You are on page 1of 10

FEATURE

Auditing the Cloud: Microsoft


Azure


When it comes to the cloud and the methods used
to audit this expanding technology, Amazon Web
Services (AWS) is not the only major player. There
THE LARGER THE
may not be as many advertisements for Azure, but TECHNOLOGICAL FOOTPRINT
as of 2019, Microsoft was one of the top-three
providers of public cloud services.1 The following
A SERVICE PROVIDER OFFERS,
examines the leading public cloud service providers, THE MORE ATTENTION IT IS


including a basic financial analysis, and then
introduces Microsoft Azure and the audit
LIKELY TO RECEIVE FROM
techniques enterprises can use to assess the CYBERCRIMINALS.
Microsoft Azure Platform as a Service (PaaS).
The general audit program outlined here is not Azure.2, 3 As of 2019, AWS was widely accepted as
intended as a prescriptive set of tests that each the market leader in both Infrastructure as a Service
enterprise should conduct; it is meant to serve as a (IaaS) and overall cloud services, finishing the year
foundation for the development of security, risk with an estimated US$35 billion.4 Second place was
and compliance assessments related to assumed to belong to Microsoft, whose
Azure deployments. “Commercial Cloud” portfolio, which includes Azure,
LinkedIn Premium and MS Dynamics, ended 2019
From a security audit and risk perspective, a with US$38 billion in total revenue for all cloud
financial analysis of any service provider allows an services combined.5 Google Cloud ended 2019 in
enterprise to better assess the provider’s maturity third place with US$10 billion in total revenue.6
(e.g., security services offered, market stability,
financial risk from investments, potential for
cyberattacks due to size). The larger the
technological footprint a service provider offers, the
more attention it is likely to receive from
cybercriminals. In addition, rapid market expansion
may lead to larger gaps between the introduction of
new services and the creation and maturation of
associated security capabilities, leading to
increased risk. Assessment of the financial status
of a cloud service provider (CSP) can help IT audit
teams and executive management determine
whether the provider is growing too quickly in an
insecure manner, whether rapid expansion may lead
to increased security breaches and whether growth
is occurring in a way that deviates from the
enterprise risk appetite.
Adam Kohnke, CISA, CISSP, eJPT
Cloud Service Providers Currently serves as the identity and access management team leader for
North American operations at QBE Insurance, Australia’s second largest
It is difficult to declare a definitive winner in the insurer. He has four years of experience in IT audit within the financial
category of top public CSP. Microsoft chooses not services industries and more than six years of IT service management
to publicly disclose total revenue figures specific to experience in the healthcare and construction industries.

© 2020 ISACA. All rights reserved. www.isaca.org


ISACA JOURNAL VOL 5 1
Financial resources are pouring into the public environment. The Azure cloud platform extrapolates
Enjoying cloud services market, and a great deal of short- the virtualization concept on a staggering scale
term market growth is expected, potentially creating through the implementation of massive server farms
this article?
increased business and security risk for enterprises dispersed across several geographic areas to provide
consuming these services. To minimize such risk, public cloud services to customers. Each data center
• Read Azure Audit
enterprises must develop a fundamental has multiple physical server racks, with a hypervisor
Program.
understanding of how to audit public CSPs such as assigned to each server to control its virtualization
www.isaca.org/
Microsoft Azure. operations (e.g., creating and managing VMs,
azure-audit-program
managing allocated compute resources). Microsoft
• Learn more about,
Microsoft Azure Azure uses the following components to seamlessly
discuss and
manage the individual customer cloud experience: the
collaborate on audit Microsoft Azure is a cloud computing platform that Azure web portal, the orchestrator and its APIs, a
and assurance in provides a pay-as-you-go service to both public and network switch, and fabric controllers, which all
ISACA’s Online private enterprises, renting them compute, power, directly or indirectly interact with the physical servers
Forums. storage and other services from infrastructure and the hypervisors. One server in each rack is
https://engage.isaca. hosted in Microsoft data centers.7 As of this writing, assigned the fabric controller software, which directly
org/onlineforums Microsoft Azure offers approximately 100 services communicates through the network switch with the
divided into 13 general categories, including virtual orchestrator to manage all actions occurring within
machine (VM) infrastructure capability for Linux and Azure, such as creating a VM, assigning storage to the
Windows compute workloads; application hosting VM, deleting VMs or responding to user requests. User
with full web application programming interface requests to manage Azure resources occur via the
(API) management; Internet of Things (IoT) Azure web API, which can be accessed by many tools,
Software as a Service (SaaS) for secure, centralized including the Azure portal and Azure command line
device information gathering or relay; and virtual interface (CLI). Figure 2 depicts a basic example of a
reality (VR) services that allow customers to explore new VM being created via the Azure portal, which, in
new software possibilities. Figure 1 details the turn, is packaged by the orchestrator and sent to the
Azure categories and their groupings.8 fabric controllers for assignment to a physical server
for processing of the creation request.9
The Microsoft Azure public cloud platform relies on
virtualization, which is the separation between a When an enterprise subscribes to Azure cloud
computer’s hardware and its operating system via services, it establishes the highest-level security
an abstraction layer known as a hypervisor, which boundary, called an Azure tenant. Azure tenants
emulates all computer functions in a VM-based

Figure 1—Microsoft Azure Categories

Security & Platform Services Hybrid


Management Media & CDN Application Platform Data Cloud
Azure AD
Security Center Media Media Content SQL SQL Data Correct Health
Delivery Web Mobile Database Warehouse Cosmos DS
Services Analytics Apps
Azure portal Network Apps Ad Privleged
SQL Server Azure Table Azure Identity
Azure Active API Cloud Stretch Cache Storage Search Management
Directory Integration Apps Services Database for Redis
API Domain Services
Azure Ad
B2C Management Service Notifications
Service Bus
Fabric Hubs Intelligence
Multi-Factor Azure Logic Cognitive Azure ML Backup
Functions Services Bot Services
Authentication Apps Studio

Automation Azure Monitor


Analytics & IoT
Compute Services Developer Services
Key Vault HDInsight Machine Stream
Visual Studio Mobile Learning Analytics Import/Export
Container VM Engagement
Azure Service Scale Sets Data Data Lake
Analytics Data Lake
Marketplace Azure DevOps Catalog Storage
Xamarin Service Azure Site
Azure Batch Dev/Test Lab Recovery
VM Image Gallery Visual Event Data Power BI
Application Studio IoT Hub
Insights Hubs Factory Embedded
App Center Start Simple
REST API and CU
Infrastructure Services
Compute Storage Networking
Containers and Virtual Load Express Traffic VPN App
Virtual Machines Azure Blob Queues Files Disks DNS
Network Balancer Route Manager Gateway Gateway
Kubernetes

Source: Microsoft, “What Is Azure?” https://docs.microsoft.com/en-us/learn/modules/welcome-to-azure/2-what-is-azure.


Reprinted with permission.

© 2020 ISACA. All rights reserved. www.isaca.org


2 ISACA JOURNAL VOL 5
Figure 2—VM Creation Using the Azure Portal

ORCHESTRATOR

API FABRIC FABRIC


CONTROLLER CONTROLLER

AZURE PORTAL

Source: Microsoft, “What Is Azure?,” https://docs.microsoft.com/en-us/learn/modules/welcome-to-azure/2-what-is-azure.


Reprinted with permission.

virtually represent the enterprise that has for ease of management, such as by application, by
established a relationship with Microsoft Azure; department or by operating environment. Figure 3
they can be single tenants or multitenants.10 All illustrates the hierarchy of tenants, management
tenants are identified by a globally unique identifier groups, subscriptions, resource groups and
(GUID) and rely on the Azure Active Directory (AAD), resources themselves.12, 13
which serves as the digital identity service model
for securing all SaaS, IaaS and PaaS resources Auditing the Azure Cloud Platform
within Azure. The next level in the Azure hierarchy is
the management group. Management groups allow Before an audit or security assessment begins, it is
an enterprise to organize Azure resources into a important to understand which aspects of Azure the
hierarchy of strategic collections, providing another customer is responsible for and which aspects
level of classification and centralized access Microsoft is responsible for, as this will help focus
control that transcends Azure subscriptions; for audit and assurance activities. Similar to AWS,
example, an enterprise can designate a human Azure operates under the shared responsibility
resources (HR) management group to dictate Azure model, where, depending on the type of services the
policy decisions over HR-associated Azure customer subscribes to, management of certain
subscriptions and resources, or it can assign a aspects of Azure, such as patch management, are
marketing management group to define how handled by Microsoft, by the customer or by both
resources allocated to marketing can be deployed (figure 4).14
and accessed. Next, Azure subscriptions are billed
service agreements between the enterprise and Governance Controls
Microsoft, allowing the use of any number of Governance controls are a key factor in shared
Microsoft cloud platforms or services, such as the responsibility. Even though the cloud provider is
Azure PaaS or Office 365 SaaS.11 The final level is primarily responsible for operating certain controls
the resource group, which allows the enterprise to within Azure, the customer has an ethical,
logically group similar resources such as Structured professional and moral responsibility to oversee the
Query Language (SQL) databases or VMs together cloud provider’s activity for every vendor-managed
control to the extent possible.

ISACA JOURNAL VOL 4 3


Figure 3—Azure Hierarchy

Azure Active
Directory/Tenant

Root Management Group

Policy

Human Resources IT Marketing EA Subscription EA Subscription

Subscription
Policy

Resource Group

Resources

Source: Microsoft, “Enterprise Governance Management,” https://docs.microsoft.com/en-us/learn/modules/intro-to-governance/


4-management-groups. Reprinted with permission.

Executive management should clearly define an Governance audits should also assess whether
Azure governance strategy that includes, but is not management has included adequate enforcement
limited to, the number of tenants allowed (single or mechanisms to carry out its governance strategy
multitenant); management groups that are logically through the use of Azure policy, which allows the
organized by business function, geographic location enterprise to control where resources can be
or the like; subscriptions allowed under each deployed (e.g., limiting VM locations to the US
management group, which are further divided by Western Region for the IT management group), how
operating environment, such as product or many and what type of resources can be deployed
development; and strategies to logically group and (e.g., disallowing the creation of a VM with more
dictate the type of deployed resources associated than four central processing units [CPUs]), whether
with each subscription. As part of its governance resources can be created without tagging them, and
strategy, executive management should consider many other compliance scenarios.15 Other key
declaring and routinely assessing the physical governance-related considerations include the
regions where it deploys Azure resources to ensure development, implementation and routine
service availability, which involves determining assessment of a resource-tagging strategy to
whether the region meets regulatory or other support effective cost management, billing
compliance needs and whether the region is forecasts and monitoring of resources that may be
capable of fulfilling the enterprise’s availability, impacted in the future. Finally, a governance audit
business continuity and disaster recovery needs. should consider the implementation of routine

© 2020 ISACA. All rights reserved. www.isaca.org


4 ISACA JOURNAL VOL 4 ISACA JOURNAL VOL 5
RBAC assignment for each management group. In
Figure 4—Azure Shared Responsibility Model
this way, access controls cannot be altered by
resources or subscription owners lower in the
On-
Responsibility prem IaaS PaaS SaaS management hierarchy, improving security and
Data governance allowing easier access management.
and rights management

Client endpoints Azure can be accessed in many ways, including the


Azure web portal, Azure CLI and Azure Powershell.
Account and access
management The focus of the audit should expand here by
Identity and directory assessing the extent to which management has
infrastructure identified allowable access methods and the
Application individuals assigned to sensitive access roles or
groups, such as service contributor or global
Network controls
administrator. Next, the audit should assess
Operating systems whether management has enforced the use of
multifactor authentication (MFA) controls for each
Physical hosts role or user posing an elevated access risk. This
includes considering how management has defined
Physical network
the MFA user access strategy, which can be either
Physical data center per-user MFA or security access group assignments
using conditional access policies that permit the
Microsoft Customer
enterprise to define conditions that allow or reject
user access.17 Finally, the MFA configuration should
Source: Microsoft, “Cloud Security Is a Shared Responsibility,” be reviewed to determine whether settings such as
https://docs.microsoft.com/en-us/learn/modules/intro-to-
security-in-azure/2-shared-responsibility. Reprinted with Trusted Internet Protocols (IPs) are enabled that
permission. allow MFA to be bypassed if a request is generated
cloud vendor management practices that are from a specified IP address range or whether there
facilitated through the use of Microsoft’s Service are legacy applications such as Office 2010 that do
Trust portal, which provides the results of Service not support Azure MFA.


Organization Controls (SOC), the Federal Risk and
Authorization Management Program (FedRAMP),
International Organization for Standardization (ISO) THE AUDIT SHOULD ASSESS
27001, and Payment Card Industry Data Security WHETHER MANAGEMENT HAS
Standard (PCI DSS) attestations for Azure.16
ENFORCED THE USE OF
Identity and Access Management MULTIFACTOR
Auditing identity and access management (IdAM)
begins with an assessment of whether AUTHENTICATION (MFA)
management has declared and documented the CONTROLS FOR EACH ROLE OR


rationale for role-based access controls (RBACs)
applied to management groups, subscriptions, USER POSING AN ELEVATED
resource groups and the individuals accessing ACCESS RISK.
resources based on their job functions for all Azure
tenants. The concept of management groups
establishes the basis for effective RBAC, but RBAC Another key audit topic at the IdAM level is the use
within Azure can be implemented against of managed service identities (MSIs), which allow a
management groups, individual subscriptions and nonhuman Azure resource, such as a VM or SQL
resource groups. To limit the time and resources database, to authenticate without explicitly
needed to manage access, the enterprise should presenting credentials.18 MSIs can increase security
consider placing related subscriptions and their by allowing Azure to automatically handle rotating
resources under associated management groups credentials associated with each MSI; this requires
and then, to the extent possible, configuring a single much less effort to maintain than prior setups

ISACA JOURNAL VOL 4 5


before MSIs became available in Azure. There are such as a web tier or a data tier, and restricting
some drawbacks to the use of MSIs, such as the communications between each tier to enhance
limited number of Azure resources that support the security.19 At this level, the audit should determine,
use of MSIs and the fact that MSIs only at a minimum, whether a demilitarized zone (DMZ)
authenticate outbound requests from one resource exists in front of deployed web-facing applications,
to another. The audit should focus on the ability to whether a web application firewall (WAF) exists
identify the full population of MSIs in use across between the application front end and the Internet,
Azure tenants; the rationale behind their use, as they whether resources in each tier are configured using
generate costs; whether the MSI credentials are distinct subnetworks to isolate each tier, and
securely stored and routinely rotated; and whether whether security groups (firewall rules within Azure)
the associated resources for which the MSI has and routing rules are properly configured to restrict
been created already have embedded credentials, network traffic between tiers and directly to
eliminating the need for an MSI to begin with. resources (preventing direct Remote Desktop
Protocol [RDP] traffic to VMs and requiring a jump-
To finalize the audit of IdAM controls, the off box).
assessment should determine whether the use of
single sign-on (SSO) has been leveraged to Additionally, the audit should determine whether
streamline password and user management in management has configured the Azure Security
enterprise applications; whether there is a banned Center or other monitoring tools to identify Internet-
password list; whether password policy is enforced facing resources that do not have network security
to strengthen user credentials; and whether groups associated with them and whether
resource protection mechanisms, such as resource resources exist that are not secured behind
locks, are in place to prevent the unauthorized firewalls. Within Azure, Microsoft offers enterprises
deletion of critical resources within Azure tenants. a basic protection service to thwart common
Resource locks can be set against subscriptions, distributed denial of service (DDoS)-based attacks,
resource groups and individual resources, but for enterprises looking to secure critical data,
permitting the enterprise to set a delete (allowing all the Azure DDoS standard solution may be ideal. It
actions except delete) or read-only policy that has a variety of desirable features that the basic
applies regardless of RBAC permissions and serves version does not, such as security information and
as a strong control to protect enterprise data from event management (SIEM) tool integration, access
accidental or malicious deletion. Auditors should to Microsoft DDoS experts, post-attack mitigation
also assess whether management periodically reports, and real-time attack metrics that may be
revalidates access for users and MSIs to certify that useful in preventing future DDoS attacks.20
access is appropriate based on job responsibilities
and that unused accounts and identities are Finally, audits at the network level should focus on
removed from the Azure environment. existing network integration points, such as those
sourced from the enterprise’s on-premises network
Network Controls or other business partners that may have
The audit of network security controls in Azure connections to the Azure platform. Through the use
includes assessing high-level network architecture of Azure ExpressRoute, an enterprise can securely
and integration points (if any) that have been integrate on-premises or other networks with Azure,
configured. Microsoft recommends the use of an N- using a redundant Border Gateway Protocol (BGP)
tier architecture where simple web applications are connection through an approved third-party
being deployed, such as if the enterprise is connection provider, such as AT&T, that does not
migrating on-premises applications to Azure with interact with the public Internet.21 Although Azure
minimal changes and under certain application ExpressRoute connections increase privacy and
development scenarios. The N-tier concept involves minimize public intrusion by not communicating
segmenting application resources into distinct tiers, over the Internet, the enterprise must ensure that

6 ISACA JOURNAL VOL 4



layer 2 encryption via Media Access Control
Security (MACSec) or layer 3 encryption using IP
Security (IPSec) is enabled, with the enterprise
EACH INTEGRATION POINT SHOULD
encryption keys securely stored and rotated within ROUTINELY BE ASSESSED FOR SECURITY
the Azure Key Vault. The type of encryption used
depends on the Azure ExpressRoute connectivity
APPROPRIATENESS AND JUSTIFICATION TO
model selected (cloud exchange colocation, point- EXIST, AND ANY CHANGES TO THE CONNECTION


to-point Ethernet or any-to-any IP virtual private
network [VPN]) and the enterprise’s specific
CONFIGURATION SHOULD RESULT IN ALERTS TO
connectivity requirements.22 Each integration point THE APPROPRIATE PERSONNEL.
should be assessed routinely for security
appropriateness and justification to exist, and any
changes to the connection configuration should technology for Windows or dm-crypt for Linux. For
result in alerts to the appropriate personnel. both types of encryption keys, storage in the Azure
Key Vault is recommended, and it is capable of
Encryption centrally managing all necessary encryption-based
Data encryption within Azure depends primarily on activities such as creating, distributing, rotating and
the types of resources and Azure services to which deleting encryption keys, secrets, digital certificates
the enterprise subscribes. The audit should start and connection strings.24 The Azure Key Vault has
with an understanding of the overall data protection its own separate authentication and authorization
or data encryption policy the enterprise has defined function; it can also create multiple vaults for
for Azure. An assessment of that policy should various objects and purposes. The audit should
cover the scope of the tenants, subscriptions and begin by assessing which Azure resources have
so forth to which the policy applies and the been designated to integrate and store encryption
responsible parties who manage the configurations, objects (e.g., keys, certificates) in the Azure Key
encryption keys and the like. The encryption policy Vault; the vaults defined in the Azure Key Vault; the
should also state the accepted algorithms or appropriateness of the users, accounts and end
ciphers (Secure Hash Algorithm [SHA] or Advanced points, such as workstations, that have access to
Encryption Standard [AES]), the minimum manage these encryption objects; and whether
encryption strength of each algorithm (256 bit vs. there is sufficient monitoring to log the users or
512 bit) applied to each resource type that requires MSIs accessing or changing objects stored in the
encryption, and under which scenarios data Azure Key Vault.
encryption should occur (e.g., upon creation, at rest,
in use, in transit).23 Because encryption is the final The audit should then concentrate on whether the
protection against unauthorized data manipulation enterprise has defined capabilities to restore
or loss, it is crucial that the data encryption policy is accidentally or maliciously deleted key vaults and
well planned and comprehensive enough to cover their contents through an evaluation of the soft-
all applicable business resources, has proper delete and purge-protection features available in the
executive-level support, and is subjected to ongoing Azure Key Vault.25 A related audit focus at this level
monitoring via database auditing or virtual desktop is determining whether the enterprise is routinely
checks to ensure sustained compliance. practicing the deletion and recovery of key vaults
and encryption objects to ensure that these
There are many encryption options available for mechanisms work as expected and fully support
data at rest (data stored on a persistent medium emergency recovery efforts related to security
such as a hard disk drive) and data in transit (data breaches or accidents triggered by personnel.
traveling between public or private networked
devices). The Azure disk encryption service allows For any documents, emails or sensitive data
VM disks to be encrypted using either Bitlocker produced using Azure resources, the Azure

ISACA JOURNAL VOL 4 7


information protection solution can assist with data To bolster security incident response capabilities,
classification and data protection using a Azure Security Center’s standard subscription can
combination of encryption and identity assist in the detection and prevention of and the
management policies that apply to documents even timely response to security threats affecting not
after they have been sent outside of Azure tenants, only Azure resources, but also on-premises
reducing data leakage. For information created in resources that have been integrated with Azure
Azure, the audit should assess the extent to which tenants.26 At this level, the audit should focus on
the enterprise seeks to classify, label and control determining whether the enterprise routinely
access to intellectual property created, stored and reviews security scores published by the Security
transmitted by Azure resources. Center, prioritizes the control recommendations
offered by the Security Center and acts on them in a
Security Incident Response timely manner. The audit should also identify any
Assessment of a security incident response plan security recommendations the enterprise chooses
(SIRP) includes, but is not limited to, determining not to act on; these should be documented as
whether defined roles and responsibilities have security exceptions, with a clear justification for the
been documented and examining the criteria for a enterprise’s failure to follow them. These exceptions
security event (an observable occurrence, such as a should require the approval of security and IT
user connecting to a network), a security incident (a operations management, and they should be
violation of security policy or practice) and a routinely reassessed to determine whether the
security breach (a security incident that results in conditions justifying the exception are still valid.
the loss of enterprise data and/or system
compromise). The SIRP should also detail the In addition, audit activity at the security incident
various phases of the response and the expected response level should focus on determining
actions by responders, such as preparation, whether Azure Security Center alerts have been
detection and analysis, containment, eradication, integrated with the enterprise’s SIEM tool or whether
recovery, and postmortem. The audit should focus the enterprise has subscribed to an option such as
on verifying the existence of an SIRP; ensuring that Azure Sentinel, which is capable of expanding
it has proper executive support within the security incident response capabilities by
enterprise; determining whether its scope includes performing automated threat detection and
Azure tenants, subscriptions and resources; reporting using artificial intelligence (AI) or
ensuring that it includes planned incident response responding to common security incidents using
exercises and lessons-learned activities; and native Security Orchestration Automated Response
ascertaining that it is routinely reviewed internally (SOAR) functions.27 Finally, the audit should ensure
for completeness, accuracy and adequacy. that the enterprise has registered its contact


information with Microsoft so that it can receive
prompt notification of critical security incidents
BECAUSE ENCRYPTION IS THE FINAL affecting the Azure platform. In addition, the
PROTECTION AGAINST UNAUTHORIZED DATA enterprise should subscribe to external threat
intelligence feeds that routinely inform it of
MANIPULATION OR LOSS, IT IS CRUCIAL THAT potential threats impacting Azure resources.
THE DATA ENCRYPTION POLICY IS WELL
Conclusion
PLANNED AND COMPREHENSIVE ENOUGH TO


The topics discussed here only scratch the surface
COVER ALL APPLICABLE BUSINESS of security risk and the controls required to address
RESOURCES… it. The companion Azure audit program28 provides a
more comprehensive approach to managing risk

8 ISACA JOURNAL VOL 4



factors, but it is only a general recommendation.
Each enterprise will subscribe to and configure a
different combination of Azure resources. By
THE ENTERPRISE SHOULD
adopting a risk-based approach and understanding SUBSCRIBE TO EXTERNAL
the connections between internal Azure resources
and external resources and the data flows in
THREAT INTELLIGENCE
between, an enterprise can obtain a clearer picture FEEDS THAT ROUTINELY
of where its primary risk lies and which controls are
key to managing that risk. Maintaining some level of
INFORM IT OF POTENTIAL


assurance will be the primary challenge, requiring THREATS IMPACTING AZURE
enterprises to balance available resources against
emerging threats and the malicious actors behind
RESOURCES.
them. With grit, patience and a measured approach,
enterprises can increase their chances of operating 9 Op cit Microsoft, “What Is Azure?”
securely in the Azure cloud and returning 10 Microsoft, “Quickstart: Set up a Tenant,”
tremendous value to their stakeholders. 12 March 2020, https://docs.microsoft.com/
en-us/azure/active-directory/develop/
quickstart-create-new-tenant
Endnotes
11 Microsoft, “Subscriptions, Licenses, Accounts,
1 Stalcup, K.; “AWS vs Azure vs Google Cloud and Tenants for Microsoft Cloud Offerings, “
Market Share 2020: What the Latest Data 8 October 2019, https://docs.microsoft.com/
Shows,” ParkMyCloud, 5 February 2020, en-us/office365/enterprise/subscriptions-
https://www.parkmycloud.com/blog/aws-vs- licenses-accounts-and-tenants-for-microsoft-
azure-vs-google-cloud-market-share/ cloud-offerings
2 Ibid. 12 Thuru’s Blog, “Democratizing Enterprise Cloud
3 Asay, M.; “Microsoft Keeps Hiding Azure in Azure,” 24 March 2019, https://thuru.net/
Revenue Numbers, but Why?” TechRepublic, 2019/03/24/democratizing-enterprise-
26 April 2019, https://www.techrepublic.com/ cloud-in-azure/
article/microsoft-keeps-hiding-azure-revenue- 13 Microsoft, “Enterprise Governance Management,”
numbers-but-why/ https://docs.microsoft.com/en-us/learn/
4 Clement, J.; “Amazon Web Services: Quarterly modules/intro-to-governance/4-management-
Revenue 2014–2020,” Statista, 4 May 2020, groups
https://www.statista.com/statistics/250520/ 14 Microsoft, “Cloud Security Is a Shared
forecast-of-amazon-web-services-revenue/ Responsibility,” https://docs.microsoft.com/
5 Microsoft, “Annual Report 2019,” en-us/learn/modules/intro-to-security-in-
https://www.microsoft.com/investor/reports/ azure/2-shared-responsibility
ar19/index.html 15 Microsoft, “Define IT Compliance With Azure
6 Dignan, L.; “Top Cloud Providers in 2020: AWS, Policy,” https://docs.microsoft.com/en-us/
Microsoft Azure, and Google Cloud, Hybrid, learn/modules/intro-to-governance/
SaaS Players,” ZDNet, 11 May 2020, 2-azure-policy
https://www.zdnet.com/article/the-top-cloud- 16 Microsoft, “Service Trust Portal,”
providers-of-2020-aws-microsoft-azure-google- https://servicetrust.microsoft.com/
cloud-hybrid-saas/ 17 Microsoft, “Enable Per-User Azure Multi-Factor
7 Microsoft, “What Is Azure?” Authentication to Secure Sign-in Events,”
https://docs.microsoft.com/en-us/learn/modules/ 13 April 2020, https://docs.microsoft.com/
welcome-to-azure/2-what-is-azure en-us/azure/active-directory/authentication/
8 Microsoft, “Tour of Azure Services,” howto-mfa-userstates
https://docs.microsoft.com/en-us/learn/modules/
welcome-to-azure/3-tour-of-azure-services

ISACA JOURNAL VOL 4 9


18 Downs, J.; “Demystifying Managed Service 23 Abrenio, G.; “How to Develop an Enterprise
Identities on Azure,” Kloud, 13 April 2018, Encryption Policy,” Cyber Armed, 15 March
https://blog.kloud.com.au/2018/04/13/ 2016, https://www.cyberarmed.com/how-to-
demystifying-managed-service-identities-on-azure/ develop-an-enterprise-encryption-policy/
19 Microsoft, “N-Tier Architecture Style,” 24 Microsoft, “Encryption,”
30 August 2018, https://docs.microsoft.com/ https://docs.microsoft.com/en-us/learn/modules/
en-us/azure/architecture/guide/ intro-to-security-in-azure/4-encryption
architecture-styles/n-tier 25 Microsoft, “Azure Data Security and Encryption
20 Microsoft, “Azure DDoS Protection Standard Best Practices,” 9 March 2020,
Overview,” 22 January 2020, https://docs. https://docs.microsoft.com/en-us/azure/security/
microsoft.com/en-us/azure/virtual-network/ fundamentals/data-encryption-best-practices
ddos-protection-overview 26 Microsoft, “Azure Operational Best Practices,”
21 Microsoft, “ExpressRoute Overview,” 6 May 2019, https://docs.microsoft.com/
18 September 2019, https://docs.microsoft.com/ en-us/azure/security/fundamentals/operational-
en-us/azure/expressroute/expressroute- best-practices
introduction 27 Microsoft, “What Is Azure Sentinel?”
22 Microsoft, “ExpressRoute Connectivity Models,” 24 September 2019, https://docs.microsoft.
18 September 2019, https://docs.microsoft. com/en-us/azure/sentinel/overview
com/en-us/azure/expressroute/expressroute- 28 ISACA®, Azure Audit Program, USA, 2010,
connectivity-models https://www.isaca.org/bookstore/
audit-control-and-security-essentials/waazu

10 ISACA JOURNAL VOL 4

You might also like