Skip to content

Commit 76d2342

Browse files
authored
Merge pull request #99120 from msmbaldwin/security-controls
Security Controls articles v1
2 parents 9fbb779 + 6810c21 commit 76d2342

17 files changed

+1720
-1
lines changed

articles/security/benchmarks/TOC.yml

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
- name: Azure Security Benchmark
2+
href: index.yml
3+
- name: Introduction
4+
href: introduction.md
5+
- name: Security Controls
6+
items:
7+
- name: Overview
8+
href: overview.md
9+
- name: Network Security
10+
href: security-control-network-security.md
11+
- name: Logging and Monitoring
12+
href: security-control-logging-monitoring.md
13+
- name: Identity and Access Control
14+
href: security-control-identity-access-control.md
15+
- name: Data Protection
16+
href: security-control-data-protection.md
17+
- name: Vulnerability Management
18+
href: security-control-vulnerability-management.md
19+
- name: Inventory and Asset Management
20+
href: security-control-inventory-asset-management.md
21+
- name: Secure Configuration
22+
href: security-control-secure-configuration.md
23+
- name: Malware Defense
24+
href: security-control-malware-defense.md
25+
- name: Data Recovery
26+
href: security-control-data-recovery.md
27+
- name: Incident Response
28+
href: security-control-incident-response.md
29+
- name: Penetration Tests and Red Team Exercises
30+
href: security-control-penetration-tests-red-team-exercises.md
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
### YamlMime:Landing
2+
3+
title: Azure security benchmarks documentation
4+
summary: Learn how to secure your cloud solutions on Azure with our best practices and guidance.
5+
6+
metadata:
7+
title: Azure security benchmarks
8+
description: The Azure Security Controls Benchmark contains recommendations that help you improve the security of your applications and data on Azure.
9+
services: security
10+
ms.service: security
11+
ms.subservice: fundamentals
12+
ms.topic: landing-page
13+
author: msmbaldwin
14+
ms.author: mbaldwin
15+
manager: rkarlin
16+
ms.date: 12/23/2019
17+
18+
19+
landingContent:
20+
# Card
21+
- title: About the Azure Security Benchmark
22+
linkLists:
23+
- linkListType: overview
24+
links:
25+
- text: Overview
26+
url: overview.md
27+
- text: Introduction to Security Controls
28+
url: introduction.md
29+
- text: Shared responsibility in the cloud
30+
url: ../fundamentals/shared-responsibility.md
31+
# Card
32+
- title: Security Controls
33+
linkLists:
34+
- linkListType: overview
35+
links:
36+
- text: Network Security
37+
url: security-control-network-security.md
38+
- text: Logging and Monitoring
39+
url: security-control-logging-monitoring.md
40+
- text: Identity and Access Control
41+
url: security-control-identity-access-control.md
42+
- text: Data Protection
43+
url: security-control-data-protection.md
44+
- text: Vulnerability Management
45+
url: security-control-vulnerability-management.md
46+
- text: See more
47+
url: security-control-inventory-asset-management.md
48+
# Card
49+
- title: More Azure Security Information
50+
linkLists:
51+
- linkListType: learn
52+
links:
53+
54+
- text: Azure Security Fundamentals
55+
url: ../fundamentals/index.yml
56+
- text: Azure Security Center
57+
url: ../../security-center/index.yml
58+
- text: Azure Key Vault
59+
url: ../../key-vault/index.yml
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: Azure Security Benchmark Introduction
3+
description: Security Benchmark introduction
4+
author: msmbaldwin
5+
manager: rkarlin
6+
7+
ms.service: security
8+
ms.topic: conceptual
9+
ms.date: 12/16/2019
10+
ms.author: mbaldwin
11+
ms.custom: security-baselines
12+
13+
---
14+
15+
# Azure security benchmarks introduction
16+
17+
You may have several years or even decades of experience with on-premises computing. You know how to secure those deployments. But the cloud is different. How do you know if your cloud deployments are secure? What are the differences between security practices for on-premises systems and security practices for cloud deployments?
18+
19+
There is a large collection of white papers, best practices, reference architectures, web guidance, open-source tools, commercial solutions, intelligence feeds, and more that can be used to help secure the cloud. Which option should you use? What can you do to get an acceptable level of security in the cloud?
20+
21+
One of the best ways to secure your cloud deployments is to focus on cloud security benchmark recommendations. Benchmark recommendations for securing any service begin with a fundamental understanding of cybersecurity risk and how to manage it. You can then use this understanding by adopting benchmark security recommendations from your cloud service provider to help select specific security configuration settings in your environment.
22+
23+
The Azure Security Benchmark includes a collection of high-impact security recommendations you can use to help secure most of the services you use in Azure. You can think of these recommendations as "general" or "organizational" as they are applicable to most Azure services. The Azure Security Benchmark recommendations are then customized for each Azure service, and this customized guidance is contained in service recommendations articles.
24+
25+
The Azure Security Benchmark documentation specify Security Controls and Service Recommendations.
26+
27+
- **Security Controls**: The Azure Security Benchmark recommendations are categorized by security controls. Security controls represent high-level vendor-agnostic security requirements, such as network security and data protection. Each security control has a set of security recommendations and instructions that help you enable those recommendations.
28+
- **Service Recommendations**: When available, benchmark recommendations for Azure services will include Azure Security Benchmark recommendations that are tailored for the service, as well as additional recommendations that are unique for the particular service.
29+
30+
The terms "Control", "Benchmark", and "Baseline" are used often in the Azure Security Benchmark documentation and it's important to understand how Azure uses those terms.
31+
32+
| Term | Description | Example |
33+
|--|--|--|
34+
| Control | A **control** is a high-level description of a feature or activity that needs to be addressed, and is not specific to a technology or implementation. | Data Protection is one of the security controls. This control contains specific actions that need to be addressed to help ensure data is protected. |
35+
| Benchmark | A **benchmark** contains security recommendations for a specific technology, such as Azure. The recommendations are categorized by the control to which they belong. | The Azure Security benchmark comprises the security recommendations specific to the Azure platform |
36+
| Baseline | A **baseline** is the security requirements for an organization. The security requirements are based on benchmark recommendations. Each organization decides which benchmark recommendations to include in their baseline. | The Contoso company creates its security baseline by choosing to require specific recommendations in the Azure Security Benchmark. |
37+
38+
We welcome your feedback on the Azure Security Benchmark! We encourage you to provide comments in the feedback area below. If you prefer to share your input more privately with the Azure Security Benchmark team, you are welcome to fill out the form at https://aka.ms/AzSecBenchmark
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Azure Security Benchmark Overview
3+
description: Security Benchmark overview
4+
author: msmbaldwin
5+
manager: rkarlin
6+
7+
ms.service: security
8+
ms.topic: conceptual
9+
ms.date: 12/16/2019
10+
ms.author: mbaldwin
11+
ms.custom: security-baselines
12+
13+
---
14+
15+
# Overview
16+
17+
The Azure Security Benchmark contains recommendations that help you improve the security of your applications and data on Azure.
18+
19+
This Benchmark focuses on cloud-centric control areas. These controls are consistent with well-known security benchmarks, such as those described by the Center for Internet Security (CIS) Controls Version 7.1
20+
21+
The following controls are used in the Azure Security Benchmark:
22+
23+
- Network security
24+
- Logging & Monitoring
25+
- Identity and Access Control
26+
- Data protection
27+
- Identity & Access Management
28+
- Data Protection
29+
- Vulnerability Management
30+
- Inventory & Asset Management
31+
- Secure Configuration
32+
- Malware Defense
33+
- Data Recovery
34+
- Incident Response
35+
- Penetration Tests and Red Teaming
36+
37+
## Azure Security Benchmark Recommendations
38+
39+
Each recommendation includes the following information:
40+
41+
- **Azure ID**: The Azure Security Benchmark ID that corresponds to the recommendation.
42+
- **CIS ID(s)**: The CIS benchmark recommendation # that corresponds to this recommendation.
43+
- **Responsibility**: Whether the customer or the service-provider (or both) is (are) responsible for implementing this recommendation. Security responsibilities are shared in the public cloud. Some security controls are only available to the cloud service provider and therefore the provider is responsible for addressing those. These are general observations – for some individual services, the responsibility will be different than what is listed in the Azure Security Benchmark. Those differences are described in the baseline recommendations for the individual service.
44+
- **Details**: The rationale for the recommendation and links to guidance on how to implement the recommendation. If the recommendation is supported by Azure Security Center, that information will be listed here.
45+
46+
We welcome your detailed feedback and active participation in the Azure Security Benchmark effort. If you would like to provide the Benchmark team direct input, please fill out the form at [https://aka.ms/AzSecBenchmark](https://aka.ms/AzSecBenchmark).
47+
48+
## Next Steps
49+
50+
Read the [Azure Security Benchmark Overview](overview.md)
Lines changed: 164 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,164 @@
1+
---
2+
title: Azure Security Control - Data Protection
3+
description: Security Control Data Protection
4+
author: msmbaldwin
5+
manager: rkarlin
6+
7+
ms.service: security
8+
ms.topic: conceptual
9+
ms.date: 12/30/2019
10+
ms.author: mbaldwin
11+
ms.custom: security-recommendations
12+
13+
---
14+
15+
# Security Control: Data Protection
16+
17+
Data protection recommendations focus on addressing issues related to encryption, access control lists, identity-based access control, and audit logging for data access.
18+
19+
## 4.1: Maintain an inventory of sensitive Information
20+
21+
| Azure ID | CIS IDs | Responsibility |
22+
|--|--|--|
23+
| 4.1 | 13.1 | Customer |
24+
25+
Use Tags to assist in tracking Azure resources that store or process sensitive information.
26+
27+
How to create and use Tags:
28+
29+
https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tags
30+
31+
## 4.2: Isolate systems storing or processing sensitive information
32+
33+
| Azure ID | CIS IDs | Responsibility |
34+
|--|--|--|
35+
| 4.2 | 13.2 | Customer |
36+
37+
Implement separate subscriptions and/or management groups for development, test, and production. Resources should be separated by VNet/Subnet, tagged appropriately, and secured by an NSG or Azure Firewall. Resources storing or processing sensitive data should be sufficiently isolated. For Virtual Machines storing or processing sensitive data, implement policy and procedure(s) to turn them off when not in use.
38+
39+
How to create additional Azure subscriptions:
40+
41+
https://docs.microsoft.com/azure/billing/billing-create-subscription
42+
43+
How to create Management Groups:
44+
45+
https://docs.microsoft.com/azure/governance/management-groups/create
46+
47+
How to create and use Tags:
48+
49+
https://docs.microsoft.com/azure/azure-resource-manager/resource-group-using-tags
50+
51+
How to create a Virtual Network:
52+
53+
https://docs.microsoft.com/azure/virtual-network/quick-create-portal
54+
55+
How to create an NSG with a Security Config:
56+
57+
https://docs.microsoft.com/azure/virtual-network/tutorial-filter-network-traffic
58+
59+
How to deploy Azure Firewall:
60+
61+
https://docs.microsoft.com/azure/firewall/tutorial-firewall-deploy-portal
62+
63+
How to configure alert or alert and deny with Azure Firewall:
64+
65+
https://docs.microsoft.com/azure/firewall/threat-intel
66+
67+
## 4.3: Monitor and block unauthorized transfer of sensitive information
68+
69+
| Azure ID | CIS IDs | Responsibility |
70+
|--|--|--|
71+
| 4.3 | 13.3 | Customer |
72+
73+
Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals.
74+
75+
## 4.4: Encrypt all sensitive information in transit
76+
77+
| Azure ID | CIS IDs | Responsibility |
78+
|--|--|--|
79+
| 4.4 | 14.4 | Shared |
80+
81+
Encrypt all sensitive information in transit. Ensure that any clients connecting to your Azure resources are able to negotiate TLS 1.2 or greater.
82+
83+
Follow Azure Security Center recommendations for encryption at rest and encryption in transit, where applicable.
84+
85+
Understanding encryption in transit with Azure:
86+
87+
https://docs.microsoft.com/azure/security/fundamentals/encryption-overview#encryption-of-data-in-transit
88+
89+
## 4.5: Use an active discovery tool to identify sensitive data
90+
91+
| Azure ID | CIS IDs | Responsibility |
92+
|--|--|--|
93+
| 4.5 | 14.5 | Customer |
94+
95+
When no feature is available for your specific service in Azure, use a third-party active discovery tool to identify all sensitive information stored, processed, or transmitted by the organization's technology systems, including those located on-site, or at a remote service provider, and update the organization's sensitive information inventory.
96+
97+
Use Azure Information Protection for identifying sensitive information within Office 365 documents.
98+
99+
Use Azure SQL Information Protection to assist in the classification and labeling of information stored in Azure SQL Databases.
100+
101+
How to implement Azure SQL Data Discovery:
102+
103+
https://docs.microsoft.com/azure/sql-database/sql-database-data-discovery-and-classification
104+
105+
How to implement Azure Information Protection:
106+
107+
https://docs.microsoft.com/azure/information-protection/deployment-roadmap
108+
109+
## 4.6: Use Azure RBAC to control access to resources
110+
111+
| Azure ID | CIS IDs | Responsibility |
112+
|--|--|--|
113+
| 4.6 | 14.6 | Customer |
114+
115+
Use Azure AD RBAC to control access to data and resources, otherwise use service specific access control methods.
116+
117+
Understanding Azure RBAC:
118+
119+
https://docs.microsoft.com/azure/role-based-access-control/overview
120+
121+
How to configure RBAC in Azure:
122+
123+
https://docs.microsoft.com/azure/role-based-access-control/role-assignments-portal
124+
125+
## 4.7: Use host-based data loss prevention to enforce access control
126+
127+
| Azure ID | CIS IDs | Responsibility |
128+
|--|--|--|
129+
| 4.7 | 14.7 | Customer |
130+
131+
Implement a third-party tool, such as an automated host-based Data Loss Prevention solution, to enforce access controls to data even when data is copied off a system.
132+
133+
## 4.8: Encrypt sensitive information at rest
134+
135+
| Azure ID | CIS IDs | Responsibility |
136+
|--|--|--|
137+
| 4.8 | 14.8 | Customer |
138+
139+
Use encryption at rest on all Azure resources. Microsoft recommends allowing Azure to manage your encryption keys, however there is the option for you to manage your own keys in some instances.
140+
141+
Understand encryption at rest in Azure:
142+
143+
https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest
144+
145+
How to configure customer managed encryption keys:
146+
147+
https://docs.microsoft.com/azure/storage/common/storage-encryption-keys-portal
148+
149+
## 4.9: Log and alert on changes to critical Azure resources
150+
151+
| Azure ID | CIS IDs | Responsibility |
152+
|--|--|--|
153+
| 4.9 | 14.9 | Customer |
154+
155+
Use Azure Monitor with the Azure Activity Log to create alerts for when changes take place to critical Azure resources.
156+
157+
How to create alerts for Azure Activity Log events:
158+
159+
https://docs.microsoft.com/azure/azure-monitor/platform/alerts-activity-log
160+
161+
## Next steps
162+
163+
See the next security control: [Vulnerability Management](security-control-vulnerability-management.md)
164+

0 commit comments

Comments
 (0)