Security is something we treat with the upmost importance, this page sets out the security measures we take with the product's deployment.
Datacentre Location
The Eido cloud platform is hosted in two locations:
eu.eido.cloud is located in Azure West Germany region
us.eido.cloud is located in Azure US East 2 region
Security Patching
The underlying architecture is based on Aure's serverless technologies so Microsoft themselves handle patching. We use Microsoft Intune's Autopatch functionality to patch our own devices with patches being applied as follows:
Critical Security patches and updates are applied within 24 hours
High Priority patches and updates are applied within 7 days
Medium and Low Priority patches and updates are applied within 14 days
Data Encryption
Data in Transit is encrypted with a minimum of TLS 1.2. The eido platform is not accessible using < TLS 1.2, access is blocked by our Web Application Firewall as we do not support anything older. The signature algorithm used by the Eido application is SHA256withRSA with a 2048 bit key. Our configuration permits us a score of A at https://www.ssllabs.com and it is our intention for us to maintain that score.
Data at Rest is encrypted using the industry standard AES-256 encryption. Key access and rotation is managed by Azure.
Platform Access
Access to the cloud infrastructure that’s host’s the eido platform (eu.eido.cloud and us.eido.cloud) is only accessible to employees who are connected to the VPN. The VPN requires multi-factor authentication. Role-based access control (RBAC) governs administrative functions. Tenant data is logically isolated using unique tenant identifiers, ensuring complete separation between customers.
Platform Monitoring
The Eido availability and security is monitored 24 / 7 / 365. On-call ensures we can immediately respond to any critical platform or security issues in real-time.
Web Application Firewall
All data transmitted to the Eido platform has to go through our web application firewall. Our web application firewall protects our platform against exploitation of a wide range of vulnerabilities such as Session hijacking, session replay attacks, Cross-Site Request Forgery (CSRF) attacks Injection attacks, CSS Injection attacks, and many more, including those published by OWASP.
Denial of Service
At Eido, we utilise Azure Front Door, which is a Web Application Firewall, providing managed distributed denial of service (DDoS) protection service that safeguards the Eido infrastructure that hosts our cloud platform. It provides dynamic detection and automatic mitigations that minimize application downtime and latency.
Multi Factor Authentication
Users login to Eido with Entra credentials so for increased security, Eido recommends customers to enforce the use of MFA for Entra logins. Please contact support@eido.cloud if help is needed with this.
Backups and Encryption
The Eido Platform is backed up daily and retained for 35 Days. Backups are encrypted using the industry standard AES-256 encryption.
Vulnerability Scanning
Our product code is scanned for vulnerabilities using GitHub Dependabot and Advanced Security cloud platform is scanned every time a change is made.
Data Privacy
We allow per‑ Intune tenant customization of data retention settings. These settings are not changable by end users directly - please contact support to make changes to these settings for a specific Intune tenant.
The default values for the data that we collect from Intune tenants is as follows
Control | Default Value |
Raw Data -How many days raw imported report data is kept before automated cleanup. | 3 days |
Closed Issue retention - period for closed issues | 10 days |
Change tracking data - Age limit for historical change tracking entries (e.g., device change logs). | 366 days |
Deleted Devices - How long logically deleted devices remain before purge. | 10 days |
App metering data - Retention window for application metering / usage data. | 45 days |
Data is cleared up via automation that runs periodically, customers may request the above defaults are changed at any time via support. Eido collects only —device inventory, Entra user properties, compliance status, app usage metrics—never personal end-user content.
SOC Feeds
We subscribe to feeds by the leading cyber security agencies, when an announcement is made, or new critical issue is detected, a security incident will be created for us to review and take action if necessary. The current SOC Feeds we have are: • National Cyber Security Centre • Microsoft Security Response Center • Cyber and Infrastructure Security Agency


