# Azure Security Project Lab

Overview

This project contains basics like perimeter as security to monitoring events, Threat Hunting using Microsoft CNAPP tools and SIEM and SOAR use cases. All labs and ARM/automation templates are as per my own lab performed, read instructions before using it.

{% hint style="info" %}
It contains both major and minor project. Major project means end to end implementation, Security Best Practices, Frameworks etc. And Minor project means Services Baseline implementation&#x20;
{% endhint %}

## <mark style="color:green;">Projects</mark>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><mark style="color:purple;"><strong>Managing Resources inside Azure</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of RBAC</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Network &#x26; Application Security</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Perimeter Security</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Securing Storage Account &#x26; DB</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Securing Secrets using Azure Key Vaults</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation Platform Protection</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Zero Trust Architecture</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Managing Security Operations</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of CSPM,CSWP,CNAPP,CWP</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of SIEM and SOAR</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Detection and Threat Hunting</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Posture &#x26; Vulnerability Management</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Endpoint Security</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Threat Modelling</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Integrate Security into the Development Process</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Shift Left Approach</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Securing DevOps CI/CD pipeline</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Secrets Scanning using MDC</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>CASB implementation</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of MCRA</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Azure Security Benchmarks</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Information Protection</strong></mark></td><td><ul><li>Microsoft Purview Intro</li><li>Data Life cycle </li><li>Data Loss Prevention (DLP)</li><li>Data classification &#x26; Governance </li><li>Handling sensitive information type </li><li>M365 encryptions </li><li>Microsoft Message purview encryption </li><li>Protect Information in Microsoft Purview </li><li>Sensitive label management</li><li>Data Loss prevention in MS Purview </li><li>Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform</li><li>Manage data loss prevention policies and reports in Microsoft 365</li><li>Manage the data lifecycle in Microsoft Purview</li><li>Manage data retention in Microsoft 365 workloads</li><li>Manage records in Microsoft Purview</li></ul></td><td></td><td></td></tr></tbody></table>

## <mark style="color:green;">Service Base Line</mark>

| Network Security    | Asset Management           | End Point Security  |
| ------------------- | -------------------------- | ------------------- |
| Identity Management | Logging & Threat Detection | Backup & Recovery   |
| Privilege Access    | Incident Response          | DevOps Security     |
| Data Protection     | Posture & Vuln Management  | Governance Strategy |

## Quick links

{% embed url="<https://portal.azure.com>" fullWidth="true" %}
Azure Portal
{% endembed %}

Demo
