Skip to content

Commit f572b0f

Browse files
authored
Merge pull request #47775 from TerryLanfear/dec-sec
Dec sec
2 parents e5076c7 + e9128f5 commit f572b0f

File tree

5 files changed

+21
-13
lines changed

5 files changed

+21
-13
lines changed
27.5 KB
Loading
44.2 KB
Loading
39.4 KB
Loading
57 KB
Loading

articles/security-center/tutorial-security-policy.md

Lines changed: 21 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Azure Security Center Tutorial - Define and assess security policies | Mi
33
description: Azure Security Center Tutorial - Define and assess security policies
44
services: security-center
55
documentationcenter: na
6-
author: terrylan
6+
author: TerryLanfear
77
manager: mbaldwin
88
editor: ''
99

@@ -14,12 +14,12 @@ ms.topic: tutorial
1414
ms.custom: mvc
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 02/22/2018
18-
ms.author: yurid
17+
ms.date: 07/30/2018
18+
ms.author: terrylan
1919
---
2020

2121
# Tutorial: Define and assess security policies
22-
Security Center helps ensure compliance with company or regulatory security requirements by using security policies to define the desired configuration of your workloads. Once you define policies for your Azure subscriptions, and adapt them to the type of workload or the sensitivity of your data, Security Center can provide security recommendations to your compute, networking, SQL & storage, and application resources. In this tutorial, you will learn how to:
22+
Security Center helps ensure compliance with company or regulatory security requirements by using security policies to define the desired configuration of your workloads. Once you define policies for your Azure subscriptions, and adapt them to the type of workload or the sensitivity of your data, Security Center can provide security recommendations for your compute, application, networking, data & storage, and identity & access resources. In this tutorial, you will learn how to:
2323

2424
> [!div class="checklist"]
2525
> * Configure security policy
@@ -33,16 +33,20 @@ To step through the features covered in this tutorial, you must be on Security C
3333
## Configure security policy
3434
Security Center automatically creates a default security policy for each of your Azure subscriptions. Security policies are comprised of recommendations that you can turn on or turn off according to the security requirements of that subscription. To make changes to the default security policy, you need to be an owner, contributor, or security administrator of the subscription.
3535

36-
1. At the Security Center main menu, select **Security policy**. Select the subscription that you want to use. Under **POLICY COMPONENTS**, select **Security policy**:
36+
1. At the Security Center main menu, select **Security policy**.
37+
2. Select the subscription that you want to use.
3738

3839
![Security Policy](./media/tutorial-security-policy/tutorial-security-policy-fig1.png)
3940

40-
2. For each security configuration you want to monitor, select **On**. Security Center will continuously assess the configuration of your environment and when vulnerability exists, Security Center will generate a security recommendation. Select **Off** if the security configuration is not recommended or not relevant. For example, in a dev/test environment you might not require the same level of security as a production environment. After selecting the policies that are applicable to your environment, click **Save**.
41+
3. Under **POLICY COMPONENTS**, select **Security policy**
42+
4. For each security configuration you want to monitor, select **On**. Security Center will continuously assess the configuration of your environment and when vulnerability exists, Security Center will generate a security recommendation. Select **Off** if the security configuration is not recommended or not relevant. For example, in a dev/test environment you might not require the same level of security as a production environment. After selecting the policies that are applicable to your environment, click **Save**.
43+
44+
![Security configuration](./media/tutorial-security-policy/tutorial-security-policy-fig6.png)
4145

4246
Wait until Security Center processes these policies and generates recommendations. Some configurations, such as system updates and OS configurations can take up to 12 hours, while network security groups and encryption configurations can be assessed almost instantly. Once you see recommendations in the Security Center dashboard, you can proceed to the next step.
4347

4448
## Assess security of resources
45-
1. According to the security policies that were enabled, Security Center will provide a set of security recommendations as needed. You should start by reviewing the virtual machine and computers recommendations. On the Security Center dashboard, click **Overview**, and click **Compute**.
49+
1. According to the security policies that were enabled, Security Center will provide a set of security recommendations as needed. You should start by reviewing the virtual machine and computers recommendations. On the Security Center dashboard, select **Overview**, and select **Compute & apps**.
4650

4751
![Compute](./media/tutorial-security-policy/tutorial-security-policy-fig2.png)
4852

@@ -52,19 +56,23 @@ Wait until Security Center processes these policies and generates recommendation
5256

5357
![Networking](./media/tutorial-security-policy/tutorial-security-policy-fig3.png)
5458

55-
The networking recommendations page has a list of security issues for network configuration, internet facing endpoints, and network topology. Just like **Compute**, some networking recommendations will provide integrated remediation, and some others will not.
59+
The networking recommendations page has a list of security issues for network configuration, internet facing endpoints, and network topology. Just like **Compute & apps**, some networking recommendations will provide integrated remediation, and some others will not.
5660

57-
3. Once you address all relevant networking recommendations, you should move on to the next workload: storage & data. On the Security Center dashboard, click **Overview**, and click **Storage & data**.
61+
3. Once you address all relevant networking recommendations, you should move on to the next workload: storage & data. On the Security Center dashboard, click **Overview**, and click **Data & storage**.
5862

5963
![Data resources](./media/tutorial-security-policy/tutorial-security-policy-fig4.png)
6064

61-
The **Data resources** page contains recommendations around enabling auditing for Azure SQL servers and databases, enabling encryption for SQL databases, and enabling encryption of your Azure storage account. If you don’t have these workloads, you will not see any recommendation. Just like **Compute**, some SQL & storage recommendations will provide integrated remediation, and some others will not.
65+
The **Data Resources** page contains recommendations around enabling auditing for Azure SQL servers and databases, enabling encryption for SQL databases, and enabling encryption of your Azure storage account. If you don’t have these workloads, you will not see any recommendation. Just like **Compute & apps**, some data & storage recommendations will provide integrated remediation, and some others will not.
66+
67+
4. Once you address all relevant data & storage recommendations, you should move on to the next workload: Identity & access. On the Security Center dashboard, click **Overview**, and click **Identity & access**.
6268

63-
4. Once you address all relevant SQL & storage recommendations, you should move on to the next workload: Applications. On the Security Center dashboard, click **Overview**, and click **Applications**.
69+
![Identity & access](./media/tutorial-security-policy/tutorial-security-policy-fig5.png)
6470

65-
![Applications](./media/tutorial-security-policy/tutorial-security-policy-fig5.png)
71+
The **Identity & Access** page contains recommendations such as:
6672

67-
The **Applications** page contains recommendations for web application firewall deployment, and general guidelines for application hardening. If you don’t have virtual machine or computers with web applications running on Internet Information Service (IIS), you will not see these recommendations.
73+
- Enable MFA for privileged accounts on your subscription
74+
- Remove external accounts with write permissions from your subscription
75+
- Remove privileged external accounts from your subscription
6876

6977
## Clean up resources
7078
Other quickstarts and tutorials in this collection build upon this quickstart. If you plan to continue on to work with subsequent quickstarts and tutorials, continue running the Standard tier and keep automatic provisioning enabled. If you do not plan to continue or wish to return to the Free tier:

0 commit comments

Comments
 (0)