SlideShare a Scribd company logo
@fincooper
Top Azure security fails and
how to avoid them
@fincooper
Karl Ots
Managing Consultant
karl.ots@zure.com
• Cloud & cybersecurity expert
• User group and conference organizer, podcast hosts
• Patented inventor
• Working on Azure since 2011
• Helped to secure 100+ Azure applications, from startups to
Fortune 500 enterprises
• linkedin.com/in/karlots
@fincooper
What to expect in this session
• Azure security landscape
• Top Azure security fails I have wondered upon in my adventures
• Why are they bad?
• How to fix them?
• Resources to help you secure your Azure environment, regardless of your
current status
@fincooper
Security controls in Azure
Physical
Security
Network
Host
Application
Admin
Data
Physical controls, video surveillance, access control
Edge routers, firewalls, intrusion detection, vulnerability scanning
Access control and monitoring, anti-malware, patch and configuration management
Secure engineering (SDL), access control and monitoring, anti-malware
Account management, training and awareness, screening
Threat and vulnerability management, security monitoring and response, access
control and monitoring, file/data integrity, encryption
@fincooper
With great power comes great responsibility
@fincooper
Role-Based Access Control
Subscription
Resource Groups
Resources
Owner
Can perform all management
operations for a resource and its
child resources including access
management and granting access
to others.
Contributor
Can perform all management
operations for a resource including
create and delete resources. A
contributor cannot grant access to
other.
Reader
Has read-only access to a resource
and its child resources. A reader
cannot read secrets.
@fincooper
Privileged Identity Management
• Requires Azure AD Premium P2
• For all users in the whole AAD Tenant
• Identifies users with administrative privileges
• Enables on-demand, just-in-time administrative access
• Generates reports about administrator access history
@fincooper
STRIDE
• Azure removes some of the attack surface, as infrastructure and operations
are handled by Microsoft.
• We can use frameworks such as STRIDE to identify threats:
• Good set of tools at https://www.microsoft.com/en-us/SDL/adopt/tools.aspx
Threat Property Definition
Spoofing Authentication Impersonating something or someone else.
Tampering Integrity Modifying data or code.
Repudiation Non-repudiation Claiming to have not performed an action.
Information Disclosure Confidentiality Exposing information to someone not authorized to see it.
Denial of Service Availability Deny or degrade service to users.
Elevation of Privilege Authorization Gain capabilities without proper authorization.
@fincooper
Security fail #1
• Every user is an Owner
• …In the Subscription scope
• STRIDE threat categorization:
• Tampering
• Information Disclosure
• Mitigation:
• Default access scope should be Resource Group, not Subscription
• Default RBAC access should be Contributor, not Owner
@fincooper
Security fail #2
• Service Principals have too wide privileges
• STRIDE threat categorization:
• Repudiation
• Mitigation:
• Service Principal RBAC assignments should follow the least privileged principle
• Service Principals should NOT be granted access in the Subscription scope
• Service Principals should NOT be granted Owner access in any scope
@fincooper
Security fail #3
• Untrusted authorization provider being used
• (Microsoft Account, Gmail, unmanaged Azure AD…)
• STRIDE threat categorization:
• Spoofing
• Elevation of Privilege
• Mitigation:
• Always use trusted Azure AD authentication that is managed by your organization
• Monitor Azure Subscription access using AAD PIM
@fincooper
Security fail #4
• Unprotected public endpoints
• HTTP / RDP / SSH
• STRIDE threat categorization:
• Information Disclosure
• Denial of Service
• Mitigation:
• Every public IP is a risk and should be carefully reviewed
• Use Network Security Groups to control access to / from virtual machines
• Use Azure Security Center’s Just-in-time access to dynamically change NSG rules
• Use Web Application Firewall to control access to public HTTP endpoints
@fincooper
Security fail #5
• Storage access keys used directly
• STRIDE threat categorization:
• Information Disclosure
• Tampering
• Repudiation
• Mitigation:
• Storage Access Keys should be stored in Azure Key Vault and rotated programmatically
• Restrict access to Microsoft.Storage/storageAccounts/listkeys/action using RBAC
@fincooper
Security fail #6
• No monitoring or alerting
• STRIDE threat categorization:
• Repudiation
• Denial of Service
• Mitigation:
• Configure Activity Log retention, default is only 90 days!
• Enable Application Insight Smart Alerts
• Enable Advanced Treat Protection
• Enable Azure SQL Audit logging
• Monitor all HTTP endpoint traffic with with Application Gateway / WAF
@fincooper
Security fail #7
• Missing Virtual Machine updates
• STRIDE threat categorization:
• Information Disclosure
• Elevation of Privilege
• Mitigation:
• Update management
• Azure Security Center
@fincooper
DEMO
“How to avoid them”
@fincooper
Secure DevOps kit for Azure (AzSK)
• Set of tools for assessing the security posture of your Azure environment
• Built by Microsoft Core Services Engineering
• Used to secure 1000+ Azure subscriptions at Microsoft
• Easy to get started with non-intrusive vulnerability scans, expands end-to-
end tooling from developer machine to CI/CD to continuous assurance
@fincooper
Materials
• My slides: slideshare.net/karlots
• Secure DevOps Kit for Azure:
• azsk.azurewebsites.net
• STRIDE Threat Modeling Lessons from Star Wars:
• youtube.com/watch?v=Y3VQpg04vXo
• Azure Security and Compliance Blueprint (not Azure Blueprint):
• docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview
• Azure Virtual Datacenter:
• docs.microsoft.com/en-us/azure/architecture/vdc/
Top Azure security fails and how to avoid them

More Related Content

PDF
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
PDF
Top 18 azure security fails and how to avoid them
PDF
BeyondCorp and Zero Trust
PDF
BeyondCorp Seattle Meetup: Closing the Adherence Gap
PDF
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
PDF
BeyondCorp and Zero Trust
PDF
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
PPTX
Jason Kent - AppSec Without Additional Tools
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
Top 18 azure security fails and how to avoid them
BeyondCorp and Zero Trust
BeyondCorp Seattle Meetup: Closing the Adherence Gap
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
BeyondCorp and Zero Trust
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
Jason Kent - AppSec Without Additional Tools

What's hot (20)

PPTX
Azure Security Fundamentals
PDF
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
PDF
BeyondCorp - Google Security for Everyone Else
PPTX
#ALSummit: Live Cyber Hack Demonstration
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
PDF
BeyondCorp New York Meetup: Closing the Adherence Gap
PDF
Azure security architecture
PDF
BeyondCorp Myths: Busted
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PDF
[OWASP Poland Day] Embedding security into SDLC + GDPR
PDF
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
PPTX
CSS 17: NYC - Stories from the SOC
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
#ALSummit: Architecting Security into your AWS Environment
PDF
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
PPTX
Integrate Security into DevOps - SecDevOps
PDF
Getting Started with Azure Security Center
PPTX
Azure Security Center- Zero to Hero
PDF
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
Azure Security Fundamentals
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
BeyondCorp - Google Security for Everyone Else
#ALSummit: Live Cyber Hack Demonstration
Global Azure Bootcamp 2018 - Azure Security Center
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
BeyondCorp New York Meetup: Closing the Adherence Gap
Azure security architecture
BeyondCorp Myths: Busted
#ALSummit: Cyber Resiliency: Surviving the Breach
[OWASP Poland Day] Embedding security into SDLC + GDPR
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
CSS 17: NYC - Stories from the SOC
CSS 17: NYC - Realities of Security in the Cloud
#ALSummit: Architecting Security into your AWS Environment
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Integrate Security into DevOps - SecDevOps
Getting Started with Azure Security Center
Azure Security Center- Zero to Hero
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
Ad

Similar to Top Azure security fails and how to avoid them (20)

PDF
IT Camp 19: Top Azure security fails and how to avoid them
PDF
DevSum - Top Azure security fails and how to avoid them
PDF
Techorama Belgium 2019: top Azure security fails and how to avoid them
PPTX
Cloud Security Zen: Principles to Meditate On
PPTX
For Business's Sake, Let's focus on AppSec
PDF
IglooConf 2019 Secure your Azure applications like a pro
PPTX
Architecting for Security Resilience
PDF
Web security uploadv1
PDF
Cloud App Security Customer Presentation.pdf
PDF
Let's Discuss Security with SFWelly
PPTX
Make your Azure PaaS Deployment More Safe
PDF
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
PPTX
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
PPTX
Just Trust Everyone and We Will Be Fine, Right?
PPTX
Identity and Security in the Cloud
PDF
The What, Why, and How of DevSecOps
PPTX
Security Design Principles for developing secure application .pptx
PPTX
What Does a Full Featured Security Strategy Look Like?
PDF
WebApp_to_Container_Security.pdf
PPTX
Understanding Database Encryption & Protecting Against the Insider Threat wit...
IT Camp 19: Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid them
Cloud Security Zen: Principles to Meditate On
For Business's Sake, Let's focus on AppSec
IglooConf 2019 Secure your Azure applications like a pro
Architecting for Security Resilience
Web security uploadv1
Cloud App Security Customer Presentation.pdf
Let's Discuss Security with SFWelly
Make your Azure PaaS Deployment More Safe
656704621-Against-Threats-and-Secure-Cloud-Environments-Presentation-Slides-F...
Ryan Elkins - Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Just Trust Everyone and We Will Be Fine, Right?
Identity and Security in the Cloud
The What, Why, and How of DevSecOps
Security Design Principles for developing secure application .pptx
What Does a Full Featured Security Strategy Look Like?
WebApp_to_Container_Security.pdf
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Ad

More from Karl Ots (20)

PDF
TechDays Finland 2020: Best practices of securing web applications running on...
PDF
TechDays Finland 2020: Azuren tietoturva haltuun!
PDF
IglooConf 2020: Best practices of securing web applications running on Azure ...
PDF
Building an Enterprise-Grade Azure Governance Model
PDF
CloudBurst Malmö: Best practices of securing web applications running on Azur...
PDF
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
PDF
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
PDF
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
PDF
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
PDF
FAUG #9: Azure security architecture and stories from the trenches
PDF
Monitoring real-life Azure applications: When to use what and why
PDF
Azure Saturday: Security + DevOps + Azure = Awesomeness
PDF
Navigating in the sea of containers in azure when to choose which service and...
PDF
Kubernetes in Azure
PDF
Azure security architecture / FAUG JKL 15.2.2018
PDF
Securing Azure Infrastructure
PDF
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
PDF
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
PDF
Building globally scalable media solutions with Azure Media Services part 2
PDF
Security + DevOps + Azure = Awesomeness
TechDays Finland 2020: Best practices of securing web applications running on...
TechDays Finland 2020: Azuren tietoturva haltuun!
IglooConf 2020: Best practices of securing web applications running on Azure ...
Building an Enterprise-Grade Azure Governance Model
CloudBurst Malmö: Best practices of securing web applications running on Azur...
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
FAUG #9: Azure security architecture and stories from the trenches
Monitoring real-life Azure applications: When to use what and why
Azure Saturday: Security + DevOps + Azure = Awesomeness
Navigating in the sea of containers in azure when to choose which service and...
Kubernetes in Azure
Azure security architecture / FAUG JKL 15.2.2018
Securing Azure Infrastructure
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
Building globally scalable media solutions with Azure Media Services part 2
Security + DevOps + Azure = Awesomeness

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
A Presentation on Artificial Intelligence
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Digital-Transformation-Roadmap-for-Companies.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
A Presentation on Artificial Intelligence
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Top Azure security fails and how to avoid them

  • 1. @fincooper Top Azure security fails and how to avoid them
  • 2. @fincooper Karl Ots Managing Consultant karl.ots@zure.com • Cloud & cybersecurity expert • User group and conference organizer, podcast hosts • Patented inventor • Working on Azure since 2011 • Helped to secure 100+ Azure applications, from startups to Fortune 500 enterprises • linkedin.com/in/karlots
  • 3. @fincooper What to expect in this session • Azure security landscape • Top Azure security fails I have wondered upon in my adventures • Why are they bad? • How to fix them? • Resources to help you secure your Azure environment, regardless of your current status
  • 4. @fincooper Security controls in Azure Physical Security Network Host Application Admin Data Physical controls, video surveillance, access control Edge routers, firewalls, intrusion detection, vulnerability scanning Access control and monitoring, anti-malware, patch and configuration management Secure engineering (SDL), access control and monitoring, anti-malware Account management, training and awareness, screening Threat and vulnerability management, security monitoring and response, access control and monitoring, file/data integrity, encryption
  • 5. @fincooper With great power comes great responsibility
  • 6. @fincooper Role-Based Access Control Subscription Resource Groups Resources Owner Can perform all management operations for a resource and its child resources including access management and granting access to others. Contributor Can perform all management operations for a resource including create and delete resources. A contributor cannot grant access to other. Reader Has read-only access to a resource and its child resources. A reader cannot read secrets.
  • 7. @fincooper Privileged Identity Management • Requires Azure AD Premium P2 • For all users in the whole AAD Tenant • Identifies users with administrative privileges • Enables on-demand, just-in-time administrative access • Generates reports about administrator access history
  • 8. @fincooper STRIDE • Azure removes some of the attack surface, as infrastructure and operations are handled by Microsoft. • We can use frameworks such as STRIDE to identify threats: • Good set of tools at https://www.microsoft.com/en-us/SDL/adopt/tools.aspx Threat Property Definition Spoofing Authentication Impersonating something or someone else. Tampering Integrity Modifying data or code. Repudiation Non-repudiation Claiming to have not performed an action. Information Disclosure Confidentiality Exposing information to someone not authorized to see it. Denial of Service Availability Deny or degrade service to users. Elevation of Privilege Authorization Gain capabilities without proper authorization.
  • 9. @fincooper Security fail #1 • Every user is an Owner • …In the Subscription scope • STRIDE threat categorization: • Tampering • Information Disclosure • Mitigation: • Default access scope should be Resource Group, not Subscription • Default RBAC access should be Contributor, not Owner
  • 10. @fincooper Security fail #2 • Service Principals have too wide privileges • STRIDE threat categorization: • Repudiation • Mitigation: • Service Principal RBAC assignments should follow the least privileged principle • Service Principals should NOT be granted access in the Subscription scope • Service Principals should NOT be granted Owner access in any scope
  • 11. @fincooper Security fail #3 • Untrusted authorization provider being used • (Microsoft Account, Gmail, unmanaged Azure AD…) • STRIDE threat categorization: • Spoofing • Elevation of Privilege • Mitigation: • Always use trusted Azure AD authentication that is managed by your organization • Monitor Azure Subscription access using AAD PIM
  • 12. @fincooper Security fail #4 • Unprotected public endpoints • HTTP / RDP / SSH • STRIDE threat categorization: • Information Disclosure • Denial of Service • Mitigation: • Every public IP is a risk and should be carefully reviewed • Use Network Security Groups to control access to / from virtual machines • Use Azure Security Center’s Just-in-time access to dynamically change NSG rules • Use Web Application Firewall to control access to public HTTP endpoints
  • 13. @fincooper Security fail #5 • Storage access keys used directly • STRIDE threat categorization: • Information Disclosure • Tampering • Repudiation • Mitigation: • Storage Access Keys should be stored in Azure Key Vault and rotated programmatically • Restrict access to Microsoft.Storage/storageAccounts/listkeys/action using RBAC
  • 14. @fincooper Security fail #6 • No monitoring or alerting • STRIDE threat categorization: • Repudiation • Denial of Service • Mitigation: • Configure Activity Log retention, default is only 90 days! • Enable Application Insight Smart Alerts • Enable Advanced Treat Protection • Enable Azure SQL Audit logging • Monitor all HTTP endpoint traffic with with Application Gateway / WAF
  • 15. @fincooper Security fail #7 • Missing Virtual Machine updates • STRIDE threat categorization: • Information Disclosure • Elevation of Privilege • Mitigation: • Update management • Azure Security Center
  • 17. @fincooper Secure DevOps kit for Azure (AzSK) • Set of tools for assessing the security posture of your Azure environment • Built by Microsoft Core Services Engineering • Used to secure 1000+ Azure subscriptions at Microsoft • Easy to get started with non-intrusive vulnerability scans, expands end-to- end tooling from developer machine to CI/CD to continuous assurance
  • 18. @fincooper Materials • My slides: slideshare.net/karlots • Secure DevOps Kit for Azure: • azsk.azurewebsites.net • STRIDE Threat Modeling Lessons from Star Wars: • youtube.com/watch?v=Y3VQpg04vXo • Azure Security and Compliance Blueprint (not Azure Blueprint): • docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview • Azure Virtual Datacenter: • docs.microsoft.com/en-us/azure/architecture/vdc/