Encryption in the Microsoft cloud (2024)

  • Article

Customer data within Microsoft's enterprise cloud services is protected by several technologies and processes, including various forms of encryption. (Customer data in this document includes Exchange Online mailbox content, e-mail body, calendar entries, and the content of e-mail attachments, and if applicable, Skype for Business content, SharePoint site content, and the files stored within sites, and files uploaded to OneDrive or Skype for Business.) Microsoft uses multiple encryption methods, protocols, and ciphers across its products and services. Encryption helps provide a secure path for customer data to travel through our cloud services, and helps protect the confidentiality of customer data stored within our cloud services. Microsoft uses some of the strongest, most secure encryption protocols available to provide barriers against unauthorized access to customer data. Proper key management is also an essential element of encryption best practices, and Microsoft works to ensure that all Microsoft-managed encryption keys are properly secured.

Customer data stored within Microsoft's enterprise cloud services is protected using one or more forms of encryption. (Multiple non-Microsoft auditors independently validate our crypto policy and its enforcement. Reports of those audits are available on the Service Trust Portal.)

Microsoft provides service-side technologies that encrypt customer data at rest and in transit. For example, for customer data at rest, Microsoft Azure uses BitLocker and DM-Crypt, and Microsoft 365 uses BitLocker, Azure Storage Service Encryption, Distributed Key Manager (DKM), and Microsoft 365 service encryption. For customer data in transit, Azure, Office 365, Microsoft Commercial Support, Microsoft Dynamics 365, Microsoft Power BI, and Visual Studio Team Services use industry-standard secure transport protocols, such as Internet Protocol Security (IPsec) and Transport Layer Security (TLS), between Microsoft datacenters and between user devices and Microsoft datacenters.

In addition to the baseline level of cryptographic security provided by Microsoft, our cloud services also include cryptography options that you can manage. For example, you can enable encryption for traffic between their Azure virtual machines (VMs) and their users. With Azure Virtual Networks, you can use the industry-standard IPsec protocol to encrypt traffic between your corporate VPN gateway and Azure. You can also encrypt traffic between the VMs on your virtual network. In addition, Microsoft Purview Message Encryption allows you to send encrypted mail to anyone.

Following the Public Key Infrastructure Operational Security Standard, which is a component of the Microsoft Security Policy, Microsoft uses the cryptographic capabilities included in the Windows operating system for certificates and authentication mechanisms. These mechanisms include the use of cryptographic modules that meet the U.S. government's Federal Information Processing Standards (FIPS) 140-2 standard. You can search for the relevant National Institute of Standards and Technology (NIST) certificate numbers for Microsoft using the Cryptographic Module Validation Program (CMVP).

[NOTE]The Microsoft Security Policy is not made available as a public download. For information about the policy, contact Microsoft.

FIPS 140-2 is a standard designed specifically for validating product modules that implement cryptography rather than the products that use them. Cryptographic modules that are implemented within a service can be certified as meeting the requirements for hash strength, key management, and the like. The cryptographic modules and ciphers used to protect the confidentiality, integrity, or availability of data in Microsoft's cloud services meet the FIPS 140-2 standard.

Microsoft certifies the underlying cryptographic modules used in our cloud services with each new release of the Windows operating system:

  • Azure and Azure U.S. Government
  • Dynamics 365 and Dynamics 365 U.S. Government
  • Office 365, Office 365 U.S. Government, and Office 365 U.S. Government Defense

Encryption of customer data at rest is provided by multiple service-side technologies, including BitLocker, DKM, Azure Storage Service Encryption, and service encryption in Exchange, OneDrive, and SharePoint. Microsoft 365 service encryption includes an option to use customer-managed encryption keys that are stored in Azure Key Vault. This customer-managed key option is called Customer Key, and is available for Exchange, SharePoint, OneDrive, Teams files, and Windows 365 Cloud PCs (in public preview).

For customer data in transit, all Office 365 servers negotiate secure sessions using TLS by default with client machines to secure customer data. For example, Office 365 negotiates secure sessions to Skype for Business, Outlook, Outlook on the web, mobile clients, and web browsers.

(All customer-facing servers negotiate to TLS 1.2 by default.)

Tip

If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview compliance portal trials hub. Learn details about signing up and trial terms.

  • Encryption in Azure
  • BitLocker and Distributed Key Manager (DKM) for Encryption
  • Service encryption and key management
  • Microsoft 365 encryption for Skype for Business, OneDrive, SharePoint, and Exchange
  • Encryption for data in transit
  • Customer-managed encryption features
  • Encryption risks and protections
  • Encryption in Microsoft Dynamics 365
Encryption in the Microsoft cloud (2024)
Top Articles
All About the Stepped-Up Basis Loophole
What Is the Metals and Mining Sector? What's Included
Tmf Saul's Investing Discussions
Explore Tarot: Your Ultimate Tarot Cheat Sheet for Beginners
Geodis Logistic Joliet/Topco
DENVER Überwachungskamera IOC-221, IP, WLAN, außen | 580950
Which aspects are important in sales |#1 Prospection
Progressbook Brunswick
Pollen Count Central Islip
Oscar Nominated Brings Winning Profile to the Kentucky Turf Cup
Chris Hipkins Fue Juramentado Como El Nuevo Primer Ministro De...
Belly Dump Trailers For Sale On Craigslist
104 Whiley Road Lancaster Ohio
House Of Budz Michigan
DoorDash, Inc. (DASH) Stock Price, Quote & News - Stock Analysis
Gdp E124
Ally Joann
Forum Phun Extra
Apple Original Films and Skydance Animation’s highly anticipated “Luck” to premiere globally on Apple TV+ on Friday, August 5
18889183540
Today Was A Good Day With Lyrics
The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
Pearson Correlation Coefficient
THE FINALS Best Settings and Options Guide
Redfin Skagit County
Scripchat Gratis
Klsports Complex Belmont Photos
Darrell Waltrip Off Road Center
Kitchen Exhaust Cleaning Companies Clearwater
Imagetrend Elite Delaware
5 Star Rated Nail Salons Near Me
Vip Lounge Odu
60 Second Burger Run Unblocked
Craigslist Free Puppy
Graphic Look Inside Jeffrey Dresser
Dumb Money, la recensione: Paul Dano e quel film biografico sul caso GameStop
Petsmart Distribution Center Jobs
Sitting Human Silhouette Demonologist
Nsu Occupational Therapy Prerequisites
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Henry Ford’s Greatest Achievements and Inventions - World History Edu
Thor Majestic 23A Floor Plan
Nami Op.gg
Linkbuilding uitbesteden
Love Words Starting with P (With Definition)
Killer Intelligence Center Download
News & Events | Pi Recordings
How to Do a Photoshoot in BitLife - Playbite
Amourdelavie
De Donde Es El Area +63
Land of Samurai: One Piece’s Wano Kuni Arc Explained
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6561

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.