- Blog
#Security
Streamlining Compliance with Microsoft Purview’s Alerting Features
- 20/02/2025
Reading time 7 minutes
As cloud computing becomes more integrated into our daily operations, the importance of securing identities in Azure can’t be overstated. Gone are the days when a strong firewall was enough to protect our networks. With cloud-native services now accessed over the internet, the key to security lies in safeguarding identities and access credentials.
If you’ve been in a cybersecurity conversation lately, you’ve probably heard someone say, “Identity is the new perimeter.” But what does that mean? In the past, securing the network itself was the focus. Once inside the network, users had access to most, if not all, of the resources. It’s like unlocking the front door of your house—once you’re in, you can roam freely.
Today, with cloud services, this model doesn’t work anymore. Most cloud applications are accessed via the internet, and the only thing standing between an attacker and your data is the strength of your identity security.
The stakes are high. According to the 2024 Microsoft Digital Defense Report, over 600 million identity attacks per day occurred on Microsoft Entra alone. That’s just one platform. Most of these attacks—99%, to be exact—were password-based. These include methods like:
Even Multi-Factor Authentication (MFA), while highly effective, isn’t foolproof. Adversary-in-the-Middle (AiTM) attacks—designed to bypass MFA—have surged by 146% in just the past year.
As identity is the thing to secure, you should be familiar with the different type of identities in Azure. Good thing about the variety in identities is that one size never fits all and there are plenty of use cases to consider. Bad thing is that you can compromise the security of a service if you choose poorly.
List of identities here. We´ll focus just on user and service principal identities here:
As you can see there are a lot of different types of identities used in Azure. One might argue that a group for example is not an identity but since you can access something based on the group you are in, I’d argue that it is an identity to be guarded just as a normal account should be.
Securing identities doesn’t have to be overwhelming as there are a lot of small things that improve security by a mile. I´ll do a division between normal users and service principals/managed identities, since they work in different roles. Here are some practical steps that have worked well:
Users:
Workload identities:
Securing Azure identities isn’t just a technical task—it’s a mindset shift. As attackers get smarter and more relentless, we need to focus on identities as the foundation of our security strategies. It’s not just about protecting the data but ensuring our teams can work securely and confidently in the cloud. We provide assessments so you can get a clear picture of your environments current situation and consultation on top of that to gain control of the processes related to identities and a lot more!
Identity is the new perimeter, and securing it is our best chance to stay ahead of the curve. With Microsoft’s robust tools and a clear strategy, we can do just that.
Our newsletters contain stuff our crew is interested in: the articles we read, Azure news, Zure job opportunities, and so forth.
Please let us know what kind of content you are most interested about. Thank you!