{"id":106941,"date":"2020-01-08T18:35:27","date_gmt":"2020-01-08T18:35:27","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=435831"},"modified":"2020-01-08T18:35:27","modified_gmt":"2020-01-08T18:35:27","slug":"government-data-protection-earning-and-retaining-the-publics-trust-with-microsoft-365","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2020\/01\/08\/government-data-protection-earning-and-retaining-the-publics-trust-with-microsoft-365\/","title":{"rendered":"Government data protection\u2014earning and retaining the public\u2019s trust with Microsoft 365"},"content":{"rendered":"<p>Citizen confidence in government institutions and public servants depends on trust. Citizens need to trust that the individuals and agencies representing them will act in good faith to protect their interests. Whether it\u2019s the safety of food, medications, infrastructure, information, or national security, the sustainability of the social contract between the government and its constituents requires persistent attention to retain the public\u2019s trust.<\/p>\n<p>For governments to function, the flow of data on a massive scale is required\u2014including sensitive information about critical infrastructure, public safety, and security. The higher the stakes in data sensitivity, the more attractive the information is to malefactors for reasons that range from financial gain to political influence. It should come as no surprise that the security of government information systems is subject to constant attempted attacks.<\/p>\n<p>Until recently, the prevailing paradigm for system security was to protect the perimeter\u2014that is, protect the network\u2019s entry and exit points, typically through firewalls or virtual private networks (VPNs). This model is built on implicit trust that access is legitimate by default for anyone inside the perimeter. The basis for this implicit trust in traditional network security is becoming obsolete in the wake of changes such as the expansion of the mobile workforce, the rapid growth in digital data, the proliferation of shadow IT, and the rise of cyberattacks. Today, more and more organizations are pivoting to a Zero Trust model for security where all users and devices\u2014both inside and outside the network\u2014are deemed untrustworthy by default and the same security checks are applied to all users, devices, applications, and data.<\/p>\n<h3>Security considerations for government institutions<\/h3>\n<p>Consider the information needed by social workers employed by a child protection agency to do their job promoting the safety and development of at-risk children, some of the most vulnerable citizens in society. To screen a child for investigation requires judgment based on quality information. To take a child into protective custody requires even more exacting discernment. Before a court makes a final decision to remove a child from their family, multiple professionals from various agencies need to conclude there\u2019s reasonable cause to believe that the health, safety, or welfare of the child is at risk. In order to make these important decisions, the stakeholders need appropriate access to the relevant information across functions and agencies. And they need to coordinate with each other.<\/p>\n<p>A social worker may be a civil servant or a contractor using an agency-supplied device or a personal phone. They may be inspecting environments where children live or go to school, or they may be taking information from healthcare providers or law enforcement. The range of information they interact with is diverse and extensive, and its transmission across relevant agencies is made more complex by compliance standards pertaining to data protection and privacy.<\/p>\n<p>Some questions governments ask themselves to support the free and trusted flow of information to empower social workers include:<\/p>\n<ul>\n<li>What data do social workers need to do their jobs?<\/li>\n<li>Should access to relevant sensitive information apply at all times, or would it be appropriate to impose time limits?<\/li>\n<li>What information is safe to store on personal devices\u2014for example, photos that are relevant to the case?<\/li>\n<li>What to do if the identity or the device of a social worker becomes infected through malware?<\/li>\n<\/ul>\n<p>This can potentially wreak havoc on data privacy or the safety of the vulnerable population they are trying to serve and could open the agency up to civil liability if not properly protected.<\/p>\n<p>Given these questions and the complexity of cybersecurity concerns and data privacy, it\u2019s hard to justify an approach that is premised on implicit trust and unfettered access to sensitive data. In addition to trust considerations, public sector organizations also need to enable productivity and collaboration. Striking the right balance between productivity and security need not be all or nothing.<\/p>\n<h3>The Zero Trust model<\/h3>\n<p>The Zero Trust security model adheres to three pillars:<\/p>\n<ol>\n<li>Explicit verification of every access request.<\/li>\n<li>Use of least privileged access with just-in-time adaptive risk-based access policies.<\/li>\n<li>Assume breach mentality to minimize potential damage to, or loss of data from, additional parts of the organization.<\/li>\n<\/ol>\n<p>In our example, all information requests would be treated as though they originate from an uncontrolled (external or compromised) network. But this need not impede the social worker\u2019s productivity. With the right governance, social workers can and should have access to the relevant information<em>.<\/em> Governing parameters might include restricting access to information about non-clients. Another parameter may be to set access expiration dates, or determine which devices are eligible for access. If a device or an agency worker\u2019s identity becomes compromised, their access can be mediated by identity management or data governance rules that enable productivity while being mindful of security.<\/p>\n<p>For an agency to retain its commitment to the constituents it serves and uphold data privacy standards, implicit trust within a data estate no longer makes sense. An end-to-end Zero Trust approach aims to build security into the entire digital estate, across your identities (usernames and passwords), devices, network, infrastructure, applications, and data.<\/p>\n<h3>Microsoft 365 helps governments on the Zero Trust journey<\/h3>\n<p>With <a href=\"https:\/\/www.microsoft.com\/microsoft-365\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365<\/a>, governments can take immediate steps towards a Zero Trust security model. The first step in building a secure environment is explicit verification of identity. Phishing is one of the most common types of cyberattacks. It can lead to a user\u2019s credentials being compromised and opens the doors for attackers to steal valuable information. Sensitive data may be what cybercriminals want, but an identity breach is often the preferred tactic to get to the data. Protecting identity and managing access is therefore a pivotal first step in a cybersecurity strategy. This is because identity can act as the new control plane that connects all the organization\u2019s data dispersed across multiple applications, on-premises and in the cloud, and accessed by multiple devices and users.<\/p>\n<p>Getting identity management right is a defensive imperative and it can enable an organization to save time and resources. <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Active Directory (Azure AD)<\/a> is a powerful identity management solution that helps modernize access management and provide end-to-end visibility across the entire digital estate by connecting all applications and services to a single control plane. This is key to implementing a Zero Trust model because setting policies to define the right user experience at each access request ensures users are allowed the least privileged access necessary to perform their role. With Azure AD, organizations can also deploy a variety of <a href=\"https:\/\/www.microsoft.com\/security\/technology\/identity-access-management\/passwordless\" target=\"_blank\" rel=\"noopener noreferrer\">passwordless authentication solutions<\/a> from Windows Hello to FIDO 2.0 keys, further strengthening their access security.<\/p>\n<p>Another pillar of the Zero Trust model is the principle that policies define how devices are used in the workplace; this is important as employees increasingly use their own devices at work. Under Zero Trust, the \u201chealth\u201d of the device is a gating variable for access policies. With <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/enterprise-mobility-security\/microsoft-intune\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Intune<\/a>, mobile application management and mobile device management (MDM), part of the new <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/microsoft-endpoint-manager\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Endpoint Manager platform<\/a>, organizations can verify and make the health of the device a precondition to access data. MDM enables comprehensive remote management of mobile devices, including remote data wipe if needed.<\/p>\n<div class=\"interruption interruption-image-type\">\n<div class=\"interruption-image-container\"> <img decoding=\"async\" class=\"interruption-image\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2020\/01\/government-data-protection-earning-and-retaining-the-publics-trust-with-microsoft-365.png\"><\/div>\n<div class=\"interruption-content-wrap\">\n<h3 class=\"interruption-title\">10 tips for enabling Zero Trust security<\/h3>\n<p class=\"interruption-text\">Widespread adoption of public cloud services and the growth of a mobile workforce have rendered perimeter-based security models obsolete.<\/p>\n<p> <a class=\"interruption-link c-glyph\" href=\"https:\/\/clouddamcdnprodep.azureedge.net\/gdc\/gdclfVmGo\/original\">Read more<\/a> <\/div>\n<p><!-- .interruption-content-wrap --> <\/div>\n<p><!-- .interruption --> <\/p>\n<p>The final pillar of Zero Trust addresses the need to govern access by network to prevent lateral movement in the event of a breach. Microsoft 365 offers many services to help monitor and detect threats and protect sensitive data:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/microsoft-365\/enterprise-mobility-security\/cloud-app-security\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Cloud App Security<\/a> detects unusual behavior across Microsoft and third-party cloud apps. It can identify high risk usage and remediate automatically to limit risk to an organization.<\/li>\n<li><a href=\"https:\/\/products.office.com\/exchange\/advance-threat-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Office 365 Advanced Threat Protection (ATP)<\/a> provides continuous, real-time detonation capabilities to find and block threats, including malicious email links and attachments.<\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/microsoft-365\/windows\/microsoft-defender-atp\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Defender ATP<\/a> protects endpoints in real-time by detecting and responding to threats.<\/li>\n<li><a href=\"https:\/\/azure.microsoft.com\/features\/azure-advanced-threat-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure ATP<\/a> detects risky and suspicious user activities and generates alerts.<\/li>\n<li><a href=\"https:\/\/azure.microsoft.com\/services\/information-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Information Protection<\/a> provides controls to help secure email, documents, and sensitive data no matter where it\u2019s stored or whom it\u2019s shared with.<\/li>\n<\/ul>\n<p>What makes Microsoft unique is the native integration of all these services allowing for holistic security management across each of the Zero Trust pillars, resulting in an orchestrated response to protect agencies\u2019 digital estates end-to-end. This also serves to simplify the Zero Trust journey by eliminating the complexity of trying to make multiple different cybersecurity solutions work together that were not designed to integrate with one another.<\/p>\n<p>Microsoft services are enhanced by the powerful insights captured by the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/operations\/intelligence\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Intelligent Security Graph<\/a>\u2014the centerpiece of Microsoft\u2019s differentiation in cybersecurity\u2014which reasons over more than 8 trillion security signals from 1.2 billion end points and hundreds of millions of identity, email, and document transactions. Microsoft employs unique human and artificial intelligence (AI) to make sense of these vast and complex cybersecurity signals to connect the dots to find the signal in the noise.<\/p>\n<div class=\"interruption interruption-icon-type\">\n<div class=\"interruption-icon-container\"> <img decoding=\"async\" class=\"interruption-icon\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2020\/01\/government-data-protection-earning-and-retaining-the-publics-trust-with-microsoft-365-1.png\"><\/div>\n<div class=\"interruption-content-wrap\">\n<h3 class=\"interruption-title\">Microsoft Intelligent Security Graph<\/h3>\n<p class=\"interruption-text\">Advanced analytics link massive amounts of threat intelligence and security data to provide you unparalleled threat protection and detection.<\/p>\n<p> <a class=\"interruption-link c-glyph\" href=\"https:\/\/www.microsoft.com\/security\/operations\/intelligence\">Learn more<\/a> <\/div>\n<p><!-- .interruption-content-wrap --> <\/div>\n<p><!-- .interruption --> <\/p>\n<h3>Learn more<\/h3>\n<p>Cyberattacks are becoming more frequent, better organized, and increasingly sophisticated. Governments recognize the seriousness of these concerns and are searching for solutions to update their security posture in the new cybersecurity era with limited budgets and insufficient skills.<\/p>\n<p>Microsoft 365 provides best-in-class productivity apps while protecting identities, devices, applications, networks, and data. With Microsoft 365 security services, governments can take confident steps in the direction of a modern, Zero Trust security environment.<\/p>\n<p>Learn more about <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/zero-trust\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust<\/a> and <a href=\"https:\/\/www.microsoft.com\/microsoft-365\/government\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft 365 and government<\/a>. Also, see how <a href=\"https:\/\/www.microsoft.com\/security\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security<\/a> solutions can support your journey.<\/p>\n<nav class=\"c-link-navigation f-align-left custom-link-navigation custom-taxonomy-navigation\" aria-labelledby=\"category-header\">\n<h3 id=\"category-header\" class=\"x-screen-reader\"> Categories <\/h3>\n<\/nav>\n","protected":false},"excerpt":{"rendered":"<p>Citizen confidence in government institutions and public servants depends on trust. Citizens need to trust that the individuals and agencies representing them will act in good faith to protect their interests. Whether it\u2019s the safety of food, medications, infrastructure, information, or national security, the sustainability of the social contract between the government and its constituents [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":106942,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[337,50],"class_list":["post-106941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-public-sector","tag-recent-news"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/106941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=106941"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/106941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/106942"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=106941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=106941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=106941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}