Azure - Intro To Azure Security (2017)
Azure - Intro To Azure Security (2017)
Azure Security
Version 5
Published June 2017
NOTE: Certain recommendations contained herein may result in increased data, network, or compute
resource usage, and increase your license or subscription costs.
(c) 2017 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this
document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some
examples are for illustration only and are fictitious. No real association is intended or inferred.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use
this document for your internal, reference purposes.
Overview
We know that security is job one in the cloud and how important it is that you find accurate and timely
information about Azure security. One of the best reasons to use Azure for your applications and
services is to take advantage of its wide array of security tools and capabilities. These tools and
capabilities help make it possible to create secure solutions on the secure Azure platform. Microsoft
Azure provides confidentiality, integrity, and availability of customer data, while also enabling
transparent accountability.
To help you better understand the collection of security controls implemented within Microsoft Azure
from both the customer's and Microsoft operations' perspectives, this white paper, "Introduction to
Azure Security", is written to provide a comprehensive look at the security available with Microsoft
Azure.
Azure Platform
Azure is a public cloud service platform that supports a broad selection of operating systems,
programming languages, frameworks, tools, databases, and devices. It can run Linux containers with
Docker integration; build apps with JavaScript, Python, .NET, PHP, Java, and Node.js; build back-ends
for iOS, Android, and Windows devices.
Azure public cloud services support the same technologies millions of developers and IT professionals
already rely on and trust. When you build on, or migrate IT assets to, a public cloud service provider
you are relying on that organization’s abilities to protect your applications and data with the services
and the controls they provide to manage the security of your cloud-based assets.
Azure’s infrastructure is designed from facility to applications for hosting millions of customers
simultaneously, and it provides a trustworthy foundation upon which businesses can meet their
security requirements.
In addition, Azure provides you with a wide array of configurable security options and the ability to
control them so that you can customize security to meet the unique requirements of your
organization’s deployments. This document helps you understand how Azure security capabilities can
help you fulfill these requirements.
NOTE
The primary focus of this document is on customer-facing controls that you can use to
customize and increase security for your applications and services.
We do provide some overview information, but for detailed information on how Microsoft
secures the Azure platform itself, see information provided in the Microsoft Trust Center.
Abstract
Initially, public cloud migrations were driven by cost savings and agility to innovate. Security was
considered a major concern for some time, and even a show stopper, for public cloud migration.
However, public cloud security has transitioned from a major concern to one of the drivers for cloud
migration. The rationale behind this is the superior ability of large public cloud service providers to
protect applications and the data of cloud-based assets.
Azure’s infrastructure is designed from the facility to applications for hosting millions of customers
simultaneously, and it provides a trustworthy foundation upon which businesses can meet their
security needs. In addition, Azure provides you with a wide array of configurable security options and
the ability to control them so that you can customize security to meet the unique requirements of your
deployments to meet your IT control policies and adhere to external regulations.
This paper outlines Microsoft’s approach to security within the Microsoft Azure cloud platform:
Security features implemented by Microsoft to secure the Azure infrastructure, customer data, and
applications. Azure services and security features available to you to manage the Security of the
Services and your data within your Azure subscriptions.
Security Development Manage your data all Trust Center How Microsoft
Cycle, Internal audits the time secures customer
data in Azure
services
Penetration testing, Provide data access The Cloud Services Who in Microsoft can
intrusion detection, on your terms Due Diligence access your data on
DDoS, Audits & Checklist what terms
logging
The built-in capabilities are organized in six (6) functional areas: Operations, Applications, Storage,
Networking, Compute, and Identity. Additional detail on the features and capabilities available in the
Azure Platform in these six (6) areas are provided through summary information.
Operations
This section provides additional information regarding key features in security operations and
summary information about these capabilities.
In addition, you can configure OMS Security & Compliance to automatically carry out specific actions
when a specific event is detected.
Azure Resource Manager template-based deployments help improve the security of solutions
deployed in Azure because standard security control settings and can be integrated into
standardized template-based deployments. This reduces the risk of security configuration errors that
might take place during manual deployments.
Application Insights
Application Insights is an extensible Application Performance Management (APM) service for web
developers. With Application Insights, you can monitor your live web applications and automatically
detect performance anomalies. It includes powerful analytics tools to help you diagnose issues and to
understand what users actually do with your apps. It monitors your application all the time it's running,
both during testing and after you've published or deployed it.
Application Insights creates charts and tables that show you, for example, what times of day you get
most users, how responsive the app is, and how well it is served by any external services that it
depends on.
If there are crashes, failures or performance issues, you can search through the telemetry data in
detail to diagnose the cause. And the service sends you emails if there are any changes in the
availability and performance of your app. Application Insight thus becomes a valuable security tool
because it helps with the availability in the confidentiality, integrity, and availability security triad.
Azure Monitor
Azure Monitor offers visualization, query, routing, alerting, auto scale, and automation on data both
from the Azure infrastructure (Activity Log) and each individual Azure resource (Diagnostic Logs). You
can use Azure Monitor to alert you on security-related events that are generated in Azure logs.
Log Analytics
Log Analytics part of Operations Management Suite – Provides an IT management solution for both
on-premises and third-party cloud-based infrastructure (such as AWS) in addition to Azure resources.
Data from Azure Monitor can be routed directly to Log Analytics so you can see metrics and logs for
your entire environment in one place.
Log Analytics can be a useful tool in forensic and other security analysis, as the tool enables you to
quickly search through large amounts of security-related entries with a flexible query approach. In
addition, on-premises firewall and proxy logs can be exported into Azure and made available for
analysis using Log Analytics.
Azure Advisor
Azure Advisor is a personalized cloud consultant that helps you to optimize your Azure deployments. It
analyzes your resource configuration and usage telemetry. It then recommends solutions to help
improve the performance, security, and high availability of your resources while looking for
opportunities to reduce your overall Azure spend. Azure Advisor provides security recommendations,
which can significant improve your overall security posture for solutions you deploy in Azure. These
recommendations are drawn from security analysis performed by Azure Security Center.
In addition, Azure Security Center helps with security operations by providing you a single dashboard
that surfaces alerts and recommendations that can be acted upon immediately. Often, you can
remediate issues with a single click within the Azure Security Center console.
Applications
The section provides additional information regarding key features in application security and
summary information about these capabilities.
Penetration Testing
If you prefer to perform your own penetration tests or want to use another scanner suite or provider,
you must follow the Azure penetration testing approval process and obtain prior approval to perform
the desired penetration tests.
The first new feature is real-time state information about application pools, worker processes, sites,
application domains, and running requests. The second new advantages are the detailed trace events
that track a request throughout the complete request-and-response process.
To enable the collection of these trace events, IIS 7 can be configured to automatically capture full
trace logs, in XML format, for any particular request based on elapsed time or error response codes.
Web server diagnostics
You can enable or disable the following kinds of logs:
Detailed Error Logging - Detailed error information for HTTP status codes that indicate a failure
(status code 400 or greater). This may contain information that can help determine why the
server returned the error code.
Failed Request Tracing - Detailed information on failed requests, including a trace of the IIS
components used to process the request and the time taken in each component. This can be
useful if you are attempting to increase site performance or isolate what is causing a specific
HTTP error to be returned.
Web Server Logging - Information about HTTP transactions using the W3C extended log file
format. This is useful when determining overall site metrics such as the number of requests
handled or how many requests are from a specific IP address.
Application diagnostics
Application diagnostics allows you to capture information produced by a web application. ASP.NET
applications can use the System.Diagnostics.Trace class to log information to the application
diagnostics log. In Application Diagnostics, there are two major types of events, those related to
application performance and those related to application failures and errors. The failures and errors
can be divided further into connectivity, security, and failure issues. Failure issues are typically related
to a problem with the application code.
Storage
The section provides additional information regarding key features in Azure storage security and
summary information about these capabilities.
Encryption in Transit
Encryption in transit is a mechanism of protecting data when it is transmitted across networks. With
Azure Storage, you can secure data using:
Transport-level encryption, such as HTTPS when you transfer data into or out of Azure Storage.
Wire encryption, such as SMB 3.0 encryption for Azure File shares.
Client-side encryption, to encrypt the data before it is transferred into storage and to decrypt the
data after it is transferred out of storage.
Encryption at rest
For many organizations, data encryption at rest is a mandatory step towards data privacy, compliance,
and data sovereignty. There are three Azure storage security features that provide encryption of data
that is “at rest”:
Storage Service Encryption allows you to request that the storage service automatically encrypt data
when writing it to Azure Storage.
Azure Disk Encryption allows you to encrypt the OS disks and data disks used by an IaaS virtual
machine.
Storage Analytics
Azure Storage Analytics performs logging and provides metrics data for a storage account. You can use
this data to trace requests, analyze usage trends, and diagnose issues with your storage account.
Storage Analytics logs detailed information about successful and failed requests to a storage service.
This information can be used to monitor individual requests and to diagnose issues with a storage
service. Requests are logged on a best-effort basis. The following types of authenticated requests are
logged:
Successful requests.
Failed requests, including timeout, throttling, network, authorization, and other errors.
Requests using a Shared Access Signature (SAS), including failed and successful requests.
Networking
The section provides additional information regarding key features in Azure network security and
summary information about these capabilities.
User-Defined Routes allow you to customize inbound and outbound paths for traffic moving into and
out of individual virtual machines or subnets to insure the most secure route possible. Forced
tunneling is a mechanism you can use to ensure that your services are not allowed to initiate a
connection to devices on the Internet.
This is different from being able to accept incoming connections and then responding to them. Front-
end web servers need to respond to requests from Internet hosts, and so Internet-sourced traffic is
allowed inbound to these web servers and the web servers can respond.
Forced tunneling is commonly used to force outbound traffic to the Internet to go through on-
premises security proxies and firewalls.
Virtual Network Security Appliances
While Network Security Groups, User-Defined Routes, and forced tunneling provide you a level of
security at the network and transport layers of the OSI model, there may be times when you want to
enable security at higher levels of the stack. You can access these enhanced network security
features by using an Azure partner network security appliance solution. You can find the most
current Azure partner network security solutions by visiting the Azure Marketplace and searching for
“security” and “network security.”
Additionally, you can connect the virtual network to your on-premises network using one of the
connectivity options available in Azure. In essence, you can expand your network to Azure, with
complete control on IP address blocks with the benefit of enterprise scale Azure provides.
Azure networking supports various secure remote access scenarios. Some of these include:
Express Route
Microsoft Azure ExpressRoute is a dedicated WAN link that lets you extend your on-premises networks
into the Microsoft cloud over a dedicated private connection facilitated by a connectivity provider.
With ExpressRoute, you can establish connections to Microsoft cloud services, such as Microsoft
Azure, Office 365, and CRM Online. Connectivity can be from an any-to-any (IP VPN) network, a point-
to-point Ethernet network, or a virtual cross-connection through a connectivity provider at a co-
location facility.
ExpressRoute connections do not go over the public Internet and thus can be considered more
secure than VPN-based solutions. This allows ExpressRoute connections to offer more reliability,
faster speeds, lower latencies, and higher security than typical connections over the Internet.
Application Gateway
Microsoft Azure Application Gateway provides an Application Delivery Controller (ADC) as a service,
offering various layer 7 load balancing capabilities for your application.
It allows you to optimize web farm productivity by offloading CPU intensive SSL termination to the
Application Gateway (also known as “SSL offload” or “SSL bridging”). It also provides other Layer 7
routing capabilities including round-robin distribution of incoming traffic, cookie-based session
affinity, URL path-based routing, and the ability to host multiple websites behind a single Application
Gateway. Azure Application Gateway is a layer-7 load balancer.
It provides failover, performance-routing HTTP requests between different servers, whether they are
on the cloud or on-premises.
Application provides many Application Delivery Controller (ADC) features including HTTP load
balancing, cookie-based session affinity, Secure Sockets Layer (SSL) offload, custom health probes,
support for multi-site, and many others.
Common Web Attacks Protection such as command injection, HTTP request smuggling, HTTP response
splitting, and remote file inclusion attack
Protection against HTTP protocol anomalies such as missing host user-agent and accept headers
A centralized web application firewall to protect against web attacks makes security management
much simpler and gives better assurance to the application against the threats of intrusions. A WAF
solution can also react to a security threat faster by patching a known vulnerability at a central location
versus securing each of individual web applications. Existing application gateways can be converted to
an application gateway with web application firewall easily.
Traffic Manager
Microsoft Azure Traffic Manager allows you to control the distribution of user traffic for service
endpoints in different data centers. Service endpoints supported by Traffic Manager include Azure
VMs, Web Apps, and Cloud services. You can also use Traffic Manager with external, non-Azure
endpoints. Traffic Manager uses the Domain Name System (DNS) to direct client requests to the most
appropriate endpoint based on a traffic-routing method and the health of the endpoints.
Traffic Manager provides a range of traffic-routing methods to suit different application needs,
endpoint health monitoring, and automatic failover. Traffic Manager is resilient to failure, including
the failure of an entire Azure region.
Load balance traffic between virtual machines in a virtual network, between virtual machines in
cloud services, or between on-premises computers and virtual machines in a cross-premises
virtual network. This configuration is known as internal load balancing.
Internal DNS
You can manage the list of DNS servers used in a VNet in the Management Portal, or in the network
configuration file. Customer can add up to 12 DNS servers for each VNet. When specifying DNS
servers, it's important to verify that you list customer’s DNS servers in the correct order for customer’s
environment. DNS server lists do not work round-robin. They are used in the order that they are
specified. If the first DNS server on the list is able to be reached, the client uses that DNS server
regardless of whether the DNS server is functioning properly or not. To change the DNS server order
for customer’s virtual network, remove the DNS servers from the list and add them back in the order
that customer wants. DNS supports the availability aspect of the “CIA” security triad.
Azure DNS
The Domain Name System, or DNS, is responsible for translating (or resolving) a website or service
name to its IP address. Azure DNS is a hosting service for DNS domains, providing name resolution
using Microsoft Azure infrastructure. By hosting your domains in Azure, you can manage your DNS
records using the same credentials, APIs, tools, and billing as your other Azure services. DNS supports
the availability aspect of the “CIA” security triad.
Event: Contains entries for which NSG rules are applied to VMs and instance roles based on MAC
address. The status for these rules is collected every 60 seconds.
Rules counter: Contains entries for how many times each NSG rule is applied to deny or allow traffic.
Add a Next Generation Firewall Recommends that you add a Next Generation Firewall (NGFW) from
a Microsoft partner to increase your security protections
Route traffic through NGFW only Recommends that you configure network security group (NSG)
rules that force inbound traffic to your VM through your NGFW.
Enable Network Security Groups on subnets or virtual machines Recommends that you enable NSGs
on subnets or VMs.
Restrict access through Internet facing endpoint Recommends that you configure inbound traffic
rules for NSGs.
Compute
The section provides additional information regarding key features in this area and summary
information about these capabilities.
SQL VM TDE
Transparent data encryption (TDE) and column level encryption (CLE) are SQL server encryption
features. This form of encryption requires customers to manage and store the cryptographic keys you
use for encryption.
The Azure Key Vault (AKV) service is designed to improve the security and management of these
keys in a secure and highly available location. The SQL Server Connector enables SQL Server to use
these keys from Azure Key Vault.
If you are running SQL Server with on-premises machines, there are steps you can follow to access
Azure Key Vault from your on-premises SQL Server machine. But for SQL Server in Azure VMs, you can
save time by using the Azure Key Vault Integration feature. With a few Azure PowerShell cmdlets to
enable this feature, you can automate the configuration necessary for a SQL VM to access your key
vault.
VM Disk Encryption
Azure Disk Encryption is a new capability that helps you encrypt your Windows and Linux IaaS virtual
machine disks. It applies the industry standard BitLocker feature of Windows and the DM-Crypt
feature of Linux to provide volume encryption for the OS and the data disks. The solution is integrated
with Azure Key Vault to help you control and manage the disk-encryption keys and secrets in your Key
Vault subscription. The solution also ensures that all data on the virtual machine disks are encrypted
at rest in your Azure storage.
Virtual networking
Virtual machines need network connectivity. To support that requirement, Azure requires virtual
machines to be connected to an Azure Virtual Network. An Azure Virtual Network is a logical construct
built on top of the physical Azure network fabric. Each logical Azure Virtual Network is isolated from all
other Azure Virtual Networks. This isolation helps insure that network traffic in your deployments is
not accessible to other Microsoft Azure customers.
Patch Updates
Patch Updates provide the basis for finding and fixing potential problems and simplify the software
update management process, both by reducing the number of software updates you must deploy in
your enterprise and by increasing your ability to monitor compliance.
Secure Identity
Microsoft uses multiple security practices and technologies across its products and services to manage
identity and access.
Multi-Factor Authentication requires users to use multiple methods for access, on-premises and in
the cloud. It provides strong authentication with a range of easy verification options, while
accommodating users with a simple sign-in process.
Password policy enforcement increases the security of traditional passwords by imposing length and
complexity requirements, forced periodic rotation, and account lockout after failed authentication
attempts.
Token-based authentication enables authentication via Active Directory Federation Services (AD FS)
or thirdparty secure token systems.
Role-based access control (RBAC) enables you to grant access based on the user’s assigned role,
making it easy to give users only the amount of access they need to perform their job duties.
You can customize RBAC per your organization’s business model and risk tolerance.
Integrated identity management (hybrid identity) enables you to maintain control of users’ access
across internal datacenters and cloud platforms, creating a single user identity for authentication
and authorization to all resources.
AZURE ACTIVE
DIRECTORY
JOIN –
WINDOWS
10 ONLY
FREE / COMMON PREMIUM P1 PREMIUM P2 RELATED
FEATURES BASIC FEATURES FEATURES FEATURES FEATURES
Directory Objects, Group-based Identity Join a device
access Self-Service Group
User/Group Protection, to Azure
management / and app
Management Management/Self- Privileged AD, Desktop
provisioning,
(add/update/delete)/ SelfService Service application Identity SSO,
User-based Password additions/Dynamic Management Microsoft
provisioning, Device Reset for cloud Groups, Self- Passport for
registration, Single Service
users, Azure AD,
Sign-On (SSO), Self- Password
Service Password Company Administrator
Reset/Change/Unlock
Change for cloud Branding Bitlocker
with on-premises
users, Connect (Logon write-back, recovery,
(Sync engine that Pages/Access MultiFactor MDM auto-
extends on- Authentication
Panel enrollment,
premises directories (Cloud and
to Azure Active customization), SelfService
Onpremises (MFA
Directory), Application Bitlocker
Server)), MIM CAL +
Security / Usage Proxy, SLA MIM Server, Cloud recovery,
Reports 99.9% App Discovery, Additional
Connect Health, local
Automatic administrators
password rollover to Windows
for group accounts 10 devices via
Azure AD Join
Cloud App Discovery is a premium feature of Azure Active Directory that enables you to identify
cloud applications that are used by the employees in your organization.
Azure Active Directory Identity Protection is a security service that uses Azure Active Directory
anomaly detection capabilities to provide a consolidated view into risk events and potential
vulnerabilities that could affect your organization’s identities.
Azure Active Directory Domain Services enables you to join Azure VMs to a domain without the
need to deploy domain controllers. Users sign in to these VMs by using their corporate Active
Directory credentials, and can seamlessly access resources.
Azure Active Directory B2C is a highly available, global identity management service for consumer-
facing apps that can scale to hundreds of millions of identities and integrate across mobile and
web platforms. Your customers can sign in to all your apps through customizable experiences that
use existing social media accounts, or you can create new standalone credentials.
Azure Active Directory B2B Collaboration is a secure partner integration solution that supports
your crosscompany relationships by enabling partners to access your corporate applications
and data selectively by using their self-managed identities.
Azure Active Directory Join enables you to extend cloud capabilities to Windows 10 devices for
centralized management. It makes it possible for users to connect to the corporate or
organizational cloud through Azure Active Directory and simplifies access to apps and
resources.
Azure Active Directory Application Proxy provides SSO and secure remote access for web
applications hosted on-premises.
Next Steps
Getting started with Microsoft Azure Security
Azure services and features you can use to help secure your services and data within Azure