SlideShare a Scribd company logo
1 of 5
Download to read offline
“Trust me, I’m
a cloud”
Dan Bowen
Microsoft
We protect your data at stages with 2048-bit encryption
Data in transit
between a user and
the service
Protects user from
interception of their
communication and
helps ensure
transaction integrity
Data in transit
between data
centers
Protects from bulk
interception of data
Data at rest
Protects from removal
of physical media
End-to-end
encryption of
communications
between users
Protects from
interception or loss of
data in transit between
users
Compliant and certified with worldwide privacy standards
More certification information is available at the Azure Trust Center.
Microsoft Azure
ISO/IEC 27018 
ASD Certified Cloud Services 
SAS 70/ SSAE / SOC 1 / SOC 2 
FedRAMP 
HIPAA BAA 
EU-Model Clauses / Safe Harbor 
UK G-Cloud/IL2 
PCI DSS 
Microsoft Azure, Office 365, Dynamics CRM Online and
Intune follow the standard’s code for the protection of
personal information
ASD
http://www.asd.gov.au/infosec/irap/certified_clouds.htm

More Related Content

What's hot

Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
David J Rosenthal
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
Ronny de Jong
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
David J Rosenthal
 

What's hot (20)

Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Microsoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite PosterMicrosoft Enterprise Mobility Suite Poster
Microsoft Enterprise Mobility Suite Poster
 
XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Enterprise Mobility Suite
Enterprise Mobility SuiteEnterprise Mobility Suite
Enterprise Mobility Suite
 
Enterprise mobility suite
Enterprise mobility suiteEnterprise mobility suite
Enterprise mobility suite
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Identity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft AzureIdentity Management for Office 365 and Microsoft Azure
Identity Management for Office 365 and Microsoft Azure
 
Protecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility SuiteProtecting corporate data with Enterprise Mobility Suite
Protecting corporate data with Enterprise Mobility Suite
 
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - AtidanMicrosoft Enterprise Mobility Suite Launch Presentation - Atidan
Microsoft Enterprise Mobility Suite Launch Presentation - Atidan
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Management of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 BusinessManagement of all the devices using Microsoft 365 Business
Management of all the devices using Microsoft 365 Business
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
Windows Intune webinar
Windows Intune webinarWindows Intune webinar
Windows Intune webinar
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Being more secure using Microsoft 365 Business
Being more secure using Microsoft 365 BusinessBeing more secure using Microsoft 365 Business
Being more secure using Microsoft 365 Business
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 

Viewers also liked

BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...
BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...
BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...
Lisette Giepmans
 
HeatherDadyDesigns_sm
HeatherDadyDesigns_smHeatherDadyDesigns_sm
HeatherDadyDesigns_sm
Heather Dady
 
Indian-financial-markets-final- (1)
 Indian-financial-markets-final-  (1) Indian-financial-markets-final-  (1)
Indian-financial-markets-final- (1)
meenapsawant
 
How to build a better team
How to build a better teamHow to build a better team
How to build a better team
Rob Cohen
 

Viewers also liked (17)

BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...
BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...
BioSHaRE: Making data useful without direct sharing: Cafe Variome and Omics b...
 
HeatherDadyDesigns_sm
HeatherDadyDesigns_smHeatherDadyDesigns_sm
HeatherDadyDesigns_sm
 
Nicholas Resume 1
Nicholas Resume 1Nicholas Resume 1
Nicholas Resume 1
 
Hola
HolaHola
Hola
 
Research methods presentation
Research methods presentationResearch methods presentation
Research methods presentation
 
Scan
ScanScan
Scan
 
R011409288E
R011409288ER011409288E
R011409288E
 
Presentation123
Presentation123Presentation123
Presentation123
 
Mecanica de materiles gitzgerald-
Mecanica de materiles  gitzgerald-Mecanica de materiles  gitzgerald-
Mecanica de materiles gitzgerald-
 
Indian-financial-markets-final- (1)
 Indian-financial-markets-final-  (1) Indian-financial-markets-final-  (1)
Indian-financial-markets-final- (1)
 
How to build a better team
How to build a better teamHow to build a better team
How to build a better team
 
Flu Clinics
Flu ClinicsFlu Clinics
Flu Clinics
 
BioSHaRE: Risk stratification using genomic and lifestyle information - Samul...
BioSHaRE: Risk stratification using genomic and lifestyle information - Samul...BioSHaRE: Risk stratification using genomic and lifestyle information - Samul...
BioSHaRE: Risk stratification using genomic and lifestyle information - Samul...
 
Display Network Google
Display Network GoogleDisplay Network Google
Display Network Google
 
Initiative, Pune, Manual Multiport Valves
Initiative, Pune, Manual Multiport ValvesInitiative, Pune, Manual Multiport Valves
Initiative, Pune, Manual Multiport Valves
 
10 Социальные интересы и взаимодействие
10  Социальные интересы и  взаимодействие10  Социальные интересы и  взаимодействие
10 Социальные интересы и взаимодействие
 
Mobius: C# Language Binding For Spark
Mobius: C# Language Binding For SparkMobius: C# Language Binding For Spark
Mobius: C# Language Binding For Spark
 

Similar to Next Level Learning IT Track 6 - Cloud Trust

Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
Brad Brown
 
cloud-security
cloud-securitycloud-security
cloud-security
Asun Sada
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
Erni Susanti
 

Similar to Next Level Learning IT Track 6 - Cloud Trust (20)

Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Flyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft AzureFlyer- Cloud Environment Overview- Microsoft Azure
Flyer- Cloud Environment Overview- Microsoft Azure
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Information protection & classification
Information protection & classificationInformation protection & classification
Information protection & classification
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotely
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 

More from Microsoft Education AU

Microsoft Australia Education Professional Development Catalogue
Microsoft Australia Education Professional Development CatalogueMicrosoft Australia Education Professional Development Catalogue
Microsoft Australia Education Professional Development Catalogue
Microsoft Education AU
 

More from Microsoft Education AU (19)

Next Level Learning IT Track - Harnessing the Data in your School
Next Level Learning IT Track - Harnessing the Data in your SchoolNext Level Learning IT Track - Harnessing the Data in your School
Next Level Learning IT Track - Harnessing the Data in your School
 
1-to-1 Learning in a BYOD World Whitepaper
1-to-1 Learning in a BYOD World Whitepaper1-to-1 Learning in a BYOD World Whitepaper
1-to-1 Learning in a BYOD World Whitepaper
 
Inking Your Thinking - Summary Report
Inking Your Thinking - Summary ReportInking Your Thinking - Summary Report
Inking Your Thinking - Summary Report
 
Inking Your Thinking - Full Report
Inking Your Thinking - Full ReportInking Your Thinking - Full Report
Inking Your Thinking - Full Report
 
Next level learning NSW Roadshow presentation deck
Next level learning NSW Roadshow presentation deckNext level learning NSW Roadshow presentation deck
Next level learning NSW Roadshow presentation deck
 
2015 devices for schools checklist
2015 devices for schools checklist2015 devices for schools checklist
2015 devices for schools checklist
 
2015 apps for learning guide
2015 apps for learning guide2015 apps for learning guide
2015 apps for learning guide
 
Microsoft in Education - 32 Scenarios for Classrooms
Microsoft in Education - 32 Scenarios for ClassroomsMicrosoft in Education - 32 Scenarios for Classrooms
Microsoft in Education - 32 Scenarios for Classrooms
 
Devices for School Infographic
Devices for School InfographicDevices for School Infographic
Devices for School Infographic
 
Collaboration Using Office 365 Education
Collaboration Using Office 365 EducationCollaboration Using Office 365 Education
Collaboration Using Office 365 Education
 
Microsoft Australia Education Professional Development Catalogue
Microsoft Australia Education Professional Development CatalogueMicrosoft Australia Education Professional Development Catalogue
Microsoft Australia Education Professional Development Catalogue
 
Your School, Your Way 2014 Presentation Slides
Your School, Your Way 2014 Presentation SlidesYour School, Your Way 2014 Presentation Slides
Your School, Your Way 2014 Presentation Slides
 
Microsoft Apps for Learning
Microsoft Apps for LearningMicrosoft Apps for Learning
Microsoft Apps for Learning
 
Think. Collaborate. Succeed. Presentation
Think. Collaborate. Succeed. PresentationThink. Collaborate. Succeed. Presentation
Think. Collaborate. Succeed. Presentation
 
Creativity, Productivity, Collaboration NSW Roadshow - November 2013
Creativity, Productivity, Collaboration NSW Roadshow - November 2013Creativity, Productivity, Collaboration NSW Roadshow - November 2013
Creativity, Productivity, Collaboration NSW Roadshow - November 2013
 
Computing Capability
Computing Capability Computing Capability
Computing Capability
 
Partners in Learning School Report - Sample
Partners in Learning School Report - Sample Partners in Learning School Report - Sample
Partners in Learning School Report - Sample
 
Microsoft Bring Your Own Device To School - 2012 Briefing Paper K-12
Microsoft Bring Your Own Device To School - 2012 Briefing Paper K-12Microsoft Bring Your Own Device To School - 2012 Briefing Paper K-12
Microsoft Bring Your Own Device To School - 2012 Briefing Paper K-12
 
Microsoft Bring Your Own Device to School - K-12 Briefing Paper - 2013 Update
Microsoft Bring Your Own Device to School - K-12 Briefing Paper - 2013 Update Microsoft Bring Your Own Device to School - K-12 Briefing Paper - 2013 Update
Microsoft Bring Your Own Device to School - K-12 Briefing Paper - 2013 Update
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Next Level Learning IT Track 6 - Cloud Trust

  • 1. “Trust me, I’m a cloud” Dan Bowen Microsoft
  • 2. We protect your data at stages with 2048-bit encryption Data in transit between a user and the service Protects user from interception of their communication and helps ensure transaction integrity Data in transit between data centers Protects from bulk interception of data Data at rest Protects from removal of physical media End-to-end encryption of communications between users Protects from interception or loss of data in transit between users
  • 3. Compliant and certified with worldwide privacy standards More certification information is available at the Azure Trust Center. Microsoft Azure ISO/IEC 27018  ASD Certified Cloud Services  SAS 70/ SSAE / SOC 1 / SOC 2  FedRAMP  HIPAA BAA  EU-Model Clauses / Safe Harbor  UK G-Cloud/IL2  PCI DSS  Microsoft Azure, Office 365, Dynamics CRM Online and Intune follow the standard’s code for the protection of personal information ASD
  • 4.