Azure security best practices

Azure security best practices

  1. Encrypt data at rest and in-transitIf an attacker gains access to your azure SQL database, data can still be protected by 'Transparent Data encyption' - TDE . This is available for Azure SQL, Synapse analytics, Postgre SQL .Encryption key can be either managed by Azure (by selecting the default 'Service managed key) or bring your own (Customer managed key)

Default set up of TDE

Also protect the flight data using TLS - Transport Layer Security. For most of the Azure services, this is enabled by default. Else we can enable by ourselves. 'Secure transfer enabled' .

2. Restrict access to the database:

Chose the users and services to access the database.

Enable the firewall (usually enabled by default for sql db) and add the IP address which are allowed to access the database. This is suitable for development and test databases.

For Production database, wrap the database in a virtual network and set up a private endpoint link for the services to connect to the database. This sheilds the data from the outside world.

Private endpoint connection set up

3. Restrict access to the VMs

Most of the cases , VMs are accessed using RDPs / SSH ports and this leads to security vulnerability . So it is advisable to close these ports when a VM is created.

Instead deploy the VM in the virtual network and install bastian. When using bastian, the VM doesn`t need a public IP address which shields it from the outside world.

4. Protect the application secrets

Use secrets in Key vaults which contains keys and certificates for the applications.

Then the key vaults can be securely connected from the services using Azure managed service Identity. This allows the applications to connect to Key vault without using API keys or connection strings.

5. Use seperate Azure subscription for Production

Define different policies to the resources in different subscription. Also use Role based access control (RBAC) to restict the user access for the production resources. This can be applied to all the azure resources including storage account, subscription etc.,

RBAC


6. Implement a Web Application Firewall (WAF)

To protect the web application from constant attack, implement a gateway service (like a front door or application gateway) to filter the traffic.

Click 'Managed rules'

Enable the WAF feature in the services which detects the threats and block and report them.

Detecting the threat and reporting

7. Use Azure security center

This can be used to detect the security state of each service . It guides on what is to be improved to increase the security and how to implement that. It helps you to check the security periodically and set an alert when something requries our attention. It allows us to implement the security from the center directly.

Security center



Tnk u for good information

回复
Arun Garg

Microsoft Dynamics 365 F&SCM, Azure, Power Platform Technical Architect | 3x Microsoft MVP | 2x Microsoft MCT | MVP Alumni

1 年

Thanks for sharing?

Arif Nota

Internal Audit, IT/OT Cybersecurity | AI Ops | ICS Security | Big 4 Alum | Lifelong Learner | MBA | MSc Cyber | AZ-104 | AZ-500 | CISM | PMP | CISA | CHIAP | CIA | CFE | CDPSE | CRISC | CRMA

1 年

Can't stress enough the importance of Azure security best practices!

要查看或添加评论,请登录

Anitha Eswaran的更多文章

  • Customer Discovery

    Customer Discovery

    In continuation to the previous post of Solution architect journey, let us now understand what is Customer discovery…

  • Handling Business events error in Power Platform enabled VM

    Handling Business events error in Power Platform enabled VM

    When the Dev VM is linked to Power Platform, we might face issues when confuguring Business events using Event Grid or…

    2 条评论
  • Pillars of a great architecture

    Pillars of a great architecture

    Cloud technology has transformed the way organizations design and implement business applications. As a result…

  • Skills needed for Solution architect

    Skills needed for Solution architect

    A Solution Architect not only gains technical expertise from various assignments but also hones essential soft skills…

    1 条评论
  • Solution Architects: Bridging Business Needs with Technical ExcellencE

    Solution Architects: Bridging Business Needs with Technical ExcellencE

    I have recently finished MB700 and the MS Learn articles for preparing the certification played a major role in…

    2 条评论
  • Upgrades, Updates, and Hotfixes -

    Upgrades, Updates, and Hotfixes -

    When moving to the new version in Dynamics Ecosystem, Upgrade , Update and Hotfixes are part of this process. The…

    2 条评论
  • Discover the latest in D365FO 10.0.43

    Discover the latest in D365FO 10.0.43

    Preview of release: January 2025 General availability of release (self-update): March 2025 General availability of…

  • Blueprint for Success: Key Insights from the Solution Blueprint Workshop

    Blueprint for Success: Key Insights from the Solution Blueprint Workshop

    A reliable solution blueprint is crucial for successful implementation, as it lays the foundation for the solution's…

  • Key Players in a Successful D365FO Implementation

    Key Players in a Successful D365FO Implementation

    With the scope of FO large implementation, various roles with diverse skills and expertise are requried for delivering…

    1 条评论
  • Importance of Fit Gap Analysis

    Importance of Fit Gap Analysis

    What is FGA ? Fit gap analysis is a process to identify what should be done and assess the importance and complexity…

社区洞察

其他会员也浏览了