{"id":462,"date":"2017-06-07T10:31:35","date_gmt":"2017-06-07T10:31:35","guid":{"rendered":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/industry\/2017\/06\/07\/protect-security-gdpr\/"},"modified":"2018-11-22T15:20:19","modified_gmt":"2018-11-22T15:20:19","slug":"protect-security-gdpr","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2017\/06\/07\/protect-security-gdpr\/","title":{"rendered":"Protect: Establish security controls to protect your data"},"content":{"rendered":"
Data security is a complex area. There are many types of risk to identify and consider\u2014ranging from physical intrusion or rogue employees to accidental loss or hackers. Building risk management plans and taking risk mitigation steps, such as password protection, audit logs and encryption, can help you ensure compliance.<\/p>\n
The Microsoft cloud is specifically built to help you understand risks and to defend against them, and is more secure than on-premises computing environments in many ways. For example, our datacenters are certified to internationally recognised security standards; protected by 24-hour physical surveillance; and have strict access controls.<\/p>\n
How we secure our cloud infrastructure is only part of a comprehensive security solution and each of our products, either in the cloud or on-premises, have security features to help you secure your data.<\/p>\n
Azure<\/strong><\/p>\n The following Azure services and tools will help you protect personal data in your cloud environment:<\/p>\n Read more: Download the white paper on how Microsoft Azure can help your organisation become compliant with the GDPR<\/a><\/p>\n Dynamics 365 <\/strong><\/p>\n You can use the security concepts for Dynamics 365 to protect the data integrity and privacy in a Dynamics 365 organisation. You can combine business units, role-based security, record-based security and field-based security to define the overall access to information that users have in your Dynamics 365 organisation.<\/p>\n Enterprise Mobility + Security (EMS) <\/strong><\/p>\n In the majority of data breaches, attackers gain corporate network access through weak, default or stolen user credentials. Our security approach starts with identity protection at the front door with risk-based conditional access.<\/p>\n Enterprise Mobility + Security provides deep visibility into user, device and data activity on-premises and in the cloud and helps you protect your data with strong controls and enforcement.<\/p>\n Read more: Download the white paper on supporting your EU GDPR compliance journey with Microsoft EMS<\/a><\/p>\n Office and Office 365 <\/strong><\/p>\n The Office 365 platform incorporates security at every level, from application development to physical datacenters to end-user access. Office 365 applications include both built-in security features that simplify the process of protecting data and the flexibility for you to configure, manage and integrate security in ways that make sense for your unique business needs. The Office 365 compliance framework has over 1,000 controls that enable us to keep Office 365 up to date with evolving industry standards, including over 50 certifications or attestations.<\/p>\n Many security controls are available by default. SharePoint and OneDrive for Business, for instance, both use encryption for data in transit and at rest. In addition, you may configure and deploy digital certificates to obfuscate personal data and you can use Office Access controls to grant and restrict access to personal data.<\/p>\n Office 365 offers other features that help you safeguard data and identify when a data breach occurs:<\/p>\n SQL Server and Azure SQL Database <\/strong><\/p>\n SQL Server and Azure SQL Database provide controls for managing database access and authorisation at several levels:<\/p>\n SQL Server and SQL Database provide a powerful set of built-in capabilities that safeguard data and identify when a data breach occurs:<\/p>\n Windows and Windows Server <\/strong><\/p>\n Windows 10 and Windows Server 2016 include industry-leading encryption, antimalware technologies and identity and access solutions that enable you to move from passwords to more secure forms of authentication:<\/p>\n Next step: Protect, detect and respond<\/a> Make sure your data is protected by building a risk management plan and taking risk mitigation steps, such as password protection, audit logs and encryption.<\/p>\n","protected":false},"author":223,"featured_media":1209,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[1,141,142,143,144,145],"post_tag":[],"content-type":[],"coauthors":[24],"class_list":["post-462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cross-industry","category-financial-services","category-government","category-health","category-manufacturing","category-retail"],"yoast_head":"\n\n
\n
\n
\n
\n
\n
\n
\n
\nFind out more about Securing your Data<\/a>
\nFind out more about Safeguarding your Infrastructure<\/a>
\nFind out more at a GDPR cloud workshop<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"