preview

Office 365 White Paper

Better Essays

Office 365™ Security
White Paper

Office 365™ Security
White Paper

© 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.

Introduction 2 Office 365™ Security 3 Built-In Security 4 24-Hour Monitored Physical Hardware 4 Isolated Customer Data 4 Automated Operations 4 Secure Network 4 Encrypted Data 4 Microsoft Security Best Practices 5 …show more content…

Built-In Security

24-Hour Monitored Physical Hardware
Office 365 data is stored in the Microsoft network of data centers, run by Microsoft Global Foundation Services and strategically located around the world. These data centers are built from the ground up to protect services and data from harm by natural disaster or unauthorized access. Data center access is restricted 24 hours per day by job function so that only essential personnel have access to customer applications and services. Physical access control uses multiple authentication and security processes, including badges and smart cards, biometric scanners, on-premises security officers, continuous video surveillance, and two-factor authentication. The data centers are monitored using motion sensors, video surveillance, and security breach alarms. Security in the event of natural disaster includes seismically braced racks where required and automated fire prevention and extinguishing systems.

Isolated Customer Data
One reason Office 365 is both scalable and low cost is that it is a multi-tenant service (that is, data from different customers shares the same hardware resources). Office 365 is designed to host multiple tenants in a highly secure way through data isolation. Data storage and processing for each tenant is segregated through Active Directory® structure and capabilities specifically developed to help build, manage, and secure

Get Access