Compliance Flashcards

1
Q

Describe the Service Trust Portal

A

https://servicetrust.microsoft.com/

Provides resources (Trust docs, whitepapers, audit reports) on msft security, privacy, compliance practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Microsoft privacy principles.

A
  • Control (you have control of your data)
  • Transparency (about collection of data)
  • Security (protect your data)
  • Strong legal protections
  • No content-based targeting
  • Benefits to you (from any data collected)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Microsoft 365 Compliance Center.

A

A dedicated workspace for your compliance admins. Contains tools to track and manage compliance (legal, regulatory, and organizational) requirements.

Available to Global Admin, Compliance Admin, and Compliance Data Admin roles.

The portal has Compliance Manager, Data Classification overview, Solutions, and Alerts.

(NB: now Purview)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Compliance Manager and its key elements.

A

An e2e solution in Microsoft 365 Compliance Center for compliance admins to manage and track compliance activities.

  • Compliance Score (aggregate measure of your overall compliance posture)
  • Assessments (groupings of requirements using custom or prebuilt templates)
  • Improvement Actions (guidance and support on actions to improve compliance posture.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe data classification capabilities of M365

A
  • Sensitive Info types (based on regex patterns or exact matches)
  • Trainable classifiers (for business specific documents. Pretrained or custom.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the benefits of Content Explorer and Activity Explorer

A

Both are tabs in the Data Classification pane of the Compliance portal.

Content Explorer = for reading the contents of scanned files.

Activity Explorer = for seeing what has been done with labelled content. (e.g. file copied to network share, label changed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe sensitivity labels and policies.

A

Document labels that are customizable, clear text and persistent.

They can be configured to enable encryption, mark, protect and classify documents, emails, etc.

Labels are published to users/groups through policies. Policies can also enforce settings e.g. mandatory labels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Data Loss Prevention (DLP)

A

DLP policies exist to protect sensitive information and prevent inadvertent disclosure.

DLP policies are configured by Conditions (IF), Actions (THEN), Locations (SCOPE).

Endpoint DLP for Devices, and DLP for Teams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Retention Policies and Retention Labels.

A

Policies = apply to a location, items in the location inherit the policy setting, but the policy doesn’t travel with the document if it is moved.

Labels = apply to the item, travels with the item, can by used to override a policy on a location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Records Management

A

Enables labelling content as a ‘record’. (when set up by admin, can be either manual or auto.)

Records have restrictions to block certain activities, activities are logged, proof of disposition is kept at the end of the retention period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe insider risk management.

A

Solution to detect, investigate, and act on risky and malicious insider activities.

Workflow = Policy (conditions) -> Alerts -> Triage (cases) -> Investigate (integrated case dashboard) -> Action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe communication compliance

A

Detect, capture, and remediate inappropriate messages in e.g. Teams, Exchange, or 3rd party comms apps.

Workflow (with cts Monitoring)= Configure policies -> Investigate -> Remediate

e.g. enforce corporate comms policies (offensive language), Risk Management (e.g. earnings disclosure), or regulatory compliance (insider trading etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Information Barriers.

A

Restrict comms between groups to protect info or avoid conflicts of interest.

MS Teams information barriers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Azure Policy

A
  • Definitions (JSON) for resources applied to a scope (resource, RG, Sub, MG)
  • Evaluates (on change, or every 24hrs) if resources in scope are compliant with definition.
  • Responses to evaluation depend on user specified effects (deny, alter, log, etc.)

Used in conjunction with RBAC (for users), Policies (for resources) can help achieve full scope control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the use of Azure Blueprints.

A

Declarative way to orchestrate the deployment of resources and other artifacts.

Includes: ARM templates, Role Assignments, Policy Assignments, Resource Groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe Microsoft Purview

A

Unified data governance service.

  • Data Map: scans data, captures metadata, detects and classifies sensitive data
  • Data Catalog: enables search for data
  • Data Estate Insights: bird’s eye view of what has been scanned and where is sensitive data.