{"id":14029,"date":"2018-05-16T00:00:00","date_gmt":"2018-05-16T05:00:00","guid":{"rendered":"https:\/\/centricconsulting.com\/post\/asset-protection-series-security-policies-office-365_portal\/"},"modified":"2021-12-15T00:15:02","modified_gmt":"2021-12-15T05:15:02","slug":"asset-protection-series-security-policies-office-365_portal","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/asset-protection-series-security-policies-office-365_portal\/","title":{"rendered":"Asset Protection: Security Policies in Office 365"},"content":{"rendered":"

Let’s review the Office 365 security policies that you need and why they’re important.<\/em><\/h2>\n

\"security<\/p>\n

Part four of a\u00a0series<\/a>.<\/em><\/p>\n

Everyone knows they need policies, especially for security. Do you have policies? Are they up-to-date?<\/p>\n

Let\u2019s first make a distinction between the two types of policies we have to work with. There are policies in Office 365 and Azure such as Password, DLP, Label, Threat Management, Data Governance and Mobile Device Management. These are the policies you can create in your Office 365 and Azure tenants and they consist of settings that were likely decided upon in your security requirements meetings. These should be part of your baseline platform documentation already.<\/p>\n

But what I want to discuss in this article are the other policies that you\u2019ll need and why they\u2019re important. These are the policies in their documented form that have been decided upon and will not change without your governance board or boards\u2019 approval.<\/p>\n

Although we won\u2019t talk about it until the Operations and Monitoring blog, post 7 in this series, you can use Secure Score and Cloud App Security<\/a> for a bit to assist in making decisions about which policies are most important and which ones might wait awhile.<\/p>\n

Identity Policy<\/h2>\n

This type of policy covers items that protect your users, their personal information, and access to your systems.<\/p>\n