Azure Active Directory Audit logs

This post comes from Namgyal Dolker, a senior security program manager in the Azure Security engineering team. One of the primary concerns from customers is the sense of losing the visibility into what is happening in their cloud service.  They want to understand how to perform many of the same actions and activities In the…

1

Cloud Security as a Shared Responsibility

I thought it would be valuable to start a series of conversations on how Microsoft thinks, acts and enables cloud infrastructure security from an Azure perspective.  Cloud security is a shared responsibility between Microsoft and all our tenants.  We (Azure) protect the infrastructure, we detect fraud and abuse and we respond to incidents by notifying…

1

Building Cloud Trust

A few weeks ago, Vijay Kumar and I delivered a session at the RSA Conference in San Francisco where we discussed how you can trust a cloud provider.  As we discussed in our session using the Microsoft cloud as an example, trust is perhaps one of the most fundamental aspects people need and seek out when they…

0

How to Collect and Analyze Azure Security Logs

Approximately 2 months ago, Mahesh Nayak, a Senior Program Manager in the Azure security team published whitepaper titled Microsoft Azure Security and Audit Log Management. This has been a very popular topic for many customers who have recently moved to Azure and are looking to collect and analyze the security logs for their cloud based…

0

Azure Disk Encryption Management for Windows and Linux Virtual Machines

  CLICK HERE TO SEE THE MOST RECENT POST ON AZURE DISK ENCRYPTION Also check out cool Azure Disk Encryption PowerShell tutorials! Explore Azure Disk Encryption with Azure Powershell Explore Azure Disk Encryption with Azure PowerShell – Part 2 ====================================================== This post comes from Devendra Tiwari, a senior security program manager in the Azure Security…

5

Barracuda WAF Video clips on how to protect Applications moving to Azure

Editor’s Note: This post comes from Mark Perry, Worldwide Technical Lead, Cloud Infrastructure & Security, Office of the CTO, EPG Cloud + Enterprise As customers look to move applications and data centers to the cloud, they often look to bring certain best practices along with them. Security teams have a set of best practices for…


Microsoft Azure Network Security Whitepaper version 3 is now available

This updated white paper provides information on how customers can use Azure’s native network security features to help protect their information assets. You can download the full whitepaper from Microsoft Azure Network Security Whitepaper V3. This update describes capabilities available as of January 2015 and the below highlights are just some of what you’ll see…


Dynamic Data Masking in Azure SQL Database

Ron Matchoro writes on the Azure Blog today: We are excited to announce that this week we made Dynamic Data Masking available for preview on the new service version of SQL Database (V12).  Dynamic Data Masking is a policy-based security feature that helps limit the exposure of data in a database by returning masked data…

0

Microsoft Azure: The first cloud computing platform to conform to ISO/IEC 27018, the only international set of privacy controls in the cloud

Lori Woehler, Principal Group Manager, Compliance & Trust, writes on the Azure Blog today:  Earlier this month, we highlighted a number of new compliance milestones for Microsoft Azure. Among these developments was that the British Standards Institution (BSI) validated that Azure incorporates controls that are aligned to the ISO/IEC 27018 code of practice for the…

0

New Windows Azure Network Security Whitepaper

A new version, version 2 of this whitepaper “Microsoft Azure Network Security Whitepaper” is now available. This update is based on capabilities available as of Oct 2014. Download it from Microsoft Azure Network Security Whitepaper V2.   Windows Azure networking provides the infrastructure necessary to securely connect your virtual machines to one another, as well as…