# Azure Security Project Lab

Overview

This project contains basics like perimeter as security to monitoring events, Threat Hunting using Microsoft CNAPP tools and SIEM and SOAR use cases. All labs and ARM/automation templates are as per my own lab performed, read instructions before using it.

{% hint style="info" %}
It contains both major and minor project. Major project means end to end implementation, Security Best Practices, Frameworks etc. And Minor project means Services Baseline implementation&#x20;
{% endhint %}

## <mark style="color:green;">Projects</mark>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><mark style="color:purple;"><strong>Managing Resources inside Azure</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of RBAC</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Network &#x26; Application Security</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Perimeter Security</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Securing Storage Account &#x26; DB</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Securing Secrets using Azure Key Vaults</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation Platform Protection</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Zero Trust Architecture</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Managing Security Operations</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of CSPM,CSWP,CNAPP,CWP</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of SIEM and SOAR</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Detection and Threat Hunting</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Posture &#x26; Vulnerability Management</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Endpoint Security</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Threat Modelling</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Integrate Security into the Development Process</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Shift Left Approach</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Securing DevOps CI/CD pipeline</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Secrets Scanning using MDC</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>CASB implementation</strong></mark> </td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of MCRA</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Implementation of Azure Security Benchmarks</strong></mark></td><td></td><td></td><td></td></tr><tr><td><mark style="color:purple;"><strong>Information Protection</strong></mark></td><td><ul><li>Microsoft Purview Intro</li><li>Data Life cycle </li><li>Data Loss Prevention (DLP)</li><li>Data classification &#x26; Governance </li><li>Handling sensitive information type </li><li>M365 encryptions </li><li>Microsoft Message purview encryption </li><li>Protect Information in Microsoft Purview </li><li>Sensitive label management</li><li>Data Loss prevention in MS Purview </li><li>Configure DLP policies for Microsoft Defender for Cloud Apps and Power Platform</li><li>Manage data loss prevention policies and reports in Microsoft 365</li><li>Manage the data lifecycle in Microsoft Purview</li><li>Manage data retention in Microsoft 365 workloads</li><li>Manage records in Microsoft Purview</li></ul></td><td></td><td></td></tr></tbody></table>

## <mark style="color:green;">Service Base Line</mark>

| Network Security    | Asset Management           | End Point Security  |
| ------------------- | -------------------------- | ------------------- |
| Identity Management | Logging & Threat Detection | Backup & Recovery   |
| Privilege Access    | Incident Response          | DevOps Security     |
| Data Protection     | Posture & Vuln Management  | Governance Strategy |

## Quick links

{% embed url="<https://portal.azure.com>" fullWidth="true" %}
Azure Portal
{% endembed %}

Demo


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://azsec.troubleshooterclub.in/azure-security-project-lab.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
