Skip to main content

Third-party tests

Cloud security

This section explains how the product performs against the NCSC Cloud Security Principles.

1. Data encryption

Data in transit

Data at rest

2. Authentication and access control

Privilege separation

User accounts are seperated into three levels of privilege:

3. Security logging and incident management

Logging and event collection

The service records an audit log of all changes and important events, including account lockout and disabling two-factor authentication.

Availability of logs

Logs are available to administrators using the Audit History link in the app's navigation bar.

Incident response process

The service has a documented incident response process with identified responsibilities.

Security updates

Scheduled platform security updates are applied as soon as they're available on the second Tuesday of each month (Patch Tuesday). Unscheduled platform security updates are also applied as soon as they're available.

Vulnerability disclosure process

Reporting security issues should use the process in the vulnerability disclosure policy and referenced in the standard security.txt file.

4. Governance

Privacy policy

Our privacy policy explains how data is processed.

Data location and legal jurisdiction

Data is processed and stored in Azure data centers based in the UK.

Product security features

The following security features are available by default with no additional configuration: