Link copied to clipboard!
Azure

Azure Security Best Practices 2026: 35 Critical Controls Every Organization Must Implement

Sreenivasa Reddy G
Sreenivasa Reddy G
Founder & CEO
Mar 13, 202626 min read
24
Azure Security Best Practices 2026: 35 Critical Controls Every Organization Must Implement

Azure's shared responsibility model means Microsoft secures the cloud infrastructure, but you are responsible for securing what you put in it. Despite this well-documented model, 68% of cloud security incidents in 2025 were caused by customer misconfiguration, not platform vulnerabilities. The default Azure configuration is not secure enough for production workloads.

This guide covers 35 critical security controls organized into 7 domains, prioritized by risk impact. Each control includes the specific Azure service, configuration steps, and which Microsoft Defender for Cloud benchmark it satisfies. After implementing these controls across 300+ Azure environments, we consistently achieve Defender for Cloud Secure Scores above 85%.

Azure Security Maturity Assessment

Before implementing controls, assess your current posture:

Maturity LevelSecure Score RangeTypical GapsRisk Level
Level 1: Basic0-30%No MFA, public endpoints, no monitoringCritical
Level 2: Developing30-55%MFA enabled but gaps, basic networking, some loggingHigh
Level 3: Defined55-75%Good identity controls, network gaps, limited monitoringMedium
Level 4: Managed75-90%Comprehensive controls, fine-tuning neededLow
Level 5: Optimized90%+Continuous improvement, automated responseMinimal

Domain 1: Identity & Access Management (Controls 1-8)

Identity is the new security perimeter. 80% of cloud breaches involve compromised credentials.

#ControlPriorityAzure ServiceImplementation
1Enforce MFA for all usersCriticalEntra ID Conditional AccessCreate CA policy: All Users → All Cloud Apps → Require MFA
2Block legacy authenticationCriticalEntra ID Conditional AccessCreate CA policy: Block access for legacy auth clients
3Implement Privileged Identity Management (PIM)CriticalEntra ID PIMConvert permanent admin roles to eligible (JIT) assignments
4Enforce least-privilege RBACHighAzure RBACReplace Owner/Contributor with specific roles per resource
5Configure emergency access accountsHighEntra IDCreate 2 break-glass accounts, exclude from CA, monitor usage
6Enable risk-based Conditional AccessHighEntra ID P2Block high-risk sign-ins, require MFA for medium-risk
7Implement access reviewsMediumEntra ID Access ReviewsQuarterly reviews for privileged roles and guest access
8Configure cross-tenant access policiesMediumEntra ID External IdentitiesRestrict which external tenants can collaborate

Why MFA Alone Isn't Enough

MFA blocks 99.9% of automated attacks, but sophisticated threat actors use MFA fatigue attacks, adversary-in-the-middle proxies, and SIM-swapping. Layer MFA with:

  • Phishing-resistant MFA: FIDO2 security keys or Windows Hello for Business
  • Conditional Access: Device compliance requirements + location-based policies
  • Continuous Access Evaluation (CAE): Revokes tokens in real-time when risk is detected

Domain 2: Network Security (Controls 9-15)

#ControlPriorityAzure ServiceImplementation
9Implement Network Security Groups (NSGs)CriticalAzure NSGsApply NSGs to all subnets, deny-all default, allow specific traffic
10Use Private Endpoints for PaaS servicesCriticalAzure Private LinkDisable public endpoints for storage, SQL, Key Vault, etc.
11Deploy Azure Firewall or NVAHighAzure Firewall PremiumCentralized egress filtering, TLS inspection, IDPS
12Enable DDoS ProtectionHighAzure DDoS ProtectionEnable DDoS Protection Standard on VNets with public IPs
13Implement hub-spoke network topologyHighVNet Peering + Azure FirewallCentral hub for shared services, spokes for workloads
14Enable NSG Flow LogsMediumNetwork WatcherEnable flow logs for all NSGs, send to Log Analytics
15Restrict management port accessCriticalAzure Bastion / JIT VM AccessReplace public RDP/SSH with Bastion or JIT access

Zero Trust Network Architecture

The traditional "castle and moat" approach fails in the cloud. Implement Zero Trust networking:

  1. Microsegmentation: Use NSGs and Azure Firewall to segment workloads — even within the same VNet, restrict east-west traffic
  2. Identity-based access: Use Azure AD Application Proxy instead of VPN for web applications
  3. Encrypt all traffic: TLS 1.2+ for all connections, even internal
  4. Assume breach: Design networks so that compromising one workload doesn't give access to others

Domain 3: Compute Security (Controls 16-21)

#ControlPriorityAzure ServiceImplementation
16Enable Microsoft Defender for ServersCriticalDefender for Cloud P2Enable on all subscriptions, covers VMs, Arc-enabled servers
17Enable automatic OS patchingCriticalAzure Update ManagerConfigure automatic patching schedules for all VMs
18Enable disk encryptionHighAzure Disk Encryption / SSEEnable encryption at host or Azure Disk Encryption on all VMs
19Use managed identities instead of service principalsHighManaged IdentityReplace API keys and service principal secrets with managed identities
20Enable Defender for ContainersHighDefender for ContainersScan container images, runtime protection for AKS
21Implement VM baseline complianceMediumAzure Policy Guest ConfigurationApply CIS benchmarks via Guest Configuration policies

Domain 4: Data Security (Controls 22-27)

#ControlPriorityAzure ServiceImplementation
22Enable Azure Key Vault for secrets managementCriticalAzure Key VaultStore all secrets, keys, certificates in Key Vault — never in code
23Enable storage account securityCriticalStorage Account settingsRequire HTTPS, disable anonymous access, enable soft delete
24Enable SQL Database Transparent Data EncryptionHighAzure SQL TDEEnable TDE on all SQL databases (on by default for new DBs)
25Enable SQL Advanced Threat ProtectionHighDefender for SQLDetects SQL injection, anomalous access, brute force
26Implement data classificationMediumPurview Data MapDiscover, classify, and label sensitive data across Azure
27Configure backup and disaster recoveryCriticalAzure Backup + Site RecoveryBackup all VMs and databases, test DR annually

Key Vault Best Practices

  • Enable soft delete and purge protection — prevents accidental or malicious deletion of secrets
  • Use RBAC for data plane access — more granular than access policies
  • Enable diagnostic logging — audit who accessed which secrets and when
  • Rotate secrets automatically — Key Vault supports automatic rotation for storage account keys
  • Use one Key Vault per environment — separate dev/staging/production secrets

Domain 5: Monitoring & Threat Detection (Controls 28-32)

#ControlPriorityAzure ServiceImplementation
28Enable Microsoft Defender for CloudCriticalDefender for CloudEnable all Defender plans on all subscriptions
29Configure centralized loggingCriticalLog Analytics WorkspaceSend all Azure activity, diagnostic, and security logs to central workspace
30Deploy Microsoft SentinelHighMicrosoft SentinelEnable SIEM/SOAR for automated threat detection and response
31Enable Azure Activity Log alertsHighAzure MonitorAlert on critical actions: role assignments, policy changes, resource deletions
32Implement diagnostic settings on all resourcesMediumAzure Monitor Diagnostic SettingsRoute metrics and logs from all resources to Log Analytics

Critical Alerts to Configure

AlertConditionSeverityResponse
Global admin role assignedActivity log: Role assignment created for Global AdminCriticalVerify legitimacy within 15 minutes
NSG rule modified to allow all inboundActivity log: NSG rule 0.0.0.0/0 inbound addedCriticalImmediately verify, likely revert
Key Vault access from unusual IPKey Vault diagnostic logsHighInvestigate access, rotate affected secrets
VM created in unusual regionActivity log: VM creation outside approved regionsHighVerify legitimate, may indicate crypto mining
Storage account public access enabledPolicy compliance changeHighDisable public access, investigate data exposure
Large number of failed sign-insEntra ID sign-in logsMediumInvestigate potential brute force attack

Domain 6: Governance & Compliance (Controls 33-35)

#ControlPriorityAzure ServiceImplementation
33Implement Azure Policy for guardrailsCriticalAzure PolicyAssign CIS benchmark initiative, enforce tagging, restrict regions
34Enable management group hierarchyHighManagement GroupsOrganize subscriptions by environment (Prod, Non-Prod, Sandbox)
35Implement Azure Blueprints / Landing ZonesHighAzure Landing ZonesDeploy standardized, secure environments for new workloads

Essential Azure Policies

  • Allowed locations: Restrict resource deployment to approved regions
  • Require encryption on storage accounts: Ensure all storage uses encryption
  • Deny public IP addresses on NICs: Prevent accidental public exposure
  • Require NSGs on subnets: Ensure all subnets have network security groups
  • Audit VMs without Defender: Identify unprotected VMs
  • Require resource tags: Enforce mandatory tagging for cost and accountability
  • Deny certain VM SKUs: Prevent deployment of expensive or inappropriate VM sizes

Implementation Roadmap

PhaseTimelineControlsExpected Secure Score
Phase 1: CriticalWeek 1-21-3, 9-10, 15-16, 22-23, 27-2845-55%
Phase 2: High PriorityWeek 3-44-6, 11-13, 17-19, 24-25, 29-3165-75%
Phase 3: Medium PriorityWeek 5-87-8, 14, 20-21, 26, 32-3580-90%
Phase 4: OptimizationOngoingFine-tune policies, automated response, regular reviews90%+

Frequently Asked Questions

What's the minimum Azure security configuration for production?

At minimum: MFA for all users (Control 1), block legacy auth (Control 2), NSGs on all subnets (Control 9), private endpoints for PaaS (Control 10), no public RDP/SSH (Control 15), Defender for Cloud enabled (Control 28), and centralized logging (Control 29). These 7 controls address the most common attack vectors.

How much does Azure security cost?

Entra ID P2 is ~$9/user/month. Defender for Cloud Plan 2 is ~$15/server/month. Sentinel is usage-based (~$2.46/GB ingested). For a 50-VM environment, expect $1,500-3,000/month for comprehensive security. This is 5-10% of typical Azure spend — far less than the cost of a breach (average: $4.88M in 2025).

Should we use Azure Firewall or a third-party NVA?

Azure Firewall Premium is sufficient for most organizations and integrates natively with Azure monitoring and policy. Consider third-party NVAs (Palo Alto, Fortinet) only if you need specific features like application-layer inspection that Azure Firewall doesn't support, or if your organization has existing expertise with a specific vendor.

How do we secure hybrid environments (on-prem + Azure)?

Use Azure Arc to extend Azure security to on-premises servers, implement Azure AD Application Proxy instead of VPN for web apps, deploy Defender for Cloud on Arc-enabled servers, and use Azure Sentinel for unified threat detection across both environments. Our server management team specializes in securing hybrid infrastructure.

What compliance frameworks does Microsoft Defender for Cloud support?

Defender for Cloud includes regulatory compliance dashboards for CIS Benchmarks, NIST 800-53, PCI DSS, ISO 27001, SOC 2 TSC, HIPAA, and many more. Each dashboard maps your Azure controls to specific framework requirements and shows your compliance score. See our M365 Compliance Guide for complementary Microsoft 365 compliance configuration.

Get Expert Azure Security Configuration

Contact Medha Cloud for a comprehensive Azure security assessment. Our cloud security consultants will evaluate your current Azure environment against these 35 controls, identify critical gaps, and implement remediation — typically achieving an 85%+ Defender for Cloud Secure Score within 60 days.

For ongoing Azure security management, our managed IT services include continuous monitoring, threat response, and compliance management. We also offer white-label SOC services for MSPs who need to extend Azure security monitoring to their clients.

Related Resources

Protect your organization with expert healthcare IT support designed for HIPAA compliance.

Managed IT for Healthcare

Topics

AzureCloud SecurityZero TrustMicrosoft DefenderNetwork Security
Sreenivasa Reddy G
Written by

Sreenivasa Reddy G

Founder & CEO15+ years

Sreenivasa Reddy is the Founder and CEO of Medha Cloud, recognized as "Startup of the Year 2024" by The CEO Magazine. With over 15 years of experience in cloud infrastructure and IT services, he leads the company's vision to deliver enterprise-grade cloud solutions to businesses worldwide.

Managed IT SupportCloud InfrastructureDigital Transformation
Follow on LinkedIn

Need Expert Help?

Our team of cloud and IT experts is ready to help you solve your toughest challenges. Get personalized assistance today.