Share via


Network security overview

How do Microsoft online services secure the network boundary?

Microsoft online services employ multiple strategies for securing its network boundary, including automated detection and prevention of network-based attacks, specialized firewall devices, and Exchange Online Protection (EOP) for anti-spam and anti-malware protection. In addition, Microsoft online services separate their production environments into logically isolated network segments, with only necessary communication permitted between segments. Network traffic is secured using additional network firewalls at boundary points to help detect, prevent, and mitigate network attacks.

How do Microsoft online services defend against DDoS attacks?

Microsoft's large internet presence insulates it from the negative effects of many distributed denial-of-service (DDoS) attacks. Distributed instances of each Microsoft online service and multiple routes to each service limit the impact of DDoS attacks against the system. This redundancy improves Microsoft online services' ability to absorb DDoS attacks and increases the amount of time available to detect and mitigate DDoS attacks before they impact service availability.

In addition to Microsoft's redundant system architecture, Microsoft uses sophisticated detection and mitigation tools to respond to DDoS attacks. Special-purpose firewalls monitor and drop unwanted traffic before it crosses the boundary into the network, reducing stress on systems located inside the network boundary. To further protect our cloud services, Microsoft utilizes a DDoS defense system deployed as part of Microsoft Azure. The Azure DDoS defense system is designed to withstand attacks from the outside and from other Azure tenants.

Microsoft's online services are regularly audited for compliance with external regulations and certifications. Refer to the following table for validation of controls related to network security.

Azure and Dynamics 365

External audits Section Latest report date
SOC 1
SOC 2
SOC 3
VM-1: Security event logging
VM-3: Intrusion detection and monitoring
VM-4: Malicious events investigation
VM-6: Vulnerability scanning
VM-7: Network device configuration
VM-8: Penetration testing
VM-9: Network device security event logging
VM-13: Network device vulnerability mitigation
May 20, 2024

Microsoft 365

External audits Section Latest report date
FedRAMP SC-5: Denial of service protection
SC-7: Boundary protection
SI-2: Flaw remediation
SI-3: Malicious code protection
SI-8: Spam protection
August 21, 2024
SOC 1 CA-27: Vulnerability Scanning August 1, 2024
SOC 2 CA-27: Vulnerability Scanning
CA-45: Anti-malware
January 23, 2024