Skip to content

Commit 6cab964

Browse files
committed
Continuing the experiment
1 parent c159367 commit 6cab964

File tree

2 files changed

+153
-1
lines changed

2 files changed

+153
-1
lines changed

articles/security-center/secure-score-security-controls.md

Lines changed: 62 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The table below lists the security controls in Azure Security Center. For each c
8888
> [!TIP]
8989
> If you'd like to filter or sort this list differently, copy and paste it into Excel.
9090
91-
|Security controls (listed by maximum score)|Recommendations                              |
91+
|Security controls<br>(listed by maximum score)|Recommendations|
9292
|-----------|---------------|
9393
|**Enable MFA** (max score **10**)<br>*If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password. With [MFA](https://www.microsoft.com/security/business/identity/mfa) enabled, your accounts are more secure, and users can still sign on to almost any application with single sign-on.*|- MFA should be enabled on accounts with owner permissions on your subscription<br>- MFA should be enabled accounts with write permissions on your subscription|
9494
|**Secure management ports** (max score **8**)<br>*Brute force attacks target management ports to gain access to a VM. Since the ports don’t always need to be open, one mitigation strategy is to reduce exposure to the ports using just-in-time network access controls, network security groups, and virtual machine port management.<br>Since many IT do not block SSH communications outbound from their network, attackers can create encrypted tunnels that allow RDP ports on infected systems to communicate back to the attacker command to control servers. Attackers can use the Windows Remote Management subsystem to move laterally across your environment and use stolen credentials to access other resources on a network.*|- Just-In-Time network access control should be applied on virtual machines<br>- Virtual machines should be associated with a Network Security Group<br>- Management ports should be closed on your virtual machines|
@@ -107,6 +107,67 @@ The table below lists the security controls in Azure Security Center. For each c
107107
|**Implement security best practices** (max score **0**)|- A maximum of 3 owners should be designated for your subscription<br>- External accounts with read permissions should be removed from your subscription<br>- MFA should be enabled on accounts with read permissions on your subscription<br>- Access to storage accounts with firewall and virtual network configurations should be restricted<br>- All authorization rules except RootManageSharedAccessKey should be removed from Event Hub namespace<br>- An Azure Active Directory administrator should be provisioned for SQL servers<br>- Authorization rules on the Event Hub instance should be defined<br>- Storage accounts should be migrated to new Azure Resource Manager resources<br>- Virtual machines should be migrated to new Azure Resource Manager resources<br>- Advanced data security settings for SQL server should contain an email address to receive security alerts<br>- Advanced data security should be enabled on your managed instances<br>- All advanced threat protection types should be enabled in SQL managed instance advanced data security settings<br>- Email notifications to admins and subscription owners should be enabled in SQL server advanced data security settings<br>- Advanced Threat Protection types should be set to 'All' in SQL server Advanced Data Security settings<br>- Subnets should be associated with a Network Security Group<br>- All advanced threat protection types should be enabled in SQL server advanced data security settings<br>- [Preview] Windows exploit guard should be enabled <br>- [Preview] Guest configuration agent should be installed|
108108
||||
109109

110+
111+
112+
113+
114+
115+
116+
117+
118+
119+
120+
<div class="foo">
121+
122+
123+
<table class="blueTable">
124+
<thead>
125+
<tr>
126+
<th>head1</th>
127+
<th>head2</th>
128+
</tr>
129+
</thead>
130+
<tbody>
131+
<tr>
132+
<td>cell1_1</td>
133+
<td>cell2_1</td>
134+
</tr>
135+
<tr>
136+
<td>cell1_2</td>
137+
<td>cell2_2</td>
138+
</tr>
139+
<tr>
140+
<td>cell1_3</td>
141+
<td>cell2_3</td>
142+
</tr>
143+
<tr>
144+
<td>cell1_4</td>
145+
<td>cell2_4</td>
146+
</tr>
147+
<tr>
148+
<td>cell1_5</td>
149+
<td>cell2_5</td>
150+
</tr>
151+
<tr>
152+
<td>cell1_6</td>
153+
<td>cell2_6</td>
154+
</tr>
155+
<tr>
156+
<td>cell1_7</td>
157+
<td>cell2_7</td>
158+
</tr>
159+
</tbody>
160+
</table>
161+
162+
163+
164+
165+
</div>
166+
167+
168+
169+
170+
110171
## Secure score FAQ
111172

112173
### Why has my secure score gone down?

0 commit comments

Comments
 (0)