My colleague Sasha Kranjac here on TechGenix recently filled us in on what’s been happening with Azure Sentinel, Microsoft’s intelligent cloud-native security information and event manager (SIEM) platform that lets you use AI to analyze large volumes of data across your enterprise. In this article, Sasha will do the same for us with Azure Security Center, Microsoft’s tool for managing security posture and threat protection for hybrid cloud workloads. Sasha is CEO and cloud security architect at the up-and-coming cybersecurity company Kloudatech and he is a Microsoft Most Valuable Professional (MVP), Microsoft Certified Trainer (MCT), MCT Regional Lead, and a Certified EC-Council Instructor (CEI). He can be found on Twitter: @SashaKranjac.
We are already into 2021 and the dust has not settled yet from last September 22-24, where we witnessed the first part of the Microsoft Ignite conference as a fully digital event. There were a lot of news and announcements made at that event and we already covered Azure Sentinel news in an earlier article.
The second part of Microsoft Ignite is March 2-4. Similarly, it will be a digital event and I expect it to be, as its older sibling was, full of the latest technical announcements not just from Microsoft but from Microsoft’s partners as well.
As we anticipate the second part of one of the most important Microsoft conferences, let us look at some very interesting enhancements in Azure Security Center revealed a few months ago at the last event.
One of the biggest changes Azure Security Center users immediately notice is its visual overhaul, needed to accommodate not only branding changes but because new functionality needed its place too:
General, Cloud Security, and Management are three distinct parts of newly redesigned menu blades, containing specialized blades for management, protection, and security insight posture.
General blade shows refreshed and better-organized Overview dashboard and information, where each Cloud Security menu blade has its own dashboard, together with Inventory dashboard, too. Of course, each dashboard is still clickable, opening its respective pages instantly. Secure Score status is calculated based on simplified points and displayed as a percentage. The percentage-based score is present not only in Azure but in other products and features, like Compliance and Security in Microsoft 365, and it provides a better understanding of the status and enables administrators to follow trends and compare statuses more easily.
The other two dashboards that are placed on the far right of the Overview page, reveal valuable information: Insights and Controls with the highest potential increase of the Secure score:
Insights dashboard shows most prevalent recommendations by resources, enabling you to identify the most frequent recommendations and their number, while Controls with the highest potential increase show you top security risks and potential score increase in points and percentage, in case all recommendations of a control group have been fixed.
The release of Azure Defender follows the product family branding and it covers a range of plans offering a wide range of protection across service, data, and compute layers of the Azure environment:
- Azure Defender for App Service.
- Azure Defender for Servers.
- Azure Defender Storage.
- Azure Defender for Key Vault.
- Azure Defender for DNS.
- Azure Defender for Resource Manager.
- Azure Defender for SQL.
- Azure Defender for Kubernetes.
- Azure Defender for container registries.
Now, introduced security settings are available across services in the Security group, under the Security blade:
Services with recommendations that are shown in Azure Security Center have similar experience and content, and they share common color-coding for quick identification, categorization, and triaging of events. They have been present since the birth of Azure Security Center. Recommendations, Security Alerts, and Findings display a number of events at the top, with additional Recommendation descriptions in the middle, with the inevitable and welcome link to ASC Recommendations blade. At the bottom, Vulnerability assessment findings show security check findings and their respective severity level.
While in Recommendations, for easier item identification and assessment, you have the option to group recommendations by controls (turned ON in first screenshot below) or leave it ungrouped, showing the most critical fixes at the top (turned OFF in second screenshot below):
One of the requested functionalities in Azure Security Center was an option to create an exemption from recommendations and from Secure Score for a specific resource. In the special situation where you have a resource that does not need to be listed as unhealthy and to prevent a negative score impact, we can now exclude such a resource from being observed:
Now, the Create Exemption feature is still in the preview phase and its lack of options might change in the future. You can set an expiration date and select one of the two exemption categories, resolve and exemption, through a third party or accept the risk of exempting a recommendation:
Either way, ensure that by exempting a resource from being shown in ASC recommendations you do not lower or otherwise negatively impact the security posture of your Azure environment.
Azure Security Center enhancements include multicloud security position management with the help of Azure Arc and, after connecting, Azure Security Center can show recommendations from Amazon Web Services (AWS) and Google Cloud Platform (GCP) clouds as well.
Connecting an AWS account to Azure Security Center is not more complicated than creating a simple virtual machine in Azure. Here are the high-level steps to connect an Amazon Web Services account:
- In the AWS console, click Services, and below Security, Identity and Compliance select IAM.
- Under Role, create Another AWS account, and enter Microsoft’s Account ID (158177204117). Check Require External ID and enter External ID, an identifier value unique to you (that is, your Azure Subscription ID). Click Next: Permissions.
- Add permissions for the role:
- Optionally, add tags and complete the task. On the Summary page, copy the Role ARN (Amazon Resource Name), as you will need it in the ASC wizard.
- In the Azure Security Center, in the Management group, click Cloud Connectors (Preview) and then click Add AWS account.
- Complete Basics and select Assume role authentication method. (The other way to authenticate ASC to AWS would be to create a user in AWS and enter their credentials (Access key ID and Secret access key, obtained on the Summary page in the AWS console.) In the AWS role ARN field, paste Role ARN. Click Next.
- Create a Service Principal by using provided PowerShell script, or manually. Enter Service Principal client ID and secret and click Next.
- On the Review and generate page, complete the wizard.
After you complete the Connect AWS account procedure, do not be surprised if there are no AWS entries — it could take several hours before you can see AWS Recommendations in Azure Security Center. Similar steps are needed to connect a GCP account — after that, you can work with AWS and GCP recommendations in the same way as you do with “domestic” ones, that is, with Azure recommendations:
Other notable announcements include the ability to continuously export recommendations and alerts in real-time to Azure Event Hubs, Azure Monitor, and Log Analytics Workspaces, providing the capability for integration with Azure Sentinel, Power BI, and other solutions.
Azure Security Center can send emails notifications about alerts for all severity levels. Recommendations now include severity indicator and freshness interval, while preview recommendations now are not included in Secure score anymore.
Planned changes to Azure Security Center include Enhancements to SQL data classification recommendations and new recommendations to increase coverage of Azure Security benchmark.
With just about a month to go before the second part of the Microsoft Ignite conference, we expect new announcements, feature introductions and enhancements, and possibly some new, exciting products.