πŸ›‘οΈ Security & Compliance

Technical and compliance background for security teams, IT administrators, and compliance officers evaluating GetCurrent.

βœ… Zero Trustβœ… Least Privilegeβœ… Minimal Data Storageβœ… Microsoft Entra IDβœ… EU-hosted

Enterprise-grade security by design

GetCurrent is built on Microsoft's Zero Trust and Least Privilege principles. The application only reads data you explicitly grant access to through an admin consent flow β€” no data is written, no users are tracked beyond what is needed for the service.

πŸ”’

Zero Trust

Tenant-scoped and administrative API calls are authenticated via Microsoft Entra ID. Public feed endpoints serve read-only content without credentials. No hardcoded secrets are used.

🎯

Least Privilege

Only the minimum required Microsoft Graph API permissions are requested β€” read-only access to Message Center data.

πŸ“¦

Minimal Storage

GetCurrent stores only the minimum data needed to operate: email address, tenant ID, domain, and cached update content. No unnecessary tenant configuration is retained.

βœ‹

Full Control

You decide when consent is granted and revoked. Offboarding immediately removes all tenant-linked data.

Summary

  • Authentication exclusively via Microsoft Entra ID β€” no passwords stored in GetCurrent
  • No service accounts or application-only permissions β€” all actions on behalf of the signed-in user
  • Only tenant ID and domain are stored; no user profiles, no M365 configuration data
  • All Azure resources run in the West Europe region (EU-hosted)
  • Inbound traffic via Azure App Service with TLS 1.2+ enforced
  • Secrets managed in Azure Key Vault, exposed at runtime via app settings (Key Vault references) β€” never hardcoded
  • CSRF protection on all mutating API endpoints
  • Rate limiting on all public API routes
  • Content Security Policy headers on every page