{"id":1643,"date":"2019-10-08T07:40:00","date_gmt":"2019-10-08T14:40:00","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/power-automate\/foundations-of-microsoft-flow-secure-and-compliant-automation\/"},"modified":"2025-06-11T08:01:52","modified_gmt":"2025-06-11T15:01:52","slug":"foundations-of-microsoft-flow-secure-and-compliant-automation","status":"publish","type":"post","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/power-automate\/foundations-of-microsoft-flow-secure-and-compliant-automation\/","title":{"rendered":"Foundations of Microsoft Flow\u2014secure and compliant automation"},"content":{"rendered":"<p>Hello Everyone,<\/p>\n<p>We recently published a two part blog on the Microsoft Secure blog. The blog series gives a broad overview of the fundamental security and compliance capabilities available with Microsoft Flow. We published the blogs on Microsoft Secure because of the topic and also because we hope to raise awareness of Microsoft Flow to audiences who may not know about Flow.<\/p>\n<p>We wanted to share the links to the blogs here and hope that you can take a moment to read the blogs and hopefully share with your broader audiences. Thank you!<\/p>\n<p><a href=\"https:\/\/cm-edgetun.pages.dev\/security\/blog\/2019\/09\/05\/foundations-of-microsoft-flow-secure-compliant-automation-part-1\/\">Part 1\u00a0<\/a><br \/>\n<a href=\"https:\/\/cm-edgetun.pages.dev\/security\/blog\/2019\/09\/11\/foundations-flow-secure-compliant-automation-part-2\/\">Part 2\u00a0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn about the fundamental security and compliance capabilities offered with Microsoft Flow.<\/p>\n","protected":false},"author":378,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"audience":[3378],"content-type":[27],"job-role":[],"product":[3474],"property":[],"topic":[],"coauthors":[2947],"class_list":["post-1643","post","type-post","status-publish","format-standard","hentry","audience-it-professional","content-type-customer-stories","product-power-automate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Foundations of Microsoft Flow\u2014secure and compliant automation - Microsoft Power Platform Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Foundations of Microsoft Flow\u2014secure and compliant automation - Microsoft Power Platform Blog\" \/>\n<meta property=\"og:description\" content=\"Learn about the fundamental security and compliance capabilities offered with Microsoft Flow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/power-automate\/foundations-of-microsoft-flow-secure-and-compliant-automation\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Power Platform Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-08T14:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T15:01:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2023\/12\/Microsoft-logo_rgb_c-gray_950-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Debraj Ghosh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Debraj Ghosh\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/\"},\"author\":[{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/author\/debraj-ghosh\/\",\"@type\":\"Person\",\"@name\":\"Debraj Ghosh\"}],\"headline\":\"Foundations of Microsoft Flow\u2014secure and compliant automation\",\"datePublished\":\"2019-10-08T14:40:00+00:00\",\"dateModified\":\"2025-06-11T15:01:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/\"},\"wordCount\":103,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/\",\"name\":\"Foundations of Microsoft Flow\u2014secure and compliant automation - Microsoft Power Platform Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#website\"},\"datePublished\":\"2019-10-08T14:40:00+00:00\",\"dateModified\":\"2025-06-11T15:01:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Foundations of Microsoft Flow\u2014secure and compliant automation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#website\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/\",\"name\":\"Microsoft Power Platform Blog\",\"description\":\"Innovate with Business Apps\",\"publisher\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization\",\"name\":\"Microsoft Power Platform Blog\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png\",\"contentUrl\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png\",\"width\":194,\"height\":145,\"caption\":\"Microsoft Power Platform Blog\"},\"image\":{\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/person\/3b3d19c95d23e6eea33ac6a293717cbd\",\"name\":\"Debraj Ghosh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4e33d110ae665aa4b174d81262c21e98fd304dbd9169a18ff7a69cc39d6b0403?s=96&d=mm&r=gfd96eeec1bd80482a3a39341e1e21755\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e33d110ae665aa4b174d81262c21e98fd304dbd9169a18ff7a69cc39d6b0403?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e33d110ae665aa4b174d81262c21e98fd304dbd9169a18ff7a69cc39d6b0403?s=96&d=mm&r=g\",\"caption\":\"Debraj Ghosh\"},\"url\":\"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/author\/deghos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Foundations of Microsoft Flow\u2014secure and compliant automation - Microsoft Power Platform Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/","og_locale":"en_US","og_type":"article","og_title":"Foundations of Microsoft Flow\u2014secure and compliant automation - Microsoft Power Platform Blog","og_description":"Learn about the fundamental security and compliance capabilities offered with Microsoft Flow.","og_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/power-automate\/foundations-of-microsoft-flow-secure-and-compliant-automation\/","og_site_name":"Microsoft Power Platform Blog","article_published_time":"2019-10-08T14:40:00+00:00","article_modified_time":"2025-06-11T15:01:52+00:00","og_image":[{"width":950,"height":413,"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2023\/12\/Microsoft-logo_rgb_c-gray_950-1.webp","type":"image\/png"}],"author":"Debraj Ghosh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Debraj Ghosh"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#article","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/"},"author":[{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/author\/debraj-ghosh\/","@type":"Person","@name":"Debraj Ghosh"}],"headline":"Foundations of Microsoft Flow\u2014secure and compliant automation","datePublished":"2019-10-08T14:40:00+00:00","dateModified":"2025-06-11T15:01:52+00:00","mainEntityOfPage":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/"},"wordCount":103,"commentCount":0,"publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/","name":"Foundations of Microsoft Flow\u2014secure and compliant automation - Microsoft Power Platform Blog","isPartOf":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#website"},"datePublished":"2019-10-08T14:40:00+00:00","dateModified":"2025-06-11T15:01:52+00:00","breadcrumb":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/2019\/10\/08\/foundations-of-microsoft-flow-secure-and-compliant-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/"},{"@type":"ListItem","position":2,"name":"Foundations of Microsoft Flow\u2014secure and compliant automation"}]},{"@type":"WebSite","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#website","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/","name":"Microsoft Power Platform Blog","description":"Innovate with Business Apps","publisher":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#organization","name":"Microsoft Power Platform Blog","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","contentUrl":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-content\/uploads\/2020\/03\/Microsoft-Logo-e1685482038800.png","width":194,"height":145,"caption":"Microsoft Power Platform Blog"},"image":{"@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/#\/schema\/person\/3b3d19c95d23e6eea33ac6a293717cbd","name":"Debraj Ghosh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4e33d110ae665aa4b174d81262c21e98fd304dbd9169a18ff7a69cc39d6b0403?s=96&d=mm&r=gfd96eeec1bd80482a3a39341e1e21755","url":"https:\/\/secure.gravatar.com\/avatar\/4e33d110ae665aa4b174d81262c21e98fd304dbd9169a18ff7a69cc39d6b0403?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e33d110ae665aa4b174d81262c21e98fd304dbd9169a18ff7a69cc39d6b0403?s=96&d=mm&r=g","caption":"Debraj Ghosh"},"url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/author\/deghos\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Power Platform Blog","distributor_original_site_url":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/1643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/users\/378"}],"replies":[{"embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/comments?post=1643"}],"version-history":[{"count":1,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/1643\/revisions"}],"predecessor-version":[{"id":130767,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/posts\/1643\/revisions\/130767"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/media?parent=1643"}],"wp:term":[{"taxonomy":"audience","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/audience?post=1643"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/content-type?post=1643"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/job-role?post=1643"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/product?post=1643"},{"taxonomy":"property","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/property?post=1643"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/topic?post=1643"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/power-platform\/blog\/wp-json\/wp\/v2\/coauthors?post=1643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}