Home
%3CLINGO-SUB%20id%3D%22lingo-sub-1006241%22%20slang%3D%22en-US%22%3EThe%20latest%20security%20enhancements%20for%20Azure%20Stack%20Hub%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1006241%22%20slang%3D%22en-US%22%3E%3CP%3ESecurity%20has%20always%20been%20at%20the%20heart%20of%20Azure.%20As%20we%20strive%20to%20deliver%20the%20latest%20security%20innovations%20to%20our%20customers%2C%20our%20team%20has%20improved%20the%20end-to-end%20experience%20from%20user%20workloads%20through%20the%20underlying%20infrastructure.%20With%20today%E2%80%99%20security%20news%20and%20announcements%2C%20we%E2%80%99re%20sharing%20enhanced%20tools%20from%20Azure%2C%20from%20our%20partners%2C%20and%20Azure%20Stack%20Hub%20that%20enable%20you%20to%20improve%20your%20security%20posture.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1444912943%22%20id%3D%22toc-hId--1444912943%22%20id%3D%22toc-hId--1444912943%22%20id%3D%22toc-hId--1444912943%22%3EAzure%20Security%20tools%3A%20Azure%20Sentinel%20and%20Azure%20Security%20Center%3C%2FH2%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fazure-sentinel%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Sentinel%3C%2FA%3E%26nbsp%3Brecently%20added%20support%20for%20workloads%20running%20on%20Azure%20Stack%20Hub.%26nbsp%3B%3CSTRONG%3EAzure%20Sentinel%3C%2FSTRONG%3E%26nbsp%3Benables%20you%20to%20detect%20threats%20and%20respond%20smarter%20and%20faster%20though%20Azure%20powered%20artificial%20intelligence.%20To%20learn%20more%20about%20this%20integration%2C%20click%20here.%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20also%20bringing%20our%20ongoing%20investment%20in%20cloud%20security%20with%20%3CSTRONG%3EAzure%20Security%20Center%3C%2FSTRONG%3E%20to%20Azure%20Stack%20Hub.%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fsecurity-center%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Security%20Center%3C%2FA%3E%26nbsp%3Bis%20a%20unified%20infrastructure%20security%20management%20system%20that%20strengthens%20the%20security%20posture%20of%20your%20data%20centers%20and%20provides%20advanced%20threat%20protection%20(including%20server%20Endpoint%20Detection%20and%20Response%20-%20EDR)%20across%20your%20hybrid%20workloads.%20With%20Azure%20Security%20Center%2C%20you%20can%20receive%20actionable%2C%20prioritized%20security%20recommendations%2C%20powered%20by%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsecurity-center%2Fsecurity-center-secure-score%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Secure%20Score%3C%2FA%3E%2C%20in%20order%20to%20assess%20the%20security%20of%20your%20Windows%20and%20Linux%20VMs%20running%20on%20top%20of%20Azure%20Stack%20Hub%20and%20improve%20your%20compliance%20with%20regulatory%20standards.%20To%20learn%20more%20about%20this%20integration%2C%20click%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fquick-onboard-azure-stack%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1042599890%22%20id%3D%22toc-hId-1042599890%22%20id%3D%22toc-hId-1042599890%22%20id%3D%22toc-hId-1042599890%22%3EHow%20Partners%20are%20Adding%20Security%20Expertise%20to%20Azure%20Stack%20Hub%3C%2FH2%3E%0A%3CP%3EMany%20of%20our%20customers%20operate%20Azure%20Stack%20Hub%20in%3CSTRONG%3E%26nbsp%3Bregulated%20or%20classified%20environments%3C%2FSTRONG%3E%2C%20where%20hardware%20protection%20and%20generation%20of%20keys%20and%20secrets%20are%20required.%20We%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fazure-stack-iaas-part-3%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Erecently%20announced%3C%2FA%3E%26nbsp%3Bour%20work%20with%20%3CSTRONG%3EThales%3C%2FSTRONG%3E%20to%20bring%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.thalesesecurity.com%2Fproducts%2Fkey-management%2Fciphertrust-cloud-key-manager%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECipherTrust%20Cloud%20Key%20Manager%20(CCKM)%3C%2FA%3E%26nbsp%3Bsolution%20to%20the%20Azure%20Stack%20Hub%20marketplace.%20CCKM%20enables%20customers%20to%20upload%2C%20manage%2C%20and%20revoke%20keys%20to%20and%20from%20Azure%20Key%20Vaults%20running%20in%20either%20Azure%20Stack%20Hub%20or%20Azure%2C%20all%20from%20a%20single%20pane%20of%20glass.%20%3CSTRONG%3EThales%20CCKM%3C%2FSTRONG%3E%20works%20with%20Azure%20and%20Azure%20Stack%20%26nbsp%3BHub%20%E2%80%9CBring%20Your%20Own%20Key%E2%80%9D%20(%3CSTRONG%3EBYOK%3C%2FSTRONG%3E)%20APIs%20to%20enable%20such%20key%20control.%20CCKM%20creates%20Azure-compatible%20keys%20from%20a%20FIPS%20140-2%20source%2C%20like%20the%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.thalesesecurity.com%2Fproducts%2Fdata-encryption%2Fvormetric-data-security-manager%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThales%20DSM%3C%2FA%3E%26nbsp%3Bthat%20can%20achieve%26nbsp%3B%3CSTRONG%3EFIPS%20140-2%20Level%203%3C%2FSTRONG%3E%26nbsp%3Bcompliancy.%20CCKM%20supports%20both%20Azure%20Active%20Directory%20(AAD)%20and%20Active%20Directory%20Federation%20Services%20(ADFS)%20deployments%2C%20hence%20it%20can%20run%20in%20air-gapped%20or%20disconnected%20environments.%3C%2FP%3E%0A%3CP%3EFor%20customers%20interested%20in%20obtaining%26nbsp%3B%3CSTRONG%3Evulnerability%20reports%3C%2FSTRONG%3E%26nbsp%3Band%26nbsp%3B%3CSTRONG%3EDISA%20STIG%20assessments%3C%2FSTRONG%3E%26nbsp%3Bof%20the%26nbsp%3B%3CSTRONG%3EAzure%20Stack%20Hub%20infrastructure%3C%2FSTRONG%3E%2C%20we%E2%80%99re%20happy%20to%20announce%20that%20Qualys%20has%20made%20them%20generally%20available%20from%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.qualys.com%2Fazure-stack%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EQualys%20portal%3C%2FA%3E.%20With%20each%20Azure%20Stack%20Hub%20update%20release%2C%20Microsoft%20will%20provide%20to%20Qualys%20a%20new%20vulnerability%20report%20generated%20with%20the%20Qualys%20Cloud%20Platform%2C%20enabling%20our%20customers%20to%20have%20the%20latest%20report%20available%20to%20meet%20their%20compliance%20requirements.%20Customers%20can%20also%20use%20Qualys%20Virtual%20Scanner%20Appliances%2C%20Qualys%20Cloud%20Agents%20or%20Qualys%20Container%20Sensors%20to%20assess%20their%20Azure%20Stack%20Hub%20workloads%2C%20including%20Kubernetes-based%20containers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ESplunk%3C%2FSTRONG%3E%26nbsp%3Brecently%20released%20a%20dashboard%20for%20the%20Azure%20Stack%20Hub%20infrastructure.%20The%20dashboard%20uses%20Azure%20Stack%20Hub%20domain-specific%20knowledge%20to%20enable%20Azure%20Stack%20Hub%20operators%20to%20closely%20monitor%20important%20security%20events%2C%20such%20as%20code%20integrity%20violations%2C%20privileged%20endpoint%20access%20or%20suspicious%20activity%20via%20Windows%20Defender.%20This%20will%20allow%20organizations%20to%20have%20greater%20visibility%20into%20their%20Azure%20Stack%20Hub%20environment%20and%20reduce%20time%20to%20remediate.%20The%20%3CA%20href%3D%22https%3A%2F%2Fsplunkbase.splunk.com%2Fapp%2F4559%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Azure%20Stack%20App%20for%20Splunk%3C%2FA%3E%20and%20the%20%3CA%20href%3D%22https%3A%2F%2Fsplunkbase.splunk.com%2Fapp%2F4558%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Azure%20Stack%20Add-on%20for%20Splunk%3C%2FA%3E%20are%20available%20for%20download%20on%20Splunkbase.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--764854573%22%20id%3D%22toc-hId--764854573%22%20id%3D%22toc-hId--764854573%22%20id%3D%22toc-hId--764854573%22%3EInfrastructure%20Updates%20Further%20Enhance%20Azure%20Stack%20Hub%20Security%3C%2FH2%3E%0A%3CP%3EAt%20the%20Azure%20Stack%20Hub%20infrastructure%20level%2C%20with%20the%201910%20release%2C%20Azure%20Stack%20Hub%20now%20uses%20%3CSTRONG%3E4096%20bit%20RSA%3C%2FSTRONG%3E%20keys%20for%20the%20internal%20certificates%2C%20supports%20%3CSTRONG%3EAES256%3C%2FSTRONG%3E%20for%20data%20at%20rest%20encryption%20and%20Kerberos%20authentication%2C%20%3CSTRONG%3ESHA384%3C%2FSTRONG%3E%20for%20VPN%20encryption%20and%20it%20complies%20with%20the%20Committee%20on%20National%20Security%20Systems%20-%20Policy%2015%20(%3CSTRONG%3ECNSSP-15%3C%2FSTRONG%3E)%20which%20provides%20best%20practices%20for%20the%20use%20of%20public%20encryption%20standards%20for%20secure%20information%20sharing.%3C%2FP%3E%0A%3CP%3EBeginning%20with%20the%201908%20release%2C%20Azure%20Stack%20Hub%20runs%20in%20%3CSTRONG%3EFIPS%20mode%3C%2FSTRONG%3E%20and%20the%20data%20at%20rest%20encryption%20secrets%20are%20persisted%20in%20the%20Trusted%20Platform%20Module%20(%3CSTRONG%3ETPM)%3C%2FSTRONG%3E%202.0%20chips.%20The%201906%20release%20brought%20the%20capability%20of%20Azure%20Stack%20Hub%20operators%20to%26nbsp%3B%3CSTRONG%3Eenforce%3C%2FSTRONG%3E%26nbsp%3Bthe%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure-stack%2Foperator%2Fazure-stack-security-configuration%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3ETransport%20Layer%20Security%20(TLS)%20protocol%20version%201.2%3C%2FA%3E%26nbsp%3Bon%20the%20external%20endpoints.%20This%20new%20capability%20helps%20Azure%20Stack%20Hub%20operators%20to%20secure%20their%20communications%20by%20using%20the%20more%20secure%26nbsp%3B%3CSTRONG%3ETLS%201.2%3C%2FSTRONG%3E%26nbsp%3Bas%20the%20only%20TLS%20version%20allowed.%20In%20preparation%20for%20this%20new%20capability%2C%20we%20also%20validated%20TLS%201.2%20for%20the%26nbsp%3B%3CSTRONG%3Evirtual%20machines%20extensions%3C%2FSTRONG%3E%26nbsp%3Bin%20the%20Azure%20Stack%20Hub%20marketplace%20so%20that%20you%20can%20secure%20your%20end-to-end%20communications%20with%20Azure%20Stack%20Hub%20and%20the%20workloads%20running%20on%20top%20of%20it.%3C%2FP%3E%0A%3CP%3EStarting%20with%20the%201906%20release%2C%20we%20have%20been%20adding%20improvements%20to%20the%20internal%20secret%20rotation%20engine%20as%20we%20work%20through%20making%20it%20fully%20autonomous.%20We%20also%20added%20a%26nbsp%3B%3CSTRONG%3Esafeguard%20to%20prevent%20the%20expiration%20of%20internal%20secrets%3C%2FSTRONG%3E%26nbsp%3Bby%20forcing%20internal%20secrets%20rotation%20in%20case%20a%20critical%20alert%20on%20expiring%20secrets%20is%20ignored.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20we%20continue%20to%20work%20on%20security%20features%20for%20Azure%20Stack%20Hub%2C%20let%20us%20know%20if%20there%20are%20first%20or%20third%20party%20features%20that%20you%20would%20like%20to%20see%20in%20Azure%20Stack%20Hub%20by%20leaving%20a%20comment%20below.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1006241%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Security%20Center%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Sentinel%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Stack%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EAzure%20Stack%20Hub%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EProduct%20Updates%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%20%26amp%3B%20Compliance%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1007592%22%20slang%3D%22en-US%22%3ERe%3A%20The%20latest%20security%20enhancements%20for%20Azure%20Stack%20Hub%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1007592%22%20slang%3D%22en-US%22%3E%3CP%3EI%20really%20love%20that%20are%20getting%20more%20and%20more%20integration%20between%20Azure%20and%20Azure%20Stack%20Hub.%20Security%20is%20paramount%20to%20every%20business%2C%20it%20is%20certainly%20the%20core%20pillar%20of%20Azure%20Stack%20Hub%3B%20therefore%2C%20it%20is%20great%20to%20see%20so%20many%20improvements%20and%20enhancements.%3C%2FP%3E%3CP%3EGood%20work%20guys!%3C%2FP%3E%3C%2FLINGO-BODY%3E

Security has always been at the heart of Azure. As we strive to deliver the latest security innovations to our customers, our team has improved the end-to-end experience from user workloads through the underlying infrastructure. With today’ security news and announcements, we’re sharing enhanced tools from Azure, from our partners, and Azure Stack Hub that enable you to improve your security posture.

 

Azure Security tools: Azure Sentinel and Azure Security Center

Azure Sentinel recently added support for workloads running on Azure Stack Hub. Azure Sentinel enables you to detect threats and respond smarter and faster though Azure powered artificial intelligence. To learn more about this integration, click here.

We’re also bringing our ongoing investment in cloud security with Azure Security Center to Azure Stack Hub. Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers and provides advanced threat protection (including server Endpoint Detection and Response - EDR) across your hybrid workloads. With Azure Security Center, you can receive actionable, prioritized security recommendations, powered by Azure Secure Score, in order to assess the security of your Windows and Linux VMs running on top of Azure Stack Hub and improve your compliance with regulatory standards. To learn more about this integration, click here.

 

How Partners are Adding Security Expertise to Azure Stack Hub

Many of our customers operate Azure Stack Hub in regulated or classified environments, where hardware protection and generation of keys and secrets are required. We recently announced our work with Thales to bring the CipherTrust Cloud Key Manager (CCKM) solution to the Azure Stack Hub marketplace. CCKM enables customers to upload, manage, and revoke keys to and from Azure Key Vaults running in either Azure Stack Hub or Azure, all from a single pane of glass. Thales CCKM works with Azure and Azure Stack  Hub “Bring Your Own Key” (BYOK) APIs to enable such key control. CCKM creates Azure-compatible keys from a FIPS 140-2 source, like the Thales DSM that can achieve FIPS 140-2 Level 3 compliancy. CCKM supports both Azure Active Directory (AAD) and Active Directory Federation Services (ADFS) deployments, hence it can run in air-gapped or disconnected environments.

For customers interested in obtaining vulnerability reports and DISA STIG assessments of the Azure Stack Hub infrastructure, we’re happy to announce that Qualys has made them generally available from the Qualys portal. With each Azure Stack Hub update release, Microsoft will provide to Qualys a new vulnerability report generated with the Qualys Cloud Platform, enabling our customers to have the latest report available to meet their compliance requirements. Customers can also use Qualys Virtual Scanner Appliances, Qualys Cloud Agents or Qualys Container Sensors to assess their Azure Stack Hub workloads, including Kubernetes-based containers.

 

Splunk recently released a dashboard for the Azure Stack Hub infrastructure. The dashboard uses Azure Stack Hub domain-specific knowledge to enable Azure Stack Hub operators to closely monitor important security events, such as code integrity violations, privileged endpoint access or suspicious activity via Windows Defender. This will allow organizations to have greater visibility into their Azure Stack Hub environment and reduce time to remediate. The Microsoft Azure Stack App for Splunk and the Microsoft Azure Stack Add-on for Splunk are available for download on Splunkbase.

 

Infrastructure Updates Further Enhance Azure Stack Hub Security

At the Azure Stack Hub infrastructure level, with the 1910 release, Azure Stack Hub now uses 4096 bit RSA keys for the internal certificates, supports AES256 for data at rest encryption and Kerberos authentication, SHA384 for VPN encryption and it complies with the Committee on National Security Systems - Policy 15 (CNSSP-15) which provides best practices for the use of public encryption standards for secure information sharing.

Beginning with the 1908 release, Azure Stack Hub runs in FIPS mode and the data at rest encryption secrets are persisted in the Trusted Platform Module (TPM) 2.0 chips. The 1906 release brought the capability of Azure Stack Hub operators to enforce the Transport Layer Security (TLS) protocol version 1.2 on the external endpoints. This new capability helps Azure Stack Hub operators to secure their communications by using the more secure TLS 1.2 as the only TLS version allowed. In preparation for this new capability, we also validated TLS 1.2 for the virtual machines extensions in the Azure Stack Hub marketplace so that you can secure your end-to-end communications with Azure Stack Hub and the workloads running on top of it.

Starting with the 1906 release, we have been adding improvements to the internal secret rotation engine as we work through making it fully autonomous. We also added a safeguard to prevent the expiration of internal secrets by forcing internal secrets rotation in case a critical alert on expiring secrets is ignored.

 

As we continue to work on security features for Azure Stack Hub, let us know if there are first or third party features that you would like to see in Azure Stack Hub by leaving a comment below.

1 Comment
Regular Visitor

I really love that are getting more and more integration between Azure and Azure Stack Hub. Security is paramount to every business, it is certainly the core pillar of Azure Stack Hub; therefore, it is great to see so many improvements and enhancements.

Good work guys!