Security

Official Documentation

Getting Started

  1. 10/19/2017, Mva
    Security in the Microsoft Azure cloud can be complex, and the stakes are high. This course, Microsoft Azure Security - Getting Started, will provide you with the skills you...
  2. 2/1/2015, Whitepaper
    This document is a guide to enhancing network communications security to better protect virtual infrastructure and data and applications deployed in Microsoft Azure



Latest Content

Subscribe to News about Security

Title  
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
more...


Web Content

Security Documentation

1. Architecture and design
     1.1. Advanced threat detection
     1.2. Azure logging and auditing
     1.3. Azure network security
     1.4. Azure serverless platform security
     1.5. Enabling operational security
     1.6. Governance in Azure
     1.7. Isolation in the Azure cloud
     1.8. Secure hybrid network architecture
     1.9. Security technical capabilities
2. Data security and encryption
     2.1. Database security
          2.1.1. Best practices
          2.1.2. Security checklist
     2.2. Disk encryption
          2.2.1. Best practices
          2.2.2. Data encryption-at-rest
          2.2.3. Disk encryption for IaaS VMs
               2.2.3.1. Disk encryption prerequisites
               2.2.3.2. Disk encryption for Windows VMs
               2.2.3.3. Disk encryption for Linux VMs
               2.2.3.4. Appendix for disk encryption
               2.2.3.5. Disk encryption FAQ
               2.2.3.6. Troubleshooting
          2.2.4. Encrypt an Azure VM
     2.3. Azure Storage security
     2.4. Storage security guide
3. Platform and infrastructure
     3.1. Infrastructure security
          3.1.1. Physical security
          3.1.2. Availability
          3.1.3. Components and boundaries
          3.1.4. Network architecture
          3.1.5. Production network
          3.1.6. SQL Database
          3.1.7. Operations
          3.1.8. Monitoring
          3.1.9. Integrity
          3.1.10. Data protection
     3.2. Microsoft Antimalware
     3.3. IaaS security
          3.3.1. Best practices - IaaS workloads
          3.3.2. Azure marketplace images
     3.4. Identity management
          3.4.1. Choose Azure AD authentication
          3.4.2. Security checklist
          3.4.3. Best practices
          3.4.4. Enforce MFA on subscription administrators
     3.5. Network security
          3.5.1. Best practices
          3.5.2. DDoS Protection
          3.5.3. Boundary security
4. Application
     4.1. PaaS
          4.1.1. Azure App Service for PaaS
          4.1.2. Azure Storage for PaaS
          4.1.3. DB best practices for PaaS
     4.2. IoT
          4.2.1. IoT security best practices
          4.2.2. IoT security
          4.2.3. Secure your IoT deployment
     4.3. Azure Service Fabric security
          4.3.1. Best practices
          4.3.2. Security checklist
5. Monitoring, auditing, and operations
     5.1. Auditing and logging
          5.1.1. Security management
          5.1.2. Remote management security
          5.1.3. Azure log integration
               5.1.3.1. Introduction
               5.1.3.2. Get started
               5.1.3.3. Integrate Azure AD audit logs
               5.1.3.4. Integrate Security Center alerts
               5.1.3.5. Integrate logs from Key Vault
               5.1.3.6. FAQ
     5.2. Operational security
          5.2.1. Best practices
          5.2.2. Security checklist
6. Governance and compliance
     6.1. AU PROTECTED
          6.1.1. IaaS web application
          6.1.2. PaaS web application
     6.2. FedRAMP
          6.2.1. Data analytics
          6.2.2. Data warehouse
          6.2.3. IaaS web application
          6.2.4. PaaS web application
     6.3. FFIEC
          6.3.1. Data analytics
          6.3.2. Data warehouse
          6.3.3. IaaS web application
          6.3.4. PaaS web application
     6.4. GDPR
          6.4.1. Data analytics
          6.4.2. Data warehouse
          6.4.3. IaaS web application
          6.4.4. PaaS web application
     6.5. HIPAA/HITRUST
          6.5.1. Health Data and AI
     6.6. NIST SP 800-171
          6.6.1. Data analytics
          6.6.2. Data warehouse
          6.6.3. IaaS web application
          6.6.4. PaaS web application
     6.7. PCI DSS
          6.7.1. Data analytics
          6.7.2. Data warehouse
          6.7.3. IaaS web application
          6.7.4. PaaS web application
     6.8. TIC
          6.8.1. Trusted Internet Connection with Azure
     6.9. UK NHS
          6.9.1. Data analytics
          6.9.2. Data warehouse
          6.9.3. IaaS web application
          6.9.4. PaaS web application
     6.10. UK OFFICIAL
          6.10.1. IaaS web application
          6.10.2. PaaS web application
7. White papers
8. Azure security services
9. Technical overviews
10. Best practices
11. Resources
     11.1. Azure security MVP program
     11.2. Cybersecurity consulting
     11.3. Log a security event support ticket
     11.4. Pen testing
     11.5. Microsoft Threat Modeling tool
          11.5.1. Getting started
          11.5.2. Feature overview
          11.5.3. Threats
          11.5.4. Mitigations
               11.5.4.1. Auditing and logging
               11.5.4.2. Authentication
               11.5.4.3. Authorization
               11.5.4.4. Communication security
               11.5.4.5. Configuration management
               11.5.4.6. Cryptography
               11.5.4.7. Exception management
               11.5.4.8. Input validation
               11.5.4.9. Sensitive data
               11.5.4.10. Session management

Online Training Content

Date Title
1/18/2018 Hybrid Cloud Workload Protection with Azure Security Center
10/19/2017 Pluralsight: Microsoft Azure Security - Getting Started
6/23/2016 Securing Your Data in Microsoft Azure SQL Database
1/23/2016 Secure the Cloud
7/16/2015 Getting Started with Azure Security for the IT Professional
12/16/2014 Customizing ASP.NET Authentication with Identity

Tools

Tool Description
Secure DevOps Kit for Azure (AzSK) The "Secure DevOps Kit for Azure" ('AzSK') is a collection of scripts, tools, extensions, automations, etc. that caters to the end to end Azure subscription and resource security needs for dev ops teams using extensive automation and smoothly integrating security into native dev ops workflows helping accomplish secure dev ops with 6 focus areas.
Free Tier Solution Based Billing Tracker This OMS Tracker Dashboard helps detect Security & Audit Solution related activities happening in the Azure Activity Log in an OMS workspace post 2017-06-19, and verifies if Solution Based Billing has been enabled for the Security & Audit Solution in that Free Tier OMS Workspace.

Videos

Date Title Length
7/17/2018
A Perspective on Industrial IoT Security by TrendMicro
0:14:55
5/9/2018
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, and Azure
0:20:55
5/7/2018
Security APIs in Microsoft Graph
0:13:39
5/6/2018
Building secure cloud apps – lessons learned from Microsoft’s internal security and software engineering teams
1:33:22
5/6/2018
Removing Security Roadblocks to IoT Deployment Success
1:33:22
5/6/2018
Modernizing Mission-Critical Apps with SQL Server
1:33:22
5/6/2018
Secure and manage your Azure resources
1:33:22
5/2/2018
On the Road to Build: IoT Security
0:04:35
4/18/2018
How to configure VPN integration in Microsoft Advanced Threat Analytics
0:07:37
4/10/2018
Azure Security Center | Azure Friday
0:13:24

Page 1 of 25