Skip to the content.

Azure Security

This is not an exhaustive documentation of all the existing Azure Services. These are summarized notes for the Azure Certifications.
To see the complete documentation, please go to: Azure documentation

Shared Responsibility Model

The shared responsibility model outlines the distribution of security responsibilities between the organization and the cloud provider (Microsoft) based on the hosting environment (on-premises or cloud) and workload type (SaaS, IaaS, PaaS).

On-Premises

IaaS (Infrastructure as a Service)

PaaS (Platform as a Service)

SaaS (Software as a Service)

Back to the top

Azure Security Services

These Azure security services collectively provide a comprehensive approach to securing workloads, managing secrets, monitoring and analyzing data, and responding to security threats across the enterprise.

Microsoft Defender for Cloud

Microsoft Defender for Cloud is a security posture management and threat protection tool that is designed to protect workloads, track security posture, and streamline security management.

Secure Score

Security Recommendations

Security Alerts

Defender Features

Back to the top

Azure Key Vault

Azure Key Vault is a cloud solution for centrally storing and managing secrets, keys, certificates.

Authentication and Authorization

Back to the top

Azure Monitor

Azure Monitor collects resource and activity logs and other monitoring data that can be analyzed to provide information on all resources across your entire environment.

Events

Features

  1. Log Analytics:
    • Used to write log queries and analyze log data.
    • Enables querying and extracting insights from collected log information.
  2. Data Explorer Analysis Engine:
    • Interactively analyze log data.
    • Provides a powerful engine for working with large datasets.
  3. Application Insights Analytics Console:
    • Located in the Azure portal.
    • Allows writing log queries and interactively analyzing log data.
    • Primarily used for application performance monitoring.
  4. Visualization:
    • Render log data as tables or charts.
    • Pin visualizations to the Azure dashboard for quick access.
  5. Workbooks:
    • Create workbooks to combine multiple sets of data into a single report.
    • Customize and organize data visualizations for better insights.
  6. Alert Rules:
    • Configure log alert rules based on query results.
    • Receive notifications or trigger automated actions when defined conditions are met.
  7. Access Tools:
    • Utilize various tools to access log query results.
      • Azure CLI
      • Azure PowerShell
      • REST API
      • Custom applications
  8. Building Workflows:
    • Use Azure Monitor Logs to build workflows.
    • Retrieve log data and copy it to external locations using tools like Logic Apps.

Back to the top

Azure Sentinel

Azure Sentinel is a cloud-based security information event management (SIEM) solution. All-in one solution for:

Features

Onboarding Sentinel

Back to the top

Identity and Access Management

Azure provides a comprehensive suite of access management and identity services, allowing organizations to tailor their security measures based on specific needs.

For more information, please see the Azure IAM page.

Networking Security

Azure offers a robust suite of services for network security, providing solutions for:

These services cater to diverse needs, ensuring the security and reliability of Azure resources and connections.

Network Security Groups (NSG)

Used to filter network traffic to and from Azure resources connected to a virtual network.

For more information: Azure services compatible with NSG.

Back to the top

Azure VPN Gateway

Virtual network gateway facilitating encrypted traffic between Azure virtual networks, on-premises networks, or remote users.

Virtual Network Gateway

When a virtual network gateway is deployed, Azure provisions two or more specialized VMs under the covers.

You can deploy VPN gateways in Azure Availability Zones so they can benefit from the resiliency, scalability, and higher availability that Availability Zones provide.

Once you’ve deployed a VPN gateway, you can:


For more information: Azure VPN Gateway Documentation

Back to the top

Azure ExpressRoute

Private, dedicated connection between on-premises networks and Microsoft Cloud services.

Back to the top

Web Application Firewall (WAF)

Provides centralized protection for web applications against malicious attacks.

Back to the top

Azure Firewall

Cloud-based network security service for protecting Azure Virtual Network resources.

For more information: Azure Firewall Documentation

Back to the top

Azure DDoS Protection

A distributed denial of service attack, or DDoS attack, can wreak havoc on an internet-facing application. It’s a real concern for organizations who are considering moving their workloads to the cloud because DDoS attacks can be leveled at any internet-facing endpoint.

To help mitigate these threats, you can leverage Azure DDoS Protection. By combining this service with solid application design, you can protect yourself from dangerous DDoS attacks

DDoS Tiers

Implementation

For more information: Azure DDoS Protection Overview

Back to the top

Virtual Network Service Endpoints

Extends the private address space of an Azure virtual network.

For more information: Virtual Network Service Endpoints Overview

Back to the top

Storage Security

These security options collectively enhance the protection, management, and monitoring of data stored in Azure Storage. Each option addresses specific aspects of security, access control, and logging for a comprehensive storage security strategy.

Azure Storage Service Encryption

Automatically encrypts data in Azure Storage to meet security and compliance requirements.

For more information: Azure Storage Service Encryption

Back to the top

Shared Access Signatures (SAS)

Provides secure granular access to storage resources without compromising data security.

Types

How SAS works

Back to the top

Storage Account Keys

When you create a storage account, Azure generates two 512-bit keys which you can use to authorize access to data that resides in your storage account via Shared Key authorization.

Back to the top

Azure Storage Analytics

Performs logging and provides metrics data for storage accounts.

For more information: Azure Storage Analytics

Back to the top

Database Security

These security options provide a comprehensive approach to securing Azure SQL Databases, offering controls at various levels and addressing different aspects of data protection, access control, and auditing.

Properly configuring and utilizing these features enhances the overall security posture of database environments on Azure.

Back to the top

Azure SQL Firewall Rules

Controls access to the Azure SQL Database server’s public endpoint through IP firewall rules.

Levels

For more information: SQL Database Firewall Rules Configuration

Back to the top

Azure SQL Always Encrypted

Encrypts sensitive data (e.g., credit card numbers) within client applications, ensuring separation of data owners and managers.

For more information: Always Encrypted Documentation

Back to the top

Azure SQL Transparent Data Encryption (TDE)

Encrypts Azure SQL Databases, Azure SQL Managed Instances, and Azure Synapse data at rest to protect against offline attacks.

For more information: Transparent Data Encryption Documentation

Back to the top

Azure SQL Database Auditing

Azure SQL Database Auditing tracks database events, logging them to an audit log hosted in Azure storage, Log Analytics, or Event Hubs. It facilitates regulatory compliance, monitors database activity, identifies anomalies, and detects security violations.

Configuration

Considerations

Back to the top

Dynamic Data Masking in Azure SQL

Dynamic Data Masking (DDM) is a technology supported by Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics.

Back to the top

Use Case

An example scenario for DDM involves a call center employee who needs to identify a caller by confirming the last four digits of their social security number.

Configuration

Accessing Dynamic Data Masking

Settings to Configure

Back to the top

Masking Functions

Function Description
Default Reveals a default value for masked data.
Email Shows the first character and replaces the rest with ‘*’ for email addresses.
Custom String Reveals a specified prefix and replaces the rest with ‘*’ for strings.
Random Randomly masks a portion of the data.
Credit Card Shows the last four digits of a credit card number.
Social Security Number Shows the last four digits of a social security number.
Number Shows a random portion of a number.

Back to the top

For more information: Azure Official Documentation.

Resources