Azure Security Controls and Configuration Guide
Azure security controls span identity management, network segmentation, data protection, threat detection, and regulatory compliance configuration across Microsoft's cloud platform. This reference covers the structural mechanics of Azure's control architecture, how native services map to established frameworks such as NIST SP 800-53 and the CIS Microsoft Azure Foundations Benchmark, where configuration decisions create genuine security tradeoffs, and the classification boundaries that separate provider-managed from customer-managed responsibilities. Security engineers, compliance officers, and cloud architects use this reference to navigate the Azure control surface as a structured professional domain.
- Definition and scope
- Core mechanics or structure
- Causal relationships or drivers
- Classification boundaries
- Tradeoffs and tensions
- Common misconceptions
- Checklist or steps (non-advisory)
- Reference table or matrix
- References
Definition and scope
Azure security controls are the technical configurations, policy enforcement mechanisms, identity governance structures, and monitoring capabilities that collectively govern the security posture of workloads deployed in Microsoft Azure. The scope encompasses both native Azure services — Microsoft Defender for Cloud, Azure Active Providers (Azure AD / Entra ID), Azure Policy, Azure Key Vault — and the configuration standards that determine how those services are applied across subscriptions, resource groups, and individual resources.
The control surface is defined by the Azure shared responsibility model, which allocates security obligations between Microsoft and the customer depending on the service model in use. For Infrastructure as a Service (IaaS) deployments, customers retain responsibility for operating system hardening, identity configuration, network security groups, and data classification. For Software as a Service (SaaS) workloads, Microsoft manages the underlying infrastructure while customers govern identity, access, and data handling. The Center for Internet Security (CIS) publishes the CIS Microsoft Azure Foundations Benchmark, currently at version 2.0, which operationalizes these responsibilities into 400-plus discrete control recommendations organized across 9 control domains.
From a regulatory standpoint, Azure configuration choices intersect with the Federal Risk and Authorization Management Program (FedRAMP), the Health Insurance Portability and Accountability Act (HIPAA Security Rule), the Payment Card Industry Data Security Standard (PCI DSS), and state-level requirements such as the California Consumer Privacy Act (CCPA). Each regulatory regime maps its required controls onto Azure's native capabilities through published compliance blueprints accessible via Microsoft Defender for Cloud's regulatory compliance dashboard.
For a broader view of how Azure fits within the larger cloud defense service landscape, the Cloud Defense Providers index provides structured access to provider-specific and framework-specific security resources.
Core mechanics or structure
Azure security architecture is organized around five functional layers, each with distinct control mechanisms:
Identity and Access Management (IAM) operates through Microsoft Entra ID (formerly Azure Active Provider Network). Controls at this layer include Conditional Access policies, Privileged Identity Management (PIM) for just-in-time role elevation, Multi-Factor Authentication (MFA) enforcement, and Azure AD Identity Protection, which uses machine learning signals to flag risky sign-ins. NIST SP 800-63B provides the authenticator assurance level framework against which Azure MFA configurations are benchmarked for federal and regulated environments.
Network Security is implemented through Network Security Groups (NSGs), Azure Firewall, Azure DDoS Protection, and Private Endpoints. NSGs operate at Layer 4 using stateful packet inspection rules applied to subnets or individual network interface cards. Azure Firewall operates at Layers 3–7 with FQDN filtering, threat intelligence integration, and forced tunneling support. Private Endpoints eliminate public internet exposure for PaaS services by binding them to a virtual network's private IP space.
Data Protection relies on Azure Key Vault for cryptographic key and secret management, Azure Disk Encryption (using BitLocker for Windows VMs and dm-crypt for Linux), and Storage Service Encryption, which applies AES-256 encryption at rest by default to all Azure Blob Storage and Azure Files. Customer-managed keys (CMK) allow organizations to retain key custody outside Microsoft's control plane.
Threat Detection and Monitoring is anchored by Microsoft Defender for Cloud, which aggregates security signals across compute, storage, identity, and network resources, assigns a secure score based on control implementation, and surfaces actionable recommendations mapped to NIST, CIS, and PCI DSS controls. Microsoft Sentinel, Azure's cloud-native SIEM/SOAR platform, ingests Defender signals alongside third-party log sources for correlation and automated response.
Policy and Governance is enforced through Azure Policy, which applies deny, audit, append, and modify effects to resource configurations at subscription or management group scope. Azure Blueprints (now superseded by Deployment Stacks in newer implementations) package policy assignments, role assignments, and ARM templates for repeatable compliance-aligned environment deployment.
Causal relationships or drivers
Misconfiguration is the primary driver of Azure security incidents. The Cloud Security Alliance's Cloud Controls Matrix (CCM) identifies configuration management as one of the highest-risk control domains because Azure's default settings prioritize accessibility over restriction in several service categories — including storage account public access, legacy authentication protocols in Azure AD, and overly permissive RBAC role assignments.
Role-Based Access Control (RBAC) sprawl develops when teams assign broad built-in roles such as Contributor or Owner at subscription scope rather than custom roles scoped to specific resource groups. The Azure RBAC model supports over 70 built-in roles, and the principle of least privilege — codified in NIST SP 800-53 Rev 5, control AC-6 — requires that role assignments be scoped to the minimum permissions necessary for each function.
Legacy authentication protocols (Basic Auth, NTLM over HTTP) in Azure AD create bypass paths around Conditional Access policies because those policies only apply to modern authentication flows. Microsoft's own telemetry, cited in the Microsoft Digital Defense Report, identifies legacy authentication as a factor in a disproportionate share of Azure AD compromise events.
Regulatory requirements also drive control adoption. FedRAMP High authorization requires implementation of controls from NIST SP 800-53 Rev 5 across 20 control families. HIPAA-covered entities using Azure must execute a Business Associate Agreement (BAA) with Microsoft and configure audit logging, access controls, and encryption to satisfy the Security Rule's Technical Safeguard requirements at 45 CFR § 164.312.
Classification boundaries
Azure security controls are classified along three primary axes:
Service Model Boundary: IaaS controls (VM hardening, OS patching, NSG rules) are entirely customer-managed. PaaS controls split responsibility — Microsoft manages the runtime and middleware, while the customer configures access, authentication, and data handling. SaaS controls concentrate customer responsibility at the identity and data governance layer.
Control Type Boundary: Preventive controls (Conditional Access, NSG deny rules, Azure Policy deny effects) block non-compliant configurations before deployment or access. Detective controls (Defender for Cloud alerts, Sentinel analytics rules, Azure Monitor diagnostic logs) identify security events after they occur. Corrective controls (automated remediation via Azure Policy, Logic App playbooks in Sentinel) restore compliant state or contain threats.
Data Classification Boundary: Microsoft Purview Information Protection categorizes Azure-hosted data across sensitivity labels (Public, General, Confidential, Highly Confidential) that drive downstream encryption, access, and retention policy enforcement. This classification layer is distinct from resource-level tagging used for cost and operational management.
The page describes how provider-specific control frameworks like Azure's fit within the broader taxonomy of cloud security service categories.
Tradeoffs and tensions
Security Score vs. Operational Friction: Achieving a high Defender for Cloud secure score requires disabling legacy protocols, enforcing MFA, and restricting public endpoints — all configurations that conflict with legacy application dependencies. Organizations running unmodernized line-of-business applications on Azure IaaS frequently cannot block NTLM or Basic Auth without first remediating application-layer authentication dependencies.
Centralized Governance vs. Subscription Autonomy: Azure Management Groups and Azure Policy enable centralized enforcement of security baselines across all subscriptions in a tenant. However, product teams and business units operating with dedicated subscriptions often require configuration flexibility that centralized policy denies. The tension between enterprise-wide governance consistency and per-team delivery velocity is a structural feature of any multi-subscription Azure architecture.
Customer-Managed Keys vs. Operational Complexity: Storing encryption keys in customer-managed Azure Key Vault instances rather than Microsoft-managed keys increases key custody control but introduces operational risk: if a Key Vault is deleted, access-restricted, or its soft-delete retention period expires, all associated encrypted resources become permanently inaccessible. Microsoft's own documentation classifies this as a data loss risk, not a security risk — a distinction that compliance frameworks do not always recognize.
Just-in-Time Access vs. Incident Response Speed: PIM-enforced just-in-time role activation increases accountability and reduces standing access exposure. However, activation workflows that require approval introduce latency during active incident response, when immediate access to production systems is operationally critical. Organizations typically address this by maintaining a small set of break-glass accounts with pre-approved standing access, documented under NIST SP 800-53 control AC-2(12).
Common misconceptions
Misconception: Azure's built-in compliance certifications mean workloads are compliant. Azure holds FedRAMP, SOC 2, ISO 27001, and PCI DSS certifications for its platform infrastructure. These certifications apply to Microsoft's management of the underlying infrastructure — not to the configuration of customer workloads running on that infrastructure. A customer deploying an unencrypted storage account on a FedRAMP-authorized Azure region is not itself operating in a FedRAMP-compliant manner.
Misconception: Enabling Microsoft Defender for Cloud provides comprehensive threat coverage by default. Defender for Cloud's free tier provides posture management and basic recommendations. Threat protection for specific resource types — servers, SQL databases, storage accounts, Kubernetes clusters — requires enabling paid Defender plans on a per-resource-type basis. Leaving Defender plans disabled on high-value resource types creates unmonitored attack surfaces.
Misconception: Azure AD MFA covers all authentication paths. Conditional Access MFA policies apply exclusively to modern authentication protocols (OAuth 2.0, SAML, OpenID Connect). Applications using legacy SMTP AUTH, POP3, IMAP, or Basic Auth bypass Conditional Access entirely. Blocking legacy authentication requires a separate Conditional Access policy with a "Block" grant, not merely an MFA requirement.
Misconception: Network Security Groups replace Azure Firewall. NSGs are stateful L4 packet filters scoped to subnets or NICs within a virtual network. Azure Firewall is a managed network security service providing L3–L7 filtering, FQDN-based rules, threat intelligence integration, and centralized policy management across multiple VNets. The two are complementary layers, not alternatives.
Checklist or steps (non-advisory)
The following sequence reflects the standard phases of an Azure security baseline implementation, as structured in the CIS Microsoft Azure Foundations Benchmark and Microsoft's Cloud Adoption Framework Security discipline:
-
Establish Identity Foundation — Configure Azure AD tenant-wide MFA enforcement via Conditional Access. Enable Azure AD Identity Protection risk policies for medium and high-risk sign-in events. Disable legacy authentication protocols via a dedicated block policy.
-
Configure Privileged Access — Enable Azure AD Privileged Identity Management (PIM) for all subscription Owner and Contributor role assignments. Define approval workflows and maximum activation durations. Document and secure break-glass accounts with permanent standing access.
-
Apply Subscription-Level Governance — Assign a security baseline Azure Policy initiative (CIS or NIST SP 800-53) at the Management Group level. Enable Azure Security Benchmark (Microsoft Cloud Security Benchmark) as the default initiative in Defender for Cloud.
-
Enable Defender for Cloud Plans — Activate Defender plans for Servers, Storage, SQL, App Service, Key Vault, and Kubernetes across all production subscriptions. Configure auto-provisioning of the Log Analytics agent or Azure Monitor Agent.
-
Harden Network Perimeter — Review and restrict all NSG rules permitting inbound access from 0.0.0.0/0. Deploy Azure Firewall or third-party NVA for inter-spoke and internet-bound traffic. Enable Private Endpoints for PaaS services (Storage, SQL, Key Vault) and disable public network access on each.
-
Enforce Data Protection — Confirm Storage Service Encryption with AES-256 is active on all storage accounts (enabled by default; confirm CMK if required). Enable transparent data encryption (TDE) on all Azure SQL databases. Audit Key Vault access policies and transition to RBAC-based Key Vault access model.
-
Configure Logging and Retention — Enable Diagnostic Settings on all critical resources to forward logs to a Log Analytics Workspace. Configure Azure Activity Log retention to a minimum of 365 days, as required for NIST AC-2 and FedRAMP AU-11 compliance. Deploy Microsoft Sentinel with relevant data connectors and analytic rules.
-
Validate Against Benchmark — Run a Defender for Cloud regulatory compliance assessment against the applicable standard (CIS, PCI DSS, FedRAMP, HIPAA). Export the compliance report. Assign remediation tasks for failed controls with ownership and target dates.
For guidance on how the Cloud Defense Authority resource structures provider-specific security references, that orientation page maps the organizational logic of this domain.
Reference table or matrix
| Control Domain | Azure Native Service | Applicable Framework | Responsibility (IaaS) | Responsibility (SaaS) |
|---|---|---|---|---|
| Identity & Authentication | Microsoft Entra ID, PIM | NIST SP 800-63B, CIS §1 | Customer | Customer |
| Privileged Access | Azure AD PIM, Conditional Access | NIST AC-6, CIS §1.14 | Customer | Customer |
| Network Segmentation | NSG, Azure Firewall, Private Endpoints | CIS §6, NIST SC-7 | Customer | Microsoft |
| Data Encryption at Rest | Azure Key Vault, ADE, SSE (AES-256) | NIST SC-28, PCI DSS §3.5 | Customer | Shared |
| Data Encryption in Transit | TLS 1.2+ enforcement, HTTPS-only settings | NIST SC-8, CIS §3 | Customer | Microsoft |
| Threat Detection | Microsoft Defender for Cloud | NIST SI-4, FedRAMP SI | Customer-enabled | Customer-enabled |
| SIEM/Log Correlation | Microsoft Sentinel, Log Analytics | NIST AU-12, FedRAMP AU | Customer | Customer |
| Policy Enforcement | Azure Policy, Management Groups | NIST CM-6, CIS §2 | Customer | N/A |
| Vulnerability Management | Defender for Servers, MDVM | NIST RA-5, CIS §7 | Customer | Microsoft |
| Incident Response | Sentinel Playbooks (Logic Apps) | NIST IR-4, NIST IR-5 | Customer | Shared |