Intune Privacy and Data Protection Overview
Intune Privacy and Data Protection Overview
Microsoft Intune
Privacy and data protection overview
The Microsoft Intune service can help organizations manage and secure
mobile devices, applications, and PCs across Windows, Windows Phone,
Apple iOS, and Google Android platforms. Because it is cloud-based and
hosted in Microsofts data centers, Intune requires no additional
infrastructure, but organizations can use the service to extend existing
management infrastructure into the cloud. In addition to enhancing
device security by providing update and policy management, Intune can
help organizations give employees access on their own devices to the
apps and resources they need, making Bring Your Own Device (BYOD)
programs a reality.
Relying on Microsoft Intune to
manage organizations devices
requires trust, but before
customers give that trust, they
want to know the answer to
questions like:
Microsoft Intune
Physical
security
Security for the service starts in
the data center. The Microsoft
Cloud Infrastructure and
Operations Group (MCIO)
delivers the core infrastructure
and foundational technologies
for Microsofts more than 200
online businesses, including
Bing, Hotmail, MSN, Microsoft
Office 365, Xbox Live, and the
Microsoft Azure platform.
MCIO hosts Microsoft Intune in
its data centers, which are
strategically located around the
world. It brings all of this
experience to Intune.
MCIO controls personnels
physical access to data centers
by using two-tier
authentication, including proxy
card access readers and
biometric readers. On a
quarterly basis, a Microsoft
security officer sends reports to
personnel with authority to
approve data center access.
Authorized personnel regularly
review the list to verify that all
people on that list still require
access and have the least
privileged access level
necessary to perform their job
functions.
Respected non-Microsoft
registrars and accreditation
organizations regularly audit
MCIO data centers in support
Personnel
security
Security starts with people, and
Intune is no exception.
Beginning with the hiring
process, all U.S.-based
Microsoft employees and
subcontractors with access to
customer data go through
standard background checks as
permitted by law, which include
a review of candidates
education, employment, and
criminal history. In addition to
standard background checks
for all new personnel,
personnel must undergo
Microsoft Intune
additional background checks
if they are to have access to
customer data or manage key
physical or logical access
controls. Additional verification
includes checks against export
control lists, such as the Office
of Foreign Assets Control List,
the Bureau of Industry and
Security List, and the
Directorate of Defense Trade
Controls Debarred Parties List.
To protect the privacy of its
employees and subcontractors,
Microsoft does not share the
results of background checks
with customers.
Security awareness, data
protection, and privacy are key
topics of this training. Microsoft
also requires that all personnel
complete business conduct
training each year.
We follow principles of
segregation of duties and least
privilege. Although physical
access to data centers is
generally limited to MCIO staff,
select Microsoft Intune
personnel have logical access
to the Microsoft Intune service
and data hosted in the data
centers. Employees are
accountable for their
handling of customer data.
Microsoft enforces this
accountability through a
process that includes system
controls, such as the use of
unique user names, rolebased access, and two-
Architecture
security
The following sections offer an
overview of security for
architectural components,
including:
Client installation and
enrollment on PCs
Mobile devices, such as
Windows Phone
Account, Administrator, and
Company Portals
Identity and authentication
Microsoft System Center
2012 Configuration Manager
Client
installation
on PCs
Mobile
devices
Account
Identity,
System Center
Administrator, authentication Configuration
Company
Manager
Portals
Microsoft Intune
to it (e.g., use access control
lists to secure it)
https://technet.microsoft.com/l
ibrary/dn646962.aspx.
Mobile devices
Account, Administrator,
and Company Portals
again.
NOTE Organizations can configure the Remember Me
option in Active Directory
Federation Services (AD FS) to
automatically sign users in for a
specific timeframe. This
configuration supersedes the
total timeout in Intune.
Identity and
authentication
Intune uses Azure Active
Directory (Azure AD) as its
authentication platform. To
provide users with a single
sign-on (SSO) experience,
businesses can connect their
on-premises directories with
Azure AD. The Intune
administrator then adds users
to the Intune user group, giving
them seamless access to Intune
when they sign into the
corporate network. There are
two options for authentication
when connected to Azure AD:
Federation with AD FS and
Password Sync. With AD FS,
users credentials never leave
the domain network while with
Password Sync the hash of
users passwords is
synchronized to the cloud.
Use the latest directory
integration tools from
Microsoft in order to configure
single sign for Intune. For more
information about connecting
on-premises directories to the
cloud, see this article at
Microsoft Intune
https://azure.microsoft.com/do
cumentation/articles/activedirectory-aadconnect
Privacy
Customer Data is defined as all
data, including all text, sound,
video or image files, and
software that are provided to
Microsoft by, or on behalf of,
Customer through use of the
Online Service. For example,
this includes inventory
information from managed
devices or apps which have
been installed through Intune.
Customers can access their own
Customer Data at any at any
time and for any reason
without assistance from
Microsoft. Microsoft will not
Microsoft Intune
use Customer Data or derive
information from it for
advertising. We will use
Customer Data only to provide
the service or for purposes
compatible with providing the
service.
It is ultimately up to our
customers to evaluate our
offerings against their own
requirements, so they can
determine if our services satisfy
their regulatory needs. We are
committed to providing our
customers detailed information
about our cloud services to
help them make their own
regulatory assessments.
Microsoft does not create
customer accounts; the
customer creates the accounts
either directly in Intune
Administrator Console, or in
their local Active Directory,
where the accounts can then
Data protection
Intune collects customer data
only to provide and troubleshoot the service. Data the
Intune service collects includes:
Device names and inventory
data used to provide the
service.
Administrator data, including
the name, address, phone
number, and email address
of the account owner and IT
administrators (Microsoft
uses this data to provide the
Online Service, complete
transactions, administer the
Microsoft Intune
account and detect and
prevent fraud.)
There are three types of data
collected from mobile devices
managed by Intune:
1. Hardware inventory This
information is provided by the
mobile device operating
system (Windows, iOS, and
Android) and may be different
based on each OS. Such
information could include:
Name
Manufacturer
Model
Operating system
Processor
Serial number
OS version
Cellular technology
Jailbreak status
Free/Total space
Exchange Device ID
Wi-Fi MAC address
Ethernet MAC address
Device encryption status
Name
Version
ID
Installation location
Size
Phone logs
Contacts, email, calendar
information
Documents
Text (SMS) messages
Video/photos
GPS information
Web browsing history
Data locality
Microsoft has a regionalized
data center strategy. The
customers country or region,
which the customers
administrator inputs during
initial setup of the services,
determines the primary storage
location for that customers
data. For example, if a customer
in the United Kingdom creates
an Intune subscription, their
subscription will be created and
customer data stored in a
Microsoft data center located
in a European Union (EU)
country.
Microsoft Intune
To help ensure service
availability, Intune follows a
business continuity methodology that enables data center
failover within a given region:
Primary data centers A primary
data center is where the
application software and
customer data running on the
software are located. For all
customers located in North
America, the primary data
centers are located in United
States. If North American
customers access their
Microsoft Intune subscriptions
from another region, such as
the European Union, they will
still be using data stored in
North America. If you subscribe
to Intune from a region other
than North America, then the
web pages and data you view
will be hosted in that regions
data center.
Backup data centers A backup
data center is used for failover
purposes. All primary data
centers have backup data
centers in the same region. If
the primary data center ceases
to function for any reason, the
service is designed to make the
application software and
customer data available from
the backup data center.
Customers might not be
notified when failover occurs.
Depending on the particular
service that fails, failover may
not result in service
interruption.
Data disposition
Microsoft believes that
customers own their own data.
When customers do not renew
their Microsoft Intune
subscriptions (i.e., they
terminate or allow their
subscriptions to expire), their
subscriptions move through
the following states:
Warning state Their
subscriptions initially go into a
warning state during which
they can continue to use the
service and their Customer
Data is available. They have 30
days to renew their
subscriptions, and during this
time they will receive
notifications.
Data disposition
90 days
Data removal
Retention
period
30 days
Expiration
Suspended state
Warning state
Microsoft Intune
subscriber data by contacting
our Customer Support team. If
they do not provide specific
instructions to delete their data,
we follow the 90 day retention
period. There is no 30 day
suspend state or warning. At
the end of the 90 day retention
period, Intune removes
Customers Data within 30 days
of the end of the retention
period.
Independent
verification
Intune is compliant with many
world-class industry standards,
and it is verified by third
parties. Independent
verification of Intune includes:
Certified for International
Organization for
Standardization (ISO) 27001
ISO 27001 is one of the best
security benchmarks available
across the world.
Intune has implemented the
rigorous set of physical, logical,
process, and management
controls ISO 27001 defines.
Intune has also adopted the
uniform international code of
practice for cloud privacy,
ISO/IEC 27018, which governs
the processing of personal
information by cloud service
providers. ISO 27018 is the first
international set of privacy
controls in the cloud and
Microsoft was the first to adopt
its code of practice.
Examples of service
organizations are insurance
and medical claims processors,
hosted data centers,
application service providers,
and managed security
providers. SSAE 16 and ISAE
3402 audits are independent
verifications of compliance with
and effectiveness of security
controls.
10
Microsoft Intune
controls is presented fairly
Whether the service
organizations controls are
designed effectively
Whether the service
organizations controls are
placed in operation as of a
specified date
Microsofts SSAE 16/ISAE 3402
audits are conducted once per
year by an external third party
(one of the Big Four
accounting firms).
The audit report produced
includes an opinion of the
controls by the external third
party. Intune has undergone
SSAE 16 (Service Organization
Control [SOC] 1, SOC 2, SOC 3)
Type I and Type II audits. For
more information about the
standard and types of audits,
go to www.aicpa.org.
MCIO provides infrastructure
services (data centers and
networking) for both Microsoft
itself (including the Intune
service) and its customers.
MCIO is SSAE 16 (SOC 1, SOC 2,
SOC 3) Type II certified today.
The SSAE 16 report for
Microsoft Intune represents the
application layer controls for
the service. Together with the
MCIO report pertaining to the
infrastructure layer, the audit
reports provide an end-to-end
representation of controls in
place.
11
Microsoft Intune
Conclusion
Intune can help any business
reduce the cost and complexity
of managing PCs, mobile
devices, and applications. It can
even help businesses adapt to
entirely new scenarios, such as
BYOD. But no business can
move management into a
cloud-based service without
understanding its security
practices and technologies.
To that end, Microsoft built
Intune to meet the high bar
required to gain business
confidence and trust. Microsoft
built the service leveraging its
years of experience providing
sophisticated cloud and onpremises solutions. Intune
makes it easy for businesses to
access and use its services while
helping keep their data private
and secure in its data centers.
To learn more about Intune,
visit
http://www.microsoft.com/
intune
Additional
resources
To learn more about Intune
security in the data center, see:
Microsoft Intune Trust Center
Frequently Asked Questions
at
http://aka.ms/intunetrustcen
terfaq
Microsoft Online Services at
http://www.microsoft.com/
online
Microsoft MCIO at
http://www.microsoft.com/
datacenters
Microsoft Trustworthy
Computing at http://www.
microsoft.com/twc
12
Microsoft Intune