Share via

Azure Migration What are the security measures we need to take during Azure Migration:

Venkata Ramana 40 Reputation points
2025-09-09T15:57:37.8666667+00:00

Hi Team,

Good day!

Need your help and suggestions!

We are planning to start on-prem VM's to Azure Migration, so Azure Migration What are the security measures we need to take during Azure Migration.

Kindly suggest me the steps to take necessary.

Regards,

Wenkat.

Azure Migrate
Azure Migrate

A central hub of Azure cloud migration services and tools to discover, assess, and migrate workloads to the cloud.

0 comments No comments

Answer accepted by question author

Marcin Policht 90,150 Reputation points MVP Volunteer Moderator
2025-09-09T16:20:37.1666667+00:00
  1. Pre-Migration (preparation & planning)
  • Discovery & Assessment Security
    • Use Azure Migrate Appliance with least-privilege accounts to collect metadata.
    • Encrypt any exported assessment data at rest and in transit.
    • Ensure the appliance has no inbound connectivity; it only communicates outbound to Azure.
  • Credentials & Access Control
    • Store migration tool credentials in Azure Key Vault, not in scripts or config files.
    • Use Just-In-Time (JIT) access and role-based access control (RBAC) for migration accounts.
    • Enforce Multi-Factor Authentication (MFA) for migration admins.
  • Baseline Security Checks
    • Patch on-prem servers before migration to reduce vulnerabilities.
    • Remove unused software/services to minimize attack surface.
    • Audit and clean up unnecessary privileged accounts.
  1. Migration (lift-and-shift process)
  • Network Security
    • Use encrypted VPN or ExpressRoute to connect on-premises to Azure; avoid unencrypted public endpoints.
    • Implement Network Security Groups (NSGs) to restrict traffic to migration appliances and destination VMs.
  • Data Protection
    • Enable disk encryption (BitLocker / Azure Disk Encryption) for migrated VHDs.
    • Use storage encryption (Azure Storage Service Encryption) when staging VMs in Azure.
    • Verify that replication traffic uses TLS 1.2 or higher.
  • Identity & Access Management
    • Use Managed Identities for automation tasks (where possible) instead of service accounts with stored credentials.
    • Ensure conditional access policies are in place if you’re synchronizing with Entra ID.
  1. Post-Migration (hardening & ongoing security)
  • Post-Migration Hardening
    • Revalidate firewall and NSG rules to follow least privilege.
    • Use Azure Bastion for secure VM access instead of exposing RDP/SSH to the internet.
    • Remove any temporary migration accounts or agents not needed post-migration.
  • Monitoring & Threat Protection
    • Enable Microsoft Defender for Cloud for workload security recommendations.
    • Turn on Azure Monitor / Log Analytics to capture logs from migrated VMs.
    • Configure security alerts and integrate with SIEM (Microsoft Sentinel, Splunk, etc.).
  • Data Security
    • Re-encrypt disks with Azure-managed or customer-managed keys (CMK).
    • Store sensitive secrets in Azure Key Vault, not in migrated config files.
    • Review compliance with frameworks (CIS, NIST, ISO) as required.
  • Identity & Compliance
    • Integrate VMs with Entra ID join or hybrid join for central control.
    • Apply Conditional Access and Privileged Identity Management (PIM) for admin accounts.
    • Review audit logs to ensure no sensitive data was exposed during migration.

If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

hth

Marcin

Was this answer helpful?

0 comments No comments

1 additional answer

Sort by: Most helpful
  1. Anurag Rohikar 3,190 Reputation points Microsoft External Staff Moderator
    2025-09-09T16:24:26.31+00:00

    Hi Venkata Ramana,

    The Marcin Policht has already provided an excellent step-by-step breakdown for securing workloads before, during, and after migration. In addition to those measures, I’d also recommend looking at long-term governance and compliance practices that will strengthen your overall security posture once your VMs are running in Azure:

    Governance & Compliance

    Azure Policy: Define and enforce guardrails (e.g., block creation of unencrypted disks, enforce tagging for ownership/cost tracking).

    Regulatory Compliance: Use Microsoft Defender for Cloud’s Regulatory Compliance Dashboard to assess against frameworks like CIS, NIST, ISO, PCI.

    Blueprints/Templates: For larger migrations, consider Azure Blueprints to consistently apply security controls across subscriptions.

    Security Posture Management

    Microsoft Defender for Cloud: Not only for workload protection, but also for Secure Score to track continuous improvement.

    Zero Trust Principles: Assume breach, verify explicitly, enforce least privilege across networks, identities, and data.

    Networking Beyond Migration

    Consider Private Link/Service Endpoints for services to avoid exposing traffic to the public internet.

    For hybrid environments, use ExpressRoute with private peering for higher security and compliance vs. public VPN.

    Identity Hardening

    Enable Privileged Identity Management (PIM) to control standing admin access.

    Apply Conditional Access Policies (geo restrictions, device compliance checks) for admins and end users.

    Operational Security

    Centralize monitoring with Microsoft Sentinel for SIEM/SOAR capabilities.

    1. Automate security checks using Azure Automation/Logic Apps for repetitive tasks (e.g., disable stale accounts, rotate keys).

    For more details, you may find these official resources helpful:

    Hope this additional context helps strengthen your migration security strategy. Thank-you!

    Was this answer helpful?

    2 people found this answer helpful.
    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.