Skip to content

Commit 2793a0a

Browse files
Merge pull request #310188 from msmbaldwin/secfund-feedback
Updates to address UUF feedback on azure security fundamental articles
2 parents 0abde4c + d93ba09 commit 2793a0a

8 files changed

Lines changed: 79 additions & 32 deletions

articles/security/fundamentals/azure-domains.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: mbaldwin
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 04/11/2025
12+
ms.date: 01/06/2026
1313
---
1414
# Reference list of Azure domains (not comprehensive)
1515

@@ -31,7 +31,8 @@ This page is a partial list of the Azure domains in use. Some of them are REST A
3131
|[Azure Cosmos DB](/azure/cosmos-db/)|*.cosmos.azure.com|
3232
|[Azure Cosmos DB](/azure/cosmos-db/)|*.documents.azure.com|
3333
|[Azure Files](../../storage/files/storage-files-introduction.md)|*.file.core.windows.net|
34-
|[Azure Front Door](https://azure.microsoft.com/services/frontdoor/)|*.azurefd.net|
34+
|[Azure Front Door](/azure/frontdoor/) (classic)|*.azurefd.net|
35+
|[Azure Front Door](/azure/frontdoor/) Standard/Premium|*.z01.azurefd.net|
3536
|[Azure Key Vault](/azure/key-vault/general/overview)| *.vault.azure.net|
3637
|[Azure Kubernetes Service](/azure/aks/)|*.azmk8s.io|
3738
|Azure Management Services|*.management.core.windows.net|
@@ -40,7 +41,7 @@ This page is a partial list of the Azure domains in use. Some of them are REST A
4041
|[Azure Queue Storage](https://azure.microsoft.com/services/storage/queues/)|*.queue.core.windows.net|
4142
|[Azure Service Bus](../../service-bus-messaging/service-bus-messaging-overview.md)|*.servicebus.windows.net|
4243
|[Azure SQL Database](https://azure.microsoft.com/services/sql-database/)|*.database.windows.net|
43-
|[Azure Stack Edge](https://azure.microsoft.com/products/azure-stack/edge/) and [Azure IoT Edge](https://azure.microsoft.com/services/iot-edge/)|*.azureedge.net|
44+
|[Azure CDN](/azure/cdn/) (migrated to [Azure Front Door](/azure/frontdoor/))|*.azureedge.net|
4445
|[Azure Table Storage](../../storage/tables/table-storage-overview.md)|*.table.core.windows.net|
4546
|[Azure Traffic Manager](../../traffic-manager/traffic-manager-overview.md)|*.trafficmanager.net|
4647
|Azure Websites|*.azurewebsites.net|

articles/security/fundamentals/isolation-choices.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: security
77
ms.subservice: security-fundamentals
88
ms.topic: article
9-
ms.date: 12/03/2025
9+
ms.date: 01/06/2026
1010
ms.author: mbaldwin
1111

1212
---
@@ -73,7 +73,7 @@ The rest of the Azure roles in Azure allow management of specific Azure resource
7373

7474
Some other capabilities for Microsoft Entra ID include:
7575

76-
- Microsoft Entra ID enables SSO to SaaS applications, regardless of where they're hosted. Some applications are federated with Microsoft Entra ID, and others use password SSO. Federated applications can also support user provisioning and [password vaulting](https://www.techopedia.com/definition/31415/password-vault).
76+
- Microsoft Entra ID enables SSO to SaaS applications, regardless of where they're hosted. Some applications are federated with Microsoft Entra ID, and others use password SSO. Federated applications can also support user provisioning and [password vaulting](/entra/identity/enterprise-apps/configure-password-single-sign-on-non-gallery-applications).
7777

7878
- Access to data in [Azure Storage](https://azure.microsoft.com/services/storage/) is controlled via authentication. Each storage account has a primary key ([storage account key](../../storage/common/storage-account-create.md), or SAK) and a secondary secret key (the shared access signature, or SAS).
7979

@@ -305,10 +305,10 @@ Azure deployment has multiple layers of network isolation. The following diagram
305305

306306
**Traffic isolation:** A [virtual network](../../virtual-network/virtual-networks-overview.md) is the traffic isolation boundary on the Azure platform. Virtual machines (VMs) in one virtual network cannot communicate directly to VMs in a different virtual network, even if both virtual networks are created by the same customer. Isolation is a critical property that ensures customer VMs and communication remains private within a virtual network.
307307

308-
[Subnet](../../virtual-network/virtual-networks-overview.md) offers an additional layer of isolation with in virtual network based on IP range. IP addresses in the virtual network, you can divide a virtual network into multiple subnets for organization and security. VMs and PaaS role instances deployed to subnets (same or different) within a VNet can communicate with each other without any extra configuration. You can also configure [network security group (NSGs)](../../virtual-network/virtual-networks-overview.md) to allow or deny network traffic to a VM instance based on rules configured in access control list (ACL) of NSG. NSGs can be associated with either subnets or individual VM instances within that subnet. When an NSG is associated with a subnet, the ACL rules apply to all the VM instances in that subnet.
308+
[Subnet](../../virtual-network/virtual-networks-overview.md) offers an additional layer of isolation with in virtual network based on IP range. IP addresses in the virtual network, you can divide a virtual network into multiple subnets for organization and security. VMs and PaaS role instances deployed to subnets (same or different) within a VNet can communicate with each other without any extra configuration. You can also configure [network security groups (NSGs)](../../virtual-network/network-security-groups-overview.md) to allow or deny network traffic to a VM instance based on security rules. NSGs can be associated with either subnets or individual network interfaces attached to VMs. When an NSG is associated with a subnet, the security rules apply to all the VM instances in that subnet.
309309

310310
## Next Steps
311311

312-
- Learn about [Network Isolation Options for Machines in Windows Azure Virtual Networks](https://azure.microsoft.com/blog/network-isolation-options-for-machines-in-windows-azure-virtual-networks/). This includes the classic front-end and back-end scenario where machines in a particular back-end network or subnetwork may only allow certain clients or other computers to connect to a particular endpoint based on an allowlist of IP addresses.
312+
- Learn about [network security groups](/azure/virtual-network/network-security-groups-overview). Network security groups filter network traffic between Azure resources in a virtual network, allowing you to restrict traffic to subnets or virtual machines based on source, destination, port, and protocol using security rules.
313313

314314
- Learn about [virtual machine isolation in Azure](/azure/virtual-machines/isolation). Azure Compute offers virtual machine sizes that are isolated to a specific hardware type and dedicated to a single customer.

articles/security/fundamentals/pen-testing.md

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.assetid: 695d918c-a9ac-4eba-8692-af4526734ccc
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: article
10-
ms.date: 04/23/2025
10+
ms.date: 01/06/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -23,21 +23,36 @@ As of June 15, 2017, Microsoft no longer requires pre-approval to conduct a pene
2323
> [!IMPORTANT]
2424
> While notifying Microsoft of pen testing activities is no longer required customers must still comply with the [Microsoft Cloud Unified Penetration Testing Rules of Engagement](https://www.microsoft.com/msrc/pentest-rules-of-engagement).
2525
26+
## Permitted testing
27+
28+
You can perform penetration testing on your own Azure-hosted applications and services without prior approval. This includes testing:
29+
30+
* Your endpoints hosted on Azure Virtual Machines
31+
* Azure App Service applications (Web Apps, API Apps, Mobile Apps)
32+
* Azure Functions and API endpoints
33+
* Azure Websites
34+
* Any other Azure services where you own or have explicit authorization to test the deployed resources
35+
2636
Standard tests you can perform include:
2737

2838
* Tests on your endpoints to uncover the [Open Web Application Security Project (OWASP) top 10 vulnerabilities](https://owasp.org/www-project-top-ten/)
39+
* Dynamic Application Security Testing (DAST) of your web applications and APIs
2940
* [Fuzz testing](https://www.microsoft.com/research/blog/a-brief-introduction-to-fuzzing-and-why-its-an-important-tool-for-developers/) of your endpoints
3041
* [Port scanning](https://en.wikipedia.org/wiki/Port_scanner) of your endpoints
3142

43+
## Prohibited testing
44+
3245
One type of pen test that you can't perform is any kind of [Denial of Service (DoS)](https://en.wikipedia.org/wiki/Denial-of-service_attack) attack. This test includes initiating a DoS attack itself, or performing related tests that might determine, demonstrate, or simulate any type of DoS attack.
3346

34-
> [!Note]
35-
> You may only simulate attacks using Microsoft approved testing partners:
36-
> - [BreakingPoint Cloud](https://www.ixiacom.com/products/breakingpoint-cloud): A self-service traffic generator where your customers can generate traffic against DDoS Protection-enabled public endpoints for simulations.
37-
> - [Red Button](https://www.red-button.net/): Work with a dedicated team of experts to simulate real-world DDoS attack scenarios in a controlled environment.
38-
> - [RedWolf](https://www.redwolfsecurity.com/services/#cloud-ddos) a self-service or guided DDoS testing provider with real-time control.
39-
>
40-
> To learn more about these simulation partners, see [testing with simulation partners](../../ddos-protection/test-through-simulations.md).
47+
## DDoS simulation testing
48+
49+
If you need to test your DDoS resilience, you can use Microsoft-approved simulation partners. These partners provide controlled DDoS simulation services that don't violate the penetration testing rules:
50+
51+
- [BreakingPoint Cloud](https://www.ixiacom.com/products/breakingpoint-cloud): A self-service traffic generator where your customers can generate traffic against DDoS Protection-enabled public endpoints for simulations.
52+
- [Red Button](https://www.red-button.net/): Work with a dedicated team of experts to simulate real-world DDoS attack scenarios in a controlled environment.
53+
- [RedWolf](https://www.redwolfsecurity.com/services/#cloud-ddos): A self-service or guided DDoS testing provider with real-time control.
54+
55+
To learn more about these simulation partners, see [testing with simulation partners](../../ddos-protection/test-through-simulations.md).
4156

4257
## Next steps
4358

articles/security/fundamentals/ransomware-detect-respond.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 04/16/2025
9+
ms.date: 01/06/2026
1010

1111
---
1212

@@ -82,8 +82,6 @@ Our Rapid Ransomware Recovery services are treated as "Confidential" for the dur
8282

8383
For comprehensive ransomware protection guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
8484

85-
See the white paper: [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack).
86-
8785
Other Azure ransomware articles:
8886

8987
- [Ransomware protection in Azure](ransomware-protection.md)

articles/security/fundamentals/ransomware-features-resources.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 04/16/2025
9+
ms.date: 01/06/2026
1010
---
1111

1212
# Azure features & resources that help you protect, detect, and respond to ransomware attacks
@@ -136,8 +136,6 @@ For detailed information on how Microsoft secures our cloud, visit the [service
136136

137137
For comprehensive ransomware protection guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
138138

139-
See the white paper: [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack).
140-
141139
Other Azure ransomware articles:
142140

143141
- [Ransomware protection in Azure](ransomware-protection.md)

articles/security/fundamentals/ransomware-prepare.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 04/23/2025
9+
ms.date: 01/06/2026
1010
---
1111

1212
# Prepare for a ransomware attack
@@ -147,8 +147,6 @@ For detailed guidance, see [Backup and restore plan to protect against ransomwar
147147

148148
For comprehensive ransomware protection guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
149149

150-
See the white paper: [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack).
151-
152150
Other Azure ransomware articles:
153151

154152
- [Ransomware protection in Azure](ransomware-protection.md)

articles/security/fundamentals/ransomware-protection.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 05/01/2025
9+
ms.date: 01/06/2026
1010

1111
---
1212

@@ -73,7 +73,6 @@ Azure-specific ransomware protection articles:
7373
- [Improve your security defenses for ransomware attacks with Azure Firewall Premium](ransomware-protection-with-azure-firewall.md)
7474

7575
Additional resources:
76-
- [Azure defenses for ransomware attack whitepaper](https://azure.microsoft.com/resources/azure-defenses-for-ransomware-attack)
7776
- [What is ransomware?](/security/ransomware/human-operated-ransomware)
7877

7978

articles/security/fundamentals/shared-responsibility.md

Lines changed: 44 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: security
77
ms.subservice: security-fundamentals
88
ms.topic: article
9-
ms.date: 12/03/2025
9+
ms.date: 01/06/2026
1010
ms.author: mbaldwin
1111
#customer intent: As a cloud security administrator, I want to understand the shared responsibility model in Azure so that I can clearly identify which security tasks are mine and which are handled by Microsoft.
1212
---
@@ -15,18 +15,56 @@ ms.author: mbaldwin
1515
As you consider and evaluate public cloud services, it's critical to understand the shared responsibility model and which security tasks the cloud provider handles and which tasks you handle. The workload responsibilities vary depending on whether the workload is hosted on Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), or in an on-premises datacenter.
1616

1717
## Division of responsibility
18-
In an on-premises datacenter, you own the whole stack. As you move to the cloud some responsibilities transfer to Microsoft. The following diagram illustrates the areas of responsibility between you and Microsoft, according to the type of deployment of your stack.
18+
19+
In an on-premises datacenter, you own the whole stack. As you move to the cloud, some responsibilities transfer to Microsoft. The following diagram illustrates the areas of responsibility between you and Microsoft, according to the type of deployment of your stack.
1920

2021
:::image type="content" source="media/shared-responsibility/shared-responsibility.svg" alt-text="Diagram showing responsibility zones." border="false":::
2122

2223
For all cloud deployment types, you own your data and identities. You're responsible for protecting the security of your data and identities, on-premises resources, and the cloud components you control. Cloud components you control vary by service type.
2324

25+
### Responsibility matrix
26+
27+
The following table details the division of responsibility between you and Microsoft for each area of your stack:
28+
29+
| Responsibility area | On-premises | IaaS | PaaS | SaaS |
30+
|---|---|---|---|---|
31+
| Customer data | Customer | Customer | Customer | Customer |
32+
| Configurations and settings | Customer | Customer | Customer | Customer |
33+
| Identities and users | Customer | Customer | Customer | Customer |
34+
| Client devices | Customer | Customer | Customer | Shared |
35+
| Applications | Customer | Customer | Shared | Shared |
36+
| Network controls | Customer | Customer | Shared | Microsoft |
37+
| Operating system | Customer | Customer | Microsoft | Microsoft |
38+
| Physical hosts | Customer | Microsoft | Microsoft | Microsoft |
39+
| Physical network | Customer | Microsoft | Microsoft | Microsoft |
40+
| Physical datacenter | Customer | Microsoft | Microsoft | Microsoft |
41+
42+
### Responsibilities you always retain
43+
2444
Regardless of the type of deployment, you always retain the following responsibilities:
2545

26-
- Data
27-
- Endpoints
28-
- Account
29-
- Access management
46+
- **Data** - You're responsible for your data, including data classification, data protection, encryption decisions, and compliance with data governance requirements.
47+
- **Endpoints** - You're responsible for protecting client devices and endpoints that access your cloud services, including mobile devices, laptops, and desktops.
48+
- **Accounts** - You're responsible for managing user accounts, including creating, managing, and removing user access.
49+
- **Access management** - You're responsible for implementing and managing access controls, including role-based access control (RBAC), multifactor authentication, and conditional access policies.
50+
51+
### Shared responsibilities explained
52+
53+
Some responsibilities are shared between you and Microsoft, with the division varying by service model:
54+
55+
- **Applications** - In IaaS, you're fully responsible for deployed applications. In PaaS and SaaS, Microsoft manages parts of the application stack, but you're responsible for application configuration, code security, and access controls.
56+
- **Network controls** - In IaaS, you configure all network security including firewalls and network segmentation. In PaaS, Microsoft provides baseline network security, but you configure application-level network controls. In SaaS, Microsoft manages network security.
57+
- **Client devices** - In SaaS scenarios, Microsoft may provide some device management capabilities, but you're responsible for endpoint protection and compliance.
58+
59+
### Microsoft responsibilities
60+
61+
Microsoft is responsible for the underlying cloud infrastructure, which includes:
62+
63+
- **Physical security** - Securing datacenters, including facilities, physical access controls, and environmental controls.
64+
- **Physical network** - Managing network infrastructure, including routers, switches, and cables within datacenters.
65+
- **Physical hosts** - Managing and maintaining the physical servers that host cloud services.
66+
- **Hypervisor** - Managing the virtualization layer that enables virtual machines in IaaS and PaaS.
67+
- **Platform services** - In PaaS and SaaS, Microsoft manages operating systems, runtime environments, and middleware.
3068

3169
## AI Shared Responsibility
3270

0 commit comments

Comments
 (0)