Skip to content

Commit b68260e

Browse files
committed
Acrolinx updates
1 parent 96aa324 commit b68260e

File tree

1 file changed

+34
-49
lines changed

1 file changed

+34
-49
lines changed

articles/databox/data-box-security.md

Lines changed: 34 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -27,15 +27,15 @@ The Microsoft Azure Data Box solution consists of four main components that inte
2727
- **Clients/hosts connected to the device** – The clients in your infrastructure that connect to the Data Box device and contain data that needs to be protected.
2828
- **Cloud storage** – The location in the Azure cloud where data is stored. That location is typically the storage account linked to the Azure Data Box resource that you created.
2929

30-
The following diagram indicates the flow of data through the Azure Data Box solution from on-premises to Azure and the various security features in place as the data flows through the solution. This flow is for an import order for your Data Box.
30+
The following diagram shows an import order's on-premises data flow to Azure through the Azure Data Box solution. The various security features within the solution are also highlighted.
3131

3232
:::image type="content" source="media/data-box-security/data-box-security-import.png" alt-text="Diagram explaining Data Box import security.":::
3333

34-
The following diagram is for the export order for your Data Box.
34+
The following diagram shows an export order data flow for your Data Box.
3535

3636
:::image type="content" source="media/data-box-security/data-box-security-export.png" alt-text="Diagram explaining Data Box export security.":::
3737

38-
As the data flows through this solution, events are logged and logs are generated. For more information, go to:
38+
Logs are generated and event data is tracked as data flows through this solution. For more information, go to:
3939

4040
- [Tracking and event logging for your Azure Data Box import orders](data-box-logs.md).
4141
- [Tracking and event logging for your Azure Data Box export orders](data-box-export-logs.md)
@@ -49,40 +49,40 @@ Data Box provides a secure solution for data protection by ensuring that only au
4949
The Data Box device is protected by the following features:
5050

5151
:::zone pivot="dbx-ng"
52-
- A rugged device casing that withstands shocks, adverse transportation, and environmental conditions.
52+
- A rugged device casing that protects against shocks, volatile transportation, and unfavorable environmental conditions.
5353
- Hardware and software tampering detection that prevents further device operations.
54-
- Built-in intrusion detection system that detects any unauthorized physical access to the devices.
55-
- Semper Secure Flash technology integrated with a hardware Root of Trust (RoT) within the flash memory chip, ensuring firmware integrity and secure updates without hardware modifications.
56-
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. Specifically, the TPM manages and protects secrets and data that needs to be persisted on the device.
57-
- Runs only Data Box-specific software.
58-
- Boots up in a locked state.
59-
- Controls device access via a device unlock passkey. This passkey is protected by an encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
54+
- Built-in intrusion detection system that identifies unauthorized physical access to the devices.
55+
- Semper Secure Flash technology integrated with a hardware Root of Trust (RoT) within the flash memory, ensuring firmware integrity and enabling secure updates without hardware modifications.
56+
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. The TPM manages and protects secrets and data that needs to be persisted on the device.
57+
- Execution limitations restrict execution to proprietary Data Box-specific software.
58+
- Default locked boot state.
59+
- Device access controlled via a device unlock passkey and encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
6060
- Access credentials to copy data in and out of the device. Each access to the **Device credentials** page in the Azure portal is logged in the [activity logs](data-box-logs.md#query-activity-logs-during-setup).
6161
- You can use your own passwords for device and share access. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
6262
:::zone-end
6363

64-
:::zone pivot="dbx"
65-
- A rugged device casing that withstands shocks, adverse transportation, and environmental conditions.
64+
:::zone pivot="dbx"
65+
- A rugged device casing that protects against shocks, volatile transportation, and unfavorable environmental conditions.
6666
- Hardware and software tampering detection that prevents further device operations.
67-
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. Specifically, the TPM manages and protects secrets and data that needs to be persisted on the device.
68-
- Runs only Data Box-specific software.
69-
- Boots up in a locked state.
70-
- Controls device access via a device unlock passkey. This passkey is protected by an encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
67+
- A Trusted Platform Module (TPM) that performs hardware-based, security-related functions. The TPM manages and protects secrets and data that needs to be persisted on the device.
68+
- Limits execution to proprietary Data Box-specific software.
69+
- Boots by default into a locked state.
70+
- Device access controlled via a device unlock passkey and encryption key. You can use your own customer-managed key to protect the passkey. For more information, see [Use customer-managed keys in Azure Key Vault for Azure Data Box](data-box-customer-managed-encryption-key-portal.md).
7171
- Access credentials to copy data in and out of the device. Each access to the **Device credentials** page in the Azure portal is logged in the [activity logs](data-box-logs.md#query-activity-logs-during-setup).
7272
- You can use your own passwords for device and share access. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
7373
:::zone-end
7474

7575
### Establish trust with the device via certificates
7676

77-
A Data Box device lets you bring your own certificates and install those to be used for connecting to the local web UI and blob storage. For more information, see [Use your own certificates with Data Box devices](data-box-bring-your-own-certificates.md).
77+
A Data Box device lets you utilize your own certificates when connecting to the local web UI and blob storage. For more information, see [Use your own certificates with Data Box devices](data-box-bring-your-own-certificates.md).
7878

7979
### Data Box data protection
8080

8181
The data that flows in and out of Data Box is protected by the following features:
8282

8383
:::zone pivot="dbx-ng"
84-
- AES 256-bit encryption for Data-at-rest. In a high-security environment, you can use software-based double encryption. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
85-
- The software based encryption is enhanced by RAID controller based hardware encryption.
84+
- AES 256-bit encryption for data-at-rest. In a high-security environment, you can use software-based double encryption. For more information, see [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
85+
- Software based encryption enhanced by RAID controller-based hardware encryption.
8686
- Encrypted protocols can be used for data-in-flight. We recommend that you use SMB 3.0 with encryption to protect data when you copy to it from your data servers.
8787
- Secure erasure of data from the device once upload to Azure is complete. Data erasure is in accordance with guidelines in [Appendix A for ATA Hard Disk Drives in NIST 800-88r1 standards](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf). The data erasure event is recorded in the [order history](data-box-logs.md#download-order-history).
8888
:::zone-end
@@ -97,19 +97,19 @@ The data that flows in and out of Data Box is protected by the following feature
9797

9898
The Data Box service is protected by the following features.
9999

100-
- Access to the Data Box service requires that your organization have an Azure subscription that includes Data Box. Your subscription governs the features that you can access in the Azure portal.
101-
- Because the Data Box service is hosted in Azure, it is protected by the Azure security features. For more information about the security features provided by Microsoft Azure, go to the [Microsoft Azure Trust Center](https://www.microsoft.com/TrustCenter/Security/default.aspx).
100+
- Access to the Data Box service requires a Data Box-enabled Azure subscription. Individual subscriptions limit access to features within the Azure portal.
101+
- Because the Data Box service is hosted in Azure, it's protected by the Azure security features. For more information about the security features provided by Microsoft Azure, go to the [Microsoft Azure Trust Center](https://www.microsoft.com/TrustCenter/Security/default.aspx).
102102
- Access to the Data Box order can be controlled via the use of Azure roles. For more information, see [Set up access control for Data Box order](data-box-logs.md#set-up-access-control-on-the-order)
103-
- The Data Box service stores the unlock password that is used to unlock the device in the service.
104-
- The Data box service stores order details and status in the service. This information is deleted when the order is deleted.
103+
- The Data Box service stores the password used to unlock the device.
104+
- The Data box service stores order details and status. The Data Box service deletes this information when the job reaches the terminal state or when you delete the order.
105105

106106
## Managing personal data
107107

108-
Azure Data Box collects and displays personal information in the following key instances in the service:
108+
The collection and display of personal information by Azure Data Box is limited to the following key instances in the service:
109109

110-
- **Notification settings** - When you create an order, you configure the email address of users under notification settings. This information can be viewed by the administrator. This information is deleted by the service when the job reaches the terminal state or when you delete the order.
110+
- **Notification settings** - When you create an order, you configure notification settings to use a user's email address. This information is visible to the administrator. The Data Box service deletes this information when the job reaches the terminal state or when you delete the order.
111111

112-
- **Order details**Once the order is created, the shipping address, email, and contact information of users is stored in the Azure portal. The information saved includes:
112+
- **Order details**After the order is created, the shipping address, email, and contact information of users is stored in the Azure portal. This information includes:
113113

114114
- Contact name
115115
- Phone number
@@ -122,9 +122,9 @@ Azure Data Box collects and displays personal information in the following key i
122122
- Carrier account number
123123
- Shipping tracking number
124124

125-
The order details are deleted by the Data Box service when the job completes or when you delete the order.
125+
The Data Box service deletes order details when the job reaches the terminal state or when you delete the order.
126126

127-
- **Shipping address** – After the order is placed, Data Box service provides the shipping address to third-party carriers such as UPS or DHL.
127+
- **Shipping address** – After the order is placed, Data Box service provides the shipping address to shipping partners such as UPS or DHL.
128128

129129
For more information, review the Microsoft Privacy policy at [Trust Center](https://www.microsoft.com/trust-center).
130130

@@ -133,28 +133,13 @@ For more information, review the Microsoft Privacy policy at [Trust Center](http
133133

134134
The following security guidelines are implemented in Data Box:
135135

136-
:::zone pivot="dbx"
137136
|Guideline |Description |
138-
|---------|---------|
139-
|[IEC 60529 IP52](https://www.iec.ch/) | For water and dust protection |
140-
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf) | For adverse transport conditions endurance |
141-
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf) | For secure firmware update |
142-
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf) | For data protection |
143-
|Appendix A, for ATA Hard Disk Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) | For data sanitization |
144-
145-
:::zone-end
146-
147-
:::zone pivot="dbx-ng"
148-
|Guideline |Description |
149-
|---------|---------|
150-
|[IEC 60529 IP52](https://www.iec.ch/) | For water and dust protection |
151-
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf) | For adverse transport conditions endurance |
152-
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf) | For secure firmware update |
153-
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf) | For data protection |
154-
|Appendix A, Table A-8 for ATA Solid State Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) | For data sanitization |
155-
156-
:::zone-end
157-
137+
|------------|--------------|
138+
|[IEC 60529 IP52](https://www.iec.ch/) | Water and dust protection |
139+
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf) | Volatile transport conditions endurance |
140+
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf) | Secure firmware update |
141+
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf) | Data protection |
142+
|Appendix A, for ATA Hard Disk Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) | Data sanitization |
158143

159144
## Media Sanitization details
160145

0 commit comments

Comments
 (0)