|
| 1 | +--- |
| 2 | +title: Azure Security Control - Data Protection |
| 3 | +description: Security Control Data Protection |
| 4 | +author: msmbaldwin |
| 5 | +manager: rkarlin |
| 6 | + |
| 7 | +ms.service: security |
| 8 | +ms.topic: conceptual |
| 9 | +ms.date: 12/30/2019 |
| 10 | +ms.author: mbaldwin |
| 11 | +ms.custom: security-recommendations |
| 12 | + |
| 13 | +--- |
| 14 | + |
| 15 | +# Security Control: Data Protection |
| 16 | + |
| 17 | +Data protection recommendations focus on addressing issues related to encryption, access control lists, identity-based access control, and audit logging for data access. |
| 18 | + |
| 19 | +## 4.1: Maintain an inventory of sensitive Information |
| 20 | + |
| 21 | +| Azure ID | CIS IDs | Responsibility | |
| 22 | +|--|--|--| |
| 23 | +| 4.1 | 13.1 | Customer | |
| 24 | + |
| 25 | +Use Tags to assist in tracking Azure resources that store or process sensitive information. |
| 26 | + |
| 27 | +How to create and use Tags: |
| 28 | + |
| 29 | +https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tags |
| 30 | + |
| 31 | +## 4.2: Isolate systems storing or processing sensitive information |
| 32 | + |
| 33 | +| Azure ID | CIS IDs | Responsibility | |
| 34 | +|--|--|--| |
| 35 | +| 4.2 | 13.2 | Customer | |
| 36 | + |
| 37 | +Implement separate subscriptions and/or management groups for development, test, and production. Resources should be separated by VNet/Subnet, tagged appropriately, and secured by an NSG or Azure Firewall. Resources storing or processing sensitive data should be sufficiently isolated. For Virtual Machines storing or processing sensitive data, implement policy and procedure(s) to turn them off when not in use. |
| 38 | + |
| 39 | +How to create additional Azure subscriptions: |
| 40 | + |
| 41 | +https://docs.microsoft.com/azure/billing/billing-create-subscription |
| 42 | + |
| 43 | +How to create Management Groups: |
| 44 | + |
| 45 | +https://docs.microsoft.com/azure/governance/management-groups/create |
| 46 | + |
| 47 | +How to create and use Tags: |
| 48 | + |
| 49 | +https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tags |
| 50 | + |
| 51 | +How to create a Virtual Network: |
| 52 | + |
| 53 | +https://docs.microsoft.com/azure/virtual-network/quick-create-portal |
| 54 | + |
| 55 | +How to create an NSG with a Security Config: |
| 56 | + |
| 57 | +https://docs.microsoft.com/azure/virtual-network/tutorial-filter-network-traffic |
| 58 | + |
| 59 | +How to deploy Azure Firewall: |
| 60 | + |
| 61 | +https://docs.microsoft.com/azure/firewall/tutorial-firewall-deploy-portal |
| 62 | + |
| 63 | +How to configure alert or alert and deny with Azure Firewall: |
| 64 | + |
| 65 | +https://docs.microsoft.com/azure/firewall/threat-intel |
| 66 | + |
| 67 | +## 4.3: Monitor and block unauthorized transfer of sensitive information |
| 68 | + |
| 69 | +| Azure ID | CIS IDs | Responsibility | |
| 70 | +|--|--|--| |
| 71 | +| 4.3 | 13.3 | Customer | |
| 72 | + |
| 73 | +Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals. |
| 74 | + |
| 75 | +## 4.4: Encrypt all sensitive information in transit |
| 76 | + |
| 77 | +| Azure ID | CIS IDs | Responsibility | |
| 78 | +|--|--|--| |
| 79 | +| 4.4 | 14.4 | Shared | |
| 80 | + |
| 81 | +Encrypt all sensitive information in transit. Ensure that any clients connecting to your Azure resources are able to negotiate TLS 1.2 or greater. |
| 82 | + |
| 83 | +Follow Azure Security Center recommendations for encryption at rest and encryption in transit, where applicable. |
| 84 | + |
| 85 | +Understanding encryption in transit with Azure: |
| 86 | + |
| 87 | +https://docs.microsoft.com/azure/security/fundamentals/encryption-overview#encryption-of-data-in-transit |
| 88 | + |
| 89 | +## 4.5: Use an active discovery tool to identify sensitive data |
| 90 | + |
| 91 | +| Azure ID | CIS IDs | Responsibility | |
| 92 | +|--|--|--| |
| 93 | +| 4.5 | 14.5 | Customer | |
| 94 | + |
| 95 | +When no feature is available for your specific service in Azure, use a third-party active discovery tool to identify all sensitive information stored, processed, or transmitted by the organization's technology systems, including those located on-site, or at a remote service provider, and update the organization's sensitive information inventory. |
| 96 | + |
| 97 | +Use Azure Information Protection for identifying sensitive information within Office 365 documents. |
| 98 | + |
| 99 | +Use Azure SQL Information Protection to assist in the classification and labeling of information stored in Azure SQL Databases. |
| 100 | + |
| 101 | +How to implement Azure SQL Data Discovery: |
| 102 | + |
| 103 | +https://docs.microsoft.com/azure/sql-database/sql-database-data-discovery-and-classification |
| 104 | + |
| 105 | +How to implement Azure Information Protection: |
| 106 | + |
| 107 | +https://docs.microsoft.com/azure/information-protection/deployment-roadmap |
| 108 | + |
| 109 | +## 4.6: Use Azure RBAC to control access to resources |
| 110 | + |
| 111 | +| Azure ID | CIS IDs | Responsibility | |
| 112 | +|--|--|--| |
| 113 | +| 4.6 | 14.6 | Customer | |
| 114 | + |
| 115 | +Use Azure AD RBAC to control access to data and resources, otherwise use service specific access control methods. |
| 116 | + |
| 117 | +Understanding Azure RBAC: |
| 118 | + |
| 119 | +https://docs.microsoft.com/azure/role-based-access-control/overview |
| 120 | + |
| 121 | +How to configure RBAC in Azure: |
| 122 | + |
| 123 | +https://docs.microsoft.com/azure/role-based-access-control/role-assignments-portal |
| 124 | + |
| 125 | +## 4.7: Use host-based data loss prevention to enforce access control |
| 126 | + |
| 127 | +| Azure ID | CIS IDs | Responsibility | |
| 128 | +|--|--|--| |
| 129 | +| 4.7 | 14.7 | Customer | |
| 130 | + |
| 131 | +Implement a third-party tool, such as an automated host-based Data Loss Prevention solution, to enforce access controls to data even when data is copied off a system. |
| 132 | + |
| 133 | +## 4.8: Encrypt sensitive information at rest |
| 134 | + |
| 135 | +| Azure ID | CIS IDs | Responsibility | |
| 136 | +|--|--|--| |
| 137 | +| 4.8 | 14.8 | Customer | |
| 138 | + |
| 139 | +Use encryption at rest on all Azure resources. Microsoft recommends allowing Azure to manage your encryption keys, however there is the option for you to manage your own keys in some instances. |
| 140 | + |
| 141 | +Understand encryption at rest in Azure: |
| 142 | + |
| 143 | +https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest |
| 144 | + |
| 145 | +How to configure customer managed encryption keys: |
| 146 | + |
| 147 | +https://docs.microsoft.com/azure/storage/common/storage-encryption-keys-portal |
| 148 | + |
| 149 | +## 4.9: Log and alert on changes to critical Azure resources |
| 150 | + |
| 151 | +| Azure ID | CIS IDs | Responsibility | |
| 152 | +|--|--|--| |
| 153 | +| 4.9 | 14.9 | Customer | |
| 154 | + |
| 155 | +Use Azure Monitor with the Azure Activity Log to create alerts for when changes take place to critical Azure resources. |
| 156 | + |
| 157 | +How to create alerts for Azure Activity Log events: |
| 158 | + |
| 159 | +https://docs.microsoft.com/azure/azure-monitor/platform/alerts-activity-log |
| 160 | + |
| 161 | +## Next steps |
| 162 | + |
| 163 | +See the next security control: [Vulnerability Management](security-control-vulnerability-management.md) |
| 164 | + |
0 commit comments