Top 10 Best Practices for Azure Security

%3CLINGO-SUB%20id%3D%22lingo-sub-1803793%22%20slang%3D%22en-US%22%3ETop%2010%20Best%20Practices%20for%20Azure%20Security%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1803793%22%20slang%3D%22en-US%22%3E%3CP%3EOur%20Azure%20products%20and%20services%20come%20with%20comprehensive%20security%20features%20and%20configuration%20settings.%20They%20are%20mostly%20customizable%20(to%20a%20point)%2C%20so%20you%20can%20define%20and%20implement%20a%20security%20posture%20that%20reflects%20the%20need%20of%20your%20organization.%20But%20adopting%20%26amp%3B%20maintaining%20a%20good%20security%20posture%20goes%20far%20beyond%20turning%20on%20the%20right%20settings.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMark%20Simos%2C%20lead%20Cyber%20security%20architect%20for%20Microsoft%2C%20explored%20the%20lessons%20learned%20from%20protecting%20both%20Microsoft's%20own%20technology%20environments%20and%20the%20responsibility%20we%20have%20to%20our%20customers%2C%20and%20shares%20the%20top%2010%20(%2B1!)%20recommendations%20for%20Azure%20security%20best%20practices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fcloud-adoption-framework%2Fsecurity%2Fsecurity-top-10%3FWT.mc_id%3Dmodinfra-9720-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHere's%20the%20list%3A%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E1.%20People%3A%20Educate%20teams%20about%20the%20cloud%20security%20journey%3C%2FP%3E%0A%3CP%3E2.%20People%3A%20Educate%20teams%20on%20cloud%20security%20technology%3C%2FP%3E%0A%3CP%3E3.%20Process%3A%20Assign%20accountability%20for%20cloud%20security%20decisions%3C%2FP%3E%0A%3CP%3E4.%20Process%3A%20Update%20Incident%20Response%20(IR)%20processes%20for%20cloud%3C%2FP%3E%0A%3CP%3E5.%20Process%3A%20Establish%20security%20posture%20management%3C%2FP%3E%0A%3CP%3E6.%20Technology%3A%20Require%20Passwordless%20or%20Multi-Factor-Authentication%3C%2FP%3E%0A%3CP%3E7.%20Technology%3A%20Integrate%20native%20firewall%20and%20network%20security%3C%2FP%3E%0A%3CP%3E8.%20Technology%3A%20Integrate%20native%20threat%20detection%3C%2FP%3E%0A%3CP%3E9.%20Architecture%3A%20Standardize%20on%20a%20single%20directory%20and%20identity%3C%2FP%3E%0A%3CP%3E10.%20Architecture%3A%20Use%20identity-based%20access%20control%20(instead%20of%20keys)%3C%2FP%3E%0A%3CP%3E11.%20Architecture%3A%20Establish%20a%20single%20unified%20security%20strategy%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2Ftop-10-best-practices-for-azure-security%2Fba-p%2F1770087%22%20target%3D%22_blank%22%3E%3CSTRONG%3ERead%20the%20full%20article%3C%2FSTRONG%3E%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Our Azure products and services come with comprehensive security features and configuration settings. They are mostly customizable (to a point), so you can define and implement a security posture that reflects the need of your organization. But adopting & maintaining a good security posture goes far beyond turning on the right settings.

 

Mark Simos, lead Cyber security architect for Microsoft, explored the lessons learned from protecting both Microsoft's own technology environments and the responsibility we have to our customers, and shares the top 10 (+1!) recommendations for Azure security best practices.

 

Here's the list:

1. People: Educate teams about the cloud security journey

2. People: Educate teams on cloud security technology

3. Process: Assign accountability for cloud security decisions

4. Process: Update Incident Response (IR) processes for cloud

5. Process: Establish security posture management

6. Technology: Require Passwordless or Multi-Factor-Authentication

7. Technology: Integrate native firewall and network security

8. Technology: Integrate native threat detection

9. Architecture: Standardize on a single directory and identity

10. Architecture: Use identity-based access control (instead of keys)

11. Architecture: Establish a single unified security strategy

 

Read the full article

0 Replies