SlideShare a Scribd company logo
@fincooper
Secure your Azure
applications like a pro
Karl Ots
@fincooper
Karl Ots
Managing Consultant
karl.ots@zure.com
• Cloud & cybersecurity expert
• User group and conference organizer, podcast hosts
• Patented inventor
• Working on Azure since 2011
• Helped to secure 100+ Azure applications, from startups to
Fortune 500 enterprises
• linkedin.com/in/karlots
@fincooper
What to expect in this session
• Primer on Azure security controls
• Crash course on Secure DevOps Kit for Azure
• What is it
• Why and how to use it
• Resources to help you secure your Azure environment, regardless of your
current level of security expertise
@fincooper
Security
@fincooper
Absolutely secure computer
CC-BY-SA Santeri Viinamäki
@fincooper
The CIA security triad
Availability
@fincooper
Security controls for applications
• Authentication and authorization
• Encryption
• Monitoring
• Backup, Resiliency and Disaster Recovery
• Host hardening (pre-PaaS)
@fincooper
@fincooper
Security controls for Azure applications
Subscriptions
and Resource
Groups
AAD and RBAC
ARM Templates,
Policies and
Locks
Logging,
Alerting &
Auditing
Data Encryption
Backups &
Disaster
Recovery
Privacy &
Compliance
Network
security
@fincooper
Cloud security: reality check
@fincooper
Secure DevOps Kit for Azure - AzSK
• Set of tools for assessing the security posture of your Azure environment
• Does not replace or compete with Azure Security Center
• Built by Microsoft Core Services Engineering, not any Azure PG
• Used to secure 1000+ Azure subscriptions at Microsoft
• Easy to get started with non-intrusive vulnerability scans
• Expands end-to-end tooling from developer machine to CI/CD to continuous
assurance
@fincooper
AzSK features
• Subscription scanning – “unit testing of security”
• Subscription health scan
• SVT scan
• Secure Intellisense plugin for Visual Studio
• ARM template checker
• Azure DevOps plugin
@fincooper
AzSK Subscription health scan
• Authentication and authorization
• Permanent access should not be granted for
privileged subscription level roles
• Do not grant permissions to external accounts (i.e.,
accounts outside the native directory for the
subscription)
• There should not be more than 2 classic
administrators
• Do not use custom-defined RBAC roles
• Governance
• Critical application resources should be protected
using a resource lock
• ARM policies should be used to audit or deny
certain activities that can impact security
• Awareness
• Pending Azure Security Center (ASC) alerts must be
resolved
• Justify all identities that are granted with
admin/owner access on your subscription.
• Verify the list of public IP addresses on your
subscription
• ARM
• There should not be more than 2 classic
administrators
• Do not use any classic resources on a subscription
• Do not use any classic virtual machines on your
subscription.
@fincooper
AzSK SVT scan coverage
API
Management
App Service Automation Batch Bot Service CDN
Cloud
Service
ACI ACR CosmosDB DataBricks Data Factory Data Lake ExpressRoute
Event Hub HDInsight KeyVault AKS
Load
Balancer
Logic Apps
Notification
Hub
Redis Cache Search Service Bus
Service
Fabric
SQL
Database
Storage
Stream
Analytics
Traffic
Manager
Virtual
Machine
VNET
@fincooper
SVT highlights on Key vault
• Applications must not share a Key Vault unless they trust each other and
they need access to the same secrets at runtime
• Diagnostics logs must be enabled with a retention period of at least 365
days
• Keys/secrets must be rotated periodically
@fincooper
Installing AzSK
• Install-Module azsk -AllowClobber -Force
• Requires AzureRM modules (doh)
@fincooper
DEMO
@fincooper
@fincooper
@fincooper
Most Commonly failing AzSK tests
• Authentication & authorization
• Too wide RBAC access for users
• Or Service Principals
• Or SAS authentication
• No monitoring
• Key vault
• Azure Security Center
• Azure SQL Threat Detection
• Web Application Firewall
• Unsecured storage accounts
@fincooper
Getting started with AzSK
• Start with vulnerability scans
• Single line of PowerShell
• Non-intrusive: RBAC Reader access is enough
• After the first scan, you’ll be busy for a while ☺
• When AzSK vulnerability scans are already a habit in your organization
• Set up continuous assurance to Azure Logs
• Set up CI/CD support with Azure DevOps plugins
• Educate you teams with the most common failed security controls
• Built new environments secure from the start with AzSK ARM template checker and
sample ARM template library
@fincooper
Discussion
• AzSK is not your silver bullet to “tick the security box”
• AzSK mostly covers “administrative access” in traditional threat models, some
“application access” as well
• You still have to worry about users, external threats and more
• Threat modeling and Defense in Depth approach are your friends!
• Carefully analyze the results in the scope of your application – are the
recommended controls right for your app?
@fincooper
Materials
• My slides: zure.ly/karl-slides
• Secure DevOps Kit for Azure:
• azsk.azurewebsites.net
• Microsoft Ignite 2018 session THR2104 Assess your Microsoft Azure security like a pro
• STRIDE Threat Modeling Lessons from Star Wars:
• youtube.com/watch?v=Y3VQpg04vXo
• Azure Security and Compliance Blueprint (not Azure Blueprint):
• docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview
• Azure Virtual Datacenter:
• docs.microsoft.com/en-us/azure/architecture/vdc/
IglooConf 2019 Secure your Azure applications like a pro
@fincooper

More Related Content

PDF
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
PDF
DevSum - Top Azure security fails and how to avoid them
PDF
Techorama Belgium 2019: top Azure security fails and how to avoid them
PDF
TechDays Finland 2020: Best practices of securing web applications running on...
PDF
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
PDF
IT Camp 19: Top Azure security fails and how to avoid them
PDF
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
PDF
CloudBurst Malmö: Best practices of securing web applications running on Azur...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
DevSum - Top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid them
TechDays Finland 2020: Best practices of securing web applications running on...
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
IT Camp 19: Top Azure security fails and how to avoid them
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
CloudBurst Malmö: Best practices of securing web applications running on Azur...

What's hot (20)

PDF
IglooConf 2020: Best practices of securing web applications running on Azure ...
PPTX
Shared Security Responsibility for the Azure Cloud
PPTX
Azure Security Fundamentals
PDF
Managed Threat Detection & Response for AWS Applications
PPTX
CSS 17: NYC - Protecting your Web Applications
PPTX
Alfredo Reino - Monitoring aws and azure
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Microsoft Azure Security Overview
PDF
Managed Threat Detection and Response
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
Jenkins Terraform Vault
PPTX
Azure Security and Management
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Top Azure security fails and how to avoid them
PPTX
Azure Security Center
PDF
CSS17: Houston - Azure Shared Security Model Overview
PDF
Azure Container Apps
PDF
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
IglooConf 2020: Best practices of securing web applications running on Azure ...
Shared Security Responsibility for the Azure Cloud
Azure Security Fundamentals
Managed Threat Detection & Response for AWS Applications
CSS 17: NYC - Protecting your Web Applications
Alfredo Reino - Monitoring aws and azure
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Extending Amazon GuardDuty with Cloud Insight Essentials
Microsoft Azure Security Overview
Managed Threat Detection and Response
CSS 17: NYC - Realities of Security in the Cloud
Jenkins Terraform Vault
Azure Security and Management
Extending Amazon GuardDuty with Cloud Insight Essentials
Top Azure security fails and how to avoid them
Azure Security Center
CSS17: Houston - Azure Shared Security Model Overview
Azure Container Apps
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
Ad

Similar to IglooConf 2019 Secure your Azure applications like a pro (19)

PDF
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
PPTX
Get On Top of Azure Resource Security Using Secure DevOps Kit for Azure
PPTX
Securing Applications in the Cloud
PDF
TechDays Finland 2020: Azuren tietoturva haltuun!
PDF
AWS Community Day - Vitaliy Shtym - Pragmatic Container Security
PPTX
Improving Application Security With Azure
PPTX
Tokyo azure meetup #8 - Azure Update, August
PPTX
Tokyo azure meetup #8 azure update, august
PDF
Secure Your Code Implement DevSecOps in Azure
PDF
AppSec in an Agile World
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
PPTX
Aws security best practices
PPTX
Shared Security Responsibility Model of AWS
PDF
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
PPTX
Azure DevOps Training In Hyderabad | Azure DevOps Training In Ameerpet.pptx
PPTX
Deep dive into service fabric after 2 years
PDF
From Containerized Application to Secure and Scaling With Kubernetes
PDF
366864108 azure-security
PPTX
Tokyo Azure Meetup #4 - Build 2016 Overview
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
Get On Top of Azure Resource Security Using Secure DevOps Kit for Azure
Securing Applications in the Cloud
TechDays Finland 2020: Azuren tietoturva haltuun!
AWS Community Day - Vitaliy Shtym - Pragmatic Container Security
Improving Application Security With Azure
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 azure update, august
Secure Your Code Implement DevSecOps in Azure
AppSec in an Agile World
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Aws security best practices
Shared Security Responsibility Model of AWS
DevSecOps 實踐與 GitHub 進階安全: 建立安全的開發流程
Azure DevOps Training In Hyderabad | Azure DevOps Training In Ameerpet.pptx
Deep dive into service fabric after 2 years
From Containerized Application to Secure and Scaling With Kubernetes
366864108 azure-security
Tokyo Azure Meetup #4 - Build 2016 Overview
Ad

More from Karl Ots (17)

PDF
Building an Enterprise-Grade Azure Governance Model
PDF
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
PDF
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
PDF
Top 18 azure security fails and how to avoid them
PDF
FAUG #9: Azure security architecture and stories from the trenches
PDF
Monitoring real-life Azure applications: When to use what and why
PDF
Azure Saturday: Security + DevOps + Azure = Awesomeness
PDF
Navigating in the sea of containers in azure when to choose which service and...
PDF
Kubernetes in Azure
PDF
Azure security architecture
PDF
Azure security architecture / FAUG JKL 15.2.2018
PDF
Securing Azure Infrastructure
PDF
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
PDF
Building globally scalable media solutions with Azure Media Services part 2
PDF
Security + DevOps + Azure = Awesomeness
PPTX
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
PPTX
Sovellusmodernisoinnin webinaarisarja, osa 2: liiketoimintasovelluksen modern...
Building an Enterprise-Grade Azure Governance Model
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
Top 18 azure security fails and how to avoid them
FAUG #9: Azure security architecture and stories from the trenches
Monitoring real-life Azure applications: When to use what and why
Azure Saturday: Security + DevOps + Azure = Awesomeness
Navigating in the sea of containers in azure when to choose which service and...
Kubernetes in Azure
Azure security architecture
Azure security architecture / FAUG JKL 15.2.2018
Securing Azure Infrastructure
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
Building globally scalable media solutions with Azure Media Services part 2
Security + DevOps + Azure = Awesomeness
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
Sovellusmodernisoinnin webinaarisarja, osa 2: liiketoimintasovelluksen modern...

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
Modernizing your data center with Dell and AMD
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf

IglooConf 2019 Secure your Azure applications like a pro

  • 2. @fincooper Karl Ots Managing Consultant karl.ots@zure.com • Cloud & cybersecurity expert • User group and conference organizer, podcast hosts • Patented inventor • Working on Azure since 2011 • Helped to secure 100+ Azure applications, from startups to Fortune 500 enterprises • linkedin.com/in/karlots
  • 3. @fincooper What to expect in this session • Primer on Azure security controls • Crash course on Secure DevOps Kit for Azure • What is it • Why and how to use it • Resources to help you secure your Azure environment, regardless of your current level of security expertise
  • 6. @fincooper The CIA security triad Availability
  • 7. @fincooper Security controls for applications • Authentication and authorization • Encryption • Monitoring • Backup, Resiliency and Disaster Recovery • Host hardening (pre-PaaS)
  • 9. @fincooper Security controls for Azure applications Subscriptions and Resource Groups AAD and RBAC ARM Templates, Policies and Locks Logging, Alerting & Auditing Data Encryption Backups & Disaster Recovery Privacy & Compliance Network security
  • 11. @fincooper Secure DevOps Kit for Azure - AzSK • Set of tools for assessing the security posture of your Azure environment • Does not replace or compete with Azure Security Center • Built by Microsoft Core Services Engineering, not any Azure PG • Used to secure 1000+ Azure subscriptions at Microsoft • Easy to get started with non-intrusive vulnerability scans • Expands end-to-end tooling from developer machine to CI/CD to continuous assurance
  • 12. @fincooper AzSK features • Subscription scanning – “unit testing of security” • Subscription health scan • SVT scan • Secure Intellisense plugin for Visual Studio • ARM template checker • Azure DevOps plugin
  • 13. @fincooper AzSK Subscription health scan • Authentication and authorization • Permanent access should not be granted for privileged subscription level roles • Do not grant permissions to external accounts (i.e., accounts outside the native directory for the subscription) • There should not be more than 2 classic administrators • Do not use custom-defined RBAC roles • Governance • Critical application resources should be protected using a resource lock • ARM policies should be used to audit or deny certain activities that can impact security • Awareness • Pending Azure Security Center (ASC) alerts must be resolved • Justify all identities that are granted with admin/owner access on your subscription. • Verify the list of public IP addresses on your subscription • ARM • There should not be more than 2 classic administrators • Do not use any classic resources on a subscription • Do not use any classic virtual machines on your subscription.
  • 14. @fincooper AzSK SVT scan coverage API Management App Service Automation Batch Bot Service CDN Cloud Service ACI ACR CosmosDB DataBricks Data Factory Data Lake ExpressRoute Event Hub HDInsight KeyVault AKS Load Balancer Logic Apps Notification Hub Redis Cache Search Service Bus Service Fabric SQL Database Storage Stream Analytics Traffic Manager Virtual Machine VNET
  • 15. @fincooper SVT highlights on Key vault • Applications must not share a Key Vault unless they trust each other and they need access to the same secrets at runtime • Diagnostics logs must be enabled with a retention period of at least 365 days • Keys/secrets must be rotated periodically
  • 16. @fincooper Installing AzSK • Install-Module azsk -AllowClobber -Force • Requires AzureRM modules (doh)
  • 20. @fincooper Most Commonly failing AzSK tests • Authentication & authorization • Too wide RBAC access for users • Or Service Principals • Or SAS authentication • No monitoring • Key vault • Azure Security Center • Azure SQL Threat Detection • Web Application Firewall • Unsecured storage accounts
  • 21. @fincooper Getting started with AzSK • Start with vulnerability scans • Single line of PowerShell • Non-intrusive: RBAC Reader access is enough • After the first scan, you’ll be busy for a while ☺ • When AzSK vulnerability scans are already a habit in your organization • Set up continuous assurance to Azure Logs • Set up CI/CD support with Azure DevOps plugins • Educate you teams with the most common failed security controls • Built new environments secure from the start with AzSK ARM template checker and sample ARM template library
  • 22. @fincooper Discussion • AzSK is not your silver bullet to “tick the security box” • AzSK mostly covers “administrative access” in traditional threat models, some “application access” as well • You still have to worry about users, external threats and more • Threat modeling and Defense in Depth approach are your friends! • Carefully analyze the results in the scope of your application – are the recommended controls right for your app?
  • 23. @fincooper Materials • My slides: zure.ly/karl-slides • Secure DevOps Kit for Azure: • azsk.azurewebsites.net • Microsoft Ignite 2018 session THR2104 Assess your Microsoft Azure security like a pro • STRIDE Threat Modeling Lessons from Star Wars: • youtube.com/watch?v=Y3VQpg04vXo • Azure Security and Compliance Blueprint (not Azure Blueprint): • docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview • Azure Virtual Datacenter: • docs.microsoft.com/en-us/azure/architecture/vdc/