|
| 1 | +--- |
| 2 | +title: Secure your Azure Boards |
| 3 | +titleSuffix: Azure Boards |
| 4 | +description: Learn about security concepts, access controls, and best practices for protecting your work tracking data in Azure Boards. |
| 5 | +ms.subservice: azure-devops-security |
| 6 | +ms.custom: security |
| 7 | +ms.author: chcomley |
| 8 | +author: chcomley |
| 9 | +ms.topic: conceptual |
| 10 | +monikerRange: '<= azure-devops' |
| 11 | +ms.date: 09/05/2025 |
| 12 | +--- |
| 13 | + |
| 14 | +# Secure your Azure Boards |
| 15 | + |
| 16 | +[!INCLUDE [version-lt-eq-azure-devops](../includes/version-lt-eq-azure-devops.md)] |
| 17 | + |
| 18 | +Azure Boards provides multiple layers of security to protect your work tracking data, control access to sensitive information, and ensure compliance with organizational policies. This article outlines the security concepts, access controls, and best practices for securing your Azure Boards implementation. |
| 19 | + |
| 20 | +## Security model overview |
| 21 | + |
| 22 | +Azure Boards security operates on a multi-layered approach that includes: |
| 23 | + |
| 24 | +- **Control identity and access management**: Manage who can access your work items and what they can do. For more information, see [About access levels](../organizations/security/access-levels.md) |
| 25 | +- **Implement permission-based access**: Apply fine-grained permissions for different work tracking operations. For more information, see [Set work tracking permissions](../organizations/security/set-permissions-access-work-tracking.md) |
| 26 | +- **Configure area and iteration security**: Restrict access to specific work items based on project areas. For more information, see [Set area paths and assign to a team](../organizations/settings/set-area-paths.md) |
| 27 | +- **Manage work item types and field security**: Control visibility and editability of work item fields. For more information, see [Add and modify a field](../organizations/settings/work/add-custom-field.md) |
| 28 | +- **Enable audit and compliance**: Track changes and maintain compliance requirements. For more information, see [Access, export, and filter audit logs](../organizations/audit/azure-devops-auditing.md) |
| 29 | + |
| 30 | +## Identity and access management |
| 31 | + |
| 32 | +### Access levels |
| 33 | + |
| 34 | +Azure Boards uses access levels to control what features users can access. For comprehensive information about default permissions for each access level, see [Default permissions and access levels for Azure Boards](get-started/permissions-access-boards.md). |
| 35 | + |
| 36 | +| Access Level | Azure Boards Capabilities | |
| 37 | +|--------------|---------------------------| |
| 38 | +| **Stakeholder** | View work items, add and modify work items they create, view dashboards, limited query access | |
| 39 | +| **Basic** | Full access to work items, queries, dashboards, boards, and backlogs | |
| 40 | +| **Basic + Test Plans** | Includes Basic access plus Test Plans features | |
| 41 | +| **Visual Studio Enterprise** | Includes all Basic features plus advanced capabilities | |
| 42 | + |
| 43 | +For more information, see [About access levels](../organizations/security/access-levels.md). |
| 44 | + |
| 45 | +### Authentication |
| 46 | + |
| 47 | +Azure Boards supports multiple authentication methods: |
| 48 | + |
| 49 | +::: moniker range="azure-devops" |
| 50 | +- **Use Microsoft Entra ID**: Enable enterprise identity management with single sign-on. For more information, see [Connect your organization to Microsoft Entra ID](../organizations/accounts/connect-organization-to-azure-ad.md) |
| 51 | +- **Configure Microsoft accounts**: Support personal Microsoft accounts. For more information, see [Sign up, sign in to Azure DevOps](../user-guide/sign-up-invite-teammates.md) |
| 52 | +- **Implement GitHub authentication**: Authenticate GitHub users and organizations. For more information, see [Authenticate with GitHub](../organizations/accounts/add-external-user.md) |
| 53 | +::: moniker-end |
| 54 | + |
| 55 | +::: moniker range="< azure-devops" |
| 56 | +- **Integrate Active Directory**: Connect on-premises identity integration. For more information, see [Set up groups for use in Azure DevOps Server](/azure/devops/server/admin/setup-ad-groups) |
| 57 | +- **Create local accounts**: Manage server-based user accounts |
| 58 | +- **Configure Microsoft Entra ID**: Enable cloud-based identity management. For more information, see [Connect your organization to Microsoft Entra ID](../organizations/accounts/connect-organization-to-azure-ad.md) |
| 59 | +::: moniker-end |
| 60 | + |
| 61 | +## Permission model |
| 62 | + |
| 63 | +### Security groups |
| 64 | + |
| 65 | +Azure Boards uses security groups to manage permissions efficiently. For more information about all available security groups and their permissions, see [About permissions and security groups](../organizations/security/about-permissions.md). For detailed guidance on configuring team administrators and their permissions, see [Manage team administrators](../organizations/settings/add-team-administrator.md). |
| 66 | + |
| 67 | +| Security Group | Default Permissions | |
| 68 | +|----------------|-------------------| |
| 69 | +| **Project Administrators** | Full control over project settings, work item types, and team configuration | |
| 70 | +| **Contributors** | Create, modify, and delete work items; manage boards and backlogs | |
| 71 | +| **Readers** | View work items and project artifacts | |
| 72 | +| **Project Collection Administrators** | Organization-wide administration including security settings | |
| 73 | + |
| 74 | +### Work item permissions |
| 75 | + |
| 76 | +Control access to work items through these key permissions. For step-by-step instructions on configuring these permissions, see [Set work tracking permissions](../organizations/security/set-permissions-access-work-tracking.md). |
| 77 | + |
| 78 | +| Permission | Description | |
| 79 | +|------------|-------------| |
| 80 | +| **View work items in this node** | Read access to work items in specific area paths | |
| 81 | +| **Edit work items in this node** | Modify work items in specific area paths | |
| 82 | +| **Create child nodes** | Add new area paths under existing nodes | |
| 83 | +| **Delete and restore work items** | Remove work items and recover deleted items | |
| 84 | +| **Move work items out of this project** | Transfer work items to other projects | |
| 85 | + |
| 86 | +### Area path security |
| 87 | + |
| 88 | +Area paths provide hierarchical security boundaries: |
| 89 | + |
| 90 | +``` |
| 91 | +Project Root |
| 92 | +├── Team A (Restricted to Team A members) |
| 93 | +├── Team B (Restricted to Team B members) |
| 94 | +└── Shared Components (Accessible to all teams) |
| 95 | +``` |
| 96 | + |
| 97 | +Configure area path permissions to: |
| 98 | +- **Restrict team access** to specific work items |
| 99 | +- **Create secure workspaces** for different departments |
| 100 | +- **Control visibility** of sensitive projects |
| 101 | + |
| 102 | +For detailed instructions on setting up area path permissions, see [Set work tracking permissions](../organizations/security/set-permissions-access-work-tracking.md). |
| 103 | + |
| 104 | +## Field-level security |
| 105 | + |
| 106 | +### Sensitive data protection |
| 107 | + |
| 108 | +Protect sensitive information using these strategies: |
| 109 | + |
| 110 | +- **Create custom fields** with restricted access that only specific groups can view or edit. For more information, see [Add and modify a field](../organizations/settings/work/add-custom-field.md) |
| 111 | +- **Limit work item type restrictions** to control who can create or modify certain work item types. For more information, see [Customize a work item type](../organizations/settings/work/customize-process-work-item-type.md) |
| 112 | +- **Configure hidden fields** to be invisible to certain user groups. For more information, see [Add and modify a field](../organizations/settings/work/add-custom-field.md) |
| 113 | +- **Set read-only fields** to prevent unauthorized modifications to critical data. |
| 114 | + |
| 115 | +### Compliance features |
| 116 | + |
| 117 | +::: moniker range="azure-devops" |
| 118 | +- **Choose data residency** to meet compliance requirements for data storage location. For more information, see [Data locations for Azure DevOps](../organizations/security/data-location.md) |
| 119 | +- **Enable audit logs** to track all changes to work items and security settings. For more information, see [Access, export, and filter audit logs](../organizations/audit/azure-devops-auditing.md) |
| 120 | +- **Configure export capabilities** to generate compliance reports and data extracts. For more information, see [Export user list with access levels](../organizations/security/export-users-audit-log.md) |
| 121 | +- **Implement retention policies** for automatic data cleanup and archiving. For more information, see [Set retention policies for builds, releases, and tests](../pipelines/policies/retention.md) |
| 122 | +::: moniker-end |
| 123 | + |
| 124 | +## Best practices for Azure Boards security |
| 125 | + |
| 126 | +### Access management |
| 127 | + |
| 128 | +- **Apply least privilege principle**: Grant minimum required permissions. For more information, see [About permissions and security groups](../organizations/security/about-permissions.md) |
| 129 | +- **Conduct regular access reviews**: Periodically audit user permissions and group memberships. For more information, see [Export user list with access levels](../organizations/security/export-users-audit-log.md) |
| 130 | +- **Use group-based management**: Manage security groups instead of individual permissions. For more information, see [About permissions and security groups](../organizations/security/about-permissions.md) |
| 131 | +- **Implement conditional access**: Enable location and device-based access controls. For more information, see [Manage conditional access](../organizations/accounts/change-application-access-policies.md) |
| 132 | + |
| 133 | +### Work item security |
| 134 | + |
| 135 | +- **Design area path strategy**: Create hierarchical structure that aligns with security requirements. For more information, see [Set work tracking permissions](../organizations/security/set-permissions-access-work-tracking.md) |
| 136 | +- **Configure team isolation**: Set up teams to access only their designated work items. For more information, see [Add a team, move from one default team to several teams](../organizations/settings/add-teams.md) |
| 137 | +- **Implement field security**: Restrict access to sensitive fields like budget or personal information. For more information, see [Add and modify a field](../organizations/settings/work/add-custom-field.md) |
| 138 | +- **Control link security**: Manage who can create dependencies between work items. For more information, see [Link work items to objects](backlogs/add-link.md) |
| 139 | + |
| 140 | +### Data protection |
| 141 | + |
| 142 | +- **Handle sensitive information carefully**: Avoid storing credentials or personal data in work items |
| 143 | +- **Manage file attachments**: Implement policies for acceptable file types and sizes |
| 144 | +- **Validate external links**: Approve external URL links in work items |
| 145 | +- **Secure query access**: Ensure queries don't expose unauthorized data. For more information, see [Set permissions for queries and query folders](../organizations/security/set-permissions-access-work-tracking.md#work-item-queries) |
| 146 | + |
| 147 | +### Monitoring and compliance |
| 148 | + |
| 149 | +- **Monitor activity patterns**: Track work item access patterns and unusual activities. For more information, see [Access, export, and filter audit logs](../organizations/audit/azure-devops-auditing.md) |
| 150 | +- **Audit change logs**: Maintain logs of all work item modifications. For more information, see [Query work item history and auditing](queries/history-and-auditing.md) |
| 151 | +- **Implement regular backups**: Create backup strategies for critical work tracking data. For more information, see [Data protection overview](../organizations/security/data-protection.md) |
| 152 | +- **Establish incident response**: Create procedures for security incidents involving work items. For more information, see [Security best practices](../organizations/security/security-best-practices.md) |
| 153 | + |
| 154 | +## Common security scenarios |
| 155 | + |
| 156 | +### Multi-team projects |
| 157 | + |
| 158 | +When multiple teams work within a single project, it's essential to establish clear security boundaries to ensure teams can only access their relevant work items while maintaining collaboration where needed. Azure Boards uses area paths to create these security boundaries, allowing you to configure granular access control for different teams and organizational levels. |
| 159 | + |
| 160 | +For guidance on setting up team administrators for each team, see [Manage team administrators](../organizations/settings/add-team-administrator.md). |
| 161 | + |
| 162 | +**Example scenario**: A software development project with specialized teams working on different components, plus management oversight: |
| 163 | + |
| 164 | +``` |
| 165 | +Project: ProductDevelopment |
| 166 | +├── Area: Frontend (Frontend team access) |
| 167 | +├── Area: Backend (Backend team access) |
| 168 | +├── Area: QA (QA team access) |
| 169 | +└── Area: Management (Manager access only) |
| 170 | +``` |
| 171 | + |
| 172 | +In this configuration: |
| 173 | +- **Frontend team members** can view and edit work items only in the Frontend area |
| 174 | +- **Backend team members** have access restricted to Backend work items |
| 175 | +- **QA team members** can access QA-specific work items for testing coordination |
| 176 | +- **Managers** have visibility into Management area items for strategic planning and reporting |
| 177 | +- **Cross-team dependencies** can be managed through carefully configured shared areas or explicit permissions |
| 178 | + |
| 179 | +This approach ensures that sensitive information remains restricted, so teams can focus on their specific responsibilities without distractions from unrelated work items. |
| 180 | + |
| 181 | +### Cross-project collaboration |
| 182 | + |
| 183 | +Manage security when teams work across projects: |
| 184 | + |
| 185 | +- **Grant cross-project permissions**: Provide specific access to external team members |
| 186 | +- **Control work item linking**: Manage who can create dependencies across projects |
| 187 | +- **Manage shared queries**: Control access to queries that span multiple projects. For detailed configuration steps, see [Set permissions for queries and query folders](../organizations/security/set-permissions-access-work-tracking.md#work-item-queries) |
| 188 | + |
| 189 | +### Contractor and vendor access |
| 190 | + |
| 191 | +Secure access for external contributors. For comprehensive guidance on managing external users, see [Add external users to your organization](../organizations/accounts/add-external-user.md). |
| 192 | + |
| 193 | +- **Assign limited access levels**: Configure appropriate access levels for external users |
| 194 | +- **Implement time-bound permissions**: Create temporary access with expiration dates |
| 195 | +- **Restrict area access**: Limit contractor access to specific project areas |
| 196 | +- **Audit external activity**: Monitor all actions by external users |
| 197 | + |
| 198 | +## Security configuration checklist |
| 199 | + |
| 200 | +### Initial setup |
| 201 | + |
| 202 | +- [ ] [Configure appropriate access levels for all users](../organizations/security/change-access-levels.md) |
| 203 | +- [ ] [Set up security groups aligned with organizational structure](../organizations/security/about-permissions.md) |
| 204 | +- [ ] [Design area path hierarchy based on security requirements](../organizations/settings/set-area-paths.md) |
| 205 | +- [ ] [Configure team permissions and access boundaries](../organizations/settings/add-teams.md) |
| 206 | +- [ ] [Set work tracking permissions](../organizations/security/set-permissions-access-work-tracking.md) for area paths and iterations |
| 207 | +- [ ] [Configure query folder permissions](../organizations/security/set-permissions-access-work-tracking.md#work-item-queries) to control access to shared queries |
| 208 | + |
| 209 | +### Ongoing management |
| 210 | + |
| 211 | +- [ ] [Conduct regular permission audits and access reviews](../organizations/security/export-users-audit-log.md) |
| 212 | +- [ ] [Monitor work item access patterns and anomalies](../organizations/audit/azure-devops-auditing.md) |
| 213 | +- [ ] [Update security configurations as teams evolve](../organizations/security/set-permissions-access-work-tracking.md) |
| 214 | +- [ ] [Maintain documentation of security decisions and changes](../organizations/security/security-best-practices.md) |
| 215 | +- [ ] Review and update [team administrator assignments](../organizations/settings/add-team-administrator.md) as needed |
| 216 | + |
| 217 | +### Compliance preparation |
| 218 | + |
| 219 | +- [ ] [Document data handling procedures](../organizations/security/data-protection.md) |
| 220 | +- [ ] [Implement audit log retention policies](../organizations/audit/azure-devops-auditing.md) |
| 221 | +- [ ] [Configure export capabilities for compliance reporting](../organizations/security/export-users-audit-log.md) |
| 222 | +- [ ] [Establish incident response procedures](../organizations/security/security-best-practices.md) |
0 commit comments