Overview – Apply Zero Trust principles to Azure IaaS
Note
Upcoming Livestream Join the Azure FastTrack team as they discuss this article. 23 October, 2024 | 10:00 AM - 11:00 AM (UTC-07:00) Pacific Time (US & Canada). Register here.
Summary: To apply Zero Trust principles to Azure IaaS components and infrastructure, you must first understand the common reference architecture and the components of Azure storage, virtual machines, and spoke and hub virtual networks.
This series of articles help you apply the principles of Zero Trust to your workloads in Microsoft Azure IaaS based on a multi-disciplinary approach to applying the Zero Trust principles. Zero Trust is a security strategy. It isn't a product or a service, but an approach in designing and implementing the following set of security principles:
- Verify explicitly
- Use least privileged access
- Assume breach
Implementing the Zero Trust mindset to "assume breach, never trust, always verify" requires changes to cloud infrastructure, deployment strategy, and implementation.
These initial series of five articles (including this introduction) show you how to apply Zero Trust approach to a common IT business scenario based on infrastructure services. The work is broken into units that can be configured together as follows:
- Azure storage
- Virtual machines
- Spoke virtual networks (VNets) for virtual machine-based workloads
- Hub VNets to support access to many workloads in Azure
For more information, see Apply Zero Trust principles to Azure Virtual Desktop.
Note
Additional articles will be added to this series in the future, including how organizations can apply a Zero Trust approach to applications, networking, data, and DevOps services based on real IT business environments.
Important
This Zero Trust guidance describes how to use and configure several security solutions and features available on Azure for a reference architecture. Several other resources also provide security guidance for these solutions and features, including:
To describe how to apply a Zero Trust approach, this guidance targets a common pattern used in production by many organizations: a virtual-machine-based application hosted in a VNet (and IaaS application). This is a common pattern for organizations migrating on-premises applications to Azure, which is sometimes referred to as "lift-and-shift." The reference architecture includes all components necessary to support this application, including storage services and a hub VNet.
The reference architecture reflects a common deployment pattern in production environments. It isn't based on the enterprise-scale landing zones recommended in the Cloud Adoption Framework (CAF), although many of the best practices in CAF are included in the reference architecture, such as using a dedicated VNet to host components that broker access to the application (hub VNet).
If you're interested in learning about the guidance recommended in the Cloud Adoption Framework Azure landing zones, see these resources:
Reference architecture
The following figure shows the reference architecture for this Zero Trust guidance.
This architecture contains:
- Multiple IaaS components and elements, including different types of users and IT consumers accessing the app from different sites. such as Azure, the internet, on-premises, and branch offices.
- A common three-tier application containing a front end tier, application tier, and data tier. All tiers run on virtual machines within a VNet named SPOKE. Access to the app is protected by another VNet named HUB that contains additional security services.
- Some of the most used PaaS services on Azure that support IaaS applications, including role-based access control (RBAC) and Microsoft Entra ID, which contribute to the Zero Trust security approach.
- Storage Blobs and Storage Files that provide object storage for the applications and files shared by users.
This series of articles walk through the recommendations for implementing Zero Trust for the reference architecture by addressing each of these larger pieces hosted in Azure, as shown here.
The diagram outlines the larger areas of the architecture that are addressed by each article in this series:
It’s important to note that the guidance in this series of articles is more specific for this type of architecture than the guidance provided in the Cloud Adoption Framework and Azure landing zone architectures. If you applied the guidance in either of these resources, be sure to also review this series of articles for additional recommendations.
Understanding Azure components
The reference architecture diagram provides a topological view of the environment. It’s also valuable to see logically how each of the components can be organized within the Azure environment. The following diagram provides a way to organize your subscriptions and resource groups. Your Azure subscriptions might be organized differently.
In this diagram, the Azure infrastructure is contained within a Microsoft Entra ID tenant. The following table describes the different sections shown in the diagram.
Azure subscriptions
You can distribute the resources in more than one subscription, where each subscription may hold different roles, such as network subscription, or security subscription. This is described in the Cloud Adoption Framework and Azure Landing Zone documentation previously referenced. The different subscriptions may also hold different environments, such as production, development, and tests environments. It depends on how you want to separate your environment and the number of resources you'll have in each. One or more subscriptions can be managed together using a Management Group. This gives you the ability to apply permissions with role based access control (RBAC) and Azure policies to a group of subscriptions instead of setting up each subscription individually.
Microsoft Defender for Cloud and Azure Monitor
For each Azure subscription, a set of Azure Monitor solutions and Defender for Cloud is available. If you manage these subscriptions through a Management Group, you're able to consolidate in a single portal for all the functionality of Azure Monitor and Defender for Cloud. For example, Secure Score, provided by Defender for Cloud, are consolidated for all your subscriptions, using a Management Group as the scope.
Storage resource group (1)
The storage account is contained in a dedicated resource group. You can isolate each storage account in a different resource group for more granular permission control. Azure storage services are contained within a dedicated storage account. You can have one storage account for each type of storage workload, for example an Object Storage (also called Blob storage) and Azure Files. This provides more granular access control and can improve performance.
Virtual machines resource group (2)
Virtual machines are contained in one resource group. You can also have each virtual machine type for workload tiers such as front end, application, and data in different resource groups to further isolate access control.
Spoke (3) and hub (4) VNet resource groups in separate subscriptions
The network and other resources for each of the VNets in the reference architecture are isolated within dedicated resource groups for spoke and hub VNets. This organization works well when responsibility for these live on different teams. Another option is to organize these components by putting all network resources in one resource group and security resources in another. It depends on how your organization is set up to manage these resources.
Threat Protection with Microsoft Defender for Cloud
Microsoft Defender for Cloud is an extended detection and response (XDR) solution that automatically collects, correlates, and analyzes signal, threat, and alert data from across your environment. Defender for Cloud is intended to be used together with Microsoft Defender XDR to provide a greater breadth of correlated protection of your environment, as shown in the following diagram.
In the diagram:
- Defender for Cloud is enabled for a management group that includes multiple Azure subscriptions.
- Microsoft Defender XDR is enabled for Microsoft 365 apps and data, SaaS apps that are integrated with Microsoft Entra ID, and on-premises Active Directory Domain Services (AD DS) servers.
For more information about configuring management groups and enabling Defender for Cloud, see:
- Organize subscriptions into management groups and assign roles to users
- Enable Defender for Cloud on all subscriptions in a management group
Security solutions in this series of articles
Zero Trust involves applying multiple disciplines of security and information protection together. In this series of articles, this multi-discipline approach is applied to each of the units of work for infrastructure components as follows:
Apply Zero Trust principles to Azure storage
- Protect data in all three modes: data at rest, data in transit, and data in use
- Verify users and control access to storage data with the least privileges
- Logically separate or segregate critical data with network controls
- Use Defender for Storage for automated threat detection and protection
Apply Zero Trust principles to virtual machines in Azure
- Configure logical isolation for virtual machines
- Leverage Role Based Access Control (RBAC)
- Secure virtual machine boot components
- Enable customer-managed keys and double encryption
- Control the applications installed on virtual machines
- Configure secure access
- Set up secure maintenance of virtual machines
- Enable advanced threat detection and protection
Apply Zero Trust principles to a spoke VNet in Azure
- Leverage Microsoft Entra RBAC or set up custom roles for networking resources
- Isolate infrastructure into its own resource group
- Create a network security group for each subnet
- Create an application security group for each virtual machine role
- Secure traffic and resources within the VNet
- Secure access to the VNet and application
- Enable advanced threat detection and protection
Apply Zero Trust principles to a hub VNet in Azure
- Secure Azure Firewall Premium
- Deploy Azure DDoS Protection Standard
- Configure network gateway routing to the firewall
- Configure threat protection
Technical illustrations
These illustrations are replicas of the reference illustrations in these articles. Download and customize these for your own organization and customers. Replace the Contoso logo with your own.
Item | Description |
---|---|
Download Visio Updated October 2024 |
Apply Zero Trust principles to Azure IaaS Use these illustrations with these articles: - Overview - Azure storage - Virtual machines - Azure spoke virtual networks - Azure hub virtual networks |
Download Visio Updated October 2024 |
Apply Zero Trust principles to Azure IaaS — One page poster A one-page overview of the process for applying the principles of Zero Trust to Azure IaaS environments. |
For additional technical illustrations, see Zero Trust illustrations for IT architects and implementers.
Recommended training for Zero Trust
The following are the recommended training modules for Zero Trust.
Azure management and governance
Training | Describe Azure management and governance |
---|---|
The Microsoft Azure Fundamentals training is composed of three learning paths: Microsoft Azure Fundamentals: Describe cloud concepts, Describe Azure architecture and services, and Describe Azure management and governance. Microsoft Azure Fundamentals: Describe Azure management and governance is the third learning path in Microsoft Azure Fundamentals. This learning path explores the management and governance resources available to help you manage your cloud and on-premises resources. This learning path helps prepare you for Exam AZ-900: Microsoft Azure Fundamentals. |
Configure Azure Policy
Training | Configure Azure Policy |
---|---|
Learn how to configure Azure Policy to implement compliance requirements. In this module, you learn how to: |
Manage security operation
Training | Manage Security operation |
---|---|
Once you have deployed and secured your Azure environment, learn to monitor, operate, and continuously improve the security of your solutions. This learning path helps prepare you for Exam AZ-500: Microsoft Azure Security Technologies. |
Configure storage security
Training | Configure Storage security |
---|---|
Learn how to configure common Azure Storage security features like storage access signatures. In this module, you learn how to: |
Configure Azure Firewall
Training | Configure Azure Firewall |
---|---|
You will learn how to configure the Azure Firewall including firewall rules. After completing this module, you will be able to: |
For more training on security in Azure, see these resources in the Microsoft catalog:
Security in Azure | Microsoft Learn
Next Steps
See these additional articles for applying Zero Trust principles to Azure:
- For Azure IaaS:
- Azure Virtual Desktop
- Azure Virtual WAN
- IaaS applications in Amazon Web Services
- Microsoft Sentinel and Microsoft Defender XDR
See these additional articles for applying Zero Trust principles to Azure networking:
- Encryption
- Segmentation
- Gain visibility into your network traffic
- Discontinue legacy network security technology
References
Refer to the following links to learn about the various services and technologies mentioned in this article.
- What is Azure - Microsoft Cloud Services
- Azure Infrastructure as a Service (IaaS)
- Virtual Machines (VMs) for Linux and Windows
- Introduction to Azure Storage
- Azure Virtual Network
- Introduction to Azure security
- Zero Trust implementation guidance
- Overview of the Microsoft cloud security benchmark
- Security baselines for Azure overview
- Building the first layer of defense with Azure security services
- Microsoft Cybersecurity Reference Architectures