Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Download Microsoft Edge More info about Internet Explorer and Microsoft Edge
Read in English
Read in English Edit

Share via

Facebook x.com LinkedIn Email

Security quick links

Apply security guidance to your architecture to help ensure the confidentiality, integrity, and availability of your data and systems.

Learn key points

Quickstart

  • Design principles
  • Checklist
  • Tradeoffs
  • Security patterns
  • Azure Well-Architected Review assessment

Training

  • Security

video

  • Defense in depth security in Azure

Review design principles

Concept

  • Plan your security readiness
  • Design to protect confidentiality
  • Design to protect integrity
  • Design to protect availability
  • Sustain and evolve your security posture

Create a security foundation

How-To Guide

  • Establish a security baseline
  • Improve the security of your development lifecycle
  • Classify data
  • Monitor workload security
  • Model threats

Protect workload assets

How-To Guide

  • Segment components
  • Manage identities and access
  • Protect the network
  • Use encryption
  • Harden resources
  • Guard application secrets

Validate and improve security

How-To Guide

  • Perform security testing
  • Respond to incidents

Explore related resources

Reference

  • Microsoft Defender for Cloud: Azure security recommendations
  • Microsoft Defender for Cloud: AWS recommendations
  • Microsoft Defender for Cloud: Google Cloud recommendations
  • Azure security documentation
  • Microsoft cloud security benchmark
Your Privacy Choices
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2025
Your Privacy Choices
  • Previous Versions
  • Blog
  • Contribute
  • Privacy
  • Terms of Use
  • Trademarks
  • © Microsoft 2025