Azure Advisor Security Recommendations.

Azure Advisor Security Recommendations.

Azure Advisor provides you with a consistent, consolidated view of recommendations for all your Azure resources. It integrates with Azure Security Center to bring you security recommendations. You can leverage Azure advisor to get security recommendations on the following grounds: Identity management, access control, application security, and encryption recommendations. 

Azure Advisor Security Best Practices; To robustly protect your Azure Resources adopt these best practices.

COMPUTE

  • Enable adaptive application controls for defining safe applications.
  • Update allowlist rules in your adaptive application control policy. 
  • Encrypt automation account variables. 
  • Enable Azure Defender and file integrity monitoring for servers.
  • Use disk encryption on virtual machines.
  • Use endpoint protection on your machines and VM scale sets. 
  • Install the Log Analytics agent on your Azure Arc machines, virtual machines, and machine scale sets.
  • Protect management ports for VMs with just-in-time network access control. 


CONTAINERS

  • Enable Azure Defender for Kubernetes and container registries.
  • Deploy from trusted registries only. 
  • Avoid running containers as a root user.
  • Use Role-Based Access Control (RBAC) for all Kubernetes services.
  • Install Azure Policy Addon-on for Kubernetes on your clusters. 
  • Ensure clusters are only accessible over HTTPS. 
  • Avoid overriding or disabling container AppArmor profiles. 

App Services

  • Enable Azure Defender for App Service.
  • Require FTPS in your API app, function app, and web app.
  • Use the latest version of TLS in your function app and web app. 

Data

  • Provision Azure Active Directory for SQL servers.
  • Install the Azure Defender extension on Azure Arc clusters.
  • Use customer-managed keys to encrypt data at rest for Azure Cosmos DB accounts.
  • Enable Azure Defender for SQL Database servers, DNS, Resource Manager, and storage. 


Identity & Access

  • Have at least 2 but no more than 3 owners per subscription. 
  • Enable Azure Defender for Key Vault. 
  • Remove deprecated and external accounts with owner permissions, read permissions, and write permissions. 
  • Use expirations for keys and secrets in your Key Vault.
  • Enable MFA across all accounts with the owner, read, and write permissions.


IoT

  • Apply adaptive network hardening recommendations on internet-facing VMs.
  • Restrict network ports with network security groups. 
  • Enable secure transfer to storage accounts. 
  • Protect VM management ports with just-in-time network access control. 

   


         

To view or add a comment, sign in

More articles by Theophilus Bittok

  • BGP MTU Discovery.

    What is MTU and Why is it Important? The Maximum Transmission Unit (MTU) is the maximum size, in bytes, that a packet…

    2 Comments
  • BGP Best External.

    By default, BGP speakers only advertise their best route for a destination. The BGP best external feature allows BGP…

    2 Comments
  • BGP Multihop.

    External BGP (eBGP) Multihop Support Connections between BGP speakers of different ASs are referred to as External BGP…

    1 Comment
  • IP Time To Live.

    Time to Live (TTL) is a computer networking term that refers to the lifespan of data on the network. TTL determines how…

  • BGP Max Prefix Limit.

    What is BGP Max Prefix Limit? Border Gateway Protocol (BGP) is essential for routing data across the internet, enabling…

    6 Comments
  • Path Hunting in BGP.

    BGP is a path vector protocol. This is similar to distance vector protocols such as RIP.

  • BGP Monitoring protocol (BMP).

    What Is BMP? BGP Monitoring Protocol (BMP) is a protocol used for monitoring BGP sessions. Prior to BMP, network…

    5 Comments
  • BGP Slow Peer.

    Update Group A router implementing an Exterior Gateway Protocol (EGP) such as Border Gateway Protocol (BGP), typically…

    5 Comments
  • BGP Add-Path: Enhancing Path Visibility in Networks

    BGP routers only advertise the best path to their neighbors. When a better path is found, it replaces the current path.

    7 Comments
  • BGP Multipath.

    What is BGP multipath By default, BGP does not perform load balancing. BGP will select only a single path for a prefix.

    4 Comments

Insights from the community

Others also viewed

Explore topics