Skip to content

Commit 970ae25

Browse files
committed
Updates
1 parent e1f00e3 commit 970ae25

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/peering-service/security-baseline.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: The Microsoft Azure Peering Service security baseline provides proc
44
author: msmbaldwin
55
ms.service: peering-service
66
ms.topic: conceptual
7-
ms.date: 04/02/2021
7+
ms.date: 04/09/2021
88
ms.author: mbaldwin
99
ms.custom: subject-security-benchmark
1010

@@ -14,9 +14,10 @@ ms.custom: subject-security-benchmark
1414

1515
# Azure security baseline for Microsoft Azure Peering Service
1616

17-
This security baseline applies guidance from the [Azure Security Benchmark version 2.0](../security/benchmarks/overview.md) to Microsoft Azure Peering Service. The Azure Security Benchmark provides recommendations on how you can secure your cloud solutions on Azure. The content is grouped by the **security controls** defined by the Azure Security Benchmark and the related guidance applicable to Microsoft Azure Peering Service. **Controls** not applicable to Microsoft Azure Peering Service, or for which the responsibility is Microsoft's, have been excluded.
17+
This security baseline applies guidance from the [Azure Security Benchmark version 2.0](../security/benchmarks/overview.md) to Microsoft Azure Peering Service. The Azure Security Benchmark provides recommendations on how you can secure your cloud solutions on Azure. The content is grouped by the **security controls** defined by the Azure Security Benchmark and the related guidance applicable to Microsoft Azure Peering Service.
1818

19-
To see how Microsoft Azure Peering Service completely maps to the Azure Security Benchmark, see the [full Microsoft Azure Peering Service security baseline mapping file](https://github.com/MicrosoftDocs/SecurityBenchmarks/tree/master/Azure%20Offer%20Security%20Baselines).
19+
> [!NOTE]
20+
> **Controls** not applicable to Microsoft Azure Peering Service, or for which the responsibility is Microsoft's, have been excluded. To see how Microsoft Azure Peering Service completely maps to the Azure Security Benchmark, see the **[full Microsoft Azure Peering Service security baseline mapping file](https://github.com/MicrosoftDocs/SecurityBenchmarks/tree/master/Azure%20Offer%20Security%20Baselines)**.
2021
2122
## Network Security
2223

@@ -89,9 +90,9 @@ Use single sign-on to manage and secure access to your organization’s data and
8990

9091
**Guidance**: Enable multifactor authentication with Azure Active Directory (Azure AD) and follow Identity and Access Management recommendations from Azure Security Center.
9192

92-
How to enable multifactor authentication in Azure https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted
93+
- [How to enable multifactor authentication in Azure](../active-directory/authentication/howto-mfa-getstarted.md)
9394

94-
How to monitor identity and access within Azure Security Center https://docs.microsoft.com/azure/security-center/security-center-identity-access
95+
- [How to monitor identity and access within Azure Security Center](../security-center/security-center-identity-access.md)
9596

9697
**Responsibility**: Customer
9798

@@ -101,9 +102,9 @@ How to monitor identity and access within Azure Security Center https://docs.mic
101102

102103
**Guidance**: Use Privileged Identity Management (PIM) with Azure Active Directory (Azure AD) for generation of logs and alerts when suspicious or unsafe activity occurs in the environment. In addition, use Azure AD risk detections to view alerts and reports on risky user behavior.
103104

104-
How to deploy Privileged Identity Management (PIM) https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-deployment-plan
105+
- [How to deploy Privileged Identity Management (PIM)](../active-directory/privileged-identity-management/pim-deployment-plan.md)
105106

106-
Understand Azure AD risk detections https://docs.microsoft.com/azure/active-directory/identity-protection/overview-identity-protection
107+
- [Understand Azure AD risk detections](../active-directory/identity-protection/overview-identity-protection.md)
107108

108109
**Responsibility**: Customer
109110

@@ -263,7 +264,7 @@ Depending on how security team responsibilities are structured, monitoring for s
263264

264265
Security Reader permissions can be applied broadly to an entire tenant (Root Management Group) or scoped to management groups or specific subscriptions.
265266

266-
Note: Additional permissions might be required to get visibility into workloads and services.
267+
Additional permissions might be required to get visibility into workloads and services.
267268

268269
- [Overview of Security Reader Role](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#security-reader)
269270

@@ -409,7 +410,7 @@ Many organizations choose to use Azure Sentinel for “hot” data that is used
409410

410411
**Guidance**: In Azure Monitor, set log retention period for Log Analytics workspaces associated with your Azure resources according to your organization's compliance regulations.
411412

412-
How to set log retention parameters /azure/azure-monitor/platform/manage-cost-storage#change-the-data-retention-period
413+
- [How to set log retention parameters](/azure/azure-monitor/platform/manage-cost-storage#change-the-data-retention-period)
413414

414415
**Responsibility**: Customer
415416

0 commit comments

Comments
 (0)