Hi @Ajay Singh
Welcome to Microsoft Q&A! Thanks for asking Question here!
To protect the security and privacy of your account, Microsoft performs routine audits of all Azure subscriptions. If suspicious activity is identified that violates the Microsoft Acceptable Use Policy, the subscription will be disabled until the issue is resolved.
If your account is disabled, please try with below steps:
1.Check your email for many Terms of Service violations, you should receive an email with additional information on how to correct the violation.
2.Review the Terms of Service Make sure that you review the Terms of Service and take corrective action to address any potential violations.
3.Create a support request If you feel your case needs to be revisited, create a support ticket. You can do this through the portal by searching for Help + support and clicking on Create a support request (Issue type: Subscription management / Problem type: Re-enable my subscription).
If your subscription has been compromised:
4.Completely disable and delete compromised resources.
5.Review activity logs and billing activity to help identify suspicious resources.
6.Check your email for Terms of Use violation notifications.
An Azure security audit systematically examines your Azure cloud environment to identify potential vulnerabilities, validate compliance with different regulations, and ensure adherence to industry best practices. They also implemented stronger IAM policies and increased monitoring for suspicious activity.
Here few core components of an Azure security checklist audit are:
7.Identifying vulnerabilities: Detect potential security weaknesses within the Azure environment, enabling proactive remediation.
8.Validating compliance: Ensure the organization meets relevant regulatory and compliance standards.
9.Providing a remediation roadmap: Use audit findings to guide security improvements and risk mitigation efforts.
An Azure security audit report should classify findings based on severity
10.Low: Minor issues that are primarily best-practice deviations.
11.Medium: Issues that can pose a potential risk.
12.High: Serious security lapses that need specific conditions to exploit.
13.Critical: Direct vulnerabilities that can lead to a total system failure.
To finalize the audit of IdAM controls, the assessment should determine whether the use of single sign-on (SSO) has been leveraged to streamline password and user management in enterprise applications; whether there is a banned password list; whether password policy is enforced to strengthen user credentials; and whether resource protection mechanisms, such as resource locks, are in place to prevent the unauthorized deletion of critical resources within Azure tenants.
Refer: https://www.getastra.com/blog/cloud/azure/azure-security-audit/
https://learn.microsoft.com/en-us/answers/questions/1656210/azure-subscription-disabled-for-suspicious-activit
https://learn.microsoft.com/en-gb/azure/security/fundamentals/log-audit
Please let me know if you required anything.