This document provides an overview of the high-level security components of Microsoft® Cloud and Financial Performance Suite (FPS).
Microsoft® Cloud offers the industry's highest level of security and certification, going beyond what any internal data center would offer. All Microsoft® Cloud's organization certifications are listed here by their logos. More information can be found at the site referenced after the logos. You are encouraged to examine this information and compare the offering with what an internal data center or private cloud would have to offer.
A complement of layered defense and security in-depth strategies is architected into the overall FPS solution to ensure that your data is secure inside the data center. FPS uses the Microsoft® Cloud Geo Region boundaries to ensure that your sensitive data only resides on U.S. data centers. At each tier of the solution (Network, Database, and Application), multiple security measures are deployed to harden security. Monitoring and Alerting are integrated into the security solution.
The Microsoft® Cloud creates a virtual network around the FPS application. The isolation boundary prevents virtual machines used by the FPS application from communicating with virtual machines in any other virtual network. This isolation allows us to ensure that communication remains private within the application.
FPS uses security groups within our application to list the servers that are allowed to talk to other servers and the ports that they are allowed to use. This security practice means that the web server inside the data center is only able to talk to the database over a single port and is not allowed to communicate with any other machine.
All communication within the data center is done over SSL, meaning your data is always encrypted during transport. There are no exceptions to this rule.
Microsoft® Cloud enables allowlisting of IP addresses at two levels, and FPS adds a third:
FPS uses Transparent Data Encryption to encrypt the entire database at rest. The keys for this encryption are rotated every 90 days. FPS uses auditing and altering features to log every action that is performed on the database. This data is mined to look for anomalous actions.
FPS has undergone both internal and external security audit testing focusing on a wide array of potential vulnerabilities. This testing is part of the standard secure software development lifecycle for FPS. The FPS application explicitly protects against these vulnerabilities:
FPS does extension auditing of SQL operations, which allows for the examination of events such as:
FPS also can provide alerts on this auditing information by sending emails to administrators when certain events are triggered.
FPS uses Microsoft® Cloud's B2C offering. This offering allows us to report on various aspects of users in the system. The reports are segmented into several distinct categories:
Security focus is at the forefront of the architectural design, application development, systems management, and implementation of this product. You are encouraged to contact your sales representative with any follow-up questions or concerns that you have with Microsoft® Cloud or FPS relating to the security of your data.