Encryption and key management overview - Microsoft Service Assurance (2024)

  • Article

What role does encryption play in protecting customer content?

Most Microsoft business cloud services are multi-tenant, meaning that customer content may be stored on the same physical hardware as other customers. To protect the confidentiality of customer content, Microsoft online services encrypt all data at rest and in transit with some of the strongest and most secure encryption protocols available.

Encryption isn't a substitute for strong access controls. Microsoft's access control policy of Zero Standing Access (ZSA) protects customer content from unauthorized access by Microsoft employees. Encryption complements access control by protecting the confidentiality of customer content wherever it's stored and by preventing content from being read while in transit between Microsoft online services systems or between Microsoft online services and the customer.

How do Microsoft online services encrypt data-at-rest?

All customer content in Microsoft online services is protected by one or more forms of encryption. Microsoft servers use BitLocker to encrypt the disk drives containing customer content at the volume-level. The encryption provided by BitLocker protects customer content if there are lapses in other processes or controls (for example, access control or recycling of hardware) that could lead to unauthorized physical access to disks containing customer content.

In addition to volume-level encryption, Microsoft online services use encryption at the application layer to encrypt customer content. Service encryption provides rights protection and management features on top of strong encryption protection. It also allows for separation between Windows operating systems and the customer data stored or processed by those operating systems.

How do Microsoft online services encrypt data-in-transit?

Microsoft online services use strong transport protocols, such as Transport Layer Security (TLS), to prevent unauthorized parties from eavesdropping on customer data while it moves over a network. Examples of data in transit include mail messages that are in the process of being delivered, conversations taking place in an online meeting, or files being replicated between datacenters.

For Microsoft online services, data is considered 'in transit' whenever a user's device is communicating with a Microsoft server, or a Microsoft server is communicating with another server.

How do Microsoft online services manage the keys used for encryption?

Strong encryption is only as secure as the keys used to encrypt data. Microsoft uses its own security certificates and associated keys to encrypt TLS connections for data-in-transit. For data-at-rest, BitLocker-protected volumes are encrypted with a full volume encryption key, which is encrypted with a volume master key, which in turn is bound to the Trusted Platform Module (TPM) in the server. BitLocker uses FIPS 140-2 compliant algorithms to ensure that encryption keys are never stored or sent over the wire in the clear.

Service encryption provides another layer of encryption for customer data-at-rest giving customers two options for encryption key management: Microsoft-managed keys or Customer Key. When using Microsoft-managed keys, Microsoft online services automatically generate and securely store the root keys used for service encryption.

Customers with requirements to control their own root encryption keys can use service encryption with Microsoft Purview Customer Key. Using Customer Key, customers can generate their own cryptographic keys using either an on-premises Hardware Service Module (HSM) or Azure Key Vault (AKV). Customer root keys are stored in AKV, where they can be used as the root of one of the keychains that encrypts customer mailbox data or files. Customer root keys can only be accessed indirectly by Microsoft online service code for data encryption and can't be accessed directly by Microsoft employees.

Microsoft's online services are regularly audited for compliance with external regulations and certifications. Refer to the following table for validation of controls related to encryption and key management.

Azure and Dynamics 365

External auditsSectionLatest report date
ISO 27001

Statement of Applicability
Certificate

A.10.1: Cryptographic controls
A.18.1.5: Cryptographic controls
April 8, 2024
ISO 27017

Statement of Applicability
Certificate

A.10.1: Cryptographic controls
A.18.1.5: Cryptographic controls
April 8, 2024
ISO 27018

Statement of Applicability
Certificate

A.11.6: Encryption of PII transmitted over public data transmission networksApril 8, 2024
SOC 1
SOC 2
SOC 3
DS-1: Secure storage of cryptographic certificates and keys
DS-2: Customer data is encrypted in-transit
DS-3: Internal communication of Azure components encrypted in-transit
DS-4: Cryptographic controls and procedures
May 20, 2024

Microsoft 365

External auditsSectionLatest report date
FedRAMP (Office 365)SC-8: Transmission confidentiality and integrity
SC-13: Use of cryptography
SC-28: Protection of information at rest
July 31, 2023
ISO 27001/27017

Statement of Applicability
Certification (27001)
Certification (27017)

A.10.1: Cryptographic controls
A.18.1.5: Cryptographic controls
March 2022
ISO 27018

Statement of Applicability
Certificate

A.11.6: Encryption of PII transmitted over public data transmission networksMarch 2022
SOC 2CA-44: Data-in-transit encryption
CA-54: Data-at-rest encryption
CA-62: Customer Key mailbox encryption
CA-63: Customer Key data deletion
CA-64: Customer Key
January 23, 2024
SOC 3CUEC-16: Customer encryption keys
CUEC-17: Customer Key vault
CUEC-18: Customer Key rotation
January 23, 2024
Encryption and key management overview - Microsoft Service Assurance (2024)

FAQs

What is encryption and key management? ›

Encryption key management is the administration of policies and procedures for protecting, storing, organizing, and distributing encryption keys. Encryption keys (also called cryptographic keys) are the strings of bits generated to encode and decode data and voice transmissions.

What is the Microsoft tool for encryption? ›

BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices.

Which three encryption options could be used when creating a new key in key management? ›

Encryption: Symmetric encryption keys, Asymmetric encryption keys (public and private). Authentication of End Devices: Pre-shared symmetric keys, Trusted certificates, Trust Anchors. Data Origin Authentication: HMAC.

What do you mean by the key management and the key security during user authentication? ›

Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.

What are the 3 types of encryption keys? ›

There are different types of encryption techniques, but the following three are the most common and widely used: Symmetric Encryption, Asymmetric Encryption, and Hashing.

What are the two main types of keys in encryption? ›

One of the keys is typically known as the private key and the other is known as the public key. The private key is kept secret by the owner and the public key is either shared amongst authorised recipients or made available to the public at large.

How does Microsoft encryption work? ›

Encrypting an email message in Outlook means it's converted from readable plain text into scrambled cipher text. Only the recipient who has the private key that matches the public key used to encrypt the message can decipher the message for reading.

How secure is Microsoft Office encryption? ›

With Microsoft 365, your data is encrypted at rest and in transit, using several strong encryption protocols, and technologies that include Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPSec), and Advanced Encryption Standard (AES).

How do I turn off Microsoft encryption? ›

  1. Type and search [Device encryption settings] in the Windows search bar①, then click [Open]②.
  2. On the Device encryption field, set the option to [Off]③.
  3. Confirm whether you need to turn off device encryption, select [Turn off] to disable the device encryption function④.
Oct 24, 2023

What is an example of key encryption? ›

Keys in early forms of encryption

"Ifmmp" looks like a nonsensical string of letters, but if someone knows the key, they can substitute the proper letters and decrypt the message as "Hello." For this example, the key is (letter) - 1, moving each letter down one spot in the alphabet to arrive at the real letter.

Where should an encryption key be stored? ›

Where possible, encryption keys should be stored in a separate location from encrypted data. For example, if the data is stored in a database, the keys should be stored in the filesystem.

What are the two keys used in encryption? ›

What is public key cryptography? Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

What are some ways keys could be compromised? ›

Top 7 Ways Your Private Keys Get Hacked
  • Phishing Attacks. Phishing attacks are by far the most common way that blockchain private keys are compromised. ...
  • Malware Infections. ...
  • Weak Passwords. ...
  • Insecure Key Storage. ...
  • Weak Key Generation. ...
  • Social Engineering. ...
  • Cloud Storage Breaches.
Jun 25, 2024

Who should hold encryption keys? ›

"The data owner himself, herself or itself should always handle encryption keys."

What are the risks of encryption keys? ›

For example, if encryption keys are stored insecurely or are easily guessable, attackers can gain unauthorized access to the keys and decrypt the encrypted data. This can result in data breaches and privacy violations.

What is the difference between key and encryption? ›

In cryptography, a key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

Why is encryption and key management important in cloud? ›

(Encryption) Key management is important when dealing with security and privacy protection of the data contained, in order to prevent data loss/breach/contamination and comply with the relevant regulatory requirements.

What are the roles and responsibilities of cryptographic encryption and key management? ›

Key Management is the process of putting certain standards in place to ensure the security of cryptographic keys in an organization. Key Management deal with the creation, exchange, storage, deletion, and refreshing of keys. They also deal with the members access of the keys.

What is the meaning of encrypted key? ›

Decryption is like the secret code to unraveling a locked box. It's the process of converting encrypted data back into its original, understandable form.

Top Articles
Another billionaire—a real estate mogul and astronaut—is planning a submarine dive to Titanic despite OceanGate implosion that killed 5 last year
Micro-Investing Platform
Nullreferenceexception 7 Days To Die
Umbc Baseball Camp
Asist Liberty
Inducement Small Bribe
Voordelige mode in topkwaliteit shoppen
Shorthand: The Write Way to Speed Up Communication
How Much Is 10000 Nickels
<i>1883</i>'s Isabel May Opens Up About the <i>Yellowstone</i> Prequel
Nordstrom Rack Glendale Photos
Kris Carolla Obituary
Autozone Locations Near Me
Max 80 Orl
Phillies Espn Schedule
Craigslist Heavy Equipment Knoxville Tennessee
O'reilly's Auto Parts Closest To My Location
Animal Eye Clinic Huntersville Nc
104 Whiley Road Lancaster Ohio
Love In The Air Ep 9 Eng Sub Dailymotion
Booknet.com Contract Marriage 2
China’s UberEats - Meituan Dianping, Abandons Bike Sharing And Ride Hailing - Digital Crew
Zack Fairhurst Snapchat
Morristown Daily Record Obituary
Universal Stone Llc - Slab Warehouse & Fabrication
Ceramic tiles vs vitrified tiles: Which one should you choose? - Building And Interiors
Himekishi Ga Classmate Raw
Does Royal Honey Work For Erectile Dysfunction - SCOBES-AR
Hannah Jewell
Uky Linkblue Login
Craigslist Maryland Baltimore
Craigslist Free Stuff San Gabriel Valley
Pokemmo Level Caps
Smartfind Express Henrico
Blackstone Launchpad Ucf
Navigating change - the workplace of tomorrow - key takeaways
Helloid Worthington Login
1-800-308-1977
Bimar Produkte Test & Vergleich 09/2024 » GUT bis SEHR GUT
Top-ranked Wisconsin beats Marquette in front of record volleyball crowd at Fiserv Forum. What we learned.
Oxford Alabama Craigslist
Kerry Cassidy Portal
968 woorden beginnen met kruis
Guy Ritchie's The Covenant Showtimes Near Grand Theatres - Bismarck
Juiced Banned Ad
Best Haircut Shop Near Me
Craigslist Marshfield Mo
Greg Steube Height
Mkvcinemas Movies Free Download
라이키 유출
Cool Math Games Bucketball
Les BABAS EXOTIQUES façon Amaury Guichon
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5995

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.