Monthly Archives: June 2017

Transparency Hub for Azure

Microsoft provides a number of disclosures to help stakeholders evaluate how we are meeting our commitments to corporate social responsibility. The Transparency Hub lets you download complete reports in areas like: Digital trust reports, Environmental sustainability, and Responsible sourcing. You can also select … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Where Your Data is Stored for Azure

Customers need to know the location of their data, which is held in Microsoft datacenters around the globe. These locations may differ depending on the Microsoft Online service in question. Microsoft Azure, for example, is generally available in 30 regions and for most … Continue reading

Posted in Azure Security and Compliance | Leave a comment

What is the Azure Key Vault?

Azure Key Vault is a cloud-based key management service that enables you to manage cryptographic keys and secrets in Microsoft Azure. You can use the keys and secrets for your cloud-based applications and services, including Azure virtual machines. The Key Vault can … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Azure Key Vault Use Cases

At a high level, there are several main reasons to use Key Vault. Use Case Scenario Use hardware security modules (HSMs) The Chief Information Security Officer (CISO) or somebody handling similar job duties, mandates that the company achieve a certain … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Azure Access Control

When you create a key vault in an Azure subscription, it is automatically associated with the subscription’s Azure Active Directory tenant. All callers (users and applications) must be registered in this tenant to access this key vault. Additionally, you can use … Continue reading

Posted in Azure Security and Compliance | Leave a comment

OMS security and compliance

The OMS security and compliance features help you identify, assess, and mitigate security risks in your infrastructure. These features are implemented through multiple solutions in Log Analytics that analyze log data and the configuration of agents’ systems to assist you … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Remediating Alerts for Azure Security Center

Now that you know what security alerts are and how to view, filter, and dismiss them, let’s learn how to respond to them. Select a security alert to learn more about the event(s) that triggered the alert and what, if … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Reviewing Alerts for Azure Security Center

In the Azure portal, on the Overview page for Security Center, you can see an “at-a-glance” view of your environment. The Detection area of the overview page shows you a graph of your current alerts, colored by the severity level … Continue reading

Posted in Azure Security and Compliance | Leave a comment

Alert Types for Azure Security Center

Azure Security Center provides a variety of alerts that align with the stages of the cyber kill chain. The kill chain consists of three phases: Target & Attack, Install & Exploit, and Post Breach. Different types of attacks are associated with … Continue reading

Posted in Azure Security and Compliance | Leave a comment

IP Addresses for Azure

You can assign IP addresses to Azure resources to communicate with other Azure resources, your on-premises network, and the Internet. There are two types of IP addresses you can use in Azure: Public IP addresses: Used for communication with the … Continue reading

Posted in Azure Virtual Network | Leave a comment