Updated: April 28, 2021 (July 4, 2018)
Charts & IllustrationsOffice 365 Data Protection
Multiple technologies help to protect data stored in Office 365 that an organization might not be aware of. Different technologies protect against different threat vectors.
All the technologies shown protect data at rest, and in certain cases that data remains protected if moved.
Additional technologies like Transport Layer Security (TLS) are used purely to protect data in transit—whether that is between Microsoft data centers or a Microsoft data center and a user of Office 365 services.
Note that customers who license Azure Information Protection (AIP, an extension of Azure Rights Management) can also implement bring your own key (BYOK), where the keys will be managed in a similar manner to Customer Key.
Encryption Technology | Key Management | Threat | Value of Technology |
BitLocker | Microsoft | Disks used with Office 365 services servers are compromised or stolen. | Protects the data while stored on disks, even if the disk is compromised. |
Service |
Atlas Members have full access
Get access to this and thousands of other unbiased analyses, roadmaps, decision kits, infographics, reference guides, and more, all included with membership. Comprehensive access to the most in-depth and unbiased expertise for Microsoft enterprise decision-making is waiting.
Membership OptionsAlready have an account? Login Now