End-to-end security in Azure

Azure provides comprehensive security capabilities across all layers of your cloud deployments. Azure delivers confidentiality, integrity, and availability of customer data while enabling transparent accountability. This article introduces Azure's security architecture organized by protection, detection, and response capabilities.

For a comprehensive introduction to Azure security capabilities organized by functional area, see Introduction to Azure security. For detailed implementation guidance and best practices, refer to the domain-specific security overview articles linked throughout this document.

Microsoft security architecture

Azure security services are organized into three foundational categories:

  • Secure and protect: Implement defense-in-depth strategies across identity, infrastructure, networks, and data
  • Detect threats: Identify suspicious activities and potential security incidents
  • Investigate and respond: Analyze security events and take corrective actions

The following diagram illustrates how Azure security services align with these categories and the resources they protect:

Diagram showing end-to-end security services in Azure.

Security controls and baselines

The Azure cloud security benchmark provides comprehensive security guidance for Azure services:

  • Security controls: High-level recommendations applicable across your Azure tenant and services
  • Service baselines: Implementation of controls for individual Azure services with specific configuration recommendations

Use these controls and baselines to:

For governance and compliance capabilities, see Azure security management and monitoring overview.

Secure and protect

Azure provides layered security controls across identity, infrastructure, networks, and data. For detailed implementation guidance, refer to the domain-specific overview articles.

Threat protection

Microsoft Defender for Cloud provides unified security management with continuous assessment and advanced threat protection. For comprehensive coverage, see Azure threat protection.

Identity and access

For details, see Azure identity management security overview.

Network security

For details, see Azure network security overview.

Data protection

For details, see Azure encryption overview and Key management in Azure.

Governance

For details, see Azure security management and monitoring overview.

Detect threats

Azure threat detection services identify suspicious activities and security incidents across your environment.

For comprehensive threat detection capabilities, see Azure threat protection.

Investigate and respond

Azure provides tools to analyze security events and respond to incidents.

For monitoring and operational guidance, see Azure security management and monitoring overview.

Next steps