SlideShare una empresa de Scribd logo
1 de 17
11:26
Donnerstag, 21. April 2016
Microsoft Trusted Cloud
Security,Privacy&Control,Compliance, Transparency
DI. Harald Leitenmüller
Chief Technology Officer
Microsoft Österreich GmbH.
#ftAustria
Sind meine Daten sicher?
Gehören meine Daten mir?
Hab ich die Kontrolle?
Was bedeutet das Ende von
Safe Harbor?
“The court of justice declares that the
Commission’s US Safe Harbor Decision is invalid”
Press Release No 117/15
EU-US Privacy Shield
Private Cloud
Konsolidierte Daten
Operationen
MICROSOFT SOLUTIONS
Windows Server
System Center
Windows Azure Pack
Microsoft Cloud Portfolio - EUROPE
4
Konsistente Platformen und Anwendungen | Eine einzige Management Konsole
Public Cloud
“Europa”
Hohe Skalierung,
Flexibilität und
Kosteneffizienz
MICROSOFT SOLUTIONS
Microsoft Azure
Office 365
Dynamics CRM Online
Public Cloud
“Deutschland”
Hohe Skalierung,
Flexibilität und Deutsche
Datentreuhand
MICROSOFT SOLUTIONS
Microsoft Azure Deutschland
Office 365 Deutschland
Dynamics CRM Online Deutschland
Hybrid Cloud
Schritt in die Cloud
MICROSOFT SOLUTIONS
Risk Assessment and Data
Governance services
5
Unsere “Trust Principles”
New: https://trustportal.office.com
Readable customer data
disclosed to a third party
Customer data disclosed
to a third party
Accidental data spillage
1
1.1.1
1.1
Customer data is
readable
1.2
AND
Data disclosure due to
law enforcement /
intelligence request
1.1.2
Deliberate compromise
leading to disclosure of
customer data
1.1.3
Cloud service provider
(CSP) infrastructure
compromised
1.1.3.1
Customer infrastructure
compromised
1.1.3.2
Compromise of systems
outside cloud provider
or customer control
1.1.3.3
Customer data
permanently lost
2
Disruption of cloud service
3
Threat Tree 1 : Overview
Threat Tree 3
Threat Tree 2
Threat Tree 4 Threat Tree 5
Threat Tree 6
Threat Tree 7
Root Risk
Event
Conditions
Technical
Controls
Process
Controls
Legend:
Consumer
Applied
Control
Customer data is
readable
1.2
Data is not encrypted
1.2.1
Encryption keys become
known
1.2.2
Data is weakly encrypted
1.2.3
Encryption keys lost by
the cloud provider
1.2.2.1
Encryption keys lost by
the customer
1.2.2.2
Customer infrastructure
compromised
1.2.2.2.1
Breakdown in key
management enabling
attacker access to keys
1.2.2.2.2
AND
Link: 1.1.3.2
Threat Tree 5
Cloud provider
infrastructure
compromised
1.2.2.1.1
Breakdown in key
management enabling
attacker access to keys
1.2.2.2.2
AND
Link: 1.1.3.1
Threat Tree 4
Protected Key
Storage
Key
Management
Practices
Protected Key
Storage
Key
Management
Practices
Encryption at
Rest
Data
Classification
Encryption in
Transit
Cryptographic
standards
Policy on Use of
Cryptographic
Controls
Threat Tree 1.2 : Customer Data is Readable
Local Data
Encryption
Root Risk
Event
Conditions
Technical
Controls
Process
Controls
Legend:
Consumer
Applied
Control
8
Ihre Daten sind sicher Ihre Daten gehören Ihnen Sie haben die Kontrolle
 Encryption of all data at rest
 Encryption of all data in transit
 Enhanced event and admin /
service access logging
 Advanced security monitoring
and threat management
 Clear guidelines on data location
 Greater transparency and
simplicity of data use policies and
choices
 Data accessed only to improve
customer experience
 Law enforcement requests
redirected to the customer
 Notification of customers of
lawful requests for information;
challenging of gag orders
 Ability of customers to hold
encryption key and revoke
Microsoft copy
 Complete deletion of data on
customer request and on
contract termination
 Customer choice of data
location
 Customer option to limit
Microsoft access to data
Microsoft Trusted Cloud
Microsoft Cloud Verträge
MIOL
(Microsoft
Irland)
Kunde in
Österreich
Microsoft
Corporation
(USA)
European
Economic Area
(EEA)
EU Model Clauses*
Safe Harbor
Auftraggeber
Dienstleister
OST
(Online Services Terms)
EU-US Privacy Shield
Betroffene
* vorab genehmigungspflichtig
Article 29 WP Letter: http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2014/20140402_microsoft.pdf
EMEA Data Maps
http://o365datacentermap.azurewebsites.net/
Standardvertragsklausel für Online Dienste
Gibt es auch andere legale Möglichkeiten
personenbezogene Daten in die USA zu senden?
Quelle: http://www.dsb.gv.at/site/6218/default.aspx
Compliance
sorgfältige
MicrosoftCustomer
Zertifizierung & EU Standardvertragsklauseln
Yes
ISO 27018
Standard für digital Privatsphäre in der Cloud
6 Prinzipien für Cloud Service Provide
1. Keine Datenverwendung ohne
Zustimmung
2. Transparenz: Speicherort, Nutzung
3. Kunde behält Kontrolle über
Datennutzung
4. Information über Rückgabe und
Datenlöschprinzipien von Kundendaten
5. Breach Notification von
personenbezogenen Daten
6. Unabhängiger Audit
Weiterführende Links
Brad Smiths Blog
The collapse of the US-EU Safe Harbor
http://blogs.microsoft.com/on-the-issues/2015/10/20/the-collapse-of-the-us-eu-safe-harbor-solving-the-new-
privacy-rubiks-cube
A message to our customers
http://blogs.microsoft.com/on-the-issues/2015/10/06/a-message-to-our-customers-about-eu-us-safe-harbor/
EU Article 29 WP Letter
http://ec.europa.eu/justice/data-protection/article-29/documentation/other-
document/files/2014/20140402_microsoft.pdf
Stellungnahme der öst. Datenschutzbehörde
http://www.dsb.gv.at/site/6218/default.aspx
Online Service Terms
http://www.microsoftvolumelicensing.com/DocumentSearch.aspx?Mode=3&DocumentTypeId=31
Microsoft Cloud in Deutschland
http://aka.ms/MSCloudDE
Trust-Portal: https://trustportal.office.com
Trust-Center: https://www.microsoft.com/en-us/TrustCenter/default.aspx
Microsoft Cloud Assurance: http://www.microsoftcloudassurance.com/
http://www.guara.org/
Ihre Daten sind sicher!
Ihre Daten gehören Ihnen!
Sie haben die Kontrolle!

Más contenido relacionado

La actualidad más candente

M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...Patrick Guimonet
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterDavid J Rosenthal
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365Bitglass
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the FirewallKTL Solutions
 
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Seb Matthews
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowRichard Harbridge
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
M365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvM365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvAhmad Almarzouk
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsVignesh Ganesan I Microsoft MVP
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Citrix
 

La actualidad más candente (20)

Ms webfourm nettskyen okt2010
Ms webfourm   nettskyen okt2010Ms webfourm   nettskyen okt2010
Ms webfourm nettskyen okt2010
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
Microsoft Solves BYOD Using Microsoft System Center Configuration Manager and...
 
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...2020-03-05 Secure IT day 2020  Abalon - comment protéger votre environnement ...
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
The future of managed services
The future of managed servicesThe future of managed services
The future of managed services
 
Microsoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem PosterMicrosoft Cloud Ecosystem Poster
Microsoft Cloud Ecosystem Poster
 
MS CLOUD DECK
MS CLOUD DECKMS CLOUD DECK
MS CLOUD DECK
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
Microsoft 365
Microsoft 365Microsoft 365
Microsoft 365
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)Journey to the Cloud with Dora The Explorer (Spookinnati Version)
Journey to the Cloud with Dora The Explorer (Spookinnati Version)
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Advantages of containerization
Advantages of containerizationAdvantages of containerization
Advantages of containerization
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
M365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nvM365 reinvinting digital environment for modern workplace nv
M365 reinvinting digital environment for modern workplace nv
 
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud AppsSecure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
 
Microsoft Azure Overview
Microsoft Azure OverviewMicrosoft Azure Overview
Microsoft Azure Overview
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
 

Destacado

Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 
Microsoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic RecordingMicrosoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic RecordingMicrosoft Österreich
 
CIO Summit talk: EU GDPR
CIO Summit talk: EU GDPRCIO Summit talk: EU GDPR
CIO Summit talk: EU GDPRJohn Culkin
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementMarkit
 
Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)Palladium Hotel Group
 
Guia Alojamientos Calpe
Guia Alojamientos CalpeGuia Alojamientos Calpe
Guia Alojamientos CalpeTurismoCalp
 
Enero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpfEnero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpfJacinto Parga
 
Catalogue de formation : Lean Partners
Catalogue de formation : Lean PartnersCatalogue de formation : Lean Partners
Catalogue de formation : Lean PartnersSafa BOUDHRIOUA
 
Social Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de AbrilSocial Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de AbrilUniclickDigital
 
el aceite de argan que es
el aceite de argan que esel aceite de argan que es
el aceite de argan que esaceite de argan
 
Political Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeoplePolitical Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeopleJulian Ausserhofer
 
Presentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información GeográficaPresentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información GeográficaPablo Cabrera
 
Rfid factsheet es (1)
Rfid factsheet es (1)Rfid factsheet es (1)
Rfid factsheet es (1)RFIDPOINT
 

Destacado (20)

Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 
Microsoft Lizenzierung – Server
Microsoft Lizenzierung – ServerMicrosoft Lizenzierung – Server
Microsoft Lizenzierung – Server
 
Microsoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic RecordingMicrosoft: #DigitaleHelden Symposium - Graphic Recording
Microsoft: #DigitaleHelden Symposium - Graphic Recording
 
CIO Summit talk: EU GDPR
CIO Summit talk: EU GDPRCIO Summit talk: EU GDPR
CIO Summit talk: EU GDPR
 
The top 5 factors impacting third party risk management
The top 5 factors impacting third party risk managementThe top 5 factors impacting third party risk management
The top 5 factors impacting third party risk management
 
Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)Palladium Magazine (Fall-Winter 2013)
Palladium Magazine (Fall-Winter 2013)
 
Guia Alojamientos Calpe
Guia Alojamientos CalpeGuia Alojamientos Calpe
Guia Alojamientos Calpe
 
Nota reteintercomunalearo
Nota reteintercomunalearoNota reteintercomunalearo
Nota reteintercomunalearo
 
Kava turismo
Kava turismoKava turismo
Kava turismo
 
Enero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpfEnero 2015 presentación mlt carga aérea jpf
Enero 2015 presentación mlt carga aérea jpf
 
Medizinrecht2
Medizinrecht2Medizinrecht2
Medizinrecht2
 
45 hosta dinner
45 hosta dinner45 hosta dinner
45 hosta dinner
 
Catalogue de formation : Lean Partners
Catalogue de formation : Lean PartnersCatalogue de formation : Lean Partners
Catalogue de formation : Lean Partners
 
Social Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de AbrilSocial Rank del 9 al 17 de Abril
Social Rank del 9 al 17 de Abril
 
el aceite de argan que es
el aceite de argan que esel aceite de argan que es
el aceite de argan que es
 
Calidad
CalidadCalidad
Calidad
 
Political Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and PeoplePolitical Discourses on Twitter: Networking Topics, Objects and People
Political Discourses on Twitter: Networking Topics, Objects and People
 
Presentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información GeográficaPresentación AIKON GIS Sistema de Información Geográfica
Presentación AIKON GIS Sistema de Información Geográfica
 
Rfid factsheet es (1)
Rfid factsheet es (1)Rfid factsheet es (1)
Rfid factsheet es (1)
 
Sdh
SdhSdh
Sdh
 

Similar a Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft)

CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted CloudMicrosoft
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Microsoft Österreich
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandNCCOMMS
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...Amazon Web Services
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewDavid J Rosenthal
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudHostway|HOSTING
 
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudMartin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudContent Guru Benelux
 
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureBrad Brown
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
CRM privacy whitepaper final
CRM privacy whitepaper finalCRM privacy whitepaper final
CRM privacy whitepaper finalZero2Ten
 
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlinePrivacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlineNerea
 

Similar a Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft) (20)

CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted Cloud
 
Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365 Datensicherheit bei Microsoft Azure und Office 365
Datensicherheit bei Microsoft Azure und Office 365
 
SPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud DeutschlandSPUnite17 Microsoft Cloud Deutschland
SPUnite17 Microsoft Cloud Deutschland
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
GDPR
GDPRGDPR
GDPR
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Safeguarding PCI Data in the Cloud
Safeguarding PCI Data in the CloudSafeguarding PCI Data in the Cloud
Safeguarding PCI Data in the Cloud
 
Trustworthy Cloud
Trustworthy CloudTrustworthy Cloud
Trustworthy Cloud
 
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudMartin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
 
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
CRM privacy whitepaper final
CRM privacy whitepaper finalCRM privacy whitepaper final
CRM privacy whitepaper final
 
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM OnlinePrivacy in the Public Cloud: Microsoft Dynamics CRM Online
Privacy in the Public Cloud: Microsoft Dynamics CRM Online
 

Más de Microsoft Österreich

Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 JahreDigitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 JahreMicrosoft Österreich
 
Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"Microsoft Österreich
 
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...Microsoft Österreich
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...Microsoft Österreich
 
Modernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedModernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedMicrosoft Österreich
 
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, TransparencyMicrosoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, TransparencyMicrosoft Österreich
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&TEnable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&TMicrosoft Österreich
 
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOneIMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOneMicrosoft Österreich
 
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics Microsoft Österreich
 
Der Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractiveDer Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractiveMicrosoft Österreich
 
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...Microsoft Österreich
 
Bring your data to life with Power BI
Bring your data to life with Power BIBring your data to life with Power BI
Bring your data to life with Power BIMicrosoft Österreich
 
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...Microsoft Österreich
 

Más de Microsoft Österreich (20)

Shape the Future
Shape the FutureShape the Future
Shape the Future
 
Information Security @ AVL
Information Security @ AVLInformation Security @ AVL
Information Security @ AVL
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 JahreDigitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
Digitale Transformation: Technologie und Mensch - die nächsten 5 Jahre
 
Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"Digital Transformation "Book of Dreams"
Digital Transformation "Book of Dreams"
 
Smart Buildings & IoT
Smart Buildings & IoTSmart Buildings & IoT
Smart Buildings & IoT
 
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
Mit Simplicity und Storytelling zum „Warum“: Motivation und Führung einer neu...
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - Futur...
 
Modernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future DecodedModernes Rechenzentrum - Future Decoded
Modernes Rechenzentrum - Future Decoded
 
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, TransparencyMicrosoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
Microsoft Trusted Cloud - Security Privacy & Control, Compliance, Transparency
 
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&TEnable Mobility and Improve Cost Efficiency within a Secure Ecosystem -  S&T
Enable Mobility and Improve Cost Efficiency within a Secure Ecosystem - S&T
 
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOneIMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
IMMERSIVE AND HYPER-INTELLIGENT WORLD 2025 - TrendOne
 
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
ÖBB - Bahnstrombedarfsprognose- mit Advanced Analytics
 
New World of Work - Solvion
New World of Work - SolvionNew World of Work - Solvion
New World of Work - Solvion
 
Der Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractiveDer Hund an der digitalen Leine - tractive
Der Hund an der digitalen Leine - tractive
 
Der neue Office 365 Plan E5
Der neue Office 365 Plan E5Der neue Office 365 Plan E5
Der neue Office 365 Plan E5
 
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
Aufbau einer erfolgreichen Vertriebsabteilung – Neue Erkenntnisse aus der Ver...
 
ACP Referenz Österreich Werbung
ACP Referenz Österreich WerbungACP Referenz Österreich Werbung
ACP Referenz Österreich Werbung
 
Bring your data to life with Power BI
Bring your data to life with Power BIBring your data to life with Power BI
Bring your data to life with Power BI
 
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
Yammer Katalog: Anwendungsbeispiele – Mit Yammer erreichen Sie Ihre Geschäfts...
 

Último

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Microsoft Trusted Cloud - Harald Leitenmüller (Microsoft)

  • 1. 11:26 Donnerstag, 21. April 2016 Microsoft Trusted Cloud Security,Privacy&Control,Compliance, Transparency DI. Harald Leitenmüller Chief Technology Officer Microsoft Österreich GmbH. #ftAustria
  • 2. Sind meine Daten sicher? Gehören meine Daten mir? Hab ich die Kontrolle? Was bedeutet das Ende von Safe Harbor?
  • 3. “The court of justice declares that the Commission’s US Safe Harbor Decision is invalid” Press Release No 117/15 EU-US Privacy Shield
  • 4. Private Cloud Konsolidierte Daten Operationen MICROSOFT SOLUTIONS Windows Server System Center Windows Azure Pack Microsoft Cloud Portfolio - EUROPE 4 Konsistente Platformen und Anwendungen | Eine einzige Management Konsole Public Cloud “Europa” Hohe Skalierung, Flexibilität und Kosteneffizienz MICROSOFT SOLUTIONS Microsoft Azure Office 365 Dynamics CRM Online Public Cloud “Deutschland” Hohe Skalierung, Flexibilität und Deutsche Datentreuhand MICROSOFT SOLUTIONS Microsoft Azure Deutschland Office 365 Deutschland Dynamics CRM Online Deutschland Hybrid Cloud Schritt in die Cloud MICROSOFT SOLUTIONS Risk Assessment and Data Governance services
  • 5. 5 Unsere “Trust Principles” New: https://trustportal.office.com
  • 6. Readable customer data disclosed to a third party Customer data disclosed to a third party Accidental data spillage 1 1.1.1 1.1 Customer data is readable 1.2 AND Data disclosure due to law enforcement / intelligence request 1.1.2 Deliberate compromise leading to disclosure of customer data 1.1.3 Cloud service provider (CSP) infrastructure compromised 1.1.3.1 Customer infrastructure compromised 1.1.3.2 Compromise of systems outside cloud provider or customer control 1.1.3.3 Customer data permanently lost 2 Disruption of cloud service 3 Threat Tree 1 : Overview Threat Tree 3 Threat Tree 2 Threat Tree 4 Threat Tree 5 Threat Tree 6 Threat Tree 7 Root Risk Event Conditions Technical Controls Process Controls Legend: Consumer Applied Control
  • 7. Customer data is readable 1.2 Data is not encrypted 1.2.1 Encryption keys become known 1.2.2 Data is weakly encrypted 1.2.3 Encryption keys lost by the cloud provider 1.2.2.1 Encryption keys lost by the customer 1.2.2.2 Customer infrastructure compromised 1.2.2.2.1 Breakdown in key management enabling attacker access to keys 1.2.2.2.2 AND Link: 1.1.3.2 Threat Tree 5 Cloud provider infrastructure compromised 1.2.2.1.1 Breakdown in key management enabling attacker access to keys 1.2.2.2.2 AND Link: 1.1.3.1 Threat Tree 4 Protected Key Storage Key Management Practices Protected Key Storage Key Management Practices Encryption at Rest Data Classification Encryption in Transit Cryptographic standards Policy on Use of Cryptographic Controls Threat Tree 1.2 : Customer Data is Readable Local Data Encryption Root Risk Event Conditions Technical Controls Process Controls Legend: Consumer Applied Control
  • 8. 8 Ihre Daten sind sicher Ihre Daten gehören Ihnen Sie haben die Kontrolle  Encryption of all data at rest  Encryption of all data in transit  Enhanced event and admin / service access logging  Advanced security monitoring and threat management  Clear guidelines on data location  Greater transparency and simplicity of data use policies and choices  Data accessed only to improve customer experience  Law enforcement requests redirected to the customer  Notification of customers of lawful requests for information; challenging of gag orders  Ability of customers to hold encryption key and revoke Microsoft copy  Complete deletion of data on customer request and on contract termination  Customer choice of data location  Customer option to limit Microsoft access to data Microsoft Trusted Cloud
  • 9. Microsoft Cloud Verträge MIOL (Microsoft Irland) Kunde in Österreich Microsoft Corporation (USA) European Economic Area (EEA) EU Model Clauses* Safe Harbor Auftraggeber Dienstleister OST (Online Services Terms) EU-US Privacy Shield Betroffene * vorab genehmigungspflichtig Article 29 WP Letter: http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2014/20140402_microsoft.pdf
  • 12. Gibt es auch andere legale Möglichkeiten personenbezogene Daten in die USA zu senden? Quelle: http://www.dsb.gv.at/site/6218/default.aspx
  • 14. Zertifizierung & EU Standardvertragsklauseln Yes
  • 15. ISO 27018 Standard für digital Privatsphäre in der Cloud 6 Prinzipien für Cloud Service Provide 1. Keine Datenverwendung ohne Zustimmung 2. Transparenz: Speicherort, Nutzung 3. Kunde behält Kontrolle über Datennutzung 4. Information über Rückgabe und Datenlöschprinzipien von Kundendaten 5. Breach Notification von personenbezogenen Daten 6. Unabhängiger Audit
  • 16. Weiterführende Links Brad Smiths Blog The collapse of the US-EU Safe Harbor http://blogs.microsoft.com/on-the-issues/2015/10/20/the-collapse-of-the-us-eu-safe-harbor-solving-the-new- privacy-rubiks-cube A message to our customers http://blogs.microsoft.com/on-the-issues/2015/10/06/a-message-to-our-customers-about-eu-us-safe-harbor/ EU Article 29 WP Letter http://ec.europa.eu/justice/data-protection/article-29/documentation/other- document/files/2014/20140402_microsoft.pdf Stellungnahme der öst. Datenschutzbehörde http://www.dsb.gv.at/site/6218/default.aspx Online Service Terms http://www.microsoftvolumelicensing.com/DocumentSearch.aspx?Mode=3&DocumentTypeId=31 Microsoft Cloud in Deutschland http://aka.ms/MSCloudDE Trust-Portal: https://trustportal.office.com Trust-Center: https://www.microsoft.com/en-us/TrustCenter/default.aspx Microsoft Cloud Assurance: http://www.microsoftcloudassurance.com/ http://www.guara.org/
  • 17. Ihre Daten sind sicher! Ihre Daten gehören Ihnen! Sie haben die Kontrolle!