In an earlier blog, we explained that Dynamics 365 offers more security and reliability than Microsoft Dynamics AX. This is a result of Microsoft securing your data in the cloud, so you do not have to worry about securing your own on-premises solutions anymore. But how exactly does Microsoft manage cloud security? This blog will walk you through Microsoft’s key security policies that help to keep your data safe.
Microsoft Dynamics 365 is powered by Azure, which is the world’s second-largest public cloud provider. With Azure, Microsoft invests more than a billion USD in cybersecurity each year. Microsoft also manages a Cyber Defense Operations Center which employs thousands of cybersecurity experts and is operational 24/7.
Azure also has the highest number of compliance offerings of any cloud provider. In fact, they have more than 90 compliance certifications which cover various regions, countries, and industries. Lastly, Azure safeguards the privacy of your data by leaving you in control. You determine whether, and for what purposes, your data is processed.
Physical datacenter security
Even though you no longer need to store your data in your on-premises solutions yourself, Microsoft still uses physical datacenters to store your data in the cloud. Azure has over 150 datacenters in more than 60 regions around the globe. There is strict control over physical access to these datacenters.
Access and privileges
Microsoft Dynamics 365 solutions have various layers of security which determine what information users in your organization have access to. These layers are:
- Role-based security: The role of a user or team determines what privileges they have. Most of these privileges are about creating, reading, writing, deleting, and sharing specific types of records.
- Record-based security: Per record, different access rights can be given to individual users or teams.
- Field-based security: Access to certain important fields can be restricted to individual users or teams.
To further protect your data, Azure encrypts it when at rest (i.e., stored on physical media) or in transit (i.e., moving from one location to another). Azure uses multiple encryption techniques and complies with various security standards.
This blog has outlined some of Microsoft’s cloud security policies, but of course, there are many more. Cloud computing is a complex topic – so if you are thinking about migrating to the cloud, Kaya can help you. With our experience and services, we can provide you with advice on your business’ cloud migration. If you are interested in discussing this possibility, please contact us.
See you in the next blog!