Back to Resources

Security tipsTechnical Resources


5 Steps to a Secure Cloud with Azure Security Center

How long does it really take it to monitor, detect and implement security for your cloud workloads?

Written by: Trend Micro   January 27, 2017
Since its release in 2016, the Azure Security Center has provided an easy way to monitor and manage the security of all your Azure subscriptions. Its many benefits include integrated security events, logging and monitoring and alerts from partner solutions to help detect threats that might have otherwise gone unnoticed. But how long does it really take it to monitor, detect and implement security for your cloud workloads? We take you through Azure Security Center to see how simple it can be to maintain a secure Azure environment.
Accessing Azure Security Center
Security Center can be accessed by logging in through the Azure portal. There, you can define and set policies for your subscriptions, tailored to the applications your using and your organizations security requirements.  
Setting Security Policies
When setting a security policy, it can be applied either to the entire subscription or to individual resource groups, depending on the needed level of security for each resource. Additionally, policies can be set for subscriptions with custom settings to a resource group within the subscription. Simply select Prevention Policy and turn on or off your set of controls most relevant to the needs of your workloads.
Leveraging Your Recommendations
Setting your security policy will analyze the state of your security and trigger a set of security insights across your environment. The home of your Security Center will show potential vulnerabilities and a list of recommendations specific to areas of the exposed source. In the example below, you can see Azure Security Center has identified issues in virtual machines, networks, data and applications. Selecting the flagged vulnerability will bring you to a pane with a breakdown of issues by resource. From here, you can view Security Center recommendations and implement tools to fill the gap in your security. In the following example, Deep Security can be applied to remediate vulnerabilities in endpoint protection. It allows you to select and apply protection to a subset or all of your virtual machines within seconds. To summarize, let’s break down these actions step by step.
  1. Log on to Azure Security Center
  2. Access Policy and set your security policies by subscription or resource group
  3. Review vulnerabilities in Recommendations
  4. Click each recommendation and select source(s) to install protection
  5. Apply protection
So there it is; simple cloud security in 5 steps. Cloud security doesn’t have to be a lengthy process. With Azure Security Center and Deep Security, secure workloads are just a few clicks away.

Trend Micro

  •  
  •  
  •