Office 365 Security - CWAG Conference of Western Attorneys

Report
Security, Compliance & Reliability
in Cloud Services
1. How do you make sure your service is available whenever I need to use it?
2. What are your commitments to keep my service up?
3. How is my data secure?
4. Do you commit to keeping my data secure and private?
5. Will you let us know if there is a security breach?
6. Who owns the data?
7. Do I have control once I put it in your cloud?
8. Where is the data stored?
9. Who has access to the data and when?
10. Can I take me data with me if I want to leave your service?
Achieving Security and Compliance: the Office 365 Example
Office 365 Built-in Security
Office 365 Customer Controls
Office 365 Independent Verification
and Compliance
Microsoft
security best
practices
Automated
operations
Encrypted Data
3
24 Hour
Monitored
Physical
Hardware
Isolated
Customer Data
Secure
Network
Microsoft
security best
practices
Automated
operations
Encrypted
data
24-hour
monitored
physical
hardware
Isolated
customer
data
Secure
network
Design Principles




Redundancy
Resiliency
Distributed Workloads
Monitoring




Simplification
Human Backup
Continuous learning
Consistent Communication
Actual World-wide Uptime for the most recent quarter - 99.97%
Financially backed guarantee of 99.9% Uptime
Up-to-date Service health communication through Service Health Dashboard
Certification Status
CERT
MARKET
http://trust.office365.com
REGION

similar documents