Azure Security

Azure provides a suite of security tools and capabilities that help you protect your resources and data in Azure. 

Here are some key Azure security services:

Azure Security Center: Azure Security Center provides unified security management and advanced threat protection across hybrid cloud workloads. It helps you prevent, detect, and respond to threats with increased visibility and control over the security of your Azure resources.

Azure Active Directory (Azure AD): Azure AD is Microsoft's cloud-based identity and access management service, which helps your employees sign in and access resources. It provides identity and access management solutions and is used to help protect from data leakage and more.

Azure Key Vault: Azure Key Vault is a tool for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, or certificates.

Azure Information Protection (AIP): AIP is a cloud-based solution that helps organizations classify, label, and protect its documents and emails.

Azure DDoS Protection: Azure DDoS Protection provides features to protect your applications from Distributed Denial of Service (DDoS) attacks.

Azure Firewall: Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources.

Azure Sentinel: Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution.

Azure Confidential Computing: Azure Confidential Computing allows you to encrypt data in use, ensuring a secure enclave for your data during processing.

These services provide a comprehensive solution for securing your Azure resources, helping you protect your data, manage access and identities, and ensure compliance with security standards.

Azure Security Documentation

App Configuration

Fast, scalable parameter storage for app configuration

Application Gateway

Build secure, scalable, and highly available web front ends in Azure

Azure confidential ledger

Tamperproof, unstructured data store hosted in trusted execution environments (TEEs) and backed by cryptographically verifiable evidence

Azure DDoS Protection

Protect your applications from Distributed Denial of Service (DDoS) attacks

Azure Dedicated HSM

Manage hardware security modules that you use in the cloud

Azure Firewall

Native firewalling capabilities with built-in high availability, unrestricted cloud scalability, and zero maintenance

Azure Front Door

Scalable, security-enhanced delivery point for global, microservice-based web applications

Azure Information Protection

Better protect your sensitive information anytime, anywhere

Key Vault

Safeguard and maintain control of keys and other secrets

Microsoft Defender for Cloud

Security posture management and advanced threat protection across Azure, hybrid, and multicloud workloads

Microsoft Defender for External Attack Surface Management

Safeguard the digital experience by discovering all internet-exposed resources

Microsoft Defender for IoT

Continuous asset management and threat detection for both unmanaged and managed IoT/OT devices

Microsoft Entra Domain Services

Join Azure virtual machines to a domain without domain controllers

Microsoft Entra ID

Synchronize on-premises directories and enable single sign-on

Microsoft Sentinel

Put cloud-native SIEM and intelligent security analytics to work to help protect your enterprise

NAT Gateway

Provide highly reliable, secure, and scalable outbound connectivity to the internet

VPN Gateway

Establish secure, cross-premises connectivity

Web Application Firewall

A cloud-native web application firewall (WAF) service that provides powerful protection for web apps

Azure Security Products

App Configuration

Fast, scalable parameter storage for app configuration.

Learn More 

Application Gateway

Build secure, scalable, highly available web front ends in Azure.

Learn More 

Microsoft Entra Domain Services

Manage your domain controllers in the cloud.

Learn More 

Microsoft Defender for Cloud

Protect your multi-cloud and hybrid environments.

Learn More 

Defender External Attack Surface Management

Safeguard the digital experience by discovering all internet-exposed resources with Microsoft Defender External Attack Surface Management (EASM).

Learn More 

Azure Bastion

Fully managed service that helps secure remote access to your virtual machines.

Learn More 

Azure DDoS Protection

Protect your Azure resources from distributed denial-of-service (DDoS) attacks.

Learn More 

Azure Dedicated HSM

Manage hardware security modules that you use in the cloud.

Learn More 

Azure Firewall

Protect your Azure Virtual Network resources with cloud-native network security.

Learn More 

Azure Firewall Manager

Central network security policy and route management for globally distributed, software-defined perimeters.

Learn More 

Azure Front Door

Modern cloud CDN that delivers optimized experiences to your users anywhere.

Learn More 

Azure Information Protection

Better protect your sensitive information anytime, anywhere.

Learn More 

Microsoft Sentinel

Cloud-native SIEM and intelligent security analytics.

Learn More 

Key Vault

Safeguard and maintain control of keys and other secrets.

Learn More 

Azure confidential ledger

Tamperproof, unstructured data store hosted in trusted execution environments (TEEs) and backed by cryptographically verifiable evidence.

Learn More 

VPN Gateway

Establish secure, cross-premises connectivity.

Learn More 

Web Application Firewall

A cloud-native web application firewall (WAF) service that provides powerful protection for web apps.

Learn More 

Microsoft Azure Attestation

A unified solution for remotely verifying the trustworthiness of a platform and integrity of the binaries running inside it.

Learn More 

Microsoft Copilot for Security

Protect at the speed and scale of AI with a generative AI-powered assistant.

Learn More 

As opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like. It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters

If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything embarrassing hidden in the middle of text. All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet. It uses a dictionary of over 200 Latin words, combined with a handful of model sentence structures, to generate Lorem Ipsum which looks reasonable. The generated Lorem Ipsum is therefore always free from repetition, injected humour, or non-characteristic words etc

As opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like. It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters

If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything embarrassing hidden in the middle of text. All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet. It uses a dictionary of over 200 Latin words, combined with a handful of model sentence structures, to generate Lorem Ipsum which looks reasonable. The generated Lorem Ipsum is therefore always free from repetition, injected humour, or non-characteristic words etc