While designing cloud solutions using Microsoft Azure, security best practices are key to ensuring your infrastructure is resilient to attacks while safeguarding user access and protecting customer data.
There are different ways to improve the security of networking and containerised infrastructures, from the Azure resource group level all the way down to the individual components. Azure monitoring plays a key role in identifying vulnerability, using Azure Monitor. We will also look into securing our data using tools such as Azure information protection, encryption of storage accounts and databases and Azure Key Vault.
List of Azure security components:
Category | Azure services |
1. Networking |
|
2. Identity and access management |
|
3. Database security |
|
4. Storage security |
|
5. General Azure security |
|
6. Backup and disaster recovery |
|
Some of the key security best practices are:
Azure network security best practices:
Always adopt a "zero trust" approach. Nowadays, many companies in financial services, retail, eCommerce and government have adopted zero trust architecture. In this model, all accesses are strongly authenticated and authorised using inbuilt policies. This model helps in inspecting anomalies and achieving compliance.
To adopt this zero trust approach in Azure, carry out the following:
Azure identity and access management best practices:
Identity management is the process of providing multiple levels of authenticating, authorising and controlling information using Azure security principals. Identity and access management help protect resources and applications using Conditional Access policies and monitor activity through alerting, auditing and reporting.
To implement these best practices, do the following:
Azure database security best practices:
When it comes to databases, security is the main concern and top priority.
In the Azure SQL Database you should:
By enabling database threat protection you are alerted to potential threats in real-time.
VM and operating systems security best practices:
You should integrate Azure AD authentication for authentication of Linux VM’s.
Here is how to do it:
Best practices for data protection:
There are two states in which your data can occur i.e data at rest and data in transit. Data at rest include VM Iaas disk encryption with Azure Disk Encryption service (BitLocker feature - you have to encrypt your drives before you use it.) And the other one is Data in Transit, man-in-the-middle attacks, eavesdropping attacks and session hijacking happen when your data is in transit.
To protect and safeguard you data you can use VPN or HTTPS while moving data from on-premises and cloud infrastructures. Azure provide certain services like Azure VPN Gateway, site-to-site VPN, point-to-site VPN, ExpressRoute for safeguarding your moving data. Azure also provides a service called Azure Information Protection which helps in labelling and protecting your emails and documents.
Operational security best practices:
This section is all about features that are used to protect your applications and assets in Azure.
Best practices under operational security:
Final thoughts:
As more organisations have migrated to the cloud, a question arises around the security of the infrastructure and the resources. As a result cloud service providers are stepping up with more security services components and models that can reduce cost, complexity and help administrators close the gaps in security. They can be integrated with on-premises and hybrid environments as well. By ensuring you use best practice in Azure, you can protect your infrastructure against potential threats and vulnerabilities.
If you would like to find out more about how you can ensure your Microsoft Azure environment is secure following best practices, we can help. Give us a call or email us at Salesforce@coforge.com
Other useful links:
Integrating Apache Flink with Graphite