Edit

Share via


Azure Sandbox

Azure Sandbox is a Terraform-based project designed to simplify the deployment of sandbox environments in Azure. It provides a modular and reusable framework for implementing foundational infrastructure, which can accelerate the development of innovative new solutions in Azure.

The Azure Sandbox is composed of modular components that you can deploy individually or together, depending on your needs. Because a fully provisioned environment might be costly, you can manage expenses by stopping or deallocating virtual machines (VMs) when they're not in use or by deploying only the following modules that are essential for your scenario. Costs vary depending on your Azure subscription type and region.

Architecture

Diagram that shows the Azure Sandbox environment.

Download a Visio file of this architecture.

Components

You can deploy each of the following sandbox configurations or only the configurations that you need:

  • Active Directory Domain Services is a Windows Server VM that runs Active Directory Domain Services (AD DS). In this architecture, it provides centralized authentication, domain joining for VMs, and policy management across the sandbox environment.

  • Application virtual network is a separate virtual network that hosts application workloads and databases. In this architecture, it provides network isolation for test applications while enabling secure communication with shared services through virtual network peering.

  • Azure Bastion is a managed service that provides secure Remote Desktop Protocol (RDP) and Secure Shell (SSH) access to VMs without public IP addresses. In this architecture, it enables secure remote access to sandbox VMs directly through the Azure portal while minimizing the attack surface.

  • Azure Database for MySQL flexible server is a managed MySQL database service that supports private networking. In this architecture, it provides a database platform for testing open-source applications while demonstrating private endpoint connectivity patterns.

  • Azure Files is a fully managed file share service that you can access via Server Message Block (SMB) protocol. In this architecture, it provides shared storage for both Windows and Linux VMs while hosting scripts and configuration files.

  • Azure Firewall is a cloud-native firewall service that provides threat intelligence. In this architecture, it controls traffic between virtual networks and the internet, which enforces network segmentation and security policies across the sandbox environment.

  • Azure SQL Database is a fully managed relational database service. In this architecture, it demonstrates modern cloud-native database patterns and is accessed via private endpoints to simulate secure enterprise architectures.

  • Azure Virtual WAN is a networking service that provides secure remote connectivity. In this architecture, it provides point-to-site VPN access for developers and administrators who need full network connectivity to sandbox resources from remote locations.

  • Linux jump box is a domain-joined Linux VM that's preloaded with DevOps tools, including Azure CLI, PowerShell, and Terraform. In this architecture, it serves as a DevOps automation platform and demonstrates cross-platform domain integration scenarios.

  • Shared services virtual network is a dedicated virtual network that hosts centralized infrastructure services. In this architecture, it provides the network foundation for domain controllers, Domain Name System (DNS) services, and shared security services that support the entire sandbox environment.

  • SQL Server on Azure Virtual Machines is a Windows VM that runs SQL Server with full administrative control. In this architecture, it supports testing of legacy applications and custom SQL configurations that require specific database engine features.

  • Windows Server jump box is a domain-joined Windows VM that provides administrative tools, including Remote Server Administration Tools (RSAT), Azure Storage Explorer, and SQL Server Management Studio. In this architecture, it provides a secure management platform for administering sandbox resources and demonstrates traditional Windows administration patterns.

Deploy the sandbox

The Azure Sandbox environment requires the following prerequisites:

For more information about how to prepare for a sandbox deployment, see Prerequisites.

To integrate AzureSandbox with an Azure landing zone, consider the following strategies:

  • Place the sandbox subscription in the Sandboxes management group.
  • Keep the sandbox isolated from your private network.
  • Audit sandbox subscription activity.
  • Limit sandbox access, and remove access when it's no longer required.
  • Decommission sandboxes after an expiration period to control costs.
  • Create a budget on sandbox subscriptions to control costs.

For more information, see Landing zone sandbox environments.

To deploy Azure Sandbox, go to the AzureSandbox GitHub repository and begin with Get started - Interactive execution.

Use cases

A sandbox is ideal for accelerating Azure projects. After you deploy your sandbox environment, you can add services and capabilities. You can use the sandbox for various activities:

  • Self-learning
  • Hackathons
  • Testing
  • Development
  • Tabletop exercises
  • Red team/blue team simulations
  • Incident response drills

Important

Azure Sandbox isn't intended for production use. The deployment uses some best practices, but other best practices intentionally aren't used in favor of simplicity and cost.

Capabilities

Foundational prerequisites can block experimentation with specific Azure services or capabilities. A sandbox environment can accelerate your project by provisioning many of the mundane core infrastructure components. You can focus on the services or capabilities relevant to your scenario.

For example, you can use the following capabilities and configurations that the Azure Sandbox environment provides.

  • Connect to a Windows jump box VM from the internet.

    • Option 1: Internet-facing access by using a web browser and Azure Bastion

    • Option 2: Point-to-site VPN connectivity through Virtual WAN

  • Use a preconfigured AD DS local domain as a domain administrator.

    • Preconfigured integrated DNS server

    • Preconfigured integration with Azure private DNS zones

    • Preconfigured integration with Azure Private Link private endpoints

  • Use an Azure Files preconfigured file share.

  • Use a Windows jump box VM as a developer workstation.

    • Domain joined to local domain

    • Administer Active Directory and DNS with preinstalled Windows Server RSAT

    • Visual Studio Code preinstalled with Remote-SSH into a Linux jump box

    • Storage Explorer, AzCopy, and Azure Data Studio preinstalled

    • SQL Server Management Studio preinstalled

    • MySQL Workbench preinstalled

  • Use a Linux jump box VM as a DevOps agent.

    • Domain joined to local domain by using Winbind

    • Azure CLI, PowerShell, and Terraform preinstalled

    • Dynamic Common Internet File System (CIFS) mount to Azure Files preconfigured file share

  • Use a preconfigured SQL Server VM.

    • Domain joined to local domain
  • Use a preconfigured SQL database or Azure Database for MySQL flexible server through private endpoints.

Security

Security provides assurances against deliberate attacks and the misuse of your valuable data and systems. For more information, see Design review checklist for Security.

Important

Sandbox environments represent an attack surface that can be exploited. To reduce risk, consider the following security best practices.

  • Implement strong authentication in the Microsoft Entra ID tenant associated with the Azure subscriptions that you use to provision sandbox environments. Follow the recommendations in SE:05 - Recommendations for identity and access management.

    • Use multifactor authentication (MFA) for all users.

    • Use conditional access (CA) policies to restrict access to sandbox environments.

    • Use integrated Microsoft Entra authentication to authorize access to Azure platform as a service (PaaS) services like SQL Database and Azure Storage.

  • Start with a least privilege approach to authorize sandbox use.

    • Limit Owner Azure RBAC role assignments to sandbox subscription owners and users.

    • Use Microsoft Entra Privileged Identity Management (PIM) to manage privileged Azure RBAC role assignments scoped to sandbox subscriptions, such as Owner, Contributor, and User Access Administrator.

  • Maintain your data classification compliance. For example, avoid hosting personal data or other sensitive data in a sandbox environment. If you must use sensitive data, use synthetic data or de-identified data.

Also, consider the Secure Futures Initiative principles when you design and implement sandbox environments. The AzureSandbox implementation on GitHub showcases many of these principles.

Secure by design

  • Limit the use of shared secrets and use Azure Key Vault to secure them. When you have to use shared secrets, use managed identities at run time to retrieve them from Key Vault. If secrets must be persisted, ensure that they're encrypted and not stored in plain text. Never echo secrets to the console or to log files, and never check secrets into source control.

  • Set an expiration date for Key Vault secrets.

  • When you select a guest operating system for VMs, only use operating systems that are currently supported and eligible to receive security updates.

Secure by default

  • Use encryption as recommended by SE:07 - Recommendations for data encryption.

    • Ensure that cryptographic protocols and algorithms, such as TLS 1.2 or higher and SHA-256 or higher, are up-to-date.

    • Consider using host encryption or Azure Disk Encryption for encryption of data in transit. For managed disks attached to VMs, data is encrypted at rest by default.

  • Avoid the use of public IP addresses. Use Azure Bastion for secure remote access to VMs.

  • Use private endpoints to communicate with Azure services.

  • Disable public network access to Azure services like Key Vault, Azure Storage, and SQL Database.

  • Disable default outbound access and use Azure Firewall threat intelligence-based filtering.

Secure operations

Contributors

Microsoft maintains this article. The following contributors wrote this article.

Principal author:

To see nonpublic LinkedIn profiles, sign in to LinkedIn.

Next steps