Thursday, December 13, 2007

RMS (Rights Management Services )

"Microsoft RMS" was recited when we studied in Security class and I found some in formation about RMS.

One of the touchstones of trustworthy computing is the availability of technology that can reliably protect content and help keep digital information private. RMS represents a milestone in this regard, offering a new kind of protection for vital information. Microsoft will continue to invest in this important field and work to develop simple ways to help protect sensitive information. Microsoft envisions strong business-to-business and business-to-consumer scenarios that will provide better privacy, security and confidentiality for all customers.

Here is about RMS overview
---------------------------------------------------------------

Overview
Rights Management Services includes the server technology that handles certificates and licensing, a desktop update, and the software development kit (SDK). Combining Windows Server 2003 features, developer tools, and industry security technologies—including encryption, certificates, and authentication—RMS helps organizations create reliable information protection solutions.

Safeguard sensitive information. Applications such as word processors, e-mail clients, and line-of-business applications can be RMS-enabled to help safeguard sensitive information. Information workers can choose from a variety of usage rights to define exactly how the recipient can use the information and for how long. Users can define who can open, modify, print, forward and/or take other actions with the information. Organizations can create custom usage policy templates such as "confidential - read only" that can be applied directly to the information.

Persistent protection. RMS augments existing perimeter-based security solutions, such as firewalls and access control lists (ACLs), for better information protection by locking the usage rights within the document itself, controlling how information is used even after it has been opened by intended recipients.

Flexible and customizable technology. Independent software vendors (ISVs) and developers can RMS-enable any application or enable other servers, such as content management systems or portal servers running on Windows or other platforms, to work with RMS to help safeguard sensitive information. With RMS SP1, the range of possible RMS solutions is extended to include server applications—enabling ISVs to integrate information protection into server-based solutions such as document and records management, e-mail gateways and archival systems, automated workflows, and content inspection.
Benefit Scenarios

A company manager has access to the online sales system. She pulls up sales information about last quarter's unit sales using her browser. Because the information is sensitive, specific restrictions have been applied to the report: She cannot print, copy, or paste the data. RMS helps the company protect its sensitive quarterly sales data from accidental or deliberate leaks before its official earnings announcement.

A CEO needs to send an e-mail message that contains confidential information about an upcoming reorganization to his executive staff. In Microsoft Office Outlook 2003, he selects a template to specify that recipients can only read the e-mail message, and that they cannot copy, paste, edit, or forward the information. The recipients receive the e-mail message in Outlook 2003, with the usage policies automatically applied to the message. The CEO has a new level of confidence that this sensitive information will be viewed only by his executive staff.

No comments: