Platform Security
This section describes the design decisions associated with security components of platform services such as identity, data and overarching platform monitoring threat detection and response, Endpoint security monitoring and protection, security of Hosted Services including IaaS and PaaS workloads across cloud platform providers (Azure, AWS, etc.), and Web Services (SaaS workloads) including both Microsoft 365 and other third party cloud apps for system(s) built using ASD's Blueprint for Secure Cloud.
Estimated reading time: 1 minute
Information Technology (IT) Security refers to protection of networks, servers, intranets, data systems, data and computer systems. To protect these items Microsoft Azure contains several security features and products which together:
- Secure the Platform – Microsoft Azure and Office 365, through their features and products, enable security in depth.
- Provide Risk Assessments – Entra ID Protection, Defender for Identity and Microsoft Defender for Endpoint utilise analytics and machine learning to detect and flag unusual/risky behaviour.
- Provide Visibility into User Behaviour – Defender for Cloud Apps provides security operations dashboards which provide visibility into the activities being undertaken within the environment.
- Control Data Exfiltration – Data Loss Prevention policies and Defender for Cloud Apps session policies control the flow and protection of information inside and outside of the environment.
Endpoints and Devices
This section describes the design decisions associated with managing endpoint security for system(s) built using ASD's Blueprint for Secure Cloud.
Web Filtering
This section describes the design decisions associated with managing endpoint security for system(s) built using ASD's Blueprint for Secure Cloud.
Web Services
This section describes the design decisions associated with securing Web Services or cloud Software as a Services (SaaS) applications including Microsoft and other third party services for system(s) built using ASD's Blueprint for Secure Cloud.
Identity Security
This section covers the security features associated with ensuring configuration of identity management is effectively monitored and audited and threats can be identified and responded to correctly for system(s) built using ASD's Blueprint for Secure Cloud.
Data Security
This section describes the design decisions associated with managing data security for system(s) built using ASD's Blueprint for Secure Cloud.
Platform Monitoring and Auditing
This section articulates how security monitoring, compliance, threat detection and response from Hosted Services, Web Services, Platform Data and Identity and Endpoints come together in a centralised cloud security solution for platform security operations and audit for system(s) built using ASD's Blueprint for Secure Cloud.
SIEM
This section describes the design decisions associated with Security Information and Event Monitoring for system(s) built using ASD's Blueprint for Secure Cloud.