{"id":17806,"date":"2019-03-26T11:29:12","date_gmt":"2019-03-26T15:29:12","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=17806"},"modified":"2020-06-17T13:07:31","modified_gmt":"2020-06-17T17:07:31","slug":"microsoft-365-governance-and-compliance","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/","title":{"rendered":"Roadmapping Microsoft 365 Governance and Compliance"},"content":{"rendered":"<p>Congratulations! You got your organization into the cloud with Microsoft 365. <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/plan-migration-office-365-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">You\u2019ve survived the planning sessions, seemingly endless whiteboards, change management, and finally, the migration itself.\u00a0<\/a>Even though Microsoft handles the maintenance of your environment, you still need to plan, configure, and implement proper governance to keep your organization\u2019s data and intellectual property (IP) secure and compliant for privacy and industry regulations.<\/p>\n<p>&nbsp;<\/p>\n<h3><a href=\"https:\/\/info.sherweb.com\/Office-365-Sales-Guide.html\" target=\"_blank\" rel=\"noopener noreferrer\">Learn how to sell Microsoft 365 the right way with our FREE Sales Guide<\/a><\/h3>\n<p>&nbsp;<\/p>\n<p>If you&#8217;re not sure whether you need proper governance and compliance, you need to ask yourself the following:<\/p>\n<ul>\n<li>Can you say that your Microsoft 365 is secure, compliant, trustworthy, and transparent?<\/li>\n<li>Does it take you less than an hour to compile all your Microsoft 365 compliance info, policies, and settings?<\/li>\n<li>Do you understand and know how to configure all the proper Microsoft 365 settings?<\/li>\n<li>Do you have all your necessary compliance information in one document?<\/li>\n<\/ul>\n<p>If you answered <strong><em>No<\/em><\/strong> to any of these questions, then you need to come up with a plan.<\/p>\n<p>In this article, we&#8217;ll discuss:<\/p>\n<ol>\n<li>What a governance and compliance roadmap entails.<\/li>\n<li>What Microsoft does for you and what you need to do for yourself.<\/li>\n<li>Who in your organization will need to provide you with input.<\/li>\n<li>What questions will need to be asked.<\/li>\n<li>And finally, the Microsoft 365 options that help you make sure that your organization is compliant and secure.<\/li>\n<\/ol>\n<h3><\/h3>\n<h2><strong>Governance Responsibilities<\/strong><\/h2>\n<p>Let\u2019s first look at the breakdown of responsibilities. Microsoft takes on and manages many of the controls for software-as-a-service (SaaS) offerings like Microsoft 365. By doing so, it enables you to focus on managing data protection and regulatory compliance controls that are specific to your needs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-17811\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/responsibility-share-300x143.png\" alt=\"Shared Governance Responsibility Model\" width=\"891\" height=\"425\" srcset=\"\/blog\/wp-content\/uploads\/responsibility-share-300x143.png 300w, \/blog\/wp-content\/uploads\/responsibility-share.png 764w\" sizes=\"auto, (max-width: 891px) 100vw, 891px\" \/><\/p>\n<p>Based on the graphic above, your organization needs to plan and configure the following:<\/p>\n<ul>\n<li>Access control to production environment (identity management)<\/li>\n<li>Data protection (encryption for information that travels between users)<\/li>\n<li>Personnel control<\/li>\n<\/ul>\n<h2><strong>Who Needs to Be Involved?<\/strong><\/h2>\n<p>Remember that even though you&#8217;ll be doing most of the configurations, you&#8217;re still going to need the input and expertise of many people throughout your organization. These will include IT, legal, HR, business management, and any other staff who initiate or handle audits.<\/p>\n<h2><strong>Define Your Organization\u2019s Data<\/strong><\/h2>\n<p>Now that you have a high-level view of what you need to do and who needs to be involved, you&#8217;ll need to categorize your data and roles. Using categories to classify data protection levels allows you to map them to the personnel who need access and ultimately implement other governance features.<\/p>\n<p>Microsoft recommends using these three tiers of protection for data and identities:<\/p>\n<ol>\n<li>Baseline protection\n<ul>\n<li>Internal Public\u2014data discoverable and accessible by anybody in the organization.<\/li>\n<li>Private\u2014data discoverable and accessible only by members who have permission.<\/li>\n<\/ul>\n<\/li>\n<li>Sensitive protection<\/li>\n<li>Highly confidential<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17815 aligncenter\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/sharepoint-configuration-300x126.png\" alt=\"Sharepoint Configuration\" width=\"836\" height=\"351\" srcset=\"\/blog\/wp-content\/uploads\/sharepoint-configuration-300x126.png 300w, \/blog\/wp-content\/uploads\/sharepoint-configuration.png 764w\" sizes=\"auto, (max-width: 836px) 100vw, 836px\" \/><\/p>\n<p>While the diagram above is specific to SharePoint, most of your non-email-based data will reside in a SharePoint-based Microsoft 365 app (SharePoint itself, Teams, and OneDrive). But given the interaction with Outlook email and Teams video\/audio, these tiers and labels mentioned above also apply to the overall guidance for your Microsoft 365 governance roadmap.<\/p>\n<p>Here are some questions you&#8217;ll need to address while building your roadmap:<\/p>\n<ul>\n<li>How is data created or collected?<\/li>\n<li>How is data going to be used and maintained?<\/li>\n<li>Who is going to share this data, and with whom?<\/li>\n<li>What data can be shared internally and externally?<\/li>\n<li>What is protected personally identifiable information (PII)? And where is it currently located?<\/li>\n<li>What are our data portability policies? (Employee access via non-approved devices.)<\/li>\n<li>What are our data retention policies? (Data needed for audits\/litigation.)<\/li>\n<li>What do we consider to be high-value assets, and what level of access do they have?<\/li>\n<li>Is e-discovery configured for potential legal matters?<\/li>\n<li>Have litigation hold and retention been configured?<\/li>\n<li>Is there content that needs to be marked as confidential (i.e., not approved for printing or screenshotting)?<\/li>\n<li>What data or communications need to be encrypted?<\/li>\n<li>Do we have security and compliance training for end users?<\/li>\n<li>Do we need regulated requirements like HIPAA or ISO?<\/li>\n<\/ul>\n<h2><strong>Get Your Secure Score<\/strong><\/h2>\n<p>Once you&#8217;ve gathered all this information and have it documented, it&#8217;s time to get your Secure Score in order to analyze your organization based on your regular activities and security settings in Microsoft 365.<\/p>\n<p>If you have Microsoft 365 Enterprise, Microsoft 365 Business, or Microsoft 365 Business, you can view your organization&#8217;s secure score by going to the <a href=\"https:\/\/securescore.office.com\" target=\"_blank\" rel=\"noopener noreferrer\">Office Secure Score<\/a> site or by directly visiting the <a href=\"https:\/\/protection.office.com\" target=\"_blank\" rel=\"noopener noreferrer\">Security &amp; Compliance Center<\/a>. In Secure Score, you&#8217;ll see your current score on the Secure Score widget and have access to the Secure Score dashboard. This will give you a baseline against which you can measure yourself.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17817 aligncenter\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Microsoft-secure-score-300x113.png\" alt=\"Microsoft Secure Score\" width=\"632\" height=\"238\" srcset=\"\/blog\/wp-content\/uploads\/Microsoft-secure-score-300x113.png 300w, \/blog\/wp-content\/uploads\/Microsoft-secure-score.png 520w\" sizes=\"auto, (max-width: 632px) 100vw, 632px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17818 aligncenter\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/office-security-and-compliance-300x178.png\" alt=\"Office 365 Security &amp; Compliance\" width=\"584\" height=\"346\" srcset=\"\/blog\/wp-content\/uploads\/office-security-and-compliance-300x178.png 300w, \/blog\/wp-content\/uploads\/office-security-and-compliance.png 552w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/p>\n<h2><strong>Action Your Roadmap<\/strong><\/h2>\n<p>In the Security &amp; Compliance Center, you can view and manage security, data governance, and search and investigate from the left-hand navigation. This is where you create, set up, and configure the following:<\/p>\n<ul>\n<li>Data labels and policies<\/li>\n<li>Data loss prevention (DLP)<\/li>\n<li>Data governance<\/li>\n<li>E-discovery and case management<\/li>\n<\/ul>\n<p>You also have access to the Microsoft Service Trust Portal and the Compliance Manager.<\/p>\n<p>The Service Trust Portal is a repository containing all the details about controls and processes that protect your data. It also provides both industry- and region-specific compliance information. Choose your industry and region to get specific information about how the Microsoft Cloud services keep your organization compliant.<\/p>\n<p>Industry options available include:<\/p>\n<ul>\n<li>Education<\/li>\n<li>Financial Services<\/li>\n<li>Government<\/li>\n<li>Health<\/li>\n<li>Manufacturing<\/li>\n<li>Retail<\/li>\n<\/ul>\n<p>The Compliance Manager is a risk assessment tool designed to help manage any regulatory standards you need to maintain. It also provides a single place to:<\/p>\n<ul>\n<li>View a dashboard of standards and regulations.<\/li>\n<li>Assess control implementation details and test results.<\/li>\n<li>Control implementation guidance and many other features.<\/li>\n<\/ul>\n<p>Office 365 governance, compliance, and security are all broad topics, and we certainly haven&#8217;t addressed all of the details here. But hopefully, you&#8217;ve gained sufficient understanding to be able to start your own security roadmap.<\/p>\n<p>For more information and a full plan to implement the topics we covered here, be sure to take a look at Microsoft&#8217;s guide to <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/security-roadmap\" target=\"_blank\" rel=\"noopener noreferrer\">security roadmapping in Microsoft 365<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Congratulations! You got your organization into the cloud with Office 365. You\u2019ve survived the ","protected":false},"author":177,"featured_media":17823,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[751],"tags":[],"class_list":["post-17806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Roadmapping Microsoft 365 Governance and Compliance | Sherweb<\/title>\n<meta name=\"description\" content=\"Even though Microsoft handles the maintenance, you still need implement proper security governance to keep your data and intellectual property secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Roadmapping Microsoft 365 Governance and Compliance | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Even though Microsoft handles the maintenance, you still need implement proper security governance to keep your data and intellectual property secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-26T15:29:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-17T17:07:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/blogHero-o365Roadmap.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Roadmapping Microsoft 365 Governance and Compliance\",\"datePublished\":\"2019-03-26T15:29:12+00:00\",\"dateModified\":\"2020-06-17T17:07:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/\"},\"wordCount\":1013,\"commentCount\":2,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-o365Roadmap.jpg\",\"articleSection\":[\"Microsoft 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/\",\"name\":\"Roadmapping Microsoft 365 Governance and Compliance | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-o365Roadmap.jpg\",\"datePublished\":\"2019-03-26T15:29:12+00:00\",\"dateModified\":\"2020-06-17T17:07:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Even though Microsoft handles the maintenance, you still need implement proper security governance to keep your data and intellectual property secure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-o365Roadmap.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-o365Roadmap.jpg\",\"width\":1200,\"height\":460,\"caption\":\"Office 365 Governance and Compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/microsoft-365-governance-and-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Ecosystem\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft 365\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/office-365\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Roadmapping Microsoft 365 Governance and Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Roadmapping Microsoft 365 Governance and Compliance | Sherweb","description":"Even though Microsoft handles the maintenance, you still need implement proper security governance to keep your data and intellectual property secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Roadmapping Microsoft 365 Governance and Compliance | Sherweb","og_description":"Even though Microsoft handles the maintenance, you still need implement proper security governance to keep your data and intellectual property secure.","og_url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2019-03-26T15:29:12+00:00","article_modified_time":"2020-06-17T17:07:31+00:00","og_image":[{"width":1200,"height":460,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/blogHero-o365Roadmap.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Roadmapping Microsoft 365 Governance and Compliance","datePublished":"2019-03-26T15:29:12+00:00","dateModified":"2020-06-17T17:07:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/"},"wordCount":1013,"commentCount":2,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/blogHero-o365Roadmap.jpg","articleSection":["Microsoft 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/","url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/","name":"Roadmapping Microsoft 365 Governance and Compliance | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/blogHero-o365Roadmap.jpg","datePublished":"2019-03-26T15:29:12+00:00","dateModified":"2020-06-17T17:07:31+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Even though Microsoft handles the maintenance, you still need implement proper security governance to keep your data and intellectual property secure.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#primaryimage","url":"\/blog\/wp-content\/uploads\/blogHero-o365Roadmap.jpg","contentUrl":"\/blog\/wp-content\/uploads\/blogHero-o365Roadmap.jpg","width":1200,"height":460,"caption":"Office 365 Governance and Compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/microsoft-365-governance-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Ecosystem","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/"},{"@type":"ListItem","position":3,"name":"Microsoft 365","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/office-365\/"},{"@type":"ListItem","position":4,"name":"Roadmapping Microsoft 365 Governance and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":[],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/17806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=17806"}],"version-history":[{"count":13,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/17806\/revisions"}],"predecessor-version":[{"id":21348,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/17806\/revisions\/21348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/17823"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=17806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=17806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=17806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}