Microsoft Azure

Total Page:16

File Type:pdf, Size:1020Kb

Microsoft Azure Microsoft Corporation - Microsoft Azure (Azure & Azure Government) SOC 3 Report April 1, 2017 - March 31, 2018 Table of contents Section I: Independent Service Auditors’ Report 2 Section II: Management’s Assertion 4 Section III: Description of Microsoft Azure System 6 Section I: Independent Service Auditors’ Report 1 Deloitte & Touche LLP 925 Fourth Avenue, Suite 3300, Seattle, WA 98104-1126 Tel: +1 206 716 7000 Section I: Independent Service Auditors’ Report Microsoft Corporation One Microsoft Way Redmond, WA, 98052-6399 We have examined the effectiveness of Microsoft Azure and Microsoft datacenters (the “Service Organization” or “Azure”) controls related to Azure’s in-scope services, for Azure and Azure Government cloud environments, to meet the criteria for the security, availability, processing integrity, and confidentiality principles (“applicable 1 2 trust services criteria”) , during the period April 1 2017 to March 31, 2018 , based on the American Institute of Certified Public Accountants’ (AICPA) 2016 edition of TSP section 100A, Trust Services Principles and Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy. Azure’s management is responsible for maintaining the effectiveness of these controls. Our responsibility is to express an opinion based on our examination. Our examination was conducted in accordance with attestation standards established by the AICPA, and accordingly, included (1) obtaining an understanding of the controls related to Azure’s in-scope services, for Azure and Azure Government cloud environments, to meet the applicable trust services criteria (2) testing and evaluating the operating effectiveness of the Service Organization’s controls, and (3) performing such other procedures as we considered necessary in the circumstances. We believe that our examination provides a reasonable basis for our opinion. Because of the nature and inherent limitations of controls, the Service Organization’s ability to meet the aforementioned criteria may be affected. For example, controls may not prevent or detect and correct error or fraud, unauthorized access to systems and information, and failure to comply with internal and external policies or requirements. Also, the projection of any conclusions based on our findings to future periods is subject to the risk that changes may alter the validity of such conclusions. In our opinion, the Service Organization maintained, in all material respects, effective controls to meet the applicable trust services criteria during the period April 1, 2017 to March 31, 2018 to provide reasonable assurance that: • the system was protected against unauthorized access, use or modification, • the system was available for operation and use as committed or agreed, • information within the system, designated as “confidential”, was protected as committed or agreed, and • the system processing was complete, valid, accurate, timely, and authorized based on the AICPA’s trust services principles and criteria for security, availability, processing integrity, and confidentiality. April 30, 2018 1 Applicable Trust Services Principles for Microsoft datacenters are Security and Availability. 2 In-scope services and coverage periods are defined in the Azure and Azure Government Report Scope Boundary and Azure Supporting Infrastructure Services subsections in Section III of this SOC 3 report. Applicability of the Processing Integrity Trust Services Principle is defined in the Azure and Azure Government Report Scope Boundary subsection. In-scope datacenters and coverage periods are defined in the Locations Covered by this Report subsection in Section III of this SOC 3 report. 2 Section II: Management’s Assertion 3 Section II: Management’s Assertion Microsoft Azure and Microsoft datacenters (“Azure”) maintained effective controls over the security, availability, 3 processing integrity, and confidentiality (“applicable trust services criteria”) of the system relating to Azure’s in-scope services, for Azure and Azure Government cloud environments, throughout the period April 1, 2017 to 4 March 31, 2018 , to provide reasonable assurance that: • the system was protected against unauthorized access, use or modification, • the system was available for operation and use as committed or agreed, • information within the system, designated as “confidential”, was protected as committed or agreed, and • the system processing was complete, valid, accurate, timely, and authorized based on the 2016 edition of TSP section 100A, Trust Services Principles and Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Principles and Criteria) for security, availability, processing integrity and confidentiality. The following description of the system identifies the aspects of the Azure’s in-scope services covered by this assertion. Microsoft Azure 3 Applicable trust services criteria for Microsoft datacenters are Security and Availability. 4 In-scope services and coverage periods are defined in the Azure and Azure Government Report Scope Boundary and Azure Supporting Infrastructure Services subsections in Section III of this SOC 3 report. Applicability of the Processing Integrity Trust Services Principle is defined in the Azure and Azure Government Report Scope Boundary subsection. In-scope datacenters and coverage periods are defined in the Locations Covered by this Report subsection in Section III of this SOC 3 report. 4 Section III: Description of the Microsoft Azure System 5 Section III: Description of Microsoft Azure System Overview of Operations Business Description Microsoft Azure is a cloud computing platform for building, deploying and managing applications through a global network of Microsoft and third-party managed datacenters. It supports both Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) cloud service models, and enables hybrid solutions that integrate cloud services with customers’ on-premises resources. Microsoft Azure supports many customers, partners, and government organizations that span across a broad range of products and services, geographies, and industries. Microsoft Azure is designed to meet their security, confidentiality, and compliance requirements. Microsoft datacenters support Microsoft Azure and many other Microsoft Online Services (“Online Services”). Online Services such as Intune, Power BI, and others are Software as a Service (SaaS) services that leverage the underlying Microsoft Azure platform and datacenter infrastructure. See section titled Azure and Azure Government Report Scope Boundary for the Microsoft Azure services and Online Services that are in scope for this report. “Azure”, when referenced in this report, comprises of “Microsoft Azure”, “Online Services”, and the supporting datacenters listed in this report. Azure and Azure Government Report Scope Boundary Azure is a global multi-tenant cloud platform that provides a public cloud deployment model. Azure Government is a US Government Community Cloud (GCC) that is physically separated from the Azure cloud. The following Azure and Azure Government services are in scope for this report: Cloud Environment Examination Period Product Scope 5 Offering / Service Scope Category Azure Azure Q2 Q3 Q4 Q1 Government 2017 2017 2017 2018 Microsoft Datacenters Microsoft Datacenter and Operations Service ✓ ✓ ✓ ✓ ✓ ✓ 5 Examination Period scope Q2 2017 extends from April 1, 2017 to June 30, 2017. Examination Period scope Q3 2017 extends from July 1, 2017 to September 30, 2017. Examination Period scope Q4 2017 extends from October 1, 2017 to December 31, 2017. Examination Period scope Q1 2018 extends from January 1, 2018 to March 31, 2018. 6 Cloud Environment Examination Period Product Scope 5 Offering / Service Scope Category Azure Azure Q2 Q3 Q4 Q1 Government 2017 2017 2017 2018 Azure Compute Batch ✓ ✓ ✓ ✓ ✓ ✓ Cloud Services ✓ ✓ ✓ ✓ ✓ ✓ Functions6 ✓ ✓ ✓ ✓ ✓ ✓ Service Fabric ✓ ✓ ✓ ✓ ✓ ✓ SQL Server on Virtual Machines ✓ ✓ ✓ ✓ ✓ ✓ Virtual Machines ✓ ✓ ✓ ✓ ✓ ✓ Azure Reserved Virtual Machine ✓ - - - ✓ ✓ Instances Virtual Machines Scale Sets ✓ ✓ ✓ ✓ ✓ ✓ Networking Application Gateway ✓ ✓ ✓ ✓ ✓ ✓ Azure DNS6 ✓ ✓ ✓ ✓ ✓ ✓ Content Delivery Network ✓ - - - - ✓ ExpressRoute ✓ ✓ ✓ ✓ ✓ ✓ Load Balancer ✓ ✓ ✓ ✓ ✓ ✓ Network Watcher6 ✓ ✓ - ✓ ✓ ✓ Traffic Manager ✓ ✓ ✓ ✓ ✓ ✓ Virtual Network ✓ ✓ ✓ ✓ ✓ ✓ VPN Gateway ✓ ✓ ✓ ✓ ✓ ✓ Storage Backup ✓ ✓ ✓ ✓ ✓ ✓ Data Lake Store ✓ - ✓ ✓ ✓ ✓ Import / Export ✓ ✓ ✓ ✓ ✓ ✓ Site Recovery ✓ ✓ ✓ ✓ ✓ ✓ Storage (Blobs, Disks, Files, Queues, ✓ ✓ ✓ ✓ ✓ ✓ Tables) including Cool and Premium 6 Examination Period for this service for Azure Government is from January 1, 2018 to March 31, 2018. 7 Cloud Environment Examination Period Product Scope 5 Offering / Service Scope Category Azure Azure Q2 Q3 Q4 Q1 Government 2017 2017 2017 2018 StorSimple ✓ ✓ ✓ ✓ ✓ ✓ Web + Mobile App Service ✓ ✓ ✓ ✓ ✓ ✓ App Service: API Apps ✓ ✓ ✓ ✓ ✓ ✓ App Service: Mobile Apps ✓ ✓ ✓ ✓ ✓ ✓ App Service: Web Apps ✓ ✓ ✓ ✓ ✓ ✓ Azure Search ✓ - - ✓ ✓ ✓ Media Services ✓ ✓ ✓ ✓ ✓ ✓ Containers Container Registry ✓ - ✓ ✓ ✓ ✓ Azure Container Service (ACS) ✓ - ✓ ✓ ✓ ✓ Azure Kubernetes Service (AKS) ✓ - - - - ✓ Databases Azure Cosmos DB6 ✓ ✓ ✓ ✓ ✓ ✓ Azure Database for MySQL ✓ - ✓ ✓ ✓ ✓ Azure Database for PostgreSQL ✓ - ✓ ✓ ✓ ✓ Redis Cache ✓ ✓ ✓ ✓ ✓ ✓ SQL Database ✓ ✓ ✓ ✓ ✓ ✓ SQL Data Warehouse ✓ ✓ ✓ ✓ ✓ ✓ SQL Server Stretch Database ✓ ✓ ✓ ✓ ✓ ✓ Analytics Azure Analysis Services6 ✓ ✓ ✓ ✓ ✓ ✓ Data Lake Analytics ✓ - ✓ ✓ ✓ ✓ HDInsight ✓ ✓ ✓ ✓ ✓ ✓ Stream Analytics
Recommended publications
  • Iot Continuum: Evolving Business Iot in Action, Taipei, November 20Th —Event Agenda
    IoT Continuum: Evolving Business IoT in Action, Taipei, November 20th —Event Agenda Executive Keynote 9:30–10:15am Business Transformation In Action 10:15–11:00am​ Architecting the Intelligent Edge to Create Scalable Repeatable Solutions 11:00–12:00pm Lunch Networking Break 12:00–1:00pm Unlocking IoT’s Potential 1:00–1:45pm Developing an IoT Security Practice for Durable Innovation 1:45–2:15pm Partner Case Study: Innodisk Corporation 2:15-2:45pm Afternoon Networking Break 2:45-3:30pm Evolving IoT with Mixed Reality, AI, Drone and Robotic Technology 3:30–4:00pm Partner Case Study: AAEON Technology, Inc. 4:00-4:30pm Activating Microsoft Resources & Programs to Accelerate Time to Market and Co-sell 4:30–5:00pm Partner-Customer Networking & Sponsored Partner Solution Showcase All day Our Goal IoT Community Partners Technology 50B 175ZB total amount of data connected devices by 2025 by 2030 500M+ business apps by 2023 “Building applications for multi-device, multi-sense experiences is going to require a very different form of computing architecture. That's the motivation for bringing together all of our systems and people. Silicon in the edge to the silicon in the cloud architected as one workload that is distributed— that’s the challenge in front of us.” Intelligent Cloud —Satya Nadella, Q&A Session, April 2018 Intelligent Edge Innovations enabling new opportunities Digital Twins AI Edge Cloud IoT Globally available, unlimited Harnessing signals from Intelligence offloaded from the Breakthrough intelligence Create living replicas of any compute
    [Show full text]
  • 1 Table of Contents List of Figures
    Table of Contents List of Figures ..................................................................................................................... 4 List of Tables ...................................................................................................................... 5 Chapter 1: Introduction....................................................................................................... 6 1.1 Introduction....................................................................................................................6 1.2 Problem Statement .......................................................................................................12 1.3 Thesis Objective...........................................................................................................12 1.4 Thesis Organization.....................................................................................................14 Chapter 2: Intrusion Detection.......................................................................................... 15 2.1 Introduction..................................................................................................................15 2.2 What is an IDS .............................................................................................................15 2.2.1 The Basic Concepts of Intrusion Detection......................................................16 2.2.2 A Generic Intrusion-Detection System.............................................................17 2.2.3 Characteristics of
    [Show full text]
  • Paid Search and Microsoft Audience Ads BETTER TOGETHER
    Paid search and Microsoft Audience Ads BETTER TOGETHER Hand in hand, they deliver more eyeballs and clicks Whether it’s cookies with milk or cake and ice cream, some things are simply better together. The same rings true for combining search advertising’s finest with the best of native advertising. When used together, they can help marketers reach customers across multiple touch points of the user journey, and get high-quality clicks and conversions at scale. While native ads is a well-recognized ad format, we call them Microsoft Audience Ads. After all, it’s more about reaching the right audience and less about the ad type, right? Ad spend is growing for native and search In fact, it’s growing by double digits for both. 25% 11% Expected annual growth in Expected annual growth in native ad spending in the paid search ad spending U.S. through 20191 in the U.S. through 20202 2018 2019 2018 2019 2020 Looking to increase impressions and capture more purchase intent? Using native and paid search ads together can help you get results at scale. MORE HIGHER HIGHER HIGHER FREQUENTLY PURCHASE BRAND PURCHASE 53% VIEWED 32% INTENT 24% RECALL 18% INTENT DISPLAY VS. NATIVE NO BRAND AD VS. BRAND AD NO BRAND AD VS. BRAND AD BANNER VS. NATIVE Consumers viewed Searchers on Bing Searchers on Bing who Native ads registered native ads 53% more who saw a brand’s ad saw a brand’s ad were an 18% higher lift in frequently than they showed 32% higher 24% more likely to purchase intent than viewed display ads.3 purchase intent even recall the brand than banner ads.3 if they didn’t click on a those who didn’t see brand’s ad.4 the ad.4 Two powerful ways to run Microsoft Audience Ads Along with your search campaigns, add Microsoft Audience Ads to get more high-quality volume outside of search.
    [Show full text]
  • Blackbaud CRM Security Guide
    Security Guide 11/10/2014 Blackbaud Direct Marketing 4.0 Security UK ©2014 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying, recording, storage in an information retrieval system, or oth- erwise, without the prior written permission of Blackbaud, Inc. The information in this manual has been carefully checked and is believed to be accurate. Blackbaud, Inc., assumes no responsibility for any inaccuracies, errors, or omissions in this manual. In no event will Blackbaud, Inc., be liable for direct, indirect, special, incidental, or consequential damages resulting from any defect or omission in this manual, even if advised of the possibility of damages. In the interest of continuing product development, Blackbaud, Inc., reserves the right to make improvements in this manual and the products it describes at any time, without notice or obligation. All Blackbaud product names appearing herein are trademarks or registered trademarks of Blackbaud, Inc. All other products and company names mentioned herein are trademarks of their respective holder. Security-2014 Contents CONTENTS I SECURITY 1 Fundamentals of Security 1 APPLICATION USERS 3 Search for Users 3 Application User Records 4 Add an Application User 4 Edit Users 5 Delete Users 6 Grant/Revoke Users Administrator Rights 6 Run the Program as a Selected User 6 Organisational Unit Record 7 Application Users Page 8 Manage System Roles of an Application User 8 Add System Roles
    [Show full text]
  • Migrating from Storsimple to Azure Netapp Files and Global File Cache
    REFERENCE ARCHITECTURE Globally Distributed Enterprise File Sharing with Azure NetApp Files and NetApp Global File Cache Evolving from StorSimple to next-gen Azure solutions. Table of contents Introduction 3 Solution overview 3 A New Data Store with Azure NetApp Files 4 Azure NetApp Files features 4 Using Azure NetApp Files to consolidate distributed file servers 5 Accessing the ANF datastore with a Global File Cache fabric 5 NetApp Global File Cache Edge 6 NetApp Global File Cache Edge instance 6 Network connectivity 6 Configuration guidelines 6 Azure NetApp Files with Global File Cache topology 6 Deployment methodologies 7 Operating environment summary 7 User experience 7 Migrate your StorSimple data to Azure NetApp Files 8 Overview of data migration – StorSimple to Azure NetApp Files 8 Getting the data to Azure 8 Volume Clone 8 Create Azure VM 8 Connecting to the Cloud Appliance 8 Create Azure NetApp Files share 9 Data copy 9 Summary 9 2 Document title Streamline and simplify IT storage Solution overview and infrastructure by centralizing NetApp Global File Cache + Azure NetApp Files: unstructured data into Microsoft Azure a “major step” in unstructured data management for the distributed enterprise using Azure NetApp Files to provide 85% of companies are in the process of adopting a fast local and geographically distributed cloud transformation strategy. This means combining access with NetApp Global File Cache™. on-premises, hybrid, and public cloud services and associated storage technologies, like file/block-based and object storage (e.g., Azure BLOB) to host both Introduction structured and unstructured data. Why did people use StorSimple...what are the NetApp and Microsoft recognize the impact on primary use-cases? the organization, end users, distributed IT strategy, • Unstructured file shares that can be more easily datacenter, and cloud operations.
    [Show full text]
  • The Developer's 5-Step Guide to Power BI Embedded
    The Developer’s 5-Step Guide to Power BI Embedded 5 Step Guide to Using Power BI Embedded 2 Your guide to using Power BI Embedded will briefly cover a few prerequisites, and will then look at five steps to complete: Start building fully 1. Set up your development environment interactive reports and dashboards into 2. Set up your Power BI environment your application, 3. Create and publish content website, or portal. 4. Embed your content for testing 5. Move to production If you’re not ready to start today, get familiar with Power BI Embedded in the Power BI Embedded Playground. Try out all the front-end features you can offer customers with pre-configured visuals and data models. 5 Step Guide to Using Power BI Embedded 3 What is Power BI Embedded? Power BI Embedded allows you to white label Microsoft Power BI to quickly and easily provide engaging front-end analytics and dashboards to your customers. Save time and expense by embedding fully Give your customers high-fidelity, Choose from a broad range of data interactive reports and dashboards into interactive analytics across any device. visualizations or build your own applications, websites, and portals. custom illustrations. Power BI Embedded also includes an extensive library of data connectors, APIs, and fully-documented SDKs. Choose the right set of options for your application and customers, whether you need basic data visualizations or complex interactive analytics. The Prerequisites: Complete these prerequisites to get started: • Open an Azure subscription. Create a free account. • Set up your own Azure Active Directory tenant.
    [Show full text]
  • Azure Web Apps for Developers Microsoft Azure Essentials
    Azure Web Apps for Developers Microsoft Azure Essentials Rick Rainey Visit us today at microsoftpressstore.com • Hundreds of titles available – Books, eBooks, and online resources from industry experts • Free U.S. shipping • eBooks in multiple formats – Read on your computer, tablet, mobile device, or e-reader • Print & eBook Best Value Packs • eBook Deal of the Week – Save up to 60% on featured titles • Newsletter and special offers – Be the first to hear about new releases, specials, and more • Register your book – Get additional benefits Hear about it first. Get the latest news from Microsoft Press sent to your inbox. • New and upcoming books • Special offers • Free eBooks • How-to articles Sign up today at MicrosoftPressStore.com/Newsletters Wait, there’s more... Find more great content and resources in the Microsoft Press Guided Tours app. The Microsoft Press Guided Tours app provides insightful tours by Microsoft Press authors of new and evolving Microsoft technologies. • Share text, code, illustrations, videos, and links with peers and friends • Create and manage highlights and notes • View resources and download code samples • Tag resources as favorites or to read later • Watch explanatory videos • Copy complete code listings and scripts Download from Windows Store PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2015 Microsoft Corporation. All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0059-4 Microsoft Press books are available through booksellers and distributors worldwide.
    [Show full text]
  • Microsoft Cloud Agreement
    Microsoft Cloud Agreement This Microsoft Cloud Agreement is entered into between the entity you represent, or, if you do not designate an entity in connection with a Subscription purchase or renewal, you individually (“Customer”), and Microsoft Ireland Operations Limited (“Microsoft”). It consists of the terms and conditions below, Use Rights, SLA, and all documents referenced within those documents (together, the “agreement”). It is effective on the date that your Reseller provisions your Subscription. Key terms are defined in Section 10. 1. Grants, rights and terms. All rights granted under this agreement are non-exclusive and non-transferable and apply as long as neither Customer nor any of its Affiliates is in material breach of this agreement. a. Software. Upon acceptance of each order, Microsoft grants Customer a limited right to use the Software in the quantities ordered. (i) Use Rights. The Use Rights in effect when Customer orders Software will apply to Customer’s use of the version of the Software that is current at the time. For future versions and new Software, the Use Rights in effect when those versions and Software are first released will apply. Changes Microsoft makes to the Use Rights for a particular version will not apply unless Customer chooses to have those changes apply. (ii) Temporary and perpetual licenses. Licenses available on a subscription basis are temporary. For all other licenses, the right to use Software becomes perpetual upon payment in full. b. Online Services. Customer may use the Online Services as provided in this agreement. (i) Online Services Terms. The Online Services Terms in effect when Customer orders or renews a subscription to an Online Service will apply for the applicable subscription term.
    [Show full text]
  • Lesson 14: Creating and Managing Active Directory Users and Computers
    Lesson 14: Creating and Managing Active Directory Users and Computers MOAC 70-410: Installing and Configuring Windows Server 2012 Overview • Exam Objective 5.2: Create and Manage Active Directory Users and Computers • Creating User Objects • Creating Computer Objects • Managing Active Directory Objects © 2013 John Wiley & Sons, Inc. 2 Creating User Objects Lesson 14: Creating and Managing Active Directory Users and Computers © 2013 John Wiley & Sons, Inc. 3 Creating User Objects • The user account is the primary method for authentication on a network. • Usernames and passwords are validated at log on by comparing entered information to the information stored in the AD DS database. © 2013 John Wiley & Sons, Inc. 4 Types of Users • Local users: These accounts can only access resources on the local computer and are stored in the local Security Account Manager (SAM) database on the computer where they reside. • Domain users: These accounts can access AD DS or network-based resources, such as shared folders and printers. o Account information for these users is stored in the AD DS database and replicated to all domain controllers within the same domain. © 2013 John Wiley & Sons, Inc. 5 Built-In User Accounts Administrator and Guest • On a member server or standalone server: The built-in local Administrator account has full control of all files as well as complete management permissions for the local computer. • On a domain controller: The built-in Administrator account created in Active Directory has full control of the domain in which it was created. The Administrator account cannot be deleted, but it can be renamed. © 2013 John Wiley & Sons, Inc.
    [Show full text]
  • Power BI Pitch Deck FY20
    Power BI overview Speaker name Title Modern analytics Speaker name Title Companies want to do more with data 70% of organizations believe their data is not used to its fullest extent But it’s hard to do Amount of data Data sources Lack of is growing are growing specialized workers 163ZB 86% #1 worldwide data challenged to analyze data science and creation by 2025 unstructured data analytics are most –IDC: Data Age 2025 –IDG: Big Data Survey challenging to find –IDG: State of CIO How does Power BI help modernize analytics? Unify self-service AI gets to Anyone can and enterprise BI insights faster access and analyze Remove the challenges of multiple Reduce the amount of Make sense of data and drive solutions and conquer data both time spent wrangling data and confident decisions without structured and unstructured spend more time getting answers relying on specialized skills Data culture Unify self-service and enterprise BI • Reduce cost, complexity, and challenges of multiple analytics systems • Grow and evolve with a scalable, secure, and compliant platform • Enterprise BI tools like SSRS and SSAS are inside Power BI • Protect your data inside and outside of Power BI Pair Power BI with Microsoft Information Protection and Microsoft Cloud App Security to better protect Power BI data Apply sensitivity labels Extend protection and Better meet privacy and Help prevent exposure of familiar in Office 365 governance policies to regulatory requirements sensitive data by apps like Word, Excel, Power BI data— with oversight of blocking risky user PowerPoint, and Outlook including exported sensitive data through activities, in real time, to Power BI data.
    [Show full text]
  • Package 'Azurecosmosr'
    Package ‘AzureCosmosR’ January 19, 2021 Title Interface to the 'Azure Cosmos DB' 'NoSQL' Database Service Version 1.0.0 Description An interface to 'Azure CosmosDB': <https://azure.microsoft.com/en-us/services/cosmos- db/>. On the admin side, 'AzureCosmosR' provides functionality to create and manage 'Cos- mos DB' instances in Microsoft's 'Azure' cloud. On the client side, it provides an inter- face to the 'Cosmos DB' SQL API, letting the user store and query documents and attach- ments in 'Cosmos DB'. Part of the 'AzureR' family of packages. URL https://github.com/Azure/AzureCosmosR https://github.com/Azure/AzureR BugReports https://github.com/Azure/AzureCosmosR/issues License MIT + file LICENSE VignetteBuilder knitr Depends R (>= 3.3) Imports utils, AzureRMR (>= 2.3.3), curl, openssl, jsonlite, httr, uuid, vctrs (>= 0.3.0) Suggests AzureTableStor, mongolite, DBI, odbc, dplyr, testthat, knitr, rmarkdown RoxygenNote 7.1.1 NeedsCompilation no Author Hong Ooi [aut, cre], Andrew Liu [ctb] (Assistance with Cosmos DB), Microsoft [cph] Maintainer Hong Ooi <[email protected]> Repository CRAN Date/Publication 2021-01-18 23:50:05 UTC R topics documented: az_cosmosdb . .2 bulk_delete . .3 1 2 az_cosmosdb bulk_import . .5 cosmos_endpoint . .6 cosmos_mongo_endpoint . .9 create_cosmosdb_account . 11 delete_cosmosdb_account . 12 do_cosmos_op . 13 get_cosmosdb_account . 14 get_cosmos_container . 15 get_cosmos_database . 17 get_document . 19 get_partition_key . 21 get_stored_procedure . 22 get_udf . 24 query_documents . 26 Index 29 az_cosmosdb Azure Cosmos DB account class Description Class representing an Azure Cosmos DB account. For working with the data inside the account, see cosmos_endpoint and cosmos_database. Methods The following methods are available, in addition to those provided by the AzureRMR::az_resource class: • list_keys(read_only=FALSE): Return the access keys for this account.
    [Show full text]
  • How Github Secures Open Source Software
    How GitHub secures open source software Learn how GitHub works to protect you as you use, contribute to, and build on open source. HOW GITHUB SECURES OPEN SOURCE SOFTWARE PAGE — 1 That’s why we’ve built tools and processes that allow GitHub’s role in securing organizations and open source maintainers to code securely throughout the entire software development open source software lifecycle. Taking security and shifting it to the left allows organizations and projects to prevent errors and failures Open source software is everywhere, before a security incident happens. powering the languages, frameworks, and GitHub works hard to secure our community and applications your team uses every day. the open source software you use, build on, and contribute to. Through features, services, and security A study conducted by the Synopsys Center for Open initiatives, we provide the millions of open source Source Research and Innovation found that enterprise projects on GitHub—and the businesses that rely on software is now comprised of more than 90 percent them—with best practices to learn and leverage across open source code—and businesses are taking notice. their workflows. The State of Enterprise Open Source study by Red Hat confirmed that “95 percent of respondents say open source is strategically important” for organizations. Making code widely available has changed how Making open source software is built, with more reuse of code and complex more secure dependencies—but not without introducing security and compliance concerns. Open source projects, like all software, can have vulnerabilities. They can even be GitHub Advisory Database, vulnerable the target of malicious actors who may try to use open dependency alerts, and Dependabot source code to introduce vulnerabilities downstream, attacking the software supply chain.
    [Show full text]