Skip to content

Commit 782ff5c

Browse files
authored
Merge pull request #249726 from TerryLanfear/sec-082423
freshness
2 parents 337c945 + fa6902f commit 782ff5c

16 files changed

+99
-98
lines changed

articles/security/develop/secure-deploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Deploy secure applications on Microsoft Azure
33
description: This article discusses best practices to consider during the release and response phases of your web application project.
44
author: TerryLanfear
5-
manager: barbkess
5+
manager: rkarlin
66
ms.author: terrylan
7-
ms.date: 06/15/2022
7+
ms.date: 08/29/2023
88
ms.topic: article
99
ms.service: security
1010
ms.subservice: security-develop

articles/security/fundamentals/azure-marketplace-images.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ description: This article provides recommendations for images included in the ma
44
services: security
55
documentationcenter: na
66
author: terrylanfear
7-
manager: barbkess
7+
manager: rkarlin
88
ms.assetid:
9-
ms.service: marketplace
10-
ms.subservice: partnercenter-marketplace-publisher
9+
ms.service: security
10+
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 01/11/2019
12+
ms.date: 08/29/2023
1313
ms.author: terrylan
1414

1515
---

articles/security/fundamentals/backup-plan-to-protect-against-ransomware.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: Azure backup and restore plan to protect against ransomware | Microsoft Docs
33
description: Learn what to do before and during a ransomware attack to protect your critical business systems and ensure a rapid recovery of business operations.
44
author: TerryLanfear
5-
ms.service: information-protection
6-
ms.subservice: aiplabels
5+
ms.service: security
6+
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: terrylan
99
manager: rkarlin
10-
ms.date: 10/10/2022
10+
ms.date: 08/29/2023
1111
ms.custom: ignite-fall-2021
1212
---
1313

@@ -113,12 +113,12 @@ Apply these best practices before an attack.
113113
| Task | Detail |
114114
| --- | --- |
115115
| Identify the important systems that you need to bring back online first (using top five categories above) and immediately begin performing regular backups of those systems. | To get back up and running as quickly as possible after an attack, determine today what is most important to you. |
116-
| Migrate your organization to the cloud. <br><br>Consider purchasing a Microsoft Unified Support plan or working with a Microsoft partner to help support your move to the cloud. | Reduce your on-premises exposure by moving data to cloud services with automatic backup and self-service rollback. Microsoft Azure has a robust set of tools to help you backup your business-critical systems and restore your backups faster. <br><br>[Microsoft Unified Support](https://www.microsoft.com/en-us/msservices/unified-support-solutions) is a cloud services support model that is there to help you whenever you need it. Unified Support: <br><br>Provides a designated team that is available 24x7 with as-needed problem resolution and critical incident escalation <br><br>Helps you monitor the health of your IT environment and works proactively to make sure problems are prevented before they happen |
116+
| Migrate your organization to the cloud. <br><br>Consider purchasing a Microsoft Unified Support plan or working with a Microsoft partner to help support your move to the cloud. | Reduce your on-premises exposure by moving data to cloud services with automatic backup and self-service rollback. Microsoft Azure has a robust set of tools to help you back up your business-critical systems and restore your backups faster. <br><br>[Microsoft Unified Support](https://www.microsoft.com/en-us/msservices/unified-support-solutions) is a cloud services support model that is there to help you whenever you need it. Unified Support: <br><br>Provides a designated team that is available 24x7 with as-needed problem resolution and critical incident escalation <br><br>Helps you monitor the health of your IT environment and works proactively to make sure problems are prevented before they happen |
117117
| Move user data to cloud solutions like OneDrive and SharePoint to take advantage of [versioning and recycle bin capabilities](/compliance/assurance/assurance-malware-and-ransomware-protection#sharepoint-online-and-onedrive-for-business-protection-against-ransomware). <br><br>Educate users on how to recover their files by themselves to reduce delays and cost of recovery. For example, if a user’s OneDrive files were infected by malware, they can [restore](https://support.microsoft.com/office/restore-your-onedrive-fa231298-759d-41cf-bcd0-25ac53eb8a15?ui=en-US&rs=en-US&ad=US) their entire OneDrive to a previous time. <br><br>Consider a defense strategy, such as [Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-defender), before allowing users to restore their own files. | User data in the Microsoft cloud can be protected by built-in security and data management features. <br><br>It's good to teach users how to restore their own files but you need to be careful that your users do not restore the malware used to carry out the attack. You need to: <br><br>Ensure your users don't restore their files until you are confident that the attacker has been evicted <br><br>Have a mitigation in place in case a user does restore some of the malware <br><br>Microsoft 365 Defender uses AI-powered automatic actions and playbooks to remediate impacted assets back to a secure state. Microsoft 365 Defender leverages automatic remediation capabilities of the suite products to ensure all impacted assets related to an incident are automatically remediated where possible. |
118118
| Implement the [Microsoft cloud security benchmark](/security/benchmark/azure/introduction). | The Microsoft cloud security benchmark is our security control framework based on industry-based security control frameworks such as NIST SP800-53, CIS Controls v7.1. It provides organizations guidance on how to configure Azure and Azure services and implement the security controls. See [Backup and Recovery](/security/benchmark/azure/security-controls-v3-backup-recovery). |
119119
| Regularly exercise your business continuity/disaster recovery (BC/DR) plan. <br><br>Simulate incident response scenarios. Exercises you perform in preparing for an attack should be planned and conducted around your prioritized backup and restore lists. <br><br>Regularly test ‘Recover from Zero’ scenario to ensure your BC/DR can rapidly bring critical business operations online from zero functionality (all systems down). | Ensures rapid recovery of business operations by treating a ransomware or extortion attack with the same importance as a natural disaster. <br><br>Conduct practice exercise(s) to validate cross-team processes and technical procedures, including out of band employee and customer communications (assume all email and chat is down). |
120120
| Consider creating a risk register to identify potential risks and address how you will mediate through preventative controls and actions. Add ransomware to risk register as high likelihood and high impact scenario. | A risk register can help you prioritize risks based on the likelihood of that risk occurring and the severity to your business should that risk occur. <br><br>Track mitigation status via [Enterprise Risk Management (ERM)](/compliance/assurance/assurance-risk-management) assessment cycle. |
121-
| Backup all critical business systems automatically on a regular schedule (including backup of critical dependencies like Active Directory). <br><br>Validate that your backup is good as your backup is created. | Allows you to recover data up to the last backup. |
121+
| Back up all critical business systems automatically on a regular schedule (including backup of critical dependencies like Active Directory). <br><br>Validate that your backup is good as your backup is created. | Allows you to recover data up to the last backup. |
122122
| Protect (or print) supporting documents and systems required for recovery such as restoration procedure documents, CMDB, network diagrams, and SolarWinds instances. | Attackers deliberately target these resources because it impacts your ability to recover. |
123123
| Ensure you have well-documented procedures for engaging any third-party support, particularly support from threat intelligence providers, antimalware solution providers, and from the malware analysis provider. Protect (or print) these procedures. | Third-party contacts may be useful if the given ransomware variant has known weaknesses or decryption tools are available. |
124124
| Ensure backup and recovery strategy includes: <br><br>Ability to back up data to a specific point in time. <br><br>Multiple copies of backups are stored in isolated, offline (air-gapped) locations. <br><br>Recovery time objectives that establish how quickly backed up information can be retrieved and put into production environment. <br><br>Rapid restore of back up to a production environment/sandbox. | Backups are essential for resilience after an organization has been breached. Apply the 3-2-1 rule for maximum protection and availability: 3 copies (original + 2 backups), 2 storage types, and 1 offsite or cold copy. |

articles/security/fundamentals/best-practices-and-patterns.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,18 @@
11
---
22
title: Security best practices and patterns - Microsoft Azure | Microsoft Docs
33
description: This article links you to security best practices and patterns for different Azure resources.
4-
services: azure-security
4+
services: security
55
documentationcenter: na
66
author: TerryLanfear
7-
manager: barbkess
8-
editor: TomSh
7+
manager: rkarlin
98

109
ms.assetid: 1cbbf8dc-ea94-4a7e-8fa0-c2cb198956c5
1110
ms.service: security
1211
ms.subservice: security-fundamentals
1312
ms.topic: conceptual
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
16-
ms.date: 6/02/2022
15+
ms.date: 08/29/2023
1716
ms.author: terrylan
1817

1918
---

articles/security/fundamentals/feature-availability.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,10 @@
22
title: Cloud feature availability for commercial and US Government customers
33
description: This article describes security feature availability in Azure and Azure Government clouds
44
author: TerryLanfear
5+
manager: rkarlin
56
ms.author: terrylan
67
ms.service: security
8+
ms.subservice: security-fundamentals
79
ms.custom: ignite-2022
810
ms.topic: reference
911
ms.date: 01/13/2023

articles/security/fundamentals/iaas.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,14 @@ services: security
55
documentationcenter: na
66
author: terrylanfear
77
manager: rkarlin
8-
editor: TomSh
98

109
ms.assetid: 02c5b7d2-a77f-4e7f-9a1e-40247c57e7e2
11-
ms.service: azure-migrate
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1212
ms.topic: article
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 10/28/2019
15+
ms.date: 08/29/2023
1616
ms.author: terrylan
1717
---
1818

@@ -31,15 +31,15 @@ The first step in protecting your VMs is to ensure that only authorized users ca
3131
>
3232
>
3333
34-
**Best practice**: Control VM access.
34+
**Best practice**: Control VM access.
3535
**Detail**: Use [Azure policies](../../governance/policy/overview.md) to establish conventions for resources in your organization and create customized policies. Apply these policies to resources, such as [resource groups](../../azure-resource-manager/management/overview.md). VMs that belong to a resource group inherit its policies.
3636

3737
If your organization has many subscriptions, you might need a way to efficiently manage access, policies, and compliance for those subscriptions. [Azure management groups](../../governance/management-groups/overview.md) provide a level of scope above subscriptions. You organize subscriptions into management groups (containers) and apply your governance conditions to those groups. All subscriptions within a management group automatically inherit the conditions applied to the group. Management groups give you enterprise-grade management at a large scale no matter what type of subscriptions you might have.
3838

39-
**Best practice**: Reduce variability in your setup and deployment of VMs.
39+
**Best practice**: Reduce variability in your setup and deployment of VMs.
4040
**Detail**: Use [Azure Resource Manager](../../azure-resource-manager/templates/syntax.md) templates to strengthen your deployment choices and make it easier to understand and inventory the VMs in your environment.
4141

42-
**Best practice**: Secure privileged access.
42+
**Best practice**: Secure privileged access.
4343
**Detail**: Use a [least privilege approach](/windows-server/identity/ad-ds/plan/security-best-practices/implementing-least-privilege-administrative-models) and built-in Azure roles to enable users to access and set up VMs:
4444

4545
- [Virtual Machine Contributor](../../role-based-access-control/built-in-roles.md#virtual-machine-contributor): Can manage VMs, but not the virtual network or storage account to which they are connected.
@@ -59,10 +59,10 @@ Organizations that control VM access and setup improve their overall VM security
5959
## Use multiple VMs for better availability
6060
If your VM runs critical applications that need to have high availability, we strongly recommend that you use multiple VMs. For better availability, use an [availability set](../../virtual-machines/availability-set-overview.md) or availability [zones](../../availability-zones/az-overview.md).
6161

62-
An availability set is a logical grouping that you can use in Azure to ensure that the VM resources you place within it are isolated from each other when theyre deployed in an Azure datacenter. Azure ensures that the VMs you place in an availability set run across multiple physical servers, compute racks, storage units, and network switches. If a hardware or Azure software failure occurs, only a subset of your VMs are affected, and your overall application continues to be available to your customers. Availability sets are an essential capability when you want to build reliable cloud solutions.
62+
An availability set is a logical grouping that you can use in Azure to ensure that the VM resources you place within it are isolated from each other when they're deployed in an Azure datacenter. Azure ensures that the VMs you place in an availability set run across multiple physical servers, compute racks, storage units, and network switches. If a hardware or Azure software failure occurs, only a subset of your VMs are affected, and your overall application continues to be available to your customers. Availability sets are an essential capability when you want to build reliable cloud solutions.
6363

6464
## Protect against malware
65-
You should install antimalware protection to help identify and remove viruses, spyware, and other malicious software. You can install [Microsoft Antimalware](antimalware.md) or a Microsoft partners endpoint protection solution ([Trend Micro](https://help.deepsecurity.trendmicro.com/Welcome.html), [Broadcom](https://www.broadcom.com/products), [McAfee](https://www.mcafee.com/us/products.aspx), [Windows Defender](https://www.microsoft.com/windows/comprehensive-security), and [System Center Endpoint Protection](/configmgr/protect/deploy-use/endpoint-protection)).
65+
You should install antimalware protection to help identify and remove viruses, spyware, and other malicious software. You can install [Microsoft Antimalware](antimalware.md) or a Microsoft partner's endpoint protection solution ([Trend Micro](https://cloudone.trendmicro.com/docs/workload-security/), [Broadcom](https://www.broadcom.com/products), [McAfee](https://www.mcafee.com/us/products.aspx), [Windows Defender](https://www.microsoft.com/windows/comprehensive-security), and [System Center Endpoint Protection](/configmgr/protect/deploy-use/endpoint-protection)).
6666

6767
Microsoft Antimalware includes features like real-time protection, scheduled scanning, malware remediation, signature updates, engine updates, samples reporting, and exclusion event collection. For environments that are hosted separately from your production environment, you can use an antimalware extension to help protect your VMs and cloud services.
6868

articles/security/fundamentals/identity-management-best-practices.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,14 @@ services: security
55
documentationcenter: na
66
author: terrylanfear
77
manager: RKarlin
8-
editor: TomSh
98

109
ms.assetid: 07d8e8a8-47e8-447c-9c06-3a88d2713bc1
11-
ms.service: information-protection
12-
ms.subservice: aiplabels
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1312
ms.topic: article
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
16-
ms.date: 12/19/2022
15+
ms.date: 08/29/2023
1716
ms.author: terrylan
1817

1918
---

articles/security/fundamentals/infrastructure-monitoring.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ description: Learn about infrastructure monitoring aspects of the Azure producti
44
services: security
55
documentationcenter: na
66
author: TerryLanfear
7-
manager: barbkess
8-
editor: TomSh
7+
manager: rkarlin
98

109
ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
1110
ms.service: security
11+
ms.subservice: security-fundamentals
1212
ms.topic: article
1313
ms.tgt_pltfrm: na
1414
ms.workload: na
15-
ms.date: 06/28/2018
15+
ms.date: 08/29/2023
1616
ms.author: terrylan
1717
---
1818

articles/security/fundamentals/infrastructure-operations.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,15 @@ description: This article describes how Microsoft manages and operates the Azure
44
services: security
55
documentationcenter: n
66
author: TerryLanfear
7-
manager: barbkess
8-
editor: TomSh
7+
manager: rkarlin
98

109
ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
1110
ms.service: security
1211
ms.subservice: security-fundamentals
1312
ms.topic: article
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
16-
ms.date: 05/30/2019
15+
ms.date: 08/29/2023
1716
ms.author: terrylan
1817

1918
---

0 commit comments

Comments
 (0)