Customers often mention security as a concern when starting Office 365 discussions. Common worries include questions about where the data lives, who can access it, leaks, compromises, administrative controls, upgrades, etc. Many have conducted some preliminary research, and still aren’t totally convinced that their data, services, and processes can be secured in Office 365. One thing that doesn’t often come up in researching the overall security stack that Office 365 offers is “Red vs Blue”.
So, what is Red vs Blue? Microsoft has a Red Team and a Blue Team. The Red Team consists of both Microsoft and non-Microsoft members and is dedicated to trying to hack Office 365 services and endpoints. While the Blue Team is trying to identify and mitigate the exploits used. This is not a once a year practice; these are common, ongoing activities. This video offers an overview of Microsoft Office 365 Security and Red Vs Blue.
A long time ago
A long time ago, I echoed the same concerns about Office 365 security, someone else managing my servers, upgrades, albeit these concerns did not last long. Once I removed myself and my organization from the thought process, I could analyze and evaluate my concerns objectively and realized that this was not another chapter of our technical evolution but a paradigm shift in our industry.
Microsoft takes security seriously, they provide the following built-in security features as part of Office 365 infrastructure security.
Office 365 does not only offer world-class infrastructure security. It also empowers you to customize Office 365 services. It allows you to adapt unique industry and/or country requirements such as HIPPA, FedRAMP, FISMA, ISO 270001, ISO 27018, GLBA, HITRUST, GDPR, etc., or any unique requirements necessary for an internal process or legal accountability. You can create policies using Data Loss Prevention (DLP) and ensure you can employ E-Discovery across Exchange Online, SharePoint Online and OneDrive for Business, as well as features such as legal hold and the ability to apply retention polices to data and email. Services like Intune allow you to manage mobile devices and with Microsoft’s Operations Management Suite (OMS) you can manage on-premises infrastructure in addition to any Azure infrastructure.
Microsoft has also introduced the Compliance Manager which provides a single pane of glass. This allows the management of compliance and helps assign issues to the responsible parties. (I have two blog post that expand on these: Compliance Manager and DLP.) Finally, you can utilize the Office 365 Secure Score to help establish best practices while recommending the necessary changes to raise the secure score. You can also compare your score with the average tenant score. Microsoft is providing all the necessary means to ensure your data and services are protected.
Breaches
The average discovery time of a breach for organizations in the US between January 2016 and June 2017 was 13.21 days and a discovery to notification time of 29.1 days. These numbers are according to Business Insider and I find them very optimistic. For example, Michaels Stores was breached in 2014 and the time to discovery there was eight months, Home Depot which was breached also in 2014, they had a time to discovery of 5 months and Sony, 2014, time to discovery 1 year! Did we improve our breach discovery time that much in two years? Perhaps, although I do not have enough data to make that assumption.
Either way, these timetables are not even close to the General Data Protection Regulation (GDPR) standards which require a notification time of 72 hours. To be fair, some of the breaches cited do not require enforcement of GDPR. How long before the U.S. adopts a similar posture to GDPR? What would a breach time to discovery be in your organization? Do you have the necessary auditing, logging and analytics in place? Wouldn’t you like an ally like Microsoft? Microsoft offers and utilizes cutting edge tools like Artificial Intelligence and Data Science in its security platforms and services.
Show me the money
If you are not compelled enough the trust of Microsoft and Office 365 yet… Here’s a fun fact. Microsoft spends $1 billion a year on security. Although that figure is impressive, it’s important to note that those are 2015 numbers! Not many companies can afford to spend large amounts of capital on security. Keep in mind that some mid-size businesses do not have a security team or scheduled penetration testing. That most midsize companies have pushed security compliance to the infrastructure team or as an add-on task for a system administrator. Or worst yet some companies do not have proper security processes and procedures.
Now, I am not trying to claim that Microsoft can never be compromised. What I am trying to get across is that our organizations may be more vulnerable to attack than Microsoft. If, along with Microsoft infrastructure security, you apply the tools that Office 365, offers your Office 365 data will be safe (or at least safer than on premises). If utilizing OMS, your servers can be more secure, and you will have insights that may have not existed previously.
Securing your business is not a small feat. It requires dedication of resources in the way training for staff, clear goals and a path to achieve these goals. It will be daunting at first but the move to Office 365 will and can be one that pays great dividends.
If you are feeling overwhelmed by the complexity of Office 365 migration, check out our . We’d love to help you out.
Sources
://www.businessinsider.com/microsoft-security-from-worst-to-best-2015-11
https://iapp.org/news/a/from-incident-to-discovery-to-breach-notification-average-timeframes/
https://www.infocyte.com/blog/2016/7/26/how-many-days-does-it-take-to-discover-a-breach-the-answer-may-shock-you
Related Content
- Tags:
- office 365
- security
by Jaime Perez

Jaime Perez
Cloud Consultant
With two decades in the industry, Jaime Perez is a consultant on our Hybrid IT & Cloud Services Team, focused on Office 365, Azure Site Recovery and Azure projects. An avid Exchange, Teams, Power BI and Data Science enthusiast, Jaime also leads the Philadelphia Cloud Technologies User Group. JP is an Office 365 Solutions Associate as well as a Microsoft-certified solutions expert in productivity/messaging, Cloud Platform, infrastructure, and data science.
Let’s get the conversation started
Reach out now to begin your digital transformation
+ 16,659
ZOOM MEETINGS
+ 9,789
HAPPY CLIENTS
+ 5,075
FINISHED PROJECTS
+ 133,967,432
LINES OF CODE
© 2000 - 2021 Anexinet Corp., All rights reserved | Privacy Policy | Cookie Policy
This website uses cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL cookies.
Manage consent
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.