{"id":971,"date":"2019-10-10T00:00:00","date_gmt":"2019-10-10T07:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/cis-azure-security-foundations-benchmark-open-for-comment"},"modified":"2025-06-25T20:54:58","modified_gmt":"2025-06-26T03:54:58","slug":"cis-azure-security-foundations-benchmark-open-for-comment","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/","title":{"rendered":"CIS Azure Security Foundations Benchmark open for comment"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it. As an Azure customer, you can leverage this understanding by using security recommendations from Microsoft to help guide your risk-based decisions as they\u2019re applied to specific security configuration settings in your environment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We partnered with the Center for Internet Security (CIS) to create the <a href=\"https:\/\/www.cisecurity.org\/blog\/cis-microsoft-azure-foundations-benchmark-v1-0-0-now-available\/\" target=\"_blank\" rel=\"noopener\">CIS Microsoft Azure Foundations Benchmark v1<\/a>.&nbsp; Since that submission, we\u2019ve received good feedback and wanted to share it with the community for comment in a document we call the <a href=\"https:\/\/aka.ms\/AzureCloudBenchmark\" target=\"_blank\" rel=\"noopener\">Azure Security Foundations Benchmark<\/a>. This benchmark contains recommendations that help improve the security of your applications and data on Azure. The recommendations in this document will go into updating the CIS Microsoft Azure Foundations Benchmark v1, and are anchored on the security best practices defined by the <a href=\"https:\/\/www.cisecurity.org\/controls\/\" target=\"_blank\" rel=\"noopener\">CIS Controls, Version 7<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition, these recommendations are or will be integrated into Azure Security Center and their impact will be surfaced in the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-secure-score\" target=\"_blank\" rel=\"noopener\">Azure Security Center Secure Score<\/a> and the <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-compliance-dashboard\" target=\"_blank\" rel=\"noopener\">Azure Security Center Compliance Dashboard<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We want your feedback on this document. There are two ways you can let us know what you think:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Send us an <a href=\"mailto:benchmarkfeedback@microsoft.com?subject=Feedback%2520on%2520the%2520Azure%2520Cloud%2520Security%2520Benchmark\">email<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Fill in the <a href=\"https:\/\/aka.ms\/AzSecBenchmark\" target=\"_blank\" rel=\"noopener\">feedback form<\/a>.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The Azure Security Foundation Benchmark is now in draft stage and we\u2019d like to get your input on this effort. Specifically, we\u2019d like to know:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Does this document provide you with the information needed to understand how to define your own security baseline for Azure based resources?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Does this format work for you? Are there other formats that would make it easier for you to use the information and act on it?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Do you currently use the CIS Controls as a framework and the current edition of the CIS Azure Security Foundation Benchmarks?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">What additional information do you need on how to implement the recommendations using Azure security related capabilities?<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Once we have the final version of the benchmark ready, we will be integrating with Azure Security Center Compliance Portal. Does this meet your requirements of monitoring Azure resources based on CIS Benchmarks?<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The Azure Security Foundation Benchmark team wants to hear from you! You can connect with us via <a href=\"mailto:benchmarkfeedback@microsoft.com\">email<\/a> or the <a href=\"https:\/\/aka.ms\/AzureCloudBenchmark\" target=\"_blank\" rel=\"noopener\">feedback form<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-s-in-the-azure-security-foundation-benchmark-document\">What\u2019s in the Azure Security Foundation Benchmark document<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The benchmark document is divided into three main sections:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Overview information.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Security recommendations.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Security implementation in Azure services.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The Overview information provides background on why we put this document together, how you can use it to improve your security posture in Azure, and some key definitions of benchmark terminology.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The security recommendations are the cornerstone of the document. In this phase, we cover security recommendations in the following areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Network<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Logging<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Monitoring<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Identity and access management<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Data protection<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The recommendations are surfaced in tables like those seen in the image below.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><img loading=\"lazy\" decoding=\"async\" title=\"CIS 1\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp\" alt=\"Azure Security Foundations Benchmark Recommendations table\" width=\"589\" height=\"743\"><br>The last section shows how the Azure security recommendations are implemented in a selection of core Azure services. The implementations include links to documents that will help you understand how to apply each component of the benchmark to improve your security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Implementation information is contained in tables as seen below.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><img loading=\"lazy\" decoding=\"async\" title=\"CIS 2\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/c1c564ab-2c37-4205-a9f8-fc7632378c40.webp\" alt=\"Azure Security Foundations Benchmark service mapping table\" width=\"624\" height=\"342\"><br>We hope you find this information useful and thank you in advance for your input on how we can make this document more useful for you and your organization! Remember to send us your feedback via <a href=\"mailto:benchmarkfeedback@microsoft.com\">email<\/a> on the CIS Azure Cloud Security Benchmark.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1459],"tags":[],"audience":[3053,3056],"content-type":[],"product":[1798],"tech-community":[],"topic":[],"coauthors":[97],"class_list":["post-971","post","type-post","status-publish","format-standard","hentry","category-security","audience-it-decision-makers","audience-it-implementors","product-azure-security-center","review-flag-7-1680286581-146","review-flag-lever-1680286579-649"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CIS Azure Security Foundations Benchmark open for comment | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CIS Azure Security Foundations Benchmark open for comment | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-10T07:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T03:54:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp\" \/>\n<meta name=\"author\" content=\"Microsoft Azure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Azure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Azure\"}],\"headline\":\"CIS Azure Security Foundations Benchmark open for comment\",\"datePublished\":\"2019-10-10T07:00:00+00:00\",\"dateModified\":\"2025-06-26T03:54:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/\"},\"wordCount\":597,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/\",\"name\":\"CIS Azure Security Foundations Benchmark open for comment | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp\",\"datePublished\":\"2019-10-10T07:00:00+00:00\",\"dateModified\":\"2025-06-26T03:54:58+00:00\",\"description\":\"One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CIS Azure Security Foundations Benchmark open for comment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CIS Azure Security Foundations Benchmark open for comment | Microsoft Azure Blog","description":"One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/","og_locale":"en_US","og_type":"article","og_title":"CIS Azure Security Foundations Benchmark open for comment | Microsoft Azure Blog","og_description":"One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2019-10-10T07:00:00+00:00","article_modified_time":"2025-06-26T03:54:58+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp","type":"","width":"","height":""}],"author":"Microsoft Azure","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Microsoft Azure","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/microsoft-azure\/","@type":"Person","@name":"Microsoft Azure"}],"headline":"CIS Azure Security Foundations Benchmark open for comment","datePublished":"2019-10-10T07:00:00+00:00","dateModified":"2025-06-26T03:54:58+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/"},"wordCount":597,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/","name":"CIS Azure Security Foundations Benchmark open for comment | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp","datePublished":"2019-10-10T07:00:00+00:00","dateModified":"2025-06-26T03:54:58+00:00","description":"One of the best ways to speed up securing your cloud deployments is to focus on the most impactful security best practices. Best practices for securing any service begins with a fundamental understanding of cybersecurity risk and how to manage it.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/10\/79e152f4-b4c6-4b2f-9d56-1fa379c9f561.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/cis-azure-security-foundations-benchmark-open-for-comment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"CIS Azure Security Foundations Benchmark open for comment"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=971"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/971\/revisions"}],"predecessor-version":[{"id":43623,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/971\/revisions\/43623"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=971"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=971"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=971"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=971"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=971"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=971"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}