Identity and Access Management policies
are the first step towards a defense-in-depth approach to securing an Azure Cloud Platform
environment. Our engineers will lookout for IAM Policies misconfigurations, MFA misconfigurations, Azure Active directory misconfigruations etc
Azure Configuration Review
SecOrigin follows Azure CIS Benchmarks to perform the cloud configuration review and help organizations to avoid cloud security pitfalls. CIS Microsoft Azure Foundations Security Benchmark, provides
prescriptive guidance for establishing a secure baseline configuration for Microsoft Azure.

This phase includes analysis of miconfigurations in Security center , Storage accounts configurations
This phase involves the log metric enablement and monitoring of different changes in configuration of different Azure Services like Network security group changes, Create or update Security policy , create or delete any resource etc
This phase includes analysis of misconfiguration in database services like encryption at rest , in transit etc. Apart from that, this phase also includes analysis of different network ruleset such as inbound and outbound access controls implemented between virtual networks, sunbnets , peers etc.
This phase includes analysis of misconfigurations around Virtual Machines, App services and other security considerations in Azure environment
We will provide two kind of report and flexible with logging all the issues on any Bug-ticketing platform such as JIRA. We will provide weekly tracker updates and also provide you detailed executive summary.