@fincooper
Top Azure security fails and
how to avoid them
Karl Ots, Zure Ltd
@fincooper
Karl Ots
Managing Consultant
karl.ots@zure.com
• Cloud & cybersecurity expert
• User group and conference organizer, podcast hosts
• Patented inventor
• Working on Azure since 2011
• Helped to secure 100+ Azure applications, from startups to
Fortune 500 enterprises
• linkedin.com/in/karlots
@fincooper
What to expect in this session
• Azure security landscape
• Top Azure security fails I have wondered upon in my adventures
• Why are they bad?
• How to fix them?
• Resources to help you secure your Azure environment, regardless of your
current status
@fincooper
With great power comes great responsibility
@fincooper
Security controls for Azure applications
Subscriptions
and Resource
Groups
AAD and RBAC
ARM Templates,
Policies and
Locks
Logging,
Alerting &
Auditing
Data Encryption
Backups &
Disaster
Recovery
Privacy &
Compliance
Network
security
@fincooper
Cloud security: reality check
@fincooper
Role-Based Access Control
Subscription
Resource Groups
Resources
Owner
Can perform all management
operations for a resource and its
child resources including access
management and granting access
to others.
Contributor
Can perform all management
operations for a resource including
create and delete resources. A
contributor cannot grant access to
other.
Reader
Has read-only access to a resource
and its child resources. A reader
cannot read secrets.
@fincooper
Privileged Identity Management
• Identifies users with administrative privileges
• Enables just-in-time administrative access
• Generates reports about elevated role access history
• Requires Azure AD Premium P2
• For all users in the whole AAD Tenant
@fincooper
STRIDE
• Azure removes some of the attack surface, as infrastructure and operations
are handled by Microsoft.
• We can use frameworks such as STRIDE to identify threats:
• Good set of tools at https://www.microsoft.com/en-us/SDL/adopt/tools.aspx
Threat Property Definition
Spoofing Authentication Impersonating something or someone else.
Tampering Integrity Modifying data or code.
Repudiation Non-repudiation Claiming to have not performed an action.
Information Disclosure Confidentiality Exposing information to someone not authorized to see it.
Denial of Service Availability Deny or degrade service to users.
Elevation of Privilege Authorization Gain capabilities without proper authorization.
@fincooper
Security fail #1
• Every user is an Owner
• …In the Subscription scope
• STRIDE threat categorization:
• Tampering
• Information Disclosure
• Mitigation:
• Default access scope should be Resource Group, not Subscription
• Default RBAC access should be Contributor, not Owner
@fincooper
Security fail #2
• Service Principals have too wide privileges
• STRIDE threat categorization:
• Repudiation
• Mitigation:
• Service Principal RBAC assignments should follow the least privileged principle
• Service Principals should NOT be granted access in the Subscription scope
• Service Principals should NOT be granted Owner access in any scope
@fincooper
Security fail #3
• Untrusted authorization provider being used
• (Microsoft Account, Gmail, unmanaged Azure AD…)
• STRIDE threat categorization:
• Spoofing
• Elevation of Privilege
• Mitigation:
• Always use trusted Azure AD authentication that is managed by your organization
• Monitor Azure Subscription access using AAD PIM
@fincooper
Security fail #4
• Unprotected public endpoints
• HTTP / RDP / SSH
• STRIDE threat categorization:
• Information Disclosure
• Denial of Service
• Mitigation:
• Every public IP is a risk and should be carefully reviewed
• Use Network Security Groups to control access to / from virtual machines
• Use Azure Security Center’s Just-in-time access to dynamically change NSG rules
• Use Web Application Firewall to control access to public HTTP endpoints
@fincooper
Security fail #5
• Storage access keys used directly
• STRIDE threat categorization:
• Information Disclosure
• Tampering
• Repudiation
• Mitigation:
• Storage Access Keys should be stored in Azure Key Vault and rotated programmatically
• Restrict access to Microsoft.Storage/storageAccounts/listkeys/action using RBAC
@fincooper
Security fail #6
• No monitoring or alerting
• STRIDE threat categorization:
• Repudiation
• Denial of Service
• Mitigation:
• Configure Activity Log retention, default is only 90 days!
• Enable Application Insight Smart Alerts
• Enable Advanced Treat Protection
• Enable Azure SQL Audit logging
• Monitor all HTTP endpoint traffic with with Application Gateway / WAF
@fincooper
Security fail #7
• Missing Virtual Machine updates
• STRIDE threat categorization:
• Information Disclosure
• Elevation of Privilege
• Mitigation:
• Update management
• Azure Security Center
@fincooper
DEMO
“How to avoid them”
@fincooper
Secure DevOps kit for Azure (AzSK)
• Set of tools for assessing the security posture of your Azure environment
• Built by Microsoft Core Services Engineering
• Used to secure 1000+ Azure subscriptions at Microsoft
• Easy to get started with non-intrusive vulnerability scans, expands end-to-
end tooling from developer machine to CI/CD to continuous assurance
@fincooper
Materials
• My slides: slideshare.net/karlots
• Secure DevOps Kit for Azure:
• azsk.azurewebsites.net
• Microsoft Ignite 2018 session THR2104 Assess your Microsoft Azure security like a pro
• STRIDE Threat Modeling Lessons from Star Wars:
• youtube.com/watch?v=Y3VQpg04vXo
• Azure Security and Compliance Blueprint (not Azure Blueprint):
• docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview
• Azure Virtual Datacenter:
• docs.microsoft.com/en-us/azure/architecture/vdc/
@fincooper
UpdateConf 2018: Top 18 Azure security fails and how to avoid them

More Related Content

PDF
introduction to Azure Sentinel
PDF
Top 18 azure security fails and how to avoid them
PDF
Top Azure security fails and how to avoid them
PDF
IglooConf 2019 Secure your Azure applications like a pro
PDF
BeyondCorp and Zero Trust
PPTX
Threat Hunting on AWS using Azure Sentinel
PDF
[OWASP Poland Day] Embedding security into SDLC + GDPR
PDF
BeyondCorp and Zero Trust
introduction to Azure Sentinel
Top 18 azure security fails and how to avoid them
Top Azure security fails and how to avoid them
IglooConf 2019 Secure your Azure applications like a pro
BeyondCorp and Zero Trust
Threat Hunting on AWS using Azure Sentinel
[OWASP Poland Day] Embedding security into SDLC + GDPR
BeyondCorp and Zero Trust

What's hot (20)

PDF
BeyondCorp Seattle Meetup: Closing the Adherence Gap
PDF
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
PPTX
Security as an Enabler for the Digital World - CISO Perspective
PPTX
Jason Kent - AppSec Without Additional Tools
PDF
BeyondCorp - Google Security for Everyone Else
PPTX
MCAS High Level Architecture May 2021
PPTX
AWS Security Strategy
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PDF
BeyondCorp Myths: Busted
PPTX
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
PPTX
Data-driven Security: Protect APIs from Adaptive Threats
PPTX
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
PDF
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
PPTX
Modern Security Operations & Common Roles/Competencies
PDF
BeyondCorp New York Meetup: Closing the Adherence Gap
PPTX
Data-driven API Security
PPTX
CSS 17: NYC - Protecting your Web Applications
PPTX
#ALSummit: Realities of Security in the Cloud
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PDF
Securing Healthcare Data on AWS for HIPAA
BeyondCorp Seattle Meetup: Closing the Adherence Gap
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Security as an Enabler for the Digital World - CISO Perspective
Jason Kent - AppSec Without Additional Tools
BeyondCorp - Google Security for Everyone Else
MCAS High Level Architecture May 2021
AWS Security Strategy
CSS 17: NYC - Realities of Security in the Cloud
BeyondCorp Myths: Busted
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
Data-driven Security: Protect APIs from Adaptive Threats
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Modern Security Operations & Common Roles/Competencies
BeyondCorp New York Meetup: Closing the Adherence Gap
Data-driven API Security
CSS 17: NYC - Protecting your Web Applications
#ALSummit: Realities of Security in the Cloud
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Securing Healthcare Data on AWS for HIPAA

Similar to UpdateConf 2018: Top 18 Azure security fails and how to avoid them (20)

PDF
Techorama Belgium 2019: top Azure security fails and how to avoid them
PDF
DevSum - Top Azure security fails and how to avoid them
PDF
IT Camp 19: Top Azure security fails and how to avoid them
PDF
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
PDF
TechDays Finland 2020: Azuren tietoturva haltuun!
PDF
FAUG #9: Azure security architecture and stories from the trenches
PDF
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
PPTX
Make your Azure PaaS Deployment More Safe
PPTX
5 steps to securing your identity infrastructure.pptx
PPTX
Shared Security Responsibility for the Azure Cloud
PPTX
Azure Fundamentals Part 3
 
PDF
Experts Live Norway - Azure Infrastructure Security
PPTX
Top 13 best security practices
PPTX
Implementing Zero Trust strategy with Azure
PDF
Azure security architecture
PPTX
Top 10 Azure Security Best Practices (1).pptx
PDF
Microsoft Zero Trust
PDF
CSS17: Houston - Azure Shared Security Model Overview
PPT
Application Threat Modeling
PDF
Azure Security Overview
Techorama Belgium 2019: top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid them
IT Camp 19: Top Azure security fails and how to avoid them
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
TechDays Finland 2020: Azuren tietoturva haltuun!
FAUG #9: Azure security architecture and stories from the trenches
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Make your Azure PaaS Deployment More Safe
5 steps to securing your identity infrastructure.pptx
Shared Security Responsibility for the Azure Cloud
Azure Fundamentals Part 3
 
Experts Live Norway - Azure Infrastructure Security
Top 13 best security practices
Implementing Zero Trust strategy with Azure
Azure security architecture
Top 10 Azure Security Best Practices (1).pptx
Microsoft Zero Trust
CSS17: Houston - Azure Shared Security Model Overview
Application Threat Modeling
Azure Security Overview

More from Karl Ots (20)

PDF
TechDays Finland 2020: Best practices of securing web applications running on...
PDF
IglooConf 2020: Best practices of securing web applications running on Azure ...
PDF
Building an Enterprise-Grade Azure Governance Model
PDF
CloudBurst Malmö: Best practices of securing web applications running on Azur...
PDF
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
PDF
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
PDF
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
PDF
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
PDF
Monitoring real-life Azure applications: When to use what and why
PDF
Azure Saturday: Security + DevOps + Azure = Awesomeness
PDF
Navigating in the sea of containers in azure when to choose which service and...
PDF
Kubernetes in Azure
PDF
Azure security architecture / FAUG JKL 15.2.2018
PDF
Securing Azure Infrastructure
PDF
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
PDF
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
PDF
Building globally scalable media solutions with Azure Media Services part 2
PDF
Security + DevOps + Azure = Awesomeness
PPTX
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
PPTX
Sovellusmodernisoinnin webinaarisarja, osa 2: liiketoimintasovelluksen modern...
TechDays Finland 2020: Best practices of securing web applications running on...
IglooConf 2020: Best practices of securing web applications running on Azure ...
Building an Enterprise-Grade Azure Governance Model
CloudBurst Malmö: Best practices of securing web applications running on Azur...
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
Monitoring real-life Azure applications: When to use what and why
Azure Saturday: Security + DevOps + Azure = Awesomeness
Navigating in the sea of containers in azure when to choose which service and...
Kubernetes in Azure
Azure security architecture / FAUG JKL 15.2.2018
Securing Azure Infrastructure
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
Building globally scalable media solutions with Azure Media Services part 2
Security + DevOps + Azure = Awesomeness
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
Sovellusmodernisoinnin webinaarisarja, osa 2: liiketoimintasovelluksen modern...

Recently uploaded (20)

PDF
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
PPTX
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
PDF
1_Keynote_Breaking Barriers_한계를 넘어서_Charith Mendis.pdf
PDF
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
PDF
Child-friendly e-learning for artificial intelligence education in Indonesia:...
PPTX
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
PPTX
Information-Technology-in-Human-Society (2).pptx
PPT
Overviiew on Intellectual property right
PDF
Introduction to c language from lecture slides
PPTX
Report in SIP_Distance_Learning_Technology_Impact.pptx
PDF
FASHION-DRIVEN TEXTILES AS A CRYSTAL OF A NEW STREAM FOR STAKEHOLDER CAPITALI...
PDF
Altius execution marketplace concept.pdf
PDF
Peak of Data & AI Encore: Scalable Design & Infrastructure
PDF
The Digital Engine Room: Unlocking APAC’s Economic and Digital Potential thro...
PDF
Advancements in abstractive text summarization: a deep learning approach
PDF
Examining Bias in AI Generated News Content.pdf
PDF
Be ready for tomorrow’s needs with a longer-lasting, higher-performing PC
PDF
Revolutionizing recommendations a survey: a comprehensive exploration of mode...
PDF
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
PPTX
Blending method and technology for hydrogen.pptx
Uncertainty-aware contextual multi-armed bandits for recommendations in e-com...
Rise of the Digital Control Grid Zeee Media and Hope and Tivon FTWProject.com
1_Keynote_Breaking Barriers_한계를 넘어서_Charith Mendis.pdf
CCUS-as-the-Missing-Link-to-Net-Zero_AksCurious.pdf
Child-friendly e-learning for artificial intelligence education in Indonesia:...
Slides World Game (s) Great Redesign Eco Economic Epochs.pptx
Information-Technology-in-Human-Society (2).pptx
Overviiew on Intellectual property right
Introduction to c language from lecture slides
Report in SIP_Distance_Learning_Technology_Impact.pptx
FASHION-DRIVEN TEXTILES AS A CRYSTAL OF A NEW STREAM FOR STAKEHOLDER CAPITALI...
Altius execution marketplace concept.pdf
Peak of Data & AI Encore: Scalable Design & Infrastructure
The Digital Engine Room: Unlocking APAC’s Economic and Digital Potential thro...
Advancements in abstractive text summarization: a deep learning approach
Examining Bias in AI Generated News Content.pdf
Be ready for tomorrow’s needs with a longer-lasting, higher-performing PC
Revolutionizing recommendations a survey: a comprehensive exploration of mode...
Slides World Game (s) Great Redesign Eco Economic Epochs.pdf
Blending method and technology for hydrogen.pptx

UpdateConf 2018: Top 18 Azure security fails and how to avoid them

  • 1. @fincooper Top Azure security fails and how to avoid them Karl Ots, Zure Ltd
  • 2. @fincooper Karl Ots Managing Consultant [email protected] Cloud & cybersecurity expert • User group and conference organizer, podcast hosts • Patented inventor • Working on Azure since 2011 • Helped to secure 100+ Azure applications, from startups to Fortune 500 enterprises • linkedin.com/in/karlots
  • 3. @fincooper What to expect in this session • Azure security landscape • Top Azure security fails I have wondered upon in my adventures • Why are they bad? • How to fix them? • Resources to help you secure your Azure environment, regardless of your current status
  • 4. @fincooper With great power comes great responsibility
  • 5. @fincooper Security controls for Azure applications Subscriptions and Resource Groups AAD and RBAC ARM Templates, Policies and Locks Logging, Alerting & Auditing Data Encryption Backups & Disaster Recovery Privacy & Compliance Network security
  • 7. @fincooper Role-Based Access Control Subscription Resource Groups Resources Owner Can perform all management operations for a resource and its child resources including access management and granting access to others. Contributor Can perform all management operations for a resource including create and delete resources. A contributor cannot grant access to other. Reader Has read-only access to a resource and its child resources. A reader cannot read secrets.
  • 8. @fincooper Privileged Identity Management • Identifies users with administrative privileges • Enables just-in-time administrative access • Generates reports about elevated role access history • Requires Azure AD Premium P2 • For all users in the whole AAD Tenant
  • 9. @fincooper STRIDE • Azure removes some of the attack surface, as infrastructure and operations are handled by Microsoft. • We can use frameworks such as STRIDE to identify threats: • Good set of tools at https://www.microsoft.com/en-us/SDL/adopt/tools.aspx Threat Property Definition Spoofing Authentication Impersonating something or someone else. Tampering Integrity Modifying data or code. Repudiation Non-repudiation Claiming to have not performed an action. Information Disclosure Confidentiality Exposing information to someone not authorized to see it. Denial of Service Availability Deny or degrade service to users. Elevation of Privilege Authorization Gain capabilities without proper authorization.
  • 10. @fincooper Security fail #1 • Every user is an Owner • …In the Subscription scope • STRIDE threat categorization: • Tampering • Information Disclosure • Mitigation: • Default access scope should be Resource Group, not Subscription • Default RBAC access should be Contributor, not Owner
  • 11. @fincooper Security fail #2 • Service Principals have too wide privileges • STRIDE threat categorization: • Repudiation • Mitigation: • Service Principal RBAC assignments should follow the least privileged principle • Service Principals should NOT be granted access in the Subscription scope • Service Principals should NOT be granted Owner access in any scope
  • 12. @fincooper Security fail #3 • Untrusted authorization provider being used • (Microsoft Account, Gmail, unmanaged Azure AD…) • STRIDE threat categorization: • Spoofing • Elevation of Privilege • Mitigation: • Always use trusted Azure AD authentication that is managed by your organization • Monitor Azure Subscription access using AAD PIM
  • 13. @fincooper Security fail #4 • Unprotected public endpoints • HTTP / RDP / SSH • STRIDE threat categorization: • Information Disclosure • Denial of Service • Mitigation: • Every public IP is a risk and should be carefully reviewed • Use Network Security Groups to control access to / from virtual machines • Use Azure Security Center’s Just-in-time access to dynamically change NSG rules • Use Web Application Firewall to control access to public HTTP endpoints
  • 14. @fincooper Security fail #5 • Storage access keys used directly • STRIDE threat categorization: • Information Disclosure • Tampering • Repudiation • Mitigation: • Storage Access Keys should be stored in Azure Key Vault and rotated programmatically • Restrict access to Microsoft.Storage/storageAccounts/listkeys/action using RBAC
  • 15. @fincooper Security fail #6 • No monitoring or alerting • STRIDE threat categorization: • Repudiation • Denial of Service • Mitigation: • Configure Activity Log retention, default is only 90 days! • Enable Application Insight Smart Alerts • Enable Advanced Treat Protection • Enable Azure SQL Audit logging • Monitor all HTTP endpoint traffic with with Application Gateway / WAF
  • 16. @fincooper Security fail #7 • Missing Virtual Machine updates • STRIDE threat categorization: • Information Disclosure • Elevation of Privilege • Mitigation: • Update management • Azure Security Center
  • 18. @fincooper Secure DevOps kit for Azure (AzSK) • Set of tools for assessing the security posture of your Azure environment • Built by Microsoft Core Services Engineering • Used to secure 1000+ Azure subscriptions at Microsoft • Easy to get started with non-intrusive vulnerability scans, expands end-to- end tooling from developer machine to CI/CD to continuous assurance
  • 19. @fincooper Materials • My slides: slideshare.net/karlots • Secure DevOps Kit for Azure: • azsk.azurewebsites.net • Microsoft Ignite 2018 session THR2104 Assess your Microsoft Azure security like a pro • STRIDE Threat Modeling Lessons from Star Wars: • youtube.com/watch?v=Y3VQpg04vXo • Azure Security and Compliance Blueprint (not Azure Blueprint): • docs.microsoft.com/en-us/azure/security/blueprints/gdpr-paaswa-overview • Azure Virtual Datacenter: • docs.microsoft.com/en-us/azure/architecture/vdc/