SlideShare a Scribd company logo
Azure Security Fundamentals
Built-in Partner
Controls
Unique Intelligence
Unique Intelligence
Built in + Partner
Controls
Two-factor
authentication
with biometrics
Employee &
contractor vetting
Metal
detectors
Video coverage
rack front & back
Inability to identify
location of specific
customer data
Secure
destruction bins
Ongoing
roaming patrols
Video
coverage
Ongoing
roaming patrols
Front
entrance gate
1 defined
access point
Video
coverage
Perimeter
fencing
Two-factor
authentication
with biometrics
Video
coverage
No building
signage
24x7x365
security operations
Verified single
person entry
Ongoing
roaming patrols
Background
check
System
check
Access
approval
Perimeter
Building
Server
environment
Physical datacenter security
Protect customer data
Data, network segregation. DDoS
protection at the edge. Platform
segregation. Confidential computing.
Secure hardware
Custom-built hardware with
integrated security and attestation
Continuous testing
War game exercises by Microsoft
teams, vulnerability scanning &
continuous monitoring
CUSTOMER 2CUSTOMER 1
Secure foundation
Protection at the edge
• OneDDoS protects the edge with Cloud scale filtering and
DDoS mitigation
• Edge layer protections screen unwanted traffic
• Encryption for data in transit
• Global Load Balancing improves resilience
IP and Isolation Controls
• Traffic between regions encrypted by default
• IP and protocol controls for endpoints
• Traffic isolation via site to site VPN or Azure ExpressRoute
Infrastructure security
Azure
Virtual Network
Isolation
Endpoint
Restrictions
OneDDoS
No standing access to production servers
and services. Just In Time Elevation
required.
Multi-factor authentication required for
admin actions
“Secure Workstations” required to access
production
Access requests are audited, logged and
monitored
Operational Security
Built-in Partner
Controls
Unique Intelligence
Unique Intelligence
VIRTUAL MACHINES APPLICATIONS STORAGE & DATABASES
Built-in Controls | Data protection
Enable built-in encryption across resources
Azure Storage Service Encryption
Azure Disk Encryption
SQL TDE/Always Encrypted
Encrypt data while in use
Azure confidential computing
Use delegated access to storage objects
Shared Access Signature enables more granular access control
Use a key management system
Keep keys in a hardware HSM/don’t store key in apps/GitHub
Use one Key Vault per security boundary/per app/per region
Monitor/audit key usage-pipe information into SIEM for
analysis/threat detection
Use Key Vault to enroll and automatically renew certificates
Azure Security Center
with advanced analytics for threat detection
Virtual
machines Applications
Storage
& databases Network
Built-in Controls | Threat protection
Mitigate potential vulnerabilities proactively
Ensure up to date VMs with relevant security patches
Enable host anti-malware
Reduce surface area of attack
Enable just in time access to management ports
Configure Application Whitelisting to prevent
malware execution
Detect threats early and respond faster
Use actionable alerts and incidents
Interactive investigation tool and playbooks to
orchestrate responses
Azure Security Fundamentals
threats detected/monthBuilt-in Partner
Controls
Unique Intelligence
Built-in Partner
Controls
Azure Security Fundamentals

More Related Content

PPTX
Azure security and Compliance
PDF
Microsoft Azure Security Overview
PDF
Microsoft Defender and Azure Sentinel
PPTX
Azure Security Overview
PPTX
Azure Sentinel.pptx
PPTX
Azure Identity and access management
PDF
Azure Security Overview
PPTX
Cyber Kill Chain.pptx
Azure security and Compliance
Microsoft Azure Security Overview
Microsoft Defender and Azure Sentinel
Azure Security Overview
Azure Sentinel.pptx
Azure Identity and access management
Azure Security Overview
Cyber Kill Chain.pptx

What's hot (20)

PPTX
Azure Security and Management
PDF
Azure governance v4.0
PPTX
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
PPTX
Power of the cloud - Introduction to azure security
PDF
Microsoft Azure Sentinel
PPTX
Microsoft Azure Technical Overview
PDF
Azure Monitoring Overview
PDF
[Azure Governance] Lesson 4 : Azure Policy
PDF
Microsoft Azure Active Directory
PDF
Understanding Azure AD
PPTX
Azure active directory
PDF
Azure Arc Overview from Microsoft
PPTX
48. Azure Active Directory - Part 1
PPTX
Understanding Azure Disaster Recovery
PDF
TechnicalTerraformLandingZones121120229238.pdf
PPTX
Microsoft Azure - Introduction
PDF
introduction to Azure Sentinel
PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
PPTX
Microsoft Azure Networking Basics
PPTX
Introduction to Azure monitor
Azure Security and Management
Azure governance v4.0
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Power of the cloud - Introduction to azure security
Microsoft Azure Sentinel
Microsoft Azure Technical Overview
Azure Monitoring Overview
[Azure Governance] Lesson 4 : Azure Policy
Microsoft Azure Active Directory
Understanding Azure AD
Azure active directory
Azure Arc Overview from Microsoft
48. Azure Active Directory - Part 1
Understanding Azure Disaster Recovery
TechnicalTerraformLandingZones121120229238.pdf
Microsoft Azure - Introduction
introduction to Azure Sentinel
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Microsoft Azure Networking Basics
Introduction to Azure monitor
Ad

Similar to Azure Security Fundamentals (20)

PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PDF
DevOps and CI/CD Security-Best-Practices
PPTX
00. introduction to app sec v3
PDF
Eximbank security presentation
PDF
CSS17: Houston - Azure Shared Security Model Overview
PDF
Security As A Service
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
PPTX
ESET: #DoMore With Our Comprehensive Range of Business Products
PDF
BRK2122 IOT - From the cloud to the edge
PPTX
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PDF
366864108 azure-security
PDF
Daniel Grabski | Microsofts cybersecurity story
PDF
Best Practices in Cloud Security
PPTX
Removing Security Roadblocks to IoT Deployment Success
PPTX
Primend praktiline konverents - Office 365 turvalisus
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PPTX
Contextual Security and Application Control for Virtualized Desktops
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPTX
Io t security and azure sphere
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
DevOps and CI/CD Security-Best-Practices
00. introduction to app sec v3
Eximbank security presentation
CSS17: Houston - Azure Shared Security Model Overview
Security As A Service
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
ESET: #DoMore With Our Comprehensive Range of Business Products
BRK2122 IOT - From the cloud to the edge
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Global Azure Bootcamp 2018 - Azure Security Center
366864108 azure-security
Daniel Grabski | Microsofts cybersecurity story
Best Practices in Cloud Security
Removing Security Roadblocks to IoT Deployment Success
Primend praktiline konverents - Office 365 turvalisus
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Contextual Security and Application Control for Virtualized Desktops
microsoft-cybersecurity-reference-architectures (1).pptx
Io t security and azure sphere
Ad

More from Lorenzo Barbieri (20)

PPTX
Microsoft Ignite Milan: Copilot Adoption In Italy
PDF
Can Santa Cloud survive the Generative AI revolution?
PDF
Build and Modernize Intelligent Apps​
PPTX
Develop any software from anywhere!
PDF
Personal Branding for Developers @ PyCon Italy 2023
PDF
Storytelling inclusivo
PDF
Effective Public Speaking
PDF
GitHub for partners
PPTX
Codemotion DevCast: App Modernization in the Cloud
PDF
How do you protect a hybrid PaaS-IaaS solution, built entirely in the cloud
PDF
Azure DevOps & GitHub... Better Together!
PDF
Azure Academyadi: Introduction to GitHub and AzureDevOps
PDF
Kubernetes vs App Service
PPTX
Practical Personal Branding for Developers
PPTX
Prepare a Short Pitch
PPTX
Kubernetes for .NET Developers
PDF
Accessible Public Speaking
PPTX
Kubernetes VS. App Service: When the orchestrator challenges the platform
PPTX
Public Speaking For Geeks: Work from Home Edition!
PPTX
Public Speaking for Geeks @ MS Ignite The Tour Milan
Microsoft Ignite Milan: Copilot Adoption In Italy
Can Santa Cloud survive the Generative AI revolution?
Build and Modernize Intelligent Apps​
Develop any software from anywhere!
Personal Branding for Developers @ PyCon Italy 2023
Storytelling inclusivo
Effective Public Speaking
GitHub for partners
Codemotion DevCast: App Modernization in the Cloud
How do you protect a hybrid PaaS-IaaS solution, built entirely in the cloud
Azure DevOps & GitHub... Better Together!
Azure Academyadi: Introduction to GitHub and AzureDevOps
Kubernetes vs App Service
Practical Personal Branding for Developers
Prepare a Short Pitch
Kubernetes for .NET Developers
Accessible Public Speaking
Kubernetes VS. App Service: When the orchestrator challenges the platform
Public Speaking For Geeks: Work from Home Edition!
Public Speaking for Geeks @ MS Ignite The Tour Milan

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Modernizing your data center with Dell and AMD
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation theory and applications.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Modernizing your data center with Dell and AMD
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Monthly Chronicles - July 2025
Encapsulation theory and applications.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Azure Security Fundamentals

  • 2. Built-in Partner Controls Unique Intelligence Unique Intelligence Built in + Partner Controls
  • 3. Two-factor authentication with biometrics Employee & contractor vetting Metal detectors Video coverage rack front & back Inability to identify location of specific customer data Secure destruction bins Ongoing roaming patrols Video coverage Ongoing roaming patrols Front entrance gate 1 defined access point Video coverage Perimeter fencing Two-factor authentication with biometrics Video coverage No building signage 24x7x365 security operations Verified single person entry Ongoing roaming patrols Background check System check Access approval Perimeter Building Server environment Physical datacenter security
  • 4. Protect customer data Data, network segregation. DDoS protection at the edge. Platform segregation. Confidential computing. Secure hardware Custom-built hardware with integrated security and attestation Continuous testing War game exercises by Microsoft teams, vulnerability scanning & continuous monitoring CUSTOMER 2CUSTOMER 1 Secure foundation
  • 5. Protection at the edge • OneDDoS protects the edge with Cloud scale filtering and DDoS mitigation • Edge layer protections screen unwanted traffic • Encryption for data in transit • Global Load Balancing improves resilience IP and Isolation Controls • Traffic between regions encrypted by default • IP and protocol controls for endpoints • Traffic isolation via site to site VPN or Azure ExpressRoute Infrastructure security Azure Virtual Network Isolation Endpoint Restrictions OneDDoS
  • 6. No standing access to production servers and services. Just In Time Elevation required. Multi-factor authentication required for admin actions “Secure Workstations” required to access production Access requests are audited, logged and monitored Operational Security
  • 8. VIRTUAL MACHINES APPLICATIONS STORAGE & DATABASES Built-in Controls | Data protection Enable built-in encryption across resources Azure Storage Service Encryption Azure Disk Encryption SQL TDE/Always Encrypted Encrypt data while in use Azure confidential computing Use delegated access to storage objects Shared Access Signature enables more granular access control Use a key management system Keep keys in a hardware HSM/don’t store key in apps/GitHub Use one Key Vault per security boundary/per app/per region Monitor/audit key usage-pipe information into SIEM for analysis/threat detection Use Key Vault to enroll and automatically renew certificates
  • 9. Azure Security Center with advanced analytics for threat detection Virtual machines Applications Storage & databases Network Built-in Controls | Threat protection Mitigate potential vulnerabilities proactively Ensure up to date VMs with relevant security patches Enable host anti-malware Reduce surface area of attack Enable just in time access to management ports Configure Application Whitelisting to prevent malware execution Detect threats early and respond faster Use actionable alerts and incidents Interactive investigation tool and playbooks to orchestrate responses
  • 11. threats detected/monthBuilt-in Partner Controls Unique Intelligence Built-in Partner Controls

Editor's Notes