Azure Security Posture Auditing – Microsoft Azure/ AzureAD/O365 Security

Microsoft AzureAD/O365 Security

AzureAD – Users can create Azure AD tenants by Default.

Azure AD & O365 Attack Matrix

The amount of things that are defaulted in the AzureAD/O365 commercial tenants is too much and it’s critical to verify all settings are required as Defaults, it is also important to monitor updates. As a example;

Users can create Azure AD tenants Disable this setting, it was available by default but now there is a toggle to disable it!;

Azure Security Posture Auditing


1. Create a new user in Azure AD

2. Manage Azure AD identities

3. Enable SSPR in Azure AD

4. Create a conditional access policy

5. Explore Microsoft security score

6. Use secure score in Microsoft Defender to improve security posture

7. Microsoft 365 Defender for Cloud Apps

8. Explore the Service Trust Portal

9. Explore the Microsoft Purview compliance portal

10. Explore compliance manager

11. Manage subscriptions and RBAC

12. Manage governance via Azure Policy

13. Manage Azure resources by using the Azure Portal

14. Manage Azure resources by using ARM templates

15. Manage Azure resources by using Azure PowerShell

16. Manage Azure resources by using Azure CLI

17. Implement virtual networking

18. Implement inter-site connectivity

19. Implement traffic management

20. Manage Azure storage

21. Manage virtual machines

22. Implement Azure web apps

23. Implement Azure Container Instances

24. Implement Azure Kubernetes Service

25. Backup virtual machines

26. Implement monitoring

Azure Cloud Security


Microsoft Cyberattack Simulator

Microsoft Cyberattack Simulator

Microsoft has released an open-source cyberattack simulator that allows security researchers and data scientists to create simulated network environments and see how they fare against AI-controlled cyber agents.

This simulator is being released as an open-source project named ‘CyberBattleSim‘ built using a Python-based Open AI Gym interface. 

The Microsoft 365 Defender Research team created CyberBattleSim to model how a threat actor spreads laterally through a network after its initial compromise.

“The environment consists of a network of computer nodes. It is parameterized by a fixed network topology and a set of predefined vulnerabilities that an agent can exploit to laterally move through the network.”

“The simulated attacker’s goal is to take ownership of some portion of the network by exploiting these planted vulnerabilities. While the simulated attacker moves through the network, a defender agent watches the network activity to detect the presence of the attacker and contain the attack,” the Microsoft 365 Defender Research Team explains in a new blog post.

To build their simulated environment, researchers will create various nodes on the network and indicate that services are running on each node, their vulnerabilities, and how the device is protected.

Automated cyber agents (threat actors) are then deployed in the environment, where they randomly select actions to perform against the various nodes to take control over them.


Microsoft Azure Sentinel

Microsoft Azure Sentinel

Microsoft Azure Sentiel is fasting becoming a very powerful SIEM and IMO, I think its going to take the lead for the following reasons;

For all of the above reason, I am going to learn Azure Sentinel in more depth, hopefully build a cyber range using my MSDN subscription.


  • Certification
    • FIPS 140-2 Compliance
    • WCAG 2.1 (Section 508)
  • Multi-tenancy / MSSP
  • Local customer references
  • Transfer of logs from on-prem to Cloud is complicated networking, if you need to send SYSLOG via UDP to a Public cloud, its not going to work.
  • Assessing all your data sources and method to Azure Sentil is vital om-prem SIEM this isn’t as critical although you should do this as best practice, you can assumes experience SIEM vendor will support all obvious formats.
  • Encryption and Data Masking.
  • How do you get your Data out, priority lock is a huge problem for a SIEM platform, what happens to your data when if you decided to break the contract. Also, if you wish to access that data via a different platform
  • Datasources
  • Azure monitor and sentinel take up to 8 hours to populate a suspicious log.
  • I recall when everyone moved to Office 365 and didn’t bother to maintain a strong Email Security Gateway and just went with Office 365, allot of customers got hit with Crytolockers because of this decision. All for DX transformation. You need proper security experience people in your DX transformation or building SecOps as you will end up paying the price

Azure SOC Process Framework

SOC Process Framework with Sentinel and how build a SOC and operationalize Security Operations:
Credit: Rin Ure
Main SOC Process Framework:
Process Framework Workbook:
Get SOC Action Playbooks:
Incident Overview (with Remediation) Workbook:
What’s New: Azure Sentinel – SOC Process Framework 8 Part Video Series!


Azure Security Monitoring

Azure Security Monitoring


Monitoring Azure and or Cloud is not straight forward, you have to consider if logs are actually available via the cloud service and has security information. Its also necessary to consider, the Control Pane, Data Pane, Application and VM.



  • VMs
  • Azure Resources
  • Azure Office 365
  • Azure AD

Office 365 Anti-Spam and Anti-Malware Protection

Office 365 Anti-Spam and Anti-Malware Protection


Volume Licensing for Microsoft products and Online Services

Volume Licensing for Microsoft products and Online Services

Exchange Online using Outlook SPLA

Office 356 or Office SPLA

Azure and Citrix Workspace Cloud

Azure and Citrix Workspace Cloud


Azure Cost Calculators



  • Demo platform to show capability with Azure and Citrix
  • Extend our own Citrix Platform and Infrastructure to Azure as first customer

Azure Constraints