Azure Security Tools
Azure AD
Identity & Access Management
Users, Groups, Roles, Conditional Access, MFA, PIM
Create users, roles, policies, enable MFA, enforce least privilege
Azure RBAC
Role-Based Access Control
Granular permissions on resources
Assign roles, audit access, use custom roles
Azure Key Vault
Secret & key management
Store/rotate secrets, certificates, keys, integrate with apps
Encrypt storage, manage secrets, rotate keys
Azure Defender (Microsoft Defender for Cloud)
Threat detection & posture
Monitor resources, alerts on anomalies, integrate with Security Center
Enable policies, investigate alerts, automate remediation
Azure Security Center
Posture management
Secure score, recommendations, regulatory compliance
Track resource compliance, implement recommended controls
Azure Sentinel
SIEM & SOC platform
Centralized logging, analytics, threat detection, SOAR
Connect data sources, create alert rules, respond to incidents
Azure Policy
Governance & compliance
Enforce rules on resource creation, audit configurations
Apply policies for encryption, tagging, allowed locations
Azure Monitor
Monitoring & alerting
Metrics, logs, alerts, Application Insights
Set alerts on security events, monitor anomalies
Azure Firewall
Network security
Fully managed, rules, FQDN filtering, threat intelligence
Secure network segments, log traffic, integrate with SIEM
Azure DDoS Protection
DDoS mitigation
Standard & basic protection, monitoring attacks
Enable on critical resources, monitor metrics
Azure WAF
Web Application Firewall
OWASP protection, custom rules, integration with Front Door/APIM
Protect web apps, configure rule sets, log alerts
Azure Storage Security
Data protection
Encryption, SAS tokens, firewall, soft delete
Enforce encryption, audit access, manage secure sharing
Azure Information Protection (AIP)
Data classification & protection
Label documents/emails, enforce policies, track usage
Classify sensitive data, configure protection policies
Azure Blueprints
Environment deployment & compliance
Pre-configured governance, resource setup
Deploy secure environments, ensure compliance
Last updated