Cloud Security

Security is important to us.

Windows Azure, as an application hosting platform, must provide confidentiality, integrity and availablity of customer data. It must also provide transparent accountability to allow customers and their agents to track administration of applications and infrastructure, by both themselves and by Microsoft.

Windows Azure provides confidentiality through the following methods:

  • - Identity and Access Management
  • Identity and Access Management ensures that only properly authenticated individuals and companies are allowed access.

  • - Isolation
  • Isolation minimizes interaction with data by keeping appropriate containers logically or physically separate.

  • - Encryption
  • Encryption is used internally within Windows Azure for protecting control channels and is provided optionally for customers who need enhanced and rigorous data protection capability.

A system cannot be more secure that the physical platform that it runs on. Windows Azure runs in geographically distributed Microsoft Facilities, sharing space and utilities with other Microsoft Online Services. Each facility is designed to run 24/7 and employs various measures to help protect operations from power failure, physical intrusion, and network outages.

These data centers comply with industry standards for physical security and reliability and they are managed, monitored, and administered by Microsoft operations personnel. They are designed for “lights out” operation.

Security is a key area when looking at Cloud services. Under the hood the Windows Azure infrastructure implements a number of technologies and processes to safeguard the environment.

To read more about Windows Azure Security, please go to Microsoft Trust Center

This information has been provided by the Windows Azure Security Overview Documentation, supplied by Microsoft and is for educational and information purposes only.