Security
To ensure confidentiality and privacy, our application has these features:
All data is encrypted at rest and in transit
No inbound connectivity to the Managed Application
Outbound to customer storage only (exception, billable user count goes to MS Billing API)
Information used for billing (user object id) is salted and hashed and stored in a Storage Account in the Managed Resource Group
The Managed Application uses Managed Identity to access MS Graph with read only
Azure Keyvault for secrets (Bsure personnel cannot access these secrets). The connection string to the Storage Account (provided by you - ) where user data is stored.
Examples
Example showing how the billing information is salted and hashed:
Example Bsure personnel accessing the Key Vault:
The Keyvault resides in the Managed Resource Group, but Bsure have no access to access the secrets.
Bsure have the Contributor RBAC role, which is not sufficient to read secrets, or elevate permission.
References:
Azure built-in RBAC roles: https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles
Azure built-in roles for Key Vault data plane operations: https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-guide?tabs=azure-cli#azure-built-in-roles-for-key-vault-data-plane-operations