Security

Official Documentation

Getting Started

  1. 10/19/2017, Mva
    Security in the Microsoft Azure cloud can be complex, and the stakes are high. This course, Microsoft Azure Security - Getting Started, will provide you with the skills you...
  2. 2/1/2015, Whitepaper
    This document is a guide to enhancing network communications security to better protect virtual infrastructure and data and applications deployed in Microsoft Azure



Latest Content

Subscribe to News about Security

Title  
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
Blog
more...


Web Content

Azure Documentation

1. Azure Security Documentation
2. Architecture and design
     2.1. Advanced threat detection
     2.2. Azure logging and auditing
     2.3. Azure network security
     2.4. Enabling operational security
     2.5. Governance in Azure
     2.6. Isolation in the Azure cloud
     2.7. Secure hybrid network architecture
     2.8. Security technical capabilities
3. Data security and encryption
     3.1. Database security
          3.1.1. Best practices
          3.1.2. Security checklist
     3.2. Disk encryption
          3.2.1. Best practices
          3.2.2. Data encryption-at-rest
          3.2.3. Disk encryption for IaaS VMs
               3.2.3.1. Disk encryption FAQ
               3.2.3.2. Troubleshooting
          3.2.4. Encrypt an Azure VM
     3.3. Azure Storage security
     3.4. Storage security guide
4. Platform and infrastructure
     4.1. Microsoft Antimalware
     4.2. IaaS security
          4.2.1. Best practices - Azure VMs
          4.2.2. Best practices - IaaS workloads
          4.2.3. Azure marketplace images
     4.3. Identity management
          4.3.1. Choose Azure AD authentication
          4.3.2. Best practices
          4.3.3. Enforce MFA on subscription administrators
     4.4. Network security
          4.4.1. Best practices
          4.4.2. DDoS Protection
          4.4.3. Boundary security
5. Application
     5.1. PaaS
          5.1.1. Azure App Service for PaaS
          5.1.2. Azure Storage for PaaS
          5.1.3. DB best practices for PaaS
          5.1.4. IoT
               5.1.4.1. IoT security best practices
               5.1.4.2. IoT security
               5.1.4.3. Secure your IoT deployment
     5.2. Azure Service Fabric security
          5.2.1. Best practices
          5.2.2. Security checklist
6. Monitoring, auditing, and operations
     6.1. Auditing and logging
          6.1.1. Security management
          6.1.2. Remote management security
          6.1.3. Azure log integration
               6.1.3.1. Introduction
               6.1.3.2. Get started
               6.1.3.3. Integrate Azure AD audit logs
               6.1.3.4. Integrate Security Center alerts
               6.1.3.5. Integrate logs from Key Vault
               6.1.3.6. FAQ
     6.2. Operational security
          6.2.1. Best practices
          6.2.2. Security checklist
7. Governance and compliance
     7.1. Financial services for regulated workloads
     7.2. GDPR
          7.2.1. Data analytics
          7.2.2. Data warehouse
          7.2.3. IaaS web application
          7.2.4. PaaS web application
     7.3. FedRAMP
          7.3.1. Data analytics
          7.3.2. Data warehouse
          7.3.3. IaaS web application
     7.4. PCI DSS
          7.4.1. Requirements overview
          7.4.2. Requirement 1 - firewalls
          7.4.3. Requirement 2 - passwords
          7.4.4. Requirement 3 - CHD
          7.4.5. Requirement 4 - encryption
          7.4.6. Requirement 5 - malware
          7.4.7. Requirement 6 - secure systems
          7.4.8. Requirement 7 - access
          7.4.9. Requirement 8 - identity
          7.4.10. Requirement 9 - physical access
          7.4.11. Requirement 10 - monitoring
          7.4.12. Requirement 11 - testing
          7.4.13. Requirement 12 - policy
     7.5. UK-OFFICIAL
          7.5.1. Principles overview
     7.6. HIPAA/HITRUST Health Data and AI
8. White papers
9. Azure security services
10. Technical overviews
11. Best practices
12. Resources
     12.1. Azure security MVP program
     12.2. Cybersecurity consulting
     12.3. Log a security event support ticket
     12.4. Pen testing
     12.5. Microsoft Threat Modeling tool
          12.5.1. Getting started
          12.5.2. Feature overview
          12.5.3. Threats
          12.5.4. Mitigations
               12.5.4.1. Auditing and logging
               12.5.4.2. Authentication
               12.5.4.3. Authorization
               12.5.4.4. Communication security
               12.5.4.5. Configuration management
               12.5.4.6. Cryptography
               12.5.4.7. Exception management
               12.5.4.8. Input validation
               12.5.4.9. Sensitive data
               12.5.4.10. Session management

Online Training Content

Date Title
1/18/2018 Hybrid Cloud Workload Protection with Azure Security Center
10/19/2017 Pluralsight: Microsoft Azure Security - Getting Started
6/23/2016 Securing Your Data in Microsoft Azure SQL Database
1/23/2016 Secure the Cloud
7/16/2015 Getting Started with Azure Security for the IT Professional
12/16/2014 Customizing ASP.NET Authentication with Identity

Tools

Tool Description
Free Tier Solution Based Billing Tracker This OMS Tracker Dashboard helps detect Security & Audit Solution related activities happening in the Azure Activity Log in an OMS workspace post 2017-06-19, and verifies if Solution Based Billing has been enabled for the Security & Audit Solution in that Free Tier OMS Workspace.

Videos

Date Title Length
5/9/2018
Find Security Flaws with AI using Microsoft Security Risk Detection, VSTS, and Azure
0:20:55
5/7/2018
Security APIs in Microsoft Graph
0:13:39
5/6/2018
Building secure cloud apps – lessons learned from Microsoft’s internal security and software engineering teams
1:33:22
5/6/2018
Removing Security Roadblocks to IoT Deployment Success
1:33:22
5/6/2018
Modernizing Mission-Critical Apps with SQL Server
1:33:22
5/6/2018
Secure and manage your Azure resources
1:33:22
5/2/2018
On the Road to Build: IoT Security
0:04:35
4/18/2018
How to configure VPN integration in Microsoft Advanced Threat Analytics
0:07:37
4/10/2018
Azure Security Center | Azure Friday
0:13:24
3/27/2018
TPM Based Authentication For IoT Devices
0:18:19

Page 1 of 25