001-identity

IDENTIFY

003-insurance

PROTECT

004-radar

DETECT

005-responsibility

RESPOND

006-clock

RECOVER

You are here:

WHAT IS AN AZURE CYBER SECURITY REVIEW

Many organisations are using Microsoft Azure and in many cases they are using the default setup of the Azure environment thus making it an easy target for cyber criminals. An Azure Cyber Security Review will assess your Azure environment against industry standard CIS Controls and a report will be provided highlighting what controls have passed and any remediation / recommendations necessary.

AZURE CYBER SECURITY

Today’s technology is rapidly adopting cloud technology to assist organisations in moving to a cloud-based or hybrid infrastructure to provide flexible, redundant and cost-effective computing on an enterprise level.

The main issues associated with this technology is its inherent availability and default configuration, which is often exploited by attackers as they can easily access and attack these services with little risk.

Wizard Cyber audits your Azure Network to identify misconfigurations, lack of best practices and secure configurations, allowing you to remediate the vulnerabilities before they are exploited.

CONFIGURATION REVIEW

Our Microsoft certified security professionals will conduct a comprehensive configuration and security review to identify any misconfigurations that may have occurred during the setup or if any significant changes have been made to the Azure Environment that has introduced a security issue.

We will benchmark your Azure environment against the CIS Microsoft Azure recommendations.

CIS benchmarks are configuration baselines and best practices for securely configuring a system developed by CIS, a nonprofit entity whose mission is to ”identify, develop, validate, promote, and sustain best practice solutions for cyber defence.”

Identity and Access Management

Key recommendations include:

  • Multi-factor authentication
  • No guest users
  • Users cannot register applications

Security Center

This section focuses on making sure key alert policies (e.g., ASC Default) are configured.

Storage Accounts

Key recommendations include:

  • Enabling “secure transfer required”
  • Setting default network access rule to “deny”

Database Services

Key recommendations include:

  • “Ensuring Auditing is set to On”
  • “Audit Retention is set to greater than 90 days“
  • “Threat Detection types“ is set to “all“

Logging and Monitoring

A quality logging configuration is imperative to any secure IT environment. This section includes configuration checks to ensure:

  • Logging for Azure Keyvault is enabled
  • Activity Log Retention is set to 365 days or greater
  • Log Profiles exist

Networking

A secure networking configuration is vital in a cloud environment. Some examples of CIS recommendations in this section are:

  • “Ensuring that RDP/SSH access is restricted from the Internet“
  • “Network Security Group Flow log retention is set to greater than 90 days“

Virtual Machine

Key recommendations include ensuring:

  • Disks are encrypted
  • Only approved extensions are installed

AppService

For Azure AppService, there are many recommendations to ensure the latest versions of the software are used as well as authentication and redirects are securely configured.

Other Security Considerations

Other security considerations include:

  • Verifying expiration dates are set for keys and secrets
  • Ensuring resource locks are used where appropriate

WHAT HAPPENS NEXT?

An experienced cyber security consultant will perform a comprehensive audit of the cyber security measures implemented in the organisation. This audit will involve on-site visits and remote access where required. Interviews with senior managers may be conducted to adequately identify and validate the relationship between the people, process and technology controls being used. A comprehensive written audit report will be delivered which documents the status of each security measure and indicates the level of cyber risk in the context of the vulnerability, threat and potential impact. The report will identify actions and recommendations that can be taken to minimise cyber risks.

EXPERT VIEW

We have the widest range of network devices, operating Systems (OS), databases and applications in physical, virtual and cloud infrastructures.

FUTURE IMPROVEMENT

We support non-credentialed, remote scans, credentialed, local scans for deeper, granular analysis and offline auditing.

IDENTIFY & PRIORITISE

450+ templates available to measure against for compliance and configuration. (e.g., FFIEC, HIPAA, NERC, PCI, more) and configuration (e.g., CERT, CIS, COBIT/ITIL, DISA STIGs) auditing.

Book a Cyber Security Review Today

    CYBER SECURITY REVIEW COMMON QUESTIONS

    Here are some questions we are often asked to help you decide

    What is a Azure cyber security review?

    A cyber security review is designed to assess the key aspects of your Azure infrastructure, processes and technical management capabilities, and balance these against the cyber threats that are most relevant to your business

    I am not a customer, can you help?

    Our Cyber Security Review is available for all existing and new customers as a one-off service. We always recommended a Cyber Security Review to all potential customers as it gives you and us an understanding of your current security posture

    What will you find?

    The results always vary massively as all customers are unique and have different levels of current security in place. Azure is used for a variety of reasons and therefore our findings vary for each customer

    What does the Cyber Security Review include?

    Our O365 review includes a full review of your tenancy which tests and benchmarks your configuration against the Microsoft and CIS recommended standard

    What does the report contain?

    The report will contain the results of our findings which are the results from the benchmark tests. We will use Microsoft and CIS Benchmarks to compare your environment against the recommended best practices

    What happens after the report?

    The report will be securely sent to you and a call with your account manager will happen shortly after to talk through the key elements and what the next steps are to start improving your cyber security posture

    If you have any further questions regarding Cyber Security Review, please contact us via email info@wizardcyber.com or 0333 311 0121 

    We also offer the following reviews Cyber Security Review and Office 365 Cyber Security Review

    Contact us for more information

    Please fill out the form below or call us directly on +44 (0) 333 311 0121.

    Loading