Core Azure Security Services and Tools
Azure offers a comprehensive security suite protecting cloud infrastructure across multiple layers. These services work together to create a strong defense-in-depth strategy.
Azure Defender and Security Center
Azure Defender is a unified security management platform that detects and responds to threats. It covers virtual machines, databases, containers, and IoT devices across Azure, on-premises systems, and multi-cloud environments.
Azure Security Center serves as your central hub for security management. It provides vulnerability assessments, compliance monitoring, and actionable recommendations for improving your security posture.
Key Security Services
Azure provides specialized tools for different security needs:
- Azure Key Vault manages cryptographic keys and secrets centrally
- Azure Firewall provides network-level protection with threat intelligence
- Azure DDoS Protection defends against distributed denial-of-service attacks
- Network Security Groups (NSGs) act as virtual firewalls controlling traffic
Defense-in-Depth Strategy
Each service addresses specific security domains: perimeter security, application security, data protection, and threat detection. Understanding how they integrate creates comprehensive protection.
For the AZ-900 exam, focus on what each service does and when to use it. Deep technical implementation details are less important than understanding overall security contributions.
Identity and Access Management in Azure
Strong identity management is the foundation of cloud security. Azure provides multiple tools to verify who users are and what they can access.
Azure Active Directory (Azure AD)
Azure AD is the foundational identity service managing user access and authentication. It enables single sign-on (SSO), allowing users to access multiple applications with one set of credentials.
Azure AD connects users to applications securely and enables organizations to manage access from any location or device.
Role-Based Access Control (RBAC)
RBAC is the authorization mechanism determining what authenticated users can do. It uses three key components:
- Security principals (users, groups, service principals) request access
- Role definitions (collections of permissions) specify what actions are allowed
- Scope (subscription, resource group, or resource) determines where permissions apply
Azure implements the principle of least privilege, granting users only minimum necessary permissions.
Authentication vs. Authorization
Authentication verifies who you are. Authorization determines what you can access. Multi-Factor Authentication (MFA) adds security layers beyond passwords. Conditional Access policies enforce requirements based on location, device health, or risk assessment.
These concepts form the backbone of secure identity management in Azure environments.
Data Protection and Encryption Strategies
Data protection operates across three states: at rest (stored), in transit (moving between systems), and in use (being processed). Azure encrypts data automatically in most services.
Encryption at Rest
Azure Storage Service Encryption automatically encrypts data using 256-bit AES encryption before writing to disk. Transparent Data Encryption (TDE) for Azure SQL Database encrypts database files without requiring code changes.
Azure Disk Encryption uses BitLocker technology to encrypt virtual machine disks. This protects data if disks are stolen or unauthorized access is attempted.
Encryption in Transit
Azure uses industry-standard TLS/SSL protocols to encrypt communication between clients and services. Data moving between Azure services is also encrypted automatically.
Key Management
Azure Key Vault centralizes encryption key and secret management. It supports:
- Automatic key rotation policies
- Access logging for audit trails
- Hardware security module (HSM) support for premium protection
Additional Protection
Data Loss Prevention (DLP) policies identify and protect sensitive information like credit card numbers or personally identifiable information. Azure provides built-in compliance with HIPAA, GDPR, and SOC 2 through encryption and access controls.
Study the layered approach to data protection. Encryption is automatic in many services, reducing your implementation burden.
Network Security and Perimeter Defense
Network security involves multiple protection layers working together to create a secure perimeter around cloud resources. These tools prevent unauthorized traffic from entering your infrastructure.
Azure Firewall
Azure Firewall is a managed, cloud-native firewall protecting Azure Virtual Network resources. It supports both Layer 3-4 and Layer 7 filtering, allowing organizations to allow or deny traffic based on:
- IP protocols and ports
- Fully qualified domain names (FQDNs)
- Application-layer protocols
Network Security Groups (NSGs)
NSGs function as distributed firewalls at the network and subnet level. They use inbound and outbound security rules to filter traffic granularly. NSGs provide lightweight protection close to resources.
Additional Network Defenses
Virtual Network (VNet) segmentation divides network resources into logical subnets. This limits lateral movement if a breach occurs and implements zero-trust security principles.
DDoS Protection Standard provides automated attack detection and mitigation against distributed denial-of-service attacks. Azure Web Application Firewall (WAF) protects web applications from attacks like SQL injection and cross-site scripting.
VPN Gateway creates encrypted connections between on-premises networks and Azure. ExpressRoute provides dedicated private connections with more consistent performance.
For AZ-900, understand how Network Security Groups and Azure Firewall work together. Recognize that network security is one layer of comprehensive Azure security architecture.
Compliance, Governance, and Monitoring
Organizations must meet regulatory requirements while maintaining consistent security policies across cloud environments. Azure provides frameworks and tools supporting compliance and governance.
Policy Enforcement
Azure Policy allows administrators to create rules enforcing organizational standards. Examples include requiring encryption on storage accounts or restricting resource locations to specific regions.
Policies can automatically remediate non-compliant resources or prevent non-compliant deployments entirely.
Standards and Assessments
Azure Blueprints enable organizations to define repeatable sets of Azure resources that comply with standards. This accelerates deployment of secure, compliant environments.
Azure Compliance Manager (now part of Microsoft 365) provides assessments against global regulations:
- HIPAA (healthcare)
- GDPR (data privacy)
- ISO 27001 (information security)
- FedRAMP (government compliance)
Monitoring and Response
Azure Monitor collects telemetry from Azure resources and sends it to Log Analytics. This enables detailed analysis of security events and system performance.
Azure Sentinel is a Security Information and Event Management (SIEM) solution that correlates security events across the enterprise. It detects threats through machine learning and orchestrates automated responses.
Resource Manager Activity Logs track all administrative activities, creating audit trails essential for compliance verification.
Shared Responsibility
The shared responsibility model means Azure secures the infrastructure while customers secure their data, configurations, and access controls. Understanding compliance requirements and knowing which Azure services support them is crucial for AZ-900 success.
