Last Update: Sep 04, 2024 | Published: Jul 29, 2016
Microsoft has announced the general availability of Azure Security Center, a centralized solution for monitoring the security of your Azure deployment.
Microsoft announced Azure Security Center at their online event, AzureCon 2015, and launched a public preview on December 2nd, 2015. Security Center is a part of Microsoft’s vision for enterprise security, recognizing that the effectiveness of old methods based on independent solutions, such as a firewall and antivirus, were not enough to protect a business against today’s attacks.
Azure Security Center collects data from your deployment in Azure, including the fabric, the Azure resources that you have deployed, and even third-party solutions such as application gateways or next generation firewalls. The goal is to provide a unified view of the security status of your network. Imagine this scenario:
The firewall is configured to allow outbound data, so there’s nothing wrong there. The database server has been configured to allow remote logins, and bursts of activity aren’t unusual. So malware scanning, the database, and the firewall see nothing wrong. But you have put the pieces together, and realized that there’s probably an attack in progress via a compromised identity, and the attacker is downloading the database to an IP address in Asia. This is the sort of attack that Azure Security Center will recognize because it sees the whole picture in your deployment, and more.
For those of you that are inclined, you can explore your Azure Security Center data using two different Power BI dashboards, which will require additional per-user licensing for Power BI.
At this time, Azure Security Center is focused on virtual machines, but support for cloud services (Classic or ASM deployments) and SQL databases will be added in the future. The following guest operating systems are supported at this time (from the FAQ):
Microsoft has a lot of security best practices for Azure, operating systems, and applications. Azure Security Center gathers information and analyzes it against these best practices. A set of recommendations is made, based on what Azure Security Center finds. For example, by default, it will recommend that you deploy a firewall in a virtual appliance (in a DMZ). In the example below, a recommendation has found an issue with a network security group configuration.
There is a high-level mechanism for controlling which recommendations will be offered from Azure Security Center. For example, I might have decided that I was not going to deploy a security virtual appliance, and rely just on NAT rules and network security groups. I can disable recommendations for web application firewalls and next generation firewalls in Security Policy.
As with all monitoring, I would not expect someone to sit there all day looking at and refreshing the Azure Security Center blades in the Azure Portal – although that’s how some stuck-in-the-1990s IT managers think. We should always manage by exception; that means we need a way to receive alerts when Azure Security Center detect an anomaly.
You can use the below screen to configure an email address (use a distribution group or a ticketing system) and a phone number (a help desk or similar) so that Microsoft can contact you if they find an attack. By default, emails about high severity alerts are disabled, but you can enable them.
As with the Operations Management Suite (OMS), Microsoft has gone with a freemium model with Azure Security Center. There are two types of charge. The first element is storage consumed, which is charged for even during a free trial of Azure Security Center. I have not yet found what kind of storage that Azure Security Center consumes, but I suspect that it is blob storage.
There are two Azure Security Center plans:
There is also a 90-day free trial of the Standard plan, which will automatically transition to the paid-for Standard plan at the end of the trial.
The Standard plan charges monthly for each monitored/managed node; so the question is, what is a node? That depends. Right now, only virtual machines are monitored, and each machine counts as one node. So if I monitor 10 virtual machines for 1 month, then I will be charged €126.50 for monitoring those machines – the price is pro-rated on a daily basis.