Updated: April 28, 2021 (July 4, 2018)

  Charts & Illustrations

Office 365 Data Protection

My Atlas / Charts & Illustrations

229 wordsTime to read: 2 min
Wes Miller by
Wes Miller

Wes Miller analyzes and writes about Microsoft’s security, identity management, and systems management technologies. Before joining Directions on Microsoft, Wes... more

Multiple technologies help to protect data stored in Office 365 that an organization might not be aware of. Different technologies protect against different threat vectors.

All the technologies shown protect data at rest, and in certain cases that data remains protected if moved.

Additional technologies like Transport Layer Security (TLS) are used purely to protect data in transit—whether that is between Microsoft data centers or a Microsoft data center and a user of Office 365 services.

Note that customers who license Azure Information Protection (AIP, an extension of Azure Rights Management) can also implement bring your own key (BYOK), where the keys will be managed in a similar manner to Customer Key.

Encryption Technology Key Management Threat Value of Technology
BitLocker Microsoft Disks used with Office 365 services servers are compromised or stolen. Protects the data while stored on disks, even if the disk is compromised.
Service

Atlas Members have full access

Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.

Membership Options

Already have an account? Login Now