摘要:要将零信任原则应用于Azure虚拟机,您必须使用专用资源组配置逻辑隔离,利用基于角色的访问控制(RBAC),保护虚拟机引导组件,启用客户管理的密钥和双重加密,控制安装的应用程序,配置虚拟机的安全访问和维护,并启用高级威胁检测和保护。

本文提供了将零信任原则应用于Azure中的虚拟机的步骤:

 
Zero Trust principle Definition Met by
Verify explicitly Always authenticate and authorize based on all available data points. Use secure access.
Use least privileged access Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection. Leverage Role Based Access Control (RBAC) and control the applications running on virtual machines.
Assume breach Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses. Isolate virtual machines with resource groups, secure their components, use double encryption, and enable advanced threat detection and protection.

本文是一系列文章的一部分,这些文章演示了如何在Azure中的环境中应用零信任原则,该环境包括承载基于虚拟机的工作负载的辐条虚拟网络(ExpressRoute)。有关概述,请参阅将零信任原则应用于Azure基础架构。

虚拟机的逻辑架构

虚拟机的零信任原则应用于整个逻辑架构,从租户和目录级别到每个虚拟机内的数据和应用程序层。

下图显示了逻辑架构组件。

在该图中:

  • A是一组隔离在Azure订阅中的专用资源组内的虚拟机。
  • B是具有以下组件的单个虚拟机的逻辑体系结构:应用程序、操作系统、磁盘、引导加载程序、OS内核、驱动程序和可信平台模块(TPM)组件。

本文将使用这些步骤,逐步介绍在这个逻辑架构中应用零信任原则的步骤。


Step Task Zero Trust principles applied
1 Configure logical isolation by deploying virtual machines to a dedicated resource group. Assume breach
2 Leverage Role Based Access Control (RBAC). Verify explicitly
Use least privileged access
3 Secure virtual machine boot components including boot loaders, OS kernels, and drivers. Securely protect keys, certificates, and secrets in the Trusted Platform Module (TPM). Assume breach
4 Enable customer-managed keys and double encryption. Assume breach
5 Control the applications that are installed on virtual machines. Use least privileged access
6 Configure secure access (not shown on the logical architecture figure). Verify explicitly
Use least privileged access
Assume breach
7 Set up secure maintenance of virtual machines (not shown on the logical architecture figure). Assume breach
8 Enable advanced threat detection and protection (not shown on the logical architecture figure). Assume breach

Step 1: Configure logical isolation for virtual machines

Begin by isolating virtual machines within a dedicated resource group. You can isolate virtual machines into different resource groups based on purpose, data classification, and governance requirements, such as the need to control permissions and monitoring.

Using dedicated resource groups allows you to set policies and permissions that apply to all the virtual machines within the resource group. You can then use role based access control (RBAC) to create least privileged access to the Azure resources contained in the resource group.

For more information on creating and managing resource groups, see Manage Azure resource groups by using the Azure portal.

You assign a virtual machine to a resource group when you first create the virtual machine, as shown here.

Screenshot of assigning a virtual machine to a resource group.

Step 2: Leverage Role Based Access Control (RBAC)

Zero Trust requires configuring least privileged access. To do so, you need to limit user access with just-in-time and just-enough access (JIT/JEA) based on their role, workload, and data classification.

The following built-in roles are commonly used for virtual machine access:

  • Virtual Machine User Login: View virtual machines in the portal and sign-in as a regular user.
  • Virtual Machine Administration Login: View virtual machines in the portal and sign-in to virtual machines as an Administrator.
  • Virtual Machine Contributor: Create and manage virtual machines, including reset root user's password and managed disks. Doesn't grant access to the management virtual network (VNet) or the ability to assign permissions to the resources.

To join a virtual machine to a VNet, you can use the custom permission Microsoft.Network/virtualNetworks/subnets/join/action to make a custom role.

When this custom role is used with Managed Identity and Conditional Access Policy, you can use device state, data classification, anomalies, location, and identity to force multifactor authentication and granularly allow access based on verified trust.

To extend your realm of control beyond the system and allow your Microsoft Entra ID tenant with Microsoft Intelligent Security Graph to support secure access, go to the Management blade of the virtual machine and turn on System Assigned Managed Identity, as shown here.

Screenshot of enabling system assigned managed identity.

Note

This feature is only available for Azure Virtual Desktop, Windows Server 2019, Windows 10, and Linux Distros using certificate-based access.

Step 3: Secure virtual machine boot components

Follow these steps:

  • When you create the virtual machine, be sure you configure security for the boot components. Enhanced deployment of virtual machines allows you to select security type and use Secure boot and vTPM.
  • Securely deploy virtual machines with verified boot loaders, OS kernels, and drivers that are signed by trusted publishers to establish a "root ." If the image isn't signed by a trusted publisher, the virtual machine won't boot.
  • Securely protect keys, certificates, and secrets in the virtual machines in a Trusted Platform Module.
  • Gain insights and confidence of the entire boot chain's integrity.
  • Ensure workloads are trusted and verifiable. The vTPM enables attestation by measuring the entire boot chain of your virtual machine (UEFI, OS, system, and drivers).

Enhanced deployment of virtual machines allows you to select security type and use secure boot and vTPM when you create them, as shown here.

Screenshot of specifying security features for a virtual machine.

Step 4: Enable customer-managed keys and double encryption

Using customer-managed keys and double encryption ensures that if a disk is exported, it isn't readable or able to function. By ensuring that the keys are privately held and disks are double encrypted, you protect against breaches that attempt to extract disk information.

For information on how to configure a customer-managed encryption key with Azure Key Vault, see Use the Azure portal to enable server-side encryption with customer-managed keys for managed disks. There's an additional cost for using Azure Key Vault.

Enable server-side encryption of Azure Disk Storage for:

  • FIPS 140-2 compliant transparent encryption with AES 256 encryption.
  • Greater flexibility to manage controls.
  • Hardware (HSM) or software-defined encryption.

Enable server-side encryption at the host for end-to-end encryption of your virtual machine data.

After completing these procedures, you use your customer-managed encryption key to encrypt the disks within your virtual machine.

You select the encryption type on the Disks blade for the virtual machine configuration. For Encryption type, select Double encryption with platform-managed and customer-managed keys, as shown here.

Screenshot for selecting the encryption type for a virtual machine.

Step 5: Control the applications installed on virtual machines

It's important to control the applications that are installed on your virtual machines:

  • Browser extensions (APIs) are difficult to secure which can lead to malicious URL delivery.
  • Unsanctioned apps can go unpatched as they're shadow IT objects (the IT teams aren't prepared or have no knowledge that these are installed).

You can use the Virtual Machine Applications feature to control the applications that are installed on virtual machines. With this feature, you select which virtual machine applications to install. This feature uses the Azure Compute Gallery to simplify management of applications for virtual machines. When used together with RBAC, you can ensure that only trusted applications are available for users.

You select the virtual machine applications on the Advanced blade for the virtual machine configuration, as show here.

Screenshot for configuring applications of a virtual machine.

Step 6: Configure secure access

To configure secure access:

  • Configure secure communication within the Azure environment between components that are accessing virtual machines directly
  • Set up multifactor authentication with conditional access
  • Use privileged access workstations (PAWs)

Diagram of the logical architecture for configuring secure access to a virtual machine.

In the diagram:

  • multifactor authentication with conditional access is set up within Microsoft Entra ID and related portals.
  • Admins use privileged access workstations (PAWs) to access virtual machines directly.

Configure secure communication within the Azure environment for virtual machines

First, be sure that communication between the components in the Azure environment is secure.

In the reference architecture, Azure Bastion provides secure connections to virtual machines. Azure Bastion acts as an RDP/SSH broker and doesn't interact with the RDP protocol of your physical system. This also enables you to reduce the number of public-facing IP addresses.

The following diagram shows the components of secure communications for virtual machines.

Diagram of the components of secure communications for virtual machines within the Azure IaaS reference architecture.

Set up multifactor authentication with conditional access

In Step 2. Leverage Role Based Access Control, you configured Microsoft Entra integration and managed identity. This allows you to set up Azure multifactor authentication for Azure Virtual Desktop or for servers running Windows Server 2019 or newer. You can also Log in to a Linux VM with Microsoft Entra credentials. The added benefit of this is the machine that connects to the virtual machine must also be registered to your Microsoft Entra ID tenant to be allowed to connect.

When configuring multifactor authentication with conditional access and related policies, use the recommended policy set for Zero Trust as a guide. This includes Starting point policies that don't require managing devices. Ideally, the devices accessing your virtual machines are managed and you can implement the Enterprise policies, which is recommended for Zero Trust. For more information, see Common Zero Trust identity and device access policies.

The following diagram shows the recommended policies for Zero Trust.

Diagram of the Zero Trust identity and device access policies for three protection levels: Starting point, Enterprise, and Specialized security.

Remember that usernames and passwords can be 100% compromised. Using multifactor authentication, you reduce your risk of compromise by 99.9%. This requires Microsoft Entra ID P1 licenses.

Note

You can use VPNs used to connect to virtual machines in Azure as well. However, you should be sure to use methods to verify explicitly. Creating a tunnel that is "trusted" regardless of how they are used can be riskier than having specific connections that are highly verified.

No amount of security at the Network, Transport, or Application layers matters if you aren't coming from a trusted, verified, and secure source.

Use PAWs

Use Privileged Access Workstations (PAWs) to ensure devices that access virtual machines are healthy. PAWs are configured specifically for privileged access so that admins use a device that has:

  • Security controls and policies that restrict local administrative access.
  • Productivity tools to minimize the attack surface to only what's absolutely required for performing sensitive administrative tasks.

For more information on deployment options, see Privileged access deployment.

Step 7: Set up secure maintenance of virtual machines

Secure maintenance of virtual machines includes:

  • Using anti-malware
  • Automating virtual machine updates

Use anti-malware on virtual machines

Anti-malware helps protect your virtual machine from threats such as malicious files and adware, etc. You can use anti-malware software from an option of vendors such as Microsoft, Symantec, Trend Micro, and Kaspersky.

Microsoft Antimalware is a no-cost resource that provides real-time protection capability to assist in detection, quarantining and eradicating malicious software, spyware, and viruses:

  • Runs in the background with the need of user interaction
  • Provides alerts when unwanted or malicious software is downloaded, installed, or run
  • Offers secure-by-default configuration and anti-malware monitoring
  • Scheduled scanning
  • Signature updates
  • Antimalware Engine and Platform updates
  • Active Protection
  • Samples reporting
  • Exclusions
  • Antimalware event collection

Automate virtual machine updates

Automating updates to systems ensures they are protected from the latest malware and misconfiguration exploits. There's automatic updating with aid in the trusted platform verification process.

Concentrate on Azure Virtual Machine Maintenance and Updates to ensure your systems are hardened against configuration insecurities:

  • Azure Automation Update Management can assist in the management of your update process. With this utility, you can check the update status of your systems, manage, schedule, and reboot servers.
  • The Azure Virtual Machine Agent is used to manage your virtual machines and gives you the ability to use extensions for management.

Operating systems supported by Update Management include the following:

  • Each Windows virtual machine - Update Management does a scan twice a day for each machine.
  • Each Linux virtual machine - Update Management does a scan every hour.

See this additional guidance:

Step 8: Enable advanced threat detection and protection

Threat protection for Azure infrastructure is provided by Microsoft Defender for Cloud. This protection is extended to virtual machines when you provision Microsoft Defender for Servers, as shown in the following diagram.

Diagram of the logical architecture showing how Microsoft Defender for Cloud along Microsoft Defender for Servers provides threat detection and protection for virtual machines.

In the diagram:

  • As described in the Apply Zero Trust principles to Azure IaaS overview article, Defender for Cloud is enabled at the level of an Azure subscription or at the level of an Azure management group that includes multiple Azure subscriptions.
  • In addition to enabling Defender for Cloud, Defender for Servers is provisioned.

Advanced threat protection verifies the activities occurring on virtual machines based on Microsoft's threat intelligence. It looks for specific configurations and activities that suggest that there could be a breach. It enables the Verify explicitly and Assume breach Zero Trust principles.

Microsoft Defender for Servers includes the following:

Secure your Azure virtual machine disks

Training Secure your Azure virtual machine disks

Learn how to use Azure Disk Encryption (ADE) to encrypt OS and data disks on existing and new virtual machines.
In this module, you learn how to:

  • Determine which encryption method is best for your virtual machine.
  • Encrypt existing virtual machine disks using the Azure portal.
  • Encrypt existing virtual machine disks using PowerShell.
  • Modify Azure Resource Manager templates to automate disk encryption on new virtual machines.

For more training on Azure, see the entire Microsoft catalog:
Browse all - Training | Microsoft Learn

Implement virtual machine host security in Azure

Training Implement virtual machine host security in Azure
In this learning path, learn how to protect and harden your virtual machines in Azure.

For more training on virtual machines in Azure, see these resources in the Microsoft catalog:
Virtual machines in Azure | Microsoft Learn

Next Steps

See these additional articles for applying Zero Trust principles to Azure:

Technical illustrations

This poster provides a single-page, at-a-glance view of the components of Azure IaaS as reference and logical architectures, along with the steps to ensure that these components have the "never trust, always verify" principles of the Zero Trust model applied.

Item Description
Thumbnail figure for the Apply Zero Trust to Azure IaaS infrastructure poster.


PDF | Visio
Updated March 2024

Use this illustration together with this article: Apply Zero Trust principles to Azure IaaS overview

Related solution guides
 

This poster provides the reference and logical architectures and the detailed configurations of the separate components of Zero Trust for Azure IaaS. Use the pages of this poster for separate IT departments or specialties or, with the Microsoft Visio version of the file, customize the diagrams for your infrastructure.

Item Description
Thumbnail figure for the Diagrams for applying Zero Trust to Azure IaaS infrastructure poster.


PDF | Visio
Updated March 2024

Use these diagrams together with the articles starting here: Apply Zero Trust principles to Azure IaaS overview

Related solution guides
 

For additional technical illustrations, click here.

References