Zoom's Device Managed Encryption is designed to protect users' sensitive data by encrypting it with keys only known to the authorized users’ devices. For example, some of the data in Zoom Mail Service and Restricted voicemails is encrypted with this technology. However, as detailed below, there are cases where an account administrator requires access to all of their account users’ data. Escrow allows administrators to recover their users’ data encrypted with Device Managed Encryption without giving the Zoom server access. When this feature is enabled, it requires account members to share their cryptographic keys by encrypting them for a set of designated escrow administrators for their account.
Escrow management can be performed on the Zoom web portal, but most operations (e.g. adding an escrow device, helping a user recover their data, etc.) must be performed on a device that has Zoom installed and is signed in to an account with escrow admin permissions, as these operations will have to be confirmed on the Zoom desktop app.
Learn more about the technical details of this feature in Section 3.8 of the Zoom Cryptography Whitepaper and using Device Managed Encryption.
This article covers:
There are some scenarios in which escrow may be required. In particular, account administrators often need access to their account’s user data for a variety of reasons:
For the system to function properly and to avoid data loss, escrow administrators must not lose access to their cryptographic keys, as those are necessary to recover their account users’ data. When enabling escrow, IT administrators who act as escrow administrators should make one or more backup keys (as prompted in the user interface). These backup keys can be written on paper, saved in a password manager, or otherwise kept safe. This will allow administrators to regain access to their account (and all the escrowed data) if all the administrator's physical devices are lost.
Note: If backup keys are lost, organizations risk permanently losing escrowed data.
Once escrow is enabled, as the user’s devices are online, the devices will encrypt the user’s cryptographic keys the devices can access for the escrow administrators. Until this happens, the escrow administrators will not have access to this data, even if escrow has been enabled for the account. Where possible, escrow should be enabled before using features, such as Zoom Mail Service or Restricted voicemails, which rely on Device Managed Encryption, so that all the account’s data is automatically backed up and the escrow administrators receive the encryption keys as soon as they are generated.
If escrow is set up after a feature relying on Device Managed Encryption has been in use for a while, there could be gaps in data covered by escrow, resulting in permanent data loss and an inability to fulfill data requests. Administrators are responsible for ensuring that all account users are online using their oldest device to complete this sharing process.
Enabling Escrow for your account allows your authorized admins to have access to the account user’s encryption keys. It is strongly recommended to enable escrow before using features relying on Device Managed Encryption to prevent losing data.
Note: Currently, the escrow feature allows backing up data for products leveraging Device Managed Encryption, such as Restricted voicemails and Zoom Mail Service. To enable it, the account must be using one of those products.
Before escrow starts being functional, admins must generate a backup key and enroll the first device. Once this step is completed, users will be prompted to escrow their keys.
To add a device, admins need to sign in to the Zoom desktop app. Approved escrow devices can later be used to recover your users’ data.
Notes:
The first escrow device is implicitly approved. Subsequent devices would need to be approved by authorizing additional Escrow devices as an admin.
After escrow is enabled at the account level, users with escrow administrator permissions can add their devices to the set of escrow devices, which can later be used to recover other user’s data. After the first device is enrolled, access can be extended to other devices (also belonging to administrators with the proper permissions) by having one of the existing escrow devices approve/grant access to the new device.
You must sign in to the Zoom web portal to complete this.
It is possible to add additional Escrow admins to an account to ensure that multiple escrow admins can be used to retrieve data or devices if needed.
Once the user has escrow admin privileges, they can add their first device to Escrow as an admin to complete the process.
If a user cannot access their older devices or backup keys, they can ask an escrow administrator to help recover their data by logging into a new device. Then they can request for the administrator to approve that device to grant it access to the user’s encrypted data. The administrator can help approve a user’s device as follows:
Note: Escrow administrators can confirm the fingerprint before helping the user recover their own data, to confirm they are sharing the data with the appropriate devices.
Currently, Device Managed Encryption is available for Restricted voicemails for Zoom Phone and Zoom Mail Service. Escrow allows administrators to recover their users’ data encrypted with Device Managed Encryption.
After setting up escrow, you can allow emails and voicemail messages for your entire account to be encrypted using Device Managed Encryption.
Zoom Phone users can use Device Managed Encryption for voicemails to secure the voicemails. Device Managed Encryption allows voicemail to be encrypted with keys that are not accessible to Zoom servers. This voicemail can be decrypted only by the intended user recipient. This allows users to have additional security controls over their voicemails to maintain confidentiality. This functionality has to be enabled by administrators before it's available to users.
Shared line appearance, shared line group, call queue, or auto receptionist voicemails will not be encrypted but can still be played. Email-to-voicemail, transcriptions, and checking voicemails by dialing into the voicemail system or web are not available when this feature is enabled.
Note: This setting is only available with Zoom app version 5.12.0 or later.
Learn more about Restricted voicemails for Zoom Phone.
By default, email cannot be accessed by account admins, as only sending and receiving devices store the encryption key needed to decrypt the emails. However, customers who choose a custom domain will also have the option to set up key escrow on their account, which allows a designated escrow admin in an account to receive backup copies of cryptographic keys from all users in that account. Holding copies of these keys will let the escrow admin access all emails in the account, and can allow the admin to help users recover their messages after device loss or other IT failure.
Additionally, designated admins in an account that has opted to use the key escrow feature will have access to all emails in that account, even though those emails will remain encrypted and inaccessible to anyone without the required keys, including Zoom. When the email a user is about to send will be end-to-end encrypted, the user interface will indicate this.