Encryption
Encryption, a critical part of the zero-trust strategy, is a mechanism that protects information from unauthorized access. Data stored or transmitted in clear text can potentially be intercepted or modified by bad actors. Encryption can help protect against both unauthorized access and data alteration.
Microsoft 365 implements several encryption technologies across the platform. Encryption is enforced for data in two core states:
- At rest: In this state, data is stored in the service. This includes files and documents uploaded to OneDrive, SharePoint, and Teams, as well as email content. Data at rest is protected by BitLocker, Distributed Key Manager (DKM), and Customer Key for Microsoft 365. Depending on the service, data may also be stored in blob storage, with each chunk being encrypted using the key store.
- In transit: This state refers to data that is transferred between clients and services, as well as between different endpoints within the service and data centers. Data in transit is protected via Transport Layer Security (TLS) and IP Security (IPsec). TLS is typically used to secure application-layer traffic between clients and services, while IPsec secures the underlying physical or logical networking connections.
In addition to the built-in encryption technologies, customers can also apply unique content encryption to files and email messages using the AIP client. Not only does AIP provide data classification services (as described earlier), but it can also be used to encrypt content at the file or document level.
Organizations in highly regulated industries may be required to control the encryption keys that are used in the service. To accomplish this, organizations may use the Customer Key service, which allows them to manage the key life cycle and encrypt data in the following services:
- EXO, including Skype for Business Online and Microsoft Teams data stored in user mailboxes
- Files stored in OneDrive and SPO
Setting up the Customer Key service requires additional Azure services, such as Key Vault, and further considerations are out of the scope of this book.
Note
You can learn about Customer Key at https://learn.microsoft.com/en-us/ microsoft-365/compliance/customer-key-overview.