Azure Zero trust Storage, VMs and Network best practices

Azure best practices Security and Compliance

Zero Trust involves applying multiple disciplines of security and information protection together. , this multi-discipline approach is applied to each of the units of work for infrastructure components as follows:

Apply Zero Trust principles to Azure storage

  1. Protect data in all three modes: data at rest, data in transit, and data in use
  2. Verify users and control access to storage data with the least privileges
  3. Logically separate or segregate critical data with network controls
  4. Use Defender for Storage for automated threat detection and protection

Apply Zero Trust principles to virtual machines in Azure

  1. Configure logical isolation for virtual machines
  2. Leverage Role Based Access Control (RBAC)
  3. Secure virtual machine boot components
  4. Enable customer-managed keys and double encryption
  5. Control the applications installed on virtual machines
  6. Configure secure access
  7. Set up secure maintenance of virtual machines
  8. Enable advanced threat detection and protection

Apply Zero Trust principles to a spoke VNet in Azure

  1. Leverage Microsoft Entra RBAC or set up custom roles for networking resources
  2. Isolate infrastructure into its own resource group
  3. Create a network security group for each subnet
  4. Create an application security group for each virtual machine role
  5. Secure traffic and resources within the VNet
  6. Secure access to the VNet and application
  7. Enable advanced threat detection and protection

Apply Zero Trust principles to a hub VNet in Azure

  1. Secure Azure Firewall Premium
  2. Deploy Azure DDoS Protection Standard
  3. Configure network gateway routing to the firewall
  4. Configure threat protection

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Verified by MonsterInsights