Please refer to our Trust center for our comprehensive security framework

BIM 360 Security at its core

Confidentiality, integrity and availability of our customer data is vital to business operations. Autodesk® BIM 360 is designed and built using best-in-class cloud software practices and powered by Amazon Web Services (AWS), the world’s leader in cloud infrastructure.

Autodesk has selected industry standard SSAE-16 AT 101 SOC 2 attestation and ISO 27001, ISO 27017 and ISO 27018 certifications to validate our security posture.* Audits are regularly performed on certified products to ensure security and availability. For more information on our accreditations please refer to our Trust Center.

Data Encryption and Privacy

BIM 360 is designed with privacy in mind. All files uploaded to BIM 360 are stored in the cloud on encrypted storage. The storage solution uses the 256-bit advanced encryption (AES-256). Network traffic containing sensitive information, such as credentials and session tokens is transmitted securely encrypted using Transfer Layer Security (TLS) encryption technology.

Access Control

Our cloud infrastructure is hosted in top tiered data centers managed by our trusted partner Amazon web services. We use role bases access control methods that restricts privileged access to the information resources based on the concept of least privilege. Authorization to access requires approval by management responsible for confidentiality, integrity and availability.

Physical Data Center Security

All data is stored in secured data centers powered by Amazon Web Services. The data centers are protected from unauthorized physical access and environmental hazards by a range of security controls.

Disaster Recovery

BIM 360 maintains high level operational excellence to ensure you are not impacted by unplanned outages. If there is any unplanned outage, our Cloud Operational personnel are available 24/7 to work as quickly as possible to restore full access to the service as soon as possible. The data centers are designed to tolerate system and hardware failures with minimum impact.

Vulnerability Scans, Penetration Testing and External Audits

Our dedicated Cloud Security team conducts regular security scans, penetration testing and external audits of BIM 360 services. Security scans and penetration testing cover a wide range of vulnerabilities defined by the Open Web Application Security Project (OWASP) and SANS Top 25.

Identity Federation Standards & Two Factor Authentication

BIM 360 supports SAML (Secure Assertion Markup Language) to facilitate Single Sign On providers. We also support Two-factor authentication to add second level of authentication to a user account during login.

Resources

Visit the Trust Center

Learn more at the Trust Center aout how we work directly with our customers to detect, monitor and prevent attacks.

View the Privacy Policy

Read more on our Privacy Policy and how we embed privacy and information responsibility.

Download the White Paper

Find more details about the BIM 360 software development, and security measures.

*These statements apply to the next-generation BIM 360 platform and modules only. Visit the Trust Center to get more details on our security framework.

Sign up for a free trial

No credit card required

Sign up to BIM 360 Docs

Get started by entering your details.

Close mobile menu