Encryption and key management overview - Microsoft Service Assurance (2024)

  • Article

What role does encryption play in protecting customer content?

Most Microsoft business cloud services are multi-tenant, meaning that customer content may be stored on the same physical hardware as other customers. To protect the confidentiality of customer content, Microsoft online services encrypt all data at rest and in transit with some of the strongest and most secure encryption protocols available.

Encryption isn't a substitute for strong access controls. Microsoft's access control policy of Zero Standing Access (ZSA) protects customer content from unauthorized access by Microsoft employees. Encryption complements access control by protecting the confidentiality of customer content wherever it's stored and by preventing content from being read while in transit between Microsoft online services systems or between Microsoft online services and the customer.

How do Microsoft online services encrypt data-at-rest?

All customer content in Microsoft online services is protected by one or more forms of encryption. Microsoft servers use BitLocker to encrypt the disk drives containing customer content at the volume-level. The encryption provided by BitLocker protects customer content if there are lapses in other processes or controls (for example, access control or recycling of hardware) that could lead to unauthorized physical access to disks containing customer content.

In addition to volume-level encryption, Microsoft online services use encryption at the application layer to encrypt customer content. Service encryption provides rights protection and management features on top of strong encryption protection. It also allows for separation between Windows operating systems and the customer data stored or processed by those operating systems.

How do Microsoft online services encrypt data-in-transit?

Microsoft online services use strong transport protocols, such as Transport Layer Security (TLS), to prevent unauthorized parties from eavesdropping on customer data while it moves over a network. Examples of data in transit include mail messages that are in the process of being delivered, conversations taking place in an online meeting, or files being replicated between datacenters.

For Microsoft online services, data is considered 'in transit' whenever a user's device is communicating with a Microsoft server, or a Microsoft server is communicating with another server.

How do Microsoft online services manage the keys used for encryption?

Strong encryption is only as secure as the keys used to encrypt data. Microsoft uses its own security certificates and associated keys to encrypt TLS connections for data-in-transit. For data-at-rest, BitLocker-protected volumes are encrypted with a full volume encryption key, which is encrypted with a volume master key, which in turn is bound to the Trusted Platform Module (TPM) in the server. BitLocker uses FIPS 140-2 compliant algorithms to ensure that encryption keys are never stored or sent over the wire in the clear.

Service encryption provides another layer of encryption for customer data-at-rest giving customers two options for encryption key management: Microsoft-managed keys or Customer Key. When using Microsoft-managed keys, Microsoft online services automatically generate and securely store the root keys used for service encryption.

Customers with requirements to control their own root encryption keys can use service encryption with Microsoft Purview Customer Key. Using Customer Key, customers can generate their own cryptographic keys using either an on-premises Hardware Service Module (HSM) or Azure Key Vault (AKV). Customer root keys are stored in AKV, where they can be used as the root of one of the keychains that encrypts customer mailbox data or files. Customer root keys can only be accessed indirectly by Microsoft online service code for data encryption and can't be accessed directly by Microsoft employees.

Microsoft's online services are regularly audited for compliance with external regulations and certifications. Refer to the following table for validation of controls related to encryption and key management.

Azure and Dynamics 365

External auditsSectionLatest report date
ISO 27001

Statement of Applicability
Certificate

A.10.1: Cryptographic controls
A.18.1.5: Cryptographic controls
April 8, 2024
ISO 27017

Statement of Applicability
Certificate

A.10.1: Cryptographic controls
A.18.1.5: Cryptographic controls
April 8, 2024
ISO 27018

Statement of Applicability
Certificate

A.11.6: Encryption of PII transmitted over public data transmission networksApril 8, 2024
SOC 1
SOC 2
SOC 3
DS-1: Secure storage of cryptographic certificates and keys
DS-2: Customer data is encrypted in-transit
DS-3: Internal communication of Azure components encrypted in-transit
DS-4: Cryptographic controls and procedures
May 20, 2024

Microsoft 365

External auditsSectionLatest report date
FedRAMP (Office 365)SC-8: Transmission confidentiality and integrity
SC-13: Use of cryptography
SC-28: Protection of information at rest
July 31, 2023
ISO 27001/27017

Statement of Applicability
Certification (27001)
Certification (27017)

A.10.1: Cryptographic controls
A.18.1.5: Cryptographic controls
March 2022
ISO 27018

Statement of Applicability
Certificate

A.11.6: Encryption of PII transmitted over public data transmission networksMarch 2022
SOC 2CA-44: Data-in-transit encryption
CA-54: Data-at-rest encryption
CA-62: Customer Key mailbox encryption
CA-63: Customer Key data deletion
CA-64: Customer Key
January 23, 2024
SOC 3CUEC-16: Customer encryption keys
CUEC-17: Customer Key vault
CUEC-18: Customer Key rotation
January 23, 2024
Encryption and key management overview - Microsoft Service Assurance (2024)

FAQs

What is encryption and key management? ›

Encryption key management is the administration of policies and procedures for protecting, storing, organizing, and distributing encryption keys. Encryption keys (also called cryptographic keys) are the strings of bits generated to encode and decode data and voice transmissions.

What is the Microsoft tool for encryption? ›

BitLocker is a Windows security feature that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices.

Which three encryption options could be used when creating a new key in key management? ›

Encryption: Symmetric encryption keys, Asymmetric encryption keys (public and private). Authentication of End Devices: Pre-shared symmetric keys, Trusted certificates, Trust Anchors. Data Origin Authentication: HMAC.

What do you mean by the key management and the key security during user authentication? ›

Key management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols.

What are the 3 types of encryption keys? ›

There are different types of encryption techniques, but the following three are the most common and widely used: Symmetric Encryption, Asymmetric Encryption, and Hashing.

What are the two main types of keys in encryption? ›

One of the keys is typically known as the private key and the other is known as the public key. The private key is kept secret by the owner and the public key is either shared amongst authorised recipients or made available to the public at large.

How does Microsoft encryption work? ›

Encrypting an email message in Outlook means it's converted from readable plain text into scrambled cipher text. Only the recipient who has the private key that matches the public key used to encrypt the message can decipher the message for reading.

How secure is Microsoft Office encryption? ›

With Microsoft 365, your data is encrypted at rest and in transit, using several strong encryption protocols, and technologies that include Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPSec), and Advanced Encryption Standard (AES).

How do I turn off Microsoft encryption? ›

  1. Type and search [Device encryption settings] in the Windows search bar①, then click [Open]②.
  2. On the Device encryption field, set the option to [Off]③.
  3. Confirm whether you need to turn off device encryption, select [Turn off] to disable the device encryption function④.
Oct 24, 2023

What is an example of key encryption? ›

Keys in early forms of encryption

"Ifmmp" looks like a nonsensical string of letters, but if someone knows the key, they can substitute the proper letters and decrypt the message as "Hello." For this example, the key is (letter) - 1, moving each letter down one spot in the alphabet to arrive at the real letter.

Where should an encryption key be stored? ›

Where possible, encryption keys should be stored in a separate location from encrypted data. For example, if the data is stored in a database, the keys should be stored in the filesystem.

What are the two keys used in encryption? ›

What is public key cryptography? Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

What are some ways keys could be compromised? ›

Top 7 Ways Your Private Keys Get Hacked
  • Phishing Attacks. Phishing attacks are by far the most common way that blockchain private keys are compromised. ...
  • Malware Infections. ...
  • Weak Passwords. ...
  • Insecure Key Storage. ...
  • Weak Key Generation. ...
  • Social Engineering. ...
  • Cloud Storage Breaches.
Jun 25, 2024

Who should hold encryption keys? ›

"The data owner himself, herself or itself should always handle encryption keys."

What are the risks of encryption keys? ›

For example, if encryption keys are stored insecurely or are easily guessable, attackers can gain unauthorized access to the keys and decrypt the encrypted data. This can result in data breaches and privacy violations.

What is the difference between key and encryption? ›

In cryptography, a key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

Why is encryption and key management important in cloud? ›

(Encryption) Key management is important when dealing with security and privacy protection of the data contained, in order to prevent data loss/breach/contamination and comply with the relevant regulatory requirements.

What are the roles and responsibilities of cryptographic encryption and key management? ›

Key Management is the process of putting certain standards in place to ensure the security of cryptographic keys in an organization. Key Management deal with the creation, exchange, storage, deletion, and refreshing of keys. They also deal with the members access of the keys.

What is the meaning of encrypted key? ›

Decryption is like the secret code to unraveling a locked box. It's the process of converting encrypted data back into its original, understandable form.

Top Articles
How to Use Microsoft Authenticator without a Phone
Is It Better To Work Out in the Morning or the Evening?
Foxy Roxxie Coomer
Duralast Gold Cv Axle
Truist Bank Near Here
Is pickleball Betts' next conquest? 'That's my jam'
Chase Bank Operating Hours
Bucks County Job Requisitions
Los Angeles Craigs List
Gwdonate Org
Tracking Your Shipments with Maher Terminal
Shreveport Active 911
Kris Carolla Obituary
2016 Ford Fusion Belt Diagram
Gon Deer Forum
Bitlife Tyrone's
Overton Funeral Home Waterloo Iowa
Driving Directions To Bed Bath & Beyond
Clear Fork Progress Book
라이키 유출
Tygodnik Polityka - Polityka.pl
A Biomass Pyramid Of An Ecosystem Is Shown.Tertiary ConsumersSecondary ConsumersPrimary ConsumersProducersWhich
Georgia Cash 3 Midday-Lottery Results & Winning Numbers
Cpt 90677 Reimbursem*nt 2023
Craigslist Ludington Michigan
Pixel Combat Unblocked
Pfcu Chestnut Street
Metro By T Mobile Sign In
Graphic Look Inside Jeffrey Dresser
Litter-Robot 3 Pinch Contact & DFI Kit
2016 Honda Accord Belt Diagram
Does Iherb Accept Ebt
Synchrony Manage Account
Myql Loan Login
Mcgiftcardmall.con
2008 DODGE RAM diesel for sale - Gladstone, OR - craigslist
Paperless Employee/Kiewit Pay Statements
Anhedönia Last Name Origin
Amc.santa Anita
Strange World Showtimes Near Century Stadium 25 And Xd
Port Huron Newspaper
Tacos Diego Hugoton Ks
Phmc.myloancare.com
Dying Light Mother's Day Roof
Das schönste Comeback des Jahres: Warum die Vengaboys nie wieder gehen dürfen
Mlb Hitting Streak Record Holder Crossword Clue
Random Warzone 2 Loadout Generator
Quest Diagnostics Mt Morris Appointment
Julies Freebies Instant Win
Fallout 76 Fox Locations
Goosetown Communications Guilford Ct
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5995

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.