18
PROTECTING YOUR DATA IN OFFICE 365

Protecting Your Data In Office 365

Embed Size (px)

Citation preview

Page 1: Protecting Your Data In Office 365

PROTECTING YOUR DATA IN OFFICE 365

Page 2: Protecting Your Data In Office 365

Office 365 Security 2

Cloud apps are becoming an essential part of business

Cost effective

Remote access

Agility and speed

Improved Productivity

Better collaboration

Page 3: Protecting Your Data In Office 365

...That result from your unauthorized action or lack of action when required, or from your employees, agents, contractors, or vendors, or anyone gaining access to our network by means of your passwords or equipment, or otherwise resulting from your failure to follow appropriate security practices...

Microsoft’s Policy

Microsoft will not take responsibility for your user behavior

(or security of your infrastructure or users).

(the fine print)

Security In The Cloud is a Shared Responsibility

Office 365 Security 3

Page 4: Protecting Your Data In Office 365

4

What could go wrong?

• 1.34% of accounts were compromised

• Compromised means: account takeover, rogue (bad actor) insider, malicious data destruction, etc.

• Report highlighted threshold triggers (static) and anomalous behavior (data science) — just a sample out of 60+ factors

• This malicious activity would apply regardless of SaaS app or storage provider used, even Office 365/OneDrive

From Elastica’s Q2 2015 Shadow Data Report:

Malicious Use% of total

compromised accounts

Office 365 Security

Page 5: Protecting Your Data In Office 365

90%of organizations lost sensitive data via file sharing

Shadow DataUse of sanctioned apps in unsanctioned ways

average cost of data breach for storage SaaS providers/company

Shadow Data

All the potentially risky data exposures lurking in sanctioned cloud apps, due to lack of knowledge of the type of data being uploaded, and how it is being shared. This can directly lead to compliance violations or sensitive data loss.

Shadow IT All the potentially risky unsanctioned Cloud Apps used in your organization, without the knowledge of IT.

Source: Elastica Q2 2015

Source: Ponemon

$13.8M

What is Shadow Data?

Office 365 Security

Page 6: Protecting Your Data In Office 365

Who Controls Sharing?

Sharing has become democratized (no longer top-down controls)

Even file owners no longer fully control how their files are shared

Alice shares a file with Bob

Bob shares that file publicly without Alice’s knowledge

Shadow Data Goes Viral

Office 365 Security

Page 7: Protecting Your Data In Office 365

files per user are broadly shared (average)

12.5%contain compliance related data

Shadow Data

25%Of total files stored in the cloud per user (average)

of these files

Office 365 Security

Page 8: Protecting Your Data In Office 365

Email• S/MIME

• SSL

• A/V Scanning

Leverage O365 email to another email that supports S/MIME. However, you are also encrypting infected file attachments.

8

What about protection for:▪ Non MSFT Users▪ BYOD (non-

Windows Mobile)▪ SaaS apps/storage▪ Contractors▪ Vendors/Suppliers▪ Malware/Botnets▪ EU Directives

At-Rest Data• CCM/SOC

certifications

• Process/infrastructure

• “Lockbox”

Storage and handling data (at rest) defined by various certifications. However, does not apply to docs and data leaving O365 servers (your destination, your computer).

Doc. Control• IMS/RMS

• Containers

• Pre-file crypto

Build a security wrapper around documents. But requires same O/S and agent on both sides. Requires special client.

Scope of Office 365 Security

Office 365 Security

Page 9: Protecting Your Data In Office 365

9

Office 365 provides base security, but you still need…

User visibility and control

Analysis of risky behavior

Automated classification

Data protection / attack mitigation

REQUIREMENT BECAUSE HOW

Compliance mandates require identification of sensitive data

Users are the biggest threat that can bypass your security controls

This is not readily seen just by A/V scanning or APT systems

Before, during, and after a breach requires fast response

Leverage data science to automatically understand content without involving humans

Real-time awareness of access and actions

Per user-graph of “normal” behavior vs. risky behavior

Complete lifecycle solution

Office 365 Security

Page 10: Protecting Your Data In Office 365

Alice

Shared

Payroll.docxwith Bob

Using Office 365

?? ? ?

?? Alice is anExternal Collaborator

From anUnmanaged Device

The File ContainsPII Risk

From anAnomalous Location

But it’s not that simple

Data Visibility and Control

Office 365 Security

Page 11: Protecting Your Data In Office 365

Data Science Powered™ CLOUD APP SECURITY

befo

red

uri

ng

aft

er

Office 365 Security

Page 12: Protecting Your Data In Office 365

External and public content exposures, including compliance risks

Inbound risky content shared with employees (e.g. malware, IP, etc)

Risky users and user activities

Get a Free Shadow Data Risk Assessment

Office 365 Security

Page 13: Protecting Your Data In Office 365

Thank You!Take the free Shadow

Data Risk Assessment

Visit us to learn how you can find risks and protect critical content in your file sharing apps.

Elastica.net

Page 14: Protecting Your Data In Office 365

Granular Event Extraction

StreamIQ™

Inspect (even in SSL traffic) and determine specific actions being taken—all in real-time.

Page 15: Protecting Your Data In Office 365

Slideshow Title 15

Every time you adopt a new technology, you have to secure it

You wouldn’t run your business without email…

…and you wouldn’t use email without security

As business adopts cloud apps…

…you must secure them

Page 16: Protecting Your Data In Office 365

Automatically classify, detect and remediate content uploaded to cloud apps

Page 17: Protecting Your Data In Office 365

17

Who Controls Sharing?

Alice shares a file with Bob

Shadow Data Goes Viral —No Way!

You Do

Office 365 Security

Page 18: Protecting Your Data In Office 365

Who Controls Sharing?

Even file owners no longer fully control how their files are shared

Alice shares a file with Bob

Bob shares that file publicly without Alice’s knowledge

Shadow Data Goes Viral — No Way!

Office 365 Security