Using Azure Key Vault Secrets from your Azure DevOps pipelines

Using Azure Key Vault Secrets from your Azure DevOps pipelines

When working with Azure DevOps, there's a lot of options and configurations to tailor the service exactly to the needs of your organization. Part of the responsibilities that lie on the ones that managed these pipelines is to ensure that you don't spill the beans - or in other words, leak any sensitive data. With Azure DevOps, you can get sensitive data like Connection Strings, Secrets, API Keys and whatever else you may classify as sensitive, directly from an Azure Key Vault. In this post we'll explore how to configure Azure DevOps to fetch Secrets directly from Azure Key Vault…

Read More

Log custom application security events in Azure Log Analytics which are ingested and used in Azure Sentinel

Log custom application security events in Azure Log Analytics which are ingested and used in Azure Sentinel

A powerful capability of the Azure Sentinel service is that you can ingest data from a wide variety of sources. Using Connectors, you can even ingest data from other places than Azure, and you can get a more complete picture of your security posture across services in your technological landscape. In a previous post I talked about how to ingest Office 365 logs into your Azure Sentinel dashboards. In this post, I'm talking about how we can build our own Azure Log Analytics Data Collector API application to send custom logs to your Log Analytics workspace - and since I'm…

Read More

Monitoring Office 365 tenants with Azure Sentinel

Monitoring Office 365 tenants with Azure Sentinel

Azure Sentinel is a product from Microsoft, offering a cloud-native SIEM service. Sentinel uses clever AI (Artificial Intelligence) to make your threat detection and responses faster and smarter. A key feature with Azure Sentinel is that you can connect to other data sources. Microsoft has built-in support for ingesting data from a plethora of their own data sources, including: Azure ADOffice 365Cloud App SecurityAzure Activity LogAzure AD Identity ProtectionAzure Information Protection (AIP)Azure Advanced Threat Protection (ATP)Azure Security CenterDNSMicrosoft Web Application Firewal (WAF)Windows FirewallWindows Security Eventsand more...In this post I'll talk about how you can enable Azure…

Read More

Who accessed my Azure Key Vault?

Who accessed my Azure Key Vault?

In this post we'll discuss: What is Key Vault, in case you landed here and you don't know.Configure diagnostics logging for your vaultQuerying the logs from your Azure Key VaultConnecting Azure Monitor and Rules to set up AlertsGet e-mails about any activity you need to reviewWhat is Azure Key Vault?Storing sensitive data in the cloud, as anywhere, is vital to the success of your online business and survival. Azure Key Vault provides a way to store keys, secrets and certificates securely and under lock and key in your Azure subscription. Examples of things you can put in your…

Read More

Passing AZ-500: Microsoft Certified Azure Security Engineer Associate

Passing AZ-500: Microsoft Certified Azure Security Engineer Associate

This week I took - and passed - the Microsoft Exam AZ-500: Microsoft Azure Security Technologies, which if you pass, leads to the Microsoft Certification Azure Security Engineer Associate. View my badge on Acclaim: https://www.youracclaim.com/badges/eeb67553-55fe-4663-bf04-33c5e83d2ba7 I'm not going to lie - it was a challenging exam. I didn't pass with 1000/1000 points, but I did pass. I come from a developer and solution architect background, and this exam focuses on more IT topics than dev ones for obvious reasons, so I had to push myself to get myself prepared for it. In the last…

Read More

Protecting your Azure Container Registry by denying all requests except from allowed IP addresses

Protecting your Azure Container Registry by denying all requests except from allowed IP addresses

With Azure Container Registry, or ACR, we get a lot of great capabilities to host our Docker images in the Azure cloud. With that, as with everything else, comes security concerns we should not overlook. In this post I'm exploring how we can lock down all access to our ACR by default, and then enable access based on an IP address or range of IP addresses. This is similar to what I've already explained in another post about Secure your Azure Storage Accounts with restrictions based on public IP addresses. If you haven't seen that, take a look there how…

Read More