Does the SaaS provider protect external data in transit using TLS?

Yes

Yammer uses HTTPS to transmit and receive data. TLS 1.2 is used to encrypt data whilst in transit between Yammer (Microsoft) servers and the user’s browser/app.

Does the SaaS provider protect external data in transit using correctly configured certificates?

Yes

Yammer meets the recommended cryptographic profiles for TLS as published by the NCSC. In addition the Yammer domain currently gets an ‘A’ rating from Qualys SSL Labs. Note that this was performed on their top level domain, and not all subdomains that may be used for API calls.

Does the SaaS provider protect internal data in transit between services using encryption?

Yes

Yammer uses encryption between services to protect data in transit.

Does the SaaS provider protect internal data in transit between services using correctly configured certificates?

Yes

Yammer uses correctly configured certificates to protect the data in transit.

If APIs are available, does the SaaS provider protect both internal and external APIs through an authentication method?

Yes

Yammer uses access tokens for API requests. API tokens are normally generated based on a user’s successful authentication via OAuth 2, as described in the API documentation.

If there is a concept of privilege levels in the service, does the SaaS provider have the ability for low privilege users to be created?

Yes

Yammer has a privilege tree to allow various levels of access, including admins and low privilege users. See below for more details.If there is a concept of privilege levels, does the SaaS provider provide 2FA/multi-factor authentication on at least the high privileged accounts?

Yes

Whilst Yammer does not provide 2 factor authentication (2FA) by itself, it does support single sign on (SSO) through the O365 system. O365 supports 2FA, allowing Yammer to benefit from Microsoft’s 2FA system. Alternatively, Yammer can be setup with other 2FA providers who are SAML 1.1- or 2.0-compliant.

Does the SaaS provider collect logs of events?

Types of log may include security logs and resource logs

Yes

Yammer logs a large variety of activity events and offers Admins the ability to search the audit log.Does the provider make logs available to the client?

Yes

Yammer allows verified admins to monitor account activity, such as device logon details and the IP addresses associated with the logins. Verified admins can also monitor keywords they have set to ensure sensitive data is not posted to Yammer.

Standard users can also see basic account activity for their own accounts within the ‘Account Activity’ section.

Does the SaaS provider have a clear incident response and patching system in place to remedy any publicly reported issues in their service, or libraries that the service makes use of?

The provider’s previous track record on this is a good metric to see how they’ll cope with a new issue occurring.

Yes

Yammer incident response is handled by Microsoft. Additionally, the Yammer service is included in the Microsoft O365 bug bounty program.Does the SaaS provider give clear and transparent details on their product and the implemented security features (i.e. how easy has it been to answer the above questions) ?YesMost of Yammer’s security details can be found easily by navigating through the Microsoft Office site.

Source: NCSC

With over 20 years of experience, Serviceteam IT design and deliver sophisticated connectivity, communication, continuity, and cloud services, for organisations that need to stay connected 24/7. We take the time to fully understand your current challenges, and provide a solution that gives you a clear understanding of what you are purchasing and the benefits it will bring you.

To find out how we can help you, call us on 0121 468 0101, use the Contact Us form, or why not drop in and visit us at 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

We’d love to hear from you!