Skip to content

Security

Threat Modeling

The Threat Priority Model can be used to identify your threat priorities. It starts by identifying the Impact of a threat occuring on a resource, then identifies the probability of this happening by defining the vulnerability and identifying any existing counter-measures (mitigations). The Impact and Probability together define the Threat Priority

Zero Trust

The attack chain (or kill chain) begins with a compromised account that is then used to gain elevated priviledges to mount an attack. Zero Trust uses the principle of Never Trust: Always Verify

Defence In Depth

A defence-in-depth strategy addresses security at the following layers:

1. Physical Security - protecting access to buildings and hardware
2. Identity and Access - authentication and authorisation controls
3. Perimeter - protecting the network perimeter using DDoS protection and firewalls
4. Network - limiting communication between and to resources
5. Compute - secure access to VMs and endpoints
6. Application - securing applications, remediating vulnerabilities
7. Data - securing access to data
  • Microsoft Defender for Cloud (previously Azure Security Centre and Azure Defender)

    • Monitor security posture for Azure and on-prem resources. Security Posture (CIA):
      • Confidentiality - sensitive data must be kept protected and accessed only by those who should have access through the principle of least priviledge
      • Integrity - confidence that data has not been altered or tampered with
      • Availability - data and systems should be available to those that need them
    • Automatically apply security settings to new resources
    • Provides recommendations
    • Continuously monitor and assess vulnerabilities
    • Block malware with machine learning
    • Define rules for allowed applications (adaptive application controls)
    • Threat detection
    • Just-in-time access control for network ports
    • Secure score reflects compliance to assigned governance controls
    • The Regulatory Compliance dashboard provides overall compliance score and the number of failing assessments
    • Adaptive network hardening monitors network activity compared to NSGs and makes recommendations
    • File integrity monitoring - monitor important files
    • Use Workflow Automation (Logic Apps) to respond to security alerts
  • Microsoft Sentinel (previously Azure Sentinel)

    • Microsoft Managed (SaaS), cloud-based Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) system
    • Aggregates security data from many different sources, using open-standard logging format
    • Threat detection uses built-in rules (AI) provided as templates or custom rules
    • Threat response can be automated with Azure Monitor Workbooks, to set alerts or send emails. Email will include link to Block or Ignore threat
    • Utilises Microsoft's analytics and threat intelligence
    • Several methods exist for connecting security data sources to Sentinel, including native support for M365, AAD, Syslog, CEF, REST
    • Data is stored in Log Analytics
  • Azure Key Vault

    • Secure, centralised storage for application secrets
    • Monitor and control access to secrets
    • Simplify management and renewal of certificates
    • Integrates with other Azure services - storage accounts, container registries, event hubs, etc
    • Available in Standard and Premium SKUs
    • Premium adds support for HSM-protected Keys
    • Resources must be in the same region and subscription to access key vault secrets
  • Azure Dedicated Host

    • VMs hosted on physical servers that are not shared with other customers
    • Host groups provide for high availability
    • Charge is per dedicated host - not per VM running on the host

Further Reading: