{"id":36851,"date":"2019-05-28T06:00:08","date_gmt":"2019-05-28T13:00:08","guid":{"rendered":"http:\/\/devblogs.microsoft.com\/premier-developer\/?p=36851"},"modified":"2019-05-16T12:13:31","modified_gmt":"2019-05-16T19:13:31","slug":"understanding-how-microsoft-azure-keeps-your-data-safe","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/premier-developer\/understanding-how-microsoft-azure-keeps-your-data-safe\/","title":{"rendered":"Understanding how Microsoft Azure keeps your data safe"},"content":{"rendered":"<p>In this post, Principal App Dev Manager <a href=\"https:\/\/www.linkedin.com\/in\/roger-lamb-b0782878\">Roger Lamb<\/a> highlights some of the important features of Data Security in Azure.<\/p>\n<hr \/>\n<p>Bad guys are always trying to get your data. They\u2019re really good at it, too. Just open any news site and you\u2019re bound to see at least one article on a major breach. And the costs for those incidents can be astronomical, including financial and legal woes. You need to protect your data better. Microsoft Azure can help.<\/p>\n<p>Security has been at the forefront when it comes to Microsoft\u2019s cloud. By focusing on providing a secure, hardened environment for applications and sensitive information, Azure affords organizations a safe destination for their data. Even better, Microsoft does it at a fraction of what it would take to implement if companies did it themselves. Azure is regularly being audited and tested, with updates implemented on a regular basis to certify compliance.<\/p>\n<p>But having a nice paragraph about how secure Azure is doesn\u2019t cut it. Companies need to know more before they decide to upload their sensitive content. Enter the <strong>Microsoft Azure Trust Center<\/strong>.<\/p>\n<h2>Microsoft Azure Trust Center<\/h2>\n<p>The Microsoft Azure trust Center is a single destination for all things related to security within Microsoft\u2019s Cloud. You can find details on specific global standards, physical and digital access control, best practices and documentation, and a host of other topics about hardening your data. There is way too much information to cover in this article but let me cover some the most important aspects.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/trustcenter\">Visit the Azure Trust Center<\/a><\/p>\n<h3>Standards<\/h3>\n<p>Microsoft Azure is continuing to expand its adherence to global and industry standards for security. This compliance is implemented at a digital level in the form of Disaster Recovery (DR), data masking and removal, data management, auditing and reporting, as well standard-specific requirements. In-depth documentation on <strong>Government<\/strong>, <strong>Industry<\/strong>, and <strong>Regional<\/strong> standards allow private and public sector organizations to quickly identify what provisions are in place for their individual needs. This documentation is regularly updated for consistency as standards evolve.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/trustcenter\/compliance\/complianceofferings?product=Azure\">Click here to find out about all Azure Compliance Offerings.<\/a><\/p>\n<h3>Access Control<\/h3>\n<p>By integrating Microsoft Azure with robust, secure access control, companies can rest easy knowing their information is protected. Integration with Azure Directory, Role-Based Access Control (RBAC), and Multi-Factor Authentication (MFA) ensures your data is only accessible to those you designate. All users are authenticated and verified using client-controlled policies and process. Companies can leverage hybrid cloud architectures to combine on-premise and cloud resources management for a unified security solution.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/security-identity-management-overview\">Learn more about Azure Identity Management Security<\/a><\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\">Learn more about Azure Active Directory<\/a><\/p>\n<p>For physical access, Azure\u2019s infrastructure is distributed around the globe, with redundancy in every major region. Anyone with data center access must be pre-authenticated and screened, including multiple levels of access, depending on the requirements. Only the most highly-screened and qualified individuals can access the data center floor, and all access is monitored and logged. Routine audits are performed at every Azure data center to ensure compliance to these strict access regulations.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/azure-physical-security\">Learn more about Azure facilities and security<\/a><\/p>\n<h3>Resources<\/h3>\n<p>Because data security is a shared responsibility between Microsoft and its clients, the Microsoft Azure Trust Center provides detailed documentation on many aspects of security. By offering organizations the ability to encrypt data, securely connect on-premise and cloud-hosted resources, and control access, Azure empowers companies the ability to secure their data and applications. Best practices on network and data security provide network administrators guidance on how to implement their architectures. Developers can benefit from documentation on hardening applications, data-related regulations like GDPR, and how to develop and deploy secure systems. By leveraging the provided security checklists, companies can be sure all aspects of their cloud-hosted resources are protected.<\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/\">Learn more about Azure Security<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/security-azure-encryption-overview\">Learn more about Azure Encryption<\/a><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/azure-operational-security-checklist\">View the about Azure Operational Security Checklist<\/a><\/p>\n<h2>Conclusion<\/h2>\n<p>Protecting user and company data is the most important role of any organization. Ensuring information is secure and accessible is paramount for every company, government, and business across every industry and vertical. By partnering with Microsoft on securing your data, you can safeguard you information in the cloud and protect you valuable data from un-authorized access.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to data, there is never a thing as too much security. With identify theft and breaches becoming a daily occurrence, ensuring sensitive information is protected is essential to business.  Microsoft Azure has been designed from the ground-up to be one of the most secure places to store your information. Let me prove it! <\/p>\n","protected":false},"author":582,"featured_media":37840,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25,8,1,96],"tags":[24,58,3],"class_list":["post-36851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-data","category-permierdev","category-security","tag-azure","tag-security","tag-team"],"acf":[],"blog_post_summary":"<p>When it comes to data, there is never a thing as too much security. With identify theft and breaches becoming a daily occurrence, ensuring sensitive information is protected is essential to business.  Microsoft Azure has been designed from the ground-up to be one of the most secure places to store your information. Let me prove it! <\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/36851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/users\/582"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/comments?post=36851"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/posts\/36851\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media\/37840"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/media?parent=36851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/categories?post=36851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/premier-developer\/wp-json\/wp\/v2\/tags?post=36851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}