Professional Documents
Culture Documents
A Requirements Checklist
Requirements for Security is an important consideration when it comes to rolling out Office 365. Safely
enabling Office 365 requires a comprehensive approach that addresses several
safely enabling key areas. This guide was developed to assist you with assembling the security
requirements for your Office 365 project.
Office 365.
Control
n Forensics 4 e-Discover and classify content (e.g., PHI, PCI, PII, source code, and custom
RegEx) for files that are already uploaded to O365
n Risk Management 5 Filter and search files by exposure, file size, file type, date created, date
edited
n All Apps and Data 6 Ability to filter files in O365 that external users (search by individual name)
may have access to
8 Quarantine files that already exist in Office 365 (tombstone original file)
1
Noise-cancelling cloud DLP
On-premises DLP technologies have been around for a long time. Cloud DLP is relatively new, but
with many technologies out there, how do you determine what is best for Office 365? The first set of
requirements should be focused on ensuring that the DLP technology includes capabilities that result
in fewer false positives. You also want a DLP engine that is robust, but also not overly complex where
everything needs to be customized. Here are the key requirements that will help ensure you have a solid
solution for DLP.
11 Enterprise class DLP for O365 (minimum 3,000+ data identifiers, 500+ file types)
13 Ability to perform secondary DLP analysis for content leveraging on-premises DLP solution via
REST API
21 Visibility and real-time policy control for Office 365 activities (create, delete, download, edit,
send, upload, view, view all, share)
22 Policy action to change access and sharing permissions for files in Office 365 (based on identity,
DLP, activity triggers)
2
Visibility and real-time policy control (continued)
29 Policy enforcement - geolocation of both user and app
32 Policy enforcement - Constraint profiles (from/to user in cloud app, e.g., “don’t share if
recipient is outside of the corporate domain”)
3
Govern all apps and data
Now that you have tackled Office 365 data governance, data loss, and real-time policy and access control,
the next step is to ensure you extend your secure perimeter to cover the Office 365 ecosystem apps as
well as any cloud apps that may interact with Office 365. There are a number of requirements that will
cover you in this key area.
50 Assess the risk of the discovered apps based on an enterprise-readiness score consisting
of multiple vectors including product capabilities, legal, financial viability, vulnerabilities,
auditing & certifications and SLAs
51 Extend all Office 365 policy capabilities to ecosystem and surrounding cloud apps
55 Policy enforcement - Application groups (e.g., single policy across all Cloud Storage apps)
About Netskope
Netskope™ is the leader in safe cloud enablement. Netskope gives IT the ability to find, understand,
and secure cloud apps. Only Netskope empowers organizations to direct usage, protect sensitive data,
and ensure compliance in real-time, on any device, for any cloud app so the business can move fast,
with confidence.
©2015 Netskope, Inc. All rights reserved. Netskope is a registered trademark and Netskope Active, Netskope Discovery, Cloud Confidence Index, and
SkopeSights are trademarks of Netskope, Inc. All other trademarks are trademarks of their respective owners. 07/15 WP-79-1