CJIS Implementation Guidelines for Microsoft Government Cloud

At Microsoft, we are committed to implementing state-of-the art technology and world-class security solutions to meet the applicable controls of FedRAMP, NIST Special Publication 800-53 , and the Criminal Justice Information Services (CJIS) Security Policy to allow our customers to meet their compliance requirements. To help you use the Azure security features and capabilities we…


How Azure Security Center Secures Your Azure Security Center Data

That’s sort of a mouthful, isn’t it? Many people we talk to want to understand how Azure Security Center secures the data it uses to help secure the workloads you deploy in the Azure cloud. These people know that some of this information is sensitive and require that this information is secured from end-to-end. In…


Your Guides to Azure Security Center

One of the best things about the release of a new service in Azure is combing through the docs to learn all about it, and I know you’ll want to do that with Azure Security Center. If you’re book sort of person, a table of contents goes a long way at allowing you to “eyeball”…


Azure Security Center Ushers in a New Age in Cloud Security

Today’s the day! Yes, it’s *that* day – the day that Azure Security Center goes into General Availability. That means it’s time for you to enroll your production workloads into Azure Security Center. Not sure how to get started? A good place to start is to read Azure Security Center – from planning to operations…


Microsoft Azure log integration – Preview

Both PaaS and IaaS services hosted in Azure generate a large amount of data in security logs. These logs contain vital information that can provide intelligence and powerful insights into policy violations, internal and external threats, regulatory compliance issues, and anomalies in network, host, and user activity. This ability to get raw logs from your…

0

Threat Detection in Azure Security Center

One of the most impressive features of Azure Security Center is its advanced threat detection. Gone are the days of signature-based solutions. Gone are the days of isolated point solutions that don’t share information and correlate their findings. And closer are we to the days when floods of false positive alerts lead to us being…


Microsoft Azure Security Response in the Cloud

Security incident response. Three of the most important words in any security operation. These are also some of the most important words you need to use when you talk to potential public cloud service providers. You need to know that your cloud service provider has a mature and effective security response plan. If your provider…


Microsoft Recognized in Leader Quadrant for Identity and Access Management as a Service

We have some GREAT news to share with you today! Gartner has recognized Microsoft as a Leader, positioned furthest to the right for completeness of vision, in the 2016 Magic Quadrant for Identity and Access Management as a Service, Worldwide. That’s a big deal and we’re proud to have reached such a level of recognition…


Azure Infrastructure Security Book Coming Soon

We’re all about Azure security here on the Azure Security and Compliance Team blog. We know that the Azure public cloud has what you need to be successful faster than you could ever be on-premises. We’re seeing that with customers every day. But another thing we see and hear are concerns – security concerns. You…