Computing in the cloud raises questions about security, data protection, privacy, and data ownership. Microsoft Azure is hosted in Microsoft data centers around the world, and it is designed to offer the performance, scalability, security, and service levels business customers expect. We have applied state-of-the-art technology and processes to maintain consistent and reliable access, security, and privacy for every user. Azure has built-in capabilities for compliance with a wide range of regulations and privacy mandates.
This response document provides customers a straightforward process for evaluating Azure’s security, privacy and compliance capabilities and its commitments to trust and transparency using industry-accepted standards and practices as defined in the Cloud Security Alliance (CSA) Cloud Control Matrix (CCM). Note that this document is intended to provide information on how Azure operates. Customers have a responsibility to control and maintain their environment once the service has been provisioned (i.e., user access management and appropriate policies and procedures in accordance with their regulatory requirements).
For more information, please visit http://www.azure.com.
Date Listed: March 30, 2012
Last Modified: November 09, 2015.
Additional InfoWhat is this?
Service category: Cloud Infrastructure
Service supports enterprise identity.
Service supports file sharing.
Service supports a mobile app.
Service performs penetration testing.
|Cloud Controls Matrix||Download|