Azure security best practices
This article describes recommended security best practices, which are based on lessons learned by customers and from experience in our own environments.
For a video presentation, see best practices for Azure security.
1. People: Educate teams about the cloud security journey
The team needs to understand the journey they're on.
Educate your security and IT teams about the cloud security journey and the changes they'll be navigating, including:
- Threats in the cloud
- The shared-responsibility model and how it impacts security
- Changes to culture and to roles and responsibilities that typically come with cloud adoption
Cloud security requires a shift in mindset and approach. While the outcomes that security provides to the organization don't change, the best way to accomplish these outcomes in the cloud can change significantly.
The transition to the cloud is similar to moving from a standalone house to a high-rise apartment building. You still have basic infrastructure, like plumbing and electricity, and do similar activities, such as socializing, cooking, TV and internet, and so on. However, there's often quite a difference in what comes with the building, who provides and maintains it, and your daily routine.
Everyone in the security and IT organization with any security responsibility, from the CIO or CISO to technical practitioners, must be familiar with the changes.
Provide teams with the context required to successfully deploy and operate during the transition to the cloud environment.
Microsoft has published the following lessons that customers and IT organization have learned on their journeys to the cloud.
- How security roles and responsibilities are evolving in the security organization.
- Evolution of threat environment, roles, and digital strategies.
- Transformation of security, strategies, tools, and threats.
- Learnings from Microsoft's experience in securing hyperscale cloud environment.
For more information, see the Azure Security Benchmark roles, responsibilities, and accountabilities.
2. People: Educate teams on cloud security technology
People need to understand where they're going.
Ensure your teams have time set aside for technical education on securing cloud resources, including:
- Cloud technology and cloud security technology
- Recommended configurations and best practices
- Where to learn more technical details
Technical teams need access to technical information to make informed security decisions. Technical teams are good at learning new technologies on the job, but the volume of details in the cloud often overwhelms their ability to fit learning into their daily routine.
Set aside dedicated time for technical learning. Learning helps ensure that people have time to build confidence in their ability to assess cloud security. It helps them think through how to adapt their existing skills and processes.
All security and IT roles that directly interact with cloud technology must dedicate time for technical learning on cloud platforms and how to secure them.
Security, IT technical managers, and project managers can develop familiarity with some technical details for securing cloud resources. This familiarity helps them more effectively lead and coordinate cloud initiatives.
Ensure that technical security professionals have time set aside for self-paced training on how to secure cloud assets. While not always feasible, provide access to formal training with an experienced instructor and hands-on labs.
Identity protocols are critical for access control in the cloud, but often not prioritized in on-premises security. Security teams must focus on developing familiarity with these protocols and logs.
Microsoft provides extensive resources to help technical professionals ramp up their capabilities. These resources include:
- Azure security
- Azure compliance
- Identity protocols and security
3. Process: Assign accountability for cloud security decisions
Security decisions won't get made if nobody is accountable for making them.
Choose who is responsible for making each type of security decision for the enterprise Azure environment.
Clear ownership of security decisions speeds up cloud adoption and increases security. Lack of ownership typically creates friction because nobody feels empowered to make decisions. Nobody knows who to ask for a decision and nobody is incentivized to research a well-informed decision. Friction frequently impedes:
- Business goals
- Developer timelines
- IT goals
- Security assurances
The friction can result in:
- Stalled projects that are waiting for security approval
- Insecure deployments that couldn't wait for security approval
Security leadership chooses which teams or individuals are accountable for making security decisions about the cloud.
Choose groups or individuals to be responsible for making key security decisions.
Document these owners, their contact information, and socialize the information widely within the security, IT, and cloud teams. Socialization ensures that it's easy for all roles to contact them.
These areas are typically where security decisions are needed. The following table shows the decision category, category description, and which teams often make the decisions.
|Network security||Configure and maintain Azure Firewall, network virtual appliances and associated routing, Web Application Firewalls (WAFs), NSGs, ASGs, and so on.||Infrastructure and endpoint security team focused on network security|
|Network management||Manage enterprise-wide virtual network and subnet allocation.||Existing network operations team in central IT operations|
|Server endpoint security||Monitor and remediate server security, including patching, configuration, endpoint security, and so on.||Central IT operations and infrastructure and endpoint security teams jointly|
|Incident monitoring and response||Investigate and remediate security incidents in SIEM or source console, including Microsoft Defender for Cloud, Azure AD identity protection, and so on.||Security operations team|
|Policy management||Set direction for use of Azure role-based access control (Azure RBAC), Defender for Cloud, administrator protection strategy, and Azure Policy to govern Azure resources.||Policy and standards and security architecture teams jointly|
|Identity security and standards||Set direction for Azure AD directories, PIM/pam usage, multi-factor authentication, password/synchronization configuration, application identity standards.||Identity and key management, policy and standards, and security architecture teams jointly|
- Ensure decision makers have the appropriate education in their area of the cloud to accompany this responsibility.
- Ensure decisions are documented in policy and standards to provide a record and guide the organization over the long term.
4. Process: Update incident response processes for cloud
Plan ahead. You don't have time to plan for a crisis during a crisis.
Prepare for security incidents on your Azure cloud platform. This preparation includes any native threat detection tools you've adopted. Update processes, prepare your team, and practice with simulated attacks so they can work at their best during incident investigation, remediation, and threat hunting.
Active attackers present an immediate risk to the organization. The situation can quickly become difficult to control. Respond quickly and effectively to attacks. This incident response (IR) process must be effective for your entire estate, including all cloud platforms hosting enterprise data, systems, and accounts.
While similar in many ways, cloud platforms are different technically from on-premises systems. On-premises systems can break existing processes, typically because information is available in a different form. Security analysts might have challenges rapidly responding to an unfamiliar environment that can slow them down. This statement is especially true if they're trained only on classic on-premises architectures and network/disk forensics approaches.
IR process modernization is typically led by security operations. The effort often comes with support from other groups for knowledge and expertise.
Sponsorship: The security operations director or equivalent typically sponsor process modernization.
Execution: Adapting existing processes, or writing them for the first time, is a collaborative effort involving:
- Security operations: The incident management team or leadership leads process and integration updates to key external stakeholders. These teams include legal and communications or public relations teams.
- Security operations: Security analysts provide expertise on technical incident investigation and triage.
- Central IT operations: This team provides expertise on cloud platform directly, via cloud center of excellence, or via external consultants.
Update processes and prepare your team so they know what to do when they find an active attacker.
- Processes and playbooks: Adapt existing investigations, remediation, and threat hunting processes to the differences of how cloud platforms work. The differences include new or different tools, data sources, identity protocols, and so on.
- Education: Educate analysts on the overall cloud transformation, technical details of how the platform works, and new or updated processes. This information lets them know what might change and where to go for what they need.
- Key focus areas: While there are many details described in the resource links, these areas are where to focus your education and planning efforts:
- Shared responsibility model and cloud architectures: To a security analyst, Azure is a software-defined datacenter that provides many services. These services include VMs and others that are different from on-premises, such as Azure SQL Database Azure Functions. The best data is in the service logs or the specialized threat detection services. It's not in logs for the underlying OS/VMs, which are operated by Microsoft and service multiple customers. Analysts need to understand and integrate this context into their daily workflows. That way they know what data to expect, where to get it, and what format it's in.
- Endpoint data sources: Getting insights and data for attacks and malware on cloud-hosted servers is often faster, easier, and more precise with native cloud-detection tools. Tools like Microsoft Defender for Cloud and endpoint detection and response (EDR) solutions provide more precise data than traditional approaches of direct disk access. Direct disk forensics are available for scenarios where it's possible and required for legal proceedings. For more information, see computer forensics in Azure. Often, though, this approach is the most inefficient way to detect and investigate attacks.
- Network and identity data sources: Many functions of cloud platforms primarily use identity for access control. This access control includes access to the Azure portal, though network access controls are used extensively as well. This access control requires analysts to develop an understanding of cloud identity protocols to get a full, rich picture of attacker activity and legitimate user activity to support incident investigation and remediation. Identity directories and protocols are different from on-premises ones. They're typically based on SAML, OAuth, and OpenID Connect and cloud directories rather than LDAP, Kerberos, NTLM, and Active Directory.
- Practice exercises: Simulated attack and response can help build organizational muscle memory and technical readiness. They provide preparation for your security analysts, threat hunters, incident managers, and other stakeholders in your organization. Learning on the job and adapting is a natural part of incident response, but you can work to minimize how much you have to learn in a crisis.
- Incident response reference guide
- Guidance on building your own security incident response process
- Azure logging and alerting
- Microsoft security best practices
- Microsoft learnings from Cyber Defense Operations Center (CDOC)
For more information, see the Azure Security Benchmark incident response process for Azure.
5. Process: Establish security posture management
First, know thyself.
Ensure that you're actively managing the security posture of your Azure environment by:
- Assigning clear ownership of responsibilities to:
- Monitor security posture
- Mitigate risks to assets
- Automating and simplifying these tasks
Rapidly identifying and remediating common security hygiene risks significantly reduces organizational risk.
The software-defined nature of cloud datacenters enables continuous monitoring of security risks, such as software vulnerabilities or security misconfigurations, with extensive asset instrumentation. The speed at which developers and IT team can deploy VMs, databases, and other resources creates a need to ensure resources are configured securely and actively monitored.
These new capabilities offer new possibilities, but realizing value from them requires assigning responsibility for using them. Executing consistently with rapidly evolving cloud operations requires keeping human processes as simple and automated as possible. See the "drive simplicity" security principle.
The goal of simplification and automation isn't about getting rid of jobs, but about removing the burden of repetitive tasks from people so they can focus on higher value human activities like engaging with and educating IT and DevOps teams.
This practice is typically divided into two sets of responsibilities:
Security posture management: This function is often an evolution of existing vulnerability management or governance functions. The result includes monitoring overall security posture using Microsoft Defender for Cloud secure score and other data sources. It includes actively working with resource owners to mitigate risks and reporting risk to security leadership.
Security remediation: Assign accountability for addressing these risks to the teams responsible for managing those resources. This accountability belongs to either the DevOps teams managing their own application resources or the technology-specific teams in central IT operations:
- Compute and application resources
- App services: Application development and security teams
- Containers: Application development or infrastructure/IT operations
- VMs, scale sets, compute: IT/infrastructure operations
- Data and storage resources
- SQL, Redis, Data Lake Analytics, data lake store: Database team
- Storage accounts: Storage and infrastructure team
- Identity and access resources
- Subscriptions: Identity teams
- Key vault: Identity or information/data security team
- Networking resources: Network security team
- IoT security: IoT operations team
- Compute and application resources
Security is everyone's job. Not everyone, though, knows how important it is, what to do, and how to do it.
- Hold resource owners accountable for the security risk just as they're held accountable for availability, performance, cost, and other success factors.
- Support resource owners with a clear understanding of why security risk matters to their assets, what they can do to mitigate risk, and how to implement it with minimal productivity loss.
The explanations for why, what, and how to secure resources are often similar across different resource types and applications, but it's critical to relate these to what each team already knows and cares about. Security teams can engage with their IT and DevOps counterparts as a trusted advisor and partner focused on enabling these teams to be successful.
Tooling: Secure score in Microsoft Defender for Cloud provides an assessment of the most important security information in Azure for a wide variety of assets. This assessment can be your starting point on posture management and can be supplemented with custom Azure policies and other mechanisms as needed.
Frequency: Set up a regular cadence, typically monthly, to review Azure secure score and plan initiatives with specific improvement goals. The frequency can be increased as needed.
Gamify the activity if possible to increase engagement, such as creating fun competitions and prizes for the DevOps teams that improve their score the most.
For more information, see the Azure Security Benchmark security posture management strategy.
6. Technology: Require passwordless or multifactor authentication
Are you willing to bet the security of your enterprise that professional attackers can't guess or steal your administrator's password?
Require all critical-impact admins to use passwordless or multi-factor authentication.
Just as antique skeleton keys won't protect a house against a modern day burglar, passwords can't protect accounts against common attacks. For technical details, see Your pa$$word doesn't matter.
Multifactor authentication was once a burdensome extra step. Passwordless approaches today improve how users sign in using biometric approaches like facial recognition in Windows Hello and mobile devices. Additionally, zero trust approaches remember trusted devices. This method reduces prompting for annoying out-of-band multifactor authentication actions. For more information, see user sign-in frequency.
- Sponsorship: The CISO, CIO, or director of identity typically sponsor this work.
- Execution: Execution is a collaborative effort involving:
Implement passwordless or multifactor authentication. Train administrators on how to use it as they need it, and require admins to follow by using written policy. Use one or more of these technologies:
- Passwordless Windows Hello
- Passwordless authenticator app
- Azure AD multi-factor authentication
- Third-party multifactor authentication solution
Text message-based multifactor authentication is now relatively inexpensive for attackers to bypass, so focus on passwordless and stronger multifactor authentication.
For more information, see the Azure Security Benchmark strong authentication controls for all Azure AD-based access.
7. Technology: Integrate native firewall and network security
Simplify protection of systems and data against network attacks.
Simplify your network security strategy and maintenance by integrating Azure Firewall, Azure web app firewall (WAF), and distributed denial of service (DDoS) mitigations into your network security approach.
Simplicity is critical to security as it reduces likelihood of risk from confusion, misconfigurations, and other human errors. See the "drive simplicity" security principle.
Firewalls and WAFs are important basic security controls to protect applications from malicious traffic, but their setup and maintenance can be complex and consume a significant amount of the security team's time and attention (similar to adding custom aftermarket parts to a car). Azure's native capabilities can simplify implementation and operation of firewalls, web application firewalls, distributed denial of service (DDoS) mitigations, and more.
This practice can free up your team's time and attention for higher value security tasks like:
- Evaluating the security of Azure services
- Automating security operations
- Integrating security with applications and IT solutions
- Sponsorship: Security leadership or IT leadership typically sponsors the network security strategy update.
- Execution: Integrating strategies into your cloud network security strategy is a collaborative effort involving:
- Security architecture: Establish cloud network security architecture with cloud network and cloud network security leads.
- Cloud network leads central IT operations and Cloud Network security leads infrastructure security team
- Establish cloud network security architecture with security architects.
- Configure firewall, NSG, and WAF capabilities and work with application architects on WAF rules.
- Application architects: Work with network security to build and refine WAF rule sets and DDoS configurations to protect the application without disrupting availability
Organizations that want to simplify their operations have two options:
- Extend existing capabilities and architectures: Many organizations often choose to extend the use of existing firewall capabilities so they can capitalize on existing investments into skills and process integration, particularly as they first adopt the cloud.
- Embrace native security controls: More organizations are starting to prefer using native controls to avoid the complexity of integrating third-party capabilities. These organizations typically seek to avoid the risk of a misconfiguration in load balancing, user-defined routes, the firewall or WAF itself, and delays in handoffs between different technical teams. This option is compelling to organizations embracing infrastructure as code approaches as they can automate and instrument the built-in capabilities more easily than third-party capabilities.
Documentation on Azure native network security capabilities can be found at:
Azure Marketplace includes many third-party firewall providers.
8. Technology: Integrate native threat detection
Simplify detection and response of attacks against Azure systems and data.
Simplify your threat detection and response strategy by incorporating native threat detection capabilities into your security operations and SIEM.
The purpose of security operations is to reduce the impact of active attackers who get access to the environment. The impact is measured by mean time to acknowledge (MTTA) and remediate (MTTR) incidents. This practice requires both accuracy and speed in all elements of incident response. The result helps ensure the quality of tools and the efficiency of process execution are paramount.
It's difficult to get high threat detections using existing tools and approaches. The tools and approaches are designed for on-premises threat detection because of differences in cloud technology and its rapid pace of change. Natively integrated detections provide industrial scale solutions maintained by cloud providers that can keep up with current threats and cloud platform changes.
These native solutions enable security operations teams to focus on incident investigation and remediation. Focus on those items rather than wasting time by creating alerts from unfamiliar log data, integrating tools, and maintenance tasks.
Typically driven by the security operations team.
- Sponsorship: This work is typically sponsored by the security operations director or equivalent role.
- Execution: Integrating native threat detection is a collaborative effort involving those solutions with:
- Security operations: Integrate alerts into SIEM and incident investigation processes. Security operations can educate analysts on cloud alerts and what they mean, and how to use the native cloud tools.
- Incident preparation: Integrate cloud incidents into practice exercises and ensure practice exercises are conducted to drive team readiness.
- Threat intelligence: Research and integrate information on cloud attacks to inform teams with context and intelligence.
- Security architecture: Integrate native tooling into security architecture documentation.
- Policy and standards: Set standards and policy for enabling native tooling throughout the organization. Monitor for compliance.
- Infrastructure and endpoint and Central IT Operations: Configure and enable detections, integrate into automation and infrastructure as code solutions.
Enable threat detection in Microsoft Defender for Cloud for all the resources you're using and have each team integrate these resources into their processes as described above.
For more information, see the Azure Security Benchmark threat detection for Azure resources.
9. Architecture: Standardize on a single directory and identity
Nobody wants to deal with multiple identities and directories.
Standardize on a single Azure AD directory. You can standardize a single identity for each application and user in Azure.
This best practice refers specifically to enterprise resources. For partner accounts, use Azure AD B2B so you don't have to create and maintain accounts in your directory. For customer or citizen accounts, use Azure AD B2C to manage them.
Multiple accounts and identity directories create unnecessary friction, which creates confusion in daily workflows for:
- Productivity users
- IT and identity admins
- Security analysts
- Other roles
Managing multiple accounts and directories creates an incentive for poor security practices. These practices include things like password reuse across accounts. It increases the likelihood of stale or abandoned accounts that attackers can target.
While it sometimes seems easier to quickly stand up a custom LDAP directory for a particular application or workload, this action creates much more work to integrate and manage. This work is similar to choosing to set up an additional Azure tenant or on-premises Active Directory forest rather than using the existing enterprise tenant. For more information, see the security principle of driving simplicity.
- Sponsorship: Identity and key management and security architecture typically sponsor this work, though some organizations might require sponsorship by CISO or CIO.
- Execution: Execution is a collaborative effort involving:
- Security architecture: This team incorporates the process into security and IT architecture documents and diagrams.
- Policy and standards: This team documents policy and monitors for compliance.
- Identity and key management or central IT operations: These teams implement the policy by enabling features and supporting developers with accounts, education, and so on.
- Application developers or central IT operations: These teams use identity in applications and Azure service configurations. Responsibilities vary based on level of DevOps adoption.
Adopt a pragmatic approach that starts with new greenfield capabilities. Then, clean up challenges with the brownfield of existing applications and services as a follow-up exercise:
Greenfield: Establish and implement a clear policy that all enterprise identity can use a single Azure AD directory with a single account for each user.
Brownfield: Many organizations often have multiple legacy directories and identity systems. Address these legacy items when the cost of ongoing management friction exceeds the investment to clean it up. While identity management and synchronization solutions can mitigate some of these issues, they lack deep integration of security and productivity features. These features enable a seamless experience for users, admins, and developers.
The ideal time to combine your use of identity is during application development cycles as you:
- Modernize applications for the cloud.
- Update cloud applications with DevOps processes.
While there are valid reasons for a separate directory for independent business units or regulatory requirements, avoid multiple directories in all other circumstances.
For more information, see the Azure Security Benchmark Azure AD central identity and authentication system.
The only exception to the single accounts rule is that privileged users, including IT administrators and security analysts, can have separate accounts for standard user tasks compared to administrative tasks.
For more information, see Azure Security Benchmark privileged access.
10. Architecture: Use identity-based access control instead of keys
Use Azure AD identities instead of key-based authentication wherever possible. For example, Azure services, applications, APIs.
Key-based authentication can be used to authenticate to cloud services and APIs. But it requires managing keys securely, which is challenging to do well, especially at scale. Secure key management is difficult for non-security professionals like developers and infrastructure professionals and they often fail to do it securely, often creating major security risks for the organization.
Identity-based authentication overcomes many of these challenges with mature capabilities. The capabilities include secret rotation, lifecycle management, administrative delegation, and more.
- Sponsorship: This effort is typically sponsored by security architecture or identity and key management though some organizations might require sponsorship by CISO or CIO.
- Execution: A collaborative effort involving:
- Security architecture: This team incorporates best practices into security and IT architecture diagrams and documents.
- Policy and standards: This team documents policy and monitors for compliance.
- Identity and key management or central IT operations: These teams implement the policy by enabling features and supporting developers with accounts, education, and so on.
- App developers or central IT operations: Use identity in applications and Azure service configurations. Responsibilities vary based on the level of DevOps adoption.
Setting an organizational preference and habit for using identity-based authentication requires following a process and enabling technology.
- Establish policy and standards that clearly outline the default identity-based authentication, and acceptable exceptions.
- Educate developers and infrastructure teams on why to use the new approach, what they need to do, and how to do it.
- Implement changes in a pragmatic way by starting with new greenfield capabilities being adopted now and in the future, such as new Azure services and new applications, and then following up with a clean-up of existing brownfield configurations.
- Monitor for compliance and follow up with developer and infrastructure teams to remediate.
For non-human accounts such as services or automation, use managed identities. Azure managed identities can authenticate to Azure services and resources that support Azure AD authentication. Authentication is enabled through predefined access grant rules, avoiding hard-coded credentials in source code or configuration files.
For services that don't support managed identities, use Azure AD to create a service principal with restricted permissions at the resource level instead. You should configure service principals with certificate credentials and fallback to client secrets. In both cases, Azure Key Vault can be used with Azure managed identities, so that the runtime environment, such as an Azure function, can retrieve the credential from the key vault.
For more information, see the Azure Security Benchmark application identities.
11. Architecture: Establish a single unified security strategy
Everyone needs to row in the same direction for the boat to go forward.
Ensure all teams are aligned to a single strategy that both allows and secures enterprise systems and data.
When teams work in isolation without being aligned to a common strategy, their individual actions can inadvertently weaken each other's efforts. The misalignment can create unnecessary friction that slows down progress against everyone's goals.
One example of teams working in isolation that has played out consistently in many organizations is the segmentation of assets:
- Network security: Develops a strategy for segmenting a flat network. The strategy increases security, often based on physical sites, assigned IP address addresses/ranges, or similar items.
- Identity team: Develops a strategy for groups and Active Directory organizational units (OUs) based on their understanding and knowledge of the organization.
- Application teams: Find it difficult to work with these systems. It's difficult because they were designed with limited input and understanding of business operations, goals, and risks.
In organizations where this limitation happens, teams frequently experience conflicts over firewall exceptions. The conflicts can negatively impact security because teams approve exceptions. Productivity negatively impacts security because deployments slowdown for application functionality the business needs.
While security can create healthy friction by forcing critical thinking, this conflict only creates unhealthy friction that impedes goals. For more information, see security strategy guidance.
- Sponsorship: The unified strategy is typically cosponsored by the CIO, CISO, and CTO. The sponsorship often comes with business leadership support for some high-level elements and is championed by representatives from each team.
- Execution: The security strategy must be implemented by everyone. It integrates data from various teams to increase ownership, buy-in, and likelihood of success.
- Security architecture: This team leads the effort to build security strategy and resulting architecture. Security architecture actively gathers feedback from teams and documents it in presentations, documents, and diagrams for the various audiences.
- Policy and standards: This team captures the appropriate elements into standards and policy and then monitors for compliance.
- All technical IT and security teams: These teams provide input requirements, then align to and implement the enterprise strategy.
- Application owners and developers: These teams read and understand strategy documentation that applies to them. Ideally, they tailor guidance to their role.
Build and implement a security strategy for cloud that includes the input and active participation of all teams. While the process documentation format can vary, it always includes:
- Active input from teams: Strategies typically fail if people in the organization don't buy into them. Ideally, get all teams in the same room to collaboratively build the strategy. In the workshops we conduct with customers, we often find organizations have been operating in de facto silos and these meetings often result in people meeting each other for the first time. We find that inclusiveness is a requirement. If some teams aren't invited, this meeting typically has to be repeated until all participants join it. If they don't join, then the project doesn't move forward.
- Documented and communicated clearly: All teams must have awareness of the security strategy. Ideally, the security strategy is a security component of the overall technology strategy. This strategy includes why to integrate security, what is important in security, and what security success looks like. This strategy includes specific guidance for application and development teams so they can get clear, organized guidance without having to read through non-relevant information.
- Stable, but flexible: Keep strategies relatively consistent and stable, but the architectures and the documentation might need to add clarity and accommodate the dynamic nature of cloud. For example, filtering out malicious external traffic would stay consistent as a strategic imperative even if you shift from the use of a third-party next generation firewall to Azure Firewall and adjust diagrams and guidance on how to do it.
- Start with segmentation: There are strategy issues both large and small to address, but you need to start somewhere. Start the security strategy with enterprise asset segmentation. This segmentation is a foundational decision that would be challenging to change later and requires both business input and many technical teams.
The Cloud Adoption Framework includes guidance to help your teams with:
- Building a cloud strategy team: Ideally, you integrate security into an existing cloud strategy.
- Build or modernize a security strategy: Meet business and security goals in the current age of cloud services and modern threats.
For more information, see the Azure Security Benchmark governance strategy.