Cloud security Security is at the core of BIM 360

Confidentiality, integrity, and availability of your data is vital to your business operations, and we take that responsibility seriously.

Read our white paper
Hero image

BIM 360 Cloud Security Standards

Confidentiality, integrity and availability of our customer data is vital to business operations. Autodesk® BIM 360 is designed and built using best-in-class cloud software practices and powered by Amazon Web Services (AWS), the world’s leader in cloud infrastructure.

Autodesk has selected industry standard SSAE-16 AT 101 SOC 2 attestation and ISO 27001, ISO 27017 and ISO 27018 certifications to validate our security posture.* Audits are regularly performed on certified products to ensure security and availability. For more information on our accreditations please refer to our Trust Center.

BIM 360 Security logos
Data Encryption and Privacy diagram

Data Encryption and Privacy

BIM 360 is designed with privacy in mind. All files uploaded to BIM 360 are stored in the cloud on encrypted storage. The storage solution uses the 256-bit advanced encryption (AES-256). Network traffic containing sensitive information, such as credentials and session tokens, is transmitted securely encrypted using Transfer Layer Security (TLS) encryption technology.

Access Control diagram

Access Control

Our cloud infrastructure is hosted in top tiered data centers managed by our trusted partner Amazon web services. We use role based access control methods that restricts privileged access? to the information resources based on the concept of least privilege. Authorization to access requires approval by management responsible for confidentiality, integrity and availability.

Physical Data Center Security diagram

Physical Data Center Security

All data is stored in secured data centers powered by Amazon Web Services. The data centers are protected from unauthorized physical access and environmental hazards by a range of security controls.

Disaster Recovery diagram

Disaster Recovery

BIM 360 maintains high level operational excellence to ensure you are not impacted by unplanned outages. If there is any unplanned outage, our Cloud Operational personnel are available 24/7 to work as quickly as possible to restore full access to the service as soon as possible. The data centers are designed to tolerate system and hardware failures with minimum impact.

Vulnerability Scans, Penetration Testing and External Audits diagram

Vulnerability Scans, Penetration Testing and External Audits

Our dedicated Cloud Security team conducts regular security scans, penetration testing and external audits of BIM 360 services. Security scans and penetration testing cover a wide range of vulnerabilities defined by the Open Web Application Security Project (OWASP) and SANS Top 25.

Two Factor Authentication diagram

Two Factor Authentication

BIM 360 supports two-factor authentication to add a second level of authentication to a user account during login.

The Trust Center

Learn more at the Trust Center about how we work directly with our customers to detect, monitor and prevent attacks.

Visit the Trust Center

Privacy Policy

Read more on our Privacy Policy and how we embed privacy and information responsibility.

View the privacy policy

The White Paper

Find more details about the BIM 360 software development, and security measures.

Download the White Paper

Get started with BIM 360

Start for free