How OneDrive safeguards your data in the cloud (2024)

You control your data. When you put your data in OneDrivecloud storage, you remain the owner of the data. For more info about the ownership of your data, see Office 365 Privacy by Design.

See this training course to learnabout OneDrive features that you can use to protect your files, photos and data:Secure, protect and restore OneDrive

How you can safeguard your data

Here are some things you can do to help protect your files in OneDrive:

  • Create a strong password. Check the strength of your password.

  • Add security info to your Microsoft account. You can add info like your phone number, an alternate email address, and a security question and answer. That way, if you ever forget your password or your account gets hacked, we can use your security info to verify your identity and help you get back into your account. Go to the Security info page.

  • Use two-factor verification. This helps protect your account by requiring you to enter an extra security code whenever you sign in on a device that isn’t trusted. The second factor can be made through a phone call, text message, or app. For more info about two-step verification, see How to use two-step verification with your Microsoft account.

  • Enable encryption on your mobile devices. If you have the OneDrive mobile app, we recommend that you enable encryption on your iOS or Android devices. This helps to keep your OneDrive files protected if your mobile device is lost, stolen, or someone gains access to it.

  • Subscribe to Microsoft 365. An Microsoft 365 subscription gives you advanced protection from viruses and cybercrime, and ways to recover your files from malicious attacks.

How OneDrive protects your data

Microsoft engineers administer OneDrive using a Windows PowerShell console that requires two-factor authentication. We perform day-to-day tasks by running workflows so we can rapidly respond to new situations. No engineer has standing access to the service. When engineers need access, they must request it. Eligibility is checked, and if engineer access is approved, it's only for a limited time.

Additionally, OneDrive and Office 365, strongly invests in systems, processes, and personnel to reduce the likelihood of personal data breach and to quickly detect and mitigate consequence of breach if it does occur. Some of our investments in this space include:

Access control systems: OneDrive and Office 365 maintain a “zero-standing access” policy, which means that engineers do not have access to the service unless it is explicitly granted in response to a specific incident that requires elevation of access. Whenever access is granted it is done under the principle of least privilege: permission granted for a specific request only allows for a minimal set of actions required to service that request. To do this, OneDrive and Office 365 maintain strict separation between “elevation roles,” with each role only allowing certain pre-defined actions to be taken. The “Access to Customer Data” role is distinct from other roles that are more commonly used to administer the service and is scrutinized most heavily before approval. Taken together, these investments in access control greatly reduce the likelihood that an engineer in OneDrive or Office 365 inappropriately accesses customer data.

Security monitoring systems and automation: OneDrive and Office 365 maintain robust, real-time security monitoring systems. Among other issues, these systems raise alerts for attempts to illicitly access customer data, or for attempts to illicitly transfer data out of our service. Related to the points about access control mentioned above, our security monitoring systems maintain detailed records of elevation requests that are made, and the actions taken for a given elevation request. OneDrive and Office 365 also maintain automatic resolution investments that automatically act to mitigate threats in response to issues we detect, and dedicated teams for responding to alerts that cannot be resolved automatically. To validate our security monitoring systems, OneDrive and Office 365 regularly conduct red-team exercises in which an internal penetration testing team simulates attacker behavior against the live environment. These exercises lead to regular improvements to our security monitoring and response capabilities.

Personnel and processes: In addition to the automation described above, OneDrive and Office 365 maintain processes and teams responsible for both educating the broader organization about privacy and incident management processes, and for executing those processes during a breach. For example, a detailed privacy breach Standard Operating Procedure (SOP) is maintained and shared with teams throughout the organization. This SOP describes in detail the roles and responsibilities both of individual teams within OneDrive and Office 365 and centralized security incident response teams. These span both what teams need to do to improve their own security posture (conduct security reviews, integrate with central security monitoring systems, and other best practices), and what teams would need to do in the event of an actual breach (rapid escalation to incident response, maintain and provide specific data sources that will be used to expedite the response process). Teams are also regularly trained on data classification, and correct handling and storage procedures for personal data.

The major takeaway is that OneDrive and Office 365, for both consumer and business plans, strongly invest in reducing the likelihood and consequences of personal data breach impacting our customers. If a personal data breach does occur, we are committed to rapidly notifying our customers once that breach is confirmed.

Protected in transit and at rest

Protected in transit

When data transits into the service from clients, and between datacenters, it's protected using transport layer security (TLS) encryption. We only permit secure access. We won't allow authenticated connections over HTTP, but instead redirect to HTTPS.

Protected at rest

Physical protection: Only a limited number of essential personnel can gain access to datacenters. Their identities are verified with multiple factors of authentication including smart cards and biometrics. There are on-premises security officers, motion sensors, and video surveillance. Intrusion detection alerts monitor anomalous activity.

Network protection: The networks and identities are isolated from the Microsoft corporate network. Firewalls limit traffic into the environment from unauthorized locations.

Application security: Engineers who build features follow the security development lifecycle. Automated and manual analyses help identify possible vulnerabilities. The Microsoft Security Response Center helps triage incoming vulnerability reports and evaluate mitigations. Through the Microsoft Cloud Bug Bounty Terms, people across the world can earn money by reporting vulnerabilities.

Content protection: Each file is encrypted at rest with a unique AES256 key. These unique keys are encrypted with a set of master keys that are stored in Azure Key Vault.

Highly available, always recoverable

Our datacenters are geo-distributed within the region and fault tolerant. Data is mirrored into at least two different Azure regions, which are at least several hundred miles away from each other, allowing us to mitigate the impact of a natural disaster or loss within a region.

Continuously validated

We constantly monitor our datacenters to keep them healthy and secure. This starts with inventory. An inventory agent performs a state capture of each machine.

After we have an inventory, we can monitor and remediate the health of machines. Continuous deployment ensures that each machine receives patches, updated anti-virus signatures, and a known good configuration saved. Deployment logic ensures we only patch or rotate out a certain percentage of machines at a time.

The Microsoft 365 "Red Team" within Microsoft is made up of intrusion specialists. They look for any opportunity to gain unauthorized access. The "Blue Team" is made up of defense engineers who focus on prevention, detection, and recovery. They build intrusion detection and response technologies. To keep up with the learnings of the security teams at Microsoft, see Security Office 365 (blog).

Additional OneDrive security features

As a cloud storage service, OneDrive has many other security features. Those include:

  • Virus scanning on download for known threats - The Windows Defender anti-malware engine scans documents at download time for content matching an AV signature (updated hourly).

  • Suspicious activity monitoring - To prevent unauthorized access to your account, OneDrive monitors for and blocks suspicious sign-in attempts. Additionally, we’ll send you an email notification if we detect unusual activity, such as an attempt to sign in from a new device or location.

  • Ransomware detection and recovery - As an Microsoft 365 subscriber, you will get alerted if OneDrive detects a ransomware or malicious attack. You’ll be able to easily recover your ​files to a point in time before they were affected, up to 30 days after the attack. You can also your restore your entire OneDrive up to 30 days after a malicious attack or other types of data loss, such as file corruption, or accidental deletes and edits.

  • Version history for all file types - In the case of unwanted edits or accidental deletes, you can restore deleted files from the OneDrive recycle bin or restore a previous version of a file in OneDrive.

  • Password protected & expiring sharing links - As an Microsoft 365 subscriber, you can keep your shared files more secure by requiring a password to access them or setting an expiration date on the sharing link.

  • Mass file deletion notification and recovery - If you accidentally or intentionally delete a large number of files in your OneDrivecloud backup, we will alert you and provide you with steps to recover those files.

Personal Vault

OneDrive Personal Vault is a protected area in OneDrive that you can only access with a strong authentication method or a second step of identity verification, such as your fingerprint, face, PIN, or a code sent to you via email or SMS.1 Your locked files in Personal Vault have an extra layer of security, keeping them more secured in case someone gains access to your account or your device. Personal Vault is available on your PC, on OneDrive.com, and on the OneDrive mobile app, and it also includes the following features:

  • Scan directly into Personal Vault - You can use the OneDrive mobile app to take pictures or shoot video directly into your Personal Vault, keeping them off less secure areas of your device—such as your camera roll.2 You can also scan important travel, identification, vehicle, home, and insurance documents directly into your Personal Vault. And you’ll have access to these photos and documents wherever you go, across your devices.

  • BitLocker-encryption - On Windows 10 PCs, OneDrive syncs your Personal Vault files to a BitLocker-encrypted area of your local hard drive.

  • Automatic locking - Personal Vault automatically relocks on your PC, device, or online after a short period of inactivity. Once locked, any files you were using will also lock and require re-authentication to access.3

Together, these measures help keep your locked Personal Vault files protected even if your Windows 10 PC or mobile device is lost, stolen, or someone gains access to it.

1 Face and fingerprint verification requires specialized hardware including a Windows Hello capable device, fingerprint reader, illuminated IR sensor, or other biometric sensors and capable devices.
2 The OneDrive app on Android and iOS requires either Android 6.0 or above or iOS 12.0and above.
3 Automatic locking interval varies by device and can be set by the user.

Need more help?

How OneDrive safeguards your data in the cloud (1)

Contact Support
For help with your Microsoft account andsubscriptions, visit.

For technical support, go to Contact Microsoft Support, enter your problem and select Get Help. If you still need help, selectContact Supportto be routed to the best support option.

How OneDrive safeguards your data in the cloud (2)

Admins
Admins should view Help for OneDrive Admins, the OneDrive Tech Community or contactMicrosoft 365 for business support.

How OneDrive safeguards your data in the cloud (2024)

FAQs

How does OneDrive secure data? ›

Encryption: OneDrive uses 256-bit AES encryption to protect your data in transit and at rest. This is a robust encryption method that is widely used to secure data. Two-Factor Authentication: Two-factor authentication is fully supported by OneDrive, adding an extra layer of security to your account.

How SharePoint and OneDrive safeguard your data in the cloud? ›

Content protection: Each file is encrypted at rest with a unique AES256 key. These unique keys are encrypted with a set of master keys that are stored in Azure Key Vault.

Does OneDrive securely store all your files in the cloud to access view and edit from anywhere? ›

OneDrive lets you store all your work files in one secure place in the cloud. You can get to your files from any device, wherever you are, and you can share and collaborate with others on any file. On OneDrive, your files are backed up and protected. And you control if and when other folks can see them.

How confidential is OneDrive? ›

The OneDrive library provided for you is typically protected from public viewing by default. Only you can access personal documents and media files that you store in it unless you explicitly share a folder of documents or a single document with other people in your organization for reviewing or co-editing.

What is a disadvantage of using OneDrive? ›

The disadvantages of OneDrive are limited sharing options, limited file management, and limited desktop synchronisation settings. Limited Sharing Options: OneDrive's sharing options are limited compared to other cloud storage services, making sharing files with non-Microsoft users difficult.

Does OneDrive provide end-to-end encryption? ›

In a nutshell: Is OneDrive secure? ¶ Microsoft has stated that they use end-to-end encryption with AES 256-bit standard for uploads, downloads and backups. They also add another layer of security to OneDrive with two-factor authentication and the SSL/TLS encryption standard.

How SharePoint safeguards your data in the cloud? ›

Content level security

Data encryption: Encrypting data in transit and at rest is fundamental to SharePoint's security, protecting data from unauthorized access. Data loss prevention: DLP policies in SharePoint Online help identify, monitor, and protect sensitive information, preventing accidental sharing or leaks.

Is my data private on OneDrive? ›

OneDrive Personal Vault provides an extra layer of security by using Two-Factor Authentication (2FA), which helps ensure only you can access your critical information. Microsoft 365 Basic, Personal, and Family subscribers previously could only store a small number of files in their Personal Vault.

Is OneDrive more secure than SharePoint? ›

OneDrive gives leveraged security to business or personal documents when it's a matter of confidentiality but also constrains its users from sharing. While SharePoint is the solution that acts as more than a store, it allows its users to share files, calendars, and contacts, and work collaboratively.

Is OneDrive more secure than Google Drive? ›

Backup and Restore your files

If you are considering OneDrive vs Google Drive security in your decision, then OneDrive also has an extra security feature to protect your files. With OneDrive's restore function, you can restore your files in the past 30 days.

Can malware spread through OneDrive? ›

Yes, ransomware can infect OneDrive.

While OneDrive has security measures in place to protect against malware and ransomware, it is not immune to these threats. Ransomware is a type of malware that encrypts a user's files and demands a ransom in exchange for the decryption key.

Is OneDrive more secure than Dropbox? ›

Security. Both OneDrive and Dropbox use the same security protocols: 265-bit AES for files at rest and SSL/TLS when they're in transit. You can set up two-factor authentication on all plans; different business plans also allow multi-factor authentications and single sign-on (SSO). Sync speed.

Is OneDrive safe and secure? ›

OneDrive uses encryption to protect your data in transit and at rest, and also offers security features such as two-factor authentication, ransomware detection and recovery, and Personal Vault.

Should I save everything to OneDrive? ›

If you're working on a file by yourself, save it to OneDrive. Your OneDrive files are private unless you share them with others, which is particularly useful if you haven't created a team yet.

Can the OneDrive owner see my files? ›

Only you can see your OneDrive files. While a business administrator can see all folders in a business account, your colleagues can't see your documents unless you give them access. They are effectively the same as documents on your local drive, except they're hosted on Microsoft's cloud servers.

How do I make my OneDrive folder secure? ›

You can do this on the Onedrive website or in the Onedrive app depending on what platform you're using. Password protect the folder: From the Home screen, right-click on the new folder and select the “Password Protect” option. You'll be asked to enter a password, which will be used to secure your folder.

Can Microsoft employees see my OneDrive files? ›

Only you can see your OneDrive files. While a business administrator can see all folders in a business account, your colleagues can't see your documents unless you give them access. They are effectively the same as documents on your local drive, except they're hosted on Microsoft's cloud servers.

Top Articles
Latest Posts
Article information

Author: Saturnina Altenwerth DVM

Last Updated:

Views: 6666

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Saturnina Altenwerth DVM

Birthday: 1992-08-21

Address: Apt. 237 662 Haag Mills, East Verenaport, MO 57071-5493

Phone: +331850833384

Job: District Real-Estate Architect

Hobby: Skateboarding, Taxidermy, Air sports, Painting, Knife making, Letterboxing, Inline skating

Introduction: My name is Saturnina Altenwerth DVM, I am a witty, perfect, combative, beautiful, determined, fancy, determined person who loves writing and wants to share my knowledge and understanding with you.