Cloud App Security compliance

In a world where data breaches and attacks are daily occurrences, it is essential for organizations to choose a cloud app security broker that makes every effort to protect customer data. Cloud App Security is committed to the highest levels of trust, transparency, standards conformance, and regulatory compliance. Like all Microsoft cloud products and services, Cloud App Security is built from the ground up to address the most rigorous security and privacy demands of our customers. To help organizations comply with national, regional, and industry-specific requirements governing the collection and use of individuals’ data, Cloud App Security provides the most comprehensive set of compliance offerings (including certifications and attestations) of any cloud app security broker.

CAS certifications

Title Description
logo csa CSA STAR Attestation Azure and Intune were awarded Cloud Security Alliance STAR Attestation based on an independent audit.
logo csa CSA STAR Certification Azure, Intune, and Power BI were awarded Cloud Security Alliance STAR Certification at the Gold level.
logo EU model clauses EU Model Clauses Microsoft offers EU Standard Contractual Clauses, guarantees for transfers of personal data.
logo privacy shield EU-U.S. Privacy Shield Microsoft complies with this framework for protecting personal data transferred from the EU to the US.
logo FISC FISC Microsoft meets the requirements of the Financial Industry Information Systems v8 standard in Japan.
logo HIPAA HIPAA/HITECH Microsoft offers Health Insurance Portability & Accountability Act Business Associate Agreements (BAAs).
logo iso 9001 ISO 9001 Microsoft is certified for its implementation of these quality management standards.
logo iso 27001 ISO 27001 Microsoft is certified for its implementation of these information security management standards.
logo iso 27018 ISO 27018 Microsoft was the first cloud provider to adhere to this code of practice for cloud privacy.
logo PCI PCI DSS Azure complies with Payment Card Industry Data Security Standards Level 1 version 3.1.
logo SOC SOC 1 Type II Report Microsoft cloud services comply with Service Organization Controls standards for operational security.
logo SOC SOC 2 Type II Report Microsoft cloud services comply with Service Organization Controls standards for operational security.
logo SOC SOC 3 Microsoft cloud services comply with Service Organization Controls standards for operational security.
logo g-cloud UK G-Cloud The Crown Commercial Service renewed the Microsoft cloud services classification to Government Cloud v6.

For more information, go to Microsoft Compliance Offerings and select Cloud App Security.

GDPR – ADIR

In May 2018, a European privacy law, the General Data Protection Regulation (GDPR), is due to take effect. The GDPR imposes new rules on companies, government agencies, non-profits, and other organizations that offer goods and services to people in the European Union (EU), or that collect and analyze data tied to EU residents. The GDPR applies no matter where you are located. Microsoft has extensive expertise in protecting data, championing privacy, and complying with complex regulations. We believe that the GDPR is an important step forward for clarifying and enabling individual privacy rights. We want to help you focus on your core business while efficiently preparing for the GDPR. We are committed to GDPR compliance across Cloud App Security when enforcement begins May 25, 2018, and provide GDPR related assurances in our contractual commitments.

PII

When Cloud App Security performs content inspection, data privacy is enforced. The file content is not stored in the Cloud App Security database; only the metadata of the file records and any violations that were identified are stored in the Cloud App Security database. Cloud App Security does store IP addresses which some companies consider Private Information.

For more information about data retention, see our privacy policy and the Microsoft Trust Center.

Do not track

Cloud App Security enables you to set certain users to Do Not Track (DNT). To enable this feature, speak to your Microsoft representative about enabling preview features.

Anonymization

Cloud Discovery data anonymization enables you to protect user privacy. Once the data log is uploaded to the Cloud App Security portal, the log is sanitized and all username information is replaced with encrypted usernames. This way, all cloud activities are kept anonymous. When necessary, for a specific security investigation (for example, due to a security breach or suspicious user activity), admins can resolve the real username. If an admin has a reason to suspect a specific user, he can also look up the encrypted username of a known username, and then start investigating using the encrypted username. Each username conversion is audited in the portal’s Governance log.

No private information is stored or displayed, only encrypted information. Private data is encrypted using AES-128 with a dedicated key per tenant. Resolving usernames is performed ad-hoc, per-username by deciphering a given encrypted username.

Encryption at rest

All data stored in Cloud App Security is encrypted. All the sensitive fields are stored using the same advanced encryption features as in Azure, such as Key Vault.

Geofencing

The Cloud App Security enables you to limit access of administrators to the portal based on geolocation using Azure AD to limit access.

Permissions

Cloud App Security supports Role based access control. By default, the following Office 365 and Azure AD admin roles have access to Cloud App Security:

  • Global administrator and Security administrator: Admins will Full access will have full permissions in Cloud App Security to add admins, add policies and settings, upload logs and perform governance actions.

  • Security reader: Has read-only permissions and can manage alerts. The Security reader is restricted from performing the following:

    • Create policies or edit and change existing ones
    • Performing any governance actions
    • Uploading discovery logs
    • Banning or approving third party apps
    • Accessing and viewing the IP address range settings page
    • Accessing and viewing any settings pages
    • Acccessing and viewing the Discovery settings
    • Accessing and vieweing the App connectors page
    • Accessing and viewing the Governance log
    • Accessing and viewing the Manage snapshot reports page

For more information see Assigning administrator roles in Azure Active Directory.

Multi-factor authentication

It is possible to require multi-factor authentication to access the Cloud App Security portal by using the Azure Active Directory access to Cloud App Security.

Audit logs

All Cloud App Security configuration changes are audited in the Windows Event Log.

Data retention

Cloud App Security retains data as follows:

  • Activity log: 180 days
  • Discovery data: 90 days
  • Alerts: 180 days

After data is collected from these sources, Cloud App Security runs sophisticated analysis on the data. It immediately alerts you to anomalous activities, and gives you deep visibility into your cloud environment. You can configure a policy in Cloud App Security and use it to protect everything in your cloud environment.

ADIR Where do we store data? We only store it in our data centers and right now that’s in US West * not sure if we want to expose this information

See Also

Read about the basics in Getting started with Cloud App Security.
For technical support, go to the Cloud App Security assisted support page.
Premier customers also can choose Cloud App Security directly from the Premier portal.