Accelerate GDPR compliance with the Microsoft Cloud

Similar documents
Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway

U susret GDPR regulativi Dočekajmo spremni Maj 2018

This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

By 2020, a corporate no-cloud policy will be as rare as a no-internet policy is today. 1

Morgan Independent Software Vendor Lead

QBS Talks. June GDPR a Microsoft perspective Ole Kjeldsen, CTO Microsoft DK

Closing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies. Ronit Reger, Senior Program Manager at Microsoft

Microsoft 365 Das modern Büro der Zukunft

Our Mission. Empower every person and every organization on the planet to achieve more.

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Kimberly Nelson Executive Director Government Solutions US SLG. March 2017

Avanade Zerouno : Cloud Experience. Version 1.0 May 16, 2017 Author(s): Ivan Loreti

Today s top THREAT ACTORS pose unique challenges

COMPLIANCE IN THE CLOUD

What is Dell EMC Cloud for Microsoft Azure Stack?

Klaus Schwab, Founder & Executive Chairman

Compliance & Security in Azure. April 21, 2018

Accelerate GDPR compliance with the Microsoft Cloud

Enterprise Mobility + Security

Hyper scale Infrastructure is the enabler

Matt Holden-Milner Richard Willmott

GDPR - What does this mean for you? Accelerate GDPR compliance with the Microsoft Services. Konstantin Sviridov Andrey Ivanov.

Microsoft Azure. The cloud platform for digital transformation

Microsoft + SUSE This partnership gets stronger every day

CAN MICROSOFT HELP MEET THE GDPR

Amit Panchal Enterprise Technology Strategist

Dublin* Amsterdam. London

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

celerate GDPR compliance h the use of new technologies oni Papanikolaou orate, External & Legal Affairs Director soft Greece, Cyprus & Malta

Cloud Transformation and Significance of Security

Die intelligente Cloud als Kernelement der IT Transformation. Dr. Bernd Kiupel Business Group Lead Cloud & Enterprise, Microsoft Schweiz

Google Cloud & the General Data Protection Regulation (GDPR)

PostgreSQL & The Cloud

Your vision, your results, your cloud

Azure: The Cloud On Your Terms. Herns Hermida Cloud and Enterprise Business Lead Microsoft Philippines

What is Blockchain? Cryptographically Authentic Shared Distributed Ledger. Cryptographically Authentic Each transaction recorded in the database is

Cybersecurity Considerations for GDPR

Workday s Robust Privacy Program

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

TRACKVIA SECURITY OVERVIEW

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ProCloud An Overview

SECURITY & PRIVACY DOCUMENTATION

Microsoft Azure: Using the Public Cloud to solve the Big Questions

Data Protection and GDPR

Data Management and Security in the GDPR Era

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Introductie Intercept

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Managing Microsoft 365 Identity and Access

Your vision. Your cloud.

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates

Protecting your data. EY s approach to data privacy and information security

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Smart Software Licensing tools and Smart Account Management Privacy DataSheet

The Common Controls Framework BY ADOBE

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Microsoft Azure Security, Privacy, & Compliance

Security & Compliance in the AWS Cloud. Amazon Web Services

Go mobile. Stay in control.

The Role of the Data Protection Officer

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Data Privacy and Protection GDPR Compliance for Databases

Checklist: Credit Union Information Security and Privacy Policies

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

Security Information & Policies

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

EU GDPR & ISO Integrated Documentation Toolkit integrated-documentation-toolkit

Data Processing Agreement

GDPR: A QUICK OVERVIEW

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Staying GDPR Ready with MaaS360. Ankur Acharya Offering Manager, IBM MaaS360

Fabrizio Patriarca. Come creare valore dalla GDPR

Altius IT Policy Collection Compliance and Standards Matrix

NYDFS Cybersecurity Regulations

General Data Protection Regulation (GDPR)

locuz.com SOC Services

Data Protection Policy

Microsoft 365 Business FAQs

Embedding GDPR into the SDLC. Sebastien Deleersnyder Siebe De Roovere

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

FedRAMP: Understanding Agency and Cloud Provider Responsibilities

Cisco Webex Messenger

White Paper. How Organizations. Can Use The Cloud In Confidence. In business for people.

Embedding GDPR into the SDLC

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Magento GDPR Frequently Asked Questions

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

ARBOR DDoS PRODUCTS IN A GDPR COMPLIANT ENVIRONMENT. Guidelines and Frequently Asked Questions

General Data Protection Regulation (GDPR) The impact of doing business in Asia

Data Processor Agreement

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

Transcription:

Accelerate GDPR compliance with the Microsoft Cloud Michal Jaworski National Technology Officer Microsoft Poland This presentation is intended to provide an overview of GDPR and is not a definitive statement of the law.

Providing clarity and consistency for the protection of personal data The General Data Protection Regulation (GDPR) imposes new rules on organizations in the European Union (EU) and those that offer goods and services to people in the EU, or that collect and analyze data tied to EU residents, no matter where they are located. Enhanced personal privacy rights Increased duty for protecting data Mandatory breach reporting Significant penalties for non-compliance Microsoft believes the GDPR is an important step forward for clarifying and enabling individual privacy rights

Six principles of GDPR Requiring transparency on the handling and use of personal data. Limiting personal data processing to specified, legitimate purposes. Limiting personal data collection and storage to intended purposes. Enabling individuals to correct or request deletion of their personal data. Limiting the storage of personally identifiable data for only as long as necessary for its intended purpose. Ensuring personal data is protected using appropriate security practices.

What are the key changes to address the GDPR? Personal privacy Controls and notifications Transparent policies IT and training Individuals have the right to: Organizations will need to: Organizations are required to: Organizations will need to: Access their personal data Correct errors in their personal data Erase their personal data Object to processing of their personal data Export personal data Protect personal data using appropriate security Notify authorities of personal data breaches Obtain appropriate consents for processing data Keep records detailing data processing Provide clear notice of data collection Outline processing purposes and use cases Define data retention and deletion policies Train privacy personnel & employee Audit and update data policies Employ a Data Protection Officer (if required) Create & manage compliant vendor contracts

Is GDPR the action for legal department? Personal privacy Controls and notifications Transparent policies IT and training Individuals have the right to: Organizations will need to: Organizations are required to: Organizations will need to: Access their personal data Correct errors in their personal data Erase their personal data Object to processing of their personal data Export personal data Protect personal data using appropriate security Notify authorities of personal data breaches Obtain appropriate consents for processing data Keep records detailing data processing Provide clear notice of data collection Outline processing purposes and use cases Define data retention and deletion policies Train privacy personnel & employee Audit and update data policies Employ a Data Protection Officer (if required) Create & manage compliant vendor contracts

Is GDPR the action for IT department? Personal privacy Controls and notifications Transparent policies IT and training Individuals have the right to: Organizations will need to: Organizations are required to: Organizations will need to: Access their personal data Correct errors in their personal data Erase their personal data Object to processing of their personal data Export personal data Protect personal data using appropriate security Notify authorities of personal data breaches Obtain appropriate consents for processing data Keep records detailing data processing Provide clear notice of data collection Outline processing purposes and use cases Define data retention and deletion policies Train privacy personnel & employee Audit and update data policies Employ a Data Protection Officer (if required) Create & manage compliant vendor contracts

Is GDPR the action for business process owner(s)? Personal privacy Controls and notifications Transparent policies IT and training Individuals have the right to: Organizations will need to: Organizations are required to: Organizations will need to: Access their personal data Correct errors in their personal data Erase their personal data Object to processing of their personal data Export personal data Protect personal data using appropriate security Notify authorities of personal data breaches Obtain appropriate consents for processing data Keep records detailing data processing Provide clear notice of data collection Outline processing purposes and use cases Define data retention and deletion policies Train privacy personnel & employee Audit and update data policies Employ a Data Protection Officer (if required) Create & manage compliant vendor contracts

Why cloud? Article82Right to compensation andliability 1. Any person who has suffered material or non-material damage as a result of an infringement of this Regulation shall have the right to receive compensation from the controller or processorfor the damage suffered. 2. Any controller involved in processing shall be liable for the damage caused by processing which infringes this Regulation. A processor shall be liable for the damage caused by processing only where it has not complied with obligations of this Regulation specifically directed to processors or where it has acted outside or contrary to lawful instructions of the controller. 9

Why cloud? (81) To ensure compliance with the requirements of this Regulation in respect of the processing to be carried out by the processor on behalf of the controller, when entrusting a processor with processing activities, the controller should use only processors providing sufficient guarantees, in particular in terms of expert knowledge, reliability and resources, to implement technical and organisational measures which will meet the requirements of this Regulation, including for the security of processing. ( ) 10

Why Microsoft? Our commitment to you! We are committing to GDPR compliance across our cloud services when enforcement begins on May 25, 2018. We are supporting our customers with contractual commitments. We will share our experience in complying with complex regulations such as the GDPR.

Microsoft early start: Our timeline to comply and enable to comply 2015 2016 2018 June Microsoft kicking off Internal compliance review 16 December Vote of the final draft by the LIBE Committee January Technical and Organizational Measures (TOMs) initial checks 21 December Vote of the final draft by the EU Council (Coreper) 4 May 25 May Publication Entry into force of the of the GDPR GDPR (20 days after publication) As of May 2016 GDPR steps-plan: Identification of the actions to take to fully comply with new data protection requirements Updating processes and tools (i.e. templates) to meet GDPR standards & to support our customers 25 May GDPR provisions are binding

contractual commitments We will stand behind you with contractual commitments for our cloud services that: Meet stringent security requirements Support customers in managing data subject requests Provide documentation that enables customers to demonstrate compliance for all the other requirements of the GDPR applicable to processors and more Microsoft was the first major cloud services provider to make these commitments to its customers. Our goal is to simplify compliance for our customers with both the GDPR and other major regulations. The GDPR commitments are now available in the Online Services Terms (OST) at www.microsoft.com/licensing

How should you start? 1 Discover Identify what personal data you have and where it resides 2 Manage Govern how personal data is used and accessed 3 Protect Establish security controls to prevent, detect, and respond to vulnerabilities & data breaches 4 Report Keep required documentation, manage data requests and breach notifications

1 Discover: Example solutions Microsoft Azure Microsoft Azure Data Catalog In-scope: Inventory: Enterprise Mobility + Security (EMS) Microsoft Cloud App Security Dynamics 365 Audit Data & User Activity Reporting & Analytics Office & Office 365 Data Loss Prevention Advanced Data Governance Office 365 ediscovery SQL Server and Azure SQL Database SQL Query Language Windows & Windows Server Windows Search

2 Manage: Example solutions Data governance: Data classification: Microsoft Azure Azure Active Directory Azure Information Protection Azure Role-Based Access Control (RBAC) Enterprise Mobility + Security (EMS) Azure Information Protection Dynamics 365 Security Concepts Office & Office 365 Advanced Data Governance Journaling (Exchange Online) Windows & Windows Server Microsoft Data Classification Toolkit

3 Protect: Example solutions Preventing data attacks: Detecting & responding to breaches: Microsoft Azure Azure Key Vault Azure Security Center Azure Storage Services Encryption Enterprise Mobility + Security (EMS) Azure Active Directory Premium Microsoft Intune Office & Office 365 Advanced Threat Protection Threat Intelligence SQL Server and Azure SQL Database Transparent data encryption Always Encrypted Windows & Windows Server Windows Defender Advanced Threat Protection Windows Hello Device Guard

4 Report: Example solutions Microsoft Trust Center Service Trust Portal Record-keeping: Reporting tools: Microsoft Azure Azure Auditing & Logging Azure Data Lake Azure Monitor Enterprise Mobility + Security (EMS) Azure Information Protection Dynamics 365 Reporting & Analytics Office & Office 365 Service Assurance Office 365 Audit Logs Customer Lockbox Windows & Windows Server Windows Defender Advanced Threat Protection

Discover Manage Protect Report Identify personal data Control access Set retention policies Classify content Safeguard environment Respond to threats Recordkeeping Transparency assurances Utilize ediscovery templates to identify types of personal data Easily find, classify, set policies on and manage data with Advanced Data Governance Use Advanced ediscovery to export and/or delete personal data from Exchange, SharePoint, etc. Archive and preserve content across your Office 365 systems Automatically protect against accidental disclosure by enforcing policy on sensitive data Protect email from today s sophisticated malware attacks with Advanced Threat Protection Prevent sensitive records from being used by unauthorized users with Data Loss Protection Proactively uncover and protect against advanced threats and risks with Threat Intelligence and Advanced Security Management Conduct risk assessments using built-in tools in the Service Assurance Dashboard Track and report on user activities with detailed Audit Logs

Microsoft Services What we ll cover in this tactical 1 day workshop: Recap on what GDPR is and how it affects your business. Identify key areas of your business where Microsoft can help simplify your privacy journey. Learn how Microsoft can help you uncover risk & take action, using guidance from experts.. Evaluate the options for a tactical improvement strategy two options: Microsoft Services GDPR Foundations to provide a modern IT foundation that will simplify your GDPR Program. Building GDPR Program Combining Microsoft and Partner services to assess your data privacy policies and controls, implement the appropriate controls and reporting capabilities Provide you with a Roadmap of recommended next steps for your consideration.

Global enterprises are mandated to comply with new EU regulations and non compliance will result in fines equaling 2-4% of global revenues. Most enterprises are using this requirement to establish systematic IT Asset Management Service and reporting capabilities. Objectives of the engagement: Drive a centralized data store to host the asset data from various sources. Drive data consistency and data quality. Drive centralized reporting capability to provide insights for Legal, Business and Technical Decision Makers. Benefits & outcomes Solution built on Azure IaaS or PaaS with Power BI for data visualization needs. Drive focused workshop and quick proof of value. Assist the customer to meet their regulatory compliance needs. Components 12 weeks 1-2 day workshop

Reporting & Workflow Solution Pilot Activities: Conduct envisioning workshops Identify data sources Customer data and/or Asset data and other GDPR data Model data Build Visualization Solution with Power BI reports using the KPI s important to the customer for limited personas Deliverables: Configured Azure environment Working Power BI Dashboards/reports Integrated data in Azure environment Timeline: 8 weeks - timeboxed Phases 1..n Activities: Identify and implement the Business rules to validate and action on the compliance rules Implement Machine Learning model to predict the compliance and vulnerabilities Create reporting based on the compliance and vulnerabilities Implement additional data sources and reports Implement bots to track the compliance based on the roles Deliverables: Machine Learning models Business rules management Business workflow integration Power BI reports Bots Timeline: Variable Additional Capability Work-streams* Data Inventory, Classification & Rationalization and Lineage tracking Data Auditing & Data Encryption Data Access Control Data Pseudonymizing Data Retention Data Subject Rights & Consent Management Other Data Protection/Breach Management/Data Transfer requirements Each work stream can be executed in parallel with Pilot or Phase 1; consists of targeted needs assessment and a POC with key reporting to track capability performance Program Management /Change Management/Dependencies/Solution Integration/Process Improvements/Ongoing Improvements & Verification/Documentation

preparation cooperation on Code of Conducts

Microsoft.com/GDPR

GDPR is just the beginning! Approved Applied from 25.5.2018 onwards Approved National implementation by 9 May 2018 COM proposal January 2017 COM guidelines January 2017 Approved National implementation by 23 September 2018 All organizations Critical sectors All organizations All organizations Public sector organizations

Discover Manage Protect Report Search & identify personal data Control access Classify data Protect data in the cloud Detect & Remediate threats Recordkeeping Integrate Azure search for hosted applications to locate personal data across user-defined indexes Trace and identify personal data stored in different data sources Securely manage access to your data, applications and other resources Enforce separation of duties Easily determine and assign relative values to your data Employ advanced encryption, cryptography, and monitoring Restore data availability with a variety of recovery and Georedundant storage options Proactively prevent, detect and respond quickly to threats Deliver verifiable transparency and delivers tamper-resistant insights with activity log Leverage comprehensive compliance and privacy documentation for Azure

Discover Manage Protect Report Identify personal data Control access Classify content Define access privileges Monitor service status Recordkeeping Create reports that uncover personal data Discover, analyze and visualize personal data using Power BI Securely manage access to your data by roles, applications and other resources Classify data and protect against accidental disclosure Protect data by limiting access based on user roles Restrict access to specific highimpact fields or records Monitor service health and stayup-to-date on the latest security updates Explore Microsoft s comprehensive documentation on Dynamics 365 s compliance, security, privacy and trust offerings

Discover Manage Protect Report Identify personal data Classify & label data Protect data, identities, devices & apps Detect threats & remediate Gain rich logging & reporting Quickly identify sensitive data across your environment with Azure Information Protection Discover cloud apps in your environment Gain deeper visibility into user activity Define a classification scheme for better data manageability Use Azure Information Protection to configure policies for classifying, labeling and protecting personal data Deliver consistent data protection with Azure Information Protection Protect personal data with risk-based conditional access and Privileged Identity Management Protect data in mobile devices and mobile apps with Microsoft Intune Detect data breaches with behavioral analytics and anomaly detection technologies Gain rich logging and reporting to analyze how sensitive data is distributed Monitor activities on shared data and revoke access in unexpected events with Azure Information Protection

Discover Manage Protect Report Identify and track personal data Control access Safeguard data Respond to breaches Recordkeeping Easily query databases to uncover personal data Tag data with sensitivity labels using Extended Properties Securely authenticate to your database and apply granular authorization policies Restrict access to users using Dynamic Data Masking and Row- Level Security Encrypt data whether at rest, in transit or in client applications Track and log database events to identify potential threats or security violations Use continuously learning algorithms to identify unusual or suspicious activity Track and report on all database activities with granularly configurable auditing

Discover Manage Protect Report Locate personal data Meet compliance requirements Safeguard environment Respond to threats Recordkeeping Uncover personal data on local and connected machines Utilize sample search expression and rules to ease compliance requirements Move from password to more secure forms of authentication Protect devices with both detection-based solutions and secure-by-design techniques Audit detailed user and application actions to meet reporting auditing requirements Prevent data from leaking to unauthorized documents or locations Easily detect, investigate, contain and respond to data breaches on your network

Safeguard customer data in the cloud, including personal data, with industry-leading security measures and privacy policies

Secure your IT environment and achieve compliance with enterprise-grade user and administrative controls

Protect customer data both in the cloud, and onpremises, with industry-leading security capabilities

Safeguard customer data in the cloud, including personal data, with industry-leading security measures and privacy policies

Protect the data inside your databases with controls for managing access and authorization at several levels

Protect devices with industry-leading encryption, anti-malware technologies, and identity and access solutions

38 Cloud regions worldwide North Central US United Kingdom South West US 2 West Central US West US US Gov Arizona 3 US Gov Texas 3 Central US US Gov Iowa US DoD West South Central US Canada Central US Gov Virginia Canada East US DoD East East US East US 2 United Kingdom West North Europe West Europe Germany Northeast 2 West India Central India South India Korea Central 3 Korea South 3 France 3 Germany Central 2 China West 1 France 3 Japan East China East 1 East Asia Japan West 100+ datacenters One of 3 largest networks in the world 1 China datacenters operated by 21 Vianet Southeast Asia 2 German data trustee services provided by T-systems 3 France, South Korea and US Gov datacenter regions have been announced but are not currently operational Brazil South Australia Southeast Australia East Global datacenters Sovereign datacenters

Azure has the deepest and most comprehensive compliance coverage in the industry GLOBAL ISO 27001 ISO 27018 ISO 27017 ISO 22301 ISO 9001 SOC 1 Type 2 SOC 2 Type 2 SOC 3 CSA STAR Self-Assessment CSA STAR Certification CSA STAR Attestation US GOV Moderate JAB P-ATO High JAB P-ATO DoD DISA SRG Level 2 DoD DISA SRG Level 4 DoD DISA SRG Level 5 SP 800-171 FIPS 140-2 Section 508 VPAT ITAR CJIS IRS 1075 INDUSTRY PCI DSS Level 1 CDSA MPAA FACT UK Shared Assessments FISC Japan HIPAA / HITECH Act HITRUST GxP 21 CFR Part 11 MARS-E IG Toolkit UK FERPA GLBA FFIEC REGIONAL Argentina PDPA EU Model Clauses UK G-Cloud China DJCP China GB 18030 China TRUCS Singapore MTCS Australia IRAP/CCSL New Zealand GCIO Japan My Number Act ENISA IAF Japan CS Mark Gold Spain ENS Spain DPA India MeitY Canada Privacy Laws Privacy Shield Germany IT Grundschutz workbook