Skip to content

Commit f9b20e5

Browse files
Merge pull request #225672 from TerryLanfear/sec-230130
Quality update
2 parents 9d93d6c + 1544bd0 commit f9b20e5

File tree

1 file changed

+10
-11
lines changed

1 file changed

+10
-11
lines changed

articles/security/fundamentals/infrastructure-integrity.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,32 +4,31 @@ description: Learn about Azure infrastructure integrity and the steps Microsoft
44
services: security
55
documentationcenter: na
66
author: TerryLanfear
7-
manager: barbkess
8-
editor: TomSh
7+
manager: rkarlin
98

109
ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
11-
ms.service: information-protection
12-
ms.subservice: aiplabels
10+
ms.service: security
11+
ms.subservice: security-fundamentals
1312
ms.topic: article
1413
ms.tgt_pltfrm: na
1514
ms.workload: na
16-
ms.date: 07/06/2018
15+
ms.date: 01/30/2023
1716
ms.author: terrylan
1817

1918
---
2019

2120
# Azure infrastructure integrity
2221

2322
## Software installation
24-
All components in the software stack that are installed in the Azure environment are custom built following the Microsoft Security Development Lifecycle (SDL) process. All software components, including operating system (OS) images and SQL Database, are deployed as part of the change management and release management process. The OS that runs on all nodes is a customized version of Windows Server 2008 or Windows Server 2012. The exact version is chosen by the fabric controller (FC) according to the role it intends for the OS to play. In addition, the host OS does not allow installation of any unauthorized software components.
23+
All components in the software stack that are installed in the Azure environment are custom built following the Microsoft Security Development Lifecycle (SDL) process. All software components, including operating system (OS) images and SQL Database, are deployed as part of the change management and release management process. The OS that runs on all nodes is a customized version. The exact version is chosen by the fabric controller (FC) according to the role it intends for the OS to play. In addition, the host OS doesn't allow installation of any unauthorized software components.
2524

2625
Some Azure components are deployed as Azure customers on a guest VM running on a guest OS.
2726

2827
## Virus scans on builds
29-
Azure software component (including OS) builds have to undergo a virus scan that uses the Endpoint Protection anti-virus tool. Each virus scan creates a log within the associated build directory, detailing what was scanned and the results of the scan. The virus scan is part of the build source code for every component within Azure. Code is not moved to production without having a clean and successful virus scan. If any issues are noted, the build is frozen and then goes to the security teams within Microsoft Security to identify where the "rogue" code entered the build.
28+
Azure software component (including OS) builds have to undergo a virus scan that uses the Endpoint Protection anti-virus tool. Each virus scan creates a log within the associated build directory, detailing what was scanned and the results of the scan. The virus scan is part of the build source code for every component within Azure. Code isn't moved to production without having a clean and successful virus scan. If issues are noted, the build is frozen. The build goes to the security teams within Microsoft Security to identify where the "rogue" code entered the build.
3029

3130
## Closed and locked environment
32-
By default, Azure infrastructure nodes and guest VMs do not have user accounts created on them. In addition, default Windows administrator accounts are also disabled. Administrators from Azure live support can, with proper authentication, log into these machines and administer the Azure production network for emergency repairs.
31+
By default, Azure infrastructure nodes and guest VMs don't have user accounts created on them. In addition, default Windows administrator accounts are also disabled. Administrators from Azure live support can, with proper authentication, log in to these machines and administer the Azure production network for emergency repairs.
3332

3433
## Azure SQL Database authentication
3534
As with any implementation of SQL Server, user account management must be tightly controlled. Azure SQL Database supports only SQL Server authentication. To complement a customer's data security model, user accounts with strong passwords and configured with specific rights should be used as well.
@@ -38,18 +37,18 @@ As with any implementation of SQL Server, user account management must be tightl
3837
Access-control lists (ACLs) and firewalls between the service platform and the Microsoft corporate network protect SQL Database instances from unauthorized insider access. Further, only users from IP address ranges from the Microsoft corporate network can access the Windows Fabric platform-management endpoint.
3938

4039
## ACLs and firewalls between nodes in a SQL Database cluster
41-
As an additional protection, as part of the defense-in depth-strategy, ACLs and a firewall have been implemented between nodes in a SQL Database cluster. All communication inside the Windows Fabric platform cluster as well as all running code is trusted.
40+
As part of the defense-in depth-strategy, ACLs and a firewall have been implemented between nodes in a SQL Database cluster. All communication inside the Windows Fabric platform cluster and all running code is trusted.
4241

4342
## Custom monitoring agents
4443
SQL Database employs custom monitoring agents (MAs), also called watchdogs, to monitor the health of the SQL Database cluster.
4544

4645
## Web protocols
4746

4847
### Role instance monitoring and restart
49-
Azure ensures that all deployed, running roles (internet-facing web, or back-end processing worker roles) are subject to sustained health monitoring to ensure that they effectively and efficiently deliver the services for which theyve been provisioned. If a role becomes unhealthy, by either a critical fault in the application that's being hosted or an underlying configuration problem within the role instance itself, the FC detects the problem within the role instance and initiates a corrective state.
48+
Azure ensures that all deployed, running roles (internet-facing web, or back-end processing worker roles) are subject to sustained health monitoring. Health monitoring ensures that they effectively and efficiently deliver the services for which they've been provisioned. If a role becomes unhealthy, by either a critical fault in the application that's being hosted or an underlying configuration problem within the role instance itself, the FC detects the problem within the role instance and initiates a corrective state.
5049

5150
### Compute connectivity
52-
Azure ensures that the deployed application or service is reachable via standard web-based protocols. Virtual instances of internet-facing web roles have external internet connectivity and are reachable directly by web users. To protect the sensitivity and integrity of the operations that worker roles perform on behalf of the publicly-accessible web role virtual instances, virtual instances of back-end processing worker roles have external internet connectivity but cannot be accessed directly by external web users.
51+
Azure ensures that the deployed application or service is reachable via standard web-based protocols. Virtual instances of internet-facing web roles have external internet connectivity and are reachable directly by web users. To protect the sensitivity and integrity of the operations that worker roles perform on behalf of the publicly accessible web role virtual instances, virtual instances of back-end processing worker roles have external internet connectivity but can't be accessed directly by external web users.
5352

5453
## Next steps
5554
To learn more about what Microsoft does to secure the Azure infrastructure, see:

0 commit comments

Comments
 (0)