Azure Security Checklist


Quick overview of of some Azure Security Checklists to double check in your tenant.


? Ensure that multi-factor authentication is enabled for all users

? Ensure that there are no guest users.

? Use Role-Based Access Control to manage access to resources.

? Ensure that 'enable users to memorize multi-factor authentication on devices they trust' is disabled.

? Ensure that 'number of processes required to reset' is set to 2.

? Assure that 'number of days before users are asked to re-confirm their authentication report' is not set to 0.

? Assure that 'caution users on password resets' is set to yes.

? Ensure that 'notify all admins when other admins reset their password?' is set to yes

? Ensure that 'users can comply with apps obtaining company data on their account' is set to none.

? Ensure that 'users can disclose applications' is fixed to no.

? Guarantee that 'guest users agreements are limited' is set to yes.

? Ensure that 'members can request' is set to no.

? Guarantee that 'guests can invite' is set to no.

? Ensure that entrance to the Entra ID administration portal should be limited

? Ensure that 'users can create security associations' is set to none.

? Ensure that 'self-service group administration enabled' is established to no.

? Ensure that 'users who can handle security groups' is set to none.

? Ensure that 'users can create Office 365 groups' is set to no.

? Ensure that 'users who can manage Office 365 groups' is set to none.

? Ensure that 'require multifactor auth to join devices' is set to yes

? Ensure that 'secure transfer required' is arranged to enable.

? Ensure that 'storage service encryption' is set to enabled On SQL servers.

? Ensure that 'auditing' is set to on. On SQL servers,

? Ensure that 'auditing type' is set to blob On SQL servers,

? Ensure that 'threat detection' is set to on. On SQL servers

? Ensure that 'threat detection types' is set to all. On SQL servers.

? Ensure that 'send alerts to' is set.On SQL servers.

? Ensure that 'email service and co-administrators is enabled.

? On SQL servers, ensure that firewall rules are set as appropriate.

? Disable RDP access on network security groups from the internet

? Disable SSH access on network security groups from the internet.


Disclaimer - This post has only been shared for an educational and knowledge-sharing purpose related to Technologies.


#cloudsecurity #cloud #cio #ciso #cybersecurity

要查看或添加评论,请登录

Waseem Alchaar的更多文章

  • DeepSeek AI Disruption: The $2 Trillion Paradigm Shift Shaking Tech Stocks

    DeepSeek AI Disruption: The $2 Trillion Paradigm Shift Shaking Tech Stocks

    In a groundbreaking turn of events, the emergence of DeepSeek AI, a revolutionary open-source artificial intelligence…

    2 条评论
  • Identity Threat Detection and Response (ITDR): A Comprehensive Guide

    Identity Threat Detection and Response (ITDR): A Comprehensive Guide

    What is Identity Threat Detection and Response (ITDR) Identity Threat Detection and Response (ITDR) is a security…

  • Protecting Our Children Online: A Comprehensive Guide

    Protecting Our Children Online: A Comprehensive Guide

    In today's digital age, ensuring your child's safety online is more crucial than ever. With the internet being an…

  • LLM Privacy

    LLM Privacy

    Ensuring privacy in Large Language Model (LLM) applications is crucial, especially given the potential risks associated…

  • SSDLC - Secure Software Development Cycle

    SSDLC - Secure Software Development Cycle

    Incorporating Security at Every Stage: SSDLC ensures that security considerations are addressed from planning and…

    4 条评论
  • SAST, DAST, and SCA

    SAST, DAST, and SCA

    Understanding SAST, DAST, and SCA for Comprehensive Application Security In the world of application security, there…

  • API Security Standard

    API Security Standard

    API security is crucial in today’s app-driven world, where Application Programming Interfaces (APIs) play a central…

  • SaaS Security Standards

    SaaS Security Standards

    Service (SaaS) security, there are several important standards and best practices to consider. Let’s explore some of…

  • DevSecOps: How to Deliver Secure Software Faster and Better.

    DevSecOps: How to Deliver Secure Software Faster and Better.

    DevSecOps is a framework that integrates security into all phases of the software development lifecycle, from initial…

    2 条评论
  • Least Privilege and Need to Know: Two Principles for Cybersecurity

    Least Privilege and Need to Know: Two Principles for Cybersecurity

    Cybersecurity is the practice of protecting information systems and data from unauthorized access, use, modification…

社区洞察

其他会员也浏览了