Security considerations for the Azure Container Apps - Landing Zone Accelerator

Cloud applications often feature different layers of security to fully protect an application from attack. To decide which layers are best for your applications, review the following resources:

Resource Description
Container Apps security benchmarks The security baseline incorporates recommendations from the Microsoft cloud security benchmarks specifically for Azure Container Apps. This benchmark offers guidance on securing Azure cloud solutions, categorized by the defined security controls.
Cloud Security Benchmark The Microsoft cloud security benchmark (MCSB) offers best practices and recommendations for enhancing security on Azure and multicloud environments.
Azure Landing Zone security The Cloud Adoption Framework offers guidance on security processes and best practices. This framework collaborates with organizations such as NIST, The Open Group, and the Center for Internet Security (CIS).
Secure outbound traffic You can use user-defined routes (UDR) with Azure Firewall to restrict outbound traffic from your Container Apps to Azure back-end resources or other network assets.

Recommendations

You can configure your Container Apps environment to accept external requests, or to lock down to only internal requests.

The Landing Zone Accelerator recommendations include:

  • Create an internal environment: If you want to expose your application to the public web, you can use Azure Application Gateway or Azure Front Door for fine-grained security control.

  • Secure outbound traffic: To secure outbound traffic, you can configure a route table that instructs outgoing traffic to go through an Azure Firewall that is deployed in the Hub network.

  • Log security related activity: Use extensive use of observability tools and Log Analytics to record information on sensitive actions.

  • Security profiles: Use the Container Apps security profile as a starting point for securing your Container Apps.