{"id":53172,"date":"2024-08-14T11:05:10","date_gmt":"2024-08-14T15:05:10","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=53172"},"modified":"2024-09-10T13:44:30","modified_gmt":"2024-09-10T17:44:30","slug":"how-to-fortify-your-digital-asset-protection-in-microsoft-365_microsoft","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/how-to-fortify-your-digital-asset-protection-in-microsoft-365_microsoft\/","title":{"rendered":"How to Fortify Your Digital Asset Protection in Microsoft 365"},"content":{"rendered":"

Learn about digital asset protection in Microsoft 365, from encryption and legal compliance to identity control, physical architecture, and more, in this blog.<\/h2>\n
\n

Security is a broad topic, but the goal is the same. Most of us just want to know answers to questions like: Do we have security? Is there enough security? Should we improve our security? Security in conjunction with technology, such as in the sense of digital asset protection, used to be a scary topic, somewhat inaccessible, and best reserved for “nerds” and cyber sleuths.<\/p>\n

Now, it\u2019s critical.<\/p>\n

Why Asset Protection Is Important<\/a><\/h2>\n

Encryption for Microsoft 365 Cloud Security<\/a><\/h2>\n

Microsoft 365 for Legal Compliance<\/a><\/h2>\n

A New Strategy for Identity Control<\/a><\/h2>\n

Security Policies in Microsoft 365<\/a><\/h2>\n

Physical Architecture: Security Features<\/a><\/h2>\n

Business Continuity and Disaster Recovery in Microsoft 365<\/a><\/h2>\n

Additional Business Continuity Tips<\/a><\/h2>\n

Operational Support Structure for Digital Asset Protection<\/a><\/h2>\n

Digital Asset Protection in Microsoft 365: Final Thoughts<\/a><\/h2>\n
\n

<\/a>Why Digital Asset Protection Is Important<\/h2>\n

While working as a consultant at a global manufacturer in the 1990s, I first heard the phrase, \u201cSecurity is everybody\u2019s business.\u201d This company had, and likely still has, a robust security training program with videos, classes and more.<\/p>\n

I admit that I scoffed at this effort until I first flew somewhere for business. Across the aisle and one row up, a well-dressed man extracted a laptop and shared his company\u2019s financial information with all of us behind him. Then, I understood.<\/p>\n

We\u2019ve come a long way since then, yet I still get questioned today about why I use complex passwords and two-factor authentication for everything. My answer: Some service passwords in Azure require 12 characters, and I will always recommend multifactor authentication.<\/p>\n

With everything in the cloud, security is now more important than ever especially when it comes to protecting your two biggest assets: identity and information.<\/strong><\/p>\n

This blog will focus on both identity and information \u2013 from the tools available to how they work together to achieve a holistic and security-centric approach to your cloud investment in Microsoft 365<\/a> and Azure. I\u2019ll specifically dive into seven areas to keep in mind to thoroughly protect your digital assets.<\/p>\n

While the focus won\u2019t be on the technical procedures for implementing these tools, rest assured that I\u2019ll direct you to the technical references everywhere possible.<\/p>\n

<\/a>1. Encryption for Microsoft 365 Cloud Security<\/h2>\n

Vigen\u00e8re. Playfair. Enigma. Sha. MD5. RSA. AES. Perhaps you have heard of these ciphers, especially the later ones like RSA and AES. Today, RSA and AES are the safest, but with every advance in computing power comes the need to update this cipher technology. With the rapidly approaching era of available DNA and Quantum computing, we\u2019ll soon be able to easily decode the final Enigma and Zodiac ciphertexts that have remained uncracked for years.<\/p>\n

RSA is the cipher used for today\u2019s public key cryptography implementation and is the public key infrastructure<\/a> widely in use. To securely facilitate the transfer of information, a message sender uses a known public key to encode a message, and the recipient uses a private key, known only to them, to decode the message.<\/strong> Handshakes and agreements between sender and receiver ensure the quality of the encoding or decoding.<\/p>\n

You can use these encryption technologies to protect assets in your Microsoft 365 platform and Azure. Here\u2019s how:<\/p>\n

\"Data<\/a><\/p>\n

Your Data at Rest (Infrastructure)<\/h3>\n

When it is not being sent, received or used, your organization\u2019s data lives on a server in a datacenter<\/a>.<\/p>\n

Your data is replicated for security and high availability, but while it is at rest in any Microsoft facility, it resides on a storage mechanism encrypted using Bitlocker<\/a>.<\/p>\n

Be sure to gather information in the links above to reference the location of your organization\u2019s data.<\/strong> This is extremely important for topics like the General Data Protection Regulation (GDPR) in the EU and High Availability, which describes a system\u2019s ability to continue operating even when some components of that system fail.<\/p>\n

Your Data in Transit (Information)<\/h3>\n

Your data in transit is the most customer-involved decision-making piece of the Microsoft 365 encryption solution. That is why we work so hard to provide updated guidance and support throughout the life of your Microsoft 365 investment.<\/p>\n

Dozens upon dozens of endpoints are available from any device and any location in the world, providing information entrance and exit paths to and from the various services Microsoft 365 and Azure offer.<\/p>\n

Protecting the information flowing through these points is critical, especially since users are historically unreliable when it comes to classifying and encrypting messages and files on their own.<\/strong><\/p>\n

At the application layer (OSI 7)<\/a>, Microsoft provides Transport Layer Security and Secure Sockets Layer (TLS\/SSL) (currently version 1.2) encryption, the successor to SSL and a means of negotiating a handshake between sender and receiver to generate agreed-upon keys to encrypt data being sent \u2013 this is also known as symmetric cryptography.<\/p>\n

\"OSI<\/a>

Original image: https:\/\/learn.microsoft.com\/en-us\/windows-hardware\/drivers\/network\/windows-network-architecture-and-the-osi-model<\/p><\/div>\n

The sender and recipient must agree on the encryption method based on what is available to them and what is in common between them. As a result, this does not always guarantee the highest level of security, but it does guarantee the highest level of security in common between both parties.<\/p>\n

Here are some of the customer tasks involved with data-encryption information security:<\/p>\n