Overview of security for Azure Communications Gateway
The customer data Azure Communications Gateway handles can be split into:
- Content data, such as media for voice calls.
- Customer data provisioned on Azure Communications Gateway or present in call metadata.
Data retention, data security and encryption at rest
Azure Communications Gateway doesn't store content data, but it does store customer data.
- Customer data provisioned on Azure Communications Gateway includes configuration of numbers for specific communications services. It's needed to match numbers to these communications services and (optionally) make number-specific changes to calls, such as adding custom headers.
- Temporary customer data from call metadata is stored for a maximum of 30 days and used to provide statistics. After 30 days, data from call metadata is no longer accessible to perform diagnostics or analysis of individual calls. Anonymized statistics and logs produced based on customer data are available after the 30 days limit.
Azure Communications Gateway doesn't support Customer Lockbox for Microsoft Azure. However Microsoft engineers can only access data on a just-in-time basis, and only for diagnostic purposes.
Azure Communications Gateway stores all data at rest securely, including provisioned customer and number configuration and any temporary customer data, such as call records. Azure Communications Gateway uses standard Azure infrastructure, with platform-managed encryption keys, to provide server-side encryption compliant with a range of security standards including FedRAMP. For more information, see encryption of data at rest.
Encryption in transit
All traffic handled by Azure Communications Gateway is encrypted. This encryption is used between Azure Communications Gateway components and towards Microsoft Phone System.
- SIP and HTTP traffic is encrypted using TLS.
- Media traffic is encrypted using SRTP.
When encrypting traffic to send to your network, Azure Communications Gateway prefers TLSv1.3. It falls back to TLSv1.2 if necessary.
TLS certificates for SIP
Azure Communications Gateway uses mutual TLS for SIP, meaning that both the client and the server for the connection verify each other.
You must manage the certificates that your network presents to Azure Communications Gateway. By default, Azure Communications Gateway supports the DigiCert Global Root G2 certificate and the Baltimore CyberTrust Root certificate as root certificate authority (CA) certificates. If the certificate that your network presents to Azure Communications Gateway uses a different root CA certificate, you must provide this certificate to your onboarding team when you connect Azure Communications Gateway to your networks.
We manage the certificate that Azure Communications Gateway uses to connect to your network, Microsoft Phone System and Zoom servers. Azure Communications Gateway's certificate uses the DigiCert Global Root G2 certificate as the root CA certificate. If your network doesn't already support this certificate as a root CA certificate, you must download and install this certificate when you connect Azure Communications Gateway to your networks.
Cipher suites for SIP and RTP
The following cipher suites are used for encrypting SIP and RTP.
Ciphers used with TLSv1.2
Ciphers used with TLSv1.3
Ciphers used with SRTP