{"id":92335,"date":"2023-06-02T17:39:21","date_gmt":"2023-06-02T17:39:21","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4105544"},"modified":"2023-06-02T17:39:21","modified_gmt":"2023-06-02T17:39:21","slug":"improve-your-app-security-on-azure","status":"publish","type":"post","link":"https:\/\/cloudnewshub.com\/?p=92335","title":{"rendered":"Improve your app security on Azure"},"content":{"rendered":"<figure id=\"attachment_4051219\" aria-describedby=\"caption-attachment-4051219\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-4051219\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/06\/improve-your-app-security-on-azure.jpg\" alt=\"The Microsoft Azure logo on a computer.\" width=\"770\" height=\"513\"><figcaption id=\"caption-attachment-4051219\" class=\"wp-caption-text\">Image: PhotoGranary\/Adobe Stock<\/figcaption><\/figure>\n<p>When <a href=\"https:\/\/www.techrepublic.com\/resource-library\/ebooks\/what-is-cloud-computing-pdf\/\">cloud computing<\/a> first became popular, it was seen as a way of reducing both friction and costs. It was much faster and cheaper to spin up a virtual machine in the cloud than to wait for a physical server to be approved, ordered, delivered and set up.<\/p>\n<p><strong>SEE:<\/strong> Use this <a href=\"https:\/\/www.techrepublic.com\/resource-library\/downloads\/access-management-policy\/\">access management policy template<\/a> from TechRepublic Premium to build secure policies around user access.<\/p>\n<p>Now, cloud computing is powerful and robust enough to run mission critical workloads \u2014 as long as you know how to design applications to scale, configure cloud services to support them and handle the failures inevitable in any complex system.<\/p>\n<p>Jump to:<\/p>\n<h2 id=\"avoid\">Avoid security flaws when building apps on Azure<\/h2>\n<p>If you\u2019re building applications on Azure, Microsoft has a <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/architecture\/framework\/mission-critical\/mission-critical-overview\" target=\"_blank\" rel=\"noopener noreferrer\">Well-Architected Framework<\/a> to help you design and run your app for reliability, security, performance efficiency and effective operations. It even offers a <a href=\"https:\/\/learn.microsoft.com\/en-us\/assessments\/azure-architecture-review\/\" target=\"_blank\" rel=\"noopener noreferrer\">quiz to help you assess<\/a> if you\u2019ve covered everything.<\/p>\n<p>There\u2019s also a growing number of tools and services to help make the applications you run on Azure more reliable and secure. These tools range from the <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-use-chaos-engineering-in-microsoft-azure\/\">Azure Chaos Studio<\/a> service, which helps you test how your app will cope with failure, to the open-source <a href=\"https:\/\/github.com\/microsoft\/onefuzz\" target=\"_blank\" rel=\"noopener noreferrer\">OneFuzz<\/a> project, which will look for flaws in your code.<\/p>\n<p>If you use containers, the default configuration for .NET 8 Linux containers is now \u201c<a href=\"https:\/\/devblogs.microsoft.com\/dotnet\/securing-containers-with-rootless\/\" target=\"_blank\" rel=\"noopener noreferrer\">rootless<\/a>,\u201d and it takes only one line of code to have your app run as a standard user rather than one with root access. This is to ensure attackers can\u2019t modify files or install and run their own code if they are able to get into your app.<\/p>\n<h2 id=\"lock\">Lock down your apps<\/h2>\n<p>In addition to avoiding security flaws when you write your application, you need to make sure you\u2019re only giving access to the right people.<\/p>\n<p>You can<a href=\"https:\/\/learn.microsoft.com\/en-gb\/azure\/azure-resource-manager\/management\/lock-resources\" target=\"_blank\" rel=\"noopener noreferrer\"> apply locks<\/a> to any Azure resource or even an entire Azure subscription, making sure they can\u2019t be deleted or even modified. But because locks affect the Azure control plane rather than the Azure data plane, a database that\u2019s locked against modification can still create, update and delete data, so your application will carry on working correctly.<\/p>\n<p>For older applications that don\u2019t have fine-grained options for managing how credentials are used, Azure Active Directory has a new option to help you secure those credentials. This way, an attacker can\u2019t make changes that might let them take control of a key enterprise application and get credentials to move across your network and attack other systems.<\/p>\n<p>Around<a href=\"https:\/\/www.verizon.com\/business\/resources\/T9b9\/reports\/dbir\/2022-data-breach-investigations-report-dbir.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> 70% of all data breaches<\/a> start with an attack on web applications, so you need to make sure attackers can\u2019t use them as a stepping stone to other resources.<\/p>\n<p><strong>SEE:<\/strong> Discover how <a href=\"https:\/\/www.techrepublic.com\/article\/security-risks-byod-apps\/\">BYOD and personal applications can lead to data breaches<\/a>.<\/p>\n<p>The new<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/develop\/howto-configure-app-instance-property-locks\" target=\"_blank\" rel=\"noopener noreferrer\"> app instance property lock<\/a> feature covers credential signing with SAML and OpenID Connect, which means you can offer single sign-on that lets users sign in with Azure AD and get access to multiple applications.<\/p>\n<p>It&nbsp; also encrypts the tokens created using a public key, so apps that want to use those tokens have to have the correct private key before they can use those tokens for the user who\u2019s currently signed in. That makes it harder to steal and replay tokens to get access.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<p>Modern applications will usually have those kinds of protections available already. If you\u2019re running a legacy application that wasn\u2019t built to protect these sign-on flows, you can use Azure AD to stop the credentials used for signing tokens, encrypting tokens or verifying tokens from being changed. So even if an attacker does get access to the application, they can\u2019t block legitimate admins and take over.<\/p>\n<p>You might also want to look at the <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/users-default-permissions\" target=\"_blank\" rel=\"noopener noreferrer\">permissions users have<\/a> to applications they install or register on your Azure AD tenant and what anyone with guest access will see.<\/p>\n<h2 id=\"check\">Check out your network<\/h2>\n<p>If your cloud app has a problem, sometimes it\u2019s a network problem, and sometimes it\u2019s how you\u2019ve configured the network options.<\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/products\/virtual-network-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Virtual Network Manager<\/a> is a new tool for grouping network resources, configuring the connectivity and security for those resources and deploying those configurations to the right network groups automatically. At the same time it allows for exceptions for resources that need something like inbound Secure Shell traffic, which you\u2019d normally block.<\/p>\n<p>You can use this to create common network topologies like a hub and spoke that connects multiple virtual networks to the hub virtual network that contains your Azure Firewall or ExpressRoute connection. The Azure Virtual Network Manager also automatically adds new virtual networks that need to connect to that resource or (soon) a mesh that lets your virtual networks communicate with each other.<\/p>\n<p>Azure<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-monitoring-overview\" target=\"_blank\" rel=\"noopener noreferrer\"> Network Watcher<\/a> already has a mix of tools to help you monitor your network and track down problems that might affect your VMs or virtual network. It can draw a live topology map that covers multiple Azure subscriptions, regions and resource groups as well as <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/connection-monitor-overview\" target=\"_blank\" rel=\"noopener noreferrer\">monitor connectivity<\/a>, packet loss, and latency for VMs in the cloud and on your own infrastructure.<\/p>\n<p>But, having multiple tools for finding specific problems means you have to know what you\u2019re looking for. The new<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-connectivity-overview\" target=\"_blank\" rel=\"noopener noreferrer\"> connection troubleshooting tool<\/a> in Network Watcher runs those tools and reports back on network hops, latency, memory and CPU utilization as well as whether it could make a connection and, if not, whether that\u2019s because of DNS, network routing rules, network security rules or the firewall configuration.<\/p>\n<p>You can also use Network Watcher to run other tools like a packet capture session or<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/traffic-analytics\" target=\"_blank\" rel=\"noopener noreferrer\"> Azure Traffic Analytics<\/a>, which helps you visualize the network flow in your application. Azure Traffic Analytics can even map the topology of the network, so you can see which resources are in which subnet and which virtual network each subnet is part of.<\/p>\n<p>If you use Network Watcher\u2019s<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/network-watcher\/network-watcher-network-configuration-diagnostics-overview\" target=\"_blank\" rel=\"noopener noreferrer\"> network security groups<\/a>, you can use Traffic Analytics to make sense of the flow logs, which track ingress and egress traffic to look for traffic hotspots or just see where in the world your network traffic is coming from and if that matches what you expect.<\/p>\n<p>You can also use this to check that you\u2019re using private links rather than public IP connections to reach sensitive resources like Azure Key Vault \u2014 a mistake that\u2019s surprisingly easy to make if you use a public DNS server rather than the Azure DNS server. Getting the network configuration right is an important part of keeping your apps secure in the cloud.<\/p>\n<p> <!-- default newsletter at the end --> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: PhotoGranary\/Adobe Stock When cloud computing first became popular, it was seen as a way of reducing both friction and costs. It was much faster and cheaper to spin up a virtual machine in the cloud than to wait for a physical server to be approved, ordered, delivered and set up. SEE: Use this access [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":92336,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[283,40,783,56,152,287,27],"tags":[],"class_list":["post-92335","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-cloud","category-cloudsync","category-cybersecurity","category-microsoft","category-security","category-software"],"_links":{"self":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/92335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=92335"}],"version-history":[{"count":0,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/92335\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/media\/92336"}],"wp:attachment":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=92335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=92335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=92335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}