Design area: Security
This design area creates a foundation for security across your Azure, hybrid, and multicloud environments. You can enhance this foundation later with security guidance outlined in the Secure methodology of the Cloud Adoption Framework.
Design area review
Involved roles or functions: This design area is led by cloud security, specifically the security architects within that team. The cloud platform and cloud center of excellence are required to review networking and identity decisions. The collective roles might be required to define and implement the technical requirements coming from this exercise. More advanced security guardrails might also need support from cloud governance.
Scope: The goal of this exercise is to understand security requirements and implement them consistently across all workloads in your cloud platform. The primary scope of this exercise focuses on security operations tooling and access control. This scope includes Zero Trust and advanced network security.
Out of scope: This exercise focuses on the foundation for a modern security operations center in the cloud. To streamline the conversation, this exercise doesn't address some of the disciplines in the CAF Secure methodology. Security operations, asset protection, and innovation security will build on your Azure landing zone deployment. However, they're out of scope for this design area discussion.
Design area overview
Security is a core consideration for all customers, in every environment. When designing and implementing an Azure landing zone, security should be a consideration throughout the process.
The security design area focuses on considerations and recommendations for landing zone decisions. The Secure methodology of the Cloud Adoption Framework also provides further in-depth guidance for holistic security processes and tools.
New (greenfield) cloud environment: To start your cloud journey with a small set of subscriptions, see Create your initial Azure subscriptions. Also, consider using Bicep deployment templates in building out your Azure landing zones. For more information, see Azure Landing Zones Bicep - Deployment Flow.
Existing (brownfield) cloud environment: Consider using the following Microsoft Entra identity and access services if you are interested in applying the principles from security design area to existing Azure environments:
- Deploy Microsoft Entra Connect cloud sync to provide your local Active Directory Domain Services (AD DS) users with secure single sign-on (SSO) to your Microsoft Entra ID-backed applications. An additional benefit to configuring hybrid identity is you can enforce Microsoft Entra multifactor authentication (MFA) and Microsoft Entra Password Protection to further protect these identities
- Consider Microsoft Entra Conditional Access to provided secure authentication to your cloud apps and Azure resources.
- Implement Microsoft Entra Privileged Identity Management to ensure least-privilege access and deep reporting in your entire Azure environment. Teams should begin recurring access reviews to ensure the right people and service principles have current and correct authorization levels.
- Make use of the recommendations, alerting, and remediation capabilities of Microsoft Defender for Cloud. Your security team can also integrate Microsoft Defender for Cloud into Microsoft Sentinel if they need a more robust, centrally managed hybrid and multicloud Security Information Event Management (SIEM)/Security Orchestration and Response (SOAR) solution.
The Azure Landing Zones Bicep - Deployment Flow repository contains a number of Bicep deployment templates that can accelerate your greenfield and brownfield Azure landing zone deployments. These templates already have Microsoft proven-practice security guidance integrated within them.
For more information on working in brownfield cloud environments, see Brownfield environment considerations.
Microsoft cloud security benchmark
The Microsoft cloud security benchmark includes high-impact security recommendations to help you secure most of the services you use in Azure. You can think of these recommendations as general or organizational, as they're applicable to most Azure services. The Microsoft cloud security benchmark recommendations are then customized for each Azure service. This customized guidance is contained in service recommendations articles.
The Microsoft cloud security benchmark documentation specifies security controls and service recommendations.
- Security controls: The Microsoft cloud security benchmark recommendations are categorized by security controls. Security controls represent high-level vendor-agnostic security requirements, like network security and data protection. Each security control has a set of security recommendations and instructions that help you implement those recommendations.
- Service recommendations: When available, benchmark recommendations for Azure services will include Microsoft cloud security benchmark recommendations that are tailored specifically for that service.
Azure Attestation
Azure Attestation is a tool that can help you ensure the security and integrity of your platform and binaries that run inside it. It's especially useful for businesses that require highly scalable compute resources and uncompromising trust with the remote attestation capability.
Security design considerations
An organization must have visibility into what's happening within their technical cloud estate. Security monitoring and audit logging of Azure platform services is a key component of a scalable framework.
Security operations design considerations
Scope | Context |
---|---|
Security alerts | - Which teams require notifications for security alerts? - Are there groups of services that alerts require routing to different teams? - Business requirements for real-time monitoring and alerting. - Security information and event management integration with Microsoft Defender for Cloud and Microsoft Sentinel. |
Security logs | - Data retention periods for audit data. Microsoft Entra ID P1 or P2 reports have a 30-day retention period. - Long-term archiving of logs like Azure activity logs, virtual machine (VM) logs, and platform as a service (PaaS) logs. |
Security controls | - Baseline security configuration via Azure in-guest VM policy. - Consider how your security controls will align with governance guardrails. |
Vulnerability management | - Emergency patching for critical vulnerabilities. - Patching for VMs that are offline for extended periods of time. - Vulnerability assessment of VMs. |
Shared responsibility | - Where are the handoffs for team responsibilities? These responsibilities need consideration when monitoring or responding to security events. - Consider the guidance in the Secure methodology for security operations. |
Encryption and keys | - Who requires access to keys in the environment? - Who will be responsible for managing the keys? - Explore encryption and keys further. |
Attestation | - Will you use Trusted Launch for your VMs, and do you need attestation of the integrity of the entire boot chain of your VM (UEFI, OS, system, and drivers)? - Do you want to take advantage of confidential disk encryption for your confidential VMs? - Do your workloads require attestation that they're running inside a trusted environment? |
Security operations design recommendations
Use Microsoft Entra ID reporting capabilities to generate access control audit reports.
Export Azure activity logs to Azure Monitor Logs for long-term data retention. Export to Azure Storage for long-term storage beyond two years, if necessary.
Enable Defender for Cloud standard for all subscriptions, and use Azure Policy to ensure compliance.
Monitor base operating system patching drift via Azure Monitor Logs and Microsoft Defender for Cloud.
Use Azure policies to automatically deploy software configurations through VM extensions and enforce a compliant baseline VM configuration.
Monitor VM security configuration drift via Azure Policy.
Connect default resource configurations to a centralized Azure Monitor Log Analytics workspace.
Use an Azure Event Grid-based solution for log-oriented, real-time alerts.
Use Azure Attestation for attestation of:
- The integrity of the entire boot chain of your VM. For more information, see Boot integrity monitoring overview.
- Secure release of confidential disk encryption keys for a confidential VM. For more information, see Confidential OS disk encryption.
- Various types of workload trusted execution environments. For more information, see Use cases.
Access control design considerations
Modern security boundaries are more complex than boundaries in a traditional datacenter. The four walls of the datacenter no longer contain your assets. Keeping users out of the protected network is no longer sufficient to control access. In the cloud, your perimeter is composed of two parts: network security controls and Zero Trust access controls.
Advanced network security
Scope | Context |
---|---|
Plan for inbound and outbound internet connectivity | Describes recommended connectivity models for inbound and outbound connectivity to and from the public internet. |
Plan for landing zone network segmentation | Explores key recommendations to deliver highly secure internal network segmentation within a landing zone. These recommendations drive network zero-trust implementation. |
Define network encryption requirements | Explores key recommendations to achieve network encryption between on-premises and Azure and across Azure regions. |
Plan for traffic inspection | Explores key considerations and recommended approaches for mirroring or tapping traffic within Azure Virtual Network. |
Zero Trust
For Zero Trust access with identities, you should consider:
- Which teams or individuals require access to services within the landing zone? What roles are they doing?
- Who should authorize the access requests?
- Who should receive the notifications when privileged roles are activated?
- Who should have access to the audit history?
For more information, see Microsoft Entra Privileged Identity Management.
Implementing Zero Trust can go beyond just identity and access management. You should consider if your organization needs to implement Zero Trust practices across multiple pillars, such as infrastructure, data, and networking. For more information, see Incorporate Zero Trust practices in your landing zone
Access control design recommendations
In the context of your underlying requirements, conduct a joint examination of each required service. If you want to bring your own keys, it might not be supported across all considered services. Implement relevant mitigation so that inconsistencies don't hinder wanted outcomes. Choose appropriate region pairs and disaster recovery regions that minimize latency.
Develop a security allowlist plan to assess services like security configuration, monitoring, and alerts. Then create a plan to integrate them with existing systems.
Determine the incident response plan for Azure services before moving it into production.
Align your security requirements with Azure platform roadmaps to stay current with newly released security controls.
Implement a zero-trust approach for access to the Azure platform where appropriate.
Security in the Azure landing zone accelerator
Security is at the core of the Azure landing zone accelerator. As part of the implementation, many tools and controls are deployed to help organizations quickly achieve a security baseline.
For example, the following are included:
Tools:
- Microsoft Defender for Cloud, standard or free tier
- Microsoft Sentinel
- Azure DDoS Network Protection (optional)
- Azure Firewall
- Web Application Firewall (WAF)
- Privileged Identity Management (PIM)
Policies for online and corporate-connected landing zones:
- Enforce secure access, like HTTPS, to storage accounts
- Enforce auditing for Azure SQL Database
- Enforce encryption for Azure SQL Database
- Prevent IP forwarding
- Prevent inbound RDP from internet
- Ensure subnets are associated with NSG
Next steps
Learn how to secure privileged access for hybrid and cloud deployments in Microsoft Entra ID.