Skip to content

Commit 05df4ec

Browse files
authored
Merge pull request #100773 from msmbaldwin/security-controls
Wording changes
2 parents ee711bd + 0a73eb2 commit 05df4ec

13 files changed

+82
-53
lines changed

articles/security/benchmarks/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ landingContent:
2222
linkLists:
2323
- linkListType: overview
2424
links:
25-
- text: Azure Security Benchmarks Introduction
25+
- text: Azure Security Benchmark Introduction
2626
url: introduction.md
2727
- text: Overview of Azure Security Controls
2828
url: overview.md

articles/security/benchmarks/introduction.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,26 +12,26 @@ ms.custom: security-baselines
1212

1313
---
1414

15-
# Azure security benchmarks introduction
15+
# Azure security benchmark introduction
1616

17-
You may have several years or even decades of experience with on-premises computing. You know how to secure those deployments. But the cloud is different. How do you know if your cloud deployments are secure? What are the differences between security practices for on-premises systems and security practices for cloud deployments?
17+
You may have several years or even decades of experience with on-premises computing. You know how to secure those deployments; but the cloud is different. How do you know if your cloud deployments are secure? What are the differences between security practices for on-premises systems and cloud deployments?
1818

19-
There is a large collection of white papers, best practices, reference architectures, web guidance, open-source tools, commercial solutions, intelligence feeds, and more that can be used to help secure the cloud. Which option should you use? What can you do to get an acceptable level of security in the cloud?
19+
There is a large collection of white papers, best practices, reference architectures, web guidance, open-source tools, commercial solutions, intelligence feeds, and more, that can be used to help secure the cloud. Which option should you use? What can you do to get an acceptable level of security in the cloud?
2020

21-
One of the best ways to secure your cloud deployments is to focus on cloud security benchmark recommendations. Benchmark recommendations for securing any service begin with a fundamental understanding of cybersecurity risk and how to manage it. You can then use this understanding by adopting benchmark security recommendations from your cloud service provider to help select specific security configuration settings in your environment.
21+
One of the best ways to secure your cloud deployments is to focus on cloud security benchmark recommendations. Benchmark recommendations, for securing any service, begin with a fundamental understanding of cybersecurity risk and how to manage it. You can then use this understanding by adopting benchmark security recommendations from your cloud service provider to help select specific security configuration settings in your environment.
2222

2323
The Azure Security Benchmark includes a collection of high-impact security recommendations you can use to help secure most of the services you use in Azure. You can think of these recommendations as "general" or "organizational" as they are applicable to most Azure services. The Azure Security Benchmark recommendations are then customized for each Azure service, and this customized guidance is contained in service recommendations articles.
2424

25-
The Azure Security Benchmark documentation specify Security Controls and Service Recommendations.
25+
The Azure Security Benchmark documentation specifies security controls and service recommendations.
2626

27-
- **Security Controls**: The Azure Security Benchmark recommendations are categorized by security controls. Security controls represent high-level vendor-agnostic security requirements, such as network security and data protection. Each security control has a set of security recommendations and instructions that help you enable those recommendations.
28-
- **Service Recommendations**: When available, benchmark recommendations for Azure services will include Azure Security Benchmark recommendations that are tailored for the service, as well as additional recommendations that are unique for the particular service.
27+
- **Security Controls**: The Azure Security Benchmark recommendations are categorized by security controls. Security controls represent high-level vendor-agnostic security requirements, such as network security and data protection. Each security control has a set of security recommendations and instructions that help you implment those recommendations.
28+
- **Service Recommendations**: When available, benchmark recommendations for Azure services will include Azure Security Benchmark recommendations that are tailored specifically for that service.
2929

3030
The terms "Control", "Benchmark", and "Baseline" are used often in the Azure Security Benchmark documentation and it's important to understand how Azure uses those terms.
3131

3232
| Term | Description | Example |
3333
|--|--|--|
34-
| Control | A **control** is a high-level description of a feature or activity that needs to be addressed, and is not specific to a technology or implementation. | Data Protection is one of the security controls. This control contains specific actions that need to be addressed to help ensure data is protected. |
34+
| Control | A **control** is a high-level description of a feature or activity that needs to be addressed and is not specific to a technology or implementation. | Data Protection is one of the security controls. This control contains specific actions that need to be addressed to help ensure data is protected. |
3535
| Benchmark | A **benchmark** contains security recommendations for a specific technology, such as Azure. The recommendations are categorized by the control to which they belong. | The Azure Security benchmark comprises the security recommendations specific to the Azure platform |
3636
| Baseline | A **baseline** is the security requirements for an organization. The security requirements are based on benchmark recommendations. Each organization decides which benchmark recommendations to include in their baseline. | The Contoso company creates its security baseline by choosing to require specific recommendations in the Azure Security Benchmark. |
3737

articles/security/benchmarks/overview.md

Lines changed: 19 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -14,35 +14,38 @@ ms.custom: security-baselines
1414

1515
# Overview of Azure Security Controls
1616

17-
The Azure Security Benchmark contains recommendations that help you improve the security of your applications and data on Azure.
17+
The Azure Security Benchmark contains recommendations that help you improve the security of your applications and data on Azure.
1818

19-
This Benchmark focuses on cloud-centric control areas. These controls are consistent with well-known security benchmarks, such as those described by the Center for Internet Security (CIS) Controls Version 7.1
19+
This Benchmark focuses on cloud-centric control areas. These controls are consistent with well-known security benchmarks, such as those described by the Center for Internet Security (CIS) Controls Version 7.1.
2020

2121
The following controls are used in the Azure Security Benchmark:
2222

23-
- Network Security
24-
- Logging and Monitoring
25-
- Identity and Access Control
26-
- Data Protection
27-
- Vulnerability Management
28-
- Inventory and Asset Management
29-
- Secure Configuration
30-
- Malware Defense
31-
- Data Recovery
32-
- Incident Response
33-
- Penetration Tests and Red Team Exercises
23+
- [Network Security](security-control-network-security.md)
24+
- [Logging and Monitoring](security-control-logging-monitoring.md)
25+
- [Identity and Access Control](security-control-identity-access-control.md)
26+
- [Data Protection](security-control-data-protection.md)
27+
- [Vulnerability Management](security-control-vulnerability-management.md)
28+
- [Inventory and Asset Management](security-control-inventory-asset-management.md)
29+
- [Secure Configuration](security-control-secure-configuration.md)
30+
- [Malware Defense](security-control-malware-defense.md)
31+
- [Data Recovery](security-control-data-recovery.md)
32+
- [Incident Response](security-control-incident-response.md)
33+
- [Penetration Tests and Red Team Exercises](security-control-penetration-tests-red-team-exercises.md)
34+
35+
You can also download the [Azure Security Benchmark v1 excel spreadsheet](https://github.com/MicrosoftDocs/SecurityBenchmarks/tree/master/spreadsheets).
3436

3537
## Azure Security Benchmark Recommendations
3638

3739
Each recommendation includes the following information:
3840

3941
- **Azure ID**: The Azure Security Benchmark ID that corresponds to the recommendation.
40-
- **CIS ID(s)**: The CIS benchmark recommendation # that corresponds to this recommendation.
42+
- **CIS ID(s)**: The CIS benchmark recommendation(s) that correspond to this recommendation.
4143
- **Responsibility**: Whether the customer or the service-provider (or both) is (are) responsible for implementing this recommendation. Security responsibilities are shared in the public cloud. Some security controls are only available to the cloud service provider and therefore the provider is responsible for addressing those. These are general observations – for some individual services, the responsibility will be different than what is listed in the Azure Security Benchmark. Those differences are described in the baseline recommendations for the individual service.
42-
- **Details**: The rationale for the recommendation and links to guidance on how to implement the recommendation. If the recommendation is supported by Azure Security Center, that information will be listed here.
44+
- **Details**: The rationale for the recommendation and links to guidance on how to implement it. If the recommendation is supported by Azure Security Center, that information will also be listed.
4345

4446
We welcome your detailed feedback and active participation in the Azure Security Benchmark effort. If you would like to provide the Benchmark team direct input, please fill out the form at [https://aka.ms/AzSecBenchmark](https://aka.ms/AzSecBenchmark).
4547

4648
## Next Steps
4749

48-
See the first security control: [Network Security](security-control-network-security.md)
50+
- See the first security control: [Network Security](security-control-network-security.md)
51+
- Download the [Azure Security Benchmark v1 excel spreadsheet](https://github.com/MicrosoftDocs/SecurityBenchmarks/tree/master/spreadsheets)

articles/security/benchmarks/security-control-data-protection.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Encrypt all sensitive information in transit. Ensure that any clients connecting
8282

8383
Follow Azure Security Center recommendations for encryption at rest and encryption in transit, where applicable.
8484

85-
Understanding encryption in transit with Azure:
85+
Understand encryption in transit with Azure:
8686

8787
https://docs.microsoft.com/azure/security/fundamentals/encryption-overview#encryption-of-data-in-transit
8888

@@ -114,7 +114,7 @@ https://docs.microsoft.com/azure/information-protection/deployment-roadmap
114114

115115
Use Azure AD RBAC to control access to data and resources, otherwise use service specific access control methods.
116116

117-
Understanding Azure RBAC:
117+
Understand Azure RBAC:
118118

119119
https://docs.microsoft.com/azure/role-based-access-control/overview
120120

@@ -161,4 +161,3 @@ https://docs.microsoft.com/azure/azure-monitor/platform/alerts-activity-log
161161
## Next steps
162162

163163
See the next security control: [Vulnerability Management](security-control-vulnerability-management.md)
164-

articles/security/benchmarks/security-control-data-recovery.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ Ensure that all system data, configurations, and secrets are automatically backe
2525
Enable Azure Backup and configure the backup source (Azure VMs, SQL Server, or File Shares), as well as the desired frequency and retention period.
2626

2727
How to enable Azure Backup:
28+
2829
https://docs.microsoft.com/azure/backup/
2930

3031
## 9.2: Perform complete system backups and backup any customer managed keys
@@ -36,9 +37,11 @@ https://docs.microsoft.com/azure/backup/
3637
Enable Azure Backup and target VM(s), as well as the desired frequency and retention periods. Backup customer managed keys within Azure Key Vault.
3738

3839
How to enable Azure Backup:
40+
3941
https://docs.microsoft.com/azure/backup/
4042

4143
How to backup key vault keys in Azure:
44+
4245
https://docs.microsoft.com/powershell/module/azurerm.keyvault/backup-azurekeyvaultkey?view=azurermps-6.13.0
4346

4447
## 9.3: Validate all backups including customer managed keys

articles/security/benchmarks/security-control-identity-access-control.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -60,10 +60,11 @@ Learn more: https://docs.microsoft.com/azure/active-directory/privileged-identit
6060

6161
Wherever possible, use Azure Active Directory SSO instead than configuring individual stand-alone credentials per-service. Use Azure Security Center Identity and Access Management recommendations.
6262

63-
Understanding SSO with Azure AD:
63+
Understand SSO with Azure AD:
64+
6465
https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-single-sign-on
6566

66-
## 3.5: Use multi-factor authentication for all Azure Active Directory based access.
67+
## 3.5: Use multi-factor authentication for all Azure Active Directory based access
6768

6869
| Azure ID | CIS IDs | Responsibility |
6970
|--|--|--|
@@ -88,9 +89,11 @@ https://docs.microsoft.com/azure/security-center/security-center-identity-access
8889
Use PAWs (privileged access workstations) with MFA configured to log into and configure Azure resources.
8990

9091
Learn about Privileged Access Workstations:
92+
9193
https://docs.microsoft.com/windows-server/identity/securing-privileged-access/privileged-access-workstations
9294

9395
How to enable MFA in Azure:
96+
9497
https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted
9598

9699

@@ -131,20 +134,23 @@ https://docs.microsoft.com/azure/active-directory/reports-monitoring/quickstart-
131134
Use Azure Active Directory (AAD) as the central authentication and authorization system. AAD protects data by using strong encryption for data at rest and in transit. AAD also salts, hashes, and securely stores user credentials.
132135

133136
How to create and configure an AAD instance:
137+
134138
https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-access-create-new-tenant
135139

136140
## 3.10: Regularly review and reconcile user access
137141

138142
| Azure ID | CIS IDs | Responsibility |
139143
|--|--|--|
140-
| 3.1 | 16.9, 16.10 | Customer |
144+
| 3.10 | 16.9, 16.10 | Customer |
141145

142146
Azure AD provides logs to help discover stale accounts. In addition, use Azure Identity Access Reviews to efficiently manage group memberships, access to enterprise applications, and role assignments. User access can be reviewed on a regular basis to make sure only the right Users have continued access.
143147

144-
Azure AD Reporting
148+
Azure AD Reporting:
149+
145150
https://docs.microsoft.com/azure/active-directory/reports-monitoring/
146151

147152
How to use Azure Identity Access Reviews:
153+
148154
https://docs.microsoft.com/azure/active-directory/governance/access-reviews-overview
149155

150156
## 3.11: Monitor attempts to access deactivated accounts
@@ -189,7 +195,7 @@ https://docs.microsoft.com/azure/sentinel/quickstart-onboard
189195

190196
In support scenarios where Microsoft needs to access customer data, Customer Lockbox provides an interface for you to review, and approve or reject customer data access requests.
191197

192-
Understanding Customer Lockbox:
198+
Understand Customer Lockbox:
193199

194200
https://docs.microsoft.com/azure/security/fundamentals/customer-lockbox-overview
195201

articles/security/benchmarks/security-control-incident-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Refer to NIST's publication: Guide to Test, Training, and Exercise Programs for
6262

6363
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-84.pdf
6464

65-
## 10.4: Provide security incident contact details and configure alert notifications  for security incidents
65+
## 10.4: Provide security incident contact details and configure alert notifications for security incidents
6666

6767
| Azure ID | CIS IDs | Responsibility |
6868
|--|--|--|

articles/security/benchmarks/security-control-inventory-asset-management.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ How to view your Azure Subscriptions:
3434

3535
https://docs.microsoft.com/powershell/module/az.accounts/get-azsubscription?view=azps-3.0.0
3636

37-
Understanding Azure RBAC:
37+
Understand Azure RBAC:
3838

3939
https://docs.microsoft.com/azure/role-based-access-control/overview
4040

@@ -120,7 +120,7 @@ How to use File Integrity Monitoring:
120120

121121
https://docs.microsoft.com/azure/security-center/security-center-file-integrity-monitoring#using-file-integrity-monitoring
122122

123-
Understanding Azure Change Tracking:
123+
Understand Azure Change Tracking:
124124

125125
https://docs.microsoft.com/azure/automation/change-tracking
126126

@@ -191,6 +191,7 @@ https://docs.microsoft.com/azure/role-based-access-control/conditional-access-az
191191
Use operating system specific configurations or third-party resources to limit users' ability to execute scripts within Azure compute resources.
192192

193193
For example, how to control PowerShell script execution in Windows Environments:
194+
194195
https://docs.microsoft.com/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-6
195196

196197
## 6.13: Physically or logically segregate high risk applications

articles/security/benchmarks/security-control-logging-monitoring.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ How to collect platform logs and metrics with Azure Monitor:
6464

6565
https://docs.microsoft.com/azure/azure-monitor/platform/diagnostic-settings
6666

67-
Understanding logging and different log types in Azure:
67+
Understand logging and different log types in Azure:
6868

6969
https://docs.microsoft.com/azure/azure-monitor/platform/platform-logs-overview
7070

@@ -77,9 +77,11 @@ https://docs.microsoft.com/azure/azure-monitor/platform/platform-logs-overview
7777
If the compute resource is owned by Microsoft, then Microsoft is responsible for monitoring it. If the compute resource is owned by your organization, it's your responsibility to monitor it. You can use Azure Security Center to monitor the OS. Data collected by Security Center from the operating system includes OS type and version, OS (Windows Event Logs), running processes, machine name, IP addresses, and logged in user. The Log Analytics Agent also collects crash dump files.
7878

7979
How to collect Azure Virtual Machine internal host logs with Azure Monitor:
80+
8081
https://docs.microsoft.com/azure/azure-monitor/learn/quick-collect-azurevm
8182

82-
Understanding Azure Security Center data collection:
83+
Understand Azure Security Center data collection:
84+
8385
https://docs.microsoft.com/azure/security-center/security-center-enable-data-collection
8486

8587
## 2.5: Configure security log storage retention
@@ -91,6 +93,7 @@ https://docs.microsoft.com/azure/security-center/security-center-enable-data-col
9193
Within Azure Monitor, set your Log Analytics Workspace retention period according to your organization's compliance regulations. Use Azure Storage Accounts for long-term/archival storage.
9294

9395
How to set log retention parameters for Log Analytics Workspaces:
96+
9497
https://docs.microsoft.com/azure/azure-monitor/platform/manage-cost-storage#change-the-data-retention-period
9598

9699
## 2.6: Monitor and review Logs
@@ -107,7 +110,7 @@ How to onboard Azure Sentinel:
107110

108111
https://docs.microsoft.com/azure/sentinel/quickstart-onboard
109112

110-
Understanding Log Analytics Workspace:
113+
Understand Log Analytics Workspace:
111114

112115
https://docs.microsoft.com/azure/azure-monitor/log-query/get-started-portal
113116

@@ -153,7 +156,7 @@ How to configure Microsoft Antimalware for Cloud Services:
153156

154157
https://docs.microsoft.com/powershell/module/servicemanagement/azure/set-azureserviceantimalwareextension?view=azuresmps-4.0.0
155158

156-
Understanding Microsoft Antimalware:
159+
Understand Microsoft Antimalware:
157160

158161
https://docs.microsoft.com/azure/security/fundamentals/antimalware
159162

0 commit comments

Comments
 (0)