Microsoft Online administrators are qualified systems and security

Informational Security White Paper
An Informational Security Whitepaper by Microsoft on Security and Privacy in a Multi-Tenant
Environment
Published: October 2010
For the latest information, see http://www.microsoft.com/online.
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of
publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of
Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication.
This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO
THE INFORMATION IN THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document
may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this
document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted in
examples herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place,
or event is intended or should be inferred.
®2010 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Exchange, Forefront, SharePoint, and Windows Server are trademarks of the Microsoft group of companies.
All other trademarks are property of their respective owners.
Abstract
Computing in the cloud raises questions about security, data protection, privacy and data ownership.
Microsoft Online Services are subscription based software services hosted by Microsoft and sold directly
or through partners to businesses all over the world. These services are designed to meet the
performance, scalability, security management capabilities, and service levels business customers
expect.
The Business Productivity Online Suite Standard enables customers to purchase always up-to-date, bestin-class software hosted on multi-tenant architecture. The services are physically hosted in Microsoft
data centers around the world, utilizing enterprise class technology to deliver performance, reliability
and security.
Microsoft Online has applied state-of-the-art technology, culture, and processes to help maintain or
support consistent and reliable access, security and privacy for every user. Microsoft Online has built-in
capabilities for compliance with a wide range of regulations and privacy mandates. These capabilities
and framework are regularly scrutinized, assessed and audited to assure the highest security and privacy
standards are maintained.
Microsoft has developed its offerings around the following core principles:




Microsoft tells you where your data is and you are the owner of your data
Microsoft will never perform data mining on your customer content housed in the Microsoft
cloud
Microsoft Online Services are built to support International Standards Organization (ISO)
requirements for an Information Security Management System, ISO 27001
Microsoft Online Services are certified to ISO 27001, SAS 70 and EU Safe Harbor Framework
This security whitepaper explores these and other topics in more detail.
Contents
Abstract ........................................................................................................................................................ 2
Introduction ................................................................................................................................................. 5
Microsoft Online Services Security Program ........................................................................................... 6
Corporate Security Policies ....................................................................................................................... 6
Organizational and Operational Security ................................................................................................. 6
Security Education .................................................................................................................................... 6
Security Development Lifecycle (SDL) ..................................................................................................... 7
Computing Community Participation ......................................................................................................... 7
Data Security Controls ............................................................................................................................... 7
Physical Security ....................................................................................................................................... 8
Carrier-Class Data Centers ................................................................................................................... 9
Security for Data Center Personnel ...................................................................................................... 9
Backup and Recovery ........................................................................................................................... 9
Logical Security ....................................................................................................................................... 10
Multi- Tenant Security ....................................................................................................................... 101
Administrative Access ........................................................................................................................ 12
Network Security and Segmentation .................................................................................................. 13
Data Storage, Retention and Ownership Rights ................................................................................ 13
Regulatory Compliance Framework ........................................................................................................ 13
Cloud Security Standards ....................................................................................................................... 14
Privacy Protection ..................................................................................................................................... 14
Conclusion ................................................................................................................................................. 15
Introduction
Business Productivity Online Suite (BPOS) Standard is a set of enterprise products delivered as a
subscription service, hosted by Microsoft and sold directly or through partners. The products are
designed for customers with managed IT needs. The suite includes Exchange Online, Office SharePoint
Online, Office Communications Online, Forefront Online Protection for Exchange, and Office Live
Meeting. Microsoft is committed to its responsibility to maintain the security of data entrusted to it by
millions of business users and strives to meet and exceed all levels of expected security.
One of the most important pieces of information to frame a discussion around Microsoft’s Security
program and the BPOS services is that the services are built to support ISO 27002 directives augmented
with requirements specific to online services. The Information Security Management System (ISMS), ISO
27001, is used and describes how information security is planned, implemented, monitored, reviewed
and improved. We have obtained our ISO 27001 certification though audits of our ISO framework and
according to the Cloud Security Alliance:
“Cloud providers seeking to provide mission critical services should embrace the ISO/IEC 27001
standard for information security management systems. If the provider has not achieved ISO/IEC
27001 certification, they should demonstrate alignment with ISO 27002 practices.”
Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing v2.1, 2009
In addition to our services meeting the BPOS security standards, our Microsoft data centers and the
infrastructure layer in which our services rely upon are also audited and certified against a
comprehensive set of controls and management standards assessed in both SAS 70 and ISO 27001
audits. Audits and certifications are performed by recognized independent third parties at least
annually.
Key components of the Microsoft Online Services Security Program are:



Corporate Security Policies
Microsoft’s security policies stem from building security into its software and systems, enabling
customers to meet regulatory, industry and legal obligations.
Organizational and Operational Security
Microsoft employs some of the best and brightest people in the security community, and
ensures that robust security principles, policies and procedures are woven into design and
implemented operations.
Data Security Controls
Customer data is handled and stored in highly secured carrier-class facilities with physical and
environmental controls that are continually monitored, reviewed and scrutinized. The
prevention of unauthorized and unintended information transfer via shared system resources is
controlled through Logical Security controls leveraging the mature structure of Active Directory.


Regulatory Compliance Framework
ISO 27001 certification, SAS 70 audits, EU Safe Harbor Framework certification, and
implementation of Cloud Security Alliance guidance make up some of Microsoft Online’s
compliance programs and foundation.
Privacy Protection
Microsoft Online Services has been built to adhere to MS Online’s privacy standards, focusing on
transparency, allowing customer’s control over their data, and enabling them to adhere to
recognized privacy principles. For general information on our collection, use and sharing of
personal information please read the Microsoft Online Services privacy statement at:
http://www.microsoft.com/online/legal/
Microsoft Online Services Security Program
Corporate Security Policies
Security at Microsoft starts with people, processes, and a shared goal. This shared goal is to enable
customers to ensure the confidentiality, integrity, and availability of their data while complying with
legal, regulatory, and contractual requirements. To achieve such a secure hosted infrastructure,
Microsoft subscribes to the following principles:

Ensure the security and privacy of Microsoft Online Services for all customers and users by
providing a robust and evolving security practice that is designed to exceed industry best
practices based on the ISO 27001 framework.

Meet customer expectations by ensuring that Microsoft Online Services have a breadth of
offerings with the flexibility to meet unique security and compliance obligations and to
accommodate regulatory or legal obligations.

Continually mature and enhance Microsoft Online Services by contributing to product and
service innovations, getting customer feedback into the product release cycle, and working with
security expertise to ensure past, current, and future threats are being considered.
These principles provide a basis for security policies throughout Microsoft Online Services.
Organizational and Operational Security
Microsoft’s people in combination with well-defined and implemented policies make the Microsoft
Security Team uniquely suited to set the bar for industry leading education and software development.
Through continuous improvement programs applicable staff remains qualified with security and privacy
knowledge.
Security Education
The security education program at Microsoft consists of many components including:




Formal training for all engineers, test, and program managers including design and coding
standards.
Extensive documentation for software developers and testers through its publicly available
Threats and Countermeasures Guidance. For further details please read information available at
the Guidance Explorer Tool at: http://guidanceexplorer.codeplex.com/.
Regularly scheduled security tech-talks from academic and professional researchers both
internal and external to Microsoft.
Recurring Microsoft BlueHat conferences which bring together security professionals and
researchers from across the world for in-depth technical presentations and discussions on
security vulnerabilities, code analysis, and testing techniques. For more information see the
BlueHat Security Briefing at: http://technet.microsoft.com/en-us/security/cc261637.aspx.
Security Development Lifecycle (SDL)
As an early pioneer for integrated security development, Microsoft has proven with quantifiable results,
such as the reduction in security bulletins, that its products have set new standards in the software
development industry.
Creating and adopting the Security Development Lifecycle has also demonstrated global leadership
around information and security practices in commercial software. Microsoft develops its SDL processes
and tools internally and has maintained a dedicated research effort leading to internal code analysis and
testing tools developed by the Microsoft Security Engineering Center (MSEC) and the Center for
Software Excellence (http://www.microsoft.com/windows/cse/default.mspx).
Knowing that Internet and system security depends on the entire ecosystem, Microsoft has made much
of its internal resources publicly available at http://www.microsoft.com/security/sdl/default.aspx.
Microsoft has released its own internal process guidance for each stage of the SDL, as well as
assessment tools to help companies determine their own maturity levels within the SDL framework.
Some of Microsoft’s own tools for assessment and security testing have also been made available,
including:




Threat modeling tool for software design
Code analysis tools including banned.h, PREFast, and CAT.NET
Binary analysis tools such as BinScope and FxCop
Process templates for Agile and traditional software development methods
Microsoft’s SDL Pro Network was also developed to assist the public and our customers in deciding on
training, consulting, and tooling companies to meet their security objectives.
Computing Community Participation
The Microsoft Security Response Center (MSRC) (http://www.microsoft.com/security/msrc) was
founded as a way for Microsoft to reach out to its customers and the security research
community. MSRC has since established policies for consistent monthly security bulletins and out-of-
band announcements for its customers, and practices for responsible vulnerability disclosure with the
security research community. The benefits are to provide customers with timely security updates and
detailed information to help in their security management decisions. The benefits have also included
setting up a mutually beneficial relationship with the external people and companies who find and
report vulnerabilities.
For many years Microsoft has opened its doors to the security research community through efforts of
the MSRC and events such as the Microsoft BlueHat security conference and the Microsoft Active
Protections Program (MAPP) (http://www.microsoft.com/security/msrc/collaboration/mapp.aspx).
Microsoft intends to provide its customers with accurate and timely information through its blogs on
MSDN and other social networking sites.
Data Security Controls
Microsoft houses critical and sensitive data for millions of customers throughout the world. A secure
multi-tenant environment must prevent any data exposure between users and across tenants. The data
security model starts by considering access and authorization controls for data in transit, data at rest,
and data available to applications. Connections established over the Internet to the services are
encrypted using industry standard Transport Layer Security (TLS) / Secure Sockets Layer (SSL). The term
data-at-rest refers to data as it exists on a physical storage medium. Data-at-rest is not encrypted by
Microsoft or many of the leading competitors as it would impact service functionality (e.g. search), but
for sensitive data, customers may implement Active Directory Rights Management to provide the layer
of control and security. Backups are performed every day and data restore is available per customer
request. Redundancy is built into the fabric of our program, from the application, to the network,
servers, and data centers.
Physical Security
Physical security controls applied to our data centers include, but are not limited to, perimeter fences,
biometric scanners, smart-cards, identification badges, delivery and loading area isolation, video
surveillance and on premise security officers 24/7. Visit http://www.globalfoundationservices.com for
video tours of our data centers and to get an inside view.
Only authorized staff has access to the hardware on which you run your business. Power outages, staff
vacation, or physical relocation servers will not affect your operations or expose your data to
unmanaged risks.
Data centers are distributed around the world, offering geographically dispersed hosting with global
availability. Data centers have been engineered to meet the most demanding requirements for
reliability, performance and security. Microsoft has implemented a set of policies and procedures to
provide for catastrophic physical and environmental threats.
Carrier-Class Data Centers
Microsoft enforces physical security controls as part of a broad set of carrier-class data center
operations. “Carrier-class” means very high availability, allowing for very little downtime per year. The
data centers in which Microsoft Online Services are operated, achieve carrier-class performance starts
with the engineering of the data center to be protected from environmental risks such as theft, fire,
explosives, water, smoke, earthquake, and electronic interference.
All cabling has been secured inside facilities, and cables traversing outside areas have been secured
where necessary. State of the art technology is used to constantly monitor the health and security of
each facility, both onsite and remotely.
The data centers in which Business Productivity Online Suite services are operated achieve carrier-class
performance through controls such as:








Physical building security
Secure physical access for authorized personnel only
Redundant power supplies:
o Two separate power feeds into each data center
o Battery backup
o Diesel generators (with alternative fuel delivery contracts in place)
Multiple fiber trunks connecting the data centers for redundancy
Climate control to ensure that equipment runs at optimal temperature and humidity
Seismically braced racks where required
Fire prevention and extinguishing systems with minimal disruption to computer equipment
24-hour secured access, as well as video camera surveillance and security breach alarms
Security for Data Center Personnel
An additional layer of security within the data center is applied to personnel that operate the facility.
Access is restricted by job function so that only essential personnel are authorized to manage
customers’ applications and services. Authorization requires:




Badge, and card reader restricted access
Biometric scanners
On-premises security officers
Continuous video surveillance
In addition, authorized personnel must have prior approval for all operations and actions within the data
center. Changes in permissions are logged and when employees change job functions within the
company access is revoked or altered in accordance with new responsibilities. Any operations that are
not already part of established process and procedures are reviewed before they can be executed.
Backup and Recovery
BPOS implements robust data backup and recovery mechanisms to enable availability, business
continuity, and rapid recovery. Multiple levels of data redundancy are implemented, ranging from
redundant disks to guard against local disk failure to continuous, full data replication to a geographically
diverse data center.
At the system hardware level, servers are deployed on hardware equipped with a combination of RAID 1
(mirrored) and RAID 5 (distributed parity) disk arrays. RAID allows for the complete loss of one disk
without any loss of data or server downtime. A hot spare disk automatically replaces any failed drive in
the array, allowing for quick restoration of the array to a non-degraded state without manual
intervention or downtime.
Microsoft System Center Data Protection Manager (DPM) is used to perform system data backup and
recovery within each data center. All backup data is stored on fixed disk arrays to help ensure rapid,
error-free recovery and eliminate the speed, inventory, and reliability challenges posed by traditional
tape backup mechanisms. For these reasons, tapes are not used as a backup mechanism. DPM provides
byte-level data replication and automatically validates replicated data against known-good production
servers to maintain data integrity. Data protection is near-continuous for most services , and performed
every 12 hours for those that don’t support continuous replication (e.g., SharePoint). Real-time
monitoring provides Microsoft operations with current backup status. Further, production data is
routinely restored using DPM to fulfill customer data restoration requests and Microsoft operational
needs.
DPM stores backups of the following classes of data:



Application Data
File data from volumes, shares, and folders
On-System State
The primary data center DPM backup repository is itself replicated to the alternate data center.
In the event that system and/or data recovery is needed, Microsoft operations use a combination of the
Microsoft System Recovery Tool to perform a “bare metal” system installation and then use DPM to
restore the server to its pre-failure state.
Logical Security
Through Internet-computing the logical access to information can be considered as critical if not more
important than physical access. Access controls are integrated into the perimeter network and every
application. Customer access to services provided over the Internet originates from the user’s Internetenabled location and terminates at a Microsoft data centers. Connections established over the Internet
to the services are encrypted using industry standard Transport Layer Security (TLS) Secure Sockets
Layer (SSL). The use of TLS/SSL effectively establishes an ad-hoc, browser-to-server secured connection
to help provide data confidentiality and integrity from the desktop to the data center. Data storage and
processing is logically segregated between customers of the same service through the use of Active
Directory structure and Active Directory capabilities specifically developed to help build, manage, and
secure multi-tenant environments.
Multi-Tenant Security
Security-focused engineering efforts have been expanded to create specialized products which support
the multi-tenant security requirements of Microsoft Online Service. Tenants are isolated from one
another based in part on security boundaries, or silos, enforced logically through Microsoft’s Active
Directory technology. Through its industrial-strength protocols and organizational unit isolation the
foundation of Active Directory provides trusted data-protection for each company hosting with
Microsoft Online Services.
The prevention of unauthorized and unintended information transfer via shared system resources is
controlled using Organizational Units (OUs) which are containers that logically store directory
information and provide a method of addressing Active Directory through Lightweight Directory Access
Protocol (LDAP). In Active Directory, OUs are the primary method for organizing user, computer, and
other object information into a more easily understandable layout. As shown below, there is a root
organizational unit where nested organizational units are placed within. This nesting enables
distribution of customers and users across multiple containers. OUs can be further subdivided into
resource OUs for organization and delegation of administration.
Through the use of OUs, customers are configured with specific resources and Access Control Entries
(ACEs) to isolate the organization and prevent users from different organizations from viewing the data
outside appropriate containers.
Logical security in Microsoft Online Services means securing the software that is already running on
physically secure hardware, in secured data centers.
Administrative Access
Microsoft Online administrators are qualified systems and security experts with a tremendous
responsibility for maintaining the technical aspects and security of Microsoft Online. Segregation of
duties is maintained and enforced through quarterly access reviews. All system management functions
are performed over private, controlled, and encrypted communication channels. Routers are managed
over secure SSH protocols, and Windows systems are managed using secure Remote Desktop
connections over SSL and TLS. In addition to the network security layer, Microsoft Online administration
requires two-factor authentication (via smart card access) by any administrator. This enables strong
access control and personal identifiable information is logged in the event that a forensic investigation is
ever required.
Network Security and Segmentation
The Microsoft Online network consists of a centralized Active Directory management forest called the
Joint Management Environment (JME) and a number of service forests representing the different service
environments. The service forests and the JME forest exist in different network virtual routing and
forwarding instances separated logically by a network firewall. Each service forest has a two-way trust
with selective authentication to the JME to enable the restriction on what resources can be accessed by
what security principals.
All traffic originating from networks outside of the service or the JME are considered untrusted and are
treated as equivalent to traffic originating from Internet. This includes traffic originating from other
Microsoft Online services within the same data center, or connections originating from Microsoft
corporate connections. BPOS can, in a sense, be considered an island accessed via one well understood
and managed bridge.
The network Access Control Lists (ACLs) allow all traffic to go from the JME to the individual service
forests. Service forest traffic into the JME forest is denied by default, with restricted access available to
authenticated sessions from authorized administrators.
Connections from the Internet are allowed via specific ACL entries to Internet-facing Virtual Internet
Protocols (VIP) on the network. Only the specific protocols and ports required for the service are open
from the Internet. Connections originated by BPOS to the Internet are restricted by either fine-grained
ACL or by proxy server. Outbound proxy servers require user authentication prior to allowing outbound
connections to be established.
Data Storage, Retention and Ownership Rights
Microsoft does not own your data, you do. Microsoft prides itself on transparency for privacy and data
handling. Not only can Microsoft tell customers where their data is located, but can also provide
transparency on how customer data is handled and customer data rights through the Microsoft Online
Privacy Statement at http://www.microsoft.com/online/legal/?langid=en-us&docid=7.
Where competitors might treat enterprise data as consumer data and data mine it for their own
purposes, Microsoft understands the difference. Microsoft does not mix enterprise and consumer data,
and will never mine customer data for our own purposes.
At the end of a customer’s subscription or use of the service, the customer may always export their
data. On most services, the customer may access and remove its customer data for a minimum of ninety
(90) days after the date of termination of the service. This is described in the use rights portion of the
service agreement. Microsoft also provides multiple notices prior to deletion of customer data so that
customers have ample time to extract their data.
Regulatory Compliance Framework
Microsoft has obtained prominent certifications including ISO 27001, SAS70, and EU Safe Harbor.
Microsoft Online engineers build compliance into Microsoft Online Services from the ground up.
Microsoft software engineers do this through the Security Development Lifecycle and the Trustworthy
Services Lifecycle (TSL). The TSL is a process designed to drive security, privacy and continuity
requirements across Microsoft Online through multiple structured risk assessments, formal processes
used to identify, determine severity and priority, and appropriately address risks associated with a
particular Microsoft Online Service.
To support customer compliance with regulations such as HIPAA, GLBA, SOX, and laws based on the
European Union Data Protection Directive (EUDPD) or United States legislation covering the protection
and reporting requirements of personally identifiable information (PII) Microsoft management
established procedures and controls that assure user accounts are handled in a controlled manner.




Microsoft Online Services has obtained an ISO 27001 certification on its Information Security
Management Systems (ISMS). ISO has been the foundation of the BPOS Services and its
supporting infrastructure since 2009 and has been certified by the British Standards Institute
(BSI). Customers are encouraged to review the ISO standard (publically available)
http://shop.bsigroup.com/en/ProductDetail/?pid=000000000030126472.
BPOS Certification details please visit: http://www.bsigroup.com/en/Assessment-andcertification-services/Client-directory/CertificateClient-Directory-SearchResults/?pg=1&licencenumber=IS+552878&searchkey=licenceXeqX552878
FOPE Certification details please visit: http://www.bsigroup.com/en/Assessment-andcertification-services/Client-directory/CertificateClient-Directory-SearchResults/?pg=1&licencenumber=IS+560057&searchkey=companyXeqXMicrosoft
Global Foundation Services Certification details visit:http://www.bsiamerica.com/enus/Assessment-and-Certification-services/Management-systems/Certificate-and-Client-
Directory-search/Search/SearchResults/?pg=1&licencenumber=IS+533913&searchkey=licenceXeqX533913XandXcompanyXeqX
Microsoft
While ISO 27001 provides assurance that Microsoft has Information Security Management Systems and
is aligned to ISO 27002 control standards, the SAS 70 provides detailed information on the design (Type
I) and effectiveness (Type II only) of controls. Regular SAS 70 Type I audits are performed to validate
control design for BPOS, the application layer of the service. Microsoft data centers and the
infrastructure layer in which our services rely upon are also audited and certified against a
comprehensive set of controls and the implemented management system covering both SAS 70 Type II
and ISO 27001. Audits and certifications are performed by credible independent third parties at least
annually. SAS 70 is a comprehensive audit complete with operational tests. In today's market, it is a
widely accepted attestation and combined with an independent audit shows transparency to the
businesses that a service organization works with. These independent audits are shared with customers
in lieu of individual customer audits as we feel these certifications and attestations are scalable and
accurately represent how we obtain and meet our security and compliance objectives.
Cloud Security Standards
To aid both cloud customers and cloud providers, the Cloud Security Alliance (CSA) developed “Security
Guidance for Critical Areas in Cloud Computing”, initially released in April 2009, and revised in December
2009. This guidance has quickly become the industry standard catalogue of best practices to secure
Cloud Computing, consistently lauded for its comprehensive approach to the problem, across 13
domains of concern. Numerous organizations around the world are incorporating the guidance to
manage their cloud strategies. Microsoft is an active member of CSA and has contributed to this
guidance document which can be downloaded at www.cloudsecurityalliance.org/guidance.
Privacy Protection
Data privacy is just as critical as data security, which is why the concept of privacy is one of the four
pillars of the Microsoft Trustworthy Computing Initiative. Microsoft’s customers have the highest
expectations about how their data is collected, stored and used by all applications at Microsoft Online.
Microsoft commits a significant amount of resources to privacy protection. Customer data is treated
with the highest regard. As a result, privacy has been woven into the culture at Microsoft as an
automatic priority in every area of the company.
Microsoft Online’s privacy policy can be viewed at http://www.microsoft.com/online/legal/. The
requirements for privacy have been integrated into every product at Microsoft just as security has. In
this way, all products are required to go through a rigorous privacy examination before they can be
released. By being integrated into the highly successful Microsoft SDL, Microsoft understands the
importance of privacy and integrates privacy into the foundation of all software and services.
To further comply with customer markets, Microsoft privacy applies to unique sectors such as
governmental sales, healthcare, and Finance, each of which may have additional requirements in certain
countries.
Conclusion
When you place your company’s information in the hands of Microsoft, you can do so with confidence
that Microsoft Online Services are built to support International Standards Organization (ISO)
requirements for an Information Security Management System, ISO 27001. We use the independent
third party audits to validate the effectiveness of our framework for our customers. These efforts are
implemented to effectively manage the confidentiality, integrity and availability of the cloud data to
which we are entrusted.