M-Files Security Information in a Nutshell

March 6, 2024

Introduction

Information security and privacy are of essential importance at M-Files. Our approach towards security and compliance have been summarised in this document along with the organizational and technical controls implemented to keep your data and information safe.

Our Commitment

We maintain security principles within the fundamental designs of the Service. M-Files is designed to permit system users to only access the information they need and are entitled to, based on their role.


We drive continuous improvement and maintain a certified Information Security Management System and Quality System as well as operate a SOC2-attested Security Compliance Program.



We use encryption technologies to protect customer data both at rest and in transit.

Physical Security

M-Files Cloud is hosted on the Microsoft Azure platform, and customer data is located in Azure data centers. Customer data is replicated from the primary Azure region to datacentres in the secondary Azure region. Microsoft Azure data centers have been certified to operate an Information Security Management System that conforms to the requirements if ISO/IEC 27017:2013 and ISO/IEC 27018:2014. Microsoft Azure has achieved SOC 1 Type 2, SOC 2 Type 2 and SOC 3 reports and their Business Continuity Management System is ISO 22301:2012 certified.


Physical security measures related to M-Files office locations in all countries have been documented. In order to provide secure facilities and a secure environment for M-Files operations, the following aspects have been followed:


Entry from public areas to offices is restricted by locks or monitored by reception staff.


Main offices are monitored for unauthorized entry by surveillance monitoring during nights.


Area categorisations are applied, and procedures enforced by the office managers.


Service personnel and third parties are not allowed to leave doors open and bypass the categories.

Logical Access

Logical access of M-Files Cloud Operations to M-Files Cloud services is controlled by M-Files Cloud service credentials. The credentials are stored in the Cloud Management vault and access to the credentials in required VPN and multi-factor authentication.


Access control in M-Files is set up in layers. Access can be granted based on the user’s needs, thus limiting the access only to those assets and systems needed, even to the level of individual documents within a project. This enables M-Files to protect data with the best combination of technical means needed.

Network Security Measures

Our network is segregated in several separate segments using firewalls and/or routers, based on their principal purpose. All traffic to and from the Internet is controlled and actively monitored. Third-party monitored endpoint detection and response (EDR) is in place at all endpoints. Geographically distant offices belonging into the same core network are connected through site-to-site VPN.


It is imperative that your data is fully protected whether it’s being transmitted over a network or at rest so that no one gains unauthorized access to your information. M-Files encrypts network communication between M-Files clients (M-Files Desktop, M-Files Web, and M-Files Mobile) and M-Files Server via HTTPS, gRPC, VPN, or IPSec. Data at rest is encrypted with AES-256 Microsoft SQL Server Transparent Data Encryption (TDE) is always enabled in M-Files Cloud.

Back-up and Data Storage

Schedules backups are performed to recover from logical errors. Document vaults are backed up every day, and the backup data is hosted in a different storage than the actual production data. The data is replicated and geographically distributed. Features included in the backup plan vary between Standard Backup Plan and Premium Backup Plan.


Microsoft Azure SQL Database stores all the permanent data to a redundant storage to mitigate outages caused by potential failures of individual server components. Database backups and transaction logs are stored to a geo-redundant storage to enable recovery to another data center in case of a major disaster.


Files stored in the M-Files Cloud service are automatically geo-replicated with Microsoft Azure Storage services. Geo-replication maintains six copies of your data. Your data is replicated three times within the primary region and three times within a secondary region hundreds of kilometers away from the primary region, providing high-level durability. Azure Key Vault can e used to manage and store encryption keys for file and database data.


M-Files maintains a documented business continuity and disaster recovery plans and conducts periodic testing to confirm applicability.

Product Security

M-Files applies an agile Secure Development Lifecycle (SDL) based process in product development. Software requirements are described as user stories, features, and epics consisting of one or more user stories. Each delivery feature goes through a Feature Readiness Gate process consisting of concept, design, implementation, and testing phases. Readiness Gate approval includes following signoffs from Product Management, Architectural, Security, and Verification.


Monthly releases are managed through Branch and Release Gates with dedicated gate criteria to be fulfilled before approval. Branch gate verifies that each feature to be released has passed Feature Readiness Gate, and checks that there are no outstanding issues to be fixed. Release gate serves as a final quality checkpoint for the delivery before publication.


SDL (Secure Development Lifecycle) is applied throughout the whole development process to protect against possible security threats. Manual and automated third-party component checks are done for each release to protect against vulnerabilities in third-party software. Release acceptance testing includes non-functional testing as well, for example, performance and security testing. The tools used in security testing include but are not limited to HackerGuardian, Synopsys Protecode SC, Burp, and OWASP ZAP. Development and testing environments are segregated from production and no production data is used for testing purposes.


M-Files regularly conducts third-party security assessments, including penetration testing. These assessments are focused on critical service components and prioritised by the security team according to the technical testing plan.


Incident management process is in place to identify, analyse and to apply corrective actions. Incidents are classified according to urgency and MIM process for critical incidents. Lessons learned are gathered to prevent a future re-occurrence. M-Files holds CAN (CVE Number Authority) status and issues CVE numbers for M-Files product-related vulnerabilities.


Data Privacy

As a data processor M-Files complies with applicable GDPR regulations for all the relevant services delivered to customers. M-Files with co-operate with our customers, to help them meet their GDPR obligations as data controllers. We have collected our privacy notes and other GDPR documentation in our Privacy Policy page.

Corporate Security

M-Files has implemented and maintains policies and procedures that cover essential security and compliance topics. All employees are expected to adhere to the M-Files policies and procedures that define how services should be delivered. A review cycle has been implemented to keep policies and procedures up to date.


All M-Files employees and subcontractors receive annual information security training in addition to which specialized role-based training is provided. Third-party-provided continuous phishing awareness training is enabled for M-Files employees.

Compliance

M-Files has been certified by an independent third party to comply with the requirements of the standard ISO/IEC 27001:2013. Certification covers development maintenance of M-Files document management platform and M-Files Cloud Operations. We also maintain ISO 9001:2015 Certified quality management system which covers design, development, delivery, and support of M-Files management platform and related services.


Our security compliance framework has been designed and operated to meet the requirements defined by AICPA’s Trust Service Principles and Criteria. M-Files compliance and adherence to best practices is annually audited by an external CPA auditor and based on that audit SOC 2 type II report is issued annually.


To read more about M-Files compliance endeavours, please see their compliance website.


To obtain the latest copies of M-Files SOC 2 report and ISO certificates, please contact support@m-files.com. For more information on how we can help your organisation please email: peter@documentmanagementsoftware.com.au or visit www.documentmanagementsoftware.com.au

More Articles


Streamline aged care compliance: M-Files centralizes info, manages document version control
By Matthew Lamont April 27, 2025
Aged care and community care providers in Australia play a vital role supporting vulnerable individuals. However, the sector faces unique and complex challenges when it comes to managing documents and information. Dealing with sensitive personal health data and adhering to strict compliance requirements can often lead to administrative burdens that detract from the core mission of providing quality care.  In this post we explore some of the key information management challenges faced by the aged care and community care (ACCC) sector and show how M-Files can help ACCC providers enhance regulatory compliance and streamline their internal operations.
M-Files for Australian RTOs: Streamline document management, compliance,version control
By Rowena Lamont April 21, 2025
Registered Training Organisations (RTOs) in Australia play a vital role in skilling the nation's workforce. However, they must navigate a complex landscape of regulatory requirements, increasing data volumes, and the constant need to maintain accurate and accessible information. For many RTOs, this often translates into a struggle with inefficient document management practices, hindering productivity and potentially impacting compliance. In this post we will explore some of the key information challenges faced by Australian RTOs and how an information management solution like M-Files can provide a powerful pathway to streamlined operations and enhanced success.
M-Files automates document processes, enhances compliance for construction and manufacturing
By Matthew Lamont April 13, 2025
For Australia’s burgeoning construction and manufacturing sectors, efficient management of information is no longer a luxury – it is a fundamental requirement for success. From complex project blueprints and safety regulations to intricate manufacturing specifications and quality control records, these industries generate vast quantities of critical documentation. Without a robust system to organise, secure, and access this information, construction and manufacturing businesses can face significant hurdles, impacting productivity, compliance, and ultimately, profitability. Australian construction and manufacturing businesses operate within strict regulatory frameworks. Construction projects in Australia are subject to a myriad of regulations, including building codes, environmental protection laws, and workplace health and safety acts. For instance, ensuring all permits, contracts, safety reports, and quality certifications meet the required standards is crucial to avoid legal penalties and project delays. Similarly, Australian manufacturers often adhere to industry-specific standards, quality control regulations like ISO 9001, and workplace safety legislation. Managing the documentation required to demonstrate compliance with these evolving regulations can be a significant undertaking. This post discusses five common document management challenges faced by Australian construction and manufacturing businesses. We also discuss how M-Files , a powerful intelligent information management platform, helps address these common challenges:

Share

IMPROVE YOUR WORKFLOW

Let's chat together

Contact us