MSADVANCE LOGO
✕
  • Services
  • About Us
  • Blog
  • Contact
  • English
    • Español
    • English
  • Services

    Collaboration is the key to business success.

    Migración entre tenants Microsoft 365

    Microsoft 365 Migration

    Azure Cloud Architecture

    Azure Cloud Architecture

    Modern Workplace

    Security and Compliance

  • About Us
  • Blog
  • Contact
  • English
    • Español
    • English
Published by MSAdvance on November 9, 2025
Categories
  • Microsoft 365 Compliance & Security
Tags
  • Audit
  • azure
  • Azure Policy
  • BCP
  • business continuity
  • CMEK
  • compliance
  • Conditional Access
  • Customer Key
  • Defender for Cloud
  • DLP
  • DR
  • ENS
  • Entra ID
  • ISO 27001
  • ISO/IEC 27001:2022
  • KQL
  • Microsoft 365
  • Microsoft Defender for Endpoint
  • Microsoft Purview
  • Microsoft Sentinel
  • National Security Framework
  • PIM
  • regulatory compliance
  • RTO
  • Sensitivity Labels

ENS & ISO 27001 Checklist in Microsoft 365 and Azure (2025) — Complete Guide

The National Security Framework (ENS) and ISO/IEC 27001:2022 share the same purpose: protect information and back it with evidence. In Microsoft 365 and Azure this is achieved through strong identity, technical governance, data protection, continuous monitoring, incident response, and business continuity. Throughout this guide each area is broken down—what it implies, how to configure it, how to verify it, and how to keep valid audit evidence.

Updated: November 9, 2025

Adapting Microsoft 365 and Azure to ENS and ISO 27001

The client receives a comprehensive plan with technical controls, evidence, and audit support.

Contact us View the service

Contents

  1. Executive summary and overview
  2. ENS & ISO 27001: what they are, who they apply to, and how they fit together
  3. Operating model in Microsoft: governance and responsibilities
  4. Prerequisites, licensing, and functional scope
  5. Step-by-step methodology: from requirement to evidence
  6. Identity and access (Entra ID)
  7. Data protection and privacy (Microsoft Purview)
  8. Technical governance in Azure (Management Groups, Policy, Key Vault)
  9. Posture and risk (Defender for Cloud & MDE)
  10. Logging, detection, and response (Log Analytics, Sentinel, KQL)
  11. Continuity and resilience (BCP/DR, RTO/RPO, immutability)
  12. ENS checklist by domains with examples
  13. Applied ISO 27001 (Annex A 2022) checklist
  14. Traceability, evidence, and “smoke tests” templates
  15. Common mistakes and how to avoid them
  16. Frequently asked questions
  17. Official resources
  18. Conclusion

Executive summary and overview

The client needs to demonstrate that its information is protected and that such protection is sustainable. ENS sets measures for the Public Administration and providers; ISO 27001 structures the management system (ISMS) with policies, risks, controls, metrics, and review. The Microsoft platform provides native capabilities to materialize those controls and generate repeatable evidence.

The conceptual flow is straightforward: strong identity (Entra ID) → classified and protected data (Purview) → governed configuration (Azure Policy) → assessed posture (Defender for Cloud, MDE) → logging and detection (Log Analytics, Sentinel) → response and continuity (playbooks, backup/DR). Each block adds technical barriers and creates an auditable footprint.

Tips:
  • Start with a limited scope (critical services) and expand after stabilizing controls and evidence.
  • Version decisions and changes in a repository (Git) to trace what, who, and when.
  • Measure the % of controls with current evidence and the average refresh time to prioritize.

ENS & ISO 27001: what they are, who they apply to, and how they fit together

ENS (Royal Decree 311/2022) structures security measures by categories (Basic/Medium/High) and relies on CCN-STIC guides that translate requirements by technology (for example, profiles for Azure and secure configurations for Microsoft 365). It applies to public-sector bodies and providers that deliver services to them, with a special focus on proportionality and traceability.

ISO/IEC 27001:2022 defines ISMS requirements and Annex A with 93 controls. It integrates risk management, scope, the Statement of Applicability (SoA), and continuous improvement (PDCA). It is certifiable by third parties, which brings external recognition and internal discipline.

Both frameworks are compatible: ISO provides the system and ENS provides the national catalogue of measures. In Microsoft, equivalence is supported by official mappings (for example, Azure Policy initiatives for ISO 27001 and ENS-specific documentation for Azure/M365) that facilitate verification.

Tips:
  • Align the ENS category with the ISMS risk analysis to avoid overprotection or gaps.
  • Reflect “not applicable” in the SoA with objective evidence (unused services, excluded scope).
  • Attach specific CCN-STIC guides (Azure and Office 365) to the technical dossier for auditor cross-check.

Operating model in Microsoft: governance and responsibilities

The operating structure prevents controls from depending on specific people and facilitates auditing. Separation of duties and documented delegation are key: who designs, who approves, who deploys, and who monitors.

RoleScopeKey responsibilitiesDeliverables
CISO / Security LeadGlobalPolicy, risk analysis, SoA, controlled exceptionsSigned policies, risk register, current SoA
Platform ArchitectureAzure/M365Landing zones, segmentation, tagging, system boundariesReference architecture, catalogs, and diagrams
Azure AdministrationIaaS/PaaSRBAC, networking, Azure Policy, Key Vault, diagnosticsPolicy assignments, RBAC export, topologies
Microsoft 365 AdministrationSaaSEntra ID, DLP, retention, Defender, auditingApplied policies and periodic reports
SecOpsDetection/ResponseSentinel, MDE, cases, playbooks, remediationRules, MTTA/MTTR metrics, post-mortems
ComplianceAuditTraceability and custody of evidenceDossier, calendar, and review minutes

A practical cadence: monthly (privileges, access policies, anomalies), quarterly (DLP/retention, Policy exceptions, posture), semiannual (restore tests), annual (full internal audit and updated risk analysis).

Tips:
  • Delegate roles to groups, not individuals, to simplify rotations and auditability.
  • Separate DEV/TEST/PROD with scope and tags to avoid direct changes in production.
  • Centralize Policy exceptions with automatic expiration and reminders to prevent never-ending exceptions.

Prerequisites, licensing, and functional scope

Before deploying, confirm which components are available in the tenant and subscriptions. This avoids coverage gaps and ensures visibility.

  • Entra ID: multifactor authentication, Conditional Access, Privileged Identity Management, auditing, and access reviews.
  • Microsoft Purview: classification and labels, label-based encryption, DLP for Email/SharePoint/OneDrive/Teams/endpoints, retention policies, eDiscovery.
  • Defender: Microsoft Defender for Endpoint (EDR, vulnerabilities, isolation), Defender for Office/Apps/Identity, and Defender for Cloud for Azure.
  • Azure: Management Groups, Azure Policy, Log Analytics, Microsoft Sentinel, Key Vault (CMEK), Backup, storage with immutability.
  • Compliance portals: provider catalogs and documentation to append as reference in the client’s audits.
Tips:
  • Maintain a “capabilities-by-license matrix” to clarify which subscription each control depends on.
  • Avoid overlapping third-party tools when Microsoft already covers the need—this reduces complexity and cost.
  • Quarterly license reviews allow cost optimization based on actual use without losing coverage.

Step-by-step methodology: from requirement to evidence

The sequence turns requirements into controls and controls into repeatable evidence:

  1. Define scope: services, processed data, ENS category, and risk appetite. Determine zones (DEV/TEST/PROD) and internal/external dependencies.
  2. Map controls: relate ENS/ISO requirements to Microsoft capabilities: identity, data, network, configuration, logging, detection, response, and continuity.
  3. Identify gaps: assess impact and likelihood; estimate remediation effort; prioritize quick wins that reduce the most risk.
  4. Apply remediation: policy-as-code, Policy initiatives, scoped assignments, tags, documented exceptions with expiry date.
  5. Consolidate evidence: time-bound signed exports, reports with clear filters and periods, screenshots with context, custody location, and owners.
  6. Review and improve: internal audit, corrective actions, lessons learned, and incorporation into procedures.
Tips:
  • Dashboards with traffic-light status per control (green/amber/red) speed prioritization and follow-up.
  • Automating exports and captures prevents evidence from expiring between audits.
  • Keep “near misses” with their traceability to add value to continuous improvement.

Identity and access (Entra ID)

Most modern incidents rely on credentials. Access control in Entra ID drastically reduces that attack surface.

Objectives

  • Universal strong authentication: MFA for all identities (including supported service accounts).
  • Conditional Access: require conditions by context (user and session risk, platform, device compliance, location).
  • Ephemeral privileges: PIM to grant just-in-time admin with approval, logging, and expiry.
  • Resilience: controlled break-glass accounts, monitored and for exceptional use only.
  • Continuous review: Access Reviews campaigns for critical roles and groups.

Suggested implementation

  1. Inventory current roles and admins; remove direct assignments and delegate via groups.
  2. Create baseline Conditional Access policies: require MFA, block unused high-risk countries, require compliant device for sensitive apps.
  3. Enable PIM for global and service roles; define approval flows and minimum viable durations.
  4. Configure two emergency accounts with usage controls and alerts; out-of-band custody.
  5. Plan quarterly access reviews and remove inactive members.

Useful evidence

  • Export of Conditional Access policies with list of exclusions and rationale.
  • PIM activity reports (activations, reasons, durations, approvals).
  • Minutes from access reviews with decisions and owners.
Tips:
  • Enable “Report-only” in Conditional Access before enforcing blocks to measure impact without service disruption.
  • Adopt consistent naming (CA-RequireMFA-All, CA-BlockLegacy) to reduce operational errors.
  • Tag devices by criticality and condition access to high-impact apps to sharpen risk focus.

Data protection and privacy (Microsoft Purview)

The goal is for information sensitivity to travel with the data and for improper exits to be prevented or clearly recorded.

Objectives

  • Classification and labeling: simple, understandable taxonomy; labels with encryption where truly required.
  • Channel-based DLP: coherent rules for email, sites, and endpoints; start in audit mode to understand impact and tune.
  • Retention: keep what is necessary for legal or business obligations; avoid holding data without purpose.
  • Investigation: eDiscovery and unified audit to reconstruct events when needed.
  • Cryptographic control: Customer Key when an extra layer of key control is required.

Suggested implementation

  1. Define taxonomy with business and legal: concrete examples per label and responsible owners.
  2. Publish labels in informative mode and measure adoption; enable encryption only where essential.
  3. Deploy DLP in audit mode (Email and SharePoint/OneDrive), review false positives/negatives, and move to gradual blocking.
  4. Configure retention policies by document type (contracts, HR, tax, etc.) with justified exceptions.
  5. Establish a quarterly review process for DLP incidents and rule adjustments.

Useful evidence

  • List of labels and scopes; screenshots of application and authorized decryption.
  • DLP reports by period, with trends and corrective actions.
  • Retention policies with regulatory justification and results from deletion audits.

Conceptual DLP example

Condition: Document labeled "Confidential" + external recipient Action: Block send and notify Exception: Designated owners with justification and logging
Tips:
  • Start DLP with a pilot ring of expert users to accelerate fine-tuning of rules and messaging.
  • Avoid duplicating DLP engines on the same channel to reduce conflicts and operational noise.
  • Include clear policy tips in Outlook/Word to reduce tickets and improve adoption.

Technical governance in Azure (Management Groups, Policy, Key Vault)

Technical governance reduces configuration drift and makes exceptions visible. Management Group inheritance allows controlling by default what can and cannot be deployed.

Objectives

  • Clear inheritance: Management Group structure by environment and/or region.
  • Policy as guardrail: initiatives that assess and, where appropriate, prevent noncompliant deployments.
  • Central logging: send diagnostics to a common workspace with adequate retention.
  • Keys under control: Key Vault and CMEK for resources that support it.
  • Minimal exposed network: Private Endpoints, modern TLS, and closure of legacy protocols.

Suggested implementation

  1. Define the Management Group structure (org → region/business unit → environment) and associate subscriptions.
  2. Assign the ISO 27001 initiative and other relevant ones (CIS/NIST/sector benchmarks) at the root group.
  3. Enable Diagnostic settings per subscription for Activity/Resource logs to Log Analytics.
  4. Set network standards: NSG/ASG, private subnets, Private DNS, secure gateways.
  5. Manage keys in Key Vault with rotation and access via RBAC/PIM and audit logs.
  6. Manage Policy exceptions with expiration date, reason, and owner.

Useful evidence

  • List of Policy assignments and their compliance by subscription.
  • Lists of active exceptions with expiry date and closure plan.
  • Key states, rotation, and Key Vault access logs.
Tips:
  • Start in Audit and move to Deny when documented compatible deployment paths exist—this minimizes friction.
  • Tag resources with owner and criticality to facilitate reporting and accountability.
  • Use Bicep/Terraform with PRs to avoid manual changes without trace.

Posture and risk (Defender for Cloud and Microsoft Defender for Endpoint)

Posture synthesizes hardening and exposure status. Prioritizing by risk avoids dispersion of efforts and accelerates real attack surface reduction.

Objectives

  • Impact-based priority: recommendations that most increase Secure Score and close critical gaps.
  • Vulnerability visibility on endpoints and servers, with patching and remediation plans.
  • Signals that block: device risk (MDE) integrated with compliance and Conditional Access.

Suggested implementation

  1. Enable Defender for Cloud on subscriptions and review Regulatory Compliance and service-specific recommendations.
  2. Deploy MDE to endpoints and servers, enable attack surface reduction, and test isolation.
  3. Set remediation workflow in sprints with owners and due dates.
  4. Use MDE device risk to mark noncompliant devices and condition access.

Useful evidence

  • Secure Score trend and details of closed recommendations.
  • Exposure/vulnerability reports and reduction metrics.
  • MDE cases with action timeline and outcomes.
Tips:
  • Set quarterly posture goals (e.g., +10 Secure Score points) to align effort and results.
  • Treat recurring recommendations as technical debt and link them to IT OKRs to speed closures.
  • Coordinate changes with pilot rings and maintenance windows to reduce incidents.

Logging, detection, and response (Log Analytics, Sentinel, KQL)

Without logs there is no forensics or defensible compliance. Centralizing, detecting consistently, and responding automatically shortens timelines and leaves traceability.

Objectives

  • Comprehensive ingestion from Entra ID, Microsoft 365, Azure (Activity/Resource), MDE/MDO/MDA into a central workspace.
  • Relevant detections in Sentinel, with well-designed severities and suppressions.
  • Orchestrated response with Logic Apps: isolate devices, revoke tokens, open ITSM incidents.

Suggested implementation

  1. Enable data connectors in Sentinel and validate volumes and retentions.
  2. Activate baseline rules (identity, privileges, exfiltration) and tune thresholds to reduce noise.
  3. Design playbooks for common cases (phishing, stolen token, compromised device) and test them.
  4. Version KQL queries and dashboards; document parameters and assumptions.

KQL example (admin sign-ins outside business hours)

SigninLogs | where ResultType == 0 | where Identity matches regex ".*(admin|adm).*" | where hour_of_day(TimeGenerated) < 7 or hour_of_day(TimeGenerated) > 20 | summarize attempts=count() by Identity, bin(TimeGenerated, 1h)

Useful evidence

  • List of active rules and their justification.
  • Screenshots of playbook runs with timestamps.
  • Dashboards with defined time range and exported results.
Tips:
  • Measure MTTA/MTTR and review monthly the cases with the longest response time to guide improvements.
  • Use watchlists (critical users/IPs) to enrich alerts and reduce investigation time.
  • Apply “quiet hours” with rotations to prevent alert fatigue and maintain response quality.

Continuity and resilience (BCP/DR, RTO/RPO, immutability)

Controlled exercises are the only solid evidence that the organization can resume operations after an incident. Resilience is not a one-off habit; it is a continuous process.

Objectives

  • Realistic RTO/RPO by service and data, agreed with the business.
  • Immutable backups and offline copies or retention that can withstand insider fraud or ransomware.
  • Resilient architectures: availability zones, paired regions, private traffic, and plane separation.
  • Drills with minutes, measured times, and improvement actions.

Suggested implementation

  1. Catalogue services and dependencies; document RTO/RPO and criticality metrics.
  2. Configure backup policies with immutability and periodic restore tests.
  3. Define runbooks (what, who, how) for typical disruptions.
  4. Run semiannual drills and close derived actions.

Useful evidence

  • Signed BCP/DR plan, topologies, and owners.
  • Backup reports and logs from real restorations.
  • Drill minutes with results and improvements.
Tips:
  • Separate backup accounts and permissions from operational ones to hinder attacker lateral movement.
  • Test representative restorations (files, databases, critical workloads) to validate the plan realistically.
  • Simulate “no-privilege” scenarios to test emergency playbook effectiveness.

ENS checklist by domains with examples

Indicative list of ENS measures and their technical reflection in Microsoft. Final priority depends on the risk analysis and the ENS category of the system.

ENS domainTechnical action in MicrosoftSuggested evidence
OrganizationLeast-privilege RBAC; segmentation with Management Groups; reviewable delegationExport of roles/assignments; responsibility matrix
ProtectionMFA + Conditional Access; CMEK/Customer Key encryption; DLP and labelsCA policies; key status; exported policies
DetectionDefender for Cloud + MDE; centralized diagnostics; Secure ScorePosture reports and quarterly trend
ResponseSentinel with rules and playbooks (isolate, revoke, notify)Runbooks; MTTA/MTTR; closed cases
RecoveryImmutable backup, GRS/ZRS, DR testsDrill minutes; RTO/RPO metrics
PreventionBaseline hardening (Policy/templates), block insecure protocols, inventoryList of applied definitions; justified exceptions
Tips:
  • Link each ENS measure to a technical owner and a success metric to accelerate implementation.
  • Use per-domain ENS dashboards for monthly tracking to ease governance and reporting.
  • Store screenshots/exports with period naming (YYYY-MM) to speed up audits.

Applied ISO 27001 (Annex A 2022) checklist

Selection of high-impact controls in Microsoft. The client’s SoA must reflect applicable controls, exclusions, and reasons.

ControlImplementation in MicrosoftEvidence
A 5.15 Identity securityMFA, Conditional Access, and PIM in Entra ID; emergency accountsCA export, PIM logs, reviews
A 8.24 Key managementKey Vault (CMEK), Customer Key, rotation, restricted accessKey state/rotation; access audit
A 8.16 Logging and monitoringLog Analytics + Sentinel; per-subscription diagnosticsKQL queries, retention, dashboards
A 8.28 Data protectionSensitivity labels, encryption, DLP, retentionExported policies; DLP incidents
A 8.23 VulnerabilitiesMDE (exposure, patches); Defender for Cloud (recommendations)Exposure reports and closures
A 5.17 Supplier relationshipsThird-party assessment, security annexes, and provider evidenceContracts, certificates, service boundaries
Tips:
  • Base the SoA on operational reality to avoid “applicable but not implemented.”
  • Link technical controls with procedures and training to ensure sustainability.
  • Run a prior internal audit with sampling and interviews to reduce findings in certification.

Traceability, evidence, and “smoke tests” templates

Traceability matrix (summary)

ControlActionEvidenceOwnerFrequency
100% MFACA policy “Require MFA”CA export + justified exceptionsIT SecurityMonthly
CMEK encryptionKey Vault + config in Storage/SQLKey state/rotationArchitectureSemiannual
Email DLPRule “Confidential — no external”DLP reports and FP/FN reviewComplianceQuarterly
Centralized logsDiagnostic settings to Log AnalyticsPolicies and retentionSecOpsMonthly
DR testedAnnual restore drillMinutes with RTO/RPOOperationsAnnual

Quick checklist (smoke tests)

AreaCheckHow to verify
IdentityMFA enforced for allCA export and exclusion review
PrivilegesPIM active for critical rolesList of roles and PIM activity
AzureISO 27001 initiative at root MGPolicy → Assignments
LogsActivity/Resource to central workspaceDiagnostic settings per subscription
DataAt least one label with encryptionLabel list and application test

Short examples

Conceptual policy — “Block access without MFA”

Condition: User without MFA method

Action: Require MFA; deny if not passed
Exception: Documented emergency accounts, with review

KQL — unusual administrative activity

SigninLogs

| where ResultType == 0
| where Identity matches regex ".(admin|adm)."
| where hour_of_day(TimeGenerated) < 7 or hour_of_day(TimeGenerated) > 20
| summarize attempts=count() by Identity, bin(TimeGenerated, 1h)
Tips:
  • Export templates to CSV/JSON and keep timestamped samples to build a reusable evidence base.
  • Schedule reminders to renew evidence before expiry to avoid last-minute rush.
  • Maintain a “black box” with KQL queries and critical procedures accessible in contingency to add operational resilience.

Common mistakes and how to avoid them

  • Confusing provider compliance with client compliance. Provider certificates are a reference, not a substitute for the client’s controls.
  • Uncontrolled Policy exceptions. Every exception needs a reason, scope, and end date; without this, they become permanent.
  • No change log. Lack of traceability slows audits and makes forensics more expensive.
  • DR not tested. Valid evidence is the executed, measured restoration—not the written plan.
  • Unmaintained Sentinel rules. Without threshold review and tuning, noise hides relevant alerts.
Tips:
  • Treat exceptions as “debt” with owner and deadline to prevent perpetuation.
  • Integrate changes into a lightweight CAB calendar with risk criteria to improve deployment quality.
  • Quarterly review of rules with most false positives improves Sentinel’s useful signal.

Frequently asked questions

Does ENS require using services with specific certifications?

ENS requires measures and evidence. Using accredited services facilitates verification, but responsibility for the client’s controls remains with the client.

How many controls does ISO 27001:2022 include?

The 2022 Annex A includes 93 controls grouped into four categories: organizational, people, physical, and technological.

How can compliance progress be visualized in Azure?

By assigning initiatives (e.g., ISO 27001) in Azure Policy and reviewing the compliance dashboard and recommendations in Defender for Cloud.

What cadence is reasonable for evidence?

Monthly for identity and logs, quarterly for DLP/retention/posture, semiannual for restorations, annual for a full internal audit.

Official resources

  • Royal Decree 311/2022 (ENS) — BOE
  • ENS regulations — CCN
  • CCN-STIC Guides (800/1000 series for Microsoft technologies)
  • ENS at Microsoft (Azure/Microsoft 365)
  • Compliance in Azure
  • Azure Policy — ISO 27001 initiative
  • Azure — ISO/IEC 27001
  • Microsoft Compliance offerings
  • ISO/IEC 27001 — official page
  • CCN-STIC-884 — ENS profile in Azure
  • CCN-STIC-885A — Secure configuration for Office 365

Conclusion

Treating ENS and ISO 27001 as an ongoing program—with default controls, periodic reviews, and clear evidence—reduces risk and simplifies audits. With Entra ID, Purview, Azure Policy, Defender for Cloud, MDE, and Sentinel, the client has a solid, traceable technical foundation.

Adapting Microsoft 365 and Azure to ENS for the client

Controls are implemented, policies are automated, and the evidence dossier is prepared for audit.

Start the adaptation See service scope

ENS & ISO 27001 Checklist in Microsoft 365 and Azure (2025) — Complete Guide
Share
53

Related posts

November 23, 2025

Microsoft 365 backup and recovery (2025): complete guide to protecting email, OneDrive, SharePoint, and Teams


Read more
November 19, 2025

Ransomware in Microsoft 365 and Azure (2025): prevention, detection, recovery & immutable backup


Read more
October 4, 2025

How to Configure Microsoft Purview (2025) | Complete Guide


Read more

Do you have an idea, a challenge, or a specific business need?

Speak with our experts about your next big project

This is only a glimpse of what we can do. Whatever you have in mind—no matter how unique or complex—we are ready to turn it into reality.

info@msadvance.com

Contact Us

Services

About Us

Blog

Cookies Policy

Privacy Statement

Legal Notice / Imprint

© 2025 MSAdvance | All rights reserved worldwide

MSAdvance
Gestionar consentimiento
Para ofrecer las mejores experiencias, utilizamos tecnologías como las cookies para almacenar y/o acceder a la información del dispositivo. El consentimiento de estas tecnologías nos permitirá procesar datos como el comportamiento de navegación o las identificaciones únicas en este sitio. No consentir o retirar el consentimiento, puede afectar negativamente a ciertas características y funciones.
Funcional Always active
El almacenamiento o acceso técnico es estrictamente necesario para el propósito legítimo de permitir el uso de un servicio específico explícitamente solicitado por el abonado o usuario, o con el único propósito de llevar a cabo la transmisión de una comunicación a través de una red de comunicaciones electrónicas.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Estadísticas
El almacenamiento o acceso técnico que es utilizado exclusivamente con fines estadísticos. El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
El almacenamiento o acceso técnico es necesario para crear perfiles de usuario para enviar publicidad, o para rastrear al usuario en una web o en varias web con fines de marketing similares.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Ver preferencias
  • {title}
  • {title}
  • {title}