EasyLife 365
Last updated by the developer on: July 30, 2024
General information
Information provided by EasyLife 365 AG to Microsoft:
Information | Response |
---|---|
App name | EasyLife 365 |
ID | WA200003697 |
Office 365 clients supported | Microsoft Teams |
Partner company name | EasyLife 365 AG |
Company's website | https://www.easylife365.cloud |
App's Terms of Use | https://www.easylife365.cloud/terms |
Core functionality of the app | Make governance easy! |
Company headquarter location | Switzerland |
App info page | https://www.easylife365.cloud/governance/features |
What is the hosting environment or service model used to run your app? | Paas |
Which hosting cloud providers does the app use? | Azure |
Questions
Questions or updates to any of the information you see here? Contact us!
How the app handles data
This information has been provided by EasyLife 365 AG about how this app collects and stores organizational data and the control that your organization will have over the data the app collects.
Information | Response |
---|---|
Does the app or underlying infrastructure process any data relating to a Microsoft customer or their device? | Yes |
What data is processed by your app? | Group metadata (id, name, owner count, expiration information); SharePoint site metadata (id, name, owners); User Information (id, userprincipalname, mail, preferredlanguage, userType) |
Does the app support TLS 1.1 or higher? | Yes |
Does the app or underlying infrastructure store any Microsoft customer data? | Yes |
What data is stored in your databases? | Group metadata (id, name, owner count, expiration information); SharePoint site metadata (id, name, owners); User Information (id, userprincipalname, mail, preferredlanguage, userType) for 90 days in our logs |
If underlying infastructure processes or stores Microsoft customer data, where is this data geographically stored? | Netherlands (the), Ireland |
Do you have an established data rentention and disposal process? | Yes |
How long is data retained after account termination? | Less than 90days |
Do you have an established data access management process? | Yes |
Do you transfer customer data or customer content to third parties or sub-processors? | Yes |
Do you have data sharing agreements in place with any third party service you share Microsoft customer data with? | Yes |
Questions
Questions or updates to any of the information you see here? Contact us!
Information from the Microsoft Cloud App Security catalog appears below.
Information | Response |
---|---|
Do you perform annual penetration testing on the app? | Yes |
Does the app have a documented disaster recovery plan, including a backup and restore strategy? | Yes |
Does your environment use traditional anti-malware protection or application controls? | TraditionalAntiMalware, ApplicationControls |
Do you have an established process for indentifying and risk ranking security vulnerabilities? | Yes |
Do you have a policy that governs your service level agreement (SLA) for applying patches? | Yes |
Do you carry out patch management activities according to your patching policy SLAs? | Yes |
Does your enviroment have any unsupported operating systems or software? | No |
Do you conduct quarterly vulnerability scanning on your app and the infastructure that supports it? | Yes |
Do you have a firewall installed on your external network boundary? | Yes |
Do you have an established change management process used to review and approve change requests before they are deployed to production? | Yes |
Is an additional person reviewing and approving all code change requests submitted to production by the original developer? | Yes |
Do secure coding practices take into account common vulnerability classes such as OWASP Top 10? | Yes |
Multifactor Authentication (MFA) enabled for: | DNSManagement, Credential, CodeRepositories |
Do you have an established process for provisioning, modification, and deletion of employee accounts? | Yes |
Do you have Intrusion Detection and Prevention (IDPS) software deployed at the perimeter of the network boundary supporting your app? | N/A |
Do you have event logging set up on all system components supporting your app? | Yes |
Are all logs reviewed on a regular cadence by human or automated tooling to detect potential security events? | Yes |
When a security event is detected are alerts automatically sent to an employee for triage? | Yes |
Do you have a formal information security risk management process established? | Yes |
Do you have a formal security incident response process documented and established? | Yes |
Do you report app or service data breaches to supervisory authorities and individuals affected by the breach within 72 hours of detection? | Yes |
Questions
Questions or updates to any of the information you see here? Contact us!
Information | Response |
---|---|
Does the app comply with the Health Insurance Portability and Accounting Act (HIPAA)? | N/A |
Does the app comply with Health Information Trust Alliance, Common Security Framework (HITRUST CSF)? | N/A |
Does the app comply with Service Organization Controls (SOC 1)? | N/A |
Does the app comply with Service Organization Controls (SOC 2)? | No |
Does the app comply with Service Organization Controls (SOC 3)? | No |
Do you carry out annual PCI DSS assessments against the appand its supporting environment? | N/A |
Is the app International Organization for Standardization (ISO 27001) certified? | Yes |
Does the app comply with International Organization for Standardization (ISO 27018)? | No |
Does the app comply with International Organization for Standardization (ISO 27017)? | Yes |
Does the app comply with International Organization for Standardization (ISO 27002)? | Yes |
Is the app Federal Risk and Authorization Management Program (FedRAMP) compliant? | No |
Does the app comply with Family Educational Rights and Privacy Act (FERPA)? | N/A |
Does the app comply with Children's Online Privacy Protection Act (COPPA)? | N/A |
Does the app comply with Sarbanes-Oxley Act (SOX)? | N/A |
Does the app comply with NIST 800-171? | N/A |
Has the app been Cloud Security Alliance (CSA Star) certified? | No |
Questions
Questions or updates to any of the information you see here? Contact us!
Information | Response |
---|---|
Do you have GDPR or other privacy or data protection requirements or obligations (such as CCPA)? | Yes |
Does the app have an external-facing privacy notice that describes how it collects, uses, shares, and stores customer data? | Yes |
Privacy Policy URL | https://www.easylife365.cloud/governance/privacy |
Does the app perform automated decision making, including profiling that could have a legal effect or similar impact? | No |
Does the app process customer data for a secondary purpose not described in the privacy notice (i.e. marketing, analytics)? | No |
Do you process special categories of sensitive data (i.e. racial or ethnic origin, political opinion, religious or philosophical beliefs, genetic or biometric data, health data) or categories of data subject to breach notification laws? | No |
Does the app collect or process data from minors (i.e., individuals under the age of 16)? | No |
Does the app have capabilities to delete an individual's personal data upon request? | Yes |
Does the app have capabilities to restrict or limit the processing of an individual's personal data upon request? | No |
Does the app provide individuals the ability to correct or update their personal data? | Yes |
Are regular data security and privacy reviews performed (for example, Data Protection Impact Assessments or privacy risk assessments) to identify risks related to the processing of personal data for the app? | Yes |
Questions
Questions or updates to any of the information you see here? Contact us!
Information | Response |
---|---|
Does your application integrate with Microsoft identity platform (Microsoft Entra ID) for single-sign on, API access, etc.? | Yes |
Have you reviewed and complied with all applicable best practices outlined in the Microsoft identity platform integration checklist? | Yes |
Does your app use the latest version of MSAL (Microsoft Authentication Library) or Microsoft Identity Web for authentication? | Yes |
Does your app support Conditional Access policies? | Yes |
List the types of policies supported | All client side policies for the apps and browser |
Does your app support Continuous Access Evaluation (CAE) | No |
Does your app store any credentials in code? | No |
Apps and add-ins for Microsoft 365 might use additional Microsoft APIs outside of Microsoft Graph. Does your app or add-in use additional Microsoft APIs? | Yes |
Data access using Microsoft Graph
Graph Permission Permission Type Justification Microsoft Entra App ID AuditLog.Read.All application Access audit log data to check for B2B account auditing 716a0b19-6f38-4909-a80a-ffaac7957316 Channel.Create application Create channels during provisioning 716a0b19-6f38-4909-a80a-ffaac7957316 Channel.ReadBasic.All application Read the names and descriptions of all channels during provisioning 716a0b19-6f38-4909-a80a-ffaac7957316 ChannelMember.ReadWrite.All both Add and remove members from all channels during access review and provisioning 716a0b19-6f38-4909-a80a-ffaac7957316 Directory.ReadWrite.All application Read and write directory data during Group provisioning 716a0b19-6f38-4909-a80a-ffaac7957316 Group.ReadWrite.All both Access Microsoft 365 Groups for lifecycle management, whether during scans or for end-users. 716a0b19-6f38-4909-a80a-ffaac7957316 GroupMember.ReadWrite.All both Access Microsoft 365 Group membership during provisioning and access review. 716a0b19-6f38-4909-a80a-ffaac7957316 InformationProtectionPolicy.Read delegated Read user sensitivity labels and label policies to apply the appropriate sensitivity labels. 716a0b19-6f38-4909-a80a-ffaac7957316 Mail.Send application Sends notifications using a shared mailbox. Can be limited to an individual mailbox. 716a0b19-6f38-4909-a80a-ffaac7957316 MailboxSettings.Read application Reads users' preferred languages for email notifications. 716a0b19-6f38-4909-a80a-ffaac7957316 Notes.ReadWrite.All delegated Read and write all OneNote notebooks accessible to the user during provisioning. 716a0b19-6f38-4909-a80a-ffaac7957316 Policy.Read.All delegated Review your organization's policies for B2B invitations. 716a0b19-6f38-4909-a80a-ffaac7957316 Sites.FullControl.All both Have full control over all site collections for access review and provisioning. 716a0b19-6f38-4909-a80a-ffaac7957316 Tasks.ReadWrite application Used to read and write tasks for Planner provisioning. 716a0b19-6f38-4909-a80a-ffaac7957316 TeamMember.ReadWrite.All both Add and remove members from all teams for access review. 716a0b19-6f38-4909-a80a-ffaac7957316 TeamSettings.ReadWrite.All both Read and change teams' settings during provisioning 716a0b19-6f38-4909-a80a-ffaac7957316 TeamsActivity.Send application Sends a Teams notification to a user when action is required. 716a0b19-6f38-4909-a80a-ffaac7957316 TeamsAppInstallation.ReadForUser.All application Used to verify if the Teams app is installed for a user. 716a0b19-6f38-4909-a80a-ffaac7957316 TeamsTab.ReadWrite.All application Read and write tabs in Microsoft Teams during provisioning. 716a0b19-6f38-4909-a80a-ffaac7957316 User.Read.All delegated Search for users in your organization using the people picker feature. 716a0b19-6f38-4909-a80a-ffaac7957316 User.ReadWrite.All application Used for B2B lifecycle management. 716a0b19-6f38-4909-a80a-ffaac7957316 delegated View users' email address for SSO 716a0b19-6f38-4909-a80a-ffaac7957316 offline_access delegated Used for authentication 716a0b19-6f38-4909-a80a-ffaac7957316 openid delegated Used for authentication and SSO 716a0b19-6f38-4909-a80a-ffaac7957316 profile delegated Used for authentication and SSO 716a0b19-6f38-4909-a80a-ffaac7957316
This application does not have Additional APIs.
Questions
Questions or updates to any of the information you see here? Contact us!
Certification information
Control | Microsoft 365 Certification Result |
---|---|
APPLICATION SECURITY | PASS |
Penetration Testing | In Scope |
Vulnerability Assessment Review (Penetration Test) | In Scope |
OPERATIONAL SECURITY | PASS |
Awareness Training | In Scope |
Malware Protection - Anti-Malware | N/A |
Malware Protection - Application Control | N/A |
Patch Management - Patching & Risk Ranking | In Scope |
Vulnerability Scanning | In Scope |
Network Security Controls (NSC) | In Scope |
Change Control | In Scope |
Secure Software Development/Deployment | In Scope |
Account Management | In Scope |
Security Event Logging, Reviewing and Alerting | In Scope |
Information Security Risk Management | In Scope |
Security Incident Response | In Scope |
Business Continuity Plan (BCP) and Disaster Recovery Plan | In Scope |
DATA HANDLING SECURITY & PRIVACY | PASS |
Data in Transit | In Scope |
Data At Rest | In Scope |
Data Retention, Back-up and Disposal | In Scope |
Data Access Management | In Scope |
GDPR | In Scope |
HIPAA | N/A |
Questions
Questions or updates to any of the information you see here? Contact us!