12
Work Smart Securing Business Information Overview All forms of information, including ideas and concepts, have potential business value. Whether you are exchanging emails, sharing documents, or having a phone conversation, it is your responsibility to help protect confidential information from any unauthorized disclosure. This Work Smart Guide provides an overview on how to properly classify business information and understand the technology solutions used to help protect your information before you transmit, share, store, or destroy it. Recommended reading This Work Smart Guide provides the foundational knowledge for securing your data. Other guides are available to teach you how to help protect your information. For detailed step-by-step guidance, review the documents listed under the Work Smart link in the For More Information section of this guide. Topics in this guide include: Classifying your information Protecting your information Classification and data dissemination guidelines Decision tree: Securing your information Recommended security practices For more information

Securing Business-Information from Microsoft -Presented by Atidan

  • Upload
    atidan

  • View
    1.104

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Securing Business-Information from Microsoft -Presented by Atidan

Work Smart

Securing Business Information OverviewAll forms of information, including ideas and concepts, have potential business value. Whether you are exchanging emails, sharing documents, or having a phone conversation, it is your responsibility to help protect confidential information from any unauthorized disclosure. This Work Smart Guide provides an overview on how to properly classify business information and understand the technology solutions used to help protect your information before you transmit, share, store, or destroy it.

Recommended reading

This Work Smart Guide provides the foundational knowledge for securing your data. Other guides are available to teach you how to help protect your information. For detailed step-by-step guidance, review the documents listed under the Work Smart link in the For More Information section of this guide.

Topics in this guide include:

For more information

Recommended security practices

Decision tree: Securing your information

Classification and data dissemination guidelines

Protecting your information

Classifying your information

Page 2: Securing Business-Information from Microsoft -Presented by Atidan

2 | Securing Business Information Overview

Classifying your information

Determining information classification

At Microsoft, all forms of information, including ideas and concepts, have potential business value. Whether you are exchanging emails, sharing documents, or having a phone conversation, it is your responsibility to help protect confidential information from any unauthorized disclosure. This Work Smart Guide details how to properly classify business information and understand the technology solutions used to help protect your information before you transmit, share, store, or destroy it.

Information is classified into three areas: High Business Impact (HBI), Moderate Business Impact (MBI), and Low Business Impact (LBI).

Table 1: Information Classification

HBI

High Business Impact

HBI applies to any information including emails, documents, messages and phone conversations that, if disclosed without authorization, could result in immediate, direct or considerable impact to Microsoft, the information owner and customers. HBI information should only be shared with those on a “need-to-know” basis. HBI includes Highly Sensitive Personally Identifiable Information (HSPII).

MBI

Medium Business Impact

MBI applies to information that, if disclosed, could cause indirect, limited impact to Microsoft, the asset’s owner and valued customers. MBI information should only be accessible to those people who have a legitimate business need to view the information. MBI includes Personally Identifiable Information (PII).

LBI

Low Business Impact

LBI classification applies to information assets that, if disclosed without authorization, could cause limited, or no material loss to Microsoft, the asset owner, or relying parties.

Important: You are responsible for classifying your information accurately. Therefore, in the following sections, be aware that the examples of HBI, MBI, and LBI data could have more restrictive classification levels, depending on how sensitive a specific asset’s owner deems the content.

Powered by Instant.ly

Page 3: Securing Business-Information from Microsoft -Presented by Atidan

3 | Securing Business Information Overview

How to classify your information

Below is table of guidelines that you may use to determine your data's classification level.

Data includes the following info: HBI MBI LBI

Email Address X

Social Security Number X

Documents regarding process or procedure

X

Private cryptographic keys X

Username and Passwords X

Publicly accessible information X

Company trade secrets X

Financial information related to revenue generation

X

List of Phone Numbers X

Employee Zip Codes X

Numeric ID sequences / PINs X

Note:

• Use the most restrictive classification if data falls into more than one classification level or if you are unsure of its classification.

• Treat information as HBI if it does not have a classification, but is marked or “confidential.”

Important:

• It is your responsibility to understand the business value of your information and to apply the correct classification and protection.

• Remove HBI or MBI information from your computer before retiring it or sending it offsite for repairs.

• Remember to check your company policies as their classification levels may vary from the examples provided in the table above.

Powered by Instant.ly

Page 4: Securing Business-Information from Microsoft -Presented by Atidan

4 | Securing Business Information Overview

Protecting your informationNow that you know how to classify your information, you will learn what tools are available to ensure that your data is protected when it is sent, shared, stored, backed up, or deleted.

There are four main technologies which Microsoft uses to help protect information. These services include: Information Rights Management (IRM) - an Office feature of Rights Management Services (RMS), Secure/Multipurpose Internet Mail Extensions (S/MIME), BitLocker Drive Encryption, and Encrypted File System (EFS). Thankfully, these tools are simple to use. A few clicks within Office, Outlook, or SharePoint and you can protect your data according to the appropriate classification.

Listed below are the definitions of each technology and the data it protects. For more information about each solution, click the named hyperlink.

IRM Enables you to apply specific access permissions to documents, workbooks, and presentations to prevent unauthorized forwarding, printing, or copying; and to set expiration dates after which files no longer are available.

S/MIME Enables you to encrypt and/or digitally sign your email messages. Encrypting your messages converts data with a cipher text so that only people who you specify can read it. Digitally signing an email message helps ensure that no tampering occurs while your message and its attachments are in transit.

BitLocker BitLocker Drive Encryption protects data on your computer by preventing unauthorized access to the hard disk drive or removable media by applying full disk encryption.

EFS If your computer is not BitLocker compatible, EFS can encrypt your files and folders by using a certificate that Microsoft issues after you join your computer to the corporate domain. EFS requires that other people enter the appropriate decryption key before they can access the encrypted content. EFS is not a recommended protection method for Microsoft hard drives.

The following table provides guidelines on which preferred technology that you should use to encrypt HBI or MBI information that you will transmit, share, or store on your computer:

Table 3: Protecting your information

Data includes the following info: IRM S/MIME EFS BitLocker

Transmit with internal email Preferred solution Acceptable solution

N/A N/A

Transmit with external email Works only with other federated RMS organizations

Preferred solution

N/A N/A

Share by using SharePoint Online (for tenant administrators and not site owners or users.)

Preferred solution N/A N/A N/A

Storing on computer Acceptable solution with BitLocker

N/A Acceptable with BitLocker

Required solution

Storing on computer (Vista or older OS) Preferred solution N/A Acceptable solution

Powered by Instant.ly

Page 5: Securing Business-Information from Microsoft -Presented by Atidan

5 | Securing Business Information Overview

Storing on removable media BitLocker to Go

Acceptable solution N/A Acceptable solution

Preferred solution

Classification and data dissemination guidelinesThe following tables provide guidelines for how you should send, share, store, back up, and dispose of information, depending on its classification:

Table 4. Classification and data dissemination guidelines

Subject HBI MBI LBI

Send data (via file transfer or email)

Requires asset owner approval to forward, export, or copy.

Requires encryption for internal and external delivery.

Requires encryption with S/MIME or IRM for email.

Requires encryption for transfer outside of organization.

Requires encryption with S/MIME for email sent outside the corporate network.

No special requirements.

Share(via O365 SharePoint Online)

Use IRM to restrict forwarding, copying, and printing.

Restrict permissions to those identified by asset owner.

Requires formal agreement, which legal approves, for third parties, such as business partners.

Restricts permissions to those with legitimate business needs only.

Requires formal agreement, which legal approves, for third parties, such as business partners.

No special requirements.

Store (server, PC, CD, USB)

Requires encryption (BitLocker). Allows storage on handheld devices

only if device supports strong encryption and authentication security controls.

May require encryption (as determined by the asset owner).

No special requirements.

Back up

Performed only by authorized personnel and stored only at a location approved by IT Security.

Encrypt storage media.

Store in a physically secure location in which backups are logged and access is controlled and monitored.

No special requirements.

Dispose of

Cross-shred or incinerate paper documents.

Destroy tapes and other magnetic media. Request that hard disk drives be destroyed .

Follow your organization policies for the appropriate disposal of retired hardware and media.

Cross-shred or incinerate paper documents.

Destroy tapes and other magnetic media.

Remove data on hard disks that you plan to reuse or retire.

Destroy inoperable hard disk drives.

No special requirements.

Powered by Instant.ly

Page 6: Securing Business-Information from Microsoft -Presented by Atidan

6 | Securing Business Information Overview

Decision tree: Securing your dataThe decision tree below will help you understand the multiple considerations for sharing any company information. The graphic includes the best solution to help protect your information and the platform that should be used to share the information.

Figure 1: HBI decision tree

Figure 2: MBI decision tree

Powered by Instant.ly

Page 7: Securing Business-Information from Microsoft -Presented by Atidan

7 | Securing Business Information Overview

Figure 1: LBI decision tree

Powered by Instant.ly

Page 8: Securing Business-Information from Microsoft -Presented by Atidan

8 | Securing Business Information Overview

Recommended security practicesUse the Microsoft Office System Document InspectorIf you plan to share an electronic copy of a Microsoft Word document with clients or colleagues, it is a good idea to review the document for hidden data or personal information that might be stored in the document itself or in the document properties (metadata). Document Inspector is a built-in tool that can be used to scan your data before sharing it with others. For more information on how to use Document Inspector, see: Remove hidden data and personal information by inspecting documents.

Guard confidential informationDo not discuss confidential information in public places.

Beware of multiple network connectionsNever concurrently connect your computer to your companies corporate network and the Internet, or any other network that your company does not manage. This compromises your company's network security.

Review list of group recipients Think globally before posting any content. Before you send or reply to email, post to Yammer, One Drive, or any another social website, or post data to SharePoint, make sure that the information is appropriate for disclosure to everyone who has access to the email or website.

Use Outlook Web AccessUse Outlook Web Access (OWA) to check your email from your home computer. Be careful if you access corporate resources by using kiosks and other public locations, even though OWA, as key strokes may be monitored if the public network does not have the correct configuration.

Do not leave documents or presentations unattendedRemove all documents after meetings, and erase whiteboards.

Beware of posting on walls or bulletin boardsIf your document is HBI, do not post it on hallway walls or bulletin boards.

Powered by Instant.ly

Page 9: Securing Business-Information from Microsoft -Presented by Atidan

9 | Securing Business Information Overview

For more informationWork Smart GuidesOn the Work Smart productivity guides page, search for the following titles: http://technet.microsoft.com/en-us/library/bb687781.aspx.

Securing your business information

Secure collaboration using SharePoint Online

Securing your computer

Protecting data with Windows 8 BitLocker

Information Rights Management (IRM)http://technet.microsoft.com/en-us/library/cc179103.aspx

Introduction to IRM for email messageshttp://office.microsoft.com/en-us/outlook-help/introduction-to-irm-for-email-messages-HA102749366.aspx

Secure/Multipurpose Internet Mail Extensions (S/MIME) http://technet.microsoft.com/en-us/library/jj891023.aspx

BitLockerhttp://technet.microsoft.com/en-us/library/hh831713.aspx

Encrypted File System (EFS)http://technet.microsoft.com/en-us/library/bb457116.aspx

Video: Getting Started with Encrypting File System in Windows 7http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file-system-in-windows-7.aspx

International Data Protection Standardshttp://download.microsoft.com/download/B/8/2/B8282D75-433C-4B7E-B0A0-FFA413E20060/international_privacy_standards.pdf

Modern IT Experience featuring IT Showcasehttp://microsoft.com/microsoft-IT

This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2013 Microsoft Corporation. All rights reserved.

More Work Smart content: http://technet.microsoft.com/en-us/library/bb687781.aspx

Powered by Instant.ly