Edit

Share via


Secure your analytics & reporting

Azure DevOps Services | Azure DevOps Server | Azure DevOps Server 2022 | Azure DevOps Server 2020

Azure DevOps analytics and reporting provide powerful insights into your development processes, but with that power comes the responsibility to protect sensitive data and control access to organizational metrics. This article outlines the security concepts, access controls, and best practices for securing your analytics and reporting implementation.

Security model overview

Analytics and reporting security operates on a multi-layered approach that includes:

Identity and access management

Access levels for reporting

Analytics and reporting capabilities vary by access level. For comprehensive information about default permissions for each access level, see Default permissions and access for reporting.

Access Level Analytics & Reporting Capabilities
Stakeholder View shared dashboards, limited analytics views, basic chart widgets
Basic Full access to Analytics views, dashboard creation and editing, all chart widgets
Basic + Test Plans Includes Basic access plus Test Plans analytics and reporting
Visual Studio Enterprise Includes all Basic features plus advanced analytics capabilities

For more information, see About access levels.

Authentication for external tools

When you connect external reporting tools to Azure DevOps, secure authentication is essential:

  • Use Microsoft Entra tokens: Use organizational identity for enhanced security and centralized management. For more information, see Use Microsoft Entra tokens
  • Configure OAuth applications: Set up secure OAuth flows for non-Microsoft integrations. For more information, see Authorize access to REST APIs with OAuth 2.0
  • Use personal access tokens (PATs) when necessary: Create tokens with minimal required scopes only when Microsoft Entra ID is not available. For more information, see Use personal access tokens

Analytics security

Data access permissions

Analytics security is built on the principle of data visibility inheritance from source projects:

Analytics views

Control access to specific data sets through Analytics views. For more information about creating and managing Analytics views, see Create an Analytics view.

View Type Security Characteristics
Shared views Accessible to all project members with appropriate permissions
Private views Only accessible to the creator
Team views Restricted to specific team members

Data filtering and privacy

Implement data filtering to protect sensitive information:

  • Configure area path restrictions: Limit analytics data to specific work item areas. For more information, see Set work tracking permissions
  • Apply field-level security: Hide sensitive work item fields from analytics. For more information, see Add and modify a field
  • Manage cross-project access: Control visibility across multiple projects.

Dashboard security

Dashboard permissions

Control who can view, edit, and manage dashboards. For step-by-step instructions on configuring dashboard permissions, see Set dashboard permissions.

Permission Level Capabilities
View View dashboard and its widgets
Edit Modify dashboard layout and widget configuration
Manage Full control including sharing and permissions management
Delete Remove dashboards and associated configurations

Widget security considerations

Different widgets have varying security implications:

  • Query-based widgets: Inherit security from underlying work item queries. For more information, see Set permissions on queries
  • Analytics widgets: Follow analytics view permissions and project access.
  • External widgets: Might require other authentication and data sharing considerations. For more information, see Security best practices
  • Custom widgets: Security depends on implementation and data sources. For more information, see Add, rename, and delete dashboards

Team and project dashboards

Manage dashboard access at different organizational levels:

For more information about dashboard types and access, see Add, rename, and delete dashboards.

Power BI integration security

Data connector security

When you use Power BI with Azure DevOps, implement these security measures. For detailed setup instructions, see Connect to Power BI Data Connector.

  • Use service principals with Microsoft Entra ID: Implement application-based authentication for automated refresh with centralized identity management. For more information, see Use Microsoft Entra tokens
  • Configure row-level security: Filter Power BI data based on user identity
  • Manage refresh credentials: Securely store and rotate data source credentials using Microsoft Entra ID authentication
  • Apply workspace permissions: Control access to Power BI workspaces containing Azure DevOps data

Data privacy in Power BI

Protect sensitive data when sharing Power BI reports:

  • Configure data sensitivity labels: Apply appropriate classification to reports and datasets
  • Implement sharing restrictions: Control who can access and share Power BI content
  • Monitor data usage: Track access patterns and identify potential security issues
  • Apply export restrictions: Limit data export capabilities based on organizational policies

For more information about Power BI security best practices, see Power BI security baseline.

Compliance and auditing

Audit logging

Track analytics and reporting activities through comprehensive audit logs:

  • Monitor dashboard access: Track who views and modifies dashboards. For more information, see Access, export, and filter audit logs
  • Audit data exports: Log when users export analytics data
  • Track Power BI connections: Monitor external tool connections and data access
  • Review permission changes: Maintain logs of security configuration modifications

Data retention and compliance

Implement appropriate data retention policies:

  • Configure analytics data retention: Set appropriate retention periods for historical data
  • Manage dashboard lifecycle: Establish processes for dashboard archival and deletion
  • Document data lineage: Maintain records of data sources and transformations
  • Implement compliance reporting: Generate reports for regulatory requirements

For more information about data protection, see Data protection overview.

Best practices for Analytics & Reporting security

Access management

  • Apply least privilege principle: Grant minimum required access for analytics and reporting needs
  • Conduct regular access reviews: Periodically audit dashboard and analytics permissions
  • Use group-based management: Manage permissions through security groups rather than individual assignments
  • Implement role-based access: Define standard roles for different reporting needs

Data protection

  • Classify data sensitivity: Identify and protect sensitive metrics and reports. For more information, see Data protection overview
  • Implement data masking: Hide or obfuscate sensitive information in shared reports. For more information, see Add and modify a field
  • Control data export: Restrict bulk data export capabilities based on user roles. For more information, see Change access levels
  • Monitor anomalous access: Watch for unusual patterns in data access and reporting. For more information, see Access, export, and filter audit logs

Integration security

  • Secure external connections: Use encrypted connections for all external reporting tools. For more information, see Use Microsoft Entra tokens
  • Validate third-party tools: Ensure external analytics tools meet security requirements. For more information, see Security best practices
  • Manage Microsoft Entra authentication: Use organizational identity management for external integrations instead of individual tokens. For more information, see Use Microsoft Entra tokens
  • Monitor integration usage: Track data access through APIs and external connections. For more information, see Access, export, and filter audit logs

Organizational governance

  • Establish reporting standards: Define approved tools and practices for organizational reporting. For more information, see Security best practices
  • Create data governance policies: Implement policies for data accuracy, privacy, and usage. For more information, see Data protection overview
  • Train users on security: Educate teams on secure reporting practices and potential risks. For more information, see Security best practices
  • Document security procedures: Maintain up-to-date documentation of security configurations and processes. For more information, see About permissions and security groups

Common security scenarios

Multi-project analytics

When implementing analytics across multiple projects, establish clear security boundaries:

Example scenario: An organization with multiple product teams needs consolidated reporting while maintaining project isolation:

Organization: TechCorp
├── Project: ProductA (Team A access only)
├── Project: ProductB (Team B access only)
├── Project: Shared Services (All teams access)
└── Project: Executive Dashboard (Managers only)

In this configuration:

  • Team members can access analytics only for their assigned projects. For more information, see Change project-level permissions
  • Shared Services metrics are visible to all teams for dependency tracking.
  • Executive dashboard provides high-level metrics without exposing sensitive project details. For more information, see Set dashboard permissions
  • Cross-project queries are restricted based on user permissions. For more information, see Create an Analytics view

External stakeholder reporting

Manage security when sharing reports with external stakeholders:

  • Create stakeholder-specific dashboards: Design views that show relevant metrics without sensitive details
  • Use read-only access: Provide view-only permissions for external users
  • Implement time-limited access: Set expiration dates for external user access
  • Apply data filtering: Ensure external users see only approved information

For guidance on managing external users, see Add external users to your organization.

Regulatory compliance reporting

For organizations with compliance requirements:

Security configuration checklist

Initial setup

External integrations

Ongoing management