570 likes | 739 Views
Living in a Hybrid World: Compliance and Governance Meet Cloud . Aashish Warty Manager – Technical Solutions Professionals | North America a ashish.warty@avepoint.com @ hashpoint. Agenda. Governance Compliance, Risk, and Privacy Deployment Opportunities SharePoint as a Service.
E N D
Living in a Hybrid World: Compliance and Governance Meet Cloud Aashish Warty Manager – Technical Solutions Professionals | North America aashish.warty@avepoint.com @hashpoint
Agenda Governance Compliance, Risk, and Privacy Deployment Opportunities SharePoint as a Service
Importance of Information Governance Gartner Research: 2016 Prediction in regulated industries will lose their jobs for failing to implement discipline of information governance 20% CIOs
What is SharePoint Governance? “Governance is the set of policies, roles,responsibilities, and processes that guides, directs, and controls how an organization’s business divisions and I.T. teams cooperateto achieve business goals.” Microsoft – http://bit.ly/nmNSbj
IT Governance Corporate Governance IT Governance System Governance SharePoint SAP Lotus Notes
How Much Governance is Needed? Portal Community Sites Visibility Project/Team Sites Personal/My Sites Governance
Striking the Balance Usage Control BusinessNeeds TechnicalNeeds
Requirements for IT Governance Tech People Governance Process Policy
People Architects Workload Owners Finance IT Operations Departmental Owners Legal BusinessOwners IT BackOffice Administrators Functional Owners HR Corp. Communications Executive Sponsorship
Typical Policy Categories Infrastructure Operations Information Architecture Information Management Project Management Leadership Customization Adoption Continuous Improvement
Process of Policy Enforcement Manual Semi-Automated Automated • Encouragement • Resource intensive • Human error • PowerShell scripts • 3rd Party Products • Custom apps • 3rd Party Products
Technology: Build vs. Buy Resources Options Time Required SharePoint List + SharePoint Designer SharePoint Administrator 2 Weeks InfoPath SharePoint Designer 8 Weeks InfoPath Developer Custom APIs .Net Coder 3 – 6 Months .NET Developers Multiply for Every Service Request
Typical Policy Categories Infrastructure Operations Information Architecture Information Management Project Management Leadership Customization Adoption Continuous Improvement
What is Risk? “Risk is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). The notion implies that a choice having an influenceon the outcome exists (or existed). Potential losses themselves may also be called "risks". Almost any human endeavor carries some risk, but some are much more risky than others.” - Wikipedia
What is Compliance? Compliance means conforming with stated requirements. Achieved through management processes which identify the applicable requirements Assess the state of compliance Assess the risks and potential costs of non-compliance Prioritize, fund and initiate any corrective actions deemed necessary
What does Compliance mean to us? • Making information available to the people who should have it • Protecting information from the people who should not At the very highest level:
The Challenge-Legions of compliance obligations and risks to information Intellectual property and trade secrets Sensitive customer information and data Collaborations on strategy Personal information Legal and compliance issues Information getting in the wrong hands The onslaught of risk and compliance issues related to Information sharing includes:
Supported Compliance Standards Accessibility Compliance Section 508 and 508 Refresh Web Content Accessibility Guidelines (WCAG) 1.0 Web Content Accessibility Guidelines (WCAG) 2.0 Canadian Government common Look and Feel (CLF) Privacy Compliance COPPA Gramm-Leach Bliley Act (GLBA) California SB1386 and AB 1950 European Union Safe Harbor US Section 208 Privacy Act of the USA UK Data Protection Act Health Insurance Portability and Accountability Act (HIPAA) Canadian Personal Information Protection and Electronic Document Act (PIPEDA) European Union Data Protection Directive 1995/46 European Union Privacy and Electronic Communications Directive 2002/58 Records Management Sarbanes Oxley (SOXs) Operational Security (OPSEC) Export Control Requirements Brand and Site monitoring Bad or Broken Links Metadata Policy Improper words or phrases Identity mismanagement Marketing Standards • Metadata Policy • Risk Level Tagging • Dublin Core Metadata Initiative • Z39.50 Tagging • Custom Vocabularies • Pointer Records
These laws have common elements Information must be accessible and available to the people who should have access to it and protected from the people who should not Further this information may need to be stored, archived and preserved for some period of time
How likely do you think the following privacy breach risks are of occurring? 80% 70% 60% 50% 40% 30% 20% 10% 0% 61% 41% 30% 13% 8% Accidental employee breach Accidental 3rd party breach Intentional Employee breach Intentional 3rd party breach Hackers gaining access Source: HCCA;, “Data Privacy: How Big a Compliance Challenge?”; January 2011
Some specific risks to consider… Confidentiality leaks —Compromised privacy Loss of data integrity No access to or availability of data
Questions to Ask: Designing a Compliance Policy How do we protect the most important data in the enterprise? How do we reduce the risk of exposure? How do we quickly find information? How do we prepare for litigation and eDiscovery? How do we ensure policy consistency? How do we scale the compliance solution to the enterprise? How do we control costs? What is our Cloud Strategy? What is our current compliance status or our “as is”
SharePoint Challenges Deployment can be random Capabilities are understated or unknown Broadly adopted often with little oversight for compliance Success vs. Failure SharePoint Governance and Compliance are vital for Success
Building a Compliance Policy Transparency/Collaboration Data Protection/Management
Creating and maintaining a compliant SharePoint environment is a continuous process People Policy and Process Technology Training Governance and Oversight Technical Enforcement Balancing transparency and collaboration with data protection and management
Compliance & Technical Enforcement Prevent Respond & Resolve Detect Track
Make Control part of the Process 4 2 3 5 6 7 1 Analyze the Current Environment Identify Non-Compliance Prioritize the Business Needs Diagram New Security Boundaries Architect in GovSec Undertake Migration Maintain Control
Service layers Applications Applications Applications Data Data Data Runtime Runtime Runtime Middleware Middleware Middleware O/S O/S O/S Virtualization Virtualization Virtualization Servers Servers Servers Storage Storage Storage Applications Applications Applications SaaS IaaS PaaS
Why? Rapid onboarding “Instant” optimization Effortless move to new versions Strong SLAs Scaling/performance Cost, Move from CapEx to OpEx Cross-organization collaboration Ease storage burden Hype
Why not? Integration with internal systems Ability to customize Test/staging environment Data sovereignty Offline/low bandwidth accessibility Security and availability concerns persist
Management controls and scopes SharePoint Service Isolation Service Application Configuration and Data Blocked File Types SSL Farm Zone Web Application Service Application Web Application Data Storage SLAs Content DB Quotas Ownership(Full Control) Site collection Features Security Permissions Top-level site Sub site List/Library Sub site Security Permissions [Folder] Item / Document
Logical Architecture Farm TEAMS SOCIAL INTRANET Content DB Content DB Content DB Site collection Site collection Site collection HR Marketing Intranet Home Finance Marketing HR
Cloud architecture O365 Farm EXTRANET TEAMS SOCIAL INTRANET Content DB Content DB Content DB Site collection Site collection Site collection Marketing HR Intranet Home Finance Marketing HR
Shared Services Farm Architecture O365 ContentFarm EXTRANET TEAMS SOCIAL INTRANET Content DB Content DB Content DB Site collection Site collection Site collection HR Marketing Intranet Home Finance Marketing HR SEARCH PROFILE METADATA BCS ServiceFarm
Business Critical Architecture O365 Biz Crit Farm ContentFarm EXTRANET TEAMS* TEAMS SOCIAL INTRANET Content DB Content DB Content DB Content DB Site collection Site collection Site collection Site collection HR Finance Marketing Intranet Home Finance Marketing HR SEARCH PROFILE METADATA BCS ServiceFarm
Line of business applications architecture O365 Biz Crit Farm LOBFarm ContentFarm EXTRANET TEAMS* <LOB> TEAMS SOCIAL INTRANET Content DB Content DB Content DB Content DB Site collection Site collection Site collection Site collection HR Marketing Finance Intranet Home Finance Marketing HR SEARCH PROFILE METADATA BCS ServiceFarm
Applications farm architecture O365 Biz Crit Farm AppsFarm LOBFarm On-PremFarm EXTRANET TEAMS* APPS <LOB> TEAMS SOCIAL INTRANET Content DB Content DB Content DB Content DB Site collection Site collection Site collection Site collection Finance HR Marketing Intranet Home Finance Marketing HR SEARCH PROFILE METADATA BCS ServiceFarm
Don’t panic – plan with end in mind… On-PremiseFarm TEAMS* EXTRANET TEAMS SOCIAL INTRANET APPS <LOB> Content DB Content DB Content DB Content DB Site collection Site collection Site collection Site collection HR Marketing Finance Intranet Home Finance Marketing HR SEARCH PROFILE METADATA BCS ServiceFarm
Cloud Readiness Assessment Assess Existing Sites and Content Report on and Classify Content Design Compliant Information Architecture Determine Cloud Migration Approach
Service User Request Approval Stages Approval Process Start Execute Request
Secure vs. Non-Secure content Regulated Users Non-Regulated Users