You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/ransomware-detect-respond.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,18 +6,18 @@ ms.service: security
6
6
ms.subservice: security-fundamentals
7
7
ms.topic: article
8
8
ms.author: mbaldwin
9
-
ms.date: 01/06/2026
9
+
ms.date: 02/12/2026
10
10
11
11
---
12
12
13
13
# Detect and respond to ransomware attacks
14
14
15
-
Ransomware incidents typically present with distinct warning signs that security teams can identify. Unlike other malware types, ransomware usually produces highly evident indicators that require minimal investigation before declaring an incident. These high-confidence triggers stand in contrast to more subtle threats that would demand extensive analysis before escalation. When ransomware strikes, the evidence is often unmistakable.
16
-
17
-
In general, such infections are obvious from basic system behavior, the absence of key system or user files, and the demand for ransom. In such cases, the analyst should consider whether to immediately declare and escalate the incident, including taking any automated actions to mitigate the attack.
15
+
This article provides Azure-specific guidance for detecting and responding to ransomware attacks.
18
16
19
17
> [!TIP]
20
-
> For comprehensive ransomware detection and response guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware). This article focuses specifically on Azure-based detection and response capabilities.
18
+
> This article focuses on Azure-specific detection and response. For comprehensive guidance, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
19
+
20
+
Ransomware incidents typically present with distinct warning signs that security teams can identify. Unlike other malware types, ransomware usually produces highly evident indicators that require minimal investigation before declaring an incident. These high-confidence triggers stand in contrast to more subtle threats that would demand extensive analysis before escalation. When ransomware strikes, the evidence is often unmistakable.
Copy file name to clipboardExpand all lines: articles/security/fundamentals/ransomware-prepare.md
+3-57Lines changed: 3 additions & 57 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,15 +6,15 @@ ms.service: security
6
6
ms.subservice: security-fundamentals
7
7
ms.topic: article
8
8
ms.author: mbaldwin
9
-
ms.date: 01/06/2026
9
+
ms.date: 02/12/2026
10
10
---
11
11
12
12
# Prepare for a ransomware attack
13
13
14
14
This article provides Azure-specific guidance for preparing your organization to defend against and recover from ransomware attacks.
15
15
16
16
> [!TIP]
17
-
> This article focuses specifically on Azure capabilities and best practices. For comprehensive ransomware preparation guidance across all Microsoft platforms and services, see [Prepare your ransomware recovery plan](/security/ransomware/protect-against-ransomware-phase1).
17
+
> This article focuses on Azure-specific preparation. For comprehensive guidance, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
18
18
19
19
## Adopt a Cybersecurity framework
20
20
@@ -41,61 +41,7 @@ Ultimately, the Framework is aimed at reducing and better managing cybersecurity
Based on our experience with ransomware attacks on Azure environments, we find that prioritization should focus on:
47
-
1. Prepare - Have backups and recovery plans for your Azure resources
48
-
1. Limit - Protect privileged access to Azure resources
49
-
1. Prevent - Harden Azure security controls
50
-
51
-
This may seem counterintuitive, since most people want to prevent an attack and move on. Unfortunately, we must assume breach (a key Zero Trust principle) and focus on reliably mitigating the most damage first. This prioritization is critical because of the high likelihood of a worst-case scenario with ransomware. While it's not a pleasant truth to accept, we're facing creative and motivated human attackers who are adept at finding a way to control the complex real-world environments in which we operate. Against that reality, it's important to prepare for the worst and establish frameworks to contain and prevent attackers' ability to get what they're after.
52
-
53
-
While these priorities should govern what to do first, we encourage organizations to run steps in parallel where possible, including pulling quick wins forward from step 1 when you can.
54
-
55
-
For comprehensive guidance on the three-phase approach to ransomware protection, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
56
-
57
-
## Make it harder to get in
58
-
59
-
Prevent a ransomware attacker from entering your Azure environment and rapidly respond to incidents to remove attacker access before they can steal and encrypt data. This causes attackers to fail earlier and more often, undermining the profit of their attacks. While prevention is the preferred outcome, it's a continuous journey and may not be possible to achieve 100% prevention and rapid response across a real-world organization's complex multi-platform and multicloud estate with distributed IT responsibilities.
60
-
61
-
To achieve this, organizations should identify and execute quick wins to strengthen security controls for their Azure resources to prevent entry, and rapidly detect/evict attackers while implementing a sustained program that helps them stay secure. Microsoft recommends organizations follow the principles outlined in the Zero Trust strategy. Specifically, for Azure resources, organizations should prioritize:
62
-
- Improving security hygiene by focusing efforts on attack surface reduction and threat and vulnerability management for Azure resources.
63
-
- Implementing Protection, Detection and Response controls for Azure workloads that can protect against commodity and advanced threats, provide visibility, and alerting on attacker activity and respond to active threats.
64
-
65
-
For comprehensive guidance on making it harder for attackers to access your environment, see [Defend against ransomware attacks](/security/ransomware/protect-against-ransomware-phase3).
66
-
67
-
## Limit scope of damage
68
-
69
-
Ensure you have strong controls (prevent, detect, respond) for privileged accounts with access to your Azure resources like IT Admins and other roles with control of business-critical systems. This slows and/or blocks attackers from gaining complete access to your Azure resources to steal and encrypt them. Taking away the attackers' ability to use IT Admin accounts as a shortcut to resources drastically lowers the chances they're successful at attacking you and demanding payment / profiting.
70
-
71
-
Organizations should have elevated security for privileged accounts with Azure access (tightly protect, closely monitor, and rapidly respond to incidents related to these roles). See Microsoft's Security rapid modernization plan, which covers:
72
-
- End to End Session Security (including multifactor authentication (MFA) for admins)
73
-
- Protect and Monitor Identity Systems
74
-
- Mitigate Lateral Traversal
75
-
- Rapid Threat Response
76
-
77
-
For comprehensive guidance on limiting the scope of damage, see [Limit the impact of ransomware attacks](/security/ransomware/protect-against-ransomware-phase2).
78
-
79
-
## Prepare for the worst
80
-
81
-
Plan for the worst-case scenario and expect that it happens (at all levels of the organization). This helps your organization and others in the world you depend on:
82
-
83
-
- Limits damage for the worst-case scenario – While restoring all systems from backups is highly disruptive to business, this is more effective and efficient than trying to recovery using (low quality) attacker-provided decryption tools after paying to get the key. Note: Paying is an uncertain path – You have no formal or legal guarantee that the key works on all files, the tools work effectively, or that the attacker (who may be an amateur affiliate using a professional's toolkit) will act in good faith.
84
-
- Limit the financial return for attackers – If an organization can restore business operations without paying the attackers, the attack fails and results in zero return on investment (ROI) for the attackers. This makes it less likely that they'll target the organization in the future (and deprives them of more funding to attack others).
85
-
86
-
The attackers may still attempt to extort the organization through data disclosure or abusing/selling the stolen data, but this gives them less leverage than if they have the only access path to your data and systems.
87
-
88
-
To realize this, organizations should ensure they:
89
-
- Register Risk - Add ransomware to risk register as high likelihood and high impact scenario. Track mitigation status via Enterprise Risk Management (ERM) assessment cycle.
90
-
- Define and Backup Critical Business Assets – Define systems required for critical business operations and automatically back them up on a regular schedule (including correct backup of critical dependencies like Active Directory)
91
-
Protect backups against deliberate erasure and encryption with offline storage, immutable storage, and/or out of band steps (MFA or PIN) before modifying/erasing online backups.
92
-
- Test 'Recover from Zero' Scenario – test to ensure your business continuity / disaster recovery (BC/DR) can rapidly bring critical business operations online from zero functionality (all systems down). Conduct practice exercises to validate cross-team processes and technical procedures, including out-of-band employee and customer communications (assume all email/chat/etc. is down).
93
-
It's critical to protect (or print) supporting documents and systems required for recovery including restoration procedure documents, CMDBs, network diagrams, SolarWinds instances, etc. Attackers destroy these regularly.
94
-
- Reduce on-premises exposure – by moving data to Azure cloud services with automatic backup & self-service rollback.
95
-
96
-
For comprehensive guidance on preparing for the worst case scenario, including awareness training and SOC readiness, see [Prepare your ransomware recovery plan](/security/ransomware/protect-against-ransomware-phase1).
97
-
98
-
## Azure-specific technical controls for ransomware protection
44
+
## Azure technical controls for ransomware protection
99
45
100
46
Azure provides a wide variety of native technical controls to protect, detect, and respond to ransomware incidents with emphasis on prevention. Organizations running workloads in Azure should leverage these Azure-native capabilities:
Copy file name to clipboardExpand all lines: articles/security/fundamentals/ransomware-protection.md
+9-12Lines changed: 9 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,23 +6,23 @@ ms.service: security
6
6
ms.subservice: security-fundamentals
7
7
ms.topic: article
8
8
ms.author: mbaldwin
9
-
ms.date: 01/06/2026
9
+
ms.date: 02/12/2026
10
10
11
11
---
12
12
13
13
# Ransomware protection in Azure
14
14
15
15
Ransomware and extortion are a high profit, low-cost business, which has a debilitating impact on targeted organizations, national/regional security, economic security, and public health and safety. What started as simple, single-PC ransomware grew to include various extortion techniques directed at all types of corporate networks and cloud platforms.
16
16
17
+
> [!TIP]
18
+
> This article focuses on Azure-specific ransomware protection. For comprehensive guidance across all Microsoft platforms, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
19
+
17
20
To ensure customers running on Azure are protected against ransomware attacks, Microsoft invests heavily in the security of our cloud platforms, and provides security controls you need to protect your Azure cloud workloads.
18
21
19
22
By using Azure native ransomware protections and implementing the best practices recommended in this article, you're taking measures that position your organization to prevent, protect, and detect potential ransomware attacks on your Azure assets.
20
23
21
24
This article lays out key Azure native capabilities and defenses for ransomware attacks and guidance on how to proactively use these to protect your assets on Azure cloud.
22
25
23
-
> [!TIP]
24
-
> For comprehensive ransomware protection guidance across all Microsoft platforms and services, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware). For information about what ransomware is and how it works, see [What is ransomware?](/security/ransomware/human-operated-ransomware)
25
-
26
26
## How Azure cloud resources are targeted
27
27
28
28
When attacking cloud infrastructure, adversaries often attack multiple resources to try to obtain access to customer data or company secrets. The cloud "kill chain" model explains how attackers attempt to gain access to any of your resources running in the public cloud through a four-step process: exposure, access, lateral movement, and actions.
@@ -64,15 +64,12 @@ For detailed information about Azure features that help protect, detect, and res
64
64
65
65
## Next steps
66
66
67
-
For comprehensive ransomware protection guidance across all Microsoft platforms, see [Protect your organization against ransomware and extortion](/security/ransomware/protect-against-ransomware).
67
+
Continue with Azure-specific ransomware protection guidance:
68
68
69
-
Azure-specific ransomware protection articles:
70
-
-[Prepare for a ransomware attack](ransomware-prepare.md)
71
-
-[Detect and respond to ransomware attack](ransomware-detect-respond.md)
72
-
-[Azure features and resources that help you protect, detect, and respond](ransomware-features-resources.md)
69
+
-[Prepare for a ransomware attack](ransomware-prepare.md) - Azure backup and recovery strategies
70
+
-[Detect and respond to ransomware attack](ransomware-detect-respond.md) - Using Microsoft Defender for Cloud
71
+
-[Azure features and resources that help you protect, detect, and respond](ransomware-features-resources.md) - Azure security capabilities
73
72
-[Improve your security defenses for ransomware attacks with Azure Firewall Premium](ransomware-protection-with-azure-firewall.md)
74
-
75
-
Additional resources:
76
-
-[What is ransomware?](/security/ransomware/human-operated-ransomware)
73
+
-[Back up and restore plan to protect against ransomware](backup-plan-to-protect-against-ransomware.md)
Copy file name to clipboardExpand all lines: articles/security/fundamentals/zero-trust.md
+10-3Lines changed: 10 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,21 @@ ms.service: security
6
6
ms.subservice: security-fundamentals
7
7
ms.topic: conceptual
8
8
ms.author: mbaldwin
9
-
ms.date: 11/06/2025
9
+
ms.date: 02/12/2026
10
10
---
11
11
12
12
# Zero Trust security in Azure
13
13
14
-
Zero Trust is a security strategy that assumes breach and verifies each request as though it originated from an uncontrolled network. This article explains how to apply Zero Trust principles to Microsoft Azure infrastructure and services.
14
+
Zero Trust is a security strategy that assumes breach and verifies each request as though it originated from an uncontrolled network. This article introduces Zero Trust principles and how they apply to Microsoft Azure.
15
15
16
-
For comprehensive information about Zero Trust as a security model and its application across Microsoft products, see [What is Zero Trust?](/security/zero-trust/zero-trust-overview).
16
+
> [!TIP]
17
+
> **For comprehensive Zero Trust guidance**, see the [Zero Trust documentation](/security/zero-trust/) which includes:
18
+
> -[What is Zero Trust?](/security/zero-trust/zero-trust-overview) - Core concepts and principles
19
+
> -[Zero Trust for Azure services](/security/zero-trust/azure-infrastructure-overview) - Detailed implementation guidance for Azure IaaS, networking, and workloads
20
+
> -[Zero Trust deployment guidance](/security/zero-trust/deploy/overview) - Technology-pillar specific deployment objectives
0 commit comments