Confidentiality, integrity, and availability of your data is vital to your business operations, and we take that responsibility seriously.Read our white paper
Confidentiality, integrity and availability of our customer data is vital to business operations. Autodesk® BIM 360 is designed and built using best-in-class cloud software practices and powered by Amazon Web Services (AWS), the world’s leader in cloud infrastructure.
Autodesk has selected industry standard SSAE-16 AT 101 SOC 2 attestation and ISO 27001, ISO 27017 and ISO 27018 certifications to validate our security posture.* Audits are regularly performed on certified products to ensure security and availability. For more information on our accreditations please refer to our Trust Center.
BIM 360 is designed with privacy in mind. All files uploaded to BIM 360 are stored in the cloud on encrypted storage. The storage solution uses the 256-bit advanced encryption (AES-256). Network traffic containing sensitive information, such as credentials and session tokens, is transmitted securely encrypted using Transfer Layer Security (TLS) encryption technology.
Our cloud infrastructure is hosted in top tiered data centers managed by our trusted partner Amazon web services. We use role based access control methods that restricts privileged access? to the information resources based on the concept of least privilege. Authorization to access requires approval by management responsible for confidentiality, integrity and availability.
All data is stored in secured data centers powered by Amazon Web Services. The data centers are protected from unauthorized physical access and environmental hazards by a range of security controls.
BIM 360 maintains high level operational excellence to ensure you are not impacted by unplanned outages. If there is any unplanned outage, our Cloud Operational personnel are available 24/7 to work as quickly as possible to restore full access to the service as soon as possible. The data centers are designed to tolerate system and hardware failures with minimum impact.
Our dedicated Cloud Security team conducts regular security scans, penetration testing and external audits of BIM 360 services. Security scans and penetration testing cover a wide range of vulnerabilities defined by the Open Web Application Security Project (OWASP) and SANS Top 25.
BIM 360 supports two-factor authentication to add a second level of authentication to a user account during login.
Learn more at the Trust Center about how we work directly with our customers to detect, monitor and prevent attacks.Visit the Trust Center
Find more details about the BIM 360 software development, and security measures.Download the White Paper