SlideShare ist ein Scribd-Unternehmen logo
1 von 27
September 2016
Email: antonio.maio@protiviti.com
Blog: www.trustsharepoint.com
Slide share: http://www.slideshare.net/AntonioMaio2
Twitter: @AntonioMaio2
Reference: Microsoft Security Bulletins: https://technet.microsoft.com/en-us/library/security/dn631937.aspx
Reference: https://www.microsoft.com/en-us/trustcenter/Compliance/default.aspx
Shared Responsibility
In a cloud environment, security and information protection must be a Shared Responsibility.
https://channel9.msdn.com/Shows/Azure-Friday/Red-vs-Blue-Internal-security-penetration-testing-of-
Microsoft-Azure
Preferred secure communication protocol is TLS 1.2.
• Includes all communication from the internet to Office 365 (client desktops, web browsers, apps, mobile devices, etc.)
• Includes all communication between servers within the Office 365 data center
• Supported protocols: TLS 1.2, 1.1 and 1.0
• When considering on premise deployments, TLS/SSL is recommended
for secure communication even for intranets
• Digital Certificates are completely managed by Microsoft
Reference and cipher suites:
https://technet.microsoft.com/en-us/library/dn569286.aspx
• SSL 3.0 (and earlier) has been considered insecure for years due to inherent vulnerabilities
• Deprecated & removed on Dec. 1, 2014
• TLS 1.0 is now also considered insecure due to an inherent vulnerability
• Maintained for now for browser compatibility
• Only used when TLS 1.2 or 1.1 will not work with the client browser
• Will be deprecated and removed from Office 365 later in ??? (rumor)
• Regulatory standards are recognizing that SSL 3.0 and TLS 1.0 are no longer secure
• Recommendations to remove these protocol versions (ex. PCI DSS standard has a deadline of June 30, 2016 to
remove or have mitigation plans in place for these protocols)
• On premise SharePoint 2010 and 2013: you may only disable SSL 3.0
• You may not disable TLS 1.0 without adverse side effects
• Properly disabling TLS 1.0 requires upgrade to SharePoint 2016
Preferred secure communication protocol is TLS 1.2. We no longer use SSL.
• Extremely complex file encryption strategy used to protect files in the Office 365 data center
Files are chunked; the chunks encrypted with unique keys and randomly distributed and stored.
Unique keys used to encrypt chunks are themselves encrypted and stored in the content database.
The master key is stored in the Key Store, the most secure asset in the Microsoft Office 365 data center.
Keys are rotated every 24 hours.
An attacker needs to gain access to all 3 assets in order to decrypt a single file.
• Each of these three storage components physically separate.
• The information held in any one of the components is unusable on its own.
• Without access to all three it is impossible to retrieve the keys to the chunks, decrypt the keys to make them
usable, associate the keys with their corresponding chunks, decrypt any chunk, or reconstruct a document from
its constituent chunks.
• OAuth - OAuth is a server-to-server authentication protocol that allows applications to authenticate to each other.
With OAuth, user credentials and passwords are not passed from one computer to another. Instead, authentication
and authorization is based on the exchange of security tokens, which grant access to a specific set of resources for a
specific amount of time.
• SAML - Security Assertion Markup Language is an XML-based, open-standard data format for exchanging
authentication and authorization data between parties, in particular, between an identity provider and a service
provider.
Multi-factor authentication helps protect against unauthorized access to the Office 365 environment.
Multi-factor authentication helps protect against unauthorized access to the Office 365 environment.
• New integrated authentication mechanism built into Office client
apps
• Uses ADAL (Active Directory Authentication Library)
• Cross platform: Windows, Mac OS X, Windows Phone, iOS, Android
• Provides advanced sign in features for the Office client
applications:
• Multi-Factor Authentication (MFA)
• SAML third-party identity providers
• Smart card
• Certificate based authentication
• Microsoft Outlook no longer requires “basic authentication”
• Benefits:
• Greater consistency in the user experience for users authenticating to Office 365
services and apps
• Greater security across the entire Office 365 service & app suite
Newly launched authentication protocol which became generally available in May 20, 2016.
• Application Supported
• Office client applications:
• Windows: Office 2016, Office 2013 (update in previewnow)
• MacOS: Office 2016 (in previewnow)
• iOS: Word, Excel & PowerPoint
• Androidphone:Word, Excel &PowerPoint
• Androidtablet: Word, Excel & PowerPoint (coming soon)
• Windows Phone:iOS: Word, Excel & PowerPoint (coming soon)
• Outlook
• Windows: included with Office client
• MacOS: coming soon
• iOS, Android:available now
• Windows Phone:coming soon
• Skype for Business
• Windows: included with Office client
• MacOS: TBD
• iOS, Android,Windows Phone:coming soon
• OneDrive for Business
• Windows: included with Office client
• MacOS: TBD
• iOS, Android,Windows Phone(8.1): coming soon
• No support planned for: Office 2010 or 2007, Office for Mac 2011, Windows Phone 7, OWA for iOS or Android
Modern authentication must be on-boarded for some Office 365 services and environments.
• Default enablement in some Office 365 services:
• Exchange Online: OFF by default
• SharePoint Online: ON by default
• Skype for Business: OFF by default
• Can be enabled via PowerShell
• Support must be enabled on Office Clients and in service for Modern authentication to work
• Ex. Outlook 2016 willattempt ModernAuthentication and auto-revert to Basic Authenticationif ExchangeOnlineis not enabled
References:
• Implications forADFSFederated Auth:http://social.technet.microsoft.com/wiki/contents/articles/30253.office-2013-and-office-365-proplus-modern-authentication-and-client-
access-filtering-policies-things-to-know-before-onboarding.aspx
• Howto enablein Exchange Online:http://social.technet.microsoft.com/wiki/contents/articles/32711.exchange-online-how-to-enable-your-tenant-for-modern-authentication.aspx
• Azure AD PowerShell has Modern Authentication capabilities now in public preview:
http://blogs.technet.com/b/ad/archive/2015/10/20/azure-ad-powershell-public-preview-of-support-for-azure-mfa-new-device-management-commands.aspx
Modern authentication must be on-boarded for some Office 365 services and environments.
Confidentiality Statement and Restriction for Use
"This proposal contains confidential material proprietary to Protiviti Inc. ("Protiviti"), a wholly owned subsidiary of Robert Half International Inc. ("RHI"). RHI is a publicly-traded company and as
such, the materials, information, ideas, and concepts contained herein are non-public, should be used solely and exclusively to evaluate the capabilities of Protiviti to provide assistance to the
client and should not be used in any inappropriate manner or in violation of applicable securities laws. The contents of this proposal are intended for the use of the client and may not be
distributed to third parties. This proposal does not constitute an agreement between Protiviti and the client. Any services Protiviti may provide to the client will be governed by the terms of a
separate written agreement signed by both Protiviti and client. This proposal is based solely on information provided to us by the client, which we have not verified. Accordingly, we are not
responsible for any inaccuracies in that information. Furthermore, changes in the client’s definition of requirements will necessarily affect the proposal set forth herein."

Weitere ähnliche Inhalte

Andere mochten auch

Information technology applied to retailing
Information technology applied to retailingInformation technology applied to retailing
Information technology applied to retailingArezzori
 
Metropolialueen muuttoliikeananalyysi final
Metropolialueen muuttoliikeananalyysi finalMetropolialueen muuttoliikeananalyysi final
Metropolialueen muuttoliikeananalyysi finalTimoAro
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudAntonioMaio2
 
anlysis of textile industry
anlysis of textile industryanlysis of textile industry
anlysis of textile industryKrupa Vora
 
L rannan demografinen kilpailukykyanalyysi final
L rannan demografinen kilpailukykyanalyysi finalL rannan demografinen kilpailukykyanalyysi final
L rannan demografinen kilpailukykyanalyysi finalTimoAro
 
Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311JohnMDoe
 
Porin seudun kilpailukyky 1995 2012
Porin seudun kilpailukyky 1995 2012Porin seudun kilpailukyky 1995 2012
Porin seudun kilpailukyky 1995 2012TimoAro
 
Australia recruiting trends (2012)
Australia recruiting trends (2012)Australia recruiting trends (2012)
Australia recruiting trends (2012)Enboarder
 
06 30-2012 - 2 q12 - conference call presentation
06 30-2012 - 2 q12 - conference call presentation06 30-2012 - 2 q12 - conference call presentation
06 30-2012 - 2 q12 - conference call presentationArezzori
 

Andere mochten auch (11)

Information technology applied to retailing
Information technology applied to retailingInformation technology applied to retailing
Information technology applied to retailing
 
Metropolialueen muuttoliikeananalyysi final
Metropolialueen muuttoliikeananalyysi finalMetropolialueen muuttoliikeananalyysi final
Metropolialueen muuttoliikeananalyysi final
 
SharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the CloudSharePoint Governance: Impacts of Moving to the Cloud
SharePoint Governance: Impacts of Moving to the Cloud
 
anlysis of textile industry
anlysis of textile industryanlysis of textile industry
anlysis of textile industry
 
L rannan demografinen kilpailukykyanalyysi final
L rannan demografinen kilpailukykyanalyysi finalL rannan demografinen kilpailukykyanalyysi final
L rannan demografinen kilpailukykyanalyysi final
 
Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311Frontier Backupand Recovery Presentation 110311
Frontier Backupand Recovery Presentation 110311
 
Derechos de autor
Derechos de autorDerechos de autor
Derechos de autor
 
Presentation1
Presentation1Presentation1
Presentation1
 
Porin seudun kilpailukyky 1995 2012
Porin seudun kilpailukyky 1995 2012Porin seudun kilpailukyky 1995 2012
Porin seudun kilpailukyky 1995 2012
 
Australia recruiting trends (2012)
Australia recruiting trends (2012)Australia recruiting trends (2012)
Australia recruiting trends (2012)
 
06 30-2012 - 2 q12 - conference call presentation
06 30-2012 - 2 q12 - conference call presentation06 30-2012 - 2 q12 - conference call presentation
06 30-2012 - 2 q12 - conference call presentation
 

Mehr von AntonioMaio2

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maioAntonioMaio2
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat teamAntonioMaio2
 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maioAntonioMaio2
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maioAntonioMaio2
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedAntonioMaio2
 
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointAntonioMaio2
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!AntonioMaio2
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365AntonioMaio2
 
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioHybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioAntonioMaio2
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...AntonioMaio2
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...AntonioMaio2
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013AntonioMaio2
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 publishedAntonioMaio2
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always OnAntonioMaio2
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointAntonioMaio2
 
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013AntonioMaio2
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...AntonioMaio2
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013AntonioMaio2
 

Mehr von AntonioMaio2 (20)

Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
A beginners guide to administering office 365 with power shell antonio maio
A beginners guide to administering office 365 with power shell   antonio maioA beginners guide to administering office 365 with power shell   antonio maio
A beginners guide to administering office 365 with power shell antonio maio
 
Office 365 Security - MacGyver, Ninja or Swat team
Office 365 Security -  MacGyver, Ninja or Swat teamOffice 365 Security -  MacGyver, Ninja or Swat team
Office 365 Security - MacGyver, Ninja or Swat team
 
Information security in office 365 a shared responsibility - antonio maio
Information security in office 365   a shared responsibility - antonio maioInformation security in office 365   a shared responsibility - antonio maio
Information security in office 365 a shared responsibility - antonio maio
 
Office 365 security new innovations from microsoft ignite - antonio maio
Office 365 security   new innovations from microsoft ignite - antonio maioOffice 365 security   new innovations from microsoft ignite - antonio maio
Office 365 security new innovations from microsoft ignite - antonio maio
 
Real world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - publishedReal world SharePoint information governance a case study - published
Real world SharePoint information governance a case study - published
 
Overcoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePointOvercoming Security Threats and Vulnerabilities in SharePoint
Overcoming Security Threats and Vulnerabilities in SharePoint
 
What’s new in SharePoint 2016!
What’s new in SharePoint 2016!What’s new in SharePoint 2016!
What’s new in SharePoint 2016!
 
Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365Data Visualization in SharePoint and Office 365
Data Visualization in SharePoint and Office 365
 
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio MaioHybrid Identity Management with SharePoint and Office 365 - Antonio Maio
Hybrid Identity Management with SharePoint and Office 365 - Antonio Maio
 
Developing custom claim providers to enable authorization in share point an...
Developing custom claim providers to enable authorization in share point   an...Developing custom claim providers to enable authorization in share point   an...
Developing custom claim providers to enable authorization in share point an...
 
Identity management challenges when moving share point to the cloud antonio...
Identity management challenges when moving share point to the cloud   antonio...Identity management challenges when moving share point to the cloud   antonio...
Identity management challenges when moving share point to the cloud antonio...
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
 
Best practices for security and governance in share point 2013 published
Best practices for security and governance in share point 2013   publishedBest practices for security and governance in share point 2013   published
Best practices for security and governance in share point 2013 published
 
Keeping SharePoint Always On
Keeping SharePoint Always OnKeeping SharePoint Always On
Keeping SharePoint Always On
 
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePointHow Claims is Changing the Way We Authenticate and Authorize in SharePoint
How Claims is Changing the Way We Authenticate and Authorize in SharePoint
 
Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013Best practices for Security and Governance in SharePoint 2013
Best practices for Security and Governance in SharePoint 2013
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013Best Practices for Security in Microsoft SharePoint 2013
Best Practices for Security in Microsoft SharePoint 2013
 

Kürzlich hochgeladen

Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 

Kürzlich hochgeladen (20)

Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 

How Secure is My Data in Office 365?

  • 1. September 2016 Email: antonio.maio@protiviti.com Blog: www.trustsharepoint.com Slide share: http://www.slideshare.net/AntonioMaio2 Twitter: @AntonioMaio2
  • 2.
  • 3. Reference: Microsoft Security Bulletins: https://technet.microsoft.com/en-us/library/security/dn631937.aspx
  • 4.
  • 6. In a cloud environment, security and information protection must be a Shared Responsibility.
  • 8.
  • 9. Preferred secure communication protocol is TLS 1.2. • Includes all communication from the internet to Office 365 (client desktops, web browsers, apps, mobile devices, etc.) • Includes all communication between servers within the Office 365 data center • Supported protocols: TLS 1.2, 1.1 and 1.0 • When considering on premise deployments, TLS/SSL is recommended for secure communication even for intranets • Digital Certificates are completely managed by Microsoft Reference and cipher suites: https://technet.microsoft.com/en-us/library/dn569286.aspx
  • 10. • SSL 3.0 (and earlier) has been considered insecure for years due to inherent vulnerabilities • Deprecated & removed on Dec. 1, 2014 • TLS 1.0 is now also considered insecure due to an inherent vulnerability • Maintained for now for browser compatibility • Only used when TLS 1.2 or 1.1 will not work with the client browser • Will be deprecated and removed from Office 365 later in ??? (rumor) • Regulatory standards are recognizing that SSL 3.0 and TLS 1.0 are no longer secure • Recommendations to remove these protocol versions (ex. PCI DSS standard has a deadline of June 30, 2016 to remove or have mitigation plans in place for these protocols) • On premise SharePoint 2010 and 2013: you may only disable SSL 3.0 • You may not disable TLS 1.0 without adverse side effects • Properly disabling TLS 1.0 requires upgrade to SharePoint 2016 Preferred secure communication protocol is TLS 1.2. We no longer use SSL.
  • 11. • Extremely complex file encryption strategy used to protect files in the Office 365 data center
  • 12.
  • 13. Files are chunked; the chunks encrypted with unique keys and randomly distributed and stored.
  • 14. Unique keys used to encrypt chunks are themselves encrypted and stored in the content database.
  • 15. The master key is stored in the Key Store, the most secure asset in the Microsoft Office 365 data center.
  • 16. Keys are rotated every 24 hours.
  • 17. An attacker needs to gain access to all 3 assets in order to decrypt a single file. • Each of these three storage components physically separate. • The information held in any one of the components is unusable on its own. • Without access to all three it is impossible to retrieve the keys to the chunks, decrypt the keys to make them usable, associate the keys with their corresponding chunks, decrypt any chunk, or reconstruct a document from its constituent chunks.
  • 18.
  • 19. • OAuth - OAuth is a server-to-server authentication protocol that allows applications to authenticate to each other. With OAuth, user credentials and passwords are not passed from one computer to another. Instead, authentication and authorization is based on the exchange of security tokens, which grant access to a specific set of resources for a specific amount of time. • SAML - Security Assertion Markup Language is an XML-based, open-standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.
  • 20. Multi-factor authentication helps protect against unauthorized access to the Office 365 environment.
  • 21. Multi-factor authentication helps protect against unauthorized access to the Office 365 environment.
  • 22. • New integrated authentication mechanism built into Office client apps • Uses ADAL (Active Directory Authentication Library) • Cross platform: Windows, Mac OS X, Windows Phone, iOS, Android • Provides advanced sign in features for the Office client applications: • Multi-Factor Authentication (MFA) • SAML third-party identity providers • Smart card • Certificate based authentication • Microsoft Outlook no longer requires “basic authentication” • Benefits: • Greater consistency in the user experience for users authenticating to Office 365 services and apps • Greater security across the entire Office 365 service & app suite Newly launched authentication protocol which became generally available in May 20, 2016.
  • 23. • Application Supported • Office client applications: • Windows: Office 2016, Office 2013 (update in previewnow) • MacOS: Office 2016 (in previewnow) • iOS: Word, Excel & PowerPoint • Androidphone:Word, Excel &PowerPoint • Androidtablet: Word, Excel & PowerPoint (coming soon) • Windows Phone:iOS: Word, Excel & PowerPoint (coming soon) • Outlook • Windows: included with Office client • MacOS: coming soon • iOS, Android:available now • Windows Phone:coming soon • Skype for Business • Windows: included with Office client • MacOS: TBD • iOS, Android,Windows Phone:coming soon • OneDrive for Business • Windows: included with Office client • MacOS: TBD • iOS, Android,Windows Phone(8.1): coming soon • No support planned for: Office 2010 or 2007, Office for Mac 2011, Windows Phone 7, OWA for iOS or Android Modern authentication must be on-boarded for some Office 365 services and environments.
  • 24. • Default enablement in some Office 365 services: • Exchange Online: OFF by default • SharePoint Online: ON by default • Skype for Business: OFF by default • Can be enabled via PowerShell • Support must be enabled on Office Clients and in service for Modern authentication to work • Ex. Outlook 2016 willattempt ModernAuthentication and auto-revert to Basic Authenticationif ExchangeOnlineis not enabled References: • Implications forADFSFederated Auth:http://social.technet.microsoft.com/wiki/contents/articles/30253.office-2013-and-office-365-proplus-modern-authentication-and-client- access-filtering-policies-things-to-know-before-onboarding.aspx • Howto enablein Exchange Online:http://social.technet.microsoft.com/wiki/contents/articles/32711.exchange-online-how-to-enable-your-tenant-for-modern-authentication.aspx • Azure AD PowerShell has Modern Authentication capabilities now in public preview: http://blogs.technet.com/b/ad/archive/2015/10/20/azure-ad-powershell-public-preview-of-support-for-azure-mfa-new-device-management-commands.aspx Modern authentication must be on-boarded for some Office 365 services and environments.
  • 25.
  • 26.
  • 27. Confidentiality Statement and Restriction for Use "This proposal contains confidential material proprietary to Protiviti Inc. ("Protiviti"), a wholly owned subsidiary of Robert Half International Inc. ("RHI"). RHI is a publicly-traded company and as such, the materials, information, ideas, and concepts contained herein are non-public, should be used solely and exclusively to evaluate the capabilities of Protiviti to provide assistance to the client and should not be used in any inappropriate manner or in violation of applicable securities laws. The contents of this proposal are intended for the use of the client and may not be distributed to third parties. This proposal does not constitute an agreement between Protiviti and the client. Any services Protiviti may provide to the client will be governed by the terms of a separate written agreement signed by both Protiviti and client. This proposal is based solely on information provided to us by the client, which we have not verified. Accordingly, we are not responsible for any inaccuracies in that information. Furthermore, changes in the client’s definition of requirements will necessarily affect the proposal set forth herein."

Hinweis der Redaktion

  1. How Secure is My Data in Microsoft Office 365? When considering a cloud based service like Office 365, questions about security and trust often gets asked – questions like: Can I trust Office 365 with my company’s data?  How secure is my data in Office 365?  Organizations are often cautious when it comes to trusting cloud services with storing and providing access to corporate data. Answering those questions requires learning about the security strategy the provider has employed, and the specific controls they have put in place to protect your data.  This session will answer those questions and provide an overview of the robust set of security capabilities available in Office 365.