SlideShare uma empresa Scribd logo
1 de 6
90 Day Free Trial: http://aka.ms/vs4rdw
Microsoft Confidential – NDA Required
Microsoft Confidential – NDA Required
Microsoft Confidential – NDA Required
http://www.windowsazure.com
/en-us/support/trust-center/
90 Day Free Trial: http://aka.ms/vs4rdw

Mais conteúdo relacionado

Destaque

Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design ConsiderationsMike Kavis
 
Matt Chung (Independent) - Serverless application with AWS Lambda
Matt Chung (Independent) - Serverless application with AWS Lambda Matt Chung (Independent) - Serverless application with AWS Lambda
Matt Chung (Independent) - Serverless application with AWS Lambda Outlyer
 
Windows Azure and the Hybrid Cloud
Windows Azure and the Hybrid CloudWindows Azure and the Hybrid Cloud
Windows Azure and the Hybrid CloudWindows Azure
 
Using arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of thingsUsing arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of thingsSudar Muthu
 
Microsoft Azure 概觀 (2014-4-2 雲端達人班)
Microsoft Azure 概觀 (2014-4-2 雲端達人班)Microsoft Azure 概觀 (2014-4-2 雲端達人班)
Microsoft Azure 概觀 (2014-4-2 雲端達人班)Jeff Chu
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionalityvivekbhat
 
Introduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows AzureIntroduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows AzureKaushal Bhavsar
 
Aws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To KnowAws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To KnowScalr
 
Home Automation Using RPI
Home Automation Using  RPIHome Automation Using  RPI
Home Automation Using RPIAnkara JUG
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry PiYash Gajera
 

Destaque (11)

Cloud Computing Design Considerations
Cloud Computing Design ConsiderationsCloud Computing Design Considerations
Cloud Computing Design Considerations
 
Matt Chung (Independent) - Serverless application with AWS Lambda
Matt Chung (Independent) - Serverless application with AWS Lambda Matt Chung (Independent) - Serverless application with AWS Lambda
Matt Chung (Independent) - Serverless application with AWS Lambda
 
Windows Azure and the Hybrid Cloud
Windows Azure and the Hybrid CloudWindows Azure and the Hybrid Cloud
Windows Azure and the Hybrid Cloud
 
Using arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of thingsUsing arduino and raspberry pi for internet of things
Using arduino and raspberry pi for internet of things
 
Microsoft Azure 概觀 (2014-4-2 雲端達人班)
Microsoft Azure 概觀 (2014-4-2 雲端達人班)Microsoft Azure 概觀 (2014-4-2 雲端達人班)
Microsoft Azure 概觀 (2014-4-2 雲端達人班)
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
 
Introduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows AzureIntroduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows Azure
 
Aws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To KnowAws vs. Azure: 5 Things You Need To Know
Aws vs. Azure: 5 Things You Need To Know
 
Home Automation Using RPI
Home Automation Using  RPIHome Automation Using  RPI
Home Automation Using RPI
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
 

Windows Azure Security and Compliance Overview

Notas do Editor

  1. Timing: 2 minutesKey Points:Microsoft’s Global Foundation Services provides the key compliance capabilities you need.Talk Track:Often our customers just want a very simple checklist of what compliance capabilities Microsoft's online cloud infrastructure has – to that end:we're ISO 20001 certified (first certified in 2008); we have SAS 70 Type 2 attestations in place (Microsoft is moving to the new SSAE 16/ISAE 3402 SOC 1, 2 and 3 as the industry reties the SAS 70); we meet our HIPAA and HITECH obligations; various state and global privacy obligations are met by our overall program; we are PCI data security standard certified; and, finally, we have had a U.S. FISMA Authority to Operate since 2010.
  2. Timing: 3 minutesKey Points:Windows Azure adheres to Microsoft Security Development Life Cycle, has security in place across all layers of defense-in-depth, and provides the key compliance capabilities you need.Talk Track: Defense in DepthAt the physical layer, Windows Azure servers are stored in the datacenters run by Global Foundation Services which utilize best practices and industry standards as we’ve previously discussed in more detail, such as video surveillance and access controlAt the network layer, Microsoft deploys VLANs and packet filters to segregate network access between customers, management systems, and the Internet, ensuring there is no way for traffic to talk to any undesired hosts.At the host layer, the Windows Azure virtual machines run a customized, hardened, and fully patched version of the latest Windows Server.  Machine boundaries are enforced by the hypervisor which doesn’t depend on the operating system security.At the application layer, Windows Azure provides options to run their code with lower-levels of trust and under lower-privilege user accounts.At the data layer, access to data is controlled using strong storage access keys controlled by the customer, communication to the data can be secured using SSL, and the data itself can be encrypted inside of storage.At the user layer, Windows Azure provides robust account management services with training, awareness, and screening. Windows Azure also offers the Access Control Services, an open an interoperable access control service that can be configured to authenticate using existing identity information.ComplianceWindows Azure core services has EU Safe Harbor, EU Model Clauses, ISO 27001, and SSAE 16 certifications complete. Additional compliance programs are underway, including FISMA and HIPAA BAA.
  3. Windows Azure Core Services:Cloud Services (includes Web, Worker, and VM roles)Storage (includes Blobs, Queues, and Tables)Networking (includes Traffic Manager, Connect, and Virtual Network)Virtual MachinesIncluded in the above are our service management features and the management portal, as well as the information management systems used to monitor, operate, and update these services.EU-US Safe Harbor FrameworkMicrosoft (including, for this purpose, all of our U.S. subsidiaries) is Safe Harbor certified with the U.S. Department of Commerce.This allows for legal transfer of data to Microsoft for processing from within European Union and countries with aligned data protection laws. Microsoft acts as the data processor and, to the extent of the Service’s capabilities, decisions regarding data usage are made by the data controller.ISO 27001Received ISO/IEC 27001:2005 certificate from BSI on 11/29/2011 for Windows Azure Core ServicesBroad international information security standard. Acts as security baseline.Ability to clearly demonstrate that we have achieved a baseline certification.Gets our compliance team building a rigorous security compliance framework that can then be expanded upon – documentation and process heavy with some technical gaps to close.The ISO/IEC 27001:2005 certificate validates that Microsoft has implemented the internationally recognized information security controls defined in this standard.SSAE 16Successor to SAS 70 attestations.An accounting standard that is relied upon as the authoritative guidance for reporting on service organizations.It illustrates Microsoft’s willingness to open up internal security programs to outside scrutiny.The end result is auditor’s report on the effectiveness and suitability of selected controls to achieve desired control objectives during the period under review. Detailed SSAE 16 report can then be shared with customers under NDA.We expect to have the audit report (SOC 1 Type 2) available for Windows Azure core services by 7-June-2012.EU Data Protection DirectiveLaw that sets a baseline for handling personal datein the EUUS standards meet EU requirements through US Safe HarborMicrosoft self-attests compliance under the US Safe Harbor framework, which lets us transfer EU PII outside EU, and even allows the “onward-transfer” from the US to another countryHowever, EU regulators and customers increasingly consider the Safe Harbor to be inadequate and are asking for EU Model Contractual Clauses. We currently offer to sign EU MC for WA core services.Location of Data  Clarifies that we don’t transfer EU data outside of EU data centers except in extraordinary circumstancesCustomers may specify the geographic region(s) of the Microsoft datacenters in which Customer Data will be stored.  For data redundancy or other purposes, Microsoft may move Customer Data within a major geographic region (for example, between West Europe and North Europe), but Microsoft will not move Customer Data outside the major geographic region(s) customer specifies (for example, from Europe to US or from US to Asia) except where the customer configures the account to enable this (for example, through use of the Content Delivery Network feature). Microsoft may, however, access Customer Data from outside such region(s) where necessary for Microsoft to provide customer support, to troubleshoot the service, or to comply with legal requirements.  Such transfers will be done pursuant to EU-US Safe Harbor Framework.Microsoft does not control or limit the regions from which customers or their end users may access Customer Data.Health Insurance Portability and Accountability Act (HIPAA)Specifies privacy, security, and disaster recovery guidelines for electronic storage of health records. No platform can be HIPAA compliant; what is needed, though, is Business Associate Agreement (BAA) that enables third parties to build HIPAA compliant applications on Windows Azure. We need to sign a BAA with the Covered Entity if Protected Health Information (PHI) they are responsible for is to be stored, processed or otherwise accessed by AzureSubstantial overlap with ISO controls, i.e., HIPAA program will benefit substantially from ISO workCompleted mapping of ISO 27001 controls to HIPAA controls, list of subcontractors done, expected to offer BAA in Q2 CY2012FISMAFederal Information Security Management Act of 2002 (FISMA) is a U.S. federal law that defines a comprehensive framework to protect government information, operations, and assets against natural and man-made threatsRequired by law for U.S. federal agencies, and looked on favorably by other government agenciesThe law gives National Institute of Standards and Technology (NIST) authority to establish standards that are not product and technology specificVery strong security standardWe are committed to obtaining FISMA Moderate Authorization to Operate (ATO)Sponsoring agency General Services Administration (GSA)Build on top of ISO/SSAE work, and remediate controls where needed to much stricter FISMA standardsEngineering gap analysis completedProjected completion Q4 CY2012