Azure Basics: Security Services

Azure Basics: Security Services

Protect your enterprise from advanced threats across hybrid cloud workloads

The security services in Azure provide a variety of security capabilities that can be used together or separately. Following are the main security services available in Azure:

Azure Key Vault

No alt text provided for this image



Azure Key Vault helps solve the following problems:

  • Secrets Management - Azure Key Vault can be used to Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets
  • Key Management - Azure Key Vault can also be used as a Key Management solution. Azure Key Vault makes it easy to create and control the encryption keys used to encrypt your data.
  • Certificate Management - Azure Key Vault is also a service that lets you easily enroll, manage, and deploy public and private Transport Layer Security/Secure Sockets Layer (TLS/SSL) certificates for use with Azure and your internal connected resources.

Azure Security Center

No alt text provided for this image



Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud - whether they're in Azure or not - as well as on premises.

Security Center automatically collects, analyzes, and integrates log data from your Azure resources, the network, and connected partner solutions - like firewall and endpoint protection solutions - to detect real threats and reduce false positives.

Azure Defender

No alt text provided for this image



Azure Defender provides security alerts and advanced threat protection for virtual machines, SQL databases, containers, web applications, your network, and more. Use Azure Defender, integrated with Azure Security Center, for Azure and hybrid cloud workload protection and security. With Extended Detection and Response (XDR) capabilities, stand up against threats such as remote desktop protocol (RDP) brute-force attacks, and SQL injections. Streamline security with AI and automation.

Azure Information Protection

No alt text provided for this image



Azure Information Protection (AIP) is a cloud-based solution that enables organizations to discover, classify, and protect documents and emails by applying labels to content. AIP is part of the Microsoft Information Protection (MIP) solution, and extends the labeling and classification functionality provided by Microsoft 365.

Azure Firewall

No alt text provided for this image



Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.

Azure Web Application Firewall

No alt text provided for this image



Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. Web applications are increasingly targeted by malicious attacks that exploit commonly known vulnerabilities. SQL injection and cross-site scripting are among the most common attacks.

Azure Sentinel

No alt text provided for this image



Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response.

Azure DDoS Protection

No alt text provided for this image



Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application's resources, making the application unavailable to legitimate users. DDoS attacks can be targeted at any endpoint that is publicly reachable through the internet.

Every property in Azure is protected by Azure's infrastructure DDoS (Basic) Protection at no additional cost. The scale and capacity of the globally deployed Azure network provides defense against common network-layer attacks through always-on traffic monitoring and real-time mitigation. DDoS Protection Basic requires no user configuration or application changes. DDoS Protection Basic helps protect all Azure services, including PaaS services like Azure DNS.

Azure DDoS Protection Standard, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS attacks. It is automatically tuned to help protect your specific Azure resources in a virtual network. Protection is simple to enable on any new or existing virtual network, and it requires no application or resource changes. It has several advantages over the basic service, including logging, alerting, and telemetry. 

Azure Dedicated HSM

No alt text provided for this image



hardware security module (HSM) is a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signaturesstrong authentication and other cryptographic functions

Azure Dedicated HSM is an Azure service that provides cryptographic key storage in Azure. Dedicated HSM meets the most stringent security requirements. It's the ideal solution for customers who require FIPS 140-2 Level 3-validated devices and complete and exclusive control of the HSM appliance. HSM devices are deployed globally across several Azure regions. They can be easily provisioned as a pair of devices and configured for high availability. HSM devices can also be provisioned across regions to assure against regional-level failover. Microsoft delivers the Dedicated HSM service by using the Thales Luna 7 HSM model A790 appliances. This device offers the highest levels of performance and cryptographic integration options.

To view or add a comment, sign in

More articles by Tarun Sharma

  • The Future of AI: Composable Agents Powered by APIs

    Introduction AI is no longer a one-size-fits-all model. It’s evolving into a network of specialized agents—think of…

    1 Comment
  • Azure AI Agent Service - Build, deploy, and scale AI agents

    Generative AI application development challenges Developing generative AI applications presents numerous challenges…

  • Agentic AI Frameworks

    In today’s rapidly evolving digital landscape, artificial intelligence is no longer just about automating routine…

  • Unlocking the Power of AI with Microsoft Copilot Studio

    Introduction Microsoft Copilot Studio is a tool designed to make AI accessible, allowing teams to build and deploy AI…

  • Infusing GenAI Capabilities into Existing Applications

    The artificial intelligence (AI) landscape has seen a transformative shift with the rise of Generative AI (GenAI)…

  • Fine-tuning models

    Fine-tuning models is a powerful technique in machine learning that involves adapting a pre-trained model to perform a…

    1 Comment
  • GenAI based ETL & Visualization

    In the modern data-driven landscape, organizations rely on robust data architectures to manage and analyze vast amounts…

  • The Future of AI: Hybrid Models Implementation

    As we continue to explore the vast potential of artificial intelligence (AI), one thing is becoming increasingly clear:…

    2 Comments
  • Intelligent AI Apps - LangChain

    Introduction Intelligent apps are the next evolution in app development. These are apps that leverage data and machine…

  • Build Copilots using Semantic Kernel

    An AI copilot is an artificial intelligence-powered assistant (agent) designed to help users with various tasks, often…

    1 Comment

Insights from the community

Others also viewed

Explore topics