3 Reasons Your IT Security Strategy is Safe with Microsoft Azure

Jan 10, 2019 12:17:02 PM | By Designertech

As a Microsoft partner with Gold Cloud Platform Competency, we are often tasked with developing a security strategy for our clients who are migrating to Azure through our StepUp 365 - Azure package.

Security threats faced by businesses today are ever evolving and increasing and unlike other security issues, our geographic isolation is no defence. It is vitally important that New Zealand businesses use solutions that protect their networks and systems from unwanted access or cyberattacks.

The Azure tools come with capabilities that ensure secure solutions and that’s one of the advantages of choosing it for your Cloud platform. Microsoft Azure provides confidentiality, integrity, and availability of customer data, while also enabling transparent accountability. Here are three reasons you're safe with Azure.

1. Strong foundations

By choosing Azure you are choosing Microsoft as your security partner. With over 3,500 dedicated cybersecurity professionals, they invest over a billion annually to ensuring the security of their software. Azure is built from the ground up to create a secure foundation to host your infrastructure, applications and data with an understanding of the importance of the protection of your customer data and the security of their datacentres.

Azure is available in 140 countries, with well over 40 datacentres which take a layered approach to physical security. This reduces the risk of unauthorized users gaining physical access to data and the datacenter resources through the below measures:

  • Access approval - Requesting access prior to arrival, must provide a valid business justification (e.g. audit), access must be approved by Microsoft employee, once approved the visitor will only be able to access a discrete area of the datacentre, the visit is limed by time which expires.

  • Facility perimeter - use of well-defined access points only and there's steel and concrete fences that cover the perimeter alongside cameras and a security team monitoring 24/7 365. Once in the building, there are more security guards and procedures.

  • Datacentre floor - an individual must pass a full body metal detection screening, only approved devices are allowed, video cameras monitor the front and back of every virtual machine rack, all actions taken are tracked, full body metal detection screening is repeated at the exit and to leave the datacenter, and you have to pass through an additional security scan.


The computing infrastructure for Azure is built on customised hardware with security controls integrated into the hardware and firmware components including secret management and increasingly hardware-based enclave technology. This extensive network featured built-in protections against DDos with the capacity to scale to protect the largest of workloads - such as Xbox.

2.Built-in security controls

Alongside Microsoft’s security controls, your business should also adhere to Azure’s best practices. This is where you take ownership and responsibility to ensure you have the best security. The built-in security controls will help you get set up faster across identity, network, data and tools.

For example, managing identity and access. Azure Active Directory is the central system for managing access across all your Cloud services, including Azure, Office 365, and hundreds of popular SaaS and PaaS Cloud services as well as on-premises and is the most used directory service in the world. Azure Multi-Factor Authentication is recommended along with limiting access only to those on a task-by-task basis using Role-Based Access.

3. Unique intelligence

With the ever-increasing and evolving cyberattack threats, there’s a need to leverage our collective intelligence.

The Microsoft Intelligence Security Graph brings together signals from many Microsoft products used at a massive scale which includes,

  • data from 450 billion authentications per month

  • 4 billion emails and;

  • 1 billion devices

Collectively these provide the intelligence you need to protect from evolving threats.

Azure Security Center’s threat protection helps detect and mitigate threats with security alert dashboards by combining the Microsoft Intelligence Security Graph with machine learning and visualisations to help you understand the most critical issues, and even quickly visualize a complete attack chain. Microsoft recommends every enterprise customer turns on this capability.

If you’re considering your business migration into the Cloud and want to find out more about how DesignerTech can work with your business to achieve your goals download our case study 'Flooring Xtra: On-Premises to Microsoft Azure'.

 

Download the case study

Previous Post Next Post

Have a question?

Let's talk