Version 1.1 –September 2019https://aka.ms/AzureSecurityCompass
N
General
SECURE
COMPLIANT
LEVEL OF
ACCEPTABLE RISK
NETWORK
Loads (compromised device)
average price ranges
•PC-$0.13 to $0.89
•Mobile-from $0.82 to $2.78
Spearphishing services
range from $100 to
$1,000 per successful
account take over
0daysprice range
varies from $5,000
to $350,000
Ransomware:
$66 upfront
Or
30% of the profit (affiliate model)
Proxy services to evade IP
geolocation prices vary
As low as $100 per week
for 100,000 proxies.
Denial of Service
(DOS) average prices
day: $102.05
week: $327.00
month: $766.67
Compromised accounts
As low as $150 for 400M.
Averages $0.97 per 1k.
Evolving architecture, tools, skills, & practices
ATTACKERS USING IDENTITY TACTICS
MODERN PERIMETER
(Identity Controls)
MODERN PERIMETER
(Identity Controls)
CLASSIC PERIMETER
(Network Controls)
Network →
SLA
Azure Marketplace
fits PaaS or IaaS model
CRYPTOMINERS –
(WEBSERVERS,
VISITORS)
PIVOT TO ON
PREMISES FROM
CLOUD
ACQUIRE TENANT
KEYS FROM
GITHUB/ETC
RDP/SSH
PASSWORD SPRAY
& BRUTE FORCE
SOCIAL ENGINEERING
TRAVERSALEXPLOIT/ENTER MONETIZATION
RANSOMWARE
CREDENTIAL THEFT &
ABUSE (HASHES, SSH…)
PHISHING
GEO-FILTERING EVASION
WITH PROXY
TARGETED DATA THEFT
COMMODITY
BOTNET/DDOS/ETC
SCAN & EXPLOIT
Extensive machine learning to:
•Reduce manual effort
•Reduce wasted effort
on false positives
•Speed up detection
https://docs.microsoft.com/en-us/azure/security-center/security-
center-apply-system-updates
Azure Update Management
Azure Security Center
Just in Time access
Architecture guidance on this topic can be found at
https://docs.microsoft.com/en-us/azure/architecture/security/security-operations
Detect Respond
and moreIdentity Endpoint Cloud Network
Log Flow
Generate Alerts
CRITICAL GUIDANCE
ASC BUILT IN SECURITY ALERTS
Alert List
extensive threat intelligence
MITRE report
https://docs.microsoft.com/en-
us/azure/security-center/security-center-
get-started
GENERAL GUIDANCE
LATER -ADDITIONAL LOGS
https://docs.microsoft.com/en-
us/azure/security/azure-log-audit
NOW -ALERT INTEGRATION
https://docs.microsoft.com/en-
us/azure/security-center/security-
center-export-data-to-siem
NOW -CRITICAL LOGS
Azure Monitor
CLOUD ANALYTICS STRATEGY
Data Gravity
CRITICAL CHOICE
Microsoft Graph Security API
Can be Native Cloud Analytics
(recommended) or
Infrastructure as a Service (IaaS)
SIEM. Native is recommended
over IaaS because of reduced
infrastructure management
Benefits of native cloud
analytics may also accelerate
transition plans (advanced
capabilities, simplified
management, etc.)
Hybrid Architecture can
Function as either a
•Transition State
•Permanent State
Architecture guidance on this topic can be found at
https://docs.microsoft.com/en-us/azure/architecture/security/identity
Commercial
IdPs
Consumer
IdPs
Partners
Customers
Windows Server
Active Directory
Azure AD
Connect
Azure
Active Directory
Azure VM
Azure Service
(e.g. ARM, Azure Storage)
Your code
MSI VM
Extension
Credentials
1
2
3
http://localhost/oauth2/token
Azure Active Directory
Azure (inject and roll credentials)
https://docs.microsoft.com/en-us/azure/active-
directory/managed-identities-azure-resources/overview
CRITICAL BEST PRACTICES
SYNCHRONIZE WITH ACTIVE
DIRECTORY & IDENTITY SYSTEMS
https://docs.microsoft.com/en-
us/azure/active-directory/connect/active-
directory-aadconnect
AZURE AD FOR APPLICATIONS
Azure AD
Azure AD B2B
Azure AD B2C
CRITICAL BEST PRACTICES
BLOCK LEGACY AUTHENTICATION
password spray attacks (majority use legacy auth)
https://techcommunity.microsoft.com/t5/Azure-Active-
Directory-Identity/Azure-AD-Conditional-Access-
support-for-blocking-legacy-auth-is/ba-p/245417
https://www.youtube.com/watch?v=wGk0J4z90GI
AZURE AD PASSWORD PROTECTION
https://www.microsoft.com/en-
us/research/publication/password-
guidance/
https://pages.nist.gov/800-63-
3/sp800-63b.html
Passwordless
CRITICAL BEST PRACTICES
https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/overview
•Azure AD reporting-Risk events are part of Azure AD's security reports.
For more information, see the users at risk security reportand the risky sign-
ins security report.
•Azure AD Identity Protection-Risk events are also part of the reporting
capabilities of Azure Active Directory Identity Protection.
•Use the Identity Protection risk events APIto gain programmatic access to
security detections using Microsoft Graph.
0. Do Nothing (Not Recommended)
Conditional Access policy for
Azure management
integrity with Windows Defender ATP
More information on Conditional Access:
https://docs.microsoft.com/en-us/azure/active-
directory/conditional-access/overview
•BYO Encryption -.NET Libraries, client-side encryption, etc.
•SQLTransparent Data Encryption, Always Encrypted>
•HDInsight Encryption
•Azure Backup Encrypted at Rest, Encrypted VM support
•Azure Disk Encryption -<BitLocker [Windows], DM-Crypt
[Linux]>
•Partner Volume Encryption–<CloudLink
®
SecureVM,
Vormetric, etc.>
•BYO Encryption–<Customer provided>
Layers (and why each is important)
Encryption Technologies
•Azure Information Protection (AIP)or 3
rd
party solutions
•Azure Storage Service Encryption (server side
encryption) <AES-256, Block, Append, and page Blobs>
•Same as application layer
•Near zero management effort (for Microsoft managed key)
•Mitigate against loss/leakage of VM Disks from storage account
•Mitigate against attacks on cloud provider/infrastructure
•On by default and unable to disable