You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/feature-availability.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: terrylan
6
6
ms.service: security
7
7
ms.custom: ignite-2022
8
8
ms.topic: reference
9
-
ms.date: 12/30/2021
9
+
ms.date: 01/13/2023
10
10
---
11
11
12
12
# Cloud feature availability for commercial and US Government customers
@@ -505,11 +505,11 @@ The following table displays the current Microsoft Defender for IoT feature avai
505
505
506
506
## Azure Attestation
507
507
508
-
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service receives evidence from the platform, validates it with security standards, evaluates it against configurable policies, and produces an attestation token for claims-based applications (e.g., relying parties, auditing authorities).
508
+
Microsoft Azure Attestation is a unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it. The service receives evidence from the platform, validates it with security standards, evaluates it against configurable policies, and produces an attestation token for claims-based applications (e.g., relying parties, auditing authorities).
509
509
510
510
Azure Attestation is currently available in multiple regions across Azure public and Government clouds. In Azure Government, the service is available in preview status across US Gov Virginia and US Gov Arizona.
511
511
512
-
For more information, see Azure Attestation [public documentation](../../attestation/overview.md).
512
+
For more information, see Azure Attestation [public documentation](../../attestation/overview.md).
Copy file name to clipboardExpand all lines: articles/security/fundamentals/physical-security.md
+10-11Lines changed: 10 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,16 +4,15 @@ description: The article describes what Microsoft does to secure the Azure datac
4
4
services: security
5
5
documentationcenter: na
6
6
author: TerryLanfear
7
-
manager: barbkess
8
-
editor: TomSh
7
+
manager: rkarlin
9
8
10
9
ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
11
-
ms.service: information-protection
12
-
ms.subservice: aiplabels
10
+
ms.service: security
11
+
ms.subservice: security-fundamentals
13
12
ms.topic: article
14
13
ms.tgt_pltfrm: na
15
14
ms.workload: na
16
-
ms.date: 07/10/2020
15
+
ms.date: 01/13/2023
17
16
ms.author: terrylan
18
17
19
18
---
@@ -24,7 +23,7 @@ This article describes what Microsoft does to secure the Azure infrastructure.
24
23
## Datacenter infrastructure
25
24
Azure is composed of a [globally distributed datacenter infrastructure](https://azure.microsoft.com/global-infrastructure/), supporting thousands of online services and spanning more than 100 highly secure facilities worldwide.
26
25
27
-
The infrastructure is designed to bring applications closer to users around the world, preserving data residency, and offering comprehensive compliance and resiliency options for customers. Azure has 58 regions worldwide, and is available in 140 countries/regions.
26
+
The infrastructure is designed to bring applications closer to users around the world, preserving data residency, and offering comprehensive compliance and resiliency options for customers. Azure has over 60 regions worldwide, and is available in 140 countries/regions.
28
27
29
28
A region is a set of datacenters that is interconnected via a massive and resilient network. The network includes content distribution, load balancing, redundancy, and [data-link layer encryption by default](encryption-overview.md#encryption-of-data-in-transit) for all Azure traffic within a region or travelling between regions. With more global regions than any other cloud provider, Azure gives you the flexibility to deploy applications where you need them.
30
29
@@ -47,15 +46,17 @@ Microsoft takes a layered approach to physical security, to reduce the risk of u
47
46
48
47
-**Access request and approval.** You must request access prior to arriving at the datacenter. You're required to provide a valid business justification for your visit, such as compliance or auditing purposes. All requests are approved on a need-to-access basis by Microsoft employees. A need-to-access basis helps keep the number of individuals needed to complete a task in the datacenters to the bare minimum. After Microsoft grants permission, an individual only has access to the discrete area of the datacenter required, based on the approved business justification. Permissions are limited to a certain period of time, and then expire.
49
48
50
-
-**Facility’s perimeter.** When you arrive at a datacenter, you're required to go through a well-defined access point. Typically, tall fences made of steel and concrete encompass every inch of the perimeter. There are cameras around the datacenters, with a security team monitoring their videos at all times.
49
+
-**Visitor access.** Temporary access badges are stored within the access-controlled SOC and inventoried at the beginning and end of each shift. All visitors that have approved access to the datacenter are designated as *Escort Only* on their badges and are required to always remain with their escorts. Escorted visitors do not have any access levels granted to them and can only travel on the access of their escorts. The escort is responsible for reviewing the actions and access of their visitor during their visit to the datacenter. Microsoft requires visitors to surrender badges upon departure from any Microsoft facility. All visitor badges have their access levels removed before they are reused for future visits.
50
+
51
+
-**Facility's perimeter.** When you arrive at a datacenter, you're required to go through a well-defined access point. Typically, tall fences made of steel and concrete encompass every inch of the perimeter. There are cameras around the datacenters, with a security team monitoring their videos at all times. Security guard patrols ensure entry and exit are restricted to designated areas. Bollards and other measures protect the datacenter exterior from potential threats, including unauthorized access.
51
52
52
53
-**Building entrance.** The datacenter entrance is staffed with professional security officers who have undergone rigorous training and background checks. These security officers also routinely patrol the datacenter, and monitor the videos of cameras inside the datacenter at all times.
53
54
54
55
-**Inside the building.** After you enter the building, you must pass two-factor authentication with biometrics to continue moving through the datacenter. If your identity is validated, you can enter only the portion of the datacenter that you have approved access to. You can stay there only for the duration of the time approved.
55
56
56
57
-**Datacenter floor.** You are only allowed onto the floor that you're approved to enter. You are required to pass a full body metal detection screening. To reduce the risk of unauthorized data entering or leaving the datacenter without our knowledge, only approved devices can make their way into the datacenter floor. Additionally, video cameras monitor the front and back of every server rack. When you exit the datacenter floor, you again must pass through full body metal detection screening. To leave the datacenter, you're required to pass through an additional security scan.
57
58
58
-
Microsoft requires visitors to surrender badges upon departure from any Microsoft facility.
59
+
59
60
60
61
## Physical security reviews
61
62
Periodically, we conduct physical security reviews of the facilities, to ensure the datacenters properly address Azure security requirements. The datacenter hosting provider personnel do not provide Azure service management. Personnel can't sign in to Azure systems and don't have physical access to the Azure collocation room and cages.
@@ -69,7 +70,7 @@ Upon a system's end-of-life, Microsoft operational personnel follow rigorous dat
69
70
## Compliance
70
71
We design and manage the Azure infrastructure to meet a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1, and SOC 2. We also meet country- or region-specific standards, including Australia IRAP, UK G-Cloud, and Singapore MTCS. Rigorous third-party audits, such as those done by the British Standards Institute, verify adherence to the strict security controls these standards mandate.
71
72
72
-
For a full list of compliance standards that Azure adheres to, see the [Compliance offerings](https://www.microsoft.com/trustcenter/compliance/complianceofferings).
73
+
For a full list of compliance standards that Azure adheres to, see the [Compliance offerings](/azure/compliance/).
73
74
74
75
## Next steps
75
76
To learn more about what Microsoft does to help secure the Azure infrastructure, see:
@@ -83,5 +84,3 @@ To learn more about what Microsoft does to help secure the Azure infrastructure,
0 commit comments