Design Deploy Secure Azure
Design Deploy Secure Azure
a Secure Azure
Environment
Mapping the NIST Cybersecurity
Framework to Azure Services
—
Puthiyavan Udayakumar
Design and Deploy
a Secure Azure
Environment
Mapping the NIST Cybersecurity
Framework to Azure Services
Puthiyavan Udayakumar
Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity
Framework to Azure Services
Puthiyavan Udayakumar
Abu Dhabi, Abu Dhabi, United Arab Emirates
v
Table of Contents
vi
Table of Contents
vii
Table of Contents
viii
Table of Contents
ix
Table of Contents
x
Table of Contents
xi
Table of Contents
xii
Table of Contents
xiii
Table of Contents
xiv
Table of Contents
xv
Table of Contents
Index��������������������������������������������������������������������������������������������������������������������� 675
xvi
About the Author
Puthiyavan Udayakumar is an infrastructure architect with more than 15 years of
experience in modernizing and securing IT infrastructure, including in the cloud. He
has been writing technical books for more than 10 years on various infrastructure and
cybersecurity domains. He has designed, deployed, and secured IT infrastructure on
premises and in the cloud, including virtual servers, networks, storage, and desktops for
various industries (such as pharmaceutical, banking, healthcare, aviation, and federal
entities). He also earned the Master Certified Architect certification from Open Group.
xvii
About the Technical Reviewer
Kalyan Chanumolu is a senior technical program manager
at Microsoft. He works on building the engineering systems
that power the world’s computers. He has been a technical
reviewer for books on ASP.NET, Blazor, microservices, and
more, and is passionate about distributed systems and cloud
computing. He has vast experience in software development,
consulting, and migrating large customer workloads to the
cloud. He loves cycling, swimming, and reading books.
xix
Acknowledgments
Thanks to Smriti Srivastava for your invaluable support and guidance throughout the
publication process of this book. Your role as an acquisitions editor was instrumental in
bringing this book to fruition, and I am truly grateful for your expertise and dedication.
To Kalyan Chanumolu, I appreciate your time and effort in reviewing my work,
providing detailed feedback, and assisting with the necessary revisions. Your
professional approach, prompt communication, and attention to detail have made the
publishing journey smoother and more fulfilling.
Special thanks to Shonmirin P. A for your tireless efforts in publishing this book.
Thanks to all the Apress production team members.
xxi
Introduction
The rapid growth and adoption of cloud computing technologies have revolutionized
how organizations manage and deploy their information systems. However, with this
technological advancement comes an increased risk of cyber threats and security
breaches. Organizations need comprehensive frameworks and guidelines to address
these concerns and to establish robust cybersecurity practices. One such framework that
has gained significant traction in recent years is the National Institute of Standards and
Technology (NIST) Cybersecurity Framework (CSF).
In this book, we will explore the implementation of the NIST CSF within an Azure
cloud environment. This book provides a 360-degree view of the NIST CSF in line with
Microsoft Azure Services.
In alignment with industry best practices, the NIST CSF provides a structure for
organizations to assess and enhance their cybersecurity posture. This book shows
how to leverage Azure’s security features with the NIST CSF, enabling organizations to
strengthen their cloud security and protect their valuable assets. Specifically, the book’s
chapters cover the following:
• Introduction to cybersecurity
By the end of this chapter, you will have a clear understanding of the basic concepts of
cybersecurity, cloud computing, and Microsoft Azure’s security capabilities. You will also
gain familiarity with the NIST CSF and its functions. This foundation sets the stage for the
subsequent chapters, which map the Azure security controls to the framework and guide
you on implementing effective cybersecurity practices within the Azure environment.
xxiii
Introduction
Chapter 2: Design and Deploy Security for Infrastructure, Data, and Applications
Chapter 2 focuses on designing and deploying effective security strategies in Azure,
covering three key areas: securing infrastructure and platform components, securing
identify, and securing apps and data. Additionally, the chapter introduces the concept of
Microsoft SecOps, which integrates security and operations to enable proactive security
practices. The chapter provides key insights for the following:
• Governance (ID.GV)
xxiv
Introduction
risk assessment within Azure. This knowledge will lay the foundation for implementing
effective identify security strategies in subsequent chapters, strengthening the overall
security posture of Azure environments.
By the end of this chapter, readers will have a solid understanding of Azure’s protect
security services and their alignment with the NIST Cybersecurity Framework’s Protect
functions. They will gain insights into identify management, authentication, access
control, awareness and training within Azure.
By the end of this chapter, readers will have a solid understanding of Azure’s protect
security services and their alignment with the NIST Cybersecurity Framework’s Protect
functions. They will gain insights into ata security, within Azure. This knowledge will
enable readers to implement adequate security measures in Azure environments,
safeguarding data against security threats.
xxv
Introduction
By the end of this chapter, readers will have a solid understanding of Azure’s protect
security services and their alignment with the NIST Cybersecurity Framework’s Protect
functions. They will gain insights into information protection processes and procedures,
and protective technology within Azure. This knowledge will enable readers to
implement adequate security measures in Azure environments.
By the end of this chapter, readers will have a solid understanding of Azure’s
detect security services and their alignment with the NIST Cybersecurity Framework’s
Detect functions. They will gain insights into detecting anomalies, events, and security
incidents within Azure environments and the importance of continuous monitoring
and efficient detection processes. This knowledge will equip readers with the tools and
techniques to implement effective threat detection and incident response strategies in
Azure, enhancing the overall security posture of their environments.
• RS.AN: Analysis
• RS.MI: Mitigation
xxvi
Introduction
By the end of this chapter, readers will have a solid understanding of Azure’s respond
security services and their alignment with the NIST Cybersecurity Framework’s Respond
functions. They will gain insights into response planning, effective communications,
incident analysis, and mitigation strategies within Azure environments. This knowledge
will equip readers with the tools and techniques to develop robust incident response
capabilities in Azure, minimizing the impact of security incidents and facilitating a swift
and effective response.
• Azure Backup
By the end of this chapter, readers will have a solid understanding of NIST recovery
principles and how Azure’s recovery services align with these principles. They will gain
insights into Azure Recovery Services Mapping, Azure Backup, and Azure Site Recovery
and their role in facilitating efficient and reliable recovery in Azure environments. This
knowledge will enable readers to develop robust recovery strategies, implement appro-
priate backup mechanisms, and leverage Azure’s recovery services to minimize down-
time and ensure the resiliency of their systems and data.
xxvii
CHAPTER 1
• Introduction to cybersecurity
1
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_1
Chapter 1 Get Started with Azure Security
Introduction to Cybersecurity
In this section, we’ll get started by understanding what cybersecurity is.
In a nutshell, cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These attacks usually aim to access, change, or destroy
sensitive information, extort money from users, or interrupt normal business processes.
It is an essential part of any organization’s IT strategy. Cybersecurity is critical because
cybercriminals are constantly developing new methods to attack systems, networks, and
programs. Without proper security measures, organizations risk losing data, which can
be costly and can damage their reputation. It is, therefore, essential for organizations
to invest in cybersecurity to protect their data and systems. For example, organizations
should invest in cybersecurity for the following reasons:
2
Chapter 1 Get Started with Azure Security
3
Chapter 1 Get Started with Azure Security
• NASA cyberattack
• Adobe cyberattack
4
Chapter 1 Get Started with Azure Security
5
Chapter 1 Get Started with Azure Security
According to the Federal Information Processing Standards (FIPS), there are three
core security principles that guide the information security area: confidentiality,
integrity, and availability.
The three together make up the CIA triad, as shown in Figure 1-1.
Confidentiality
Cybersecurity
CIA Triad
Integrity Availability
The role of the cybersecurity architect is to ensure that the built systems or solutions
will meet the three principles.
7
Chapter 1 Get Started with Azure Security
Cyberattacks and their ramifications are everywhere these days. Global supply
chains are being attacked, resulting in significant economic consequences. It seems like
almost daily we hear about cybercriminals stealing the personal information of millions
of consumers from e-commerce sites. Government and health services are sometimes
blocked and extorted for ransom.
As cyberattacks evolve, they become more sophisticated. An organization or
institution can be targeted by cybercriminals from anywhere, including from inside an
organization.
Threat Landscape
Cyberattacks can exploit the entire digital landscape in which an organization
interacts, whether large or small. The following are key areas of the threat landscape:
email accounts, social media accounts, mobile devices, the organization’s technology
infrastructure, cloud services, and people.
Besides computers and mobile phones, threat landscapes can encompass any
element owned or managed by an organization and some that are not. Criminals use any
method to mount and carry out attacks, as you will learn next.
Threat modeling is an approach for analyzing the security of an application. In this
method, security risks are identified, quantified, and addressed in a structured manner.
It should be noted that a threat is not a vulnerability, as mentioned earlier. Threats can
exist even if there are no vulnerabilities.
Attack Vectors
Assailants access a system through an attack vector.
For example, cybercriminals can use email as a vector to attack users. These emails
may appear legitimate but ultimately result in a user downloading files or clicking links
that compromise their devices. Wireless networks are another common attack vector.
Bad actors in airports and coffee shops often exploit vulnerabilities in people’s devices
by accessing unsecured wireless networks. Another common way for cyberattacks to
take advantage of a system is by gaining access to unsecured Internet of Things (IoT)
devices.
8
Chapter 1 Get Started with Azure Security
However, it is essential to know that attackers do not have to use any of these. They
can use a variety of less obvious attack vectors. Figure 1-2 shows some key attack vectors.
Security Breaches
It is a security breach when someone gains unauthorized access to devices, services, or
networks. This is similar to an intruder (attacker) successfully breaking into a building (a
device, application, or network).
The following are forms of security breaches:
Data Breaches
Data breaches occur when an attacker successfully gets access to someone’s data.
This can lead to severe consequences for the victim, whether that is a person, an
organization, or even a government. This is because the victim’s data could be abused
in many ways. For example, it can be held as ransom or used to cause financial or
reputational harm.
11
Chapter 1 Get Started with Azure Security
Malware
Cybercriminals use malware to infect systems and carry out actions that cause harm,
such as stealing data or disrupting normal operations. A malware program consists of
two main components: the propagation mechanism and the payload.
Propagation is how the malware spreads itself across one or more systems. Here are
a few examples of standard propagation techniques:
• Virus: In biology, a virus enters the human body and can spread
once it has caused harm. We are already familiar with the term. A
technology-based virus enters a system through a means of entry,
a user action. For example, a user might download a file or plug in
a USB device that contains the virus, contaminating the system. A
security breach has occurred.
• Worm: Once a worm has infected the system, it can spread to other
computers connected to it, and it does not require any action from
the user to apply itself across systems like viruses do. Worms can
infect a device by exploiting a vulnerability in an application, and
they cause damage by finding vulnerable systems they can exploit. A
worm can spread to other devices on the same network or connected
networks once it has infected one.
• Trojan: Trojan horses are malware that mimics real software. They
got their name from soldiers hiding inside the wooden horse given
by the Trojans to soldiers. After installation, the program performs
malicious actions, including stealing information.
The payload is a malware action on an infected device or system. Here are some
common types of payloads:
• A ransomware payload locks down systems or data until a ransom
is paid. Cybercriminals can exploit an unknown vulnerability
in a network of connected devices to access all files across this
network and encrypt them. The attacker then demands a ransom
for decrypting the files. They may threaten to remove the files if the
ransom is not paid by a deadline.
12
Chapter 1 Get Started with Azure Security
13
Chapter 1 Get Started with Azure Security
Multifactor Authentication
Cybercriminals can access an account if a password or username is compromised, but
multifactor authentication prevents this.
It is common for users to provide more than one form of identification during
multifactor authentication. A password, which the user understands, is one of the most
common forms of identification.
A phone, hardware key, or another trusted device can also be used for
authentication, as can fingerprints or retinal scans (biometric authentication). The
purpose of multifactor authentication is to verify the identify of a user using two or more
of these forms of verification.
When accessing an online account, a bank might require users to enter security
codes received on their mobile device and their username and password.
Browser Security
As you have already seen, our Internet access can be compromised by attackers
compromising poorly secured browsers. By downloading malicious files or installing
malicious add-ons, users can compromise their browsers, devices, and even their
organizations’ systems by compromising them. Organizations can prevent attacks of this
type by implementing these security policies:
• Educate users.
Educating your staff about social engineering attacks can help organizations defend
themselves. Social engineering attacks aim to exploit human vulnerabilities to harm
individuals. Organizations can teach users how to recognize malicious content they
receive or encounter and act when they see something suspicious.
14
Chapter 1 Get Started with Azure Security
Threat Intelligence
It is not uncommon for cybercriminals to target organizations via a wide range of attack
vectors, and the threat landscape can be vast. As a result, organizations need to monitor,
prevent, defend against, and even identify potential vulnerabilities before cybercriminals
use them to conduct attacks.
Organizations can use threat intelligence to gather information about their systems,
vulnerabilities, and attacks. As a result of its understanding of this information, the
organization will be able to develop policies that protect against cyberattacks, including
those for security, devices, and user access. Threat intelligence collects information that
enables a company to gain insights into cyberattacks and respond accordingly.
Organizations can use technological solutions to implement threat intelligence
across their systems. These are often threat-intelligent solutions that automatically
collect information and even hunt and respond to attacks and vulnerabilities.
These are just some mitigation strategies organizations can take to protect against
cyberattacks. Mitigation strategies enable an organization to take a robust approach to
cybersecurity, ultimately preserving confidentiality, integrity, and availability.
Cryptography
Cryptography and encryption may conjure up visions of spies and covert operations
or hackers sitting in windowless rooms. Yet much of today’s modern online world is
possible only with these two techniques. In fact, cryptography and encryption are the
cornerstones of any good cybersecurity solution. For example, they help to keep your
emails safe from prying eyes and protect online payments. As you continue your journey
into cybersecurity, you’ll see how we use cryptography and encryption to protect
ourselves in day-to-day activities.
Information confidentiality, integrity, and availability are protected by cryptography,
which also protects against cyberattacks. Derived from the Greek word kryptos, which
means “hidden” or “secret,” cryptography is the application of secure communication
between a sender and a recipient. Cryptography is typically used to obscure a written
message’s meaning, but it can also be applied to images.
15
Chapter 1 Get Started with Azure Security
The first known use of cryptography can be traced back to ancient Egypt and the
use of complex hieroglyphics. One of the first ciphers ever used to secure military
communications came from the Roman emperor Julius Caesar.
These two examples make clear that cryptography has many uses and isn’t limited to
the digital world. However, from those humble origins, one thing is sure: cryptography is
now a fundamental requirement in helping secure our digitally connected planet.
• You can use cryptography to secure and protect external and internal
storage files.
As with all systems, cryptography has its own language; two important ones are
plaintext and ciphertext.
• When the plaintext has been turned into a secret message, it’s called
ciphertext. This term represents the encrypted/secured data.
16
Chapter 1 Get Started with Azure Security
As a rule, users should be given just enough permission to access the resources they
need once they have been authenticated. Authorization grants the user access to the
appropriate data and assets.
For example, when you go to the airport to board a flight, you must validate your
identify before receiving the boarding pass. You present yourself and your passport; if
they match, you are granted the boarding pass. Your boarding pass is your authorization,
allowing you to board the aircraft only for the booked flight.
17
Chapter 1 Get Started with Azure Security
• Insider threats
• Social engineering
18
Chapter 1 Get Started with Azure Security
• SQL injection attacks: Less mature websites accept user input without
validating or moderating it, exposing their networks to SQL injection
attacks.
19
Chapter 1 Get Started with Azure Security
Open-Source Vulnerabilities
The source code of open-source libraries is usually freely available, so anyone can access
it when they need to solve a specific problem. Developers will always check for open-
source solutions when solving a particular problem.
In addition to being publicly developed, open-source libraries can be used by
cybercriminals who try to exploit them. If a developer uses open-source libraries as part of
their application, they need to stay current on the latest versions to prevent cyberattacks.
Zero-Day Vulnerabilities
When cybercriminals find a zero-day vulnerability, they won’t publicize it but will take
full advantage of it. A cybercriminal conducts detailed reconnaissance of applications,
looking for vulnerabilities. By definition, the application owner was previously unaware
of zero-day vulnerabilities and has not patched them.
A cybercriminal might have noticed that a banking app has a zero-day vulnerability
and use this to steal money and information from application users. The zero days refers
to the number of days between discovering a vulnerability and releasing a fix.
Browser-Based Threats
In addition to serving as our gateway to the Internet, browsers play a key role in our daily
lives. The following are two more common browser-based threats to look out for.
Cookie-Based Attacks
You have probably heard about cookies, but do you actually know what they are?
Cookies are plaintext files containing small bits of data, such as your user credentials,
the last search you made, the last time you bought something, etc. By simplifying the
need to constantly log in to the site, cookies enhance your browser experience and make
browsing easier.
21
Chapter 1 Get Started with Azure Security
Typosquatting
A typosquatting attack involves a cybercriminal obtaining a domain name that is
mistakenly spelled, putting malicious code on it, and disguising it as a legitimate
website.
It is possible for users to confuse the malicious website for the legitimate one they
intended to visit.
22
Chapter 1 Get Started with Azure Security
USB Drives
In the case of ransomware, the data has been compromised because it’s locked in
exchange for a ransom. Cybercriminals can, for instance, load malicious software or files
onto USB drives and insert them into laptops.
Device Vulnerabilities
Devices can be compromised when they lack the latest security updates or strong
authentication. Attackers know the common vulnerabilities of devices and applications
and how to gain unauthorized access. If a device is connected to a Wi-Fi hotspot—in an
airport, for instance—it’s a prime target for attackers.
In most cases, malware such as backdoors and botnets can persist on a device even
after being updated, causing further damage when connected to a network.
Jailbreaking is when users find unofficial ways to get full access to their devices’ core
systems to customize them or to achieve other purposes. As a result, the device becomes
vulnerable because it might circumvent security measures. Cybercriminals can provide
false instructions or software that compromises the device.
When connected devices are not adequately secured, they can represent a threat vector.
Having learned this, we will now look at ways to keep them safe with cloud computing.
24
Chapter 1 Get Started with Azure Security
25
Chapter 1 Get Started with Azure Security
Cloud Computing
Pay attention on
Stop Guessing Reliability and
Economies of Scale Opex v/s Capex Business Global Reach
Capacity Security
Differentiators.
Increased
Mobility Disaster Recovery Competitive Edge
Collaboration
26
Chapter 1 Get Started with Azure Security
Cloud computing offers companies reliability and security. Cloud computing makes
data backup, business continuity, and disaster recovery significantly less expensive
with availability zones. Cloud computing also has site-level redundancy. Data and
applications are replicated and mirrored across the redundant sites as per subscriptions.
In addition, modern-day cloud service providers offer unlimited security
components, controls, policies, compliance needs, and regulations standards,
which heavily increase a security posture from end to end. As a result, application
infrastructure data is highly secure against potential vulnerabilities and threats.
Global reach is another benefit. Cloud computing provides the advantage of
going global in minutes and in just a few clicks. Organizations can use this technology
to provide redundancy across the globe and provide lower latency and better
experiences to their customers at a minimal cost. Cloud computing makes it possible
for any organization to go global, which was previously available only to the biggest
corporations.
Mobility, increased collaboration, disaster recovery, and competitive edge are other
key benefits of cloud computing.
27
Chapter 1 Get Started with Azure Security
Cloud Computing
IaaS
Private
PaaS
Public
SaaS
Cloud native refers to all application components running on the cloud, with
the cloud-based application is fully deployed in the cloud. Applications in the cloud
have been either developed using cloud technology or migrated from conventional
infrastructure to take advantage of its benefits. In cloud-based applications, low-
level infrastructure pieces or higher-level services can be used, abstracting away the
management, scalability, and architecture requirements of the core infrastructure.
Cloud hybridization refers to workloads run on-premises, on co-located
infrastructure, and on infrastructure that the cloud provider hosts. A hybrid cloud
environment enables cloud consumers to maximize the agility and flexibility of a public
cloud environment while taking advantage of their existing investments.
Imagine using the same tools cloud consumers have used for years to manage all
these resources. Cloud consumers can extend VMware infrastructure to the Azure cloud
using a hybrid cloud. The hybrid cloud can quickly and securely expand or consolidate
data centers, build disaster recovery environments, and modernize applications to meet
urgent security and compliance goals.
The cloud-native delivery model depicts a specific flow of IT resources offered
by a cloud provider. This terminology is typically linked with cloud computing and is
commonly used to represent a remote environment and administration level.
28
Chapter 1 Get Started with Azure Security
29
Chapter 1 Get Started with Azure Security
31
Chapter 1 Get Started with Azure Security
Azure Geographies
32
Chapter 1 Get Started with Azure Security
Azure Regions
Azure regions are a collection of physical data centers installed within a security and
latency-defined network perimeter and connected via a dedicated, in part secure, low-
latency network.
Dedicated regional low-latency networks connect each region’s data centers within a
latency-defined perimeter. Azure’s design ensures optimal performance and security for
all regions.
With Microsoft Azure, cloud consumers have the freedom to install and configure
applications on demand. Each Azure region is equipped with a variety of IT services
and pricing. A pair of regions is what Azure calls a logical boundary, and regional teams
contain two geographically defined regions. Azure regions are defined by a specific
geographical boundary, typically hundreds of miles apart.
There are more Azure regions globally than any other cloud provider. Azure
architects can bring cloud consumer applications close by putting them in these regions
no matter where cloud consumer end users are. The global regions provide better
scalability and redundancy, and cloud consumers can also maintain data residency.
Azure Geography
Azure geography is composed of regions that meet various compliance and data
residency requirements. As much as possible, Azure geography enables cloud
consumers to keep their apps and data close to their business. Azure geography is fault-
tolerant to withstand region failure via the dedicated high-capacity networking elements
of Azure.
By utilizing the dedicated high-capacity networking elements, Azure geography is
fault tolerant to withstand region failures. There are at least two regions separated by a
considerable physical distance in each geography, which is vital to the Azure cloud. This
pattern allows Azure to achieve disaster recovery in each region.
Microsoft encourages customers to replicate their data across multiple Azure
regions. Microsoft promises network performance between regions of 2 milliseconds
or less.
33
Chapter 1 Get Started with Azure Security
34
Chapter 1 Get Started with Azure Security
Availability Zone 2
Microsoft Azure offers three types of availability zones: zonal services, zone-
redundant services, and zone nonregional services. Figure 1-10 shows a logical view of
three availability zones.
Microsoft Azure zonal services are IT services such as VMs, managed disks used in
VMs, and public IP addresses used in VMs. To achieve the high availability (HA) design
pattern, the IT function must explicitly install zonal services into two or more zones.
Microsoft Azure zone-redundant services are services such as zone-redundant
storage and SQL databases. To use the availability zones with ZRS and SQL DB services,
we need to specify the option to make them zone redundant during the deployment.
Microsoft Azure nonregional services are Azure services that are constantly ready
from Azure geographies and are resilient to zone-wide blackouts and region-wide
blackouts.
Azure services enabled by availability zones are designed to offer the right reliability
and flexibility. They can be configured in two ways. Depending on the configuration,
they can be zone redundant, with automatic replication across zones, or zonal, with
instances pinned to specific zones. Clients can combine these patterns.
35
Chapter 1 Get Started with Azure Security
Azure Geography
Diverse fiber
paths connecting
AZ.
One or More Physical One or More Physical One or More Physical DCs
DCs DCs
Availability Zone 2
Azure Regions
36
Chapter 1 Get Started with Azure Security
Management Groups
Subscriptions
Resource Group
Azure Resources
Let’s walk through each level of organization from the bottom up.
37
Chapter 1 Get Started with Azure Security
• There can be only one parent for each management group and
subscription.
Azure Subscriptions
Azure subscriptions are automatically initiated as soon as you sign up for the Azure
cloud, and all the resources are created within the subscription. However, a business can
create additional subscriptions that are tied to the Azure account. Other subscriptions
are applicable whenever companies want to have logical groupings for Azure resources,
especially for reports on resources consumed by departments.
Microsoft Azure subscriptions are offered in the following three categories:
• Free trial: This offers completely free access for a limited time per
account for limited resources; expired accounts cannot be reused.
38
Chapter 1 Get Started with Azure Security
Each Microsoft Azure subscription has a unique identifier called a subscription ID.
Microsoft recommends using the subscription ID to recognize the subscription.
39
Chapter 1 Get Started with Azure Security
• Azure App Service makes it easy to host web apps in the cloud
because it’s a PaaS service that removes the management burden
from the user.
• Azure App Service apps run inside an App Service plan that specifies
the number of VMs and the configuration of those VMs.
• Azure Load Balancer can distribute traffic from the Internet across
various VMs in a dedicated VNet.
40
Chapter 1 Get Started with Azure Security
• Azure Files allows cloud consumers to have disk space in the cloud to
map to a drive on-premises.
• Azure Blob Storage offers hot, cool, and archive storage tiers based on
how long cloud consumers intend to store the data, whereby usually
the data is accessed.
Azure’s visual tools provide full access to all functionality in a visually friendly
manner. It may be less valuable to use visual tools when you’re trying to deploy a large
number of interdependent resources and have multiple configuration options.
In most cases, a code-based tool is the better choice when configuring Azure
resources quickly. The correct commands and parameters may take some time
to understand, but they can be saved into files and used repeatedly. Setup and
41
Chapter 1 Get Started with Azure Security
configuration code can also be stored, versioned, and maintained in a source code
management tool such as Git. When developers write application code, they use this
approach to manage hardware and cloud resources. It is called infrastructure as code.
In infrastructure as code, two approaches are available: imperative and declarative.
The imperative code details each step required to achieve the desired result. Contrary to
declarative code, the declarative code specifies only the desired outcome, and it allows
an interpreter to determine how to achieve it. It is crucial to distinguish declarative code
tools from those based on logic, as declarative code tools provide a more robust way of
deploying dozens or hundreds of resources simultaneously and reliably.
To manage your cloud environment, Microsoft offers a variety of tools and services,
each geared toward a different scenario and user.
Management refers to the assignments and methods required to maintain IT
applications and the resources supporting the organization’s business. Azure has several
services and tools that operate together to give complete management tools to cloud
consumers, as shown in Figure 1-11.
Microsoft Azure Portal
42
Chapter 1 Get Started with Azure Security
43
Chapter 1 Get Started with Azure Security
$PSVersionTable.PSVersion
Use the following command to install the Azure PowerShell Module (Az PowerShell
module):
Use the following command to connect to an Azure account (Az PowerShell module):
Connect-AzAccount
Use the following command to log in with cloud consumer account credentials in
the browser:
az login
44
Chapter 1 Get Started with Azure Security
Upon clicking, the console loads, and you can then create an Azure storage account;
however, you need an active subscription.
Type the following command to get knowledge about PowerShell in the Azure
Cloud Shell:
Get-Help.
45
Chapter 1 Get Started with Azure Security
• Manage Azure resources for cloud consumers using the Azure CLI
and Azure PowerShell commands.
46
Chapter 1 Get Started with Azure Security
Azure Monitor can perform the following tasks such as gathering metrics, storing
logs, and providing insights:
To reach Azure Monitor, click the Monitor button in the Microsoft Azure Portal.
Figure 1-14 shows the Azure Monitor dashboard.
48
Chapter 1 Get Started with Azure Security
be a target for a cyberattack. As covered earlier in the chapter, they can range in severity
from a minor inconvenience to a global disruption of economic and social systems.
A cloud service model determines who manages the application or service’s security.
As part of the Azure platform, built-in features and partner solutions can be deployed
within a subscription to assist you with meeting these responsibilities.
The Azure platform has six distinct functional areas: operations, applications,
storage, networking, compute, and identify, as shown in Figure 1-16.
Operations,
Identify Applications,
Compute, Storage,
Networking,
49
Chapter 1 Get Started with Azure Security
Microsoft Sentinel
With Microsoft Sentinel, you can manage security information and events online, as
well as automate security orchestration, automation, and response (SOAR). As a threat
intelligence and security analytics solution, Sentinel allows organizations to detect,
visualize, respond to, and monitor attacks in one place.
Application Insights
With Application Insights, web developers can monitor live web applications and detect
performance anomalies automatically. The service provides extensible application
performance management (APM). It monitors your application constantly as it runs
during testing and after deployment.
50
Chapter 1 Get Started with Azure Security
Charts and tables generated by Application Insights show you, for example, when
you get the most users, how responsive the app is, and how well it interacts with external
services.
When your app becomes available or performs poorly, the service sends you an
email notification. In the case of crashes, failures, or performance issues, you can
examine telemetry data in detail to determine what’s causing them. Application Insights
ensures confidentiality, integrity, and availability, making it an effective security tool.
Azure Monitor
Both the Azure subscription (activity log) and individual Azure resources (resource logs)
can be visualized, queried, routed, alerted, autoscaled, and automated using Azure
Monitor. Azure Monitor alerts you to Azure logs that contain security-related events.
Azure Advisor
Azure Advisor is a customized cloud consultant that helps you optimize your Azure
deployments by analyzing your resource configuration and usage telemetry. After
analyzing your resources, it recommends ways to improve their performance, security,
and reliability and reduce the costs of Azure. With Azure Advisor, your security posture
can be significantly improved for the Azure solutions you deploy by providing security
recommendations. Microsoft Defender for Cloud generates these recommendations
based on its security analysis.
51
Chapter 1 Get Started with Azure Security
Penetration Testing
Microsoft is not responsible for performing penetration testing on your application, but
we understand you would like to do so yourself. As a result, you contribute to the security
of the entire Azure ecosystem by enhancing your applications’ security. Although
notifying Microsoft of pen testing activities is no longer required, customers must still
follow Microsoft Cloud Penetration Testing Rules of Engagement.
52
Chapter 1 Get Started with Azure Security
53
Chapter 1 Get Started with Azure Security
Encryption in Transit
With Azure Storage, you can secure data when it is transmitted across networks using
encryption in transit.
• When transferring data into or out of Azure Storage, you should use
transport-level encryption, such as HTTPS.
• SMB 3.0 encryption for Azure File shares provides wire encryption.
Encryption at Rest
Three Azure storage security features provide encryption of data that is “at rest” to ensure
data privacy, compliance, and data sovereignty.
• Azure Disk Encryption for Linux VMs and Azure Disk Encryption for
Windows VMs allow you to encrypt the OS disk and data disks used
by an IaaS virtual machine.
Storage Analytics
For a storage account, Azure Storage Analytics provides logging and metrics data.
Storage Analytics records detailed information about successful and failed requests
to a storage service so that you can trace requests, analyze usage trends, and diagnose
storage account issues. You can monitor individual requests and diagnose storage
service problems using this information. Requests are logged based on best efforts.
Authenticated requests are logged in the following ways:
• Requests that were successful
54
Chapter 1 Get Started with Azure Security
• Analytical requests
55
Chapter 1 Get Started with Azure Security
56
Chapter 1 Get Started with Azure Security
57
Chapter 1 Get Started with Azure Security
• From your virtual network and on-premises networks, you can access
a specific service instance using Private Link.
58
Chapter 1 Get Started with Azure Security
• Azure Private Link: Azure Private Link lets you connect to Azure
PaaS services (Azure Storage and SQL Database) and Azure-hosted,
customer-owned, and partner services over a private network
connection.
59
Chapter 1 Get Started with Azure Security
60
Chapter 1 Get Started with Azure Security
61
Chapter 1 Get Started with Azure Security
virtual machines helps protect your cloud services by identifying and removing viruses,
spyware, and other malicious software. Using Microsoft Defender for Cloud or Microsoft
Antimalware, Microsoft Antimalware can alert you when known malicious or unwanted
software attempts to install or run on your Azure systems.
SQL VM TDE
CLE and TDE are SQL server encryption features that require customers to manage and
store their cryptographic keys. Azure Key Vault (AKV) improves the security of these keys
and allows them to be managed in a highly available, secure environment. SQL Server
can use these keys through the Azure Key Vault connector.
62
Chapter 1 Get Started with Azure Security
For SQL Server in Azure VMs, you can use the Azure Key Vault Integration feature to
save time accessing Azure Key Vault from your on-premises SQL Server instance. The
configuration required for a SQL VM to access your key vault can be automated with a
few Azure PowerShell cmdlets.
Virtual Networking
Virtual machines must have network connectivity in Azure to support that requirement.
To keep an Azure VNet, virtual machines must be connected to it. A VNet is a logical
construct built on the Azure network fabric. This ensures that other Azure customers
cannot access your deployments by isolating them from all other VNets.
Patch Updates
Using patch updates simplifies the process of finding and fixing potential problems and
simplifies the management of software updates by reducing the number of updates you
need to deploy in your enterprise and improving compliance monitoring.
63
Chapter 1 Get Started with Azure Security
64
Chapter 1 Get Started with Azure Security
• Users are given only the access they need to perform their job duties
when they use Azure RBAC based on their assigned roles. Azure
RBAC can be customized based on your organization’s risk tolerance
and business model.
• You can control user access to data centers and cloud platforms
by using integrated identify management (hybrid identify), which
creates a single user identify across both.
65
Chapter 1 Get Started with Azure Security
66
Chapter 1 Get Started with Azure Security
68
Chapter 1 Get Started with Azure Security
authorized services and CSF Core. Further, three supply chain risk management
subcategories are included in NIST CSF Draft Version 1.1.
In addition, Microsoft has developed a NIST CSF customer responsibility matrix
(CRM) that outlines all control requirements dependent on customer implementation
and shared responsibility controls and control implementation details for Microsoft-
owned controls. NIST CSF CRM can be downloaded from the Service Trust Portal
Blueprints section under NIST CSF Blueprints.
Azure Policy regulatory compliance built-in initiatives provide additional customer
assistance, mapping to the NIST SP 800-53 compliance domains and controls.
69
Chapter 1 Get Started with Azure Security
70
Chapter 1 Get Started with Azure Security
Microsoft cyber offerings can meet many security functions described in these
frameworks. Microsoft cyber offerings can assist with five NIST CSF core functions
(Identify, Protect, Detect, Respond, and Recover).
Table 1-2 maps the NIST CSF core functions (Identify, Protect, Detect, Respond, and
Recover) to Azure Services.
71
Chapter 1 Get Started with Azure Security
Identify Azure AD
Azure AD Identify protection
Azure AD Privileged Identify Management
Azure Policy
Azure IOT Hub
Microsoft Intune
Azure Network Watcher
Azure Automation
Azure Information Protection
Service Map
Microsoft Threat Modeling Tool
Privileged Access Workstation
Microsoft Compliance Manager
Azure Security Center
Protect Azure Application Gateway
Azure WAF
Azure AD
Azure Firewall
Azure AD Identify Protection
Azure Advanced Threat Protection
Office ATP
Azure Key Vault
Azure DDoS
Azure VPN Gateway
Network Security Groups
Azure Bastion
Azure Encryption
(continued)
72
Chapter 1 Get Started with Azure Security
Summary
This chapter covered the fundamentals of cybersecurity, cloud computing, and
Microsoft Azure. It gave you a broad understanding of essential Microsoft Azure security
capabilities and insights into the NIST CSF.
In the next chapter of the book, you will learn about designing and deploying
security for infrastructure, data, and apps.
73
CHAPTER 2
75
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_2
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
With Azure’s built-in controls, data, networking, and app services, you can protect
your workloads quickly. In this chapter, you’ll read about strategically designing and
deploying security for infrastructure, data, and applications using the Microsoft cloud
security benchmarks.
By the end of this chapter, you will understand the following:
76
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
77
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
environmental events. All network devices are running on the control plane in the OSI
model’s layer 3 routing mode, eradicating the historical traffic loop issue. With Equal-
Cost Multi-Path (ECMP) routing, all paths between diverse tiers are active to provide
high redundancy and bandwidth.
Combined with multiple primary and secondary DNS server clusters, Azure Domain
Name Service (DNS) infrastructure provides fault tolerance on an internal and external
level. Additionally, Azure network security controls, such as NetScaler, protect Azure
DNS services from distributed denial-of-service (DDoS) attacks.
The Microsoft network, which connects Microsoft data centers and customers
globally over 165,000 miles, is one of the largest backbone networks in the world.
At the time of writing, an excellent cloud experience is delivered through Microsoft’s
global network (WAN). With a global network of Microsoft data centers distributed
across 61 Azure regions and edge nodes strategically placed worldwide, Microsoft can
meet any demand with availability, capacity, and flexibility.
Figure 2-1 shows the Microsoft global network.
78
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
A secondary and primary DNS server hierarchy resolves Azure customer domain
names in multiple data centers. Azure DNS servers are located in various data centers.
Usually, the domain names are resolved to CloudApp.net addresses, which wrap the
virtual IP (VIP) address for the customer’s service. Microsoft load balancers translate the
VIP to an internal dedicated IP (DIP) address for Azure tenants.
Azure is hosted in geographically dispersed data centers within the United States
and is built on the latest routing platforms that implement scalable, robust architectural
standards.
Because Microsoft owns its network circuits between data centers, these attributes
help Azure achieve 99.9+ percent network availability without needing traditional third-
party Internet service providers.
A Microsoft Azure network Internet traffic flow policy directs traffic to the nearest
regional data centers for Azure production networks. All Azure production data
centers share the same network architecture and hardware, so the following traffic flow
description applies consistently.
As soon as Azure Internet traffic is routed to the nearest data center, a connection
is established between Azure nodes and customer-instantiated VMs. Network
infrastructure devices serve as boundary points for ingress and egress filters at the access
and edge locations. These routers isolate traffic between Azure nodes and customer-
instantiated VMs. Filtering unwanted network traffic and limiting traffic speed is possible
using a tiered access control list (ACL) on these routers. In addition to allowing only IP
addresses that Microsoft approves, distribution routers provide anti-spoofing and ACLs
for TCP connections.
79
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
80
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Microsoft evaluates each availability zones’ placement using more than 30 viability
and risk-based criteria, identifying both significant individual risks and collective
and shared risks between availability zones without compromising their low-latency
perimeter.
Every country in which Microsoft operates a data center region has an Azure
availability zone.
81
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
82
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
control over those assets, processes, and functions they own. Working with your cloud
provider and sharing some security responsibilities can help you maintain a secure
environment with less operational overhead.
Security responsibilities shift as organizations move workloads to Azure cloud-based
infrastructure from their on-premises data centers. As a result, you (as an organization)
are now solely responsible for all security aspects, as you would be in a traditional
environment. All cloud providers, including Microsoft’s competitors such as AWS and
GCP, follow the cloud security shared responsibility model.
As you evaluate and consider public cloud services such as Microsoft Azure, you
must know the shared responsibility model, which security tasks the cloud service
provider is responsible for, and which are your responsibility as the consumer.
Depending on the Azure service model, your security responsibility differs. The
following is a high-level summary:
In the case of an IaaS service like Azure Virtual Machines, you have more security
responsibilities to take care of. For example, you need to patch the operating system of
your virtual machines hosted on Azure.
With an IaaS service model, for capabilities such as virtual machines, storage,
and networking, it is the customer’s responsibility to configure and protect the stored
and transmitted data. When using an IaaS-based solution, data classification must
be considered at all layers of the solution. Figure 2-2 shows a logical view of the cloud
security shared responsibility.
83
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Applications
Microsoft Managed
Figure 2-2. Cloud deployment: IaaS with cloud security shared responsibility view
A PaaS such as Azure App Service has fewer security responsibilities than a
traditional service. You’re not responsible for patching the operating system used by
the service. However, you’re still responsible for configuring the service and controlling
access to it.
In PaaS solutions, the customers’ responsibility for data classification and
management should be recognized during the planning process. To ensure data
protection, customers must configure and establish a process for protecting both the
data and the solution. Azure Rights Management (ARM) services provide customer data
protection capabilities and integrate into many Microsoft SaaS products. Figure 2-3
shows the cloud security shared responsibility from a PaaS logical view.
84
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Shared responsibility
(Cloud Deployment : PaaS)
Identify & Directory Infra
(Shared)
Microsoft Managed
Virtual machines /
Containers/ Workloads
With a SaaS service like Azure Search, you have even fewer security responsibilities,
but you should still control access to your data.
In SaaS solutions like Office 365 and Dynamics 365, customer data can be protected
with features such as Office Lockbox and data loss prevention. Still, customers must
ultimately configure, classify, and manage these solutions to meet their unique
compliance and security requirements. Figure 2-4 shows the cloud security shared
responsibility from a SaaS logical view.
85
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Shared responsibility
(Cloud Deployment : SaaS)
Identify & Directory Infra
(Shared)
Microsoft Managed
Applications
(Shared)
86
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• For privileged access on servers and endpoints, just in time (JIT) and
just enough access (JEA) enable the practical application of least
privilege principles.
87
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
With Azure virtual machines, you don’t need to buy and maintain physical hardware
to run them. In highly secure data centers, your data is protected and safe so that you can
build and deploy your applications with peace of mind.
The Azure platform enables you to build security-enhanced, compliant solutions
that do the following:
Antimalware
You can use antimalware software from Microsoft, Symantec, Trend Micro, McAfee,
and Kaspersky to protect your virtual machines from malicious files, adware, and other
threats. You can deploy, configure, and maintain antimalware solutions remotely using
Azure PowerShell, the Azure Portal, and the command line.
89
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Securing Containers
An application runs in a container in a lightweight, isolated silo on the host system.
On top of the kernel of the host operating system (which can be viewed as the buried
plumbing of the OS), containers contain only apps and lightweight APIs and services
from the operating system. Containers share the kernel of the host operating system,
but their access is limited. Instead, the container gets an isolated—and sometimes
virtualized—view of the system. The container can, for example, access a virtualized
version of the file system and registry, but the changes affect only it and are discarded
when it stops. The container can mount persistent storage, such as Azure Disks or file
shares (including Azure Files) to save data.
The kernel is the base of a container, but it does not provide all of the APIs and
services an app needs to run—most of these are provided by system files (libraries)
executed in user mode above the kernel. The container needs a copy of these user-mode
system files packaged into a base image because it is isolated from the host’s user-mode
environment. As the foundation for your container, the base image provides operating
system services not provided by the kernel.
Containers are easy to deploy and start fast because they utilize fewer resources (for
example, they do not require an entire operating system).
The concept of a container group is similar to a pod in Kubernetes, a collection of
containers scheduled on the same machine. The containers in a container group share a
lifecycle, resources, local network, and storage volumes.
90
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Protect Credentials
As containers are distributed across several clusters and Azure regions, credentials such
as passwords or tokens for logging in or accessing APIs must be secured. Only privileged
users should be able to access these containers in transit and at rest. Inventory all
credential secrets and then require developers to use tools designed to manage secrets
for container platforms. Ensure your solution includes the following:
• Encrypted databases
91
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Containerized applications can be protected with Azure Key Vault’s encryption keys
and secrets (such as certificates, connections, and passwords). Secure access to your
key vaults so only authorized applications and users can access them since this data is
sensitive and business-critical.
Securing Hosts
You must lock down the host machines where your applications run. Installing updates,
using jump boxes to only access servers, and following Microsoft Defender for Cloud
recommendations are great ways to keep your hosts secure.
An endpoint system interacts directly with users. Devices made up of computers,
laptops, smartphones, tablets, and other computing devices need to be protected against
security attacks on the networked systems of an organization.
Microsoft Defender for Cloud provides tools for hardening your network, securing
your services, and maintaining your security posture.
Use Microsoft Antimalware or an endpoint protection solution from a Microsoft
partner to help identify and remove viruses, spyware, and other malicious software.
Security Center reports antimalware status on the “Endpoint protection issues”
blade after integrating your antimalware solution with Microsoft Defender for Cloud.
You can plan to address any identified issues by using the information provided by
the Security Center, such as detected threats and insufficient protection.
Providing RDP/SSH connectivity directly to your virtual machines via TLS in the
Azure Portal, Azure Bastion is a fully platform-managed PaaS service you provision
inside your virtual network. Azure Bastion doesn’t require a public IP address to connect
to your virtual machines.
All VMs in a virtual network that Bastion is a part of are connected securely using
RDP and SSH.
Azure Bastion protects your VM from disclosing RDP/SSH ports to the outside world
while providing secure access using RDP/SSH. With Azure Bastion, you connect to the
VM straight from the Azure Portal.
To have a secured host, you need to ensure the following security components
are contained on the device Trusted Platform Module (TPM) 2.0, BitLocker Drive
Encryption, UEFI Secure Boot, Drivers, and Firmware Distributed through Windows
Update, Virtualization and HVCI Enabled, Drivers and Apps HVCI-Ready, Windows
Hello, DMA I/O Protection, System Guard, and Modern Standby.
92
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Securing Networks
Protect your information technology assets by controlling traffic that originates in Azure,
traffic to and from Azure, and traffic between on-premises and Azure resources. In the
absence of security measures, attackers can, for example, scan public IP ranges to gain
access. Proper network security controls can deliver defense-in-depth components that
detect, control, and prevent attackers who acquire access to your cloud deployments.
As in your on-premises network, Azure virtual networks are similar to LANs. They
allow you to place all your virtual machines on a single private IP address space. By
placing Azure virtual machines (VMs) and appliances on Azure virtual networks, you
can connect them to other networked devices. Connect virtual network interface cards
(NICs) to a virtual network to allow TCP/IP-based communications between network-
enabled devices. Employees can access a company’s resources from anywhere, on
various devices and apps, making perimeter security controls irrelevant.
A virtual network access control system limits connectivity to and from specific
devices and subnets. Access controls allow or deny connections to your virtual machines
and services based on your decisions about allowing or denying connections. Network
access controls limit access to your virtual machines and services to approved users and
devices.
Microsoft Defender for Cloud can manage the network security groups (NSGs)
on virtual machines and protect access to the virtual machine until a user with the
authorized Azure role-based access control Azure RBAC permissions requests access.
With Azure Firewall, you get a fully stateful, highly available, unrestricted cloud
scalability firewall security service that provides threat protection for your Azure cloud
workloads.
The following are key strategies to be adopted:
93
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Virtual machines can stay private and secure online using Azure
Virtual Network NAT (NAT gateway).
Implement Firewall at edge of the enterprise network Deploy Azure Firewall and Virtual network traffic routing
Implement intrusion detection/protection system Adopt Azure Firewall with IDPS / Defender for endpoint
Implement DNS Security Azure DNS / Azure Private DNS /Defender for DNS
94
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
VNet integration for certain services allows you to create a private access point by
restricting the VNET.
The service native network ACL rules can also be configured to block access from
public networks, such as Azure SQL.
For Azure VMs, unless there is an assertive use case, you should avoid allocating
public IPs/subnets straight to the VM NIC interface but utilize gateway or load balancer
services as the front end for entry by the public network.
96
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Using Azure Firewall’s IDPS capability, you can detect and block traffic from and to
known malicious IP addresses and domains.
VM-level IDS/IPS can be combined with network-level IDS/IPS for a more
comprehensive host-level detection and prevention capability. One example of this is
Microsoft Defender for Endpoint.
98
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Securing Storage
Regardless of location, every organization has data that needs to be protected at rest, in
transit, and within applications. Azure provides security features to protect your data.
99
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
A data sovereignty concept holds that information stored in binary digital form
is subject to the laws of the country or region in which it is located after it has been
converted and stored. A significant concern around data sovereignty is enforcing privacy
regulations and preventing foreign governments from subpoenaing data stored in
foreign countries or regions.
In Azure, customer data might be replicated within a specified geographic area for
improved data durability during a major data center disaster. In some cases, it will not be
replicated outside it.
100
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Securing Endpoints
To ensure servers and client endpoints are protected and to constantly assess their
security posture to ensure they are up-to-date, a security strategy needs to be established
along with tools for obtaining enterprise-wide visibility into attack dynamics.
Microsoft Windows Client and Windows Server are designed to be secure, but many
organizations prefer more control over their security configurations. Microsoft shows
how to configure various security features in security baselines to assist organizations in
navigating many controls.
Security baselines are preconfigured Windows settings that help you apply and
enforce granular security settings recommended by the relevant security teams.
Intune allows you to create a security baseline profile composed of multiple device
configuration profiles, which can be customized to enforce only the settings and values
you need.
To increase flexibility and reduce costs, Microsoft recommends implementing an
industry-standard, widely known, and well-tested configuration, such as Microsoft
security baselines.
Understanding the operating system for which the security baseline is to be applied
is the first step in choosing the appropriate security baseline. Windows clients and
servers come in many versions, and you may need multiple baselines to address the
101
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
102
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• What are the differences between cloud security practices and those
used by on-premises systems?
As stated by Microsoft, security benchmarks can help you secure cloud deployments
quickly. Using a comprehensive security best-practice framework provided by cloud
service providers, you can select specific security configuration settings in your cloud
environment and monitor these settings from a single perspective.
The Microsoft cloud security benchmark (MCSB) includes a series of high-impact
security recommendations to help you secure cloud services in a single or multicloud
environment. These recommendations include the following:
103
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
104
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
105
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Azure Backup
• Adopt Azure Key Vault
Monitor backups
106
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
107
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
When Azure Backup supports it, you can enable soft delete to ensure that data is not
lost during recovery for up to 14 days following an unauthorized deletion. You can also
use multifactor authentication with a PIN. Enable georedundant storage or cross-region
recovery to ensure backup data can be restored if a disaster occurs in the primary region.
Zone-redundant storage (ZRS) will provide restorable backups in the event of zone
failures.
Note If you use the resource’s native backup feature or backup services other
than Azure Backup, refer to the Microsoft cloud security benchmark (and service
baselines) to implement these controls.
Monitor Backups
Compliance with the defined backup policy and standard should be ensured for all
business-critical protectable resources.
For Azure Backup supported resources, Backup Center helps you centrally govern
your backup estate. Use Azure Policies for Backup to audit and enforce such controls.
Ensure critical backup operations (deleting, changing retention, updating the backup
configuration) are monitored and audited and alerts are set up. Monitor backup health,
receive alerts for critical backup incidents, and audit user-triggered vault actions.
Note: Use built-in policies (Azure Policy) where appropriate to guarantee that your
Azure resources are configured for Backup.
108
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
109
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
There are four editions of Azure Active Directory: Free, Microsoft 365 Apps, Premium
P1, and Premium P2. As part of an Azure subscription, the Free edition is included.
Azure and Microsoft 365 subscribers may purchase Azure Active Directory Premium
P1 and P2 online through a Microsoft Enterprise Agreement, Open Volume License
Program, or Cloud Solution Providers program.
Authentication Choices
Organizations wanting to move their apps to the cloud must choose the correct
authentication method. Don’t take this decision lightly for these reasons:
• This is the first decision for an organization looking to move to
the cloud.
110
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Azure AD’s advanced security and user experience features are built
on this foundation.
An organization needs an identify control plane that strengthens its security and
keeps its cloud apps safe from intruders in the new cloud world. Authentication is the
new control plane of IT security. Thus, authentication is the company’s access guard in
the cloud.
The foundation of cloud access is authentication when Azure AD hybrid identify
is your new control plane. Choosing the correct authentication method for Azure AD
hybrid identify is crucial. Using Azure AD Connect, which also provides cloud users,
implement the authentication method configured.
For hybrid identify solutions, Azure AD supports the following authentication
methods.
Cloud Authentication
With cloud authentication, you can choose one of two options: either Azure AD manages
user sign-in or you can enable seamless single sign-on (SSO) so that users don’t have to
reenter their credentials every time they sign in.
Federated Authentication
To validate the password of an Azure AD user, federated authentication transfers the
authentication process to a trusted authentication system, such as Active Directory
Federation Services (AD FS) on-premises.
The authentication system, such as smartcard-based or multifactor authentication
by third parties, can provide advanced authentication requirements.
Three essential tasks can be accomplished using Azure Identify Protection.
112
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
With Azure Active Directory, you can manage, control, and monitor access to
essential resources within your organization using Privileged Identify Management
(PIM). These resources include Azure AD, Azure, and Microsoft Online Services like
Microsoft 365 and Microsoft Intune.
Azure Active Directory Privileged Identify Management (PIM) needs Azure AD
Premium P2 licenses
Privileged Identify Management provides time-based and approval-based role
activation to mitigate the risks of excessive, unnecessary, or misused access permissions
on resources that you care about.
The following are key use cases Azure AD PIM provides solutions for.
Information or resources that are secure should be accessible to the fewest people
possible since this reduces the chance of unauthorized disclosure.
As a result, users can use Azure AD, Azure, Microsoft 365, or SaaS apps to perform
privileged operations. Organizations can provide users with just-in-time privileged
access to Azure and Azure AD resources, which allows them to monitor what those users
are doing.
113
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Access applications using single sign-on (SSO) Azure Active Directory (Azure AD)
• SSO
• Passwordless
Ensure strong authentication controls are in place • Multi-factor authentication
• Conditional Access Policies
Resource access can be restricted based on conditions
114
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Azure AD Identify Secure Score evaluates Azure AD identify security posture and
allows you to remediate gaps in security and configuration.
• For secure access, ensure that all users can complete multifactor
authentication.
115
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
The default authentication method for many Azure services is TLS. If the service
supports a TLS enable/disable switch, ensure that it is always enabled so that the server/
service authentication can be supported. The handshake stage of your client application
should also verify the identify of the server/service (by confirming the certificate issued
by a trusted certificate authority).
Note Some API management and API gateway services support TLS mutual
authentication.
116
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
117
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Note A granular authentication session management can also be used via Azure
AD Conditional Access policy for management such as sign-in commonness and
continuous browser session.
118
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• To store credentials and secrets, use a Key Vault or secure key store
service.
Secure software development life cycles (SDLCs) and DevOps security processes are
often used to govern and enforce this.
Rather than embedding credentials and secrets into code and configuration files,
ensure they are stored securely, such as Azure Key Vault.
Your code management platform should be Azure DevOps and GitHub.
• When scanning GitHub code for credentials or other secrets, use the
native secret scanning feature.
A managed identify can securely access Azure Key Vault through Azure Functions,
Azure Apps, and VMs.
The Azure Key Vault rotates secrets automatically for services that are supported. If
secrets cannot be rotated automatically, they should be rotated periodically and purged
when no longer needed.
119
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Note VPNs are commonly used to access legacy applications; they usually have
a limited level of session monitoring and a little group of access control.
120
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Fundamental Privileged Access security principle Azure Privileged Access Security Services
• With this role, users can manage roles within Azure AD and within
Azure AD Privileged Identify Management (PIM). In addition, they
can manage all aspects of PIM and administrative units within AD.
121
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Additionally, Azure has built-in roles that can be critical for privileged access at the
resource level outside of Azure AD.
• Owners can assign roles in Azure RBAC and manage all resources.
• Manages all resources but does not permit assigning roles in Azure
RBAC, managing assignments in Azure Blueprints, or sharing image
galleries.
122
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
123
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
124
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Note Create custom roles only when necessary, as Azure built-in roles can be
used to assign permissions.
125
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Security best practices for Azure solutions: Use Azure security best
practices to design, deploy, and manage cloud solutions using
security best practices.
An essential part of the design phase is establishing best practices for the design and
functionality of the project as well as performing risk analyses to mitigate security and
privacy risks.
You can minimize the chances of security flaws and use secure design concepts
when you have security requirements. When an application has been released, a security
flaw can allow a user to perform malicious or unexpected actions due to an oversight in
its design.
126
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Modernize.
127
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Use the latest version of your framework and all security features available.
Developing cloud applications on any platform or language is possible with Microsoft’s
comprehensive development tools. You can choose from various SDKs depending on the
language you prefer. A full-featured integrated development environment (IDE) and the
editor can be used with Azure support and advanced debugging capabilities.
129
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Modernize
DevOps team models, rapid release cadences, and cloud services and APIs are all being
reshaped simultaneously as the application development process undergoes rapid
changes. To understand these changes, see how the cloud changes security relationships
and responsibilities.
In addition to modernizing antiquated development models, DevSecOps can be
viewed as securing applications and development processes. DevSecOps drives such
changes as the following:
130
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
131
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Analyze threats
Analyze Threats
Ensure your threat modeling serves the following purposes:
132
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• You can drive your threat modeling process with tools like the
Microsoft threat modeling tool with the embedded Azure threat
model template.
133
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
You may need to learn how secure it is when you use closed-source third-party
components in your production environment. The impact of malicious activity or
a vulnerability associated with the element can be minimized by adding additional
security controls such as access control, network isolation, and endpoint security.
Here is some Azure guidance: Ensure the software supply chain is secure using the
following capabilities or tools provided by GitHub Advanced Security or by GitHub
native features. Through Advisory Database, find all your project’s dependencies and
vulnerabilities by scanning, inventorying, and identifying them.
• Use the GitHub native code scanning capability to scan the source
code when sourcing the code from external sources.
• Make sure CI/CD tools, Azure AD, and native services are configured
with access permissions and entitlement policies to ensure that
changes to pipelines are authorized.
• Code and scripts used in CI/CD workflow jobs should not contain
keys, credentials, or secrets. Store them in key stores or Azure Key
Vaults instead.
To enable governance, compliance, operational auditing, and risk auditing for your
DevOps infrastructure, refer to the Logging and Threat Detection and DS-7 Posture and
Vulnerability Management sections.
135
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
136
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Perform a SAST and DAST scan on the workload artifacts before CI/
CD deployment (e.g., container images, dependencies, SASTs, etc.).
• Use the Azure Shared Image Gallery to share and control access
to your custom images with your users, service principals, or AD
groups. Make sure only authorized users can access your custom
images using Azure RBAC.
• You can use Microsoft Defender for Azure Containers to assess the
vulnerability of the images within your private Azure Container
Registry. You can also use Microsoft Defender for Cloud to integrate
container image scanning into your continuous integration and
delivery process.
In Azure serverless services, adopt similar controls to ensure that security controls
are shifted to the pre-deployment stage.
137
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
administrators typically have access to live and historical feeds from security devices and
agents placed throughout the IT environment. Security operations centers will receive
logs and reports from DLP, anti-malware, SIEM/SEM/SIM, firewalls, and IDS/IPS for
analysis and real-time response.
The SOC can be physically located within the data center. The security operations
center of an enterprise with many branches and offices may be operated remotely,
allowing remote monitoring. Third parties, meaning vendors with the tools, knowledge,
and personnel to provide security as a core competency, can often handle security
operations and continuous monitoring.
Organizations can sometimes synchronize their security tools, practices, and
responses to security incidents when a SOC is operated or outsourced. By improving
preventative measures and security policies, detecting security threats more quickly,
and responding more effectively and efficiently to them, security threats can usually be
reduced. Furthermore, SOCs can simplify and strengthen compliance with industry,
national, and international privacy laws.
Traditionally, you had to keep track of each level. The good news about cloud
providers is that they are responsible for intrusion detection and response in their areas
of responsibility, just like other controls. A provider breach could affect you, in which
case you will be notified and may have to perform response and recovery activities
specific to the services you use. However, in most cases, all your detection, response, and
recovery activities will be in the areas marked by consumer responsibility.
Depending on the service and deployment model, the cloud provider will have
a security operations center overseeing the various cloud data centers, underlying
infrastructure, platforms, and applications. However, cloud customers may also have
their security operations monitoring their users and accounts. The provider and
customer may share responsibilities and activities for detection, reporting, investigation,
and response actions; all of these must be included in the contract.
SOC teams vary according to the organization’s size and the industry, but most
share similar roles and responsibilities. Typically, a SOC is a centralized function that
monitors and improves an organization’s cybersecurity posture by preventing, detecting,
analyzing, and responding to cybersecurity incidents.
As far as cybersecurity is concerned, prevention always outweighs reaction. A SOC
monitors the network around the clock rather than responding to threats as they occur.
Detecting malicious activities and preventing them before they cause damage is possible
with the SOC team.
139
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
When SOC analysts witness something suspicious, they assemble as many details as
possible for a deeper analysis.
An analyst performs a threat analysis at the investigation stage to determine
whether and to what extent a threat has penetrated the system. By viewing the network
and operations of the organization from an attacker’s perspective, the security analyst
searches for crucial indicators and vulnerabilities before they can be exploited.
By identifying and triaging various security incidents, the analyst understands
how attacks unfold and how to respond before things get out of hand. The SOC analyst
incorporates the most up-to-date global threat intelligence for a successful triage,
including details on attacker tools, methods, and movements.
The SOC team coordinates a response following the investigation. Immediately after
an incident’s confirmation, the SOC isolates endpoints, terminates harmful processes,
prevents them from executing, deletes files, etc.
The SOC works to restore systems and recover data after an incident. To counter
ransomware attacks, you may need to wipe and restart endpoints, reconfigure systems,
or deploy viable backups to circumvent the ransomware.
The IT environment does not have durable security controls. For a control to
be considered complete (and the associated risk to be permanently mitigated), it
cannot be purchased, implemented, and regarded as complete. You must monitor IT
resources continuously to ensure that controls are adequate, operating as intended,
and addressing the risks or vulnerabilities they are supposed to mitigate. Furthermore,
new or emerging threats or hazards must be monitored continuously to ensure they are
handled appropriately.
The key difference between NOCs and SOCs is that NOCs monitor the network
proactively for issues that could slow traffic and respond to outages when necessary.
In addition to monitoring the network and other environments, a SOC is looking for
evidence of cyberattacks. NOCs and SOCs need to coordinate activities to prevent
network performance disruptions. Some organizations house their SOC within their
NOCs to encourage collaboration.
SOC teams use real-time security monitoring to identify potential threats on servers,
devices, databases, network applications, websites, and other systems. Additionally,
they do proactive security work by staying on top of the latest threats and identifying
and addressing system or process vulnerabilities before attackers can exploit them. If
a successful attack occurs, the SOC team is responsible for removing the threat and
restoring backups and systems.
140
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
141
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Staying current: SOC must keep up-to-date with the latest security
solutions and technologies and threat intelligence as well as news
and information on cyberattacks and their perpetrators gathered
from social media, industry sources, and the dark web.
• Security information and event management: SIEM has been the core
monitoring, detection, and response technology for many SOCs. To
identify potential threats, SIEM monitors and aggregates real-time
alerts and telemetry from software and hardware on the network.
A recent development is the adoption of XDR technology, which
provides detailed telemetry and monitoring and can automatically
detect and respond to incidents.
142
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
• Threat detection: After sorting the noise from the signals, the SOC
team triages threats by severity based on the indications of actual
cyber threats and hacker exploits. Artificial intelligence (AI) is
incorporated into modern SIEM solutions to automate these
processes and to detect suspicious activity more accurately over time.
• Incident response: The SOC responds to threats or actual incidents to
limit the damage. Actions can include the following:
• An investigation of the incident’s root cause is necessary to
determine the technical vulnerabilities that allowed hackers to
gain access to the system, as well as other factors (such as poor
password hygiene or a lack of enforcement of policies) that
contributed to the attack.
• Endpoints that have been compromised should be shut down or
disconnected from the network.
• Isolating and rerouting compromised network traffic.
• Apps or processes that are compromised should be paused or
stopped.
• Files that are damaged or infected should be deleted.
• Running antivirus or anti-malware software.
• Internally and externally decommissioning passwords.
In addition to automating and accelerating these responses, many SOCs can use
XDR solutions.
In summary, the SOC team monitors detect, contains, and remediates IT threats
across applications, devices, systems, networks, and locations. To determine whether
a threat is active, what the impact is, and what measures are needed, SOC teams use
various technologies and processes (e.g., indicators, artifacts, and other evidence)
in conjunction with the latest threat intelligence (e.g., indicators, artifacts, and other
evidence). The increasing frequency and severity of incidents have altered the roles and
responsibilities of security operations centers.
SOCs help organizations prevent cyberattacks by combining people, tools, and
processes. Among its functions are inventorying assets and technology, routine
maintenance, continuous monitoring, threat detection, threat intelligence, log
management, incident response, recovery and remediation, root-cause investigations,
security refinement, and compliance management, all of which contribute to achieving
its goals.
By unifying defenders, threat detection tools, and security processes, a strong SOC
helps organizations manage security more efficiently and effectively. With a SOC,
companies can manage compliance better, respond faster to threats, and improve
security processes.
144
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
145
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
You manage threats and vulnerabilities, respond to incidents, and automate security
operations. Automating processes allows them to be handled automatically, such as
scanning for vulnerabilities or searching for logs or resolving well known attacks.
Tier 1 is a security incident’s first point of contact. In triage, alerts are generated by
automation, and tools are processed at high volumes. Most of the common incident
types are resolved within the team through triage. A tier 2 incident should be escalated if
it is more complex or has not been seen before.
In Tier 2, the SOC should focus on incidents requiring further investigation, often
requiring data points from various sources to be correlated. Tier 2 investigates escalated
issues to provide repeatable solutions, so Tier 1 can address similar problems in the
future. A business-critical system alert will also be handled by Tier 2, which will reflect
the severity of the risk and the need for immediate action.
In Tier 3, the SOC should focus primarily on proactively hunting for highly
sophisticated attack processes and developing guidance for the broader teams for
maturing security controls. Tier 3 provides forensic analysis and response support for
significant incidents.
146
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
Generally, these are the best practices to follow when conducting security
operations:
SecOps Tools
An Azure SOC team can use SecOps tools to investigate and remediate incidents.
A cloud-based SIEM solution is one of the most important tools in a SOC. It
aggregates data from multiple security solutions and log files to detect emerging threats,
expedite an incident response, and keep up with attackers.
With SOAR, recurring and predictable enrichment, response, and remediation tasks
can be automated, allowing more time and resources for investigations and hunting.
Microsoft Sentinel is a SIEM tool for enterprise-wide log monitoring. With Microsoft
Sentinel, you can easily integrate any product or service in your environment with
Microsoft Sentinel’s playbooks and connectors for security orchestration, automation,
and response (SOAR).
147
Chapter 2 Design and Deploy Security for Infrastructure, Data, and Applications
By integrating security products and data into simplified solutions, XDR provides
holistic, optimized security through software as a service. Multicloud and hybrid
environments require organizations to use these solutions to address evolving
threats and complex security challenges proactively and efficiently. Unlike systems
like endpoint detection and response (EDR), XDR covers a broader range of security
products, including endpoints, servers, cloud applications, and emails, all protected
with XDR. As a result, XDR provides visibility, analytics, correlated alerts, and automated
responses to protect data and combat threats by combining prevention, detection,
investigation, and response.
You can also use Microsoft Defender for Cloud to respond to an alert using a security
playbook. The Microsoft Defender software provides an end-to-end solution for threat
detection and response on-prem, in the cloud, and other clouds across your Microsoft
estate. Cloud telemetry and on-premises telemetry must be collected, analyzed, and
responded to with comprehensive monitoring solutions.
Or, you can use Azure Monitor to create Azure application and service event logs.
With Azure Monitor, you can aggregate all the data from your system into one platform.
It combines data from multiple Azure subscriptions and tenants and hosts data for other
Azure services.
You can use an Azure NSG to monitor network activity or use Azure Information
Protection to protect sensitive data, such as emails, documents, and files, outside of your
organization.
Summary
In this chapter, you read about methods to design and deploy a strategy for securing
infrastructure and platform components, design and deploy a strategy for securing
identify, and design and deploy a strategy for securing apps and data. You also learned
about Microsoft SecOps.
In the next chapter of the book, you will read about designing and deploying identify
solutions in alignment with the NIST CSF.
148
CHAPTER 3
149
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_3
Chapter 3 Design and Deploy an Identify Solution
• ID.GV: Governance
150
Chapter 3 Design and Deploy an Identify Solution
The activities in the Identify function are critical for effectively using the NIST
CSF framework. Develop an organizational understanding of cybersecurity risk to
systems, people, assets, data, and capabilities. Based on its risk management strategy
and business needs, an organization can prioritize its cybersecurity efforts based on
understanding the business context, the resources supporting critical functions, and
the cybersecurity risks. The outcome categories included in this function are Asset
Management, Business Environment, Governance, Risk Assessment, Risk Management
Strategy, and Supply Chain Risk Management. Figure 3-1 depicts the classification.
IDENTIFY (ID)
151
Chapter 3 Design and Deploy an Identify Solution
IDENTIFY (ID)
Asset Management
(ID.AM)
Resource
classification,
All stakeholders
A physical inventory The organization The flow of data and criticality, and
A catalog of external (suppliers, customers,
of the organization's inventories its software communication within business value are
information systems is partners) are given
devices and systems is platforms and an organization is used to prioritize
created cybersecurity roles
conducted. applications mapped resources (e.g.,
and responsibilities
devices, hardware,
data, and software)
Enable data
classification, secure Define roles and
Maintain
Discover, map and privileged access, responsibilities (e.g.
Inventory devices and Inventory of Platform accountability of
monitor various data and the ability to related to privileged
systems and Applications users’ access and
flows manage, control, and access)
usage of SaaS apps.
monitor access to across Azure
Azure
152
Chapter 3 Design and Deploy an Identify Solution
153
Chapter 3 Design and Deploy an Identify Solution
Let’s now to explore the Azure NIST Identify mapping for asset management and
Microsoft’s outlined responsibility classification among Microsoft and customers, which
matches up with cloud security shared responsibility models.
Figure 3-3 depicts the subcategories of Azure mapping against the Identify module of
the NIST CSF.
Azure Asset
Management (ID.AM)
Microsoft Defender Microsoft Defender Azure Information Azure AD Privilege Azure Privilege
Service Map
for Cloud for Cloud Protection (AIP) Identify Management Access Management
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 3-1 with respect to ID.AM.
154
Table 3-1. ID.AM Responsibility Matrix
Category Subcategory Informative Responsibility Customer Microsoft Azure
References Responsibility Responsibility
Asset Management ID.AM-1: A physical NIST SP Shared All external information Microsoft Azure maintains
(ID.AM): Data, inventory of the 800-53 Rev. 4 systems interconnected an inventory of information
personnel, organization’s CM-8 with the Azure subscription system components.
devices, systems, devices and must be catalogued Keeping the inventory up to
and facilities systems is and documented by the date with new installations
that enable the conducted. customer. and decommissioning of
organization to devices is done with an
meet its business inventory database system,
objectives are which keeps it accurate
identified and and up to date. A security
group must establish
Chapter 3
managed in
accordance with standards based on which
the risk strategy of assets are classified. The
the organization. inventory must identify the
owner, current location, and
classification of each asset.
All asset types are
kept up-to-date with
new installations and
decommissionings.
(continued)
155
Design and Deploy an Identify Solution
Table 3-1. (continued)
156
Category Subcategory Informative Responsibility Customer Microsoft Azure
Chapter 3
157
Design and Deploy an Identify Solution
Table 3-1. (continued)
158
Category Subcategory Informative Responsibility Customer Microsoft Azure
Chapter 3
159
Chapter 3 Design and Deploy an Identify Solution
Security alerts immediately inform you of the nature and severity of threats to
your environment so you can prepare to respond. After you identify a threat in your
environment, you need to respond to limit the risk to your resources quickly.
In a hybrid and multicloud environment, you need to protect your resources.
Microsoft Defender for Cloud, Microsoft Entra Permissions Management, Azure Network
Security, GitHub Advanced Security, and Microsoft Defender External Attack Surface
Management work together to provide comprehensive cloud security.
160
Chapter 3 Design and Deploy an Identify Solution
Asset Inventory
An IT asset inventory is a systematic process of gathering, recording, and maintaining
information about all an organization’s hardware and software IT assets. This process
helps ensure that IT resources are used efficiently and that all assets are accounted for
and properly maintained.
A security posture view of your connected resources is available on the asset
inventory page of Microsoft Defender for Cloud. Regular security checks by Defender
for Cloud identify potential security issues and provide actionable recommendations. A
security posture can be improved by resolving functional requests.
As part of Defender for Cloud’s asset inventory, you can query Defender for Cloud’s
security posture across multiple subscriptions using Azure Resource Graph (ARG).
ARG provides efficient resource exploration and scalable querying capabilities. It
allows users to explore resources efficiently and to query them in a scalable manner.
Cross-referencing Defender for Cloud data with other resource properties can
quickly provide deep insights using Kusto Query Language (KQL).
161
Chapter 3 Design and Deploy an Identify Solution
Software Inventory
Defender for Cloud’s Software Inventory helps organizations better manage, track, and
secure their software assets. It provides a secure, centralized repository to store, track
and report on software inventory. It also helps organizations ensure compliance with
software licensing regulations.
One of these paid solutions is required to access the software inventory:
You can access the software inventory if you have already enabled Microsoft
Defender for Endpoints and Microsoft Defender for Servers integrations.
Here are the key Microsoft Defender for cloud identify capabilities:
162
Chapter 3 Design and Deploy an Identify Solution
How to Enable It
Whenever you turn on a Defender plan, monitoring extensions are automatically
deployed to collect data from your resources. It is necessary to enable the Defender plans
that cover each workload that you want to protect in order to get Defender for Cloud’s
full protections. The following is the process to turn on Microsoft Defender for Cloud:
2. You can search for and choose Microsoft Defender for Cloud.
3. In the Defender for Cloud menu, choose “Environment settings.”
6. Click Save.
of the company’s network. This can help protect the company’s reputation, credibility,
and financial assets. It also helps protect the personal data of employees and customers.
In addition, two-factor authentication can help protect the company from costly legal
fees and penalties.
Figure 3-5 depicts the Azure AD registered devices screen.
Windows 10 or newer devices with Azure AD registered accounts are signed in with
a Microsoft account. For access to organizational resources, these devices have an Azure
AD account. Azure AD accounts and Conditional Access policies applied to device
identities can limit access to resources within an organization.
By using mobile device management (MDM) tools like Microsoft Intune,
administrators can further secure and control these Azure AD-registered devices. By
implementing MDM, organizations can enforce policies such as requiring encrypted
storage and complex passwords and keeping their security software up-to-date.
Using the Windows 10 or Windows 11 Settings menu, you can manually register
Azure AD when accessing a work application for the first time.
A primary refresh token (PRT) is issued to registered and joined devices, which can
serve as a primary authentication artifact and a multifactor authentication artifact in
some cases. Attackers can register their devices, use PRTs to access business data, steal
PRT-based tokens from legitimate user devices, or find misconfigurations in Azure Active
Directory controls. Administrators initiate and control the hybrid Azure AD joining
process, reducing attack methods.
164
Chapter 3 Design and Deploy an Identify Solution
Identify-based attacks do not commonly target devices, but they can be used to
fool security controls or impersonate users. Devices can have one of four relationships
with Azure AD as Unregistered, Azure Active Directory (Azure AD) registered, Azure AD
joined, and Hybrid Azure AD joined.
Keep an eye on your devices so that bad actors cannot access your infrastructure
through them.
Azure AD audit logs can be viewed and downloaded as CSV or JSON files from
the Azure Portal. A variety of tools can be integrated with Azure AD logs via the Azure
Portal, including Microsoft Sentinel, Sigma rules, Azure Monitor, Azure Event Hubs, and
Microsoft Defender for Cloud Apps. You can also secure workload identities with Identify
Protection Preview, enabling improved monitoring and alerting.
How to Enable It
In addition to domain join, group policy, LDAP, and Kerberos/NTLM authentication,
Azure Active Directory Domain Services (Azure AD DS) is fully compatible with
Windows Server Active Directory. Azure AD DS integrates with your existing Azure AD
tenant, so you don’t have to deploy, manage, and patch domain controllers yourself.
Using this integration, users can log in using corporate credentials, and you can secure
access to resources using existing groups and user accounts.
It is important to define a unique namespace for an Azure AD DS managed domain
when you create one. A replica set is a deployment of two Windows Server domain
controllers (DCs) into your selected Azure region.
You will need to complete the following steps to launch the Enable Azure AD
Domain Services wizard:
1. Log in to the Azure Portal.
165
Chapter 3 Design and Deploy an Identify Solution
IoT Hub Identify Registry helps developers securely manage device identities,
enabling them to control access to the devices and their data securely. It also helps
reduce the complexity of managing large, connected devices. It also provides a secure
way to manage device certificates and allows for the revocation of certificates when
needed. IoT Hub Identify Registry is designed to simplify the process of managing device
identities and access control policies, allowing developers to quickly and securely set up
and manage many connected devices. IoT Hub Identify Registry also provides a secure
166
Chapter 3 Design and Deploy an Identify Solution
way to store device data, ensuring it is accessible only to authenticated users. It also
enables device authentication and authorization, allowing developers to control access
to their devices and manage user permissions.
IoT Hub Identify Registry also provides tools for monitoring device activity and
managing device updates, making it easier for developers to manage connected devices.
It also enables users to configure devices easily, allowing them to control how they
interact with each other.
IoT Hub Identify Registry also provides secure storage of device credentials, which
helps to protect user data and prevent unauthorized access. IoT Hub Identify Registry
helps maintain a secure and reliable network of connected devices, ensuring that
data is protected and that devices can communicate securely with each other. It also
helps to reduce the time and effort required to manage and maintain devices, allowing
developers to focus on the development process.
Device and back-end developers can build robust device management solutions
with Azure IoT Hub thanks to its features and extensibility model. Sensors and
microcontrollers with limited functionality can be paired with robust gateways that
route communications for groups of devices. In addition, IoT operators’ use cases and
requirements vary widely by industry. Despite this variation, device management with
IoT Hub can accommodate a wide range of end users and devices.
Identities of devices and modules connected to IoT hubs are stored in identify
registries. IoT hubs require that devices and modules have entries in their identify
registries before they can connect. Credentials stored in the identify registry must also be
used to authenticate devices or modules with the IoT hub.
A case-sensitive requirement for the device or module ID is stored in the identify
registry.
REST-capable identify resources are collected in the identify registry at a high level.
The IoT Hub creates per-device resources when you add an entry to the identify registry,
such as the queue for cloud-to-device messages.
When you need to use the identify registry, do the following:
167
Chapter 3 Design and Deploy an Identify Solution
There are several operations available through the IoT Hub identify registry.
Microsoft Intune
Microsoft Intune is a cloud-based service that helps organizations to manage their
mobile devices and apps. It enables administrators to set up device policies and
restrictions, manage applications, and control access to corporate resources. It also
provides users with a secure and productive experience on their devices.
Microsoft Intune also helps organizations to protect their data and ensure
compliance with security and privacy regulations. Intune makes managing and
securing mobile devices, apps, and corporate data easier. It also helps to ensure that
only approved apps are installed on company-owned mobile devices. Intune provides
detailed reports and analytics about device usage for greater visibility and control.
Intune helps ensure that devices and apps are updated with the latest security patches.
168
Chapter 3 Design and Deploy an Identify Solution
This helps to lower the risk of unauthorized access to company data, malicious code
execution, and other security threats. It also helps organizations meet regulatory
compliance requirements and enforce data protection policies across devices.
Intune also provides secure access to corporate resources, such as email and other
applications, while ensuring that corporate data remains safe. It also allows for remote
lock and wipe of devices if they are lost or stolen. Finally, it helps to enforce security
policies, such as requiring a secure password or biometric authentication.
Organizations are challenged to manage the devices to access organization resources
as they support hybrid and remote workers. Collaborating across locations, working
from anywhere, and securely connecting to these resources are essential for employees
and students. Data must be protected, access managed, and support provided from
anywhere by administrators.
With Microsoft Intune, you can manage your endpoints from the cloud. Mobile
devices, desktop computers, and virtual endpoints can all be managed with it, including
user access and app and device management.
Figure 3-6 shows the Microsoft Intune interface.
169
Chapter 3 Design and Deploy an Identify Solution
170
Chapter 3 Design and Deploy an Identify Solution
How to Enable It
With Microsoft Intune, you have easy access to mobile device management and client
app management from the cloud. It ensures secure productivity across all of your
devices, including Windows, iOS, macOS, and Android.
Prior to signing up for Intune, check if you already have a Microsoft Online Services,
Enterprise Agreement, or equivalent volume licensing agreement. Microsoft volume
licensing agreements or Microsoft Azure services subscriptions like Microsoft 365
typically include a work or school account.
For your organization, you can sign up for a new account if you already have a work
or school account.
The following is the process to get started:
After signing up for Intune, you can manage the service using any device with a
supported browser.
By default, Azure AD requires you to have one of these permissions: Global
Administrator or Intune Service Administrator.
Allowing users with other permissions to administer the service
171
Chapter 3 Design and Deploy an Identify Solution
172
Chapter 3 Design and Deploy an Identify Solution
173
Chapter 3 Design and Deploy an Identify Solution
On the map, you can expand machines to show running process groups and
processes with active network connections. Agentless front-end machines are connected
to the focus machine via the left side of their processes. A server port group is created
when a focus machine connects to a back-end machine without an agent. Other
connections to the same port number are also included in this group.
Service Map shows dependency information for the last 30 minutes by default. Using
the time controls at the upper left, you can view historical dependencies for a time range
of up to one hour. If you want to see what they looked like before or after an incident,
for example. Paid workspaces store Service Map data for 30 days, while free workspaces
store it for 7 days.
A process group consists of processes associated with the same product or service.
Expanding a machine node will display stand-alone processes as well as groups of
processes. The connection to a process within a process group is marked as failed if it
fails either inbound or outbound.
Rather than just seeing maps of one server, machine groups allow you to see maps
of multiple servers. Multitier applications and server clusters can be visualized this way.
Each server is assigned a name and a group is created by the user. After that, you can
choose to view all the processes and connections of the group. The group can also be
viewed with only the processes and connections pertaining to its members.
How to Enable It
The Azure Monitor can collect data from multiple sources, including your application,
the platform, the operating systems, and the services it uses.
As soon as you create an Azure resource that supports metrics, this data is collected
and sent into the Azure Monitor metrics data store by the Azure platform.
Almost all Azure resources emit metrics every minute, but a few metrics are emitted
every five minutes.
You can export metrics to a third-party service for longer retention periods. Azure
Monitor’s metrics data store retains metrics for 93 days for free.
174
Chapter 3 Design and Deploy an Identify Solution
Azure Network Watcher can help detect, diagnose, and resolve network issues
quickly and efficiently. It also provides powerful analytics to help improve network
performance. It helps assess network security, troubleshoot network issues, and
optimize network performance. Network Watcher is an invaluable resource for Azure
users, as it helps keep their networks running smoothly and securely. It is an essential
tool for managing and optimizing Azure networks.
Azure Network Watcher offers advanced monitoring and analytics capabilities.
It can detect suspicious activity, alert users to potential security threats, and identify
and troubleshoot network issues. Network Watcher also provides insights into traffic
patterns and performance metrics that can help Azure users optimize their networks
for maximum efficiency. It is an invaluable tool for managing and protecting Azure
networks.
Azure Network Watcher is easy to use and helps users quickly detect and respond to
security threats. It also reduces the need for manual intervention, making it an efficient
and cost-effective solution for managing Azure networks.
Azure Network Watcher provides tools for monitoring, diagnosing, viewing metrics,
and enabling or disabling logs for Azure virtual networks. As an infrastructure-as-a-
service (IaaS) product, Network Watcher monitors and fixes the network health of virtual
machines (VMs), virtual networks (VNets), application gateways, load balancers, etc.
Virtual machines, fully qualified domain names (FQDNs), uniform resource
identifiers (URIs), and IPv4 addresses can all be used as endpoints. Monitoring
communication between the VM and the endpoint regularly provides information on
reachability, latency, and changes in the network topology. For example, you might
have a database server VM communicating with a web server VM. Someone in your
organization may change the web server, database server VM, or subnet without your
knowledge.
The connection troubleshooting feature informs you of unreachable endpoints. VMs
may experience DNS name resolution problems, CPU problems, memory problems,
firewall issues, hop types of custom routes, or security rules for the VM or subnet.
Figure 3-8 depicts the Network Watcher.
175
Chapter 3 Design and Deploy an Identify Solution
176
Chapter 3 Design and Deploy an Identify Solution
177
Chapter 3 Design and Deploy an Identify Solution
How to Enable It
You must have an existing Network Watcher instance or enable Network Watcher in each
region where you have NSGs that you want to analyze traffic for. The traffic analytics
feature can be enabled for any region where NSGs are hosted.
A network security group must be created before NSG flow logging can be enabled. If
you don’t have one, create one.
You will need to complete the following steps to turn on Network Watcher:
1. Log in to the Azure Portal.
178
Chapter 3 Design and Deploy an Identify Solution
• Protect your data no matter where it’s stored or with whom it’s shared
by adding classification and protection information.
• You can secure the data you’re working on with one click in Microsoft
Office and most typical applications. A recommended classification
notification in the product assists users in making the right decisions.
AIP classifies and protects information by applying labels to documents and emails.
The AIP client must be installed on all machines you want to use AIP features. A plan for
classifying, labeling, and protecting information using the Azure Information Protection
scanner or client would be helpful.
AIP uses Azure Rights Management (Azure RMS) to protect your data. It can be
used with other Microsoft Azure applications and services, such as Office 365 and
Azure Active Directory, as well as with your applications and other information security
179
Chapter 3 Design and Deploy an Identify Solution
solutions. Azure RMS supports cloud and on-premises solutions. Using Azure RMS, you
can encrypt, identify, and authorize users. In the same way as AIP labels, Azure RMS
ensures that your content is protected even when it is shared, regardless of where the
documents or emails are located.
You can restrict data access to users within your organization once the Azure Rights
Management service is activated. Apply more restrictive controls to new templates by
configuring your protection settings. The Azure Rights Management templates can be
used with applications and services that support the service.
How to Enable It
Azure Information Protection requires that your organization have a service plan that
includes Azure Rights Management.
All users in your organization can apply protection to their documents and emails
when the protection service has been activated, and all users can open (consume)
protected documents and emails. Alternatively, you can use onboarding controls to
phase out the deployment of information protection if you prefer.
PowerShell is now the only way to activate or deactivate Azure RMS.
180
Chapter 3 Design and Deploy an Identify Solution
181
Chapter 3 Design and Deploy an Identify Solution
The Privileged Identify Management (PIM) service works with Azure AD to allow
you to manage, control, and monitor access to vital resources within your organization.
Azure AD, Azure, and other Microsoft Online Services, such as Microsoft 365 or
Microsoft Intune, are among these resources.
A company wants to limit the number of people who have access to secure
information or resources because that reduces the risk of the following:
It is still necessary for users to perform privileged operations within Azure AD, Azure,
Microsoft 365, or SaaS apps. By granting just-in-time access to Azure and Azure AD
resources, organizations can keep tabs on how their privileged users use them.
Privileged Identify Management provides time-based and approval-based role
activation to mitigate the risk of excessive, unnecessary, or misused access permissions
on resources you care about. Privileged Identify Management provides the following key
features:
• By assigning start and end dates to resources, you can limit access to
resources for a defined time bound.
• PIM makes sure roles are still needed by conducting access reviews.
• PIM protects the last active role assignment for Global Administrators
and Privileged Role Administrators.
Upon setting up Privileged Identify Management, you’ll see the Tasks, Manage, and
Activity options in the navigation menu on the left. Administrators can choose between
managing Azure AD roles, Azure resource roles, or PIM for groups. You will see the
appropriate options depending on what you want to manage.
182
Chapter 3 Design and Deploy an Identify Solution
Users can only manage assignments for other administrators with the privileged
role of Administrator or Global Administrator role in Privileged Identify Management.
Privileged Identify Management also allows the Global Administrators, Security
Administrators, Global Readers, and Security Readers roles to view Azure AD roles.
Subscription administrators can manage assignments for Azure resource roles,
resource owners, or resource user access administrators in Privileged Identify
Management. Assignments to Azure resource roles in Privileged Identify Management
are not accessible by default to Privileged Role Administrators, Security Administrators,
or Security Readers.
How to Enable It
Licenses required for Privileged Identify Management include Azure AD Premium P2
and Enterprise Mobility + Security (EMS) E5.
With PIM, roles can be activated based on time and approval, reducing the chances
of excessive, unnecessary, or misused access permissions. These resources include
Microsoft Azure Active Directory (Azure AD), Azure, and Microsoft Online Services like
Microsoft 365 or Microsoft Intune.
You will need to complete the following steps to turn on Azure PIM:
183
Chapter 3 Design and Deploy an Identify Solution
PAM provides visibility into who is using privileged accounts and what they are doing.
Additional layers of protection mitigate data breaches by threat actors by limiting the
number of users with access to administrative functions.
Credential theft prevention and compliance are two primary uses of privileged
access management.
For example, say an attacker steals a user’s login information to access their account.
The ability to log in allows them to access organizational data and install malware on
devices. All admin identities and accounts can be accessed just-in-time and just enough
with PAM solutions.
Protecting sensitive data, such as payment or health information, may require a
least-privilege policy if your organization must comply with compliance standards.
Using a PAM solution, you can generate reports showing which data is accessed by
which users.
In addition, users may be automatically created, provisioned, and decommissioned,
privileged accounts can be monitored, remote access can be secured, and third-party
access can be controlled. PAM solutions can also manage DevOps projects, devices (the
Internet of Things), and cloud environments.
Cybersecurity threats can cause serious and extensive damage to organizations when
privileged access is misused. Keeping ahead of this risk is easier with a PAM solution.
185
Chapter 3 Design and Deploy an Identify Solution
Your organization can also benefit from a PAM solution by identifying malicious
activities linked to privilege abuse.
How to Enable It
For your organization’s security and risk mitigation, you should follow best practices
when planning for and implementing a PAM solution.
It would be best if you had the plan to get started with privileged access
management.
Depending on your IT department, you can use your PAM solution immediately and
then gradually add modules to increase functionality and help you meet compliance
requirements.
187
Chapter 3 Design and Deploy an Identify Solution
IDENTIFY (ID)
Business Environment.
(ID.BE)
Communication and identification of the organization's The resilience requirements for critical services are
role in the supply chain established
As part of the Azure cloud shared responsibility model, the NIST Cybersecurity
Framework security functions are provided in Table 3-2 with respect to ID.BE.
188
Table 3-2. Business Environment Responsibility Matrix
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
References Responsibility
Business ID.BE-1: NIST SP 800-53 Rev. 4 Customer Supply chain roles must be N/A
Environment (ID. Communication CP-2, SA-12 identified, documented, and
BE): Defining and identification communicated by customers.
cybersecurity of the
roles and organization’s role
responsibilities in the supply chain
and managing
risks is
based on the
organization’s
Chapter 3
mission,
objectives,
stakeholders,
and activities.
(continued)
189
Design and Deploy an Identify Solution
Table 3-2. (continued)
190
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 3
References Responsibility
ID.BE-2: A NIST SP 800-53 Rev. Customer The customer must identify, N/A
description of the 4 PM-8 document, and communicate all
organization’s critical infrastructure used by the
role in critical system. The customer’s critical
infrastructure and infrastructure includes but is not
its industry sector limited to Virtual Machines hosted
is provided by Azure subscriptions and virtual
networks connecting Azure Virtual
Machines.
Design and Deploy an Identify Solution
ID.BE-3: NIST SP 800-53 Rev. 4 Customer Organization missions and business N/A
Establishing and PM-11, SA-14 objectives must be identified,
communicating documented, and communicated by
organizational the customer.
mission,
objectives, and
activities
ID.BE-4: NIST SP 800-53 Rev. Customer A critical service provider N/A
Delivering critical 4 CP-8, PE-9, PE-11, must identify, document, and
services requires PM-8, SA-14 communicate dependencies.
dependencies and
critical functions.
ID.BE-5: The NIST SP 800-53 Rev. 4 Customer The customer must identify and N/A
resilience CP-2, CP-11, SA-14 document resilience requirements
requirements for for all operating states to ensure
critical services the delivery of critical services.
are established The customer is responsible for
enabling and documenting many
services related to system resiliency
(e.g., alternate processing location,
alternate storage location) despite
Chapter 3
191
Design and Deploy an Identify Solution
Chapter 3 Design and Deploy an Identify Solution
192
Chapter 3 Design and Deploy an Identify Solution
Additionally, Azure Bastion can be provisioned within your virtual network as a fully
platform-managed service that allows direct RDP/SSH access from the Azure portal.
This service provides secure, seamless connectivity to virtual machines over the Internet
without exposing the virtual machine to public IP addresses. Azure Bastion is also highly
available, with built-in redundancy to protect against service outages. This makes it
an excellent choice for organizations that need secure remote access to their virtual
machines. Azure Bastion is also easily configurable and requires minimal maintenance.
It provides an additional layer of security by securely connecting users to their virtual
machines through the Azure Portal, utilizing encryption protocols such as SSL/TLS. It
also helps protect against malicious attacks by ensuring that virtual machines are not
exposed to public IP addresses. It also offers secure access to virtual machines for users
with limited privileges, as it does not require them to have administrative credentials.
This allows organizations to grant secure access to users without sacrificing security.
193
Chapter 3 Design and Deploy an Identify Solution
Reliability ensures that your application can meet your customers’ expectations. You
can provide the availability of your workloads and the ability to recover from failures at
any scale by architecting resiliency into your application framework.
Reliability is built by doing the following:
194
Chapter 3 Design and Deploy an Identify Solution
In addition, high availability needs to be balanced with high resiliency, low latency,
and low cost. It is equally important for applications to recover from failures (resiliency).
Multitenant environments such as Azure are highly distributed and prone to failure.
By anticipating failures from particular elements to entire Azure regions, you can design
a solution in a resilient way to enhance reliability. The concept of reliability is subjective.
For an application to be suitably reliable, it must echo the business requirements
covering it.
To mitigate issues impacting application reliability, you must first detect them.
Reliability issues can be detected and predicted by monitoring the application’s
operation compared to its healthy state. Taking swift and remedial action is possible with
monitoring.
A system that self-heals can deal with failures automatically. Predefined remediation
protocols are used to handle failures, and these protocols connect to failure modes
within the solution. To achieve this level of maturity, the system must be monitored and
automated to a high degree. Aiming to maximize reliability should be the goal of self-
healing from the start.
Azure services offer a wide range of cloud-native services to support reliability such
as Azure Front Door, Azure Traffic Manager, Azure Load Balancer, Azure Virtual Network
NAT, Service Fabric, Kubernetes Service (AKS), and Azure Site Recovery.
During the architectural phase, Microsoft recommends implementing practices that
meet your business requirements, identifying failure points, and minimizing the scope of
failures.
195
Chapter 3 Design and Deploy an Identify Solution
• Establish recovery and availability targets that meet the needs of the
business: SLAs are availability targets that represent a commitment to
performance and availability. To define reliability targets, it is crucial
to understand each component’s service level agreement (SLA). In
a disaster, recovery targets determine the duration of the workload’s
unavailability and the amount of data that can be lost. Identify critical
scenarios and target reports for the application. Penalties, such as
finance charges, may apply if an SLA is not met. The consequences of
not moving availability targets should be fully understood.
• Eradicate all single points of failure from the data path between
on-premises and Azure.
196
Chapter 3 Design and Deploy an Identify Solution
197
Chapter 3 Design and Deploy an Identify Solution
Governance (ID.GV)
Cybersecurity governance establishes and enforces policies, standards, and procedures
designed to protect your organization’s digital assets and information systems.
It is an integral part of any organization’s risk management strategy and helps to
ensure compliance with relevant regulations. It is essential to have a comprehensive
cybersecurity governance program in place to protect the organization from cyber-
attacks, data breaches, and other security incidents. Regular program reviews are
essential to ensure its effectiveness and compliance with industry standards. Regular
training of staff is also essential to ensure they are aware of the latest security protocols
and best practices.
Additionally, organizations should invest in the latest cybersecurity technologies
to further protect their data and systems. Organizations should also regularly update
their security policies to reflect the latest threats and risks. Regular audits should also
be conducted to identify potential risks or vulnerabilities. Finally, organizations should
ensure all employees know their responsibilities and adhere to security policies.
The policies, procedures, and processes to control and monitor the community’s
regulatory, legal, risk, ecological, and operational requirements are understood and
inform cybersecurity risk management.
Let’s now explore the Azure NIST Identify mapping for governance and Microsoft’s
outlined responsibility classification among Microsoft and customers, which is in line
with the cloud security shared responsibility models.
Figure 3-10 depicts the NIST Identify mapping for governance.
198
Chapter 3 Design and Deploy an Identify Solution
IDENTIFY (ID)
Governance
(ID.GV)
Azure Policy
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 3-3 with respect to ID.GV.
199
Table 3-3. ID.GV Responsibility Matrix
200
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 3
References Responsibility
Governance (ID. ID.GV-1: The NIST SP 800-53 Shared Organizations are responsible As part of Microsoft
GV): Organizational organization Rev. 4 -1 controls for establishing information Azure Compliance,
policies, procedures, establishes an from all families security policies and all Azure assets are
and processes govern information security procedures to manage and subject to the Microsoft
the management of policy. monitor regulatory, legal, Security Policy. Among
cybersecurity risks, risk, environmental, and the items included in
including regulations, operational requirements the policy are the roles
legal requirements, and inform themselves about and requirements of
risk management, cybersecurity risks. applicable personnel,
environmental the scope covering
Design and Deploy an Identify Solution
201
Design and Deploy an Identify Solution
Chapter 3 Design and Deploy an Identify Solution
202
Chapter 3 Design and Deploy an Identify Solution
As a measure of how well security operations can reduce organizational risk, the
incident response directly impacts the mean time to acknowledge (MTTA) and mean
time to remediate (MTTR). For incident response teams to reduce risk, good working
relationships between threat hunters, intelligence, and incident management teams (if
present) are crucial.
In SecOps, the system’s security assurances are maintained and restored when live
adversaries attack it. The NIST CSF describes how to detect, respond, and recover well.
• The SecOps team must detect adversaries in the network, who are
often incentivized to remain hidden, enabling them to achieve their
objectives unhindered. In the enterprise activity logs, this can be
done proactively or in response to an alert of suspicious activity.
The biggest security risk is from human attack operators (of varying skill levels) for
most organizations. Anti-malware products built with signature and machine learning
approaches have significantly reduced the risk of automated/repeated attacks for most
organizations. Despite this, there are notable exceptions, such as WannaCrypt and
NotPetya, which moved faster than these defenses.
Because of their adaptability, human attack operators are challenging to counter
(instead of automated/repeated logic), but they also operate at the same rate of speed as
defenders.
A security operations center (SOC) is crucial in limiting an attacker’s time and access
to valuable systems and data. A malicious attacker can continue conducting attack
operations and gaining access to sensitive systems for as long as they remain in the
environment.
203
Chapter 3 Design and Deploy an Identify Solution
What Is GDPR? Privacy and security laws are stricter in the EU under the GDPR
than elsewhere. Even though it was drafted and passed by the EU, it imposes
obligations on any organization that targets or collects information about European
citizens. GDPR came into effect on May 25, 2018. If a company violates its privacy
and security standards, harsh fines will be imposed, reaching millions.
The GDPR Toolkit is designed to give customers the information they need to
understand their data protection obligations. At the same time, the training and certification
programs offer customers the skills to manage their data effectively in compliance with
the GDPR. The GDPR Advisory Board is there to provide an expert, impartial perspective
on the GDPR. At the same time, the Toolkit and training programs are designed to
ensure customers are fully informed and equipped to comply with the regulations. This
combination of expert insights and practical, hands-on education gives customers the
information and skills they need to manage their data in line with the GDPR properly.
Microsoft has ensured its products and services comply with GDPR standards. It
has implemented various measures, such as data encryption, to protect personal data.
Microsoft has also provided tools to help organizations understand and manage their
data. It has also established a data protection officer role to monitor compliance with
GDPR. Microsoft has also conducted audits to ensure its products and services meet
GDPR requirements. They have also proactively guided customers on how to comply
with GDPR. Finally, Microsoft has set up a GDPR Compliant Center to help customers
with GDPR compliance.
Microsoft also offers a GDPR Assessment Toolkit to help organizations assess and
prepare for GDPR. It has also launched a GDPR Compliance Toolkit to help customers
understand how to manage their data in compliance with the GDPR.
204
Chapter 3 Design and Deploy an Identify Solution
205
Chapter 3 Design and Deploy an Identify Solution
Azure Policy
Azure Policy helps organizations to define and enforce standards and practices at scale.
It enables customers to define policy rules that are applied to Azure resources to ensure
compliance with company standards and service level agreements. It also provides
visibility into their cloud environment and helps to detect and remediate noncompliant
resources. Azure Policy also helps organizations to quickly identify and respond to
security threats in their cloud environment. It helps to enforce security best practices
and ensure that resources are compliant with industry regulations.
Additionally, Azure Policy helps to reduce operational costs and helps organizations
to optimize their cloud usage. Azure Policy helps to automate the process of ensuring
compliance and security, allowing organizations to focus on other tasks and projects. It
also provides organizations with the ability to audit and monitor their cloud resources in
real-time. This visibility into their environment allows organizations to quickly identify
206
Chapter 3 Design and Deploy an Identify Solution
207
Chapter 3 Design and Deploy an Identify Solution
effectiveness of the security controls and recommends any necessary changes. Microsoft
Azure also provides security recommendations to customers based on the assessment.
Customers can use these recommendations to improve the security of their cloud
environment. The evaluation also gives customers visibility into their security posture
and compliance with industry standards. This gives customers confidence that their
cloud environment is secure and compliant. It also allows customers to adjust and
ensure that their security controls are up to date. This helps customers reduce the risk of
a security breach and data loss, as well as protect their and customers’ data. Ultimately,
this allows customers to gain trust and maintain a good reputation.
Let’s now explore the Azure NIST Identify mapping for risk assessment and
Microsoft’s outlined responsibility classification among Microsoft and customers, which
is in line with the cloud security shared responsibility models.
Figure 3-12 depicts the NIST Identify category for risk assessment.
IDENTIFY (ID)
Risk Assessment.
(ID.RA)
Identification and documentation of Information-sharing forums and The threat landscape is identified and In order to determine risk, threats,
asset vulnerabilities sources provide threat and documented, both internally and vulnerabilities, likelihoods, and impacts
vulnerability information externally are taken into account
Vulnerability Assessment
in Azure Security Center Microsoft Threat
Microsoft Sentinel
Modeling Tool Cybersecurity
AD Risk Assessment Operations Services
Microsoft Threat
PAW Management
Azure Monitor
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 3-4 with respect to ID.RA)
208
Table 3-4. ID.RA Responsibility Matrix
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
References Responsibility
Risk ID.RA-1: The NIST SP 800-53 Shared As a customer, you Microsoft Azure documents reflect any
Assessment vulnerability Rev. 4 CA-2, are responsible security issues or vulnerabilities identified
(ID.RA): of assets is CA-7, CA-8, for continuously or remediated as part of continuous
Organizations identified and RA-3, RA-5, analyzing your monitoring. Using the vulnerability
know the documented SA-5, SA-11, system assets (e.g., scanning processes, Microsoft Azure tracks
cybersecurity SI-2, SI-4, SI-5 customer applications, vulnerabilities through closure. In addition
risks to their databases, and to maintaining, securing, managing, and
operations operating systems) storing information system and asset
(including for vulnerabilities. documentation, Microsoft Azure service
mission, It is the customer’s teams also keep a detailed record of
responsibility known vulnerabilities.
Chapter 3
functions,
image, and to document
reputation), vulnerabilities once
assets, and they are identified.
personnel.
(continued)
209
Design and Deploy an Identify Solution
Table 3-4. (continued)
210
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 3
References Responsibility
ID.RA-2: NIST SP 800-53 Shared The National Several external communications, including
Information Rev. 4 PM-15, PM- Vulnerability the United States Computer Emergency
on cyber 16, SI-5 Database (NVD), an Readiness Team (US-CERT) and the
threats and updated database National Information Security Agency
vulnerabilities of vulnerabilities (NVD), provide Microsoft Azure with cyber
is obtained maintained by the threat intelligence and vulnerabilities for all
from National Institute asset types. Microsoft Azure’s Management
information of Standards and Portal or a 24-hour dedicated phone line is
sharing forums Technology (NIST), is available for reporting security incidents at
and sources one example of cyber any time. In addition, Azure disseminates
Design and Deploy an Identify Solution
(continued)
211
Design and Deploy an Identify Solution
Table 3-4. (continued)
212
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 3
References Responsibility
ID.RA-5: NIST SP 800-53 Shared Based on the identified Microsoft Azure determines risk by
A threat’s Rev. 4 RA-2, RA-3, vulnerabilities, periodically assessing its environment
vulnerability, PM-16 threats, and business and updating its policies and procedures.
its likelihood, impacts, the customer This is necessary to ensure compliance
and its impact determines risk. with changing regulations, contractual
are used to requirements, business processes,
determine a technical requirements, and operational
risk’s level requirements. Threats, vulnerabilities,
likelihoods, and impacts influence risk.
These factors include, but are not limited
Design and Deploy an Identify Solution
or risk acceptance.
213
Design and Deploy an Identify Solution
Chapter 3 Design and Deploy an Identify Solution
Qualys Integration with Defender for Cloud Qualys powers the vulnerability
scanner included with Microsoft Defender for Cloud. Qualys’ scanner is one of the
leading tools for the real-time identification of vulnerabilities, and it’s available only
with Microsoft Defender for Servers. You don’t need a Qualys license or even a
Qualys account; everything is handled seamlessly inside Defender for Cloud.
Organizations should also invest in the latest security technologies to protect their
systems from cyber threats and should develop a disaster recovery plan to quickly and
effectively respond to any security incidents.
Microsoft Defender for Cloud’s vulnerability assessment is a security tool that
helps protect your cloud infrastructure from cyber threats. It scans for vulnerabilities
and provides detailed reports so you can identify and fix any potential security issues.
214
Chapter 3 Design and Deploy an Identify Solution
It helps to keep your data safe and secure. It also helps to identify malicious activities
and suspicious behavior on your network. It can be used to monitor and detect any
unauthorized access to your cloud infrastructure.
Figure 3-13 depicts the Microsoft Defender vulnerability management capabilities.
215
Chapter 3 Design and Deploy an Identify Solution
216
Chapter 3 Design and Deploy an Identify Solution
217
Chapter 3 Design and Deploy an Identify Solution
218
Chapter 3 Design and Deploy an Identify Solution
administrators and users. Data about user accounts, such as names, passwords,
telephone numbers, etc., is stored by AD DS and can be accessed by other authorized
users on the same network.
Administrators and users can easily find and use information about network objects
with Active Directory. The directory information is organized logically and hierarchically
based on a structured data store.
Typically, Active Directory objects consist of servers, volumes, printers, and user and
computer accounts that can be shared across networks.
Authentication and access control to Active Directory objects are integrated into
security. Network administrators can manage directory data and organization across
their network with a single network logon, and authorized users can access network
resources anywhere. Even the most complex networks can be managed easily using
policy-based administration.
You can use Windows Server AD DS in your environment by deploying a centralized,
delegated administrative model and enabling SSO. To create an AD DS deployment
strategy that meets your organization’s needs, you must identify the deployment tasks
and the current environment of your organization. Once the tasks and environment
are identified, you can create a customized plan to deploy AD DS successfully. This
plan should include a timeline and steps to ensure a successful deployment. Finally,
the plan should be tested and evaluated before being implemented. After the plan is
implemented, it should be monitored and adjusted as needed. Regular maintenance and
troubleshooting should be completed to ensure continued success. Finally, user training
should be provided to ensure the successful use of the new system.
A scalable, secure, and manageable infrastructure can be created with AD DS in
Windows Server, simplifying user and resource management. Managing your network
infrastructure, including branch offices, Microsoft Exchange Server, and multiple forests,
is possible with AD DS.
The AD DS deployment process involves three phases: the design phase, the
deployment phase, and the operation phase. As part of the design phase, the design
team creates the logical structure for AD DS that best meets the needs of each
department within the organization that will use the directory service. Following
approval of the design, the deployment team tests it in a lab environment and then
implements it in a production environment. The deployment team performs testing
during deployment, which may impact the design phase. Once the deployment is
complete, the operations team maintains the directory service.
219
Chapter 3 Design and Deploy an Identify Solution
Microsoft Sentinel
Microsoft Sentinel is a cloud-native security information and event management
(SIEM) platform from Microsoft. It provides real-time monitoring, threat detection, and
response capabilities. Sentinel enables organizations to quickly detect, investigate and
respond to advanced threats. It uses machine learning to detect organizational threats
and provides visualizations that help analysts quickly prioritize and analyze threats. The
Microsoft Sentinel service is a paid subscription.
Microsoft Sentinel also provides automated response capabilities to help
organizations respond quickly to incidents. Sentinel also offers APIs to integrate with
existing security tools, making it easier to leverage existing investments. It also provides
detailed logging and reporting to help organizations detect emerging threats and
optimize their security posture. Sentinel’s AI-driven analytics engine helps organizations
detect and respond to threats faster and more effectively, reducing the time and effort
required to investigate and respond to incidents. This allows organizations to focus more
on their core competencies and helps ensure their systems’ security.
Microsoft Sentinel’s automated threat detection and response capabilities help
organizations stay ahead of the ever-evolving cyber threats and protect their data and
systems. It also helps organizations improve their visibility into their security posture
and compliance with security regulations. This can save organizations time and money,
as they don’t have to dedicate resources to manual threat detection and response.
Sentinel’s AI-driven security solutions are also highly intuitive and can be quickly
and easily deployed. This helps to reduce the time and costs associated with training
and onboarding, allowing organizations to focus on the more essential aspects of their
security posture. In addition, Sentinel’s AI-driven security solutions are designed to scale
with an organization’s changing needs, providing the flexibility they need to stay ahead
of threats. This allows organizations to quickly adapt to new threats and rapidly respond
to evolving security needs. Sentinel’s AI-driven security solutions are reliable and
cost-effective, making them the perfect choice for any organization looking to protect
its assets.
Connecting your data sources is the first step in onboarding Microsoft Sentinel.
Sentinel provides real-time integration with Microsoft solutions out of the box with
many connectors available. Some of these connectors include the following:
220
Chapter 3 Design and Deploy an Identify Solution
• You can use Microsoft Defender for Cloud, Microsoft Defender for
IoT, as well as Microsoft 365 Defender.
• You can get Azure services such as Azure Active Directory, Azure
Activity, Azure Storage, Azure Key Vault, and Azure Kubernetes.
Using Microsoft Sentinel, you can connect your data sources via common event
format, Syslog, or REST-API, as well as the broader security and application ecosystem.
You can use data connectors to start ingesting data into Microsoft Sentinel once you
have onboarded it into your workspace. You can integrate Microsoft services in real-time
using Microsoft Sentinel’s out-of-the-box connectors. For example, the Microsoft 365
Defender connector integrates data from Office 365, Azure Active Directory (Azure AD),
Microsoft Defender for Identify, and Microsoft Defender for Cloud Apps as a service-to-
service connector.
How to Enable It
You enable Microsoft Sentinel and configure data connectors to monitor and protect
your environment. In addition to connecting your data sources using data connectors,
you can select from a gallery of expertly designed workbooks that surface insights based
on your data. You can easily customize these workbooks according to your needs.
Microsoft products have many connectors, such as the Microsoft 365 Defender
service-to-service connector. You can also set up built-in connectors for non-Microsoft
products, such as Syslog or Common Event Format (CEF).
The Microsoft Sentinel service is a paid service that requires an active Azure
subscription and a Log Analytics workspace. You will need to complete the following
steps in order to turn on Microsoft Sentinel.
4. You can use multiple workspaces for Microsoft Sentinel, but the
data is isolated to one. You can select a workspace to use or create
a new one. Installing Microsoft Sentinel on the default workspaces
created by Microsoft Defender for Cloud is impossible.
221
Chapter 3 Design and Deploy an Identify Solution
• Break: You can analyze the data-flow diagram and find potential
security issues using a threat-modeling framework. The break phase
involves using the data-flow diagram to identify potential threats
against your system. A threat-modeling framework is then used to
find the most common threats and ways to defend against them.
222
Chapter 3 Design and Deploy an Identify Solution
• Fix: You can choose the proper security controls for each issue.
STRIDE threats are mapped to different security controls with
different functions and types, and in this stage, their fate is decided.
• Verify: Verify requirements are met, issues are found, and security
controls are in place. It ensures that assumptions are validated,
requirements are met, and security controls are implemented before
the system is deployed as part of the threat-modeling process.
223
Chapter 3 Design and Deploy an Identify Solution
Azure Monitor
Microsoft Azure Monitor is a comprehensive monitoring service for applications and
infrastructure hosted on the Azure cloud platform. It provides a centralized view of
the performance and health of cloud resources, allowing users to detect and diagnose
performance issues, track changes, and make proactive decisions to optimize the
performance of their applications.
Azure Monitor also provides intelligent analytics and insights to help users
troubleshoot and diagnose problems. It also enables users to set up alerts to be notified
of any changes in resource performance or availability. Azure Monitor also helps users
ensure their applications are secure and compliant with industry standards. It also
provides detailed reports, enabling users to gain insights into their cloud infrastructure
and act accordingly.
Azure Monitor is a powerful tool that can help organizations ensure their
applications’ success. It can help to detect and fix any issues quickly, maximize uptime,
and provide detailed insights for better decision-making.
The Azure Monitor platform includes metrics, logs, traces, and changes based on a
common monitoring data platform.
With Azure Monitor, you can use a common set of tools to analyze data from
multiple resources simultaneously. Some resources may write to other locations before
they are collected into Logs or Metrics, and monitoring data may also be sent to different
locations to support certain scenarios.
Figure 3-14 depicts Azure Monitor.
224
Chapter 3 Design and Deploy an Identify Solution
Azure Monitor also enables users to optimize their cloud resources to reduce costs
and increase efficiency. It also provides detailed cost analysis, allowing users to monitor
and control their cloud spending. Azure Monitor can also detect and alert users of
potential security threats or incidents. It monitors the performance of applications in
real-time and can detect anomalies that might indicate a security breach or malicious
activity. It also provides detailed compliance reports to ensure users meet industry
standards, helping them avoid potential penalties or other repercussions. Finally, Azure
Monitor provides detailed insights into applications’ usage and performance, assisting
users in optimizing their resources and maximizing their cloud efficiency.
As part of your monitoring strategy, you will want to minimize costs. While some
data collection and features in Azure Monitor are free, others are charged based on
their configurations, amount of data collected, or frequency of use. As you plan your
implementation for cost optimization, you should be familiar with Azure Monitor
pricing, as the articles in this scenario identify any recommendations that include a cost.
As part of your monitoring strategy, you should identify the goals and requirements
of your plan before you design and implement a monitoring solution. To maximize the
performance and reliability of your applications, the strategy describes your specific
225
Chapter 3 Design and Deploy an Identify Solution
requirements, the configuration that meets those requirements, and the processes
to leverage the monitoring environment. It would be best to choose Azure Monitor
configuration options consistent with your strategy.
226
Chapter 3 Design and Deploy an Identify Solution
policy definition or initiative to any scope of Azure resources that supports it, including
management groups, subscriptions, resource groups, and individual resources. A
Resource Manager assignment applies to all resources within its scope, and subscopes
can be excluded if necessary.
Azure Policy uses a JSON format to form the logic used to determine whether a
resource is compliant or not. Defining a rule includes metadata and the policy rule.
Functions, parameters, logical operators, conditions, and property aliases can be used
to match precisely the scenario you want. Policy rules determine which resources are
evaluated based on the scope of the assignment.
Summary
In this chapter, you read about methods to design and deploy a strategy for identify
security services in line with the NIST CSF mapping of Azure and in line with Asset
Management (ID.AM), Business Environment (ID.BE), Governance (ID. GV), and Risk
Assessment (ID.RA).
In the next chapter of the book, you will read about designing and deploying a Detect
solution in alignment with the NIST framework.
227
CHAPTER 4
229
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_4
Chapter 4 Design and Deploy a Protect Solution: Part 1
Protect (PR)
Protect (PR)
231
Chapter 4 Design and Deploy a Protect Solution: Part 1
• Single sign-on (SSO): IDM solutions can enable SSO, allowing users
to access multiple applications and systems with a single set of
credentials. Passwords that are reused or weak are less likely to cause
security breaches.
IDM solutions are critical for protecting sensitive information and preventing
unauthorized access to resources within an organization. An IDM solution minimizes
the risk of data breaches and other cyberattacks by ensuring that each user has the
right level of access and permissions and by providing strong authentication and access
control mechanisms.
Methods of Authentication
Authenticating an individual or system before granting access to a resource involves
verifying their identify. Authentication mechanisms include passwords, biometric
factors such as fingerprints or facial recognition, smart cards, and digital certificates.
Authentication is a critical component of IT security because it helps ensure that
only authorized users are granted access to sensitive information and resources while
minimizing the risk of unauthorized access and data breaches. Authentication is
verifying the identify of a user, device, or system attempting to access a resource, such
as an application, network, or data. Authentication is critical to cybersecurity because
it ensures that only authorized users are granted access to sensitive information or
resources while minimizing the risk of unauthorized access and data breaches. The
following are the various method of authentication that exist:
234
Chapter 4 Design and Deploy a Protect Solution: Part 1
235
Chapter 4 Design and Deploy a Protect Solution: Part 1
will help you organize them logically. Maintain a continuously updated asset inventory
for your security organization. By aggregating security insights and risks centrally, you
can ensure your security organization can monitor risks to cloud assets.
Audit and restrict user access to cloud services to ensure only approved cloud
services can be used. Maintain security attributes and configurations of assets
throughout their life cycles.
Your cloud assets should be protected from accidental or malicious modifications
by limiting access to asset management features. Create an allow list and block
unauthorized software from executing in your environment by ensuring that only
authorized software is executed.
We’ll now explore the Azure NIST identify mapping for asset management and
Microsoft’s outlined responsibility classification among Microsoft and customers, which
is with inline cloud security shared responsibility models.
Figure 4-3 depicts the subcategories of Azure mapping against the Protect module of
the NIST CSF.
Identify Management,
Authentication and
Access Control (PR.AC)
Just Enough
Azure AD PAW* Conditional Access ESAE
Administration
Azure AD
Azure IoT DIAD* ESAE
Application Proxy
Figure 4-3. NIST PR.AC subcategories mapping with Azure protect capabilities
As part of the Azure Cloud shared responsibility model, the NIST CSF security
functions are provided in Table 4-1 with respect to PR.AC.
236
Table 4-1. PR.AC Management Responsibility Matrix
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
References Responsibility
Physical and PR.AC-1: The NIST SP 800-53 Shared The customer is As part of Microsoft Azure, Active Directory
logical assets issuance, Rev. 4 AC-2, IA responsible for manages, issues, revokes, and audits identities
are protected management, Family properly identifying and credentials for authorized devices, users,
using identify revocation, and authenticating and processes.
management and auditing users for authorized
and access of identities devices, users, and
control (PR. and credentials processes.
AC) to limit for authorized
access to devices, users,
Chapter 4
237
Design and Deploy a Protect Solution: Part 1
Table 4-1. (continued)
238
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 4
References Responsibility
PR.AC-2: NIST SP 800-53 Microsoft Azure N/A Physical security perimeters are used to
Managed and Rev. 4 PE-2, manage and control physical access to assets
protected PE-3, PE-4, in Microsoft Azure. Microsoft data centers
physical access PE-5, PE-6, are certified by SSAE16/ISAE 3402 and ISO
to assets. PE-9 27001. Microsoft data centers are physically
constructed, managed, and monitored 24 hours
a day in nondescript buildings to protect data
and services from unauthorized access and
environmental threats. Pre-approved deliveries
are received in a secure loading bay and
monitored by authorized personnel. Badge-
Design and Deploy a Protect Solution: Part 1
management AC-19, AC-20 tenant storage is for remote access to the Microsoft intranet.
system is in the responsibility of Microsoft Azure users must follow the standard
place. the customer. operating procedure for remote access. With
Microsoft Azure, two-factor authentication,
security groups, access control certificates, and
limited entry points for Microsoft employees
are enforced for remote connections to the
information system. The defined security
groups implement usage restrictions.
(continued)
239
Design and Deploy a Protect Solution: Part 1
Table 4-1. (continued)
240
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 4
References Responsibility
PR.AC-4: NIST SP 800-53 Shared The customer Microsoft Azure’s access permissions and
Incorporating Rev. 4 AC-2, ensures segregation authorization management incorporate the
least privilege AC-3, AC-5, AC- of duties and least privilege principles and duties separation.
and separation 6, AC-16 least privilege Microsoft Azure operations teams are
of duties into the by providing segregated and defined with different levels
management appropriate access of access and privileges determined by asset
of access levels for each user owners/custodians.
permissions and based on their job
authorizations. function.
PR.AC-5: NIST SP 800-53 Shared Application hosting Microsoft Azure employs multiple levels
Protecting Rev. 4 AC-4, in Microsoft Azure of network segregation to protect network
Design and Deploy a Protect Solution: Part 1
241
Design and Deploy a Protect Solution: Part 1
Chapter 4 Design and Deploy a Protect Solution: Part 1
Azure AD
Azure AD is a cloud-based identify and access management service from Microsoft. It
enables organizations to securely manage user access to applications, resources, and
networks in the cloud and on the premises. It also provides single sign-on to thousands
of SaaS applications. Azure AD helps streamline user authentication and authorization
process, making it easier for organizations to manage user access. It also provides
features such as multifactor authentication, identify protection, and Conditional Access
to applications and resources, making it more secure than traditional user management
solutions.
Azure AD also supports self-service password reset and single sign-on, allowing
users to access applications with fewer steps. It is also highly scalable and can
be integrated with existing authentication systems, making it an ideal choice for
organizations of any size. Azure AD also provides access control and security features,
such as multifactor authentication, data encryption, and user behavior monitoring. It
is also easy to set up and manage, making it an excellent solution for small businesses.
Furthermore, Azure AD is highly cost-effective, with no additional costs associated with
setup and maintenance. It also offers a variety of support options to customers, such as
online tutorials, technical support, and community forums.
Azure AD offers several capabilities to help organizations protect their identities and
resources, including the following:
• Identify and access management: Azure AD provides a secure and
scalable way to manage identities and access to resources in the
cloud and on-premises.
• SSO: Azure AD allows users to sign in once and access all the cloud
and on-premises applications they are authorized to use.
• MFA: Azure AD offers MFA to enhance security by requiring users
to provide an additional form of authentication before accessing
resources.
• Application management: Azure AD offers a centralized application
management solution that enables administrators to manage and
secure access to all the applications used within an organization.
• Conditional Access: Azure AD allows administrators to define policies
that control resource access based on various conditions, such as
location, device, user, and risk.
242
Chapter 4 Design and Deploy a Protect Solution: Part 1
The NIST CSF Protect function also provides a framework for identifying, assessing,
and managing cybersecurity risks to protect against unauthorized access, theft,
and destruction of assets. It includes guidelines for implementing access controls,
monitoring activities, and detecting and responding to cybersecurity incidents.
How It Works
Azure AD is a Microsoft cloud-based identify and access management (IAM) solution.
It provides a way to manage identities and access to resources in the cloud and on-
premises. Here is a high-level overview of how Azure AD works:
243
Chapter 4 Design and Deploy a Protect Solution: Part 1
244
Chapter 4 Design and Deploy a Protect Solution: Part 1
Design Considerations
Here are the design considerations:
How To Enable It
Azure AD includes several features and capabilities that align with the NIST CSF Protect
function. To use Azure AD, you will need the following prerequisites to deploy:
• User accounts: To use Azure AD, you will need user accounts that can
be used to authenticate and access resources. You can create new
user accounts in Azure AD or synchronize existing accounts from an
on-premises Active Directory using Azure AD Connect.
246
Chapter 4 Design and Deploy a Protect Solution: Part 1
By meeting these prerequisites, you can set up and use Azure AD to manage
identities and access to resources in the cloud and on-premises.
247
Chapter 4 Design and Deploy a Protect Solution: Part 1
Azure IoT
Azure IoT is a cloud-based platform provided by Microsoft for building, deploying,
and managing Internet of Things (IoT) solutions. It provides a wide range of tools
and services that help organizations securely connect, monitor, and manage their IoT
248
Chapter 4 Design and Deploy a Protect Solution: Part 1
devices, and analyze data generated by these devices. Azure IoT enables organizations
to collect data from a variety of sources such as sensors, devices, and applications, and
then use this data to gain insights, improve operational efficiency, and make informed
business decisions. The following are some of the key features and capabilities of
Azure IoT:
• Security: Among the robust security features in Azure IoT are role-
based access control, secure device connectivity, and encryption of
data in transit and at rest.
Azure IoT provides several features and capabilities that align with the NIST CSF
Protect function. Here are some of the ways Azure IoT supports the NIST CSF Protect
function:
249
Chapter 4 Design and Deploy a Protect Solution: Part 1
• Compliance: With Azure IoT, you can audit, report, and enforce
policies that support compliance with regulatory and industry
standards, such as GDPR, HIPAA, and FedRAMP.
Organizations can better protect their IoT resources and comply with NIST CSF
Protect function by leveraging Azure IoT’s device management, authentication and
authorization, data encryption, threat detection and prevention, and compliance
features.
Design Considerations
Here are some design considerations:
• Use Azure IoT Hub: Azure IoT Hub is a cloud service that enables
bidirectional communication between IoT devices and the cloud.
It provides device management, data routing, and device-to-cloud
telemetry features. Using Azure IoT Hub can help you manage your
IoT solution more efficiently and securely.
250
Chapter 4 Design and Deploy a Protect Solution: Part 1
• Monitor your IoT solution: Monitoring your IoT solution can help you
identify and resolve issues quickly. Azure provides monitoring and
diagnostic tools such as Azure Monitor and Azure Log Analytics that
can help you monitor your IoT solution and gain insights into device
behavior.
By following these design best practices, you can design an Azure IoT solution that is
secure, scalable, and efficient.
How To Enable It
Deploying an Azure IoT solution involves several steps, including setting up the IoT
hub, registering devices, configuring security, and processing data. Here is a high-level
overview of the steps involved in deploying an Azure IoT solution:
2. Register devices: Once the IoT Hub is set up, you can register IoT
devices with the hub. This involves creating a device identify
within the IoT Hub and configuring the device to connect to
the hub.
251
Chapter 4 Design and Deploy a Protect Solution: Part 1
Azure IOT Subscription Types You can choose from several Azure IoT
subscription types depending on your specific needs. Here are some of the main
subscription types:
Free: The free subscription is a basic plan that allows you to experiment with Azure
IoT services. You can connect up to five devices to IoT Hub and send up to 8,000
messages daily.
Using the basic tier, you can communicate unidirectionally with the cloud, while
using the standard tier, you can communicate bidirectionally with the cloud.
Basic 1 and Standard tier 1: The basic subscription is a paid plan that offers more
features and capacity than the free subscription. It allows you to send up to 400,000
messages daily.
Basic 2 and Standard tier 2: The subscription is a more advanced paid plan
offering additional features and capacity. It allows you to send up to 6 million
messages daily.
Basic 3 and Standard tier 3: The subscription is for high deployment plan offering
sophisticated features and capacity. It allows you to send up to 30 million
messages daily.
Each subscription type has different pricing and features, so evaluating your specific
needs and choosing the type that best meets your requirements is important.
252
Chapter 4 Design and Deploy a Protect Solution: Part 1
Conditional Access
An organization’s security perimeter now includes user and device identify, and
access control decisions can be based on identify-driven signals. As part of the new
identify-driven control plane, Azure AD Conditional Access brings signals together to
make decisions and enforce organizational policies. When using a Conditional Access
policy, the user must complete an action if the end users want to access a resource. For
instance, if a payroll manager wants to access the payroll application, the manager must
do multifactor authentication.
A primary goal for administrators is to enhance productivity wherever and whenever
users need it and ensure the security of the organization’s assets.
When necessary, implement Conditional Access policies to protect your
organization’s resources from cyberattacks. Azure AD uses various signals to determine
whether an access request is authorized. Here are some of the common signals that
Azure AD uses:
By analyzing these signals and applying the access policies set by the organization,
Azure AD can help ensure that only authorized users with trusted devices and locations
can access organizational resources.
Azure AD Conditional Access allows administrators to enforce organizational
policies and security requirements on users accessing Azure resources. With Azure AD
Conditional Access, administrators can create policies requiring users to meet certain
conditions, such as using multifactor authentication or being on a trusted network,
before accessing certain resources. This helps ensure that only authorized users can
access sensitive data and applications, reducing the risk of unauthorized access and data
breaches.
For example, an administrator could create a policy that requires all users attempting
to access a specific application to use multifactor authentication, and only allow access
from trusted locations. If a user attempts to access the application without meeting these
conditions, they will be denied access. Azure AD Conditional Access can be used to
protect various Azure resources, including Azure Active Directory, Azure Portal, Azure
AD-connected apps, and other cloud services.
These are key benefits of Azure Conditional Access:
Azure AD Conditional Access maps to several categories of the NIST CSF Protect
function, which focuses on safeguarding data, systems, and assets against potential
cyber threats.
• Identify management and access control: Azure AD Conditional
Access helps organizations implement strong access controls to
prevent unauthorized access to systems and data. Organizations
254
Chapter 4 Design and Deploy a Protect Solution: Part 1
255
Chapter 4 Design and Deploy a Protect Solution: Part 1
There are several key security design best practices for Azure AD Conditional Access
that organizations should consider.
256
Chapter 4 Design and Deploy a Protect Solution: Part 1
By following these best practices, organizations can help ensure that Azure AD
Conditional Access is implemented in a way that effectively protects their Azure
resources from cybersecurity attacks.
How To Enable It
To achieve your organization’s application and resource access NIST CSF protect
strategy, you must carefully plan your Azure AD Conditional Access deployment. Azure
AD Conditional Access policies provide great configuration flexibility, but you must plan
carefully to prevent undesirable outcomes.
Conditions for accessing resources in Azure AD are automated based on user, device,
and location signals. Organizations can use Azure AD Conditional Access policies to
create security controls that block access, require MFA, or restrict user sessions when
needed and stay out of the user’s way when not.
257
Chapter 4 Design and Deploy a Protect Solution: Part 1
7. Enforce the policies: Once the policies have been tested and
validated, organizations can enforce them to help protect their
resources.
258
Chapter 4 Design and Deploy a Protect Solution: Part 1
It’s important to note that the Azure AD Conditional Access deployment process can
vary depending on an organization’s specific requirements and use cases.
259
Chapter 4 Design and Deploy a Protect Solution: Part 1
It’s important to note that Azure AD Conditional Access policies can also be applied to
specific applications or services, which may have their own licensing requirements.
In summary, the license requirements for Azure AD Conditional Access depend
on the edition of Azure AD that an organization has. While some basic Azure AD
Conditional Access policies are available in Azure AD Free, more advanced policies
require a higher edition of Azure AD, such as Azure AD Premium P1 or P2.
Azure AD Application Proxy maps to several functions within the NIST CSF Protect
category, which focuses on implementing safeguards to ensure the delivery of critical
infrastructure services. Here are a few ways Azure AD Application Proxy can support the
Protect category:
262
Chapter 4 Design and Deploy a Protect Solution: Part 1
How It Works
Here are the steps:
263
Chapter 4 Design and Deploy a Protect Solution: Part 1
The following are the key security design best practices for Azure AD
Application Proxy:
By following these best practices, organizations can help ensure that Azure AD
Application Proxy is configured securely and provides a strong layer of protection for
on-premises applications.
264
Chapter 4 Design and Deploy a Protect Solution: Part 1
How To Enable It
Azure AD Application Proxy allows you to publish applications, such as SharePoint sites,
Outlook Web Access, and IIS-based apps, within your private network while providing
secure access to users outside your network through Microsoft Azure Active Directory
Application Proxy. Your employees can access your apps from home using their own
devices and authenticate using this cloud-based proxy. Connectors are slim Windows
services that install inside your networks. They maintain outbound connections from
within your networks to the proxy services. When users access published applications,
these connections are used to provide access.
Here are some deployment considerations for Azure AD Application Proxy:
• User and group management: Define who can access the applications
published through Azure AD Application Proxy by configuring user
and group assignments in Azure AD. You can also use Conditional
Access policies to restrict access based on device, location, or other
factors.
265
Chapter 4 Design and Deploy a Protect Solution: Part 1
To deploy Azure AD’s Application Proxy, you can follow these steps:
4. Click the Enable Application Proxy button at the top of the page.
266
Chapter 4 Design and Deploy a Protect Solution: Part 1
9. After the application is published, you can test the remote access
by opening a browser and entering the external URL.
267
Chapter 4 Design and Deploy a Protect Solution: Part 1
JEA is a powerful tool for managing access to critical systems and ensuring that
administrative privileges are granted only to those who need them. It is beneficial
in environments where multiple users require access to administrative tasks, but
granting full administrative access is not practical or desirable. JEA is important from a
cybersecurity standpoint because it provides a way to limit administrative privileges and
reduce the risk of unauthorized access or malicious activities.
Here are some of the reasons why JEA is essential for cybersecurity:
268
Chapter 4 Design and Deploy a Protect Solution: Part 1
The Protect function of the NIST CSF includes implementing safeguards to ensure
the delivery of critical infrastructure services. JEA helps organizations achieve this by
implementing a least-privilege access model. Here’s how:
The following are the essential key design security best practices for JEA:
By implementing these security best practices, organizations can help ensure the
security and integrity of their JEA environment and reduce the risk of unauthorized
access or misuse of administrative privileges.
How To Enable It
The Just Enough Administration feature in PowerShell 5.0 and higher allows
nonadministrators limited access to execute the commands, scripts, and executables
required for discovery. Microsoft JEA improves security by limiting nonadministrators
access to discovery commands, scripts, and executables. By doing so, MID servers can
collect information on Windows machines without needing full administrator privileges.
Microsoft JEA provides role-based administration through PowerShell Remoting,
which manages communication and authentication using Windows Remote
Management (WinRM). As a result of this framework, computers using the HTTP
protocol can be managed securely and reliably. PowerShell Remoting uses two total
ports (5985, 5986) for HTTP and HTTPS, which are easier to secure than multiple ports
used in dynamic port mapping in WMI.
Here are the steps to enable JEA:
1. Install the JEA toolkit: Install the JEA toolkit on the target server(s)
using PowerShell. You can download the toolkit from the
PowerShell Gallery using the following command:
270
Chapter 4 Design and Deploy a Protect Solution: Part 1
By following these steps, you can enable JEA and provide users with secure, role-
based access to administrative tasks on your server(s).
What Does JEA Work On? JEA provides RBAC functionality through Windows
PowerShell remote access for Windows Servers and Windows client operating
systems. You use Windows PowerShell remoting when you start a Windows
PowerShell remote session on one computer and then execute tasks on another.
JEA works on any Windows Server 2016 or later operating system and Windows
10 or later.
271
Chapter 4 Design and Deploy a Protect Solution: Part 1
• Alarms and sensors: Installing alarms and sensors to detect and alert
security personnel of unauthorized access attempts or suspicious
activity
• Physical security audits: Conduct regular physical security audits
to identify potential vulnerabilities in the system and address them
before they are exploited
272
Chapter 4 Design and Deploy a Protect Solution: Part 1
273
Chapter 4 Design and Deploy a Protect Solution: Part 1
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 4-2 with respect to PR.AT.
274
Table 4-2. PR.AT Management Responsibility Matrix
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
References Responsibility
Awareness and PR.AT-1: Training NIST SP 800-53 Shared Following the job Staff members at Microsoft
Training (PR.AT): and information Rev. 4 AT-2, descriptions, the customer participate in Microsoft
The personnel are provided to PM-13 is responsible for training Azure-sponsored security
and partners are all users. its employees and vendors, training programs and receive
properly trained including basic security periodic security awareness
to perform their awareness training and updates to ensure all users are
information role-based training, as informed and trained. As part
security-related necessary. of Microsoft’s ongoing security
duties and education program, employees
Chapter 4
275
Design and Deploy a Protect Solution: Part 1
Table 4-2. (continued)
276
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 4
References Responsibility
PR.AT-2: Privileged NIST SP 800- Shared Training is the customer’s All Microsoft Azure privileged
users understand 53 Rev. 4 AT-3, responsibility for privileged users follow a role-based
their roles and PM-13 users, including basic training program to ensure
responsibilities. awareness training they understand their roles
and role-based training and responsibilities. It is
as appropriate per job a mandatory security and
description. awareness training program
for Microsoft Azure that assists
individuals in gaining a better
understanding of security
processes and procedures
Design and Deploy a Protect Solution: Part 1
277
Design and Deploy a Protect Solution: Part 1
Chapter 4 Design and Deploy a Protect Solution: Part 1
The learning path consists of a series of video lectures, articles, and quizzes and is
designed to be self-paced, allowing individuals to learn at their own pace. The program
is free on the Microsoft Learn website and is aimed at a broad audience, including
individuals, small business owners, and employees of larger organizations. See the
following sites:
https://www.microsoft.com/en-ww/security/business/security-101/what-is-
cybersecurity?rtc=1
278
Chapter 4 Design and Deploy a Protect Solution: Part 1
https://learn.microsoft.com/en-gb/users/gitasharmasheher-3612/
collections/yrrbdgy2d6158?source=docs&culture=en-us&country=us
The learning program is a valuable resource for anyone looking to improve their
knowledge and skills in cybersecurity. By educating individuals on basic security
principles and best practices, Microsoft is helping to create a culture of cybersecurity
awareness and promoting a safer digital environment for everyone.
Summary
In this chapter, you read about designing and deploying a strategy for protecting security
services in line with the NIST CSF mapping of Azure services including PR.AC: Identify
Management, Authentication and Access Control, and PR.AT: Awareness and Training.
In the next chapter, you will read about the next part of designing and deploying a
strategy for protecting security services.
279
CHAPTER 5
Data Security
Data security in terms of cybersecurity refers to protecting sensitive digital information
from unauthorized access, theft, destruction, and alteration. It involves implementing
various security measures to ensure that data is kept safe and secure from external
threats, such as hackers, cybercriminals, and other malicious actors. The data can
include sensitive personal data, financial information, and proprietary business data.
281
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_5
Chapter 5 Design and Deploy a Protect Solution: Part 2
Data security involves various practices and technologies to prevent and mitigate cyber
threats. The following are some of the essential practices and technologies used in data
security:
• Security audits and updates: Regular security audits and updates are
essential to ensure that data security measures are effective and up-
to-date and to identify and address potential vulnerabilities before
cybercriminals can exploit them.
282
Chapter 5 Design and Deploy a Protect Solution: Part 2
283
Chapter 5 Design and Deploy a Protect Solution: Part 2
Detect (DE)
By leveraging these and other security features offered by Azure, you can help ensure
that your data is protected from unauthorized access, theft, and other threats while
meeting NIST guidelines for data security. Figure 5-2 maps PR.DS to Azure features.
PR.DS-7:
PR.DS-5: Production
PR.DS-1: PR.DS-2: Implement environment(s)
Protects data Protecting data leak are separate
at rest. data in transit prevention from
measures development
environment(s)
Microsoft
Azure Disk Azure VPN Purview Data
encryption gateway segregation
DLP
Azure Storage
Azure Site to
Service
Site VPN
Encryption
Azure
Azure
Information
ExpressRoute
Protection
Azure backup
Azure WAF
Encryption
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 5-1 with respect to PR.DS.
285
Table 5-1. PR.DS Management Responsibility Matrix
286
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 5
References Responsibility
Data Security PR.DS-1: NIST SP 800-53 Shared Microsoft Azure Microsoft Azure protects data at
(PR.DS): Protects data Rev. 4 SC-28 provides the rest, but the customer must ensure
Information and at rest. technology to use encryption and data protection
records (data) Azure Storage Account safeguards.
are managed Keys (SAKs) to
consistent with protect data at rest,
the organization’s but the customer is
risk strategy responsible for using
to protect the those methods.
confidentiality,
integrity, and
Design and Deploy a Protect Solution: Part 2
availability of
information.
PR.DS-4: NIST SP 800-53 Shared Applications and For Microsoft Azure to ensure
Ensuring Rev. 4 AU-4, tenant environments availability, capacity planning is
availability CP-2, SC-5 are monitored and conducted. Capacity planning
through planned by the involves determining the system’s
adequate customer. size, performance, and resilience.
capacity. As well as how security controls
influence Azure’s performance,
these elements also support
data availability and continuity
objectives as part of the overall
security functionality of the system.
(continued)
287
Design and Deploy a Protect Solution: Part 2
Table 5-1. (continued)
288
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 5
References Responsibility
PR.DS-5: NIST SP 800-53 Shared Controlling information The Microsoft Azure network is
Implement data Rev. 4 AC-4, flow into and out protected from data leaks by
leak prevention AC-5, AC-6, of the customer’s implementing technical controls.
measures. PE-19, PS-3, information system Networks are segregated through
PS-6, SC-7, is the customer’s VLANs in Microsoft Azure, and
SC-8, SC-13, responsibility. access to the Microsoft Azure
SC-31, SI-4 network from other internal
Microsoft networks and the Internet
is strictly controlled. Access Control
Lists (ACLs) strictly control access
to the Microsoft Azure network.
Design and Deploy a Protect Solution: Part 2
PR.DS-6: NIST SP 800-53 Microsoft Azure N/A The change and release
Software, Rev. 4 SI-7 management process of Microsoft
firmware, and Azure thoroughly reviews software
information updates for unauthorized changes
integrity are before they enter production
verified using environments. Code changes must
integrity- be reviewed and approved before
checking being deployed to the environment.
mechanisms. If the integrity verification fails,
deployment fails, and the process
restarts.
As part of Microsoft Azure’s
Chapter 5
289
Design and Deploy a Protect Solution: Part 2
(continued)
Table 5-1. (continued)
290
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 5
References Responsibility
Azure offers several options for protecting data at rest. When data is at rest, it is
stored in a storage medium, such as a disk or a database, and is not actively being
processed or transmitted. Here are some ways that Azure helps protect your data at rest:
By leveraging these features and services, you can ensure that your data is protected
at rest, even if it is stored on a disk or in a database. Azure’s security features also help
you meet regulatory compliance requirements and protect your data from unauthorized
access, theft, and other threats.
Azure provides several solutions for protecting data in transit, which refers to data
actively being transmitted between systems or applications. Here are some ways that
Azure helps protect your data in transit:
• Azure Front Door: Azure Front Door is a global service that provides
load balancing and application delivery. Azure Front Door provides
SSL/TLS termination for web traffic, which means that traffic
between clients and Azure Front Door is encrypted using SSL/TLS.
By leveraging these features and services, you can protect your data in transit
between systems and applications. Azure’s security features also help you meet
regulatory compliance requirements and protect your data from unauthorized access,
theft, and other threats.
Azure offers a data loss prevention (DLP) solution to help you identify, monitor,
and protect sensitive information across your organization. Here are some features and
capabilities of Azure DLP:
292
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Integration with Azure services: Azure DLP can integrate with Azure
services, such as Azure Information Protection and Azure Active
Directory, to provide additional protection for sensitive data.
By leveraging Azure DLP, you can help protect sensitive information and comply
with regulatory requirements. Azure DLP can be used to protect data in Azure services,
on-premises, and in other cloud services.
293
Chapter 5 Design and Deploy a Protect Solution: Part 2
When you enable disk encryption on an Azure virtual machine, the data on the
virtual machine disks is encrypted before storing it in Azure storage. This helps ensure
that even if someone gains unauthorized access to your virtual machine, they cannot
read the data on the disks.
Azure Disk Encryption uses the industry-standard BitLocker encryption technology
to encrypt the disks. BitLocker is a full-disk encryption feature available in Windows
operating systems, and it encrypts data at rest, helping to protect the confidentiality and
integrity of the data. Azure Disk Encryption also allows you to bring your own encryption
keys to encrypt the virtual machine disks. This helps you control your encryption
keys and ensures only authorized users can access the data. Azure Disk Encryption
is a security feature in Microsoft Azure that helps protect your virtual machines by
encrypting the data on their disks. It provides encryption of both the operating system
disk and the data disk, ensuring that sensitive data is protected.
294
Chapter 5 Design and Deploy a Protect Solution: Part 2
295
Chapter 5 Design and Deploy a Protect Solution: Part 2
Azure Disk Encryption also supports using customer-managed keys, which allows
you to bring your own encryption keys to encrypt the virtual machine disks. You can use
either the AES-128 or AES-256 encryption algorithm when using customer-managed
keys. The choice between AES-128 and AES-256 depends on your specific security
requirements. AES-256 provides a higher level of security because it uses a larger key
size than AES-128. However, AES-256 requires more processing power to encrypt and
decrypt data, which can affect performance. In general, both AES-128 and AES-256 are
considered robust encryption algorithms that provide a high level of security.
How It Works
Azure Disk Encryption encrypts the data on the disks of your virtual machines in
several steps:
296
Chapter 5 Design and Deploy a Protect Solution: Part 2
Design Considerations
Here are some design security best practices for using Azure Disk Encryption from a
NIST Protect standpoint:
• Limit access: Limit access to Azure Disk Encryption keys to only those
who need access. Follow the principle of least privilege and grant
access only to those who require it for their job duties.
297
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Use secure key management: Use Azure Key Vault to store and
manage your encryption keys. Use access policies and RBAC to
control who can manage the keys.
• Monitor and log key usage: Monitor and log key usage to detect
unauthorized access or usage of your encryption keys.
Please note that these are general security best practices, and specific requirements
may vary depending on your organization’s security policies and regulatory
requirements.
298
Chapter 5 Design and Deploy a Protect Solution: Part 2
How to Enable It
Before you can enable Azure Disk Encryption for your virtual machines, you need to
ensure that your environment meets the following prerequisites:
Please note that the prerequisites may vary depending on your specific scenario, so
it’s recommended to refer to the Azure documentation for detailed guidance on enabling
encryption for your virtual machines.
299
Chapter 5 Design and Deploy a Protect Solution: Part 2
To turn on Azure Disk Encryption for your virtual machines, you can follow these
general steps:
Please note that the steps for enabling Azure Disk Encryption may vary depending
on your specific scenario, so it’s recommended to refer to the Azure documentation for
detailed guidance on enabling encryption for your virtual machines.
300
Chapter 5 Design and Deploy a Protect Solution: Part 2
301
Chapter 5 Design and Deploy a Protect Solution: Part 2
How It Works
Azure Storage Service Encryption works by encrypting data at rest in Azure storage
accounts. When you enable Azure Storage Service Encryption for a storage account, all
data written to that storage account is encrypted with Advanced Encryption Standard
(AES) 256-bit encryption. The encryption and decryption of data are done automatically
and seamlessly, so there is no noticeable impact on performance.
Microsoft manages the encryption keys used by Azure Storage Service Encryption,
and the keys are automatically rotated at regular intervals to ensure maximum security.
The keys are stored in Azure Key Vault, a secure key management service that allows
you to manage and control access to keys used by Azure services. When you read data
from an Azure storage account with Azure Storage Service Encryption enabled, the data
302
Chapter 5 Design and Deploy a Protect Solution: Part 2
is automatically decrypted using the encryption key. The decryption process is also
seamless and transparent to the user, so there is no need to change your application or
data access patterns.
Azure Storage Service Encryption is available for Azure Blob storage, Azure Files, and
Azure Queue storage. You can enable it through the Azure Portal, Azure CLI, or Azure
PowerShell.
Design Considerations
The following are the key design security best practices for Azure Storage Service
Encryption:
• Use Azure Key Vault for key management: Use Azure Key Vault to
manage and store your encryption keys. This allows you to control
access to the keys and ensure they are secure.
• Use managed disks for virtual machines: If you use virtual machines
in Azure, use managed disks instead of unmanaged ones. Managed
disks are automatically encrypted with Azure Storage Service
Encryption.
• Use Azure Blob storage for large files: If you need to store large files,
such as media files, use Azure Blob storage. Azure Blob storage
supports client-side encryption, which allows you to encrypt data
before it is sent to Azure.
How to Enable It
Azure Storage Service Encryption is a feature that provides encryption of data at rest
for Azure Blob storage, Azure Files, and Azure Queue storage. It is designed to help
protect against unauthorized access to data by providing data encryption at the storage
level. When enabled, Azure Storage Service Encryption encrypts all new data written to
the storage account and any existing data that is modified or overwritten. A Microsoft-
managed encryption key encrypts and decrypts the data automatically when accessed.
This provides a seamless way to encrypt data without requiring changes to applications
or data access patterns. Azure Storage Service Encryption uses Advanced Encryption
Standard (AES) 256-bit encryption to encrypt the data. AES is a widely used and trusted
encryption algorithm, and a key size of 256 bits provides high security.
To enable Azure Storage Service Encryption, you need to enable the feature in the
Azure Portal, Azure CLI, or Azure PowerShell. Once enabled, all data stored in the
storage account is automatically encrypted at rest. Azure Storage Service Encryption
can help organizations meet compliance requirements, such as those requiring data
encryption at rest. It also provides an additional layer of security to help protect against
unauthorized access to data and can help reduce the risk of data breaches. It’s important
to note that Azure Storage Service Encryption encrypts only data at rest and does
not provide encryption of data in transit. To encrypt data in transit, you should use a
protocol such as HTTPS or SSL/TLS. Additionally, Azure Storage Service Encryption
does not protect against unauthorized access to data by users with valid credentials, so
it’s important to follow security best practices for access control and authentication.
The following are some prerequisites that must be met before you can enable Azure
Storage Service Encryption:
304
Chapter 5 Design and Deploy a Protect Solution: Part 2
You can successfully enable Azure Storage Service Encryption for your storage
accounts by ensuring that these prerequisites are met.
You can turn on Azure Storage Service Encryption for a storage account using the
Azure Portal, Azure PowerShell, or Azure CLI.
Here are the general steps using Azure Portal:
1. Sign in to the Azure Portal and navigate to the storage account you
want to enable encryption for.
305
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Integration: Azure Key Vault integrates with other Azure services such
as Azure Virtual Machines, Azure App Service, and Azure Functions,
making it easy to secure and manage your applications and services
across your Azure environment.
307
Chapter 5 Design and Deploy a Protect Solution: Part 2
• High availability and disaster recovery: Azure Key Vault provides high
availability and disaster recovery options to ensure your keys and
secrets are always available when needed. It also includes backup
and restore capabilities to protect against data loss.
How to Enable It
Azure Key Vault provides a secure and central repository for storing and managing
cryptographic keys, certificates, and secrets used to secure applications and services in
the cloud.
In the real world, developers, IT professionals, and security teams can use Azure Key
Vault to manage cryptographic keys and secrets to protect sensitive data and resources.
For example, a development team might use Azure Key Vault to store and manage
encryption keys that are used to encrypt and decrypt data at rest in a cloud-based
application.
Azure Key Vault can also manage SSL/TLS certificates to secure websites and other
services. In this case, the certificates can be stored in Azure Key Vault and automatically
renewed, eliminating the need for manual certificate management. Another common
use case for Azure Key Vault is storing API keys and other secrets used to access third-
party services, such as authentication or payment APIs. By using Azure Key Vault to
store and manage these secrets, you can reduce the risk of accidentally exposing them in
source code or configuration files.
The following are some prerequisites for using Azure Key Vault:
308
Chapter 5 Design and Deploy a Protect Solution: Part 2
These prerequisites provide the foundation for creating and managing Azure Key
Vault instances and ensuring their security and integrity.
Azure Key Vault is a fully managed service in Azure, so you do not need to turn it
on. However, to start using Azure Key Vault, you must create a Key Vault instance and
configure access policies and authentication settings.
Here are the high-level steps to create an Azure Key Vault instance:
3. Search for Key Vault in the search bar and select Key Vault from
the results.
4. Click Create.
7. Configure the access policies to define who can access the keys,
certificates, and secrets in the Key Vault instance.
309
Chapter 5 Design and Deploy a Protect Solution: Part 2
Once the Key Vault instance is created, you can use the Azure Key Vault APIs or
Azure Key Vault cmdlets to manage keys, certificates, and secrets in the Key Vault
instance.
310
Chapter 5 Design and Deploy a Protect Solution: Part 2
documents and emails based on the content, such as the sensitivity of the information or
the regulatory requirements, and automatically apply encryption, watermarks, and other
protection measures to those documents and emails. AIP also integrates with Microsoft
Cloud App Security, allowing organizations to extend their protection policies to cloud
services, such as OneDrive, SharePoint, and Exchange Online.
In summary, Azure Information Protection helps organizations do the following:
311
Chapter 5 Design and Deploy a Protect Solution: Part 2
To manage and reduce cybersecurity risk, organizations can use the NIST CSF. The
Protect function within the NIST CSF focuses on implementing safeguards to ensure
delivery of critical infrastructure services. AIP can help organizations meet the goals of
the Protect function by providing several security measures, as follows:
In a nutshell, AIP provides several security measures that align with the goals of
the Protect function within the NIST CSF. By using AIP, organizations can implement
safeguards to protect their sensitive data, reduce cybersecurity risk, and ensure the
delivery of critical infrastructure services.
312
Chapter 5 Design and Deploy a Protect Solution: Part 2
How It Works
AIP provides organizations with comprehensive tools to classify, label, and protect their
sensitive data, as well as monitor it and integrate it with other tools.
Design Considerations
These are the essential best practices for designing security in AIP:
• Enforce DLP policies: Use AIP to enforce DLP policies that prevent
sensitive data from being shared outside your organization.
• Train your users: Educate your users on how to use AIP and protect
sensitive data. Implement regular training sessions to keep users up-
to-date with the latest security best practices.
• Use AIP scanner: The AIP scanner can help you discover and
classify sensitive data stored in your organization’s file shares and
repositories.
How to Enable It
AIP is part of Microsoft Purview Information Protection (formerly Microsoft Information
Protection). With Microsoft Purview Information Protection, sensitive information can
be found, classified, protected, and governed wherever it goes.
314
Chapter 5 Design and Deploy a Protect Solution: Part 2
• DLP: AIP can be integrated with DLP solutions to identify and protect
sensitive data. It enables organizations to apply protection policies to
data in real time and prevent data loss or leakage.
315
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Office 365 subscription: If you want to use AIP with Office documents,
you must have an Office 365 subscription.
• Windows Server Active Directory: If you want to use AIP with on-
premises applications and services, you must set up Windows Server
Active Directory.
• User training: AIP is a security tool that requires proper user training
to be effective. Ensure your users are trained on using AIP and the
importance of protecting sensitive data.
• Planning and design: Proper planning and design are essential for a
successful AIP implementation. Consider your organization’s specific
needs, such as data classification, policies, and user access, when
planning your AIP implementation.
316
Chapter 5 Design and Deploy a Protect Solution: Part 2
1. Sign in to the Azure Portal: Go to the Azure Portal and sign in with
your Azure account.
Note that the steps to turn on Azure Information Protection may vary depending on
your organization’s requirements and the specific configuration you choose. Microsoft
offers detailed documentation and support resources to help you implement Azure
Information Protection effectively.
317
Chapter 5 Design and Deploy a Protect Solution: Part 2
318
Chapter 5 Design and Deploy a Protect Solution: Part 2
Azure Backup Encryption aligns with several NIST CSF categories related to
protecting data, including the following:
319
Chapter 5 Design and Deploy a Protect Solution: Part 2
How It Works
Azure Backup Encryption provides encryption options for data backups in Azure, which
helps protect sensitive data from unauthorized access or theft.
320
Chapter 5 Design and Deploy a Protect Solution: Part 2
Design Considerations
The following are critical design security best practices for Azure Backup Encryption:
• Enable MFA: Use MFA to add an extra layer of security to your backup
data. This will ensure that only authorized users can access and
manage your backups.
• Use network security groups (NSGs): Use NSGs to control traffic flow
to and from your backup infrastructure. This will help protect your
data from malicious attacks and ensure its integrity.
321
Chapter 5 Design and Deploy a Protect Solution: Part 2
How to Enable It
Azure Backup Encryption supports encryption using either RSA or AES keys. Customers
can use their own encryption keys, stored in Azure Key Vault, to encrypt backup data,
ensuring that only authorized parties can access the data. Azure Backup Encryption
also supports key rotation, allowing customers to change encryption keys periodically
to enhance security. Azure Backup Encryption protects against ransomware attacks by
preventing attackers from accessing backup data even if they gain access to the backup
storage account.
Enabling Azure Backup Encryption is a straightforward process and can be done
through the Azure Portal or PowerShell scripts. Once it’s enabled, customers can
monitor backup activity and view backup reports to ensure their data is backed up
securely.
The following are key security deployment considerations to keep in mind when
deploying Azure Backup Encryption:
322
Chapter 5 Design and Deploy a Protect Solution: Part 2
By considering these key security deployment considerations, you can help ensure
that your Azure Backup Encryption deployment is secure and compliant with industry
best practices and standards.
To turn on Azure Backup Encryption, you need to follow these steps:
1. Navigate to the Azure Portal and sign in with your account
credentials.
2. In the search bar, select Backup and Site Recovery from the list of
available services.
3. Select the backup policy for which you want to enable encryption.
4. Click the Backup Configuration tab and click Encryption.
5. Toggle the Encryption option to On.
6. Choose the encryption key type you want to use: Microsoft-
managed key or customer-managed key. If you choose to use a
customer-managed key, you must provide the Key Vault URL and
key name.
7. Save the changes.
323
Chapter 5 Design and Deploy a Protect Solution: Part 2
Once encryption is turned on, Azure Backup will automatically encrypt all backup
data at rest and in transit using the specified encryption key. This will help protect your
data from unauthorized access and ensure its confidentiality.
324
Chapter 5 Design and Deploy a Protect Solution: Part 2
Azure VPN Gateway also provides high availability and automatic failover, ensuring
that your VPN connection remains available and reliable even during an outage or
failure. Additionally, it integrates with Azure Monitor to provide real-time monitoring and
logging, enabling you to detect and diagnose issues with your VPN connection quickly.
Azure VPN Gateway offers several key benefits.
325
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Audit and accountability (AU): Azure VPN Gateway logs all the
network traffic and security events related to the VPN connection,
which can be analyzed and audited using Azure Monitor.
• Incident response (IR): Azure VPN Gateway enables you to detect and
respond to security incidents through Azure Monitor, which provides
real-time monitoring and alerting.
• Media protection (MP): Azure VPN Gateway encrypts all the network
traffic and supports advanced encryption protocols such as AES256
and SHA-2, to protect the data in transit.
By mapping Azure VPN Gateway to the NIST SP 800-53 Rev. 5 controls, you can
ensure that your VPN Gateway deployment meets the required security and privacy
standards.
Design Considerations
The following are the key design security best practices for Azure VPN Gateway:
• Use the latest VPN Gateway SKU: Microsoft recommends using the
latest VPN Gateway SKU as it provides the best performance and
security features.
326
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Enable forced tunneling for site-to-site VPN: This ensures that all
traffic from the on-premises network is routed through the VPN
tunnel, providing an additional layer of security.
How to Enable It
Azure VPN Gateway is a virtual network gateway that provides a secure connection
between an Azure virtual network and an on-premises or another virtual network. It
establishes secure tunnels using industry-standard protocols such as IPsec and SSL/
TLS. The Azure VPN Gateway can be used for both point-to-site VPN (connecting
individual devices to the virtual network) and site-to-site VPN (connecting an entire
327
Chapter 5 Design and Deploy a Protect Solution: Part 2
on-premises network to the virtual network). It also provides high availability through
active-active and active-passive configurations and supports features such as forced
tunneling and custom IPsec/IKE policies.
When using Azure VPN Gateway, you need to ensure that you have the following
prerequisites in place:
• Subnets: You must create at least one subnet in the virtual network
that you want to connect to the Azure VPN Gateway.
• Public IP address: You need a public IP address for the VPN Gateway.
This can be an Azure public IP address or a public IP address
you own.
• VPN device: You need to have a VPN device that is compatible with
the Azure VPN Gateway. This can be a physical or virtual VPN device
running on a virtual machine.
• Gateway subnet: You need to create a subnet for the VPN Gateway.
This subnet is used by the VPN Gateway to host its virtual network
interface.
Once you have these prerequisites, you can create an Azure VPN Gateway and
configure the necessary settings for your VPN connection.
328
Chapter 5 Design and Deploy a Protect Solution: Part 2
The following are the key security best practices for Azure VPN Gateway:
By implementing these security best practices, you can help ensure that your Azure
VPN Gateway deployment is secure and compliant with industry best practices and
standards.
With Azure Site-to-Site VPN, you can connect multiple on-premises sites to the same
Azure virtual network or connect various Azure virtual networks. The connection is
established using industry-standard IPsec/IKE protocols and can be configured to use
custom IPsec/IKE policies to meet specific security requirements.
Azure Site-to-Site VPN requires a VPN gateway in Azure and a compatible VPN
device on-premises. Once the VPN connection is established, traffic between the on-
premises network and the Azure virtual network is encrypted and transmitted securely
over the Internet.
The following are the key benefits of Azure Site-to-Site VPN:
330
Chapter 5 Design and Deploy a Protect Solution: Part 2
Here’s how Azure Site-to-Site VPN maps to the Protect function of the NIST CSF:
331
Chapter 5 Design and Deploy a Protect Solution: Part 2
Design Considerations
The following are the key security design best practices for Azure Site-to-Site VPN:
• Follow the least privilege principle: Apply the least privilege principle
to access control, granting users and devices only the permissions
required to perform their specific tasks.
• Use Azure Security Center: Use Azure Security Center to monitor and
manage security across your Azure environment, including Site-to-
Site VPN connections.
• Regularly review logs and audit trails: Review logs and audit trails
regularly to identify potential security issues and investigate any
suspicious activity.
332
Chapter 5 Design and Deploy a Protect Solution: Part 2
How to Enable It
Azure Site-to-Site VPN is a way to establish a secure, encrypted connection between an
Azure virtual network and an on-premises network. This allows you to extend your on-
premises network to the cloud, giving you access to Azure resources as if they were on
your local network.
To set up a site-to-site VPN, you must create a VPN gateway in Azure and configure
it to connect to your on-premises VPN device. The VPN gateway can be a basic or a
standard SKU, depending on your performance and feature requirements. You’ll also
need to configure your on-premises VPN device to connect to the Azure VPN gateway.
The connection between the Azure VPN gateway and the on-premises VPN device
is established using industry-standard IPsec/IKE protocols, which provide strong
encryption and secure communication. You can use custom IPsec/IKE policies to meet
specific security requirements. Once the VPN connection is established, traffic between
the on-premises network and the Azure virtual network is encrypted and transmitted
securely over the Internet. You can control traffic routing between the networks and
configure security rules using network security groups in Azure. Azure Site-to-Site VPN
also supports multiple VPN connections to the same Azure virtual network, providing
high availability and load balancing of VPN traffic. Additionally, you can configure
forced tunneling to ensure that all Internet-bound traffic from the on-premises network
is routed through the VPN tunnel for enhanced security.
Here are the critical prerequisites for setting up Azure Site-to-Site VPN:
• Public IP address: You need a public IP address for the VPN device on
your on-premises network.
333
Chapter 5 Design and Deploy a Protect Solution: Part 2
• IP address space: You need to ensure that the IP address space used
by your on-premises network does not overlap with the IP address
space used by the Azure virtual network.
• DNS settings: Configure DNS settings for the Azure virtual and on-
premises networks to ensure that name resolution works correctly.
By meeting these prerequisites, you can ensure that your site-to-site VPN
deployment goes smoothly and is optimized for your organization’s connectivity
requirements.
The following are key deployment considerations for Azure Site-to-Site VPN:
• Gateway SKU: Choose the appropriate gateway SKU for your site-to-
site VPN deployment based on your connectivity requirements and
bandwidth needs. For example, the Basic gateway SKU is suitable
for small-scale deployments, while the VpnGw1-5 gateway SKUs are
designed for large-scale deployments.
• Gateway subnet: Create a dedicated gateway subnet for your site-
to-site VPN deployment to ensure that the VPN gateway can be
deployed without interfering with other resources on the Azure
virtual network.
334
Chapter 5 Design and Deploy a Protect Solution: Part 2
By considering these deployment considerations, you can ensure that your site-to-
site VPN deployment is optimized for your organization’s connectivity requirements and
security needs.
To turn on Azure Site-to-Site VPN, you can follow these general steps:
335
Chapter 5 Design and Deploy a Protect Solution: Part 2
These are general steps to turn on Azure Site-to-Site VPN. The specific steps and
settings may vary depending on the VPN device and Azure configuration that you are
using. Microsoft provides detailed documentation and guides to help you set up Azure
Site-to-Site VPN correctly.
336
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Scalability: Azure P2S VPN can easily scale to support many remote
workers or devices. This makes it an ideal solution for organizations
that must provide secure remote access to many employees or
contractors.
• Easy setup: Azure P2S VPN can be set up quickly and easily using the
Azure Portal or PowerShell. This makes it a convenient solution for
organizations that need to deploy remote access quickly.
How It Works
P2S is a VPN connection that securely connects remote workers or devices to Azure
virtual networks over the Internet.
337
Chapter 5 Design and Deploy a Protect Solution: Part 2
2. Next, you create a VPN gateway in the virtual network. The VPN
gateway is a virtual machine that provides the endpoint for the
VPN connection.
6. All traffic between the remote worker or device and the virtual
network is encrypted and secured with industry-standard
protocols such as IKEv2 and SSTP.
Azure P2S VPN can also be integrated with other Azure services, such as Azure Active
Directory for authentication and authorization, Azure Information Protection for data
classification and protection, and Azure Traffic Manager for load balancing and high
availability.
Design Considerations
The following are the key design security best practices for P2S VPN:
338
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Rotate certificates and keys: Rotate the certificates and keys used for
P2S VPN regularly to reduce the risk of unauthorized access.
How to Enable It
P2S VPN is typically used when remote workers need to access resources in an Azure
virtual network, such as virtual machines, databases, and web apps. It is also commonly
used for site-to-site connectivity where a site-to-site VPN is impossible, such as when
remote workers are mobile or work from home.
339
Chapter 5 Design and Deploy a Protect Solution: Part 2
To establish a P2S VPN connection, a virtual network gateway is created in the Azure
virtual network, which acts as the VPN endpoint. The VPN gateway can be configured to
use industry-standard protocols such as IKEv2, SSTP, or OpenVPN to encrypt and secure
the traffic between the remote device and the virtual network.
To connect to the P2S VPN, the remote worker or device must install the VPN client
software. The VPN client software is available for various operating systems, including
Windows, MacOS, iOS, and Android. Once the VPN client is installed, the remote worker
can establish a secure connection to the virtual network by providing their credentials
and initiating the connection.
The following are the key deployment considerations for Azure Point-to-Site
(P2S) VPN:
• VPN client configuration: Configure the VPN client with the required
settings, including VPN protocol, authentication method, and
gateway settings. Use scripts or Group Policy Objects (GPOs) to
deploy and manage VPN client settings at scale.
340
Chapter 5 Design and Deploy a Protect Solution: Part 2
The following are the key prerequisites for Azure Point-to-Site (P2S) VPN:
341
Chapter 5 Design and Deploy a Protect Solution: Part 2
• VPN client: You must install a VPN client on the remote device to
connect to the VPN gateway. The VPN client must be compatible with
the selected protocol and operating system.
• NSG: You need to have a NSG associated with the virtual network
and VPN gateway to allow inbound and outbound traffic to the VPN
clients and VPN gateway.
• DNS configuration: You need to configure DNS settings for the virtual
network to ensure that the VPN clients can resolve the required
resources in the virtual network.
It’s important to note that several deployment considerations and best practices
should be followed when configuring Azure Point-to-Site VPN to ensure security,
scalability, and performance. These include selecting the appropriate VPN gateway
SKU, VPN protocol, and client operating systems, configuring certificate management,
network security group rules, routing, and integrating with other Azure services such as
Azure Firewall and Azure Active Directory.
To turn on Azure P2S VPN, you need to follow these steps:
1. Create a virtual network: You need to create a virtual one in Azure
if you still need to. This can be done using the Azure Portal, Azure
CLI, or Azure PowerShell.
342
Chapter 5 Design and Deploy a Protect Solution: Part 2
3. Configure the VPN gateway: Once the VPN gateway is created, you
need to configure it with the required settings, such as IP address
space, routing, and security settings. You can configure the VPN
gateway using the Azure Portal, Azure CLI, or Azure PowerShell.
6. Configure the VPN client: You need to configure the VPN client
on each remote device that needs to connect to the VPN gateway.
This involves installing the VPN client software and configuring
the required settings, such as the VPN protocol, authentication
method, and gateway settings.
It’s important to note that several deployment considerations and best practices
should be followed when configuring Azure Point-to-Site VPN to ensure security,
scalability, and performance. These include selecting the appropriate VPN gateway
SKU, VPN protocol, and client operating systems, configuring certificate management,
network security group rules, routing, and integrating with other Azure services such as
Azure Firewall and Azure Active Directory.
343
Chapter 5 Design and Deploy a Protect Solution: Part 2
Azure ExpressRoute
Azure ExpressRoute is a service provided by Microsoft Azure that enables organizations
to establish private, dedicated, and high-bandwidth connections between their
on-premises infrastructure and Azure data centers. It provides a more reliable,
secure, and predictable connection than a traditional Internet-based connection.
With ExpressRoute, you can create private connections between your on-premises
infrastructure, such as your data center or colocation facility, and Azure. These private
connections are established using a dedicated connection through a connectivity
provider, such as a telecommunications provider or a connectivity partner. The
connection can be established via a dedicated physical circuit, such as a T1 line or a
fiber-optic cable, or a virtual circuit, such as MPLS.
There are two main types of Azure ExpressRoute:
344
Chapter 5 Design and Deploy a Protect Solution: Part 2
In addition to these types and models, Microsoft offers various ExpressRoute peering
options, enabling customers to peer with different Microsoft services and partners.
These include Microsoft peering, which enables customers to connect to Microsoft
cloud services such as Azure, Dynamics 365, and Office 365, and partner peering, which
enables customers to connect to cloud services offered by Microsoft partners.
There are several benefits to using Azure ExpressRoute, including the following:
How It Works
Azure ExpressRoute establishes a dedicated, private, high-bandwidth connection
between your on-premises infrastructure and Azure data centers. This connection is
established through a connectivity provider, such as a telecommunications provider or a
connectivity partner, using a dedicated physical or virtual circuit.
The following is a high-level overview of how Azure ExpressRoute works:
345
Chapter 5 Design and Deploy a Protect Solution: Part 2
346
Chapter 5 Design and Deploy a Protect Solution: Part 2
Design Considerations
Here are some key design security best practices for Azure ExpressRoute:
• Implement NSGs: NSGs are a key security feature in Azure that allows
you to filter network traffic to and from Azure resources. They can be
applied to virtual network subnets, individual virtual machines, and
network interfaces. NSGs can help protect your Azure resources from
malicious traffic and restrict access to resources only to authorized
users and applications.
347
Chapter 5 Design and Deploy a Protect Solution: Part 2
How to Enable It
Azure ExpressRoute is ideal for organizations that require a private, dedicated, and high-
bandwidth connection between their on-premises network and Azure. Here are some
use cases for Azure ExpressRoute deployment:
• Big data and analytics: Organizations that use big data and analytics
tools, such as Hadoop or Spark, may require large amounts of data
transfer between their on-premises network and Azure. Azure
ExpressRoute provides a dedicated, high-bandwidth connection
that can significantly reduce data transfer times and improve
performance.
348
Chapter 5 Design and Deploy a Protect Solution: Part 2
To enable Azure ExpressRoute, there are several prerequisites that you need to meet.
349
Chapter 5 Design and Deploy a Protect Solution: Part 2
350
Chapter 5 Design and Deploy a Protect Solution: Part 2
Azure WAF
Azure Web Application Firewall (WAF) is a cloud-based security service offered by
Microsoft Azure that provides centralized protection to web applications from common
exploits and vulnerabilities, such as SQL injection, cross-site scripting, and application-
layer DDoS attacks. Azure WAF helps ensure web application security and availability by
inspecting incoming web traffic and filtering out malicious requests.
351
Chapter 5 Design and Deploy a Protect Solution: Part 2
Azure WAF works by deploying a web application gateway (WAG) before your web
application. The WAG acts as a reverse proxy that intercepts incoming traffic and routes
it to the web application. Before traffic is passed on to the web application, it is inspected
by the WAF for malicious content and behavior. The WAF uses a set of rules and policies
to identify and block attacks, such as the OWASP Top 10, a widely recognized list of the
top 10 web application security risks.
Azure WAF provides several benefits to organizations, including the following:
Azure WAF can help organizations meet the Protect function of the NIST CSF by
providing centralized protection for web applications from common exploits and
vulnerabilities. Here are some examples of how Azure WAF maps to the Protect function
of the NIST CSF:
352
Chapter 5 Design and Deploy a Protect Solution: Part 2
How It Works
Azure WAF is a cloud-based security service that protects web applications from
common exploits and vulnerabilities. Here is an overview of how Azure WAF works:
• Deploy a WAG: To use Azure WAF, you must first deploy a WAG before
your web application. The WAG acts as a reverse proxy that intercepts
incoming traffic and routes it to the web application.
• Traffic inspection: Before traffic is passed on to the web application,
it is inspected by the Azure WAF for malicious content and behavior.
The WAF uses a set of rules and policies to identify and block attacks,
such as the OWASP Top 10, a widely recognized list of the top 10 web
application security risks.
• Customizable rules and policies: Azure WAF allows you to customize
the rules and policies used to identify and block attacks. You can
create custom rules specific to your web application and adjust the
sensitivity of the WAF to match your security needs.
• Real-time monitoring and logging: Azure WAF provides real-time
monitoring and logging of web traffic, allowing you to identify and
respond to attacks as they happen. The WAF generates detailed
reports on web traffic and security events, which can be used to
troubleshoot issues and improve your security posture.
353
Chapter 5 Design and Deploy a Protect Solution: Part 2
Design Considerations
Here are some security design best practices for Azure Web WAF:
• Keep the WAF updated: Azure WAF rules and policies are updated
regularly to protect against new threats and vulnerabilities. It is
important to keep the WAF updated to ensure it effectively blocks the
latest attacks.
• Use the OWASP rule set: The OWASP rule set is a set of rules that can
be used with Azure WAF to block common web application attacks.
The OWASP rule set is widely used and well-maintained, making it a
good choice for most organizations.
• Use managed rules: Azure WAF provides a set of managed rules that
can be used to block common attacks. Microsoft developed and
maintained these managed rules and can help organizations quickly
implement adequate protection against common threats.
• Monitor and analyze logs: Azure WAF generates logs that can be
used to monitor web traffic and detect attacks. Organizations should
monitor these logs regularly and analyze them for trends and
patterns that may indicate an attack.
354
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Test the WAF regularly: It is essential to test the Azure WAF regularly
to ensure it is effective at blocking attacks. This can be done using
tools such as penetration testing and vulnerability scanning.
How to Enable It
Azure WAF is a security feature of Azure Application Gateway, a cloud-based load-
balancing solution. Azure WAF provides centralized protection for web applications
against common exploits and vulnerabilities. It uses a rules-based engine to inspect web
traffic and block attacks identified by the rules.
Azure WAF offers the following features:
• OWASP rule set: Azure WAF includes the Open Web Application
Security Project (OWASP) rule set, a widely used set of rules for
blocking common web application attacks.
• Managed rules: Azure WAF provides a set of managed rules that are
developed and maintained by Microsoft. These rules can be used to
block common attacks, such as SQL injection and cross-site scripting.
• SSL/TLS encryption: Azure WAF can encrypt web traffic using SSL/
TLS encryption.
355
Chapter 5 Design and Deploy a Protect Solution: Part 2
The following are the essential prerequisites for Azure Web Application
Firewall (WAF):
• Azure subscription: To use Azure WAF, you need an active Azure
subscription. You can sign up for a free trial if you don’t have one.
• Azure resources: You must create or have existing Azure resources,
such as a virtual network, a public IP address, and an application
gateway.
• Application Gateway: Azure WAF is a feature of Azure Application
Gateway. You will need to create an application gateway to use WAF.
• Back-end pool: The application gateway must have a back-end pool
configured with one or more servers running your web application.
• SSL certificate: If your web application uses SSL/TLS encryption, you
will need an SSL certificate to configure HTTPS.
• WAF policy: You must create a WAF policy to configure the rules and
settings for Azure WAF.
• NSG: If you want to restrict access to your web application, you can
use a NSG to define inbound and outbound traffic rules.
• DNS record: You must create a DNS record to point your domain
name to the public IP address associated with your application
gateway.
• Access control: You may want to configure access control rules to
restrict access to your web application based on IP addresses or other
criteria.
To enable Azure Web Application Firewall (WAF), you can follow these steps:
5. Configure WAF policy: You can configure the WAF policy with the
rules and settings that you want to apply to your web application.
You can use the default rule set or create custom rules. You can
configure the WAF policy through the Azure Portal, Azure CLI, or
PowerShell.
6. Associate the WAF policy with the listener: You need to associate
the WAF policy with the listener to enable WAF for incoming
traffic. You can associate the WAF policy with the listener through
the Azure Portal or by using Azure CLI or PowerShell.
7. Test and monitor: Once you have enabled WAF, you should test
your web application to ensure it functions properly. You should
also monitor the traffic to your web application to detect and
respond to any attacks that WAF blocks.
These steps can help you enable Azure WAF and configure it to protect your web
application from common exploits and vulnerabilities.
357
Chapter 5 Design and Deploy a Protect Solution: Part 2
Defining DLP policies in Microsoft Purview enables you to identify, monitor, and
automatically protect sensitive data across the following:
DLP uses deep content analysis to detect sensitive items, not just a simple text scan.
In addition to primary data matches to keywords, regular expression evaluation, internal
function validation, and secondary data matches close to primary data matches, content
is analyzed for secondary data matches. As well as machine learning algorithms, DLP
detects content that matches your DLP policies using other methods.
Microsoft Purview DLP is a feature of Microsoft Purview, a unified data governance
service that helps organizations discover, understand, and manage their data. Purview
DLP allows organizations to protect sensitive data by identifying and classifying sensitive
information in their data estate and applying policies to prevent unauthorized access,
usage, or sharing of this data. With Microsoft Purview, you can define DLP policies that
identify sensitive data and apply data protection rules to prevent unauthorized access or
disclosure. Purview supports a range of data protection capabilities, including masking,
encryption, and access control. You can use Purview to discover and classify sensitive
data assets and then use DLP policies to protect that data from being accessed or
disclosed inappropriately.
With Purview DLP, organizations can create custom data classification labels and
policies that align with their specific regulatory and compliance requirements. The
service scans data sources such as SQL Server, Azure Data Lake Storage, and SharePoint
Online to discover and classify sensitive data such as personally identifiable information
(PII), financial information, and intellectual property. It then provides actionable
insights into how sensitive data is being used and shared within the organization and
358
Chapter 5 Design and Deploy a Protect Solution: Part 2
helps enforce policies to prevent data leakage or loss. Purview DLP also integrates with
Microsoft Information Protection to provide advanced data protection capabilities such
as encryption and access controls. Additionally, it provides a centralized dashboard that
allows organizations to monitor and manage their data governance policies across their
entire data estate.
Microsoft Purview DLP is a powerful tool for organizations looking to secure their
sensitive data and comply with data protection regulations.
How It Works
Microsoft Purview DLP provides a comprehensive approach to discovering, classifying,
protecting, and monitoring sensitive data within an organization’s data estate. Here are
the critical steps involved in how it works:
359
Chapter 5 Design and Deploy a Protect Solution: Part 2
Microsoft Purview DLP can be mapped to the NIST CSF Protect category, which
focuses on developing and implementing appropriate safeguards to ensure the delivery
of critical infrastructure services. Here are some examples of how Purview DLP can help
organizations meet the Protect category’s objectives:
Design Considerations
The following are the key security design best practices for Microsoft Purview DLP:
• Follow the principle of least privilege: Limit access to sensitive data to
only those who need it—grant permissions to data assets based on a
need-to-know basis.
360
Chapter 5 Design and Deploy a Protect Solution: Part 2
• Regularly update and patch: Keep Purview DLP up-to-date with the
latest patches and updates to protect it against the latest threats.
These security design best practices can help organizations protect their sensitive
data and comply with data protection regulations.
How to Enable It
Each organization’s DLP plan and implementation will be different due to its business
needs, goals, resources, and situation. All successful DLP implementations share some
elements, however. Rather than scanning text for sensitive items, DLP uses deep content
analysis. Content analysis involves the evaluation of regular expressions, the evaluation
of internal functions, and the analysis of secondary data matches close with the primary
data match.
361
Chapter 5 Design and Deploy a Protect Solution: Part 2
DLP also utilizes machine learning algorithms and other methods to detect content
that matches your DLP policies. Here are the essential prerequisites for Microsoft
Purview DLP:
These key prerequisites can help organizations ensure they have the resources
and permissions to deploy and manage Purview DLP effectively. The following are key
deployment considerations for Microsoft Purview DLP:
• Data sources: Consider which data sources you want to scan for
sensitive data. Purview DLP supports scanning data sources such
as Azure Data Lake Storage, SQL Server, and SharePoint Online.
Ensure that the data sources you want to scan are compatible with
Purview DLP.
• Policy actions: Consider what actions you want to take when sensitive
data is detected. Purview DLP provides actions such as alerting,
blocking access, and redacting data. Determine which policy
actions are appropriate for your organization and how you want to
configure them.
362
Chapter 5 Design and Deploy a Protect Solution: Part 2
2. Navigate to the Purview account that you want to enable DLP for.
6. Select the data sources that you want to scan for sensitive data.
You can select data sources such as Azure Data Lake Storage, SQL
Server, and SharePoint Online.
363
Chapter 5 Design and Deploy a Protect Solution: Part 2
Once the policy is created, Purview DLP will scan the selected data sources for
sensitive data and enforce the policy rules. You can monitor policy violations and take
corrective actions as needed.
Data Segregation
Azure data Segregation is a security practice that separates data in Azure services based
on sensitivity or criticality. This practice helps organizations protect their sensitive data
and reduce the risk of unauthorized access, disclosure, or modification.
Azure data Segregation can be achieved through a variety of mechanisms, including
the following:
• RBAC: Using RBAC to assign roles to users and groups can help
organizations control their actions on Azure resources.
Azure data segregation is a critical security practice for organizations that store
sensitive data in Azure services. Organizations can reduce the risk of data breaches and
other security incidents by separating data based on its sensitivity or criticality.
364
Chapter 5 Design and Deploy a Protect Solution: Part 2
Summary
In this chapter, you read about methods to design and deploy a strategy for protecting
security services in line with the NIST CSF mapping about data security.
In the book’s next chapter, you will read about designing and deploying a strategy
for protecting security services with regard to Information Protection Processes and
Procedures (PR.IP) and Protective Technology (PR.PT).
365
CHAPTER 6
• Protective Technology
367
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_6
Chapter 6 Design and Deploy a Protect Solution: Part 3
The PR.IP security controls within the NIST Cybersecurity Framework (CSF) focus
on protecting an organization’s information assets.
Specifically, the PR.IP category includes security controls related to developing,
implementing, and maintaining information protection processes and procedures.
These controls are designed to protect sensitive information against unauthorized
access, theft, modification, or destruction.
368
Chapter 6 Design and Deploy a Protect Solution: Part 3
369
Chapter 6 Design and Deploy a Protect Solution: Part 3
370
Chapter 6 Design and Deploy a Protect Solution: Part 3
371
Chapter 6 Design and Deploy a Protect Solution: Part 3
Figure 6-1 depicts the NIST Protect information processes and procedure against
Azure services.
PR.IP: Information
Processes and
Procedure (PR.IP)
PR.IP-1: Creating
and maintaining a
baseline
configuration of
PR.IP - 9 and 10:
information PR.IP-5: A physical
PR.IP-4: Periodically, Plans should in
technology/industria PR.IP-2: To manage operating PR.IP-7: Continuous
information backups place for incident PR.IP-12: Develop
l control systems that systems, a System environment is improvement is
should be response and and implement a
incorporates Development Life provided for made to the
performed, business continuity vulnerability
appropriate security Cycle is organizational assets protection
maintained, and and The recovery management plan.
principles (e.g., the implemented. by policy and processes
tested and response plans
concept of least regulations
should be tested..
functionality) is a
critical part of the
cybersecurity
process.
Security and
Azure Automation Office 365 Secures Vulnerability
Microsoft SDLC Azure Backup Compliance in Azure Site Recovery
DSC Score Assessment
Office 365
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 6-1 with respect to PR.IP.
372
Table 6-1. PR.IP Management Responsibility Matrix
PR.IP: Security PR.IP-1: NIST SP Shared Configuration control and Hardware, software, and network
policies (that Creating and 800-53 Rev. baseline configuration for devices are reviewed and updated
address maintaining 4 CM-2, the information systems annually by Microsoft Azure. A
purpose, a baseline CM-3, CM- employed should be development and test environment
scope, roles, configuration 4, CM-5, developed, documented, and is used to develop, test, and approve
responsibilities, of information CM-6, CM- maintained by the customer. changes before entering a production
management technology/ 7, CM-9, To ensure the security of environment.
commitment, industrial SA-10 these controls and baselines,
and coordination control appropriate security principles
among systems that must be incorporated.
Chapter 6
organizational incorporates
entities), appropriate
processes, and security
procedures are principles
maintained and (e.g., the
used to manage concept
protection of of least
information functionality)
systems and is a critical
assets. part of the
cybersecurity
process.
(continued)
373
Design and Deploy a Protect Solution: Part 3
Table 6-1. (continued)
374
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 6
References
375
Design and Deploy a Protect Solution: Part 3
Table 6-1. (continued)
376
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 6
References
PR.IP-4: NIST SP Shared In order to restore from Using complex algorithms, Microsoft
Periodically, 800-53 Rev. backups, customers must Azure Storage replicates user-level data
information 4 CP-4, enable geo-replicated synchronously locally, providing three
backups CP-6, CP-9 backups in their subscriptions. copies of redundancy. Asynchronous
should be replication of data can be done to
performed, remote regions in some instances.
maintained,
and tested
PR.IP-5: NIST SP Microsoft Azure N/A To align the system with business
A physical 800-53 Rev. goals and objectives, Microsoft Azure’s
operating 4 PE-10, PE- formal technology strategy is updated
environment 12, PE-13, and maintained annually. To reduce the
Design and Deploy a Protect Solution: Part 3
377
Design and Deploy a Protect Solution: Part 3
Table 6-1. (continued)
378
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 6
References
379
Design and Deploy a Protect Solution: Part 3
Table 6-1. (continued)
380
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility Chapter 6
References
PR.IP- NIST SP Shared The customer must develop Servers, network devices, web
12:Develop 800-53 Rev. and implement a vulnerability applications, and databases are
and 4 RA-3, RA- management plan to analyze authenticated vulnerability scans as
implement a 5, SI-2 and report on their applications part of Microsoft Azure’s inventory.
vulnerability for flaws.As part of this Remediation of flaws is implemented
management vulnerability management plan, by the Azure security team.
plan. the customer’s applications
and databases should also
be scanned and corrected
for vulnerabilities. Those
customers using an operating
system image not provided
Design and Deploy a Protect Solution: Part 3
381
Chapter 6 Design and Deploy a Protect Solution: Part 3
In a nutshell, Azure Automation DSC provides a powerful and flexible tool for
managing and automating the configuration of your resources in the Azure cloud. It can
help you to achieve greater consistency, efficiency, and control over your environment.
How It Works
Azure Automation DSC enables administrators to define a configuration that describes
the desired state of a set of resources in Azure. This configuration is written in
PowerShell, DSC configuration files, or DSC modules.
Once the configuration is defined, Azure Automation DSC applies it to the targeted
resources. It uses a pull model, where the target resources periodically request the
configuration from the Azure Automation DSC service. Azure Automation DSC
monitors the resources when the configuration is applied to ensure they remain in the
desired state. If a resource drifts from the desired state, Azure Automation DSC can
automatically remediate the issue to bring the resource back to the desired state.
Azure Automation DSC provides versioning and rollback capabilities, enabling
administrators to manage configuration changes. This allows them to easily track
changes to their configurations and revert back to previous versions if necessary. Azure
Automation DSC also integrates with other Azure services, such as Azure Monitor and
Log Analytics. This enables administrators to monitor their configurations and identify
issues or configuration drift quickly.
The following are key deployment considerations for Azure Automation DSC:
• Use source control: Store your DSC configurations in source control
(e.g., Git) to manage changes and collaborate. This also allows you to
roll back changes if needed easily.
382
Chapter 6 Design and Deploy a Protect Solution: Part 3
By following these tips, you can work more effectively with Azure Automation DSC
and ensure your resources remain secure and compliant.
Design Considerations
The following are essential security design best practices for Azure Automation DSC:
• Secure credentials: When configuring automation account
credentials, ensure they are secured properly. You can use Azure Key
Vault to store and manage credentials securely.
• Role-based access control (RBAC): Use RBAC to control access to
automation accounts and associated resources. This ensures that
only authorized users can manage and access automation resources.
• Network security: Ensure that automation accounts and associated
resources are located within secure network segments and that
network traffic is restricted using network security groups (NSGs).
383
Chapter 6 Design and Deploy a Protect Solution: Part 3
In a nutshell, following these security design best practices can ensure that your
Azure Automation DSC implementation is secure and meets your organization’s
compliance requirements.
How to Enable It
Azure Automation DSC can be adopted for the following use cases:
384
Chapter 6 Design and Deploy a Protect Solution: Part 3
The following are the prerequisites for using Azure Automation DSC:
• Azure virtual machine (VM) extension: You must install the Azure VM
extension on the nodes you want to manage. This extension enables
the nodes to communicate with the Azure Automation service.
These are the main prerequisites for using Azure Automation DSC. You can find
more detailed information in the Azure documentation.
The following are high-level steps to turn on Azure Automation DSC:
385
Chapter 6 Design and Deploy a Protect Solution: Part 3
These are the basic steps for turning on Azure Automation DSC. More detailed
instructions can be found in the Azure documentation.
386
Chapter 6 Design and Deploy a Protect Solution: Part 3
387
Chapter 6 Design and Deploy a Protect Solution: Part 3
How It Works
PowerShell DSC defines the desired state of a Windows system and then applies that
configuration to the system using a set of resources. Here are the key steps for how
DSC works:
• Apply the configuration: The MOF file is applied to the target system
using the DSC engine, a Windows PowerShell component. The
DSC engine compares the system’s current state to the desired state
specified in the MOF file and applies any necessary changes to bring
the system into compliance with the desired state.
388
Chapter 6 Design and Deploy a Protect Solution: Part 3
How to Enable It
To turn on PowerShell DSC on a Windows system, follow these steps:
389
Chapter 6 Design and Deploy a Protect Solution: Part 3
Once you’ve turned on DSC and applied your first configuration, the LCM will
continue to monitor the system and ensure it remains compliant with the desired state.
You can also create and apply additional configurations as needed to manage other
aspects of the system.
Microsoft SDL
The Microsoft Software Development Lifecycle (SDL) is a comprehensive approach
to software development used by Microsoft and its partners to develop high-quality
software products. The Microsoft SDL is a process that encompasses all stages of the
software development life cycle, from planning and requirements gathering to design,
development, testing, deployment, and maintenance.
The Microsoft SDL includes the following stages:
391
Chapter 6 Design and Deploy a Protect Solution: Part 3
How to Enable It
Through the implementation of the SDL, security and privacy are integrated
throughout all phases of the development process, reducing the number and severity of
vulnerabilities in software.
Three core concepts are at the heart of the Microsoft SDL: education, continuous
process improvement, and accountability. Investing in knowledge transfer helps
organizations respond appropriately to technological changes and threats. It is
crucial to educate and train technical job roles within a software development
group continuously. Because security risks aren’t static, the SDL heavily emphasizes
knowledge of security risk better to understand the causes and effects of security
vulnerabilities. A new technology advancement or a new threat must be incorporated
into SDL processes, which require regular evaluation and change. Using data, we can
assess training effectiveness, confirm process compliance, and make future changes
based on post-release metrics. Additionally, the SDL requires the archival of all data
necessary to service an application in a crisis. The organization can provide concise and
cogent guidance to all stakeholders when coupled with detailed security response and
communication plans.
The Microsoft SDL consists of practices supporting security assurance and
compliance requirements. By integrating security and privacy considerations into
every phase of the software development life cycle, the SDL helps ensure that software
products are developed in a way that meets security and compliance requirements. This
is particularly important for heavily regulated industries, such as healthcare, finance,
392
Chapter 6 Design and Deploy a Protect Solution: Part 3
and government. The SDL practices help organizations meet regulatory requirements,
such as HIPAA, PCI-DSS, and GDPR, and demonstrate due diligence in managing
security risks associated with software products.
The Microsoft Security Development Lifecycle (SDL) consists of 12 practices, as
shown here:
393
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Data loss prevention: This feature helps prevent sensitive data from
being shared outside the organization by automatically detecting and
blocking data leaks.
Office 365 also includes various compliance features designed to help organizations
meet regulatory requirements. Some of these features include the following:
• Audit Logs: Office 365 keeps detailed logs of user activity, which can
be used to demonstrate compliance with regulatory requirements.
394
Chapter 6 Design and Deploy a Protect Solution: Part 3
By incorporating these security and compliance features into Office 365, Microsoft
helps organizations protect their data and meet regulatory requirements.
Microsoft Office 365 includes a range of capabilities that align with the NIST Protect
function, one of the five core functions of the NIST CSF.
Some of the key capabilities of Office 365 that align with the NIST Protect function
include the following:
395
Chapter 6 Design and Deploy a Protect Solution: Part 3
By considering these design considerations, organizations can help ensure that their
use of Office 365 meets their security and compliance requirements.
How to Enable It
Security and compliance features are already built-in and enabled by default in Office
365. However, some features may require additional configuration or customization to
meet specific organizational needs. Here are some general steps to ensure that security
and compliance features are fully enabled in Office 365:
2. Click the Settings icon in the navigation menu on the left, and
then click Security & Compliance.
397
Chapter 6 Design and Deploy a Protect Solution: Part 3
In a nutshell, Office 365 Secure Score provides organizations a powerful tool for
improving their security posture and reducing the risk of data breaches and other
security incidents. Organizations can better protect their data and systems from
cyber threats by implementing the recommended security controls and continuously
monitoring their security posture.
Office 365 Secure Score maps to the Protect function of the NIST CSF by providing
security control recommendations that help protect an organization’s Office 365
environment. Some of the critical areas where Office 365 Secure Score maps to the NIST
Protect function include the following:
Design Considerations
These are essential design best practices to consider when using Office 365 Secure Score:
• Define your security priorities: Before using Office 365 Secure Score,
defining your security priorities and goals is essential. This will help
you prioritize which security controls to implement first and focus
your efforts on the highest-risk areas.
399
Chapter 6 Design and Deploy a Protect Solution: Part 3
How to Enable It
Office 365 Secure Score is a feature built into the Office 365 Security & Compliance
Center. Here are the steps to turn on Office 365 Secure Score:
1. Sign in to the Office 365 Security & Compliance Center using your
Office 365 administrator credentials.
2. Click Secure Score under the Threat Management section in the
navigation pane on the left.
400
Chapter 6 Design and Deploy a Protect Solution: Part 3
3. If this is your first time using Office 365 Secure Score, you will
be prompted to enable it. Click Enable to turn on Office 365
Secure Score.
4. Once you have enabled Office 365 Secure Score, you can view your
organization’s current score, recommendations for improving
your score, and a history of your score over time.
7. Use the Secure Score Analyzer tool to track your progress over
time and identify areas for further improvement.
As you can see, turning on Office 365 Secure Score is a straightforward process that
can help you improve your organization’s security posture and reduce the risk of cyber
threats.
401
Chapter 6 Design and Deploy a Protect Solution: Part 3
Here are some key features and benefits of Azure Site Recovery:
In a nutshell, Azure Site Recovery is a robust disaster recovery solution that provides
automated replication and recovery of your workloads, ensuring that your business-
critical applications are up-to-date and readily available during a failure.
ASR can be used to help organizations meet many of the security and compliance
requirements set out in the NIST CSF under the Protect function.
402
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Data backup and recovery: ASR provides a robust data backup and
recovery solution, helping organizations ensure the availability and
integrity of their critical data in the event of a disaster or data loss.
Design Considerations
Here are some essential design best practices for implementing ASR in your
organization:
403
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Test and validate your disaster recovery plan: Once it is in place, test
and validate it regularly. This will help you identify issues and ensure
your organization is ready to respond to a disaster.
Implementing these best practices can help ensure that ASR is configured correctly
and meets your organization’s disaster recovery requirements.
How to Enable It
To turn on Azure Site Recovery, you will need to follow these steps:
1. Sign in to the Azure Portal: Go to the Azure Portal and sign in with
your Azure account credentials.
404
Chapter 6 Design and Deploy a Protect Solution: Part 3
After enabling replication, Azure Site Recovery will automatically replicate data
and virtual machines according to the replication policy you have configured. You can
monitor the replication status and manage your disaster recovery plan through the
Azure Portal.
405
Chapter 6 Design and Deploy a Protect Solution: Part 3
Vulnerabilities Assessment
Microsoft Defender for Cloud is a cloud-native security solution designed to help
organizations protect their cloud-based assets and workloads from various threats,
including vulnerabilities. One of its key features is its ability to perform continuous
vulnerability assessments of cloud environments. Microsoft Defender for Cloud
uses a combination of machine learning and human expertise to identify potential
vulnerabilities in an organization’s cloud environment. It can scan cloud resources
such as virtual machines, containers, and applications and assess their security posture
based on various factors such as misconfigurations, software vulnerabilities, and security
policy compliance.
The solution provides real-time alerts and detailed reports on vulnerabilities,
enabling organizations to remediate any issues and maintain a strong security posture
quickly. It also offers guidance on addressing vulnerabilities, with recommendations
for mitigations and remediation steps. Microsoft Defender for Cloud integrates with
other Microsoft security solutions, such as Azure Sentinel and Microsoft 365 Defender,
to provide a comprehensive security platform for the entire cloud environment. It also
supports third-party integrations through open APIs, enabling organizations to extend
and integrate their capabilities into their security workflows.
Microsoft Defender for Cloud Vulnerability Assessment provides several key
benefits, including the following:
406
Chapter 6 Design and Deploy a Protect Solution: Part 3
When deploying Microsoft Defender for Cloud Vulnerability Assessment, several key
considerations must be remembered. These include the following:
407
Chapter 6 Design and Deploy a Protect Solution: Part 3
How to Enable It
To turn on Microsoft Defender for Cloud Vulnerability Assessment, follow these steps:
3. Select Azure Defender from the menu on the left of the Security
Center dashboard.
408
Chapter 6 Design and Deploy a Protect Solution: Part 3
8. Choose the scanning frequency and time window that works best
for your environment.
10. Wait for the initial scan to complete. Once the scan is finished,
you can view the vulnerabilities detected in the Azure Defender
Security Center dashboard.
409
Chapter 6 Design and Deploy a Protect Solution: Part 3
In the context of the NIST CSF, protective technology refers to the cybersecurity
control category implemented to limit or contain the impact of a cybersecurity event.
The NIST CSF defines it as safeguards and countermeasures to protect organizational
assets, including hardware, software, networks, and data, from cyber threats.
Protective technology controls can be divided into several subcategories.
412
Chapter 6 Design and Deploy a Protect Solution: Part 3
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Figure 6-3 with respect to PR.PT.
AD Log Analytics
As part of the Azure Cloud shared responsibility model, the NIST CSF security
functions are provided in Table 6-2 with respect to PR.PT.
413
Table 6-2. PR.PT Management Responsibility Matrix
414
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 6
References
Protective PR.PT-1: Records NIST SP 800- Shared Customer’s responsibility As part of ongoing system risk
Technology related to audits 53 Rev. 4 AU to determine which events assessments, which include
(PR.PT): and logs are Family their software application identified vulnerabilities, business
Technical established, must be able to audit and requirements, and Azure security
security documented, what auditable events standards, the Azure security
solutions are implemented, beyond the required events team has developed a broad set of
managed to and reviewed by should be auditable for auditable events specific to Microsoft
ensure the policy the customer’s needs. Azure. In Microsoft Azure security
security and The customer will also configuration baselines, audit log
resilience document, implement, events are defined by audit policies.
of systems and review these logs Microsoft Azure Security reviews the
and assets, by policy. general event set when a system
Design and Deploy a Protect Solution: Part 3
safeguards needed.
A Microsoft Azure data center secures
digital media assets, including server
assets and network devices used
for backup. Information stored in
Microsoft Azure data centers is not
stored on nondigital media, and
Microsoft Azure digital media assets
are physically and securely stored
there. Microsoft Azure data centers
are protected by physical access
controls (access badges, biometrics,
etc.) and video surveillance.
(continued)
415
Design and Deploy a Protect Solution: Part 3
Table 6-2. (continued)
416
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 6
References
recommended configurations
based on each hardware vendor
and updates the baseline standards
periodically based on vendor
recommendations. Configuration
baselines enable only essential
functions, ports, protocols, and
services.
PR.PT-4: ⋅ NIST SP Shared The customer’s network Microsoft Azure implements boundary
Protecting 800-53 Rev. and communications protection by implementing controlled
communications 4 AC-4, AC- protect the information devices at the network boundary and
and control 17, AC-18, flow between the at critical points in the Microsoft Azure
networks CP-8, SC-7 customer’s applications infrastructure. The overarching principle
and external systems. within Microsoft Azure is to allow only
The customer is connection and communication that
responsible for is necessary for systems to function,
documenting usage blocking all other ports, protocols, and
restrictions, configuration connections by default.
and connection Through a combination of virtual local
requirements, and area network (VLAN) isolation, software
implementation guidance load balancers, filters, firewalls, and
for accessing the access control lists, Microsoft Azure
customer’s application. enforces approved authorizations for
Chapter 6
417
Design and Deploy a Protect Solution: Part 3
Chapter 6 Design and Deploy a Protect Solution: Part 3
418
Chapter 6 Design and Deploy a Protect Solution: Part 3
The following are The following are the key benefits of using Azure Sentinel:
419
Chapter 6 Design and Deploy a Protect Solution: Part 3
The NIST CSF provides guidelines and best practices for improving cybersecurity
across various industries and organizations. Azure Sentinel can be mapped to the
Protect category of the NIST CSF as follows:
420
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Plan for data retention: Azure Sentinel allows you to retain data for
up to two years, but this comes at a cost. It is essential to plan for
data retention to ensure you are not storing unnecessary data and
incurring unnecessary costs.
421
Chapter 6 Design and Deploy a Protect Solution: Part 3
How to Enable It
To turn on Azure Sentinel, follow these steps:
3. Search for Azure Sentinel in the search bar and select it from the
results.
6. Review the settings and click the Create button to start the
deployment process.
After turning on Azure Sentinel, you must configure data connectors to ingest data
into your deployment. You can also configure security rules and automated responses
to start detecting and responding to security threats. It is essential to regularly monitor
your Azure Sentinel deployment to ensure that it is working as expected and to make any
necessary adjustments.
422
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Log collection: Azure Log Analytics can collect data from various
sources such as Azure resources, Windows and Linux servers, and
custom applications.
423
Chapter 6 Design and Deploy a Protect Solution: Part 3
By analyzing Azure AD logs, administrators can gain valuable insights into the
security and performance of their Azure AD environment, identify potential security
threats, troubleshoot issues, and ensure compliance with regulatory requirements. AD
log analysis involves collecting and consolidating Azure AD logs from various sources,
parsing and interpreting the log data, and analyzing the data using correlation, trend
analysis, and anomaly detection techniques.
Here are some examples of how Azure Log Analytics can be used for Azure AD:
424
Chapter 6 Design and Deploy a Protect Solution: Part 3
Azure Log Analytics can be used to implement access control for Azure Active
Directory (Azure AD) in several ways. Here are some examples of how Azure Log
Analytics can help organizations implement access control for Azure AD and map to the
Protect function of the NIST CSF:
• MFA: Azure Log Analytics can monitor Azure AD MFA logs and
identify any failed attempts or anomalies. This helps organizations
implement a multi-factor authentication model and protect their
identities from unauthorized access.
Design Considerations
The following are the key design best practices for Azure Log Analytics for Azure AD:
425
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Define access controls: It’s essential to define access controls for Azure
Log Analytics to ensure that only authorized personnel can log data.
This includes defining RBAC for Azure Log Analytics and configuring
access policies for Azure AD logs.
How to Enable It
To enable Azure Log Analytics for Azure Active Directory (Azure AD), follow these steps:
1. Create an Azure Log Analytics workspace: If you haven’t
already, create an Azure Log Analytics workspace in your Azure
subscription. This workspace will be used to collect and store
Azure AD logs.
426
Chapter 6 Design and Deploy a Protect Solution: Part 3
5. Analyze log data: Once log collection and alerts are configured,
you can analyze the log data in Azure Log Analytics. This can
be done using log queries, allowing you to search and filter data
based on specific criteria.
427
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Integration with other services: Azure Log Analytics for Azure AD can
be integrated with other Azure services, such as Azure Sentinel and
Azure Monitor, to provide a more comprehensive monitoring and
management solution. Consider integrating these services based on
the needs of the organization.
Microsoft BitLocker
Microsoft BitLocker is a full-disk encryption feature included with Microsoft Windows
operating systems. It is designed to protect data by encrypting entire disk volumes,
including the Windows operating system and all user data, and protecting them with a
password or a smart card.
428
Chapter 6 Design and Deploy a Protect Solution: Part 3
429
Chapter 6 Design and Deploy a Protect Solution: Part 3
Microsoft BitLocker aligns with the NIST CSF function of Protect in the
following ways:
Microsoft BitLocker helps organizations protect their data assets and aligns with
the NIST CSF Protect function by providing encryption, access control, awareness and
training, central management, maintenance, and integration with other protective
technologies.
430
Chapter 6 Design and Deploy a Protect Solution: Part 3
Design Considerations
The following are the key design best practices for Microsoft BitLocker:
Overall, following these best practices can help ensure that BitLocker is properly
configured and provides maximum protection for your organization’s data.
431
Chapter 6 Design and Deploy a Protect Solution: Part 3
How to Enable It
Microsoft BitLocker can be enabled in Azure using the following steps:
4. Configure Key Vault: Once the Key Vault is created, navigate back
to the VM and click “Disk encryption.” Select the Key Vault and
provide the necessary permissions.
6. Monitor the progress: The encryption process can take some time
to complete. You can monitor progress by checking the Activity
log in the Azure Portal.
Once BitLocker is enabled, you can manage it through the Azure Portal, PowerShell,
or other management tools.
Here are the steps to enable Microsoft BitLocker in Windows OS:
1. Open the Control Panel: Click the Start menu and select
Control Panel.
3. Choose the drive to encrypt: Select the drive you want to encrypt
and click Turn On BitLocker. Note that BitLocker is available for
only specific editions of Windows, such as Windows 10 Pro or
Enterprise.
432
Chapter 6 Design and Deploy a Protect Solution: Part 3
6. Save the recovery key: Create a recovery key that can be used to
unlock the drive in case the password or smart card is lost or the
TPM fails.
8. Monitor the progress: The encryption process can take some time
to complete, depending on the size of the drive and the speed
of your computer. You can monitor progress by checking the
BitLocker status in the Control Panel.
Once BitLocker is enabled, you can manage it through the Control Panel or other
management tools. It is important to note that allowing BitLocker may impact the
performance of the VM, so you should test thoroughly before deploying to production.
Additionally, proper key management practices should be followed to ensure the
security of the encrypted data.
The following are the critical deployment considerations for Microsoft BitLocker:
433
Chapter 6 Design and Deploy a Protect Solution: Part 3
By considering these key deployment considerations, you can ensure that BitLocker
is properly deployed and configured for your organization’s security requirements.
Microsoft AppLocker
Microsoft AppLocker is a security feature available in Windows operating systems that
allows administrators to control which applications can run on a computer or network.
AppLocker helps organizations enforce security policies by restricting the execution of
unauthorized or malicious software while allowing authorized applications to run. It
is designed to help organizations enhance security and reduce the risk of malware or
other types of unauthorized software being introduced into the network. AppLocker
can be managed through Group Policy or PowerShell, allowing administrators to define
application rules based on file paths, digital signatures, or publisher names.
Microsoft AppLocker has four types of rules that can be created.
434
Chapter 6 Design and Deploy a Protect Solution: Part 3
• DLL rules: These rules are used to control the loading of dynamic link
libraries (DLLs), which are files that contain code that can be used by
multiple applications simultaneously.
By creating rules for these types of files, administrators can control which
applications are allowed to run on a computer or network, helping to enhance security
and reduce the risk of security threats.
The following are the key benefits of Microsoft AppLocker:
435
Chapter 6 Design and Deploy a Protect Solution: Part 3
Design Considerations
Here are some design best practices for Microsoft AppLocker:
436
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Use publisher rules where possible: Publisher rules are generally the
easiest and most effective way to create AppLocker rules, as they
allow administrators to create rules based on the digital signature of
an application. This can help to prevent unauthorized or malicious
software from running on the network.
How to Enable It
AppLocker is a feature that is only available in Windows operating systems, it is possible
to configure AppLocker policies on Windows VMs running in Azure. To configure
AppLocker policies on Windows VMs in Azure, you can follow these steps:
Note that the availability of AppLocker policies in Intune may vary depending on the
edition of Intune that you are using. AppLocker policies can also be centrally managed
using Group Policy or other management solutions such as Microsoft System Center
Configuration Manager.
Here are some key deployment considerations for AppLocker:
438
Chapter 6 Design and Deploy a Protect Solution: Part 3
441
Chapter 6 Design and Deploy a Protect Solution: Part 3
These are the Azure VNet security services that exist in the Microsoft cloud:
• NSGs: NSGs are an essential network security feature that allows you
to control traffic flow in and out of a virtual network in Azure. NSGs
can create inbound and outbound security rules to allow or deny
traffic based on source and destination IP address, port, and protocol.
• Azure private link: Azure Private Link is a service that allows you to
securely access services over a private endpoint within your virtual
network. It provides a private and secure connection between your
virtual network and Azure services such as Azure Storage, Azure SQL
Database, and Azure Kubernetes Service (AKS).
442
Chapter 6 Design and Deploy a Protect Solution: Part 3
These are just some of the Azure Virtual Network security services available in the
Microsoft cloud, and many others can be used to secure your virtual network.
Design Considerations
These are essential security design best practices for Azure Network Security:
• Use NSGs: NSGs filter inbound and outbound traffic to Azure resources,
providing an additional layer of security for your Azure network.
443
Chapter 6 Design and Deploy a Protect Solution: Part 3
• Monitor and audit your Azure Network: Use Azure Monitor and
Azure Log Analytics to collect and analyze logs and metrics from
your Azure resources, providing visibility into your Azure Network
security posture and helping you identify potential security threats
and vulnerabilities.
How to Enable It
To enable security for networks in the Microsoft Azure cloud, you can follow these steps:
444
Chapter 6 Design and Deploy a Protect Solution: Part 3
1. Open the Azure Portal and select the resource group that
contains the virtual network you want to secure.
445
Chapter 6 Design and Deploy a Protect Solution: Part 3
2. It’s important to note that NSGs are just one part of securing your
Azure network. It would help if you also considered implementing
other security measures such as Azure Firewall, Azure DDoS
Protection, and Azure VPN Gateway.
446
Chapter 6 Design and Deploy a Protect Solution: Part 3
447
Chapter 6 Design and Deploy a Protect Solution: Part 3
448
Chapter 6 Design and Deploy a Protect Solution: Part 3
6. Monitor and audit your Azure Network: Use Azure Monitor and
Azure Log Analytics to collect and analyze logs and metrics from
your Azure resources, providing visibility into your Azure Network
security posture and helping you identify potential security
threats and vulnerabilities. To enable Azure Monitor and Azure
Log Analytics, go to the Azure Portal, select your subscription, and
then select Monitor from the menu on the left.
1. To monitor and audit your Azure Network, you can use Azure
Network Watcher, a monitoring and diagnostic service for
Azure networking. Here are the steps to get started:
449
Chapter 6 Design and Deploy a Protect Solution: Part 3
2. Using these tools, you can monitor and audit your Azure Network to
identify issues, troubleshoot problems, and optimize performance.
450
Chapter 6 Design and Deploy a Protect Solution: Part 3
451
Chapter 6 Design and Deploy a Protect Solution: Part 3
Here are some mappings between the NIST CSF and Microsoft Defender for Identify:
Design Considerations
Microsoft Defender for Identify is a comprehensive security solution for identifying
and detecting threats in a network. Here are some design best practices for Microsoft
Defender for Identify:
• Plan your deployment: Before deploying Microsoft Defender
for Identify, carefully design the deployment based on your
organization’s needs and requirements.
452
Chapter 6 Design and Deploy a Protect Solution: Part 3
453
Chapter 6 Design and Deploy a Protect Solution: Part 3
How to Enable It
To enable Microsoft Defender for Identify, you need to follow these steps:
Note Before enabling Microsoft Defender for Identify, ensure that your
Active Directory environment is synchronized with Azure AD and that you have
appropriate permissions and licenses to use the service.
• Data protection: Ensure that data protection and privacy policies are
in place to comply with industry standards and regulations.
455
Chapter 6 Design and Deploy a Protect Solution: Part 3
Summary
In this chapter, you read about methods to design and deploy a strategy for protecting
security services in line with NIST CSF mapping of Azure services with regard to PR.IP.
In the book’s next chapter, you will read about designing and deploying detect
solutions in alignment with the NIST CSF.
456
CHAPTER 7
457
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_7
Chapter 7 Design and Deploy a Detect Solution
• Increased visibility: The right tools can provide deeper visibility into
an organization’s network, systems, and applications. This increased
visibility enables security teams to identify anomalies and events that
may indicate a potential security incident.
• Proactive threat hunting: The right tools can also enable proactive
threat hunting, where security teams actively search for potential
security incidents rather than waiting for them to be detected by
an alert.
458
Chapter 7 Design and Deploy a Detect Solution
The right tools to detect anomalies and events in cybersecurity are critical for
organizations because they provide the ability to identify and respond to potential
security incidents before they become significant problems. Here are some standard
cybersecurity detection tools and mechanisms:
459
Chapter 7 Design and Deploy a Detect Solution
These are just a few examples of the many cybersecurity detection tools and
mechanisms available. The most effective approach is often to use a combination of
tools and techniques to create a comprehensive and layered cybersecurity defense.
Here are some examples of corporations that have detected cybersecurity attacks
using Microsoft Azure Security tools:
460
Chapter 7 Design and Deploy a Detect Solution
The Detect function is broken down into several subcategories, including the
following:
Together, DE.AE, DE.CM, and DE.DP help organizations develop effective detection
strategies that promptly identify and respond to potential cybersecurity incidents before
they cause significant damage or data loss.
Organizations can enhance their cybersecurity posture and decrease the risk of
cybersecurity incidents by following the guidelines and best practices outlined in the
NIST CSF Detect function, shown in Figure 7-1.
Detect (DE)
461
Chapter 7 Design and Deploy a Detect Solution
Value of Azure NIST CSF Detect Adopting the NIST CSF Detect capabilities
can bring numerous benefits to an organization including improved detection of
security threats. By adopting the NIST CSF Detect capabilities, organizations can
establish more advanced threat detection and response mechanisms. They can
use the NIST guidelines to develop an effective cybersecurity posture capable of
detecting and mitigating a wide range of security threats.
464
Chapter 7 Design and Deploy a Detect Solution
465
Chapter 7 Design and Deploy a Detect Solution
Detect (DE)
DE.AE-1: User and system data flows are established and managed
based on a baseline of network operations
466
Chapter 7 Design and Deploy a Detect Solution
Detect (DE)
Microsoft Sentinel
Figure 7-3. Azure mapping to the Detect module of the NIST CSF
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 7-1 with respect to DE.AE.
467
Table 7-1. DE.AE Responsibility Matrix
468
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 7
References Responsibility
Anomalies and DE.AE-1:User and NIST SP 800-53 Customer The customer must establish N/A
Events (DE.AE): system data flows Rev. 4 AC-4, CA- Responsibility and manage network operations
Timely detection are established and 3, CM-2, SI-4 and expected data flows for
of abnormal managed based users and systems.
activity is made, on a baseline of
and the potential network operations
impact of events is DE.AE-2: Analyzing NIST SP 800-53 Shared To detect inappropriate or Multiple stages are
understood. detected events Rev. 4 AU-6, CA- unusual activity, the customer involved in Microsoft
reveals attack 7, IR-4, SI-4 must review and analyze the Azure’s incident
Design and Deploy a Detect Solution
469
Design and Deploy a Detect Solution
Chapter 7 Design and Deploy a Detect Solution
Azure Sentinel
As mentioned, Azure Sentinel is a cloud-native SIEM solution that enables organizations
to collect, analyze, and respond to security events in real time. It is a scalable, flexible,
and cost-effective solution that provides unified visibility across an organization’s entire
IT environment, including on-premises, cloud, and hybrid environments.
Key features of Azure Sentinel include the following:
Azure Sentinel also offers a range of detection capabilities for the Azure cloud that
enable organizations to monitor, detect, and respond to potential security threats. These
capabilities include the following:
470
Chapter 7 Design and Deploy a Detect Solution
Azure Sentinel works to detect anomalies and events through a combination of data
ingestion, analytics, and alerting.
• Data ingestion: Azure Sentinel ingests data from various sources such
as Azure Activity Logs, Azure Security Center alerts, Azure Firewall
logs, or any third-party sources. This data is then normalized and
stored in a central location for further analysis.
471
Chapter 7 Design and Deploy a Detect Solution
In addition to data ingestion, analytics, and alerting, Azure Sentinel provides tools
for investigating and triaging incidents. Organizations can also define playbooks to
automate the response to a specific type of security incident.
Azure Sentinel works by ingesting data from various sources, analyzing it using
machine learning and behavioral analytics, and alerting organizations to potential
security threats. Using Azure Sentinel, organizations can improve their security posture
and quickly respond to potential security incidents.
Azure Sentinel provides various detection capabilities to help organizations detect
and respond to potential security threats. These capabilities include the following:
472
Chapter 7 Design and Deploy a Detect Solution
Azure Sentinel offers a variety of ways to detect anomalies and events in real time.
Here are some tips to detect anomalies and events using Azure Sentinel:
473
Chapter 7 Design and Deploy a Detect Solution
Design Considerations
The following are the key best practices for designing a Azure Sentinel solution to detect
anomalies and events:
474
Chapter 7 Design and Deploy a Detect Solution
How to Enable It
Enabling Azure Sentinel to detect anomalies and events involves the following steps:
475
Chapter 7 Design and Deploy a Detect Solution
To enable Azure Sentinel to detect anomalies and events, it is essential to ensure data
sources are properly connected and that analytics rules are configured appropriately. It
is also necessary to define alert workflows and incident response playbooks to ensure
that alerts are handled effectively. By following these steps, organizations can improve
their security posture and quickly respond to potential security threats.
476
Chapter 7 Design and Deploy a Detect Solution
477
Chapter 7 Design and Deploy a Detect Solution
respond to security threats more quickly. By integrating security into the development
process, security issues can be identified and remediated earlier, reducing the risk of a
security breach.
DevSecOps also helps to improve collaboration between development, security, and
operations teams. By breaking down the silos between these teams, organizations can
create a culture of shared responsibility for security, which results in a more secure and
resilient application or infrastructure.
To implement DevSecOps successfully, organizations need to adopt several best
practices.
• Use best-of-breed tools: Use the best tools and technologies available
for security testing and monitoring and integrate them into the
development pipeline.
478
Chapter 7 Design and Deploy a Detect Solution
• Static code analysis: The team uses a static code analysis tool to scan
the code for potential security issues. The tool checks for common
security vulnerabilities such as SQL injection, cross-site scripting
(XSS), and buffer overflow.
• Dynamic code analysis: The team also uses an active code analysis
tool to test the application in a simulated production environment.
This tool checks for vulnerabilities such as weak authentication,
access control issues, and insecure configuration.
479
Chapter 7 Design and Deploy a Detect Solution
Continuous monitoring enables the team to quickly identify and remediate security
issues, reducing the risk of a security breach. It also helps to ensure that security is
integrated into every aspect of the development process, creating a more secure and
resilient application.
480
Chapter 7 Design and Deploy a Detect Solution
By using these Azure services for DE.CM, organizations can proactively detect and
respond to security threats and vulnerabilities, ensuring the security and compliance of
their Azure environments.
Figure 7-4 depicts the subcategories of DE.CM in relation to the Detect module of the
NIST CSF.
Security Continuous
Monitoring (DE.CM)
Security Continuous
Monitoring (DE.CM)
Azure Monitor
Microsoft AD Conditional
Access
Azure Policy
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 7-2 with respect to DE.CM.
481
Table 7-2. DE.CM Responsibility Matrix
482
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 7
References Responsibility
Security Continuous DE.CM-1: The NIST SP 800-53 Shared Customers who use Microsoft Azure logs security-
Monitoring (DE.CM): network is Rev. 4 AC-2, AU- a non-Microsoft relevant events on its servers,
The information monitored to 12, CA-7, CM-3, Azure-provided which act as monitoring devices.
system and assets detect potential SC-5, SC-7, SI-4 operating system Azure monitors all hosts in the
are monitored at cybersecurity image are responsible environment and sends alarms
discrete intervals to events for scanning for to security team members and
identify cybersecurity vulnerabilities within contingent workers.
events and verify that operating system.
the effectiveness of
Design and Deploy a Detect Solution
protective measures.
483
Design and Deploy a Detect Solution
Table 7-2. (continued)
484
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 7
References Responsibility
DE.CM-4: NIST SP 800-53 Shared The customer must Malicious code is detected
Malicious code is Rev. 4 SI-3 use malicious using antivirus software in
detected code detection Microsoft Azure. These tools
mechanisms. use signature-based detection
mechanisms and behavior
monitoring, network inspection,
and heuristics to detect
malicious code that signature-
based detection may miss.
Design and Deploy a Detect Solution
485
Design and Deploy a Detect Solution
Table 7-2. (continued)
486
Category Subcategory Informative Responsibility Customer Microsoft Azure Responsibility
Chapter 7
References Responsibility
Azure Monitor
Azure Monitor is a monitoring solution provided by Microsoft Azure, designed to collect
and analyze telemetry data from various sources, including applications, infrastructure,
and network services.
In terms of cybersecurity incident detection, Azure Monitor provides a range of
features and capabilities that can help security teams detect and respond to security
incidents.
For example, Azure Monitor can collect and analyze logs and events from Azure
resources, such as virtual machines, databases, storage accounts, and on-premises
resources, using agents and connectors. It also integrates with Azure Security Center,
a unified security management solution, to provide additional security insights and
recommendations.
Azure Monitor also includes features like alerting and notifications, which can be
used to trigger automated responses or manual investigations when specific events or
conditions are detected. This can help security teams quickly identify and respond to
potential security incidents.
Overall, Azure Monitor is a powerful tool for monitoring and detecting security
incidents in Azure and hybrid environments, providing visibility and insights into the
security posture of an organization’s infrastructure and applications.
Here are some key benefits of Azure Monitor in terms of cloud security:
• Centralized monitoring: Azure Monitor provides a centralized
platform for monitoring and analyzing security-related events and
logs across all Azure services and resources.
• Real-time alerts: Azure Monitor can detect security incidents in real-
time and trigger alerts or notifications to the security team, enabling
them to respond quickly to potential threats.
• Automated responses: Azure Monitor can be integrated with Azure
Logic Apps or Azure Functions to automate responses to security
incidents, such as shutting down a compromised resource or
initiating an investigation.
• Advanced analytics: Azure Monitor includes powerful analytics
capabilities that help security teams identify patterns and trends
in security events, providing insights into potential threats and
vulnerabilities.
487
Chapter 7 Design and Deploy a Detect Solution
Azure Monitor can help organizations implement and improve their cybersecurity
posture by supporting the CSF’s Detect capabilities, which include the following
functions:
488
Chapter 7 Design and Deploy a Detect Solution
Design Considerations
Here are some Azure Monitor security design best practices for the Detect category:
• Identify critical assets and services: Identify critical assets and services
that need to be monitored and configure Azure Monitor to collect
telemetry data from those resources.
489
Chapter 7 Design and Deploy a Detect Solution
How to Enable It
To enable Azure Monitor to detect security incidents, follow these general steps:
In addition to these steps, it’s essential to regularly review and analyze security-
related data and events in Azure Monitor to identify potential threats and vulnerabilities
and to implement security measures to prevent or mitigate them proactively. By
following these steps and best practices, organizations can enable Azure Monitor to
detect and respond to security incidents effectively.
490
Chapter 7 Design and Deploy a Detect Solution
• Log collection and analysis: Azure Monitor can collect and analyze
logs from Azure services and resources, including operating system
logs, application logs, and Azure service logs. This enables security
teams to identify potential security threats and anomalies, such as
failed logins, unusual user behavior, or suspicious network traffic.
491
Chapter 7 Design and Deploy a Detect Solution
Key Insights of Azure Monitor When writing this book, Azure Monitor
processes more than 5 trillion data points per day. Azure Monitor is integrated
with more than 100 Azure services. Azure Monitor provides insights into more
than 20 different Azure resource types. Azure Monitor has more than 50 prebuilt
monitoring solutions, such as Azure Active Directory, Azure SQL Database, and
Azure Kubernetes Service. Azure Monitor supports more than 10 data sources,
including log data, metrics data, and application insights. Azure Monitor can
trigger alerts based on metrics, logs, and custom queries. Azure Monitor provides
real-time dashboards that can be customized to show the most critical data to
the user. Azure Monitor supports integration with third-party tools and services
like PagerDuty, ServiceNow, and Slack. Azure Monitor provides built-in analytics
capabilities like log search, alerts, and queries. Azure Monitor is scalable and can
monitor resources in small to large-scale enterprise environments.
492
Chapter 7 Design and Deploy a Detect Solution
Azure AD Conditional Access can help organizations meet the Detect function of
the NIST CSF by providing capabilities to detect cybersecurity incidents and abnormal
behavior.
Here are some ways in which Azure AD Conditional Access can help with the Detect
function:
493
Chapter 7 Design and Deploy a Detect Solution
How It Works
The user attempts to access a resource, and the user requests a cloud resource, such as
an application, file, or email. Then the following steps happen:
Design Considerations
Here are some design best practices for implementing Azure AD Conditional Access:
• Use MFA: Require MFA for all access attempts, particularly for
privileged accounts or sensitive data.
• Use Azure AD Identify Protection: Enable Azure AD Identify
Protection to detect and respond to potential identify-based attacks,
such as password spray or brute-force attacks.
494
Chapter 7 Design and Deploy a Detect Solution
How to Enable It
Azure AD can be used for various identify and access management (IAM) scenarios.
Here are some common use cases for Azure AD:
495
Chapter 7 Design and Deploy a Detect Solution
Overall, Azure AD is a robust identify and access management solution that can
secure cloud and hybrid environments, streamline access management, and provide
users with a seamless authentication experience. To enable Azure AD Conditional
Access, follow these steps:
496
Chapter 7 Design and Deploy a Detect Solution
10. Once the policy is enabled, it will be enforced for the specified
users and applications. You can create multiple policies for
different scenarios and applications as needed.
497
Chapter 7 Design and Deploy a Detect Solution
Some key features of Microsoft Defender for Cloud include the following:
Here are some ways Microsoft Defender for Cloud can help organizations meet the
NIST CSF Detect function:
499
Chapter 7 Design and Deploy a Detect Solution
Overall, Microsoft Defender for Cloud provides robust security capabilities for
detecting security incidents across cloud environments. It is designed to provide
continuous monitoring and detection to help organizations avoid potential security
threats.
Design Considerations
Here are some design security practices for Microsoft Defender for Cloud:
500
Chapter 7 Design and Deploy a Detect Solution
How to Enable It
Microsoft Defender for Cloud provides a range of use cases to help organizations secure
their cloud environments. Some of the critical use cases include:
By providing these use cases, Microsoft Defender for Cloud helps organizations
improve the security of their cloud environment and reduce the risk of security incidents
and breaches.
501
Chapter 7 Design and Deploy a Detect Solution
502
Chapter 7 Design and Deploy a Detect Solution
Key Insights of Microsoft Defender for Cloud Microsoft Defender for Cloud is
a powerful security solution that offers advanced threat protection, visibility and
control, and automation and orchestration capabilities. Its integration with other
Microsoft products makes it a comprehensive security solution that can help
organizations stay protected against sophisticated threats. It also provides a range
of capabilities, including vulnerability management and compliance assessment.
Microsoft Defender for Cloud’s threat detection and response is a set of capabilities
that help detect, investigate, and remediate threats across your organization’s
cloud environments. It provides a unified view of security across your cloud
resources, enabling you to quickly identify potential security incidents and take
appropriate action to mitigate them.
503
Chapter 7 Design and Deploy a Detect Solution
Microsoft Cloud for Endpoint helps organizations improve their endpoint security
posture and reduce the risk of cyber threats and attacks on their devices and endpoints.
Microsoft Cloud for Endpoint can help organizations achieve the Detect function of the
NIST CSF in several ways.
504
Chapter 7 Design and Deploy a Detect Solution
In summary, Microsoft Cloud for Endpoint can help organizations achieve the
Detect function of the NIST CSF by providing real-time detection and response
capabilities, threat intelligence, risk-based vulnerability management, and integration
with other Microsoft security solutions.
Design Considerations
Here are some design security practices for Microsoft Defender for Endpoint:
505
Chapter 7 Design and Deploy a Detect Solution
506
Chapter 7 Design and Deploy a Detect Solution
How to Enable It
Here are some everyday use cases for Microsoft Defender for Endpoint:
507
Chapter 7 Design and Deploy a Detect Solution
508
Chapter 7 Design and Deploy a Detect Solution
By following these steps, organizations can enable Microsoft Defender for Endpoint
to detect security incidents quickly and efficiently and take appropriate remediation
actions to protect against cyber threats.
Azure Policy
Azure Policy is a service in Microsoft Azure that allows organizations to create, assign,
and manage policies to enforce compliance with organizational standards and
regulatory requirements. It provides a centralized, scalable, and flexible way to apply
governance across Azure resources, ensuring that they meet specific requirements
related to security, compliance, and operational best practices.
These are the key features of Azure Policy:
509
Chapter 7 Design and Deploy a Detect Solution
To implement policies aligned with the NIST CSF using Azure Policy, organizations
should follow these steps:
By implementing Azure Policy and enforcing policies aligned with the NIST CSF,
organizations can ensure that their Azure resources meet specific security, compliance,
and operational requirements, reducing the risk of cyber threats and improving overall
governance across their Azure environment.
510
Chapter 7 Design and Deploy a Detect Solution
511
Chapter 7 Design and Deploy a Detect Solution
• Enforce MFA: Implement a policy that requires MFA for Azure Active
Directory users. This policy can help prevent unauthorized access to
Azure resources.
How to Enable It
Here are some use cases for Azure Policy:
512
Chapter 7 Design and Deploy a Detect Solution
Azure Policy is a powerful tool for enforcing compliance, security, cost management,
and resource management policies in Azure. By following best practices and enabling
policies that align with organizational goals, organizations can ensure that their Azure
resources are being used to maximize efficiency, compliance, and security.
513
Chapter 7 Design and Deploy a Detect Solution
514
Chapter 7 Design and Deploy a Detect Solution
515
Chapter 7 Design and Deploy a Detect Solution
516
Chapter 7 Design and Deploy a Detect Solution
517
Chapter 7 Design and Deploy a Detect Solution
Overall, these Azure services can help organizations implement robust detection
processes that enable them to detect and respond to security threats promptly and
efficiently. By leveraging these services, organizations can improve their cybersecurity
posture and protect their valuable digital assets.
518
Chapter 7 Design and Deploy a Detect Solution
Here are some ways in which Azure services can map to the NIST CSF DE. DP
category:
519
Chapter 7 Design and Deploy a Detect Solution
Figure 7-5 depicts the subcategories of DE. DP, against the Detect module of the
NIST CSF.
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 7-3 with respect to DE. DP.
520
Table 7-3. DE. DP Responsibility Matrix
Category Subcategory Informative Responsibility Customer Microsoft Azure
References Responsibility Responsibility
521
Design and Deploy a Detect Solution
Table 7-3. (continued)
522
Category Subcategory Informative Responsibility Customer Microsoft Azure
Chapter 7
DE.DP-3: Detection NIST SP 800-53 Shared Customers are Microsoft Azure reviews and
processes are Rev. 4 CA-2, responsible for testing updates the detection settings
tested CA-7, PE-3, their event detection for anomalous events annually.
PM-14, SI-3, processes. Changes to the detection settings
SI-4 are developed, tested, and
approved before entering the
production environment.
DE.DP-4: Event NIST SP 800-53 Shared The customer is According to federal regulatory
detection Rev. 4 AU-6, responsible for requirements for incident
Design and Deploy a Detect Solution
523
Design and Deploy a Detect Solution
Chapter 7 Design and Deploy a Detect Solution
524
Chapter 7 Design and Deploy a Detect Solution
525
Chapter 7 Design and Deploy a Detect Solution
For example, let’s say a user attempts to sign in to their Azure AD account from a new
device in a foreign country. This activity may trigger a risk event in Azure AD Identify
Protection, as it’s an unusual sign-in location for the user.
Azure AD Identify Protection will calculate a risk score based on various factors, such
as the user’s activity history, the location of the sign-in attempt, and the device used.
If the risk score is high, Azure AD Identify Protection can enforce a Conditional Access
policy, such as requiring MFA for the user.
In addition, Azure AD Identify Protection will provide recommendations on how to
remediate the potential risk, such as blocking the user’s account or requiring a password
reset. This helps organizations proactively protect their critical data and resources from
unauthorized access.
Here are some examples of how Azure AD Identify Protection can map to the NIST
CSF Detect function:
526
Chapter 7 Design and Deploy a Detect Solution
Design Considerations
Here are some security design practices for Azure AD Identify Protection:
These are just a few security design practices that can be implemented when using
Azure AD Identify Protection. Organizations should also consider industry-specific
regulations and compliance requirements when designing security practices.
How to Enable It
Azure AD Identify Protection provides several use cases to protect identities and detect
potential security risks. The following are some of the use cases of Azure AD Identify
Protection:
3. Click the Getting Started button and follow the prompts to set up
Azure AD Identify Protection.
529
Chapter 7 Design and Deploy a Detect Solution
530
Chapter 7 Design and Deploy a Detect Solution
The following are some of the key elements of Microsoft Defender ATP:
531
Chapter 7 Design and Deploy a Detect Solution
How It Works
Here’s how Microsoft Defender ATP works:
532
Chapter 7 Design and Deploy a Detect Solution
Microsoft Defender ATP aligns with the NIST CSF Detect function by providing a
range of capabilities that help organizations detect potential security incidents. Some
of the key capabilities of Microsoft Defender ATP, which map to the NIST CSF Detect
function, are as follows:
• EDR: Microsoft Defender ATP provides real-time visibility into
endpoint activity and alerts security teams to potential threats. It uses
machine learning and behavioral analytics to detect and respond
to advanced threats that may go undetected by traditional antivirus
solutions.
• Threat intelligence: Microsoft Defender ATP uses threat intelligence
from Microsoft’s global network of sensors to provide real-time
insights into emerging threats. It also integrates with third-party
threat intelligence feeds to provide additional context and insights
into potential threats.
• Automated investigation and response: Microsoft Defender ATP
includes automated investigation and response capabilities to help
security teams quickly triage and respond to potential threats. It uses
machine learning to identify and prioritize potential threats and can
automatically contain and remediate threats as they are detected.
533
Chapter 7 Design and Deploy a Detect Solution
Design Considerations
Here are some security design best practices for Microsoft Defender ATP:
• Use machine learning and AI: Microsoft Defender ATP uses advanced
machine learning and AI technologies to identify potential threats
and anomalous behavior. Utilize these technologies to detect and
respond to threats in real time.
534
Chapter 7 Design and Deploy a Detect Solution
535
Chapter 7 Design and Deploy a Detect Solution
How to Enable It
Here are some use cases for Microsoft Defender ATP:
536
Chapter 7 Design and Deploy a Detect Solution
537
Chapter 7 Design and Deploy a Detect Solution
538
Chapter 7 Design and Deploy a Detect Solution
In addition to these services, the Microsoft Red Team provides ongoing support to
organizations to help them maintain a strong security posture. This includes regular
security assessments, vulnerability scans, and ongoing monitoring and analysis of the
organization’s network and systems.
To ensure the effectiveness of its services, the Microsoft Red Team employs various
tools and techniques, including custom-built tools and frameworks, open-source tools,
and commercial security products. The team also works closely with other security
teams within Microsoft, including the Microsoft Security Response Center, to stay up-to-
date on the latest threats and vulnerabilities.
The Microsoft Red Team is a valuable resource for organizations looking to improve
their security posture and protect against cyber threats. Its services help organizations
identify vulnerabilities, develop strategies to address them and maintain a strong
security posture over time.
Microsoft does not officially offer a Red Team service as a part of its standard
products or services. However, Microsoft employs its own internal Red Team to help
identify and mitigate security risks in its products and services. Additionally, Microsoft
offers services and tools organizations can use to establish their own red teams. Some of
these offerings include the following:
539
Chapter 7 Design and Deploy a Detect Solution
Organizations can leverage these offerings to establish their own red teams or
enhance their existing red team capabilities. By using Microsoft’s tools and services,
organizations can more effectively identify and respond to security threats and
proactively identify and mitigate security risks.
Summary
In this chapter, you read about methods to design and deploy a strategy for detect
security services in line with NIST CSF’s mapping of Azure services in with regard to
DE.AE, DE.CM, and DE. DP.
In the next chapter of the book, you will read about designing and deploying a
respond solution in alignment with the NIST CSF.
540
CHAPTER 8
• Communications (RS.CO)
• Analysis (RS.AN)
• Mitigation (RS.MI)
541
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3_8
Chapter 8 Design and Deploy a Respond Solution
542
Chapter 8 Design and Deploy a Respond Solution
543
Chapter 8 Design and Deploy a Respond Solution
• Recovery: After the incident has been eradicated, the next step is to
recover normal operations. This could involve restoring data and
systems, verifying the integrity of the restored data, and ensuring that
all systems are functioning correctly.
1. Assess the situation: Assess the severity and scope of the incident,
and identify affected systems and data. Determine if the incident
is ongoing and, if so, contain the threat to prevent further damage.
544
Chapter 8 Design and Deploy a Respond Solution
Respond (RS)
545
Chapter 8 Design and Deploy a Respond Solution
By implementing the NIST CSF Respond module, organizations can achieve the
following:
Value of Azure NIST CSF Respond Adopting the NIST CSF Respond capabilities
can bring numerous benefits to an organization including Improved response
to security threats. The value of the NIST CSF Respond module lies in its ability
to provide organizations with a structured approach to incident response. This
framework helps organizations develop and implement an effective incident
response plan to protect their systems and data from cyberattacks.
546
Chapter 8 Design and Deploy a Respond Solution
547
Chapter 8 Design and Deploy a Respond Solution
1. Isolate the affected system: The first step is isolating the affected
system from the network to prevent the attacker from accessing
additional data. This step involves identifying the systems that have
been compromised and disconnecting them from the network.
549
Chapter 8 Design and Deploy a Respond Solution
The financial institution can effectively respond to the security incident and mitigate
any potential damage by following these steps. The incident response plan is a critical
component of the NIST CSF, as it ensures that the organization is prepared to respond to
incidents promptly and effectively.
550
Chapter 8 Design and Deploy a Respond Solution
Preparation
The preparation part of the response plan involves the development of policies,
procedures, and other documentation to guide the response to cybersecurity incidents.
Azure offers several services that can support this function, including the following:
551
Chapter 8 Design and Deploy a Respond Solution
Azure offers several services that can support this function, including the following:
Post-Incident Activity
The post-incident activity function of the response plan involves reviewing the response
to a security incident and identifying areas for improvement. Azure offers several
services that can support this function, including the following:
552
Chapter 8 Design and Deploy a Respond Solution
Respond (RS)
Azure provides several security capabilities that align with the NIST CSF Respond
(RS) category. Azure Security Center offers incident response capabilities to help
organizations investigate and respond to security incidents. It provides incident
management and tracking features, allowing security teams to manage and coordinate
their response efforts centrally. It also offers built-in integration with popular SIEM
solutions for streamlined incident response workflows.
Figure 8-3 depicts the subcategories of mapping Azure services to the Respond
module of the NIST CSF.
553
Chapter 8 Design and Deploy a Respond Solution
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 8-1 with respect to Response Planning RS.RP.
554
Table 8-1. RS.RP Responsibility Matrix
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
References Responsibility
Response RS.RP-1: NIST SP 800-53 Customer After or during an incident, the customer N/A
Planning (RS. Response plan is Rev. 4 CP-2, Responsibility implements incident response plans.
RP): Response executed during CP-10, IR-4, IR-8 The customer must consider any shared
processes and or after an event touchpoints included within the customer’s
procedures are authorization boundary and any customer
executed and applications that use the provider’s
maintained, to infrastructure. Additionally, unless the
ensure timely incident is caused by Microsoft or as a
response result of a Microsoft action, the customer
to detected is responsible for response planning for
cybersecurity customer applications. Microsoft will inform
Chapter 8
555
Design and Deploy a Respond Solution
Chapter 8 Design and Deploy a Respond Solution
556
Chapter 8 Design and Deploy a Respond Solution
557
Chapter 8 Design and Deploy a Respond Solution
558
Chapter 8 Design and Deploy a Respond Solution
In addition to these key steps, Azure also provides a range of best practices and
recommendations to help customers prevent security incidents from occurring in the
first place. This includes guidance on implementing strong access controls, securing
data in transit and at rest, and regularly patching and updating software and systems.
Preparation
Recovery Identification
Eradication Containment
559
Chapter 8 Design and Deploy a Respond Solution
Microsoft recommends that organizations follow the NIST CSF to guide their
incident response planning and execution. Additionally, Microsoft provides various
tools and services to assist organizations with incident response, including the Microsoft
Intelligent Security Graph, which provides threat intelligence and real-time insights into
security incidents.
Table 8-2 can be used as a checklist to prepare your security operations center (SOC)
to respond to cybersecurity incidents using Microsoft security incident planning.
560
Chapter 8 Design and Deploy a Respond Solution
Preparation:
Consider conducting periodic tabletop exercises of foreseeable business-impacting cyber incidents
that force your organization’s management to examine difficult risk-based decisions.
Microsoft recommends that organizations take the following steps to prepare for security incidents:
1.
Establish an incident response team: Establish a dedicated team with clear
roles and responsibilities. This team should include representatives from IT,
security, legal, and other key areas of the organization.
2.
Develop an incident response plan: Develop a comprehensive incident
response plan that covers all phases of incident response, from detection and
containment to eradication and recovery. The plan should be reviewed and
updated regularly to remain relevant and effective.
3.
Perform regular training and testing: Provide regular training to incident
response team members to ensure they know their roles and responsibilities.
Conduct regular tabletop exercises to test the incident response plan and
identify areas for improvement.
4.
Establish communication and escalation procedures: Establish clear
communication and escalation procedures for incident response. This includes
identifying key stakeholders, establishing lines of communication, and defining
escalation procedures in the event of a major incident.
5.
Implement security controls: Implement security controls, such as access
controls, firewalls, and intrusion detection systems (IDSs), to prevent security
incidents from occurring in the first place. Regularly review and update these
controls to ensure that they remain effective.
By following these steps, organizations can prepare themselves to respond effectively to security
incidents. Adequate preparation is a critical part of incident response and can help organizations
minimize the impact of security incidents and quickly return to normal operations.
(continued)
561
Chapter 8 Design and Deploy a Respond Solution
Establish an incident response team Identify members, roles, and responsibilities. Establish
escalation procedures.
Develop an incident response plan Create a plan that covers all phases of incident response.
Review and update the plan regularly.
Perform regular training and testing Train incident response team members on their roles and
responsibilities. Conduct tabletop exercises to test the
incident response plan.
Identification:
Microsoft recommends that organizations take the following steps to identify potential security
incidents:
1.
Implement monitoring tools: Implement monitoring tools, such as IDSs, SIEM
solutions, and endpoint detection and response (EDR) software, to detect and
alert on potential security incidents.
2.
Establish alert thresholds: Establish alert thresholds for the monitoring tools to
detect potential incidents promptly. The thresholds should be set based on the
organization’s risk profile and the specific threats.
3.
Conduct regular security assessments: Conduct regular security assessments
to identify vulnerabilities and potential attack vectors. These assessments
can involve vulnerability scans, penetration testing, and other techniques to
identify weaknesses in the organization’s security posture.
4.
Analyze system logs: Analyze system logs and other data sources to detect
unusual activity that may indicate a security incident. This can involve
reviewing logs from firewalls, servers, network devices, and other sources to
identify anomalies or suspicious activity.
5.
Use threat intelligence: Use threat intelligence to identify potential threats and
understand the tactics, techniques, and procedures (TTPs) used by attackers.
This can involve commercial threat intelligence services, open-source
intelligence (OSINT), and internal threat intelligence sources.
(continued)
562
Chapter 8 Design and Deploy a Respond Solution
By following these steps, organizations can improve their ability to detect and identify potential
security incidents. Effective identification is critical to incident response and can help organizations
respond more quickly and effectively to security incidents.
Detect potential security incidents Use monitoring tools to detect anomalies, unusual
behavior, and suspicious activity. Establish thresholds and
alerts for unusual events.
Gather information Collect and analyze data from multiple sources to
determine if an incident has occurred. Use tools such as
log analysis, network traffic analysis, and EDR solutions.
Containment:
Microsoft recommends that organizations take the following steps to contain security incidents:
1.
Isolate affected systems: Immediately isolate affected systems from the
network to prevent the incident from spreading. This can be done by
disconnecting the affected system from the network or by configuring
firewalls and access controls to restrict network traffic to and from the
affected system.
2.
Implement network segmentation: Implement network segmentation to
limit the attacker’s movement within the network. This involves dividing the
network into smaller, isolated segments and restricting access between them.
This can help prevent the attacker from moving laterally and accessing other
network parts.
563
Chapter 8 Design and Deploy a Respond Solution
4. D
eploy endpoint protection solutions: Deploy endpoint protection solutions,
such as EDR software, to detect and block malicious activity on endpoints.
These solutions can help detect and stop malware, ransomware, and other
threats before they can cause damage to the system or spread to other
endpoints on the network.
5. M
onitor for further activity: Continuously monitor the affected systems and
network for different activities related to the incident. This can involve using
IDS, SIEM solutions, and other monitoring tools to detect and alert any further
malicious activity.
By following these steps, organizations can prevent security incidents from spreading to other
parts of the network or causing further damage. Effective containment is a critical part of incident
response and can help minimize the impact of security incidents on the organization.
Limit the impact of the incident Take immediate steps to isolate affected systems and
prevent the incident from spreading. Implement network
segmentation and access controls to restrict the attacker’s
movement.
Eradication:
Microsoft recommends that organizations take the following steps to eradicate security incidents:
1.
Identify and remove malware: Identify and remove any malware that may
be present on the affected system or network. This can involve using anti-
malware software, manual removal techniques, or a combination of both.
2.
Patch vulnerabilities: Patch any vulnerabilities the attacker exploited to
access the system or network. This can involve applying software updates,
configuring access controls, or other techniques to address the incident’s root
cause.
(continued)
564
Chapter 8 Design and Deploy a Respond Solution
3.
Reset credentials: Reset any compromised credentials, such as passwords
or access tokens; the attacker may have used that to access the system or
network. This can involve forcing users to reset their passwords, revoking
access tokens, or other techniques to prevent further unauthorized access.
4.
Conduct forensic analysis: Conduct a forensic analysis of the affected system
or network to identify the scope of the incident and any other systems or data
that may have been compromised. This can involve reviewing logs, analyzing
memory dumps, and other techniques to identify the attacker’s actions and
determine the extent of the damage.
5.
Verify system integrity: Verify the integrity of the affected system or network
to ensure that all malicious code has been removed and the system is secure.
This can involve running anti-malware scans, reviewing logs, and conducting
other tests to ensure the system is free from further compromise.
By following these steps, organizations can eradicate security incidents and ensure their systems
and data are secure. Effective eradication is a critical part of incident response and can help prevent
further damage from occurring.
Eliminate the cause of the incident Identify and remove any malware, backdoors, or other
malicious software. Use antivirus software, threat hunting
tools, and malware analysis techniques to identify and
eradicate the threat.
Ensure all affected systems are clean Verify that all systems are free of malware and have the
and secure latest security updates and patches installed. Conduct
vulnerability scans to identify and remediate any
weaknesses.
(continued)
565
Chapter 8 Design and Deploy a Respond Solution
Recovery:
Microsoft recommends that organizations take the following steps to recover from security incidents:
1.
Restore data and systems: Restore any data or systems affected by the
incident. This can involve using backups, snapshots, or other techniques to
restore data to its pre-incident state.
2.
Monitor systems: Monitor systems and data to ensure the incident has
been fully resolved and no further damage has occurred. This can involve
monitoring tools, such as IDS and SIEM solutions, to detect further incidents.
3.
Conduct post-incident review: Conduct a post-incident review to identify
the incident’s root cause and any areas for improvement. This can involve
reviewing logs, conducting interviews with stakeholders, and analyzing other
data sources to determine the cause of the incident.
4.
Update incident response plan: Update the incident response plan based on
the lessons learned from the incident. This can involve updating procedures,
adding new tools or technologies, or making other changes to improve the
organization’s ability to respond to future incidents.
5.
Communicate with stakeholders: Communicate with stakeholders, such as
customers, partners, and employees, to inform them of the incident and
the steps taken to address it. This can involve providing regular updates,
answering questions, and addressing stakeholders’ concerns.
By following these steps, organizations can recover from security incidents and ensure their
systems and data are secure. Effective recovery is a critical part of incident response and can help
organizations minimize the impact of incidents on their business operations and reputation.
(continued)
566
Chapter 8 Design and Deploy a Respond Solution
Restore normal operations Gradually bring systems back online and verify that they
are functioning as expected. Reconfigure any settings or
policies that were changed during the incident.
Ensure all affected systems are fully Conduct post-incident testing to ensure that all systems
functional are functioning properly and there are no residual effects
of the incident. Review and update incident response plan
and procedures based on lessons learned.
567
Chapter 8 Design and Deploy a Respond Solution
568
Chapter 8 Design and Deploy a Respond Solution
Communications (RS.CO)
RS.CO Communications is one of the subcategories within the NIST CSF Respond
category. (RS.CO also stands for Response Coordination, so here we’ll be specific by
using “RS.CO Communications.”) It is focused on establishing communication plans and
processes that enable effective communication and coordination among stakeholders
during and after a cybersecurity incident. This subcategory includes the development
of communication protocols, procedures, and contact lists, as well as regular
communication drills and exercises to ensure that stakeholders are familiar with their
roles and responsibilities in the event of a cybersecurity incident.
Effective communication during a cybersecurity incident is critical to minimizing
damage and restoring normal operations as quickly as possible. Communication plans
should be designed to ensure that all necessary parties are informed about the incident
promptly and accurately, including incident response teams, senior management,
employees, customers, partners, and relevant authorities.
569
Chapter 8 Design and Deploy a Respond Solution
The RS.CO Communications process typically involves the following key steps:
The following are the key best practices for RS.CO Communications:
570
Chapter 8 Design and Deploy a Respond Solution
571
Chapter 8 Design and Deploy a Respond Solution
The RS.CO framework consists of four phases: Prepare, Detect, Respond, and
Recover. Each phase includes specific steps and activities organizations can take
to improve their security posture and enhance their incident response capabilities.
Organizations establish the foundation for effective incident response in the Prepare
phase by defining policies, procedures, and communication plans. They also conduct
risk assessments and identify critical assets and data that must be protected.
Organizations implement monitoring and alerting systems in the Detect phase
to detect potential security incidents. They also establish incident response teams
and procedures for investigating and responding to incidents. In the Respond phase,
organizations take immediate action to contain and mitigate the impact of the incident.
This includes investigating the incident, identifying the root cause, and preventing
further damage. In the Recover phase, organizations restore normal operations and
assess the effectiveness of their incident response process. They also take steps to
improve their security posture and prevent similar incidents from occurring in the future.
Effective incident response requires coordination and collaboration between
internal and external stakeholders, including law enforcement agencies. Microsoft
Azure’s incident response process includes procedures for working with law
enforcement agencies to investigate and respond to security incidents.
In this context, law enforcement agencies can provide valuable support and
expertise in investigating and prosecuting cybercriminals. They can also help to identify
and mitigate potential threats to public safety and critical infrastructure. The process
of coordinating with law enforcement agencies typically begins during the preparation
phase of the incident response process. During this phase, organizations establish
communication plans and protocols for working with external stakeholders, including
law enforcement agencies.
One of the key considerations in this phase is to identify the appropriate law
enforcement agency to work with, based on the type and severity of the incident. For
example, in the case of a cyberattack involving financial fraud, organizations may work
with the Federal Bureau of Investigation (FBI) or the Secret Service. In the case of a
national security threat, organizations may work with the Department of Homeland
Security (DHS) or the National Security Agency (NSA).
Once the appropriate law enforcement agency has been identified, organizations can
begin to establish communication channels and protocols for working with them. This
typically involves identifying key points of contact within the law enforcement agency and
establishing procedures for sharing information and coordinating response activities.
572
Chapter 8 Design and Deploy a Respond Solution
During the detection and response phases of the incident response process,
organizations may work closely with law enforcement agencies to investigate and
respond to security incidents. This may involve sharing information about the incident,
providing access to systems and data for forensic analysis, and coordinating response
activities to prevent further damage.
In some cases, law enforcement agencies may take the lead in investigating the
incident and prosecuting the perpetrators. In these cases, organizations may need to
work closely with the law enforcement agency to provide evidence and support their
investigation.
It’s important to note that organizations should exercise caution when working with
law enforcement agencies and ensure that they comply with all legal and regulatory
requirements. This includes obtaining appropriate legal counsel and ensuring that all
communication and coordination with law enforcement agencies is conducted in a
manner that is consistent with applicable laws and regulations.
In addition to working with law enforcement agencies, organizations may need to
coordinate with other external stakeholders, such as regulators, industry associations,
and other organizations that the incident may impact. This may involve sharing
information about the incident, coordinating response activities, and collaborating on
strategies to mitigate the impact of the incident.
Coordination with law enforcement agencies is an essential aspect of effective
incident response. By establishing communication plans and protocols for working with
law enforcement agencies, organizations can improve their ability to investigate and
respond to security incidents and protect their critical assets and data.
Several Azure services can be used to help achieve effective communication during a
cybersecurity incident. These include the following:
573
Chapter 8 Design and Deploy a Respond Solution
574
Table 8-3. RS.CO Responsibility Matrix
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
References Responsibility
Communications RS.CO-1: NIST SP 800-53 Shared During incident response, To ensure personnel knows
(RS.CO): Response Employees Rev. 4 CP-2, customers are responsible for their roles and the order of
activities are know their CP-3, IR-3, IR-8 training personnel regarding operations, Microsoft Azure
coordinated roles and their roles and the appropriate personnel receive training in
with internal the order of order of operations. the incident response process.
and external operations
stakeholders, as in case of an
appropriate, to emergency
include external RS.CO-2: NIST SP 800-53 Shared Customers are also responsible According to Microsoft Azure’s
support from Events are Rev. 4 AU-6, for taking appropriate action event reporting criteria,
law enforcement
Chapter 8
575
Design and Deploy a Respond Solution
Table 8-3. (continued)
576
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 8
References Responsibility
RS.CO-3: NIST SP 800-53 Shared Reporting events to internal A Microsoft Azure Incident
Planned Rev. 4 CA-2, and external stakeholders, Response Plan outlines
sharing of CA-7, CP-2, per established criteria, procedures for sharing
information IR-4, IR-8, PE-6, and external support to law information in the event of an
RA-5, SI-4 enforcement agencies is anomaly or incident. Suppose
required. an incident requires reporting
to a government agency. In
that case, the Azure Security
and SIM teams support
Design and Deploy a Respond Solution
situational
awareness
577
Design and Deploy a Respond Solution
Chapter 8 Design and Deploy a Respond Solution
578
Chapter 8 Design and Deploy a Respond Solution
579
Chapter 8 Design and Deploy a Respond Solution
Analysis (RS.AN)
As you know, the NIST CSF module Respond is focused on activities that address a
cybersecurity incident, including detection, analysis, containment, and recovery.
Practical analysis is essential to the success of these activities, as it helps to identify the
incident’s root cause, assess the impact, and develop an appropriate response plan.
This section will discuss using Azure tools, services, and cloud security products for
cybersecurity analysis as part of the Respond module of the NIST CSF.
The NIST Analysis component of the Respond module focuses on understanding
the nature and scope of a cybersecurity incident, including its impact on organizational
assets and operations. It involves analyzing the data collected during the Detect phase to
identify the incident’s cause, assess the damage’s extent, and develop a response plan. To
effectively use the NIST Analysis component for cybersecurity response, organizations
should follow the following steps:
2. Collect and analyze data: The next step is to collect and analyze
data to understand the scope and nature of the incident. This
data may include logs, network traffic, system data, and other
relevant information. The data can be analyzed using various
tools and techniques, including machine learning and behavioral
analytics, to identify patterns and anomalies that may indicate a
cybersecurity incident.
580
Chapter 8 Design and Deploy a Respond Solution
3. Determine the cause of the incident: Once the data has been
analyzed, the next step is to determine the cause of the incident.
This may involve examining the systems and applications
involved, as well as any relevant network activity. The goal is
to identify the incident’s root cause and any vulnerabilities the
attacker may have exploited.
4. Assess the impact of the incident: The next step is to assess the
impact on the organization’s assets and operations. This includes
understanding the extent of the damage caused by the incident
and the potential impact on business operations and continuity.
This information can be used to prioritize response activities and
allocate resources effectively.
581
Chapter 8 Design and Deploy a Respond Solution
Here are some examples of how these Azure tools and services can be used for
cybersecurity analysis as part of the Respond module of the NIST CSF:
583
Chapter 8 Design and Deploy a Respond Solution
584
Chapter 8 Design and Deploy a Respond Solution
585
Chapter 8 Design and Deploy a Respond Solution
Respond (RS)
RS.AN: Notifications from detection RS.AN: The impact of the incident RS.AN: Incidents are categorized
RS.AN: Forensics are performed
systems are investigated is understood consistent with response plans
As part of the Azure Cloud shared responsibility model, the NIST CSF security
functions are provided in Table 8-4 with respect to RS.AN.
586
Table 8-4. RS.AN Responsibility Matrix
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
References
Analysis (RS. RS.AN-1: NIST SP 800-53 Shared A customer is responsible for As a monitoring device, Microsoft
AN): Analysis Notifications Rev. 4 AU-6, CA-7, analyzing and investigating Azure’s system components alert
is conducted from IR-4, IR-5, PE-6, detection system notifications employees to suspicious events,
to ensure detection SI-4 to ensure adequate recovery aggregate logs, and generate
adequate systems are support is provided. reports. Logs are aggregated, and
response investigated reports are generated. Logs from
and support Microsoft Azure infrastructure
recovery devices are stored in a central
activities. repository, aggregating them
for analysis. Upon analysis,
notifications are investigated
Chapter 8
where appropriate.
RS.AN-2: The NIST SP 800-53 Shared Microsoft Azure’s security team All of Microsoft Azure’s service
impact of the Rev. 4 CP-2, IR-4 should be informed of any teams contribute to analyzing the
incident is incident that may negatively impact of an incident within the
understood impact Microsoft Azure assets infrastructure of Microsoft Azure,
in any way. The customer must according to the incident recovery
assess and communicate the plans.
impact of any incident.
(continued)
587
Design and Deploy a Respond Solution
Table 8-4. (continued)
588
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 8
References
RS.AN-3: NIST SP 800-53 Shared The customer should perform Microsoft Azure performs
Forensics are Rev. 4 AU-7, IR-4 forensic investigations to necessary forensics whenever a
performed ensure adequate response and contractually agreed upon service
support for recovery activities. is implicated.
The results of the forensic
study should inform any
lessons learned.
RS.AN-4: NIST SP 800-53 Customer To the customer’s response N/A
Incidents are Rev. 4 CP-2, IR-4, Responsibility plan, incidents must be
Design and Deploy a Respond Solution
589
Chapter 8 Design and Deploy a Respond Solution
Threat Intelligence
One of the key features of Microsoft Incident Response from Azure Cloud is threat
intelligence. Azure Security Center provides threat intelligence feeds from Microsoft’s
global security intelligence network, enabling organizations to identify and respond to
potential security threats proactively. The threat intelligence feeds provide real-time
information about new and emerging threats, including malware campaigns, phishing
attacks, and other malicious activities.
By leveraging threat intelligence, organizations can proactively identify and respond
to security threats before they can cause damage. For example, if a new malware
campaign is detected, organizations can quickly identify and block the malicious traffic,
preventing it from spreading across their Azure environment.
590
Chapter 8 Design and Deploy a Respond Solution
The machine learning algorithms analyze vast amounts of data from Azure resources
to identify potential security threats. This data includes network traffic, system logs,
and user activity information. By analyzing this data, machine learning algorithms can
identify patterns and anomalies that may indicate a security threat.
Once a potential threat is detected, Azure Security Center can automatically alert
security teams, enabling them to investigate and respond to the incident quickly. This
can help organizations reduce the time required to detect and respond to security
incidents, minimizing the impact of the incident on their business operations.
591
Chapter 8 Design and Deploy a Respond Solution
Mitigation (RS.MI)
RS.MI is an essential component of the NIST Cybersecurity Framework module
Respond. It refers to the activities performed to prevent an event’s expansion, mitigate
its effects, and eradicate the incident. The goal of mitigation is to limit the damage and
recover the system to a secure state as soon as possible.
592
Chapter 8 Design and Deploy a Respond Solution
Let’s look at these subcategories and how they can be implemented using the NIST
CSF and Azure tools and services.
RS.MI-1: A response plan is executed during or after an incident
The first step in responding to a cybersecurity incident is to have a well-defined
incident response plan. This plan should outline the roles and responsibilities of each
incident response team member, the procedures for detecting and reporting an incident,
and the steps to take to contain, eradicate, and recover from the incident.
Azure provides several tools and services to help organizations create and execute
incident response plans. For example, Azure Security Center can help organizations
detect and respond to threats with its advanced threat protection capabilities, which
include behavioral analysis, machine learning, and security intelligence. Azure Sentinel
593
Chapter 8 Design and Deploy a Respond Solution
is a cloud-native SIEM solution that can help organizations detect and investigate
security incidents across their hybrid environment. Additionally, Azure Advisor provides
best practices and guidance for securing Azure resources.
RS.MI-2: Communications are coordinated among internal stakeholders and
external partners (e.g., information-sharing forums, sector coordinating councils,
ISACs, regulators) as appropriate
Effective communication is critical during a cybersecurity incident. It’s important
to establish clear lines of communication among internal stakeholders, such as IT
teams, legal teams, senior management, and external partners, such as law enforcement
agencies, regulators, and industry groups.
Azure provides several tools and services to facilitate communication during a
cybersecurity incident. For example, Azure Notification Hubs can be used to send
targeted push notifications to users across various platforms, such as iOS, Android,
and Windows. Azure Event Grid provides a simple way to route events between Azure
services and other applications, while Azure Service Bus provides reliable message
delivery between distributed applications.
RS.MI-3: Mitigation activities are prioritized based on their likely effectiveness in
reducing risk, severity, and likelihood of harm
During a cybersecurity incident, it’s essential to prioritize mitigation activities
based on their likely effectiveness in reducing risk, severity, and likelihood of harm.
This involves analyzing the incident, identifying the root cause, and implementing the
appropriate mitigation measures.
Azure provides several tools and services that can help organizations prioritize
mitigation activities. For example, Azure Security Center provides a prioritized list
of security recommendations based on the severity of the issue, the impact on the
environment, and the likelihood of exploitation. Azure Monitor provides detailed
insights into the performance and health of Azure resources, while Azure Log Analytics
provides advanced analytics and search capabilities for logs and metrics.
Design Considerations
There are several best practices that organizations can follow to ensure that their
mitigation efforts are practical, including the following:
594
Chapter 8 Design and Deploy a Respond Solution
Microsoft provides tools, services, and cloud security products to help organizations
mitigate cybersecurity incidents. These include the following:
595
Chapter 8 Design and Deploy a Respond Solution
• Azure Key Vault: Azure Key Vault provides a secure storage location
for cryptographic keys, certificates, and other secrets. It allows you to
manage and control access to these secrets, which can help prevent
the misuse of sensitive data.
596
Chapter 8 Design and Deploy a Respond Solution
Mitigation (RS.MI)
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 8-5 with respect to RS.MI.
597
Table 8-5. RS.MI Responsibility Matrix
598
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure
Chapter 8
References Responsibility
Mitigation (RS. RS.MI-1: NIST SP 800-53 Shared It is the customer’s An incident triage
MI): Activities are Containment of Rev. 4 IR-4 responsibility to contain team will evaluate the
performed to prevent incidents incidents and alert Microsoft severity of an incident
expansion of an Azure’s security team if and initiate appropriate
event, mitigate its incidents threaten Microsoft containment plans during
effects, and eradicate Azure assets. Microsoft Azure’s incident
the incident. management assessment
stage.
RS.MI-2: NIST SP 800-53 Shared To prevent the spread of an The Microsoft Azure
Design and Deploy a Respond Solution
threat-mitigating security
practices implemented by
them.
599
Design and Deploy a Respond Solution
Chapter 8 Design and Deploy a Respond Solution
600
Chapter 8 Design and Deploy a Respond Solution
By using Azure Security Center, organizations can better protect their Azure
resources from cybersecurity threats and mitigate the impact of security incidents.
Azure Security Center has been renamed to Microsoft Defender for Cloud, and it is
now a part of Microsoft Defender for Endpoint, a cloud-native application protection
platform (CNAPP).
Microsoft Defender for Cloud (formerly Azure Security Center) is a unified
infrastructure security management system for protecting workloads running in Azure,
on-premises, and other clouds. It provides integrated and adaptive threat protection
across hybrid cloud workloads and helps organizations prevent, detect, and respond to
cybersecurity threats.
Microsoft Defender for Cloud includes several key features that help organizations to
protect their cloud resources:
601
Chapter 8 Design and Deploy a Respond Solution
Microsoft Defender for Cloud is a powerful tool for organizations that want to protect
their cloud resources from cybersecurity threats. This platform allows organizations
to gain visibility into their security posture, detect and respond to threats in real time,
and ensure compliance with industry standards and regulations. Microsoft Defender
for Cloud (formerly Azure Security Center) provides several capabilities that can help
organizations respond to a cybersecurity incident:
602
Chapter 8 Design and Deploy a Respond Solution
In summary, Microsoft Defender for Cloud provides organizations with the tools
and capabilities to detect and respond to cybersecurity incidents quickly. By delivering
automated incident response, threat intelligence, alert management, integration with
other security tools, and continuous monitoring and detection, Microsoft Defender for
Cloud helps organizations stay ahead of emerging threats and respond to incidents more
effectively.
How to Enable It
Microsoft Defender for Cloud provides several features and tools to help you respond
to and mitigate cybersecurity incidents. Here are some of the ways that you can use
Microsoft Defender for Cloud to respond to and mitigate cybersecurity incidents:
Using these features and tools, you can leverage Microsoft Defender for Cloud to
respond to and mitigate cybersecurity incidents promptly and effectively.
To use Microsoft Defender for Cloud, you must have an Azure subscription and the
following prerequisites:
Once you have met these prerequisites, you can enable and configure Microsoft
Defender for Cloud to protect your environment against cyber threats.
To enable Microsoft Defender for Cloud, follow these steps:
604
Chapter 8 Design and Deploy a Respond Solution
Note that Microsoft Defender for Cloud is a premium feature of Azure Security
Center, so you may need to upgrade to a paid plan to access this functionality. Once you
have enabled Microsoft Defender for Cloud, you can start configuring its settings and
integrating it with other Microsoft security tools and third-party security solutions to
enhance your organization’s cybersecurity posture.
Summary
In this chapter, you read about methods to design and deploy a strategy for responding
to security services in line with the NIST CSF mapping of Azure services in line with
RS.RP, RS.CO, RS.AN, and RS.MI.
In the book’s final chapter, you will read about designing and deploying recovery
solutions aligning to NIST CSF and see a list of best practices to consider in recovering
and securing from day-two operations.
605
CHAPTER 9
• NIST recovery
• Azure Recovery services mapping
• Azure Backup
608
Chapter 9 Design and Deploy a Recovery Solution
609
Chapter 9 Design and Deploy a Recovery Solution
The NIST CSF Recovery Module is divided into three categories: Recovery Planning,
Improvements, and Communications. Here’s a breakdown of each category:
610
Chapter 9 Design and Deploy a Recovery Solution
611
Chapter 9 Design and Deploy a Recovery Solution
613
Chapter 9 Design and Deploy a Recovery Solution
614
Chapter 9 Design and Deploy a Recovery Solution
615
Chapter 9 Design and Deploy a Recovery Solution
Value of Azure NIST CSF Recovery Within the Recover function, several
categories and subcategories address specific aspects of recovery, such as
Recovery Planning (RC.RP), Improvements (RC.IM), Communications (RC.CO), and
Service Continuity (RC.SC).
Organizations can effectively plan for and execute recovery activities following
a cybersecurity incident by addressing these categories and their associated
subcategories.
616
Chapter 9 Design and Deploy a Recovery Solution
617
Chapter 9 Design and Deploy a Recovery Solution
618
Chapter 9 Design and Deploy a Recovery Solution
As part of the Azure cloud shared responsibility model, the NIST CSF security
functions are provided in Table 9-1 with respect to RS.RP.
619
Table 9-1. RS.RP Responsibility Matrix
620
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 9
References
Recovery RC.RP-1: NIST SP Shared The development and When customers enable geo-
Planning (RC. When an 800-53 Rev. execution of incident response replicated backups and alternative
RP): Systems or event occurs, 4 CP-10, plans during or after an site processing, Microsoft Azure
assets affected a recovery IR-4, IR-8 event are the customer’s executes recovery processes on their
by cybersecurity plan is responsibility. This includes behalf.
incidents are executed considering shared touchpoints After a disruption, compromise, or
promptly restored within the customer’s failure, Microsoft Azure’s business
through the authorization boundary and continuity plan details how each
execution and any customer applications system can be recovered and
maintenance that rely on the provider’s reconstituted to its known state. The
Design and Deploy a Recovery Solution
621
Design and Deploy a Recovery Solution
Table 9-1. (continued)
622
Category Subcategory Informative Responsibility Customer Responsibility Microsoft Azure Responsibility
Chapter 9
References
Communications RC.CO-3: NIST SP Shared The customer’s responsibility Microsoft Azure ensures the
(RC.CO): The Internal 800-53 Rev. is to communicate recovery maintenance of an incident response
restoration stakeholders 4 CP-2, IR-4 activities to internal plan through contractual service
process involves and executive stakeholders, including level agreements and effectively
coordination and executive and management communicates recovery activities to
with internal management teams. Stakeholders within the customers.
and external teams are customer’s organization should
parties, such notified of also be informed of incident
as coordinating recovery management service level
centers, activities agreement findings.
Design and Deploy a Recovery Solution
Internet Service
Providers, owners
of attacked
systems, victims,
other CSIRTs, and
vendors.
Chapter 9 Design and Deploy a Recovery Solution
Azure Backup
Azure Backup is a cloud-based backup and restore service provided by Microsoft Azure.
It enables organizations to protect their data and applications by creating backups of
their on-premises or cloud-based systems. Azure Backup helps in data recovery during a
cybersecurity incident by providing the following features:
623
Chapter 9 Design and Deploy a Recovery Solution
In summary, Azure Recovery Services Vault and Backup Vault are components of
Azure Backup. The Recovery Services vault provides centralized management and control
over backup operations for various workloads, while the Backup Vault focuses specifically
on managing Azure VM backups with features tailored to Azure virtual machines.
• Files and folders: You can back up individual files and folders
from your on-premises servers, Azure virtual machines (VMs), or
Azure file shares. This allows you to protect important documents,
configurations, and other file-level data.
626
Chapter 9 Design and Deploy a Recovery Solution
• Azure files: Azure Backup allows you to protect Azure file shares,
ensuring that your file data stored in Azure is backed up and
recoverable. This includes both general-purpose and premium
file shares.
• Azure Blob Storage: Azure Backup offers the ability to back up Azure
Blob Storage accounts. This includes block and append blobs,
allowing you to protect your object storage data.
These are just a few examples of what you can back up using Azure Backup.
The service is designed to support a wide range of data sources, workloads, and
platforms, providing comprehensive data protection and recovery capabilities for your
organization’s critical assets.
627
Chapter 9 Design and Deploy a Recovery Solution
The Azure Backup service provides support for different components through its
matrix component. The matrix component defines the capabilities and limitations of
Azure Backup for additional data sources, operating systems, and workload types. Let’s
explore the additional support provided by Azure Backup through its matrix component:
628
Chapter 9 Design and Deploy a Recovery Solution
• Azure files: Azure Backup allows you to protect Azure file shares,
ensuring that your file data is backed up and recoverable in case
of accidental deletions or corruptions.
• File and folder restore: You can perform granular file and folder
restores from backups, enabling you to recover specific files or
directories without restoring the entire backup.
630
Chapter 9 Design and Deploy a Recovery Solution
631
Chapter 9 Design and Deploy a Recovery Solution
Encryption in transit:
• This ensures that data transferred between the source system and
Azure Backup remains encrypted, protecting it from interception and
tampering.
632
Chapter 9 Design and Deploy a Recovery Solution
RBAC:
• Azure Backup integrates with Azure Active Directory (Azure AD) and
follows RBAC principles.
• This helps enforce the principle of least privilege and ensures that
only authorized individuals can perform backup and restore tasks.
633
Chapter 9 Design and Deploy a Recovery Solution
Geo-redundancy:
By leveraging these security features, Azure Backup helps protect your data during
backup and restore operations, ensuring that your data remains confidential, available,
and protected against security threats.
Azure VM Backup
Azure VM Backup is a feature provided by Azure Backup that allows you to protect and
restore Azure VMs in case of data loss or disaster recovery scenarios. It enables you to
create backups of entire VMs, including the operating system, applications, and data and
provides a reliable and efficient way to protect your VM infrastructure. Here are some
key aspects of Azure VM Backup:
634
Chapter 9 Design and Deploy a Recovery Solution
By utilizing Azure VM Backup, you can protect your Azure VMs and ensure their
availability and recoverability. It provides a robust backup solution integrated with the
Azure platform, simplifying backup management and providing peace of mind in case of
data loss or unexpected incidents.
635
Chapter 9 Design and Deploy a Recovery Solution
2. Click “Recovery Services vault” from the results and then click
Add to create a new vault.
1. Open the newly created Recovery Services vault and click Backup
in the menu on the left.
4. In the “Backup target” section, select the Azure VMs you want to
back up.
6. Review the settings and click “Enable backup” to start the backup
process.
2. You can monitor the backup progress and status from the Backup
Items section of the Recovery Services vault.
636
Chapter 9 Design and Deploy a Recovery Solution
To restore an Azure VM, go to the Recovery Services vault and click “Backup items”
in the menu on the left.
2. In the Restore tab, you can restore the VM to the same location or
a different Azure region.
In the Recovery Services vault, you can manage various aspects of Azure VM
backups.
• You can view the backup job status, monitor backup health, and set
up alerts for backup failures or issues.
It’s important to note that Azure Backup also provides additional features and
options for managing and protecting Azure VMs, such as application-consistent
backups, backup retention policies, cross-region replication, and long-term retention.
638
Chapter 9 Design and Deploy a Recovery Solution
By utilizing Azure Disk Backup, you can protect your critical disk data in Azure and
ensure its availability and recoverability. It provides a reliable backup solution integrated
with the Azure platform, simplifying backup management and offering peace of mind in
case of data loss or unexpected incidents.
2. In the menu on the left, click Backup Items and + Backup to start
the backup configuration.
3. Select the desired Azure VM that has the disks you want to
back up.
5. Select the disks you want to back up and click Enable Backup to
start the backup process.
• You can monitor the backup progress and status from the Backup
Items section of the Recovery Services vault.
To restore Azure disks, go to the Recovery Services vault and click Backup Items in
the menu on the left. Then follow these steps:
1. Select the desired disk or disks that you want to restore.
639
Chapter 9 Design and Deploy a Recovery Solution
4. Review the settings and click Restore to initiate the disk restore
process.
In the Recovery Services vault, you can manage various aspects of Azure
Disk Backup.
• Monitor backup health and status, view backup job history, and track
backup storage usage.
It’s important to note that Azure Disk Backup is integrated with Azure Backup
and leverages the capabilities provided by Azure Backup. This includes centralized
management, monitoring, alerting, cross-region replication, and integration with Azure
Site Recovery for disaster recovery scenarios. Following the previous steps, you can
effectively back up, restore, and manage your Azure Disk Backup data, ensuring data
protection and quick recovery when needed.
640
Chapter 9 Design and Deploy a Recovery Solution
• Azure Blob storage provides a soft delete feature that helps safeguard
against accidental deletions.
• When soft delete is enabled, deleted blobs are retained for a specified
retention period, allowing you to recover them if needed.
641
Chapter 9 Design and Deploy a Recovery Solution
642
Chapter 9 Design and Deploy a Recovery Solution
Snapshot-based backups:
Application-level backups:
It’s important to note that Microsoft Azure regularly updates its services, and
new features and capabilities may become available after my knowledge cutoff. We
recommend referring to the official Azure documentation and Azure Portal for the latest
information on Blob backup options and features supported by Azure Backup.
643
Chapter 9 Design and Deploy a Recovery Solution
(SMB) protocol. Azure File Share Backup offers a convenient and reliable way to back up
your file share data, ensuring data protection and enabling quick restores in case of data
loss or unexpected incidents. Here are some key aspects of Azure File Share Backup:
644
Chapter 9 Design and Deploy a Recovery Solution
By utilizing Azure File Share Backup, you can protect your Azure File shares and
ensure the availability and recoverability of your file share data. It provides a reliable
backup solution integrated with the Azure platform, simplifying backup management
and offering peace of mind in case of data loss or unexpected incidents.
Register the Azure File Share resource with the Recovery Services vault by following
these steps:
1. Open the Azure Portal and navigate to the newly created Recovery
Services vault.
2. In the menu on the left, click Backup and then click the +
Backup button.
645
Chapter 9 Design and Deploy a Recovery Solution
5. Select the Azure File Share you want to back up and click OK.
1. After the Azure File Share is registered, click Backup in the menu
on the left of the Recovery Services vault.
2. Select the Azure File Share that you want to configure backup
settings for.
1. Once the backup settings are configured, Azure File Share Backup
automatically performs backups based on the defined schedule.
2. The backups are stored in the Recovery Services vault and can be
used for restore operations.
2. Click Backup in the menu on the left and select the Azure
File Share.
3. In the Backup Items tab, choose the desired backup from the
available recovery points.
4. Click Restore and select the restore type (e.g., original or alternate
location).
646
Chapter 9 Design and Deploy a Recovery Solution
Azure File Share Backup supports item-level recovery, allowing you to restore
specific files or folders from the backup. You can select the desired files/folders during
the restore process.
By following these steps, you can back up and restore Azure File shares using Azure
File Share Backup, simplifying the process of protecting and recovering your file share
data in Azure.
• Azure SQL Database has built-in backup capabilities that allow you to
create automatic backups of your databases.
• If you are using Azure Files to store database files, Azure Backup
offers backup capabilities for Azure Files shares.
• You can schedule regular backups and restore individual files or the
entire file share.
• Azure Backup does not provide direct backup capabilities for Azure
Cosmos DB. However, Azure Cosmos DB offers built-in backup and
restore capabilities.
• Azure Backup does not provide direct backup capabilities for Azure
Data Lake Storage. However, Azure Data Lake Storage offers built-in
backup and restore features.
648
Chapter 9 Design and Deploy a Recovery Solution
649
Chapter 9 Design and Deploy a Recovery Solution
• Use Azure Monitor to collect and analyze telemetry data from your
AKS cluster, including container logs, performance metrics, and
health checks.
Remember, while Azure Backup does not offer direct AKS cluster backup support,
focusing on application-level backups and following best practices for data persistence
and infrastructure management is crucial. Additionally, leverage Azure services like Git,
ASR, and Azure Monitor to ensure comprehensive data protection, disaster recovery,
and monitoring capabilities within your AKS environment.
650
Chapter 9 Design and Deploy a Recovery Solution
• RTO and RPO: Using offline backups can impact the recovery time
and recovery point objectives. Since offline backups require physical
retrieval and restoration, the process may take longer than online or
cloud-based backup and restore options.
It’s important to note that Azure Backup primarily focuses on online backup and
restore options, utilizing cloud-based storage and services within the Azure ecosystem.
While offline backup can be part of an overall data protection strategy, it may require
additional tools, processes, and considerations beyond the scope of Azure Backup itself.
Azure Backup Key Insights Azure Backup has some limitations to consider for
design and deployment.
There is a limit of 500 Recovery Services vaults per subscription per supported
region of Azure Backup. If you require more vaults, you must purchase an
additional subscription.
Azure Virtual Machines can be registered up to 1,000 per vault, MARS agents
can be registered up to 50 per vault using the Microsoft Azure Backup Agent, and
MABS servers can be registered up to 50 per vault.
651
Chapter 9 Design and Deploy a Recovery Solution
You can protect up to 2,000 data sources/items across all workloads (such as IaaS
VM, SQL, AFS) in a vault.
You can register up to 1000 Azure Virtual machines per vault. You can register up
to 50 MARS agents per vault using the Microsoft Azure Backup Agent. And you can
register 50 MABS servers/DPM servers to a vault.
652
Chapter 9 Design and Deploy a Recovery Solution
By leveraging Azure Site Recovery, businesses can achieve robust disaster recovery
capabilities, reduce downtime, and ensure business continuity. ASR simplifies the
replication, failover, and failback processes across on-premises and Azure environments,
offering a scalable and cost-effective solution for disaster recovery.
653
Chapter 9 Design and Deploy a Recovery Solution
• Application consistency:
• ASR provides disaster recovery for Azure VMs within the same
Azure region or across different regions.
654
Chapter 9 Design and Deploy a Recovery Solution
• Cross-platform support:
• ASR allows you to create recovery plans that define the order and
dependencies of the failover process.
655
Chapter 9 Design and Deploy a Recovery Solution
656
Chapter 9 Design and Deploy a Recovery Solution
• RTO and RPO targets: Keep RTOs and RPOs within organizational
limits. Azure VMs and VMware VMs can be continuously replicated
with Site Recovery, while Hyper-V VMs can be replicated as often
as 30 seconds. By integrating with Azure Traffic Manager, you can
further reduce RTO.
• Flexible failovers: You won’t lose any data if you’ve planned a failover
for an expected outage. If you’ve had an unplanned failover, you’ll
lose minimal data. If your primary site is once again available, you
can easily return to it.
• BCDR integration: You can use Site Recovery to manage the failover
of availability groups, with native support for SQL Server Always On,
and protect the SQL Server backend of corporate workloads.
657
Chapter 9 Design and Deploy a Recovery Solution
Recovery Plans
Recovery plans in Azure Site Recovery are critical to disaster recovery and play a crucial
role in recovering from a cybersecurity incident. A recovery plan defines the actions and
steps required to recover your workloads and applications during a disruption. Here’s
a detailed explanation of recovery plans using Azure Site Recovery in the event of a
cybersecurity incident:
• Preparing for recovery: Within the recovery plan, you can specify
pre-scripts executed before the recovery process begins. These
scripts can perform tasks such as stopping certain services, shutting
down specific VMs, or executing custom commands to prepare the
environment for recovery.
• VM start order: Within a recovery group, you can define the start
order of the VMs. This ensures that critical components of your
application stack are recovered in the correct sequence, considering
dependencies between different VMs. By defining the start order, you
can ensure the proper functioning of your application after recovery.
661
Chapter 9 Design and Deploy a Recovery Solution
By leveraging Azure Site Recovery and other Azure services, organizations can
modernize their on-premises disaster recovery failover/failback processes, benefit from
the scalability and flexibility of the cloud, and ensure business continuity in the event of
a disaster.
662
Chapter 9 Design and Deploy a Recovery Solution
On the other hand, Azure Site Recovery is a disaster recovery service that enables
the replication and recovery of on-premises virtual machines, physical servers, and
VMware virtual machines to Azure. It helps organizations protect their workloads
and applications by providing failover and failback capabilities in case of a disaster or
disruption.
When used together, Azure Traffic Manager can be configured to monitor the health
of Azure Site Recovery endpoints and dynamically route traffic to the most appropriate
endpoint based on their availability and responsiveness. This integration allows for
enhanced disaster recovery and high-availability scenarios.
Here’s how Azure Traffic Manager can be used with Azure Site Recovery:
663
Chapter 9 Design and Deploy a Recovery Solution
664
Chapter 9 Design and Deploy a Recovery Solution
665
Chapter 9 Design and Deploy a Recovery Solution
• Recovery plans: With Azure Site Recovery, you define recovery plans that
specify the steps and order for recovering your VMs in case of a disaster.
These recovery plans include starting the VMs, setting up networking,
and executing custom scripts. Recovery plans can be customized based
on your requirements and dependencies between VMs.
666
Chapter 9 Design and Deploy a Recovery Solution
667
Chapter 9 Design and Deploy a Recovery Solution
Microsoft Azure has a shared responsibility model for security, where Microsoft is
responsible for the security of the underlying infrastructure. At the same time, customers
are responsible for securing their applications and data within Azure Site Recovery.
By following security best practices, configuring access controls, and implementing
additional security measures, customers can enhance the security of their Azure Site
Recovery deployments.
668
Chapter 9 Design and Deploy a Recovery Solution
7. In the Target section, select the target region where you want to
replicate your VM for disaster recovery.
10. Review the summary of your configuration settings, and then click
the OK button to start the replication setup.
669
Chapter 9 Design and Deploy a Recovery Solution
• Backup and recovery: The baseline may cover best practices for
backup and recovery in Azure Site Recovery. This could include
recommendations for configuring backup retention policies, testing
recovery plans, and regularly reviewing and updating recovery
procedures.
It’s important to note that Azure Security Baselines are not static and may evolve to
address emerging security threats and incorporate new best practices. Organizations
should regularly review and update their Azure Site Recovery deployments based on
the latest security recommendations from Azure Security Baselines and other relevant
security resources provided by Microsoft.
672
Chapter 9 Design and Deploy a Recovery Solution
Azure Site Recovery As part of your business continuity and disaster recovery
(BCDR) strategy, Site Recovery orchestrates and automates the replication of Azure
virtual machines, on-premises machines to Azure, and servers to secondary data
centers. Because of Azure’s inability to support persistent MAC addresses, software
with MAC-based license models can’t be used for migration to Azure and disaster
recovery. Organizations can automate Site Recovery workflows using the REST API,
PowerShell, or the Azure SDK.
673
Chapter 9 Design and Deploy a Recovery Solution
Summary
In this chapter, you read about designing and deploying recovery solutions aligned to
the NIST CSF and saw a list of best practices to consider in recovering and securing from
day-two operations.
Thank you for choosing to read this book. Good luck on your Azure security future.
674
Index
A key features, 524
NIST CSF detect function, 526
Access control list (ACL), 79
password protection, 528
Access controls (AC), 232, 254, 262, 269,
remediation capabilities, 524
282, 284, 293, 312, 326, 355
remediation recommendations, 525
Account subscription, 37
reporting and insights, 526
Active Directory (AD), 122
risk policy, 529
Azure Site Recovery, 667
sign-in capabilities, 524
backup and restore operations, 633
steps, 529
communication protocols (RS.CO), 574
threat intelligence services, 524
conditional access (DE.SCM)
working process, 525
authentication/blocking access, 492
log analysis (see Log analytics)
cloud resource, 494
Mitigation phase (RS.MI), 597
design considerations, 494
risk management, 218 (See also Azure
detect function, 493
Active Directory (Azure AD))
device management, 496
Active Directory Domain Services (AD
features, 492
DS), 218
identity and access
Adaptive authentication, 235
management, 495–497
Advanced Encryption Standard (AES),
real-time alerts, 493
429, 430
reporting/monitoring, 496
Advanced persistent threats (APTs), 283, 507
risk-based access controls, 493
Advanced threat protection (ATP), 450, 583
SIEM solutions, 493
analysis module (RS.AN), 582, 585
DE.AE mapping security, 464
analytics and insights, 533
design and implementation, 218, 219
automated response, 533
identity protection
cloud-powered protection, 533
conditional access, 528
definition, 530
conditional access/password
design considerations, 534, 535
protection, 529
easy-to-use interface, 531
conditional access policies, 525
elements, 531, 532
design consideration, 527, 528
endpoint protection, 530
detailed analytics, 524
hunting capabilities, 534
fraudulent activities, 528
675
© Puthiyavan Udayakumar 2023
P. Udayakumar, Design and Deploy a Secure Azure Environment,
https://doi.org/10.1007/978-1-4842-9678-3
INDEX
Advanced threat protection (ATP) (cont.) Anomalies and Events (DE.AE), 461
investigation, 537 definitions, 462
key benefits, 530 financial institution, 463
Microsoft Defender, 536, 537 mapping security
NIST CSF detect function, 533 benefits, 464
organizations, 537 capabilities, 464
planning (RS.RP), 551 categories, 466
real-time visibility, 530 modules, 467
working process, 532–534 Sentinel/monitor, 464
AES 256-bit encryption, 302 security professional, 463, 464
Amazon Web Services (AWS), 24, 104 Sentinel solution, 470
Analysis module (RS.AN) data ingestion/analytics/
assets and operations, 581 alerting, 471
collect and analyze data, 580 data sources, 473
component, 580 design considerations, 474, 475
incident response programs detection capabilities, 470
advanced threat detection, 590 enabling services, 475, 476
key benefits, 589 key features, 470
playbooks, 592 machine learning/playbooks, 473
security automation/ potential security threats, 472
orchestration, 591 set alert thresholds/detection
services/tools, 589, 590 rules, 473
SIEM solutions, 591 workflows, 474
threat intelligence, 590 Anti-malware, 61, 62, 88, 105, 411
mapping services Application insights, 50, 51
classification/investigation, 583 Application performance management
eradication/containment, 584 (APM), 50
firewall service, 582, 585 Application security, 20, 125, 126
incident detection, 583 embedded, 21
network security groups, 582 layered security architecture, 52
recovery solutions, 584 penetration testing, 52
responsibility model, 586–588 software frameworks and secure
security center, 581 coding libraries, 127
security tools and services, 584 threat modeling, 128
Sentinel, 582 with untrustworthy origins, 20
subcategories analysis, 586 WAF, 52
systematic process, 583 web server, 53
tools and services, 583 Application security groups (ASGs), 95
676
INDEX
677
INDEX
678
INDEX
679
INDEX
680
INDEX
681
INDEX
682
INDEX
683
INDEX
684
INDEX
685
INDEX
686
INDEX
M Mobile App, 46
Portal, 43
Malware, 12, 13, 283
PowerShell, 44
Malware detection tools, 459
regions, 33
Management groups, Azure, 38, 39
resource group, 39
Management in Azure
security capabilities, 48–51
ARM templates, 46
subscriptions, 38, 39
CLI, 44, 45
Microsoft Azure asset
Cloud Shell, 45
management, 153–159
code-based tool, 41
AIP, 178–180
Mobile App, 46
Azure AD registered devices, 163–166
portal, 43
Intune, 168–171
PowerShell, 44
IoT Hub Identity Registry, 166–168
visual tools, 41
Microsoft Defender for Cloud, 159–163
Mapping (see Azure mapping)
PAM, 183–187
Mean time to acknowledge (MTTA), 203
service maps, 171–174
Mean time to remediate (MTTR), 203
Microsoft Azure Bastion, 193
Media protection (MP), 326
Microsoft Cloud Infrastructure and
Microsoft AppLocker
Operations (MCIO), 77
configuration policies, 438
Microsoft cloud security, 94, 95
deployment considerations, 438, 439
backup, 106
design considerations, 436
DevOps, 131–133
features, 437–439
identity, 113
key benefits, 435
privileged access, 120
NIST CSF Protect mapping, 436
Microsoft cloud security benchmark
security threats, 435
(MCSB), 103, 104
types, 434
Microsoft Compliance Manager, 205
Microsoft Azure, 24, 30–33, 104
Microsoft Defender for Cloud, 50, 159–163
Advisor, 48
vulnerability, 214–217
availability zones, 34–37
Microsoft Defender for Endpoint (see
CLI, 44, 45
Endpoint detection and
Cloud Shell, 45
response (EDR))
cybersecurity (see Cybersecurity)
Microsoft Defender for Identity
data centers, 76
deployment considerations, 454, 455
geography, 33
design considerations, 452, 453
global infrastructure, 32
features, 450
global network, 76
integration, 451
management groups, 38, 39
key benefits, 451
687
INDEX
688
INDEX
689
INDEX
690
INDEX
691
INDEX
692
INDEX
693
INDEX
694
INDEX
695