Home

New Azure Security Paper Series

%3CLINGO-SUB%20id%3D%22lingo-sub-66987%22%20slang%3D%22en-US%22%3ENew%20Azure%20Security%20Paper%20Series%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-66987%22%20slang%3D%22en-US%22%3E%3CP%3EThere%20are%20a%20new%20set%20of%26nbsp%3BAzure%20Security%20Papers%26nbsp%3Bas%20announced%20%3CA%20href%3D%22https%3A%2F%2Fblogs.technet.microsoft.com%2Fyuridiogenes%2F2017%2F05%2F04%2Fnew-azure-security-paper-series%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3Ethat%20I%20thought%20were%20worth%20promoting%20in%20this%20space%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EAzure%20Operational%20Security%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20help%20customers%20better%20understand%20the%20array%20of%20security%20controls%20implemented%20within%20Microsoft%20Azure%20from%20both%20the%20customer's%20and%20Microsoft%20operational%20perspectives%2C%20this%20white%20paper%2C%20%E2%80%9CAzure%20Operational%20Security%22%2C%20is%20written%20that%20provides%20a%20comprehensive%20look%20at%20the%20operational%20security%20available%20with%20Windows%20Azure.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-operational-security%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-operational-security%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EAzure%20Advanced%20Threat%20Detection%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20white%20paper%20will%20guide%20you%20the%20%E2%80%9CMicrosoft%20Azure%20approaches%E2%80%9D%20towards%20threat%20vulnerability%20diagnostic%20and%20analysing%20the%20risk%20associated%20with%20the%20malicious%20activities%20targeted%20against%20servers%20and%20other%20Azure%20resources.%20This%20helps%20you%20to%20identify%20the%20methods%20of%20identification%20and%20vulnerability%20management%20with%20optimized%20solutions%20by%20the%20Azure%20platform%20and%20customer-facing%20security%20services%20and%20technologies.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-threat-detection%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-threat-detection%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EAzure%20Logging%20and%20Auditing%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20whitepaper%20provides%20an%20introduction%20for%20generating%2C%20collecting%2C%20and%20analyzing%20security%20logs%20from%20services%20hosted%20on%20Azure%2C%20and%20it%20can%20help%20you%20gain%20security%20insights%20into%20your%20Azure%20deployments.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-log-audit%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-log-audit%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EIntroduction%20to%20Azure%20Security%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAzure%E2%80%99s%20infrastructure%20is%20designed%20from%20facility%20to%20applications%20for%20hosting%20millions%20of%20customers%20simultaneously%2C%20and%20it%20provides%20a%20trustworthy%20foundation%20upon%20which%20businesses%20can%20meet%20their%20security%20requirements.%3C%2FP%3E%3CP%3E%3CBR%20%2F%3EIn%20addition%2C%20Azure%20provides%20you%20with%20a%20wide%20array%20of%20configurable%20security%20options%20and%20the%20ability%20to%20control%20them%20so%20that%20you%20can%20customize%20security%20to%20meet%20the%20unique%20requirements%20of%20your%20organization%E2%80%99s%20deployments.%20This%20document%20helps%20you%20understand%20how%20Azure%20security%20capabilities%20can%20help%20you%20fulfill%20these%20requirements.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-security%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-security%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EIsolation%20in%20the%20Azure%20Public%20Cloud%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20article%20outlines%20how%20Microsoft%20Azure%20provides%20isolation%20against%20both%20malicious%20and%20non-malicious%20users%20and%20serves%20as%20a%20guide%20for%20architecting%20cloud%20solutions%20by%20offering%20various%20isolation%20choices%20to%20architects.%20This%20white%20paper%20focuses%20on%20the%20technology%20of%20Azure%20platform%20and%20customer-facing%20security%20controls%2C%20and%20does%20not%20attempt%20to%20address%20SLAs%2C%20pricing%20models%2C%20and%20DevOps%20practice%20considerations.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-isolation%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity%2Fazure-isolation%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-66987%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EIdentity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ELog%20Analytics%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%20Center%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Cian Allner
Trusted Contributor

There are a new set of Azure Security Papers as announced here that I thought were worth promoting in this space:

 

Azure Operational Security

 

To help customers better understand the array of security controls implemented within Microsoft Azure from both the customer's and Microsoft operational perspectives, this white paper, “Azure Operational Security", is written that provides a comprehensive look at the operational security available with Windows Azure.

 

https://docs.microsoft.com/en-us/azure/security/azure-operational-security

 

Azure Advanced Threat Detection

 

This white paper will guide you the “Microsoft Azure approaches” towards threat vulnerability diagnostic and analysing the risk associated with the malicious activities targeted against servers and other Azure resources. This helps you to identify the methods of identification and vulnerability management with optimized solutions by the Azure platform and customer-facing security services and technologies.

 

https://docs.microsoft.com/en-us/azure/security/azure-threat-detection

 

Azure Logging and Auditing

 

This whitepaper provides an introduction for generating, collecting, and analyzing security logs from services hosted on Azure, and it can help you gain security insights into your Azure deployments.

 

https://docs.microsoft.com/en-us/azure/security/azure-log-audit

 

Introduction to Azure Security

 

Azure’s infrastructure is designed from facility to applications for hosting millions of customers simultaneously, and it provides a trustworthy foundation upon which businesses can meet their security requirements.


In addition, Azure provides you with a wide array of configurable security options and the ability to control them so that you can customize security to meet the unique requirements of your organization’s deployments. This document helps you understand how Azure security capabilities can help you fulfill these requirements.

 

https://docs.microsoft.com/en-us/azure/security/azure-security

 

Isolation in the Azure Public Cloud

 

This article outlines how Microsoft Azure provides isolation against both malicious and non-malicious users and serves as a guide for architecting cloud solutions by offering various isolation choices to architects. This white paper focuses on the technology of Azure platform and customer-facing security controls, and does not attempt to address SLAs, pricing models, and DevOps practice considerations.

 

https://docs.microsoft.com/en-us/azure/security/azure-isolation