutkowska’s Red and Blue Pill exploitsKortchinksy’s CloudBurst presentations

Threat #4Shared Technology Issues

Page 18: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Deletion or alteration of records without a backupLoss of an encoding keyJurisdiction and political issuesImpact:

Loss of core intellectual propertyCompliance violations

Threat #5Data Loss or Leakage

Page 19: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Reuse of Credentials and passwordsEavesdrop on activities and transactions:

manipulate data, return falsified information, Redirect clients to illegitimate sites

Threat #6Account or Service Hijacking

Page 20: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

When adopting a cloud service, features and functionality may be well advertised,What about:

details of internal security procedures,configuration hardening,patching, auditing, and loggingCompliance?

Threat #7Unknown Risk Profile

Page 21: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

References

CSA (Cloud Security Alliance) – Top Threats

Gartner report -‘Assessing the Security Risks of Cloud Computing’

Page 22: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

The Mobile Effect

Cloud is a form of mobile computingBut then there is Mobile as well…24x7x365 from anywhere, anytime, anyways

90% internal

80% external

Page 23: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 24: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 25: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Despite concerns about security and privacy, the NIST concludes that:

"public cloud computing is a compelling computing paradigm that agencies need to incorporate as part

of their information technology solution set."

NIST(The National Institute of Standards and Technology)

Page 26: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Cloud All in!

Page 27: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Microsoft

The case for a Cloud Business

Technology Roadmap

Technical Certification

Page 28: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Security & Reliability

Financially-backed, guaranteed 99.9% uptime Service Level Agreement (SLA)Always-up-to-date antivirus and anti-spam solutions to protect emailSafeguarded data with geo-redundant, enterprise-grade reliability and disaster recovery with multiple datacentres and automatic failoversBest-of-breed data centres with SAS 70 and ISO 27001 certification

Page 29: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Monetising the Cloud

Little margin in subscription

annuity

Money is in the service tail, but how?

Page 30: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Trust is King

Honesty

Confidence

Trust

Page 31: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Ignorance

Page 32: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Temptation / Ignorance

Page 33: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Certifications

More to come …

• ISO 27001Services(Office 365 and FOPE)

• ISO 27001• SAS 70 Type II

Data Centers

• Safe HarborMicrosoft

Page 34: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Multi-Layered Defense

Security Management Threat & Vulnerability Management, Monitoring & Response

Edge Routers, Firewalls, Intrusion Detection, Vulnerability scanningNetwork perimeter

Dual-factor Auth, Intrusion Detection, Vulnerability scanningInternal Network

Access Control & Monitoring, Anti-Malware, Patch & Config MgmtHost

Secure Engineering (SDL), Access Control & Monitoring, Anti-MalwareApplication

Access Control & Monitoring, File/Data IntegrityData

User Account Mgmt, Training & Awareness, Screening

Facility Physical controls, video surveillance, Access Control

Strategy: employ a risk-based, multi-dimensional approach to safeguarding services and data

Page 35: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Data Encryption at Rest

• Encryption impacts service functionality (e.g. search)

• Technical solutions are challenging, e.g. identity and key management issues

Data stored non-

encrypted

• For “sensitive” data, customers implement Rights Management

• For “sensitive” externally sent/received email, customers employ PGP or similar

Solution

Page 36: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Enhanced Email Security Features

Require TLS for all mail between customer and partner domain (in and outbound)

Centralized mail control (all mail for domain sent/received from customer servers) - Enables custom filtering and archiving

Outbound mail delivery to a smarthost - Enables additional processing, e.g. DLP

Future: Expanded DLP capabilities in Forefront Online Protection for Exchange (FOPE)

Page 37: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

SubpoenasWill Microsoft turn over my data to law enforcement or gov’t?

Page 38: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Microsoft believes

customers should control

their own information

When compelled by

U.S. law enforcement to produce customer records,

Microsoft will first attempt to redirect

these demands to

the customer

Microsoft will notify the customer unless it

cannot, either because

Microsoft is unable to reach the

customer or is legally

prohibited from doing

so!

Microsoft will only produce the specific

records ordered by

law enforcement and nothing

else

SubpoenasWill Microsoft turn over my data to law enforcement or gov’t?

Page 39: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Continuity Concerns

• Yes, a robust service continuity program is in place based on industry best practices and provides the ability to recover subscribed services in a timely manner

Does Microsoft have a formalized

continuity program in place?

• Yes, all offerings have redundancy and resiliency to ensure that any major outage is minimized

Does each service have the ability to

recover from a disastrous event?

• The plan and solution are validated at least on an annual basis

Is the plan exercised (tested) on a regular

basis?

Page 40: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Global Privacy RegulationsMicrosoft Online Services has been built focusing on transparency, allowing customers control over their data, and enabling them to adhere to recognized privacy principles

Example: Many locales require a privacy notice and a recording notice. It's ultimately the responsibility of the customer to comply, but Microsoft built one in as a default so customers are assisted

Microsoft complies with global privacy norms. It abides by the Safe Harbor privacy framework regarding the collection, use, transfer, and retention of data from the European Union, the European Economic Area, and SwitzerlandEach of Microsoft Online Services has a privacy statement that details how customers’ data will be treatedLonger term Working with governments and partners to adapt regulations to their type of services

Page 41: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Why Is Privacy Compliance Important?

It’s the law

Helps ensure to Customers that they’ve made the

right choice by entrusting their data to Microsoft

It’s the right thing to do

Page 42: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 43: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Cloud Stack (SPI Model)

Page 44: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 45: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Risk Management

Measure

Assess

Evaluate

Manage

Page 46: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Compliance Landscape

Page 47: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Risk Mitigation

Page 48: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Attack Tree

International Association of Microsoft Channel Partners (IAMCP)

Compromise Customer Data

Obtain Backup Media

eMail InterceptHack Web

Server

Burglarise Office

£ 5,000

Bribe Staff or Service Provider

£ 10,000

Hack teleworker Home System

£ 1,000

Hack Firewall

£ 5,000

Hack SMTP service£ 2,000

£2,000£10,000 £1,000 £7,000£5,000

£50,000 £1m+Value to Business

Page 49: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 50: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Security On Ramp

Microsoft Security Assessment Tool• Gain visibility of

service revenue potential

Identify in competency

areas

Out of competency = Engage a Pro!

Page 51: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Microsoft Security Assessment Toolkit

http://technet.microsoft.com/en-gb/security/cc185712.aspx

Page 52: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

The Alternative!

Page 53: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Partner is the key = IAMCP(International Association of Microsoft Channel Partners)

Page 54: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

VisionIAMCP the global business community for the Microsoft Channel

MissionTo maximize the business potential of its members through:

Peer to Peer Networking

Rhythm of events occurring globally

Advocacy To legislatures, the media, to Microsoft and Microsoft Partners (liaison with VFI)

Community Outreach On the lines of Social Entrepreneurship

Education and Growth Provide Programs & experiences to grow Partner business capability & capacity

IAMCPVision & Mission - PACE

Page 55: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Office 365 Security & Service Continuity Service Description

http://www.microsoft.com/download/en/details.aspx?id=13602

Microsoft(Your R&D and soon to become your customers IT dept.!)

Page 58: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

DRAFT Guidelines on Security and Privacy in Public Cloud Computing:

http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800-144_cloud-computing.pdf

NIST(The National Institute of Standards and Technology)

DRAFT Cloud Computing Synopsis and Recommendations

http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-146

Page 59: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 60: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Thank You !

http://nigelgibbons.net #NRG_fx

Page 61: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Partner Calls to ActionKey Actions, Resources and WPC Related Sessions/Activities

Do

Attend

Learn

complete the evaluation form <here>Evaluate this session

most partners grant you 1 action, focus your askPlaceholder

invite partners to your other breakout sessions, panels and interactive sessions

Placeholder

invite partners to your other activities: Expo, executive meetings, group meetings, parties and other

Placeholder

share your latest content: links, documents, other digitalPlaceholder

ask partners to participate online: forums, social (Facebook, Twitter)

Placeholder

Page 62: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Complete a WPC evaluation and you’re automatically entered to win the daily drawing for a luxury vacation AND a chance to win instant prizes!

Learn more in the Microsoft Partner Network Booth

Your Feedback is Very Important to Us

Grand Prize Luxury Vacation

for 2

Submit your Session Evaluation for a chance to Win! www.digitalwpc.com/contest

Page 63: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

Submit your Session Evaluation for a chance to Win! www.digitalwpc.com/contest

Your Feedback is Very Important to Us

Online Giftcards

Windows 7Phone

Luxury Vacation for 2 Complete a WPC evaluation and you’re automatically entered to win the daily drawing for a luxury vacation AND a chance to win instant prizes!

Learn more in the Microsoft Partner Network Booth

Page 64: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks
Page 65: Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks

© 2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to

be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.