As organizations continue to adopt the cloud and manage a hybrid cloud environment, it’s important to recognize how securing your Microsoft Azure cloud environment is different than securing your data center, and then learning the steps you need to take to secure your infrastructure.
To begin, you must first work closely with Microsoft to understand their shared responsibility model and know that ultimately, any applications, configurations, and role-based access control are your responsibility. From there, you must be proactive in securing your Azure cloud environment. The best way to do this is with automated security policies, which can monitor for potential threats and flag them before they become catastrophic.
In addition to working with the cloud provider, there are third-party organizations that are committed to providing standards and best practices for securing your environment. The Center for Internet Security (CIS), for example, publishes Benchmarks that are recognized as the industry standard for safeguarding your cloud environment.
In order to help our customers establish a secure baseline configuration for Azure, we’ve implemented the CIS Microsoft Azure Foundations Benchmark into the CloudHealth platform. The CloudHealth platform now has a default policy comprised of controls that provide insight into your infrastructure and can help you execute on your cloud security plan.
Within the CloudHealth CIS Azure Foundations Violation Report (shown below), you can see security alerts ranked according to severity and gain deeper insight into the state of the violation, including affected resources and recommended remediation steps. You can also customize the controls and severity alerts based on your organization’s best practices.
With CloudHealth, not only can you validate your adherence to important cloud security recommendations for Azure, but you can also validate for AWS as well.
Whether you have a hybrid cloud, public cloud, or multicloud environment, read this eBook to learn about the three core recommendations for cloud security based on CIS benchmarks.