{"id":623,"date":"2017-03-27T14:47:10","date_gmt":"2017-03-27T18:47:10","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/industry\/2017\/03\/27\/how-security-transparency-is-key-to-trust\/"},"modified":"2017-03-27T14:47:10","modified_gmt":"2017-03-27T18:47:10","slug":"how-security-transparency-is-key-to-trust","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2017\/03\/27\/how-security-transparency-is-key-to-trust\/","title":{"rendered":"How Security Transparency is Key to Trust"},"content":{"rendered":"

Being transparent may be perceived by some organizations as difficult, especially when highlighting a security breach. At Microsoft, our commitment to transparency means holding ourselves accountable to our customers, partners and all stakeholders. Key to this commitment is sharing both successes and failures.<\/p>\n

Demonstrating and implementing security practices to protect the data and processes of our employees and customers is essential to our success. Trust begins with understanding, and understanding requires transparency.<\/p>\n

Knowledge is Power<\/span><\/h2>\n

Microsoft\u2019s unique visibility into the growing threat landscape comes from our hyper-scaled cloud footprint of more than 200 cloud services, 100+ datacenters, millions of devices, and over a billion customers across the globe. Our investment in security professionals is focused on secure development as well as protect, detect and respond functions.<\/p>\n

As such, we are committed to protecting the computing environment used by both our customers and employees to ensure the resiliency of our cloud infrastructure and services, products and devices. Our Microsoft Premier Support Global Incident Response and Recovery teams are available to rapidly engage during a targeted attack.<\/p>\n

Sharing our Learnings<\/h2>\n

Challenges faced by our customers during incident response and recovery are both technical and non-technical, and as such we\u2019ve recently compiled an Incident Response Reference Guide to provide comprehensive incident management guidance. It is designed to help you prepare for and meet critical needs during a major cybersecurity incident, as well as to avoid common errors. It provides you with our experience and lessons learned in the form of:<\/p>\n