<< Click to Display Table of Contents >> Data encryption |
Overview
To provide a higher data security level, Bizagi Cloud Platform features data encryption for data both at rest and in transit.
For data at rest, Transparent Data Encryption (TDE) technology is in place, while for data in transit, communication channels rely on the Transport Layer Security (TLS) protocol entailing the use of certificates to encrypt content.
Encryption at rest
Encryption for data at rest is performed at the page level by using TDE.
The pages are kept in an encrypted database using this technology and are encrypted before they are written to disk and decrypted when read into memory.
This measure prevents reading data from the physical media by potential attackers (i.e, stealing files), while supporting the use of highly secure algorithms such as AES and the use of a 256-bit symmetric key.
Data at rest in Azure Blob storage and Table storage is encrypted using Azure Storage Service Encryption (SEE). SSE can automatically encrypt data before it is stored, and it automatically decrypts the data when you retrieve it. The process is completely transparent to users. Storage Service Encryption uses 256-bit.
Key management
Bizagi does not provide, manage, or access the TDE root key and the SEE encryption key.
TDE root key is protected by a Microsoft internal secret store.
Data in the Azure Storage is encrypted with Microsoft-managed keys.
Bizagi Cloud Platform relies on the Microsoft-managed key option. The following table shows the management key parameters:
Management key parameters |
|
---|---|
Key management parameter |
Microsoft-managed keys |
Encryption/decryption operations |
All |
Azure Storage services supported |
All |
Key storage |
Microsoft key store |
Key rotation responsibility |
Microsoft |
Key control |
Microsoft |
Currently, Bizagi Cloud Platform does not support customer-managed or customer-provided keys options.
Encryption in transit
Encryption of data in transit is assured by using TLS certificates that protect the channel.
This applies both to communications between the service components and the database, and to the communication of end users when accessing Bizagi Cloud Platform (in which case, HTTPS is used).
This measure prevents tampering of packages, spoofing, and man-in-the-middle attacks at the transport layer.
Additional notes
As well as the above security measures, note that unauthorized access to the database is not allowed, and identity management for access to Bizagi Work Portal is under the administration of the customer.
For identity management, Bizagi Cloud Platform supports integrated authentication mechanisms with which Bizagi does not store the password used by users to authenticate in Bizagi portals. When Bizagi authentication is used (with no integrated identity provider system), Bizagi encrypts passwords by employing an AES algorithm that uses a 256-bit key.
Last Updated 12/12/2024 12:04:42 PM