SlideShare a Scribd company logo
@fincooper
Top 18 Azure security fails
and how to avoid them
@fincooper
Karl Ots
Managing Consultant
karl.ots@zure.com
• Cloud & cybersecurity expert
• User group and conference organizer, podcast hosts
• Patented inventor
• Working on Azure since 2011
• Helped to secure 100+ Azure applications, from startups to
Fortune 500 enterprises
• linkedin.com/in/karlots
@fincooper
What to expect in this session
• Azure security landscape
• Top Azure security fails I have wondered upon in my adventures
• Why are they bad?
• How to fix them?
• Resources to help you secure your Azure environment, regardless of your
current status
@fincooper
Security controls in Azure
Physical
Security
Network
Host
Application
Admin
Data
Physical controls, video surveillance, access control
Edge routers, firewalls, intrusion detection, vulnerability scanning
Access control and monitoring, anti-malware, patch and configuration management
Secure engineering (SDL), access control and monitoring, anti-malware
Account management, training and awareness, screening
Threat and vulnerability management, security monitoring and response, access
control and monitoring, file/data integrity, encryption
@fincooper
With great power comes great responsibility
@fincooper
Role-Based Access Control
Subscription
Resource Groups
Resources
@fincooper
Privileged Identity Management
• Requires Azure AD Premium P2
• For all users in the whole AAD Tenant
• Identifies users with administrative privileges
• Enables on-demand, just-in-time administrative access
• Generates reports about administrator access history
@fincooper
STRIDE
• Azure removes some of the attack surface, as infrastructure and operations
are handled by Microsoft.
• We can use frameworks such as STRIDE to identify threats:
• Good set of tools at https://www.microsoft.com/en-us/SDL/adopt/tools.aspx
Threat Property Definition
Spoofing Authentication Impersonating something or someone else.
Tampering Integrity Modifying data or code.
Repudiation Non-repudiation Claiming to have not performed an action.
Information Disclosure Confidentiality Exposing information to someone not authorized to see it.
Denial of Service Availability Deny or degrade service to users.
Elevation of Privilege Authorization Gain capabilities without proper authorization.
@fincooper
Top Azure security fails
1. Every user is an Owner
• …In the Subscription scope
2. Service Principals have too wide privileges
3. Untrusted authorization provider being used
(Microsoft Account, Gmail, unmanaged Azure
AD…)
4. No monitoring
5. No alerting
• Security Center
• SQL Auditing
• WAF
• Azure Service Health
6. Storage access keys used directly
7. Credentials in code
8. No key rotation
9. Unprotected public endpoints (HTTP/RDP)
@fincooper
Top Azure security fails
10. Too short Activity Log retention (if any)
11. Missing VM updates…
12. Enterprise Portal access control fails
• Or Azure Sponsorship for Microsoft
Startups / BizSpark
13. No Privileged Identity Management,
Just-in-time Access or Just-Enough
Access
14. No Advanced Threat Protection
enabled
15. Azure DevOps access control fails
16. Data Access pane fails
17. Azure Governance fails
18. Network-level fails
@fincooper
DEMO
@fincooper
Secure DevOps kit for Azure (AzSK)
• Set of tools for assessing the security posture of your Azure environment
• Built by Microsoft Core Services Engineering
• Used to secure 1000+ Azure subscriptions at Microsoft
• Easy to get started with non-intrusive vulnerability scans, expands end-to-
end tooling from developer machine to CI/CD to continuous assurance
@fincooper
Materials
• My slides: slideshare.net/karlots
• Secure DevOps Kit for Azure:
• azsk.azurewebsites.net
• STRIDE Threat Modeling Lessons from Star War:
• youtube.com/watch?v=Y3VQpg04vXo
• Azure Security and Compliance Blueprint (not Azure Blueprint):
• docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview
• Azure Virtual Datacenter:
• docs.microsoft.com/en-us/azure/architecture/vdc/
Top 18 azure security fails and how to avoid them

More Related Content

PDF
introduction to Azure Sentinel
PDF
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
PDF
Top Azure security fails and how to avoid them
PDF
IglooConf 2019 Secure your Azure applications like a pro
PDF
BeyondCorp and Zero Trust
PPTX
Threat Hunting on AWS using Azure Sentinel
PDF
[OWASP Poland Day] Embedding security into SDLC + GDPR
PDF
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
introduction to Azure Sentinel
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
Top Azure security fails and how to avoid them
IglooConf 2019 Secure your Azure applications like a pro
BeyondCorp and Zero Trust
Threat Hunting on AWS using Azure Sentinel
[OWASP Poland Day] Embedding security into SDLC + GDPR
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...

What's hot (20)

PDF
BeyondCorp and Zero Trust
PPTX
Assume breach, layered security in Azure tested and explained
PPTX
Jason Kent - AppSec Without Additional Tools
PPTX
MCAS High Level Architecture May 2021
PDF
BeyondCorp Seattle Meetup: Closing the Adherence Gap
PDF
BeyondCorp - Google Security for Everyone Else
PPTX
Security as an Enabler for the Digital World - CISO Perspective
PPTX
AWS Security Strategy
PDF
BeyondCorp Myths: Busted
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
PPTX
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
PDF
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
PPTX
Data-driven Security: Protect APIs from Adaptive Threats
PDF
BeyondCorp New York Meetup: Closing the Adherence Gap
PPTX
Modern Security Operations & Common Roles/Competencies
PPTX
CSS 17: NYC - Protecting your Web Applications
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PPTX
#ALSummit: Realities of Security in the Cloud
PDF
Dev week cloud world conf2021
BeyondCorp and Zero Trust
Assume breach, layered security in Azure tested and explained
Jason Kent - AppSec Without Additional Tools
MCAS High Level Architecture May 2021
BeyondCorp Seattle Meetup: Closing the Adherence Gap
BeyondCorp - Google Security for Everyone Else
Security as an Enabler for the Digital World - CISO Perspective
AWS Security Strategy
BeyondCorp Myths: Busted
CSS 17: NYC - Realities of Security in the Cloud
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Data-driven Security: Protect APIs from Adaptive Threats
BeyondCorp New York Meetup: Closing the Adherence Gap
Modern Security Operations & Common Roles/Competencies
CSS 17: NYC - Protecting your Web Applications
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
#ALSummit: Realities of Security in the Cloud
Dev week cloud world conf2021
Ad

Similar to Top 18 azure security fails and how to avoid them (20)

PDF
Techorama Belgium 2019: top Azure security fails and how to avoid them
PDF
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
PDF
DevSum - Top Azure security fails and how to avoid them
PDF
IT Camp 19: Top Azure security fails and how to avoid them
PDF
FAUG #9: Azure security architecture and stories from the trenches
PDF
TechDays Finland 2020: Azuren tietoturva haltuun!
PPTX
5 steps to securing your identity infrastructure.pptx
PPTX
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PPTX
Azure Fundamentals Part 3
 
PDF
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
PDF
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
PDF
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
PPTX
DevSecOps: Securing Applications with DevOps
PPTX
Shared Security Responsibility for the Azure Cloud
PPTX
Get On Top of Azure Resource Security Using Secure DevOps Kit for Azure
PPTX
Azure security and Compliance
PPTX
Introduction to basic governance in Azure - #GABDK
PDF
Application Security - 28 Nov 2018
PDF
Azure Saturday: Security + DevOps + Azure = Awesomeness
Techorama Belgium 2019: top Azure security fails and how to avoid them
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
DevSum - Top Azure security fails and how to avoid them
IT Camp 19: Top Azure security fails and how to avoid them
FAUG #9: Azure security architecture and stories from the trenches
TechDays Finland 2020: Azuren tietoturva haltuun!
5 steps to securing your identity infrastructure.pptx
Identity-Driven Security with Forsyte I.T. Solutions - Demos and Discovery
3 Modern Security - Secure identities to reach zero trust with AAD
Azure Fundamentals Part 3
 
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
DevSecOps: Securing Applications with DevOps
Shared Security Responsibility for the Azure Cloud
Get On Top of Azure Resource Security Using Secure DevOps Kit for Azure
Azure security and Compliance
Introduction to basic governance in Azure - #GABDK
Application Security - 28 Nov 2018
Azure Saturday: Security + DevOps + Azure = Awesomeness
Ad

More from Karl Ots (19)

PDF
TechDays Finland 2020: Best practices of securing web applications running on...
PDF
IglooConf 2020: Best practices of securing web applications running on Azure ...
PDF
Building an Enterprise-Grade Azure Governance Model
PDF
CloudBurst Malmö: Best practices of securing web applications running on Azur...
PDF
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
PDF
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
PDF
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
PDF
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
PDF
Monitoring real-life Azure applications: When to use what and why
PDF
Navigating in the sea of containers in azure when to choose which service and...
PDF
Kubernetes in Azure
PDF
Azure security architecture
PDF
Azure security architecture / FAUG JKL 15.2.2018
PDF
Securing Azure Infrastructure
PDF
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
PDF
Building globally scalable media solutions with Azure Media Services part 2
PDF
Security + DevOps + Azure = Awesomeness
PPTX
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
PPTX
Sovellusmodernisoinnin webinaarisarja, osa 2: liiketoimintasovelluksen modern...
TechDays Finland 2020: Best practices of securing web applications running on...
IglooConf 2020: Best practices of securing web applications running on Azure ...
Building an Enterprise-Grade Azure Governance Model
CloudBurst Malmö: Best practices of securing web applications running on Azur...
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
Monitoring real-life Azure applications: When to use what and why
Navigating in the sea of containers in azure when to choose which service and...
Kubernetes in Azure
Azure security architecture
Azure security architecture / FAUG JKL 15.2.2018
Securing Azure Infrastructure
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
Building globally scalable media solutions with Azure Media Services part 2
Security + DevOps + Azure = Awesomeness
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
Sovellusmodernisoinnin webinaarisarja, osa 2: liiketoimintasovelluksen modern...

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Modernizing your data center with Dell and AMD
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25 Week I
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Top 18 azure security fails and how to avoid them

  • 1. @fincooper Top 18 Azure security fails and how to avoid them
  • 2. @fincooper Karl Ots Managing Consultant karl.ots@zure.com • Cloud & cybersecurity expert • User group and conference organizer, podcast hosts • Patented inventor • Working on Azure since 2011 • Helped to secure 100+ Azure applications, from startups to Fortune 500 enterprises • linkedin.com/in/karlots
  • 3. @fincooper What to expect in this session • Azure security landscape • Top Azure security fails I have wondered upon in my adventures • Why are they bad? • How to fix them? • Resources to help you secure your Azure environment, regardless of your current status
  • 4. @fincooper Security controls in Azure Physical Security Network Host Application Admin Data Physical controls, video surveillance, access control Edge routers, firewalls, intrusion detection, vulnerability scanning Access control and monitoring, anti-malware, patch and configuration management Secure engineering (SDL), access control and monitoring, anti-malware Account management, training and awareness, screening Threat and vulnerability management, security monitoring and response, access control and monitoring, file/data integrity, encryption
  • 5. @fincooper With great power comes great responsibility
  • 7. @fincooper Privileged Identity Management • Requires Azure AD Premium P2 • For all users in the whole AAD Tenant • Identifies users with administrative privileges • Enables on-demand, just-in-time administrative access • Generates reports about administrator access history
  • 8. @fincooper STRIDE • Azure removes some of the attack surface, as infrastructure and operations are handled by Microsoft. • We can use frameworks such as STRIDE to identify threats: • Good set of tools at https://www.microsoft.com/en-us/SDL/adopt/tools.aspx Threat Property Definition Spoofing Authentication Impersonating something or someone else. Tampering Integrity Modifying data or code. Repudiation Non-repudiation Claiming to have not performed an action. Information Disclosure Confidentiality Exposing information to someone not authorized to see it. Denial of Service Availability Deny or degrade service to users. Elevation of Privilege Authorization Gain capabilities without proper authorization.
  • 9. @fincooper Top Azure security fails 1. Every user is an Owner • …In the Subscription scope 2. Service Principals have too wide privileges 3. Untrusted authorization provider being used (Microsoft Account, Gmail, unmanaged Azure AD…) 4. No monitoring 5. No alerting • Security Center • SQL Auditing • WAF • Azure Service Health 6. Storage access keys used directly 7. Credentials in code 8. No key rotation 9. Unprotected public endpoints (HTTP/RDP)
  • 10. @fincooper Top Azure security fails 10. Too short Activity Log retention (if any) 11. Missing VM updates… 12. Enterprise Portal access control fails • Or Azure Sponsorship for Microsoft Startups / BizSpark 13. No Privileged Identity Management, Just-in-time Access or Just-Enough Access 14. No Advanced Threat Protection enabled 15. Azure DevOps access control fails 16. Data Access pane fails 17. Azure Governance fails 18. Network-level fails
  • 12. @fincooper Secure DevOps kit for Azure (AzSK) • Set of tools for assessing the security posture of your Azure environment • Built by Microsoft Core Services Engineering • Used to secure 1000+ Azure subscriptions at Microsoft • Easy to get started with non-intrusive vulnerability scans, expands end-to- end tooling from developer machine to CI/CD to continuous assurance
  • 13. @fincooper Materials • My slides: slideshare.net/karlots • Secure DevOps Kit for Azure: • azsk.azurewebsites.net • STRIDE Threat Modeling Lessons from Star War: • youtube.com/watch?v=Y3VQpg04vXo • Azure Security and Compliance Blueprint (not Azure Blueprint): • docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview • Azure Virtual Datacenter: • docs.microsoft.com/en-us/azure/architecture/vdc/