%3CLINGO-SUB%20id%3D%22lingo-sub-1770087%22%20slang%3D%22en-US%22%3ETop%2010%20Best%20Practices%20for%20Azure%20Security%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1770087%22%20slang%3D%22en-US%22%3E%3CP%3EOur%20Azure%20products%20and%20services%20come%20with%20comprehensive%20security%20features%20and%20configuration%20settings.%20They%20are%20mostly%20customizable%20(to%20a%20point)%2C%20so%20you%20can%20define%20and%20implement%20a%20security%20posture%20that%20reflects%20the%20need%20of%20your%20organization.%20But%20adopting%20%26amp%3B%20maintaining%20a%20good%20security%20posture%20goes%20far%20beyond%20turning%20on%20the%20right%20settings.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMark%20Simos%2C%20lead%20Cyber%20security%20architect%20for%20Microsoft%2C%20explored%20the%20lessons%20learned%20from%20protecting%20both%20Microsoft's%20own%20technology%20environments%20and%20the%20responsibility%20we%20have%20to%20our%20customers%2C%20and%20shares%20the%20top%2010%20(%2B1!)%20recommendations%20for%20Azure%20security%20best%20practices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fcloud-adoption-framework%2Fsecurity%2Fsecurity-top-10%3FWT.mc_id%3Dmodinfra-9720-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHere's%20the%20list%3A%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E1.%20People%3A%20Educate%20teams%20about%20the%20cloud%20security%20journey%3C%2FP%3E%0A%3CP%3E2.%20People%3A%20Educate%20teams%20on%20cloud%20security%20technology%3C%2FP%3E%0A%3CP%3E3.%20Process%3A%20Assign%20accountability%20for%20cloud%20security%20decisions%3C%2FP%3E%0A%3CP%3E4.%20Process%3A%20Update%20Incident%20Response%20(IR)%20processes%20for%20cloud%3C%2FP%3E%0A%3CP%3E5.%20Process%3A%20Establish%20security%20posture%20management%3C%2FP%3E%0A%3CP%3E6.%20Technology%3A%20Require%20Passwordless%20or%20Multi-Factor-Authentication%3C%2FP%3E%0A%3CP%3E7.%20Technology%3A%20Integrate%20native%20firewall%20and%20network%20security%3C%2FP%3E%0A%3CP%3E8.%20Technology%3A%20Integrate%20native%20threat%20detection%3C%2FP%3E%0A%3CP%3E9.%20Architecture%3A%20Standardize%20on%20a%20single%20directory%20and%20identity%3C%2FP%3E%0A%3CP%3E10.%20Architecture%3A%20Use%20identity-based%20access%20control%20(instead%20of%20keys)%3C%2FP%3E%0A%3CP%3E11.%20Architecture%3A%20Establish%20a%20single%20unified%20security%20strategy%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThese%20best%20practices%20have%20been%20included%20as%20a%20resource%20in%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fcloud-adoption-framework%2F%3FWT.mc_id%3Dmodinfra-9720-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20Adoption%20Framework%20for%20Azure%3C%2FA%3E%2C%20where%20you%20can%20get%20more%20details%20on%20what%2C%20why%2C%20who%20and%20how%20of%20each%20of%20these%20points.%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fcloud-adoption-framework%2Fsecurity%2Fsecurity-top-10%3FWT.mc_id%3Dmodinfra-9720-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EGet%20the%20details%20here.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EI%20love%20that%20this%20is%20broken%20into%20people%2C%20process%2C%20technology%2C%20and%20architecture.%20While%20statistics%20prove%20that%20capabilities%20like%20Multi-Factor%20Authentication%20significantly%20reduce%20security%20risk%2C%20both%20people%20and%20processes%20are%20crucial%20to%20protecting%20from%20and%20responding%20to%20security%20threats.%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESome%20of%20those%20points%20look%20clear%20and%20simple%20on%20the%20surface%20but%20may%20be%20the%20hardest%20to%20implement%20in%20your%20organization%20(like%20assigning%20accountability%20for%20cloud%20security%20decisions).%20Or%20you%20may%20have%20many%20of%20the%20people%20and%20process%20items%20already%20in%20place%20for%20an%20on-premises%20environment%20-%20these%20are%20just%20as%20valid%20for%20on-prem%20or%20hybrid%20environments%20too.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EDon't%20brush%20this%20off%20as%20too%20simple%20and%20not%20worth%20your%20time.%20Locking%20the%20front%20door%20of%20your%20house%20is%20a%20simple%20but%20effective%20habit%20for%20increasing%20the%20security%20of%20your%20home.%20Complex%20technology%20systems%20can%20also%20benefit%20from%20organizations%20having%20the%20simplest%2C%20most%20effective%20people%20and%20process%20elements%20too.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EPrefer%20to%20watch%20a%20video%3F%3C%2FEM%3E%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fvideo-hub%2Ftop-10-best-practices-for-azure-security%2Fm-p%2F1698837%3FWT.mc_id%3Dmodinfra-9720-socuff%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ELet%20Mark%20take%20you%20through%20the%20details%20of%20each%20tip%3C%2FA%3E%3A%3C%2FP%3E%0A%3CP%3E%3CIFRAME%20src%3D%22https%3A%2F%2Fwww.youtube.com%2Fembed%2Fg0hgtxBDZVE%22%20width%3D%22560%22%20height%3D%22315%22%20frameborder%3D%220%22%20allowfullscreen%3D%22allowfullscreen%22%20allow%3D%22accelerometer%3B%20autoplay%3B%20clipboard-write%3B%20encrypted-media%3B%20gyroscope%3B%20picture-in-picture%22%3E%3C%2FIFRAME%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1770087%22%20slang%3D%22en-US%22%3E%3CP%3ESee%20our%20Top%2010%20suggestions%20for%20the%20best%20security%20posture%20in%20Azure.%26nbsp%3B%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Security%20Process%20Summary%20Cropped.png%22%20style%3D%22width%3A%20814px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F225896iF3316909F42283F2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Security%20Process%20Summary%20Cropped.png%22%20alt%3D%22Security%20Process%20Summary%20Cropped.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1770087%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESonia%20Cuff%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Our Azure products and services come with comprehensive security features and configuration settings. They are mostly customizable (to a point), so you can define and implement a security posture that reflects the need of your organization. But adopting & maintaining a good security posture goes far beyond turning on the right settings.

 

Mark Simos, lead Cyber security architect for Microsoft, explored the lessons learned from protecting both Microsoft's own technology environments and the responsibility we have to our customers, and shares the top 10 (+1!) recommendations for Azure security best practices.

 

Here's the list:

1. People: Educate teams about the cloud security journey

2. People: Educate teams on cloud security technology

3. Process: Assign accountability for cloud security decisions

4. Process: Update Incident Response (IR) processes for cloud

5. Process: Establish security posture management

6. Technology: Require Passwordless or Multi-Factor-Authentication

7. Technology: Integrate native firewall and network security

8. Technology: Integrate native threat detection

9. Architecture: Standardize on a single directory and identity

10. Architecture: Use identity-based access control (instead of keys)

11. Architecture: Establish a single unified security strategy

 

These best practices have been included as a resource in the Microsoft Cloud Adoption Framework for Azure, where you can get more details on what, why, who and how of each of these points. Get the details here.

 

I love that this is broken into people, process, technology, and architecture. While statistics prove that capabilities like Multi-Factor Authentication significantly reduce security risk, both people and processes are crucial to protecting from and responding to security threats.   

 

Some of those points look clear and simple on the surface but may be the hardest to implement in your organization (like assigning accountability for cloud security decisions). Or you may have many of the people and process items already in place for an on-premises environment - these are just as valid for on-prem or hybrid environments too.

 

Don't brush this off as too simple and not worth your time. Locking the front door of your house is a simple but effective habit for increasing the security of your home. Complex technology systems can also benefit from organizations having the simplest, most effective people and process elements too.

 

Prefer to watch a video? Let Mark take you through the details of each tip: