Microsoft Azure. Microsoft Azure Security, Privacy, & Compliance

Similar documents
How To Get A Cloud Security System To Work For You

Microsoft Azure. White Paper Security, Privacy, and Compliance in

The Education Fellowship Finance Centralisation IT Security Strategy

White Paper How Noah Mobile uses Microsoft Azure Core Services

How to Build an End-to-End Secured Hybrid Cloud for Your Enterprise. Ekkarat Klinbubpa Henky Alimin Sanguan Thammarojsakul

Appendix D-1 to Aproove Saas Contract : Security and solution hosting provider specs.

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC!

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

Microsoft Azure. The cloud platform built for business. Tarmo Tikerpäe DC SSP Microsoft

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

Securing the Microsoft Cloud

PCI Compliance for Cloud Applications

BMC s Security Strategy for ITSM in the SaaS Environment

Securing the Microsoft Cloud

Addressing Cloud Computing Security Considerations

THE BLUENOSE SECURITY FRAMEWORK

Protecting Data and Privacy in the Cloud

GoodData Corporation Security White Paper

Cloud Computing Governance & Security. Security Risks in the Cloud

Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance. April 2015

PCI Requirements Coverage Summary Table

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Hosting Models. Business Model Software (as a Service) Platform (as a Service) Infrastructure (as a Service) On Premises. Applications. Data.

Cloud Security and Managing Use Risks

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Datacenters of the Past. Datacenter of the (New) Present Datacenter without boundaries. Devices

Assignment # 1 (Cloud Computing Security)

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

Security Controls for the Autodesk 360 Managed Services

Information Technology: This Year s Hot Issue - Cloud Computing

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Security Overview Enterprise-Class Secure Mobile File Sharing

2015 Techstravaganza The Microsoft Cloud

Implementing Microsoft Azure Infrastructure Solutions

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

VMware vcloud Air Security TECHNICAL WHITE PAPER

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Implementing Microsoft Azure Infrastructure Solutions

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

HEC Security & Compliance

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Building Secure Cloud Applications. On the Microsoft Windows Azure platform

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

PCI Requirements Coverage Summary Table

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Hans Bos Microsoft Nederland.

vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud 2014 VMware Inc. All rights reserved.

Big data variety, 179 velocity, 179 volume, 179 Blob storage containers

CLOUD SERVICES FOR EMS

Microsoft Azure. Rich Lilly Project Leadership Associates

Developing Microsoft Azure Solutions 20532B; 5 Days, Instructor-led

Microsoft Azure for IT Professionals 55065A; 3 days

MS 20532B - Developing Microsoft Azure Solutions

Famly ApS: Overview of Security Processes

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Securing the Cloud Infrastructure

Course Outline. Microsoft Azure Fundamentals Course 10979A: 2 days Instructor Led. About this Course. Audience Profile. At Course Completion

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Cloud Security. DLT Solutions LLC June #DLTCloud

Microsoft Azure Cloud oplossing als een extensie op mijn datacenter? Frederik Baert Solution Advisor

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Implementing Microsoft Azure Infrastructure Solutions

PCI DSS 3.0 Compliance

Security Information & Policies

Amazon Web Services: Risk and Compliance January 2013

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

Client Security Risk Assessment Questionnaire

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Microsoft is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries.

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Building Energy Security Framework

Cloud Security Trust Cisco to Protect Your Data

Implementing Microsoft Azure Infrastructure Solutions

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Hosted SharePoint: Questions every provider should answer

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5. Microsoft Azure Fundamentals M Length: 2 days Price: $ 1,295.

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

AZP: Microsoft Azure Infrastructure for IT Professional

Transcription:

Security, Privacy, & Compliance

Technology trends: driving cloud adoption BENEFITS Speed Scale Economics Cloud Trend: 70% 2 weeks to deliver new services vs. 6-12 months with traditional solution Scale from 30,000 to 250,000 site visitors instantly $25,000 in the cloud would cost $100,000 on premises of CIOs will embrace a cloud-first strategy in 2016 (IDC CIO Agenda webinar) 430B+ AD authentications 280% year-over-year database growth in 50% of Fortune 500 use AZURE ADOPTION 3

Cloud innovation OPPORTUNITY FOR SECURITY & COMPLIANCE BENEFITS Pre-adoption Benefits realized concern 94% 60% cited concerns around experienced security benefits data security they as didn t a barrier previously to adoptionhave on-premise 62% 45% concerned that the said privacy protection increased cloud would as a result in of a moving lack of data to the control cloud SECURTIY Design/Operation Infrastructure Network Identity/access Data PRIVACY COMPLIANCE

UNIFIED PLATFORM FOR MODERN BUSINESS Automated Managed Resources Elastic Usage Based 5

Trustworthy foundation BUILT ON MICROSOFT EXPERIENCE AND INNOVATION 1 st Microsoft Data Center Active Directory Trustworthy Computing Initiative Malware Protection Center SOC 1 UK G-Cloud Level 2 SOC 2 FedRAMP/ FISMA Operations Security Assurance 20+ Data Centers Microsoft Security Response Center Windows Update Global Data Center Services Security Development Lifecycle Digital Crimes Unit ISO/IEC 27001:2005 E.U. Data Protection Directive HIPAA/ HITECH CSA Cloud Controls Matrix PCI DSS Level 1

Trustworthy foundation BUILT ON MICROSOFT EXPERIENCE AND INNOVATION 1 st Microsoft Data Center Microsoft Windows Update Microsoft Security Response Center Global Data Center Services Trustworthy Computing Initiative 20+ Data Centers: FedRAMP/ Compliance Standards: Malware UK G-Cloud FISMA Protection Level 2 Active Investing Operating Center Microsoft Trustworthy Security Azure Computing Centers Directory heavily robust SOC 2 SOC 1 compliance processes, 11 data including centers Created around of the Excellence: the SDL which has ISO 27001, FedRAMP, world, and plus HIPAA 2 become in ChinaProtecting the industry Microsoft standard for developing customers secure by combatting software CSA Cloud Controls Matrix evolving threats Security Development Lifecycle Digital Crimes Unit E.U. Data Protection ISO/IEC Directive HIPAA/ 27001:2005 HITECH Operations Security Assurance 20+ Data Centers PCI DSS Level 1

Shared responsibility REDUCE SECURITY COSTS + MAINTAIN FLEXIBILITY, ACCESS, & CONTROL On-Premises IaaS PaaS SaaS Customer Microsoft

Transparency & independent verification AID CUSTOMERS IN MEETING SECURITY & COMPLIANCE OBLIGATIONS Third-party verification Access to audit reports Compliance packages Best practices and guidance Trust Center Cloud Security Alliance Security Response Center progress report Security intelligence report 9

Microsoft approach in action 10

Design & operations Software Development Lifecycle (SDL) Operational security controls Assume breach Incident response Security embedded in planning, design, development, & deployment Rigorous controls to prevent, detect, contain, & respond to threats Hardening cloud services through simulated real-world attacks Global, 24x7 incident response to mitigate effects of attacks

Security development lifecycle Education Process Accountability Administer and track security training Guide product teams to meet SDL requirements Establish release criteria & sign-off as part of FSR Incident Response (MSRC) Training Requirements Design Implementation Verification Release Response Ongoing Process Improvements

Assume breach Prevent Breach Threat model Code review Security testing Assume Breach War game exercises Live site penetration testing Centralized security logging & monitoring Assume breach identifies & addresses potential gaps Scope ongoing live site testing of security response plans to drastically improve mean time to detection & recovery Reduce exposure to internal attack (ensuring once inside, attackers do not have broad access) Periodic environment post breach assessment & clean state

Incident response DevOps Engaged Event Detected Security Team Engaged Event Start Incident Assessment Security Event Confirmed Customer Notification Customer Process Step 1 In-depth 9-step incident response process Focus on containment & recovery Determine Affected Customers Determine Customer Impact Azure Customer Notification Makes contractual commitments regarding customer notification 14

Infrastructure protection 24 hour monitored physical security Secure multi-tenant environment Firewalls Patch management System monitoring and logging Antivirus/antimalware protection Threat detection Forensics 15

Service security starts with physical data center Cameras 24X7 security staff Barriers Fencing Alarms Two-factor access control: Biometric readers & card readers Security operations center Seismic bracing Days of backup power Perimeter Building Computer room 16

Architected for secure multi-tenancy Customer Admin Portal SMAPI Fabric Controller Customer 1 Guest VM Customer 2 Guest VM Hypervisor Host OS End Users Guest VM Azure Storage SQL Database AZURE: Centrally manages the platform and helps isolate customer environments using the Fabric Controller Runs a configuration-hardened version of Windows Server as the Host OS Uses Hyper-V, a battle tested and enterprise proven hypervisor Runs Windows Server and Linux on Guest VMs for platform services CUSTOMER: Manages their environment through service management interfaces and subscriptions Chooses from the gallery or brings their own OS for their Virtual Machines 17

Firewall protection INTERNET Client AZURE: Corp Firewall VPN Cloud Access 443 Customer 1 Virtual Network 443 Application Tier Logic Tier Database Tier Restricts access from the Internet, permits traffic only to endpoints, and provides load balancing and NAT at the Cloud Access Layer Isolates traffic and provides intrusion defense through a distributed firewall CUSTOMER Applies corporate firewall using site-to-site VPN Configures endpoints Defines access controls between tiers and provides additional protection via the OS firewall 18

Patch management AZURE: Monthly MSRC Patch Review Monitor 100,000+ vulnerability reports Sourced from customers & worldwide network of security researchers Patching Rollout Prioritize critical updates Monthly OS releases with patches Scanning Scanning & reporting of all Azure VMs Track & remediate any findings Audit Validation Reconciliation report Resolution summary Applies regularly scheduled updates to the platform Releases critical patches immediately Rigorously reviews & tests all changes CUSTOMER: Applies similar patch management strategies for their Virtual Machines 19

Monitoring & logging Enable Monitoring Agent Portal SMAPI Customer Admin Alerting & reporting Events SIEM Admin View Guest VM Customer VMs Guest VM Azure Storage Cloud Services HDInsight Extract event information to SIEM or other Reporting System Event ID Computer Event Description Severity DateTime 1150 Machine1 Example security event 4 04/29/2014 2002 Machine2 Signature Updated Successfully 4 04/29/2014 5007 Machine3 Configuration Applied 4 04/29/2014 1116 Machine2 Example security event 1 04/29/2014 1117 Machine2 Access attempted 1 04/29/2014 AZURE: Performs monitoring & alerting on security events for the platform Enables security data collection via Monitoring Agent or Windows Event Forwarding CUSTOMER: Configures monitoring Exports events to SQL Database, HDInsight or a SIEM for analysis Monitors alerts & reports Responds to alerts 20

Antivirus/antimalware Enable & configure antimalware Portal SMAPI Customer Admin Alerting & reporting Azure Storage SIEM Admin View Guest VM Customer VMs Guest VM Events Cloud Services Extract Antimalware Health Events to SIEM or other Reporting System Event ID Computer Event Description Severity DateTime 1150 Machine1 Client in Healthy State 4 04/29/2014 2002 Machine2 Signature Updated Successfully 4 04/29/2014 5007 Machine3 Configuration Applied 4 04/29/2014 1116 Machine2 Malware Detected 1 04/29/2014 1117 Machine2 Malware Removed 1 04/29/2014 AZURE: Performs monitoring & alerting of antimalware events for the platform Enables real time protection, ondemand scanning, and monitoring via Microsoft Antimalware for Cloud Services and Virtual Machines CUSTOMER: Configures Microsoft Antimalware or an AV/AM solution from a partner Extracts events to SIEM Monitors alerts & reports Responds to alerts 21

Threat detection INTERNET End Users AZURE: THREAT DETECTION: DOS/IDS Capabilities Cloud Access & Firewall Customer Environment Virtual Network Performs big data analysis of logs for intrusion detection & prevention for the platform Employs denial of service attack prevention measures for the platform Regularly performs penetration testing Corp 1 VPN DOS/IDS Application Tier DOS/IDS Logic Tier DOS/IDS Database Tier CUSTOMER: Can add extra layers of protection by deploying additional controls, including DOS, IDS, web application firewalls Conducts authorized penetration testing of their applications 22

Forensics AZURE: Performs coordination, analysis of logs and VHD images in the event of platform-level incident CUSTOMER: Contacts Microsoft for forensic data when needed Uses standard security response and forensics processes 23

Network protection Network isolation Virtual Networks Cloud to on-premises connections Prevents traffic from other customers/ internet to customers private IP Addresses Connects one or more cloud service using private IP addresses Site to site, point to site, and ExpressRoute help enable secure connections to Azure 24

Network isolation Customer Admin Portal Smart SMAPI API Corp 1 INTERNET VPN Client Cloud Access Layer Customer 1 Isolated Virtual Network Web Endpoint (public access) Customer 2 RDP Endpoint (password access) Deployment X Deployment X Deployment Y VNET to VNET Isolated Virtual Networks Client AZURE: Does not enable general internet access by default, except remote administration endpoints configured when Virtual Machines are created in the Portal CUSTOMER: Configure endpoints for required access Creates connections to other cloud and onpremises resources 25

Virtual networks AZURE: Allows customers to create isolated virtual private networks CUSTOMER: Creates Virtual Networks with Subnets and Private IP addresses Enables communications between their Virtual Networks Can brings their own DNS Can domain join their Virtual Machines Corp 1 INTERNET VPN Cloud Access Customer 1 Customer 2 RDP Endpoint (password access) Subnet 1 Subnet 2 Subnet 3 Deployment X Deployment Y DNS Server Isolated Virtual Network VNET to VNET Isolated Virtual Networks Client

VPN connections Customer Site Computers Behind Firewall VPN Remote Workers Customer 1 Deployment X Isolated Virtual Network AZURE: Enables connection from customer sites and remote workers to Azure Virtual Networks using Site-to-Site and Point-to-Site VPNs CUSTOMERS: Configures the VPN client in Windows Manages certificates, policies, and user access 27

ExpressRoute connections Site 1 Site 2 ExpressRoute Peer WAN Customer 1 Deployment X Isolated Virtual Network AZURE: Offers private fiber connections via ExpressRoute Enables access to Compute, Storage, and other Azure services CUSTOMERS: Can establish connections to Azure at an ExpressRoute location (Exchange Provider facility) Can directly connect to Azure from your existing WAN network (such as a MPLS VPN) provided by a network service provider Manages certificates, policies, and user access 28

Identity & access Microsoft employee access management Enterprise cloud identity Azure AD Monitor & protect access to cloud apps Multi-Factor Authentication 29

Microsoft employee access management BLOBS TABLES QUEUES DRIVES Just in Time & Role-Based Access Pre-screened Admin requests access Leadership grants temporary privilege No standing access to the platform and no access to customer Virtual Machines Grants least privilege required to complete task Multi-factor authentication required for all administration Access requests are audited and logged Microsoft Corporate Network 30

Enterprise cloud identity Azure AD Azure Active Directory Active Directory Cloud Apps End Users AZURE: Provides enterprise cloud identity and access management Enables single sign-on across cloud applications Offers Multi-Factor Authentication for enhanced security CUSTOMER: Centrally manages users and access to Azure, O365, and hundreds of preintegrated cloud applications Builds Azure AD into their web and mobile applications Can extend on-premises directories to Azure AD 31

Monitor & protect access to cloud apps AZURE: Uses password hashes for synchronization Offers security reporting that tracks inconsistent traffic patterns, including: Sign ins from unknown sources Multiple failed sign ins Sign ins from multiple geographies in short timeframes Sign ins from suspicious IP addresses and suspicious devices CUSTOMER: Reviews reports and mitigates potential threats Can enable Multi-Factor Authentication User Non-user

Data protection Data encryption options Data segregation Data location and redundancy Data destruction 33

Encryption in transit Azure Portal Azure Data Center Azure Data Center AZURE: Encrypts most communication between Azure datacenters Encrypts transactions through Azure Portal using HTTPS Supports FIPS 140-2 CUSTOMER: Can choose HTTPS for REST API (recommended) Configures HTTPS endpoints for application running in Azure Encrypts traffic between Web client and server by implementing TLS on IIS

Encryption at rest Virtual Machines: Data drives full disk encryption using BitLocker Boot drives BitLocker and partner solutions SQL Server Transparent Data and Column Level Encryption Files & folders - EFS in Windows Server Storage: Bitlocker encryption of drives using Azure Import/Export service StorSimple with AES-256 encryption Applications: Client Side encryption through.net Crypto API RMS Service and SDK for file encryption by your applications 35

Data segregation Customer Admin Portal SMAPI Fabric Controller Customer 1 Guest VM Access Control Customer 2 Guest VM Hypervisor Host OS Azure Storage SQL Database End Users Guest VM Storage isolation: Access is through Storage account keys and Shared Access Signature (SAS) keys Storage blocks are hashed by the hypervisor to separate accounts SQL isolation: SQL Database isolates separate databases using SQL accounts Network isolation: VM switch at the host level blocks inter-tenant communication 36

Data location and redundancy AZURE: Creates three copies of data in each datacenter Offers geo-replication in a datacenter 400+ miles away Does not transfer Customer Data outside of a geo (ex: from US to Europe or from Asia to US) CUSTOMER: Chooses where data resides Configures data replication options Note: data centers, Australia Q2 FY15

Data destruction Data Deletion Index immediately removed from primary location Geo-replicated copy of the data (index) removed asynchronously Customers can only read from disk space they have written to Disk Handling Wiping is NIST 800-88 compliant Defective disks are destroyed at the datacenter 38

Privacy by design Privacy by Design Restricted data access & use Contractual commitments Privacy controls built into Azure design and operations Customer data is only used to provide the service and is never used for advertising Data Processing Agreements, EU Model Clauses, HIPAA BAA 10101010101010101010101010101010 1010101010101010101010101010101010101010101010101010

Restricted use Azure does not share data with its advertisersupported services Read the fine print of other cloud service provider s privacy statements Azure does not mine Customer Data for advertising 40

Contractual commitments EU Data Privacy Approval Microsoft meets high bar for protecting privacy of EU customer data Microsoft offers customers EU Model Clauses for transfer of personal data across international borders Microsoft s approach was approved by the Article 29 committee of EU data protection authorities the first company to obtain this Broad contractual scope Microsoft makes strong contractual commitments to safeguard customer data covered by HIPAA BAA, Data Processing Agreement, & E.U. Model Clauses Enterprise cloud-service specific privacy protections benefit every industry & region

Simplified compliance Information security standards Effective controls Government & industry certifications ISO 27001 SOC 1 Type 2 SOC 2 Type 2 FedRAMP/FISMA PCI DSS Level 1 UK G-Cloud HIPAA/HITECH

Continuous Compliance approach Security goals set in context of business and industry requirements Security analytics & best practices deployed to detect and respond to threats Benchmarked to a high bar of certifications and accreditations to ensure compliance Continual monitoring, test and audit Test and audit Security benchmark analysis Security Compliance Framework Security analytics Risk management best practices Ongoing update of certifications for new services 43

Certifications & programs Program ISO/IEC 27001 SOC 1 SSAE 16/ISAE 3402 SOC 2 FedRAMP/FISMA PCI DSS Level 1 UK G-Cloud IL2 HIPAA BAA Description The ISO/IEC 27001:2005 certificate validates that Azure has implemented the internationally recognized information security controls defined in this standard. Azure has also been audited against the Service Organization Control (SOC) reporting framework for SOC 1 Type 2 (formerly SAS 70), attesting to the design and operating effectiveness of its controls. Azure has been audited for SOC 2 Type 2, which includes a further examination of Azure controls related to security, availability, and confidentiality Azure has received Provisional Authorization to Operate from the Federal Risk and Authorization Management Program (FedRAMP) Joint Authorization Board (JAB), having undergone the assessments necessary to verify that it meets FedRAMP security standards. Azure has been validated for PCI-DSS Level 1 compliance by an independent Qualified Security Assessor (QSA). In the United Kingdom, Azure has been awarded Impact Level 2 (IL2) accreditation, further enhancing Microsoft and its partner offerings on the current G-Cloud procurement Framework and CloudStore. To help customers comply with HIPAA and HITECH Act security and privacy provisions, Microsoft offers a HIPAA Business Associate Agreement (BAA) to healthcare entities with access to Protected Health Information (PHI). 44

Microsoft commitment Unified platform for modern business

Trusted by leading companies 46

Talk to a Microsoft security expert Explore additional resources: Trustworthy Computing Cloud Services: www.microsoft.com/trustedcloud Microsoft Trust Center for : http://www.windowsazure.com/en-us/support/trust-center

Azure Active Directory 49

Azure Active Directory Active Directory

Azure Active Directory Heading Heading Heading Heading Content Content Content Content Content Content Content Content Content Content Content Content

Multi-Factor Authentication 52

Mutli-Factor Authentication

1 2

Express Route 55

Customers want on their network Customer site 2 Customer site 2 Azure Azure Customer site 1 WAN Customer site 1 WAN Public internet Public internet Customer DC IPsec VPN over Internet Greater networking costs and latency since data is hair pinned through a customer data center Data travels over the open Internet to connect to cloud Bandwidth is limited Customer DC Cloud on your WAN Avoids risks from exposure to Internet Avoids complexity and added costs Provides lower latency, higher bandwidth and greater availability

IPSec VPN and ExpressRoute Public internet Public internet Public internet

Compliance by Service Compute ISO/IEC 27001: 2005 SOC 1 and SOC 2 SSAE 16/ISAE 3402 Azure FedRAMP PCI DSS UK G-Cloud HIPAA BAA Virtual Machines Cloud Services Websites Mobile Services Data Services Storage SQL Database HDInsight Cache Backup Site Recovery App Services Active Directory Service Bus Media Services Notification Hubs Multi-Factor Authentication BizTalk Services Scheduler CDN Rights Management Service Network Services Virtual Network Traffic Manager ExpressRoute EU Model Clauses * In Progress Audit Certified