You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/databox/data-box-security.md
+34-49Lines changed: 34 additions & 49 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,15 +27,15 @@ The Microsoft Azure Data Box solution consists of four main components that inte
27
27
-**Clients/hosts connected to the device** – The clients in your infrastructure that connect to the Data Box device and contain data that needs to be protected.
28
28
-**Cloud storage** – The location in the Azure cloud where data is stored. That location is typically the storage account linked to the Azure Data Box resource that you created.
29
29
30
-
The following diagram indicates the flow of data through the Azure Data Box solution from on-premises to Azure and the various security features in place as the data flows through the solution. This flow is for an import order for your Data Box.
30
+
The following diagram shows an import order's on-premises data flow to Azure through the Azure Data Box solution. The various security features within the solution are also highlighted.
31
31
32
32
:::image type="content" source="media/data-box-security/data-box-security-import.png" alt-text="Diagram explaining Data Box import security.":::
33
33
34
-
The following diagram is for the export order for your Data Box.
34
+
The following diagram shows an export order data flow for your Data Box.
35
35
36
36
:::image type="content" source="media/data-box-security/data-box-security-export.png" alt-text="Diagram explaining Data Box export security.":::
37
37
38
-
As the data flows through this solution, events are logged and logs are generated. For more information, go to:
38
+
Logs are generated and event data is tracked as data flows through this solution. For more information, go to:
39
39
40
40
-[Tracking and event logging for your Azure Data Box import orders](data-box-logs.md).
41
41
-[Tracking and event logging for your Azure Data Box export orders](data-box-export-logs.md)
@@ -49,40 +49,40 @@ Data Box provides a secure solution for data protection by ensuring that only au
49
49
The Data Box device is protected by the following features:
50
50
51
51
:::zone pivot="dbx-ng"
52
-
- A rugged device casing that withstands shocks, adverse transportation, and environmental conditions.
52
+
- A rugged device casing that protects against shocks, volatile transportation, and unfavorable environmental conditions.
53
53
- Hardware and software tampering detection that prevents further device operations.
54
-
- Built-in intrusion detection system that detects any unauthorized physical access to the devices.
55
-
- Semper Secure Flash technology integrated with a hardware Root of Trust (RoT) within the flash memory chip, ensuring firmware integrity and secure updates without hardware modifications.
56
-
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. Specifically, the TPM manages and protects secrets and data that needs to be persisted on the device.
57
-
-Runs only Data Box-specific software.
58
-
-Boots up in a locked state.
59
-
-Controls device access via a device unlock passkey. This passkey is protected by an encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
54
+
- Built-in intrusion detection system that identifies unauthorized physical access to the devices.
55
+
- Semper Secure Flash technology integrated with a hardware Root of Trust (RoT) within the flash memory, ensuring firmware integrity and enabling secure updates without hardware modifications.
56
+
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. The TPM manages and protects secrets and data that needs to be persisted on the device.
57
+
-Execution limitations restrict execution to proprietary Data Box-specific software.
58
+
-Default locked boot state.
59
+
-Device access controlled via a device unlock passkey and encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
60
60
- Access credentials to copy data in and out of the device. Each access to the **Device credentials** page in the Azure portal is logged in the [activity logs](data-box-logs.md#query-activity-logs-during-setup).
61
61
- You can use your own passwords for device and share access. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
62
62
:::zone-end
63
63
64
-
:::zone pivot="dbx"
65
-
- A rugged device casing that withstands shocks, adverse transportation, and environmental conditions.
64
+
:::zone pivot="dbx"
65
+
- A rugged device casing that protects against shocks, volatile transportation, and unfavorable environmental conditions.
66
66
- Hardware and software tampering detection that prevents further device operations.
67
-
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. Specifically, the TPM manages and protects secrets and data that needs to be persisted on the device.
68
-
-Runs only Data Box-specific software.
69
-
- Boots up in a locked state.
70
-
-Controls device access via a device unlock passkey. This passkey is protected by an encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
67
+
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. The TPM manages and protects secrets and data that needs to be persisted on the device.
68
+
-Limits execution to proprietary Data Box-specific software.
69
+
- Boots by default into a locked state.
70
+
-Device access controlled via a device unlock passkey and encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
71
71
- Access credentials to copy data in and out of the device. Each access to the **Device credentials** page in the Azure portal is logged in the [activity logs](data-box-logs.md#query-activity-logs-during-setup).
72
72
- You can use your own passwords for device and share access. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
73
73
:::zone-end
74
74
75
75
### Establish trust with the device via certificates
76
76
77
-
A Data Box device lets you bring your own certificates and install those to be used for connecting to the local web UI and blob storage. For more information, see [Use your own certificates with Data Box devices](data-box-bring-your-own-certificates.md).
77
+
A Data Box device lets you utilize your own certificates when connecting to the local web UI and blob storage. For more information, see [Use your own certificates with Data Box devices](data-box-bring-your-own-certificates.md).
78
78
79
79
### Data Box data protection
80
80
81
81
The data that flows in and out of Data Box is protected by the following features:
82
82
83
83
:::zone pivot="dbx-ng"
84
-
- AES 256-bit encryption for Data-at-rest. In a high-security environment, you can use software-based double encryption. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
85
-
-The software based encryption is enhanced by RAID controllerbased hardware encryption.
84
+
- AES 256-bit encryption for data-at-rest. In a high-security environment, you can use software-based double encryption. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
85
+
-Software based encryption enhanced by RAID controller-based hardware encryption.
86
86
- Encrypted protocols can be used for data-in-flight. We recommend that you use SMB 3.0 with encryption to protect data when you copy to it from your data servers.
87
87
- Secure erasure of data from the device once upload to Azure is complete. Data erasure is in accordance with guidelines in [Appendix A for ATA Hard Disk Drives in NIST 800-88r1 standards](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf). The data erasure event is recorded in the [order history](data-box-logs.md#download-order-history).
88
88
:::zone-end
@@ -97,19 +97,19 @@ The data that flows in and out of Data Box is protected by the following feature
97
97
98
98
The Data Box service is protected by the following features.
99
99
100
-
- Access to the Data Box service requires that your organization have an Azure subscription that includes Data Box. Your subscription governs the features that you can access in the Azure portal.
101
-
- Because the Data Box service is hosted in Azure, it is protected by the Azure security features. For more information about the security features provided by Microsoft Azure, go to the [Microsoft Azure Trust Center](https://www.microsoft.com/TrustCenter/Security/default.aspx).
100
+
- Access to the Data Box service requires a Data Box-enabled Azure subscription. Individual subscriptions limit access to features within the Azure portal.
101
+
- Because the Data Box service is hosted in Azure, it's protected by the Azure security features. For more information about the security features provided by Microsoft Azure, go to the [Microsoft Azure Trust Center](https://www.microsoft.com/TrustCenter/Security/default.aspx).
102
102
- Access to the Data Box order can be controlled via the use of Azure roles. For more information, see [Set up access control for Data Box order](data-box-logs.md#set-up-access-control-on-the-order)
103
-
- The Data Box service stores the unlock password that is used to unlock the device in the service.
104
-
- The Data box service stores order details and status in the service. This information is deleted when the order is deleted.
103
+
- The Data Box service stores the password used to unlock the device.
104
+
- The Data box service stores order details and status. The Data Box service deletes this information when the job reaches the terminal state or when you delete the order.
105
105
106
106
## Managing personal data
107
107
108
-
Azure Data Box collects and displays personal information in the following key instances in the service:
108
+
The collection and display of personal information by Azure Data Box is limited to the following key instances in the service:
109
109
110
-
-**Notification settings** - When you create an order, you configure the email address of users under notification settings. This information can be viewed by the administrator. This information is deleted by the service when the job reaches the terminal state or when you delete the order.
110
+
-**Notification settings** - When you create an order, you configure notification settings to use a user's email address. This information is visible to the administrator. The Data Box service deletes this information when the job reaches the terminal state or when you delete the order.
111
111
112
-
-**Order details** – Once the order is created, the shipping address, email, and contact information of users is stored in the Azure portal. The information saved includes:
112
+
-**Order details** – After the order is created, the shipping address, email, and contact information of users is stored in the Azure portal. This information includes:
113
113
114
114
- Contact name
115
115
- Phone number
@@ -122,9 +122,9 @@ Azure Data Box collects and displays personal information in the following key i
122
122
- Carrier account number
123
123
- Shipping tracking number
124
124
125
-
The order details are deleted by the Data Box service when the job completes or when you delete the order.
125
+
The Data Box service deletes order details when the job reaches the terminal state or when you delete the order.
126
126
127
-
-**Shipping address** – After the order is placed, Data Box service provides the shipping address to third-party carriers such as UPS or DHL.
127
+
-**Shipping address** – After the order is placed, Data Box service provides the shipping address to shipping partners such as UPS or DHL.
128
128
129
129
For more information, review the Microsoft Privacy policy at [Trust Center](https://www.microsoft.com/trust-center).
130
130
@@ -133,28 +133,13 @@ For more information, review the Microsoft Privacy policy at [Trust Center](http
133
133
134
134
The following security guidelines are implemented in Data Box:
135
135
136
-
:::zone pivot="dbx"
137
136
|Guideline |Description |
138
-
|---------|---------|
139
-
|[IEC 60529 IP52](https://www.iec.ch/)| For water and dust protection |
140
-
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf)| For adverse transport conditions endurance |
141
-
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf)| For secure firmware update |
142
-
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf)| For data protection |
143
-
|Appendix A, for ATA Hard Disk Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)| For data sanitization |
144
-
145
-
:::zone-end
146
-
147
-
:::zone pivot="dbx-ng"
148
-
|Guideline |Description |
149
-
|---------|---------|
150
-
|[IEC 60529 IP52](https://www.iec.ch/)| For water and dust protection |
151
-
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf)| For adverse transport conditions endurance |
152
-
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf)| For secure firmware update |
153
-
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf)| For data protection |
154
-
|Appendix A, Table A-8 for ATA Solid State Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)| For data sanitization |
155
-
156
-
:::zone-end
157
-
137
+
|------------|--------------|
138
+
|[IEC 60529 IP52](https://www.iec.ch/)| Water and dust protection |
139
+
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf)| Volatile transport conditions endurance |
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf)| Data protection |
142
+
|Appendix A, for ATA Hard Disk Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)| Data sanitization |
0 commit comments