Skip to content

Commit 41f52bc

Browse files
authored
Merge pull request #53059 from R-C-Stewart/refresh-security-compute
end to end module refresh
2 parents a6cc54a + 722a285 commit 41f52bc

13 files changed

Lines changed: 429 additions & 284 deletions

learn-pr/wwl-azure/advanced-security-compute/includes/1-introduction.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,23 +2,23 @@ This module is designed to provide administrators with the knowledge and skills
22

33
## Scenario
44

5-
Imagine you are a cloud security specialist responsible for securing Azure compute resources in your organization. Your organization relies on virtual machines, container services, and APIs, and you need to ensure that these resources are protected against unauthorized access and security vulnerabilities.
5+
Imagine you're a cloud security specialist responsible for securing Azure compute resources in your organization. Your organization relies on virtual machines, container services, and APIs, and you need to ensure that these resources are protected against unauthorized access and security vulnerabilities.
66

77
## Learning objectives
88

9-
By the end of this module, participants will be able to:
9+
By the end of this module, participants are able to:
1010

11-
- Plan and implement advanced security measures for Azure compute resources to protect against vulnerabilities and attacks.
12-
- Configure remote access to public endpoints using Azure Bastion and just-in-time (JIT) virtual machine (VM) access to enhance access control.
13-
- Implement network isolation for Azure Kubernetes Service (AKS) to secure containerized applications.
14-
- Secure and monitor AKS clusters to ensure the integrity of container workloads.
15-
- Configure authentication for AKS to control access to Kubernetes resources.
16-
- Configure security monitoring for Azure Container Instances (ACIs) to detect and respond to threats.
17-
- Establish security monitoring for Azure Container Apps (ACAs) to safeguard serverless applications.
18-
- Manage access to Azure Container Registry (ACR) to control container image access and distribution.
19-
- Configure disk encryption, including Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption, to protect data at rest.
20-
- Provide informed recommendations for security configurations in Azure API Management to protect APIs and manage access effectively.
11+
- Plan and implement advanced security measures for Azure compute resources to protect against vulnerabilities and attacks.
12+
- Configure secure remote access to virtual machines using Azure Bastion (Developer, Basic, Standard, and Premium) and just-in-time (JIT) virtual machine (VM) access to enhance access control.
13+
- Implement network isolation for Azure Kubernetes Service (AKS) to secure containerized applications.
14+
- Secure and monitor AKS clusters to ensure the integrity of container workloads.
15+
- Configure authentication for AKS using workload identity and Microsoft Entra ID to control access to Kubernetes resources and Azure services.
16+
- Configure security monitoring for Azure Container Instances (ACIs) to detect and respond to threats.
17+
- Establish security monitoring for Azure Container Apps (ACAs) to safeguard serverless applications.
18+
- Manage access to Azure Container Registry (ACR) to control container image access and distribution.
19+
- Configure disk encryption, including Azure Disk Encryption (ADE), encryption at host, and confidential disk encryption, to protect data at rest.
20+
- Recommend security configurations in Azure API Management to protect APIs and manage access effectively.
2121

2222
## Goals
2323

24-
The module aims to equip participants with the knowledge and expertise necessary to design, implement, and manage advanced security measures for Azure compute resources. Participants will be able to secure access, monitor for threats, and implement encryption solutions across various Azure compute services, ultimately enhancing the security posture of their organization's applications and data.
24+
The module aims to equip participants with the knowledge and expertise necessary to design, implement, and manage advanced security measures for Azure compute resources. Participants are able to secure access, monitor for threats, and implement encryption solutions across various Azure compute services, ultimately enhancing the security posture of their organization's applications and data.

learn-pr/wwl-azure/advanced-security-compute/includes/10-azure-data-encryption.md

Lines changed: 27 additions & 27 deletions
Large diffs are not rendered by default.

learn-pr/wwl-azure/advanced-security-compute/includes/11-azure-security-baseline-api-management.md

Lines changed: 38 additions & 35 deletions
Large diffs are not rendered by default.
Lines changed: 75 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,75 @@
1-
In this module, you learned how to plan and implement advanced security measures for Azure compute resources, including enabling secure remote access using Azure Bastion and just-in-time (JIT) VM access, configuring network isolation for Azure Kubernetes Service (AKS), securing and monitoring AKS clusters, configuring authentication and security monitoring for container instances and apps, managing access to Azure Container Registry (ACR), implementing disk encryption strategies such as Azure Disk Encryption (ADE) and confidential disk encryption, and providing recommendations for securing Azure API Management.
1+
In this module, you learned how to plan and implement advanced security measures for Azure compute resources to protect against vulnerabilities and evolving security threats.
2+
3+
## Key learnings
4+
5+
You explored comprehensive security strategies across multiple Azure compute services:
6+
7+
### Secure remote access
8+
- **Azure Bastion** provides secure RDP/SSH access without exposing virtual machines to the public internet, with four SKU tiers:
9+
- **Developer SKU**: Cost-effective option for dev/test scenarios (two concurrent connections)
10+
- **Basic SKU**: Standard secure remote access (no native client support)
11+
- **Standard SKU**: Enhanced features including native client support and shareable links
12+
- **Premium SKU**: Advanced capabilities including session recording, private-only deployment, and custom port support
13+
- **Just-in-time (JIT) VM access** reduces attack surfaces by providing time-limited access to virtual machines
14+
15+
### Azure Kubernetes Service (AKS) security
16+
- **Workload identity** with OIDC federation provides secure authentication to Azure resources (replaces deprecated pod-managed identity)
17+
- **Network isolation** through network policies controls pod-to-pod communication
18+
- **Pod Security Standards** enforce security policies at the pod level
19+
- **AKS Automatic** offers simplified, production-ready cluster configuration
20+
- **Azure Linux 3** should be used as Azure Linux 2.0 support ends November 30, 2025
21+
22+
### Container security and monitoring
23+
- **Microsoft Defender for Containers** provides comprehensive threat protection across five core domains:
24+
- Cloud security posture management
25+
- Vulnerability assessment powered by Microsoft Defender Vulnerability Management (MDVM)
26+
- Run-time threat detection
27+
- Kubernetes environment hardening
28+
- Software supply chain protection
29+
- **Container insights** (a feature of Azure Monitor) provides performance and health monitoring for container workloads
30+
- **Gated deployment** (GA) prevents vulnerable images from being deployed to production
31+
- **Runtime container scanning** (GA) provides continuous vulnerability assessment
32+
33+
### Container registry security
34+
- **Azure Container Registry (ACR)** supports seven built-in RBAC roles for granular access control
35+
- **Authentication methods** include Microsoft Entra identities, repository-scoped permissions, and admin accounts
36+
- **Integration with Microsoft Entra ID** enables centralized identity management
37+
38+
### Data protection
39+
- **Azure Disk Encryption (ADE)** uses BitLocker (Windows) and dm-crypt (Linux) to encrypt VM disks
40+
- **Encryption at host** provides end-to-end encryption for VM data
41+
- **Confidential disk encryption** protects sensitive workloads with hardware-based security
42+
- **Azure Key Vault** serves as centralized key and certificate management
43+
- **Envelope encryption** with DEK/KEK hierarchy provides layered data protection
44+
45+
### API security
46+
- **Azure API Management** security baseline aligns with Microsoft Cloud Security Benchmark (v2 preview available)
47+
- **Virtual Network integration** enables internal or external network configurations
48+
- **Private endpoints** provide secure access without public exposure
49+
- **Microsoft Entra ID integration** enables OAuth 2.0 authentication for APIs
50+
- **Managed identities** simplify secure access to Azure resources like Key Vault
51+
52+
## Best practices applied
53+
54+
Throughout this module, you learned to apply security best practices:
55+
56+
- Use **workload identity** instead of deprecated pod-managed identity for AKS authentication
57+
- Enable **Microsoft Entra ID** authentication over local authentication methods wherever possible
58+
- Implement **least privilege access** using Azure RBAC for granular permission control
59+
- Use **managed identities** to avoid storing credentials in code or configuration
60+
- Enable **encryption at rest** and **encryption in transit** for all sensitive data
61+
- Deploy **private endpoints** to keep traffic off the public internet
62+
- Monitor with **Microsoft Defender for Containers** and **Container insights** for comprehensive visibility
63+
- Apply **network policies** to enforce micro-segmentation in AKS clusters
64+
- Store **secrets and keys in Azure Key Vault** rather than in application code
65+
- Use **Azure Policy** to enforce security configurations across resources
66+
67+
## Next steps
68+
69+
To continue strengthening your Azure security expertise:
70+
71+
- Explore [Microsoft Defender for Cloud](/azure/defender-for-cloud/) for unified security management
72+
- Review [Azure security baselines](/security/benchmark/azure/security-baselines-overview) for service-specific guidance
73+
- Implement [Microsoft Cloud Security Benchmark](/security/benchmark/azure/overview) controls in your environment
74+
- Learn about [Azure confidential computing](/azure/confidential-computing/) for protecting data in use
75+
- Configure [Azure Policy](/azure/governance/policy/) to enforce organizational security standards

0 commit comments

Comments
 (0)