Security is not a one-size-fits all solution, it requires a customized, multi-layered approach with continuous monitoring.
The core principles of cybersecurity are Confidentiality, Integrity, and Availability.
- Confidentiality: sensitive data is protected from unauthorized users
- Integrity: sensitive data remains accurate and complete
- Availability: sensitive data can be accessed by its intended users
Achieving these security best practices depend upon the assets and services being protected, the constraints, level of compliance, and risk tolerances of the company. As such, IT security policies can vary greatly from one environment to the next.
Securing Azure resources can be broken down into these major disciplines:
- Identity access management (IAM)
- Data security
- Endpoint security
- Network security
- Monitoring
- Compliance
- DevSecOps (CI/CD, pipeline, automation, and supply chain security)
- Kubernetes
In this article we will introduce a checklist for Azure cloud security best practices.