Azure Configuration Review

SecOrigin follows Azure CIS Benchmarks to perform the cloud configuration review and help organizations to avoid cloud security pitfalls. CIS Microsoft Azure Foundations Security Benchmark, provides
prescriptive guidance for establishing a secure baseline configuration for Microsoft Azure.

Phase 1
Identity and Access Management

Identity and Access Management policies
are the first step towards a defense-in-depth approach to securing an Azure Cloud Platform
environment. Our engineers will lookout for IAM Policies misconfigurations, MFA misconfigurations, Azure Active directory misconfigruations etc

Phase 2
Security Center & Storage Accounts

This phase includes analysis of miconfigurations in Security center , Storage accounts configurations

Phase 3
Logging & Monitoring

This phase involves the log metric enablement and monitoring of different changes in configuration of different Azure Services like Network security group changes, Create or update Security policy , create or delete any resource etc

Phase 4
Database Services & Networking

This phase includes analysis of misconfiguration in database services like encryption at rest , in transit etc. Apart from that, this phase also includes analysis of different network ruleset such as inbound and outbound access controls implemented between virtual networks, sunbnets , peers etc.

Phase 5
Best practices

This phase includes analysis of misconfigurations around Virtual Machines, App services and other security considerations in Azure environment

Phase 6
Reporting

We will provide two kind of report and flexible with logging all the issues on any Bug-ticketing platform such as JIRA. We will provide weekly tracker updates and also provide you detailed executive summary.

Our Services

Vulnerability Management

Assessment

Cloud Security

Security Compliances

Source Code Review

Digital Forensics

Contact Us