Securosys 365 DKE: Double Key
Encryption for Microsoft 365
What is Securosys 365?
Securosys 365 DKE (Double Key Encryption) is a cloud-based security solution that protects Microsoft 365 data using two encryption keys — one managed by Microsoft and one fully controlled by the customer.
This approach ensures that no third party, including Microsoft, can decrypt sensitive content, providing true data sovereignty and compliance with strict regulatory requirements.
Challenge
Organizations using Microsoft 365 face a growing challenge: how to protect sensitive data while maintaining full control in the cloud. As data breaches become more frequent and regulations stricter, relying solely on cloud providers for encryption is no longer sufficient.
Many organizations struggle to ensure data sovereignty, prevent unauthorized access, and meet compliance requirements — all without adding complexity for end-users.
Solution
Securosys 365 DKE enables client-side encryption with full customer key ownership, ensuring that sensitive data is protected before it reaches the cloud.
Built on Microsoft Purview Information Protection, the solution adds a second encryption layer controlled exclusively by the customer.
With Double Key Encryption, data is secured using two independent keys: one managed by Microsoft and one stored in Securosys CloudHSM under your control. This guarantees that no third party can access your data.
For users, the experience remains straightforward: applying a sensitivity label in Microsoft 365 automatically triggers encryption without changing existing workflows.
Key Benefits
Fully Managed DKEaaS
Our solution can be deployed in your environment in an hour or less, providing immediate benefits and minimal disruption.
Highest Compliance Standards
Keys are stored on FIPS 140-3 level 3 and Common Criteria EAL4+ validated HSMs. Service operations are ISO 27000 certified, ensuring the highest level of data protection and compliance.
Globally Accessible
Securosys 365 DKE is available 24/7 as a cloud-based service, accessible from anywhere in the world.
Use Cases
Legal Services
Protect attorney-client privileged communication and confidential legal documents.
Public Services and Government
Ensure confidentiality of citizen data and sensitive government records.
Healthcare and Pharmaceutical
Secure patient data, clinical trials, and intellectual property.
Media & Entertainment
Protect exclusive content, contracts, and distribution rights.
Defense & Aerospace
Safeguard classified data and sensitive engineering information.
environment, ensuring your data remains secure and sovereign.
FAQ
Why should I do a proof of concept?
What are the steps to install S365?
1.Preparation:
- Minimum 50 users
- Microsoft 365 E5 & Microsoft 365 Office Apps for Enterprise (version 18.2008.12711.0 or later)
- From 1 to 10 sensitivity label names compliant with your organization's information protection policies. Examples provided in the resources
2. Installation (30 minutes)
- Download & install the Azure Information Protection Unified Labeling Client (version 2.14.93.0 or later) on each computer (3 minutes per user)
- Enable DKE
3. Configuration (1-4 hours)
- Log in and retrieve your Securosys365 admin credentials through our support portal
- Create & publish sensitivity labels in your Azure tenant
- Test
Can Securosys support me for the installation?
We can offer a 30-minute demo with one of our Senior Product Engineer to address the most common questions.
Unfortunately, we cannot provide consulting resources to work on your infrastructure and perform the installation on your behalf.
However, we would be happy to recommend consulting partners to support you with the installation.
How to kickstart a proof-of-concept for S365?
- Liaise internaly with the relevant stakeholders. Most likely the CISO
- Assess the complexity of the solution, the pre-requisites, the technical & human resources needed. Appoint external resources if needed
- Install Azure Information Protection on your environment and link it to your Securosys365 tenant (30 minutes)
- Choose and implement security labels (1-4 hours)
- Run some tests as an end-users on Excel, Word, PowerPoint, Outlook, to cover your most important use cases
What is included in the monthly subscription?
The monthly subscription includes:
- Infrastructure/hardware costs - Primus HSM, etc.
- Software costs with continuous improvement
- Online console to manage your key
- 24/7 support & maintenance
Not included:
- Azure & Microsoft desktop App licences
- Any consulting/training/support for the Proof of Concept PoC & onboarding - We can recommend some partners instead
What are the technical skills needed to install S365?
To install S365, you need to understand the following concepts:
- Azure Fundamentals
- Azure Information Protection (AIP)
- Azure Active Directory (AAD)
which would be most likely CISO, IT Manager/Director, System Administrator, Security Analyst, Security Engineer, Security Architect. They can be supported by Security Consultant, IT Auditor, Data Protection Officer (DPO), Compliance Officer, Risk Manager.
Why does S365 work with Microsoft E5 licences, but not E1 & E3 ones?
Securosys365 works with the Double-Key Encryption (DKE) protocol from Microsoft, which is only included in E5 licences.
If you don't have an E5 licence, Microsoft offers a 30-day free trial here
What happens if I lose access to my documents, or if my Microsoft Office 365 subscription is cancelled?
The data would remain encrypted and could not be used by anyone
What happens to my documents if I unsubscribe from S365?
Before your subscription ends, we recommend the following exit process:
- Decrypt all your documents and move them to their new location
- If you have a lot of documents, you can run a PowerShell script to decrypt any DKE-encrypted protected files.
Please contact us at least 1-month before the termination to ensure a smooth exit process.
Microsoft Office already encrypts the data by default. Isn't that sufficient?
What makes S365 different from other solutions?
The main difference is that most of the alternative solutions rely on Microsoft's DKE open-source project which requires:
- a dedicated infrastructure project
- engineering to deploy the software
- regular maintenance
S365 is one of the few fully managed DKEaaS on the market that removes all these pain points for you.
Once a sensitivity level is chosen, can I update if to a higher/lower one?
Can Securosys decrypt my documents?
No, Securosys cannot access your data because:
- Securosys doesn't have access to your Azure tenant
- The decryption is performed on the client's device by the Office Apps
Why choosing multiple sensitivity labels ? Can't we simply have one and apply it to all the data?
Within your organization, you might have different groups of users with different roles & duties. The permissions will be different for each of them.
Thus, you will need a specific sensitivity labels to match each use cases.
What does Securosys365 protect my documents against?
- Security vulnerabilities in complex hyperscaler environments
- Malicious activities by hyperscalers or employees
- Loss of intellectual property
What happens if the key is lost?
If the Securosys365 key is lost, you could not decrypt your data anymore.
However, this risk is being eliminated as your key is stored in an HSM which is redundant.
If a user A leaves the company, can a user B access its documents?
Related Products
AWS External Key Store (XKS)
Keep the complete control of your keys in AWS Key Management Service (KMS)
Bring Your Own Key (BYOK)
Enhancing cloud security and compliance with Securosys HSM and BYOK integration
