azure-security

Expert knowledge for Azure Security development including troubleshooting, best practices, decision making, limits & quotas, security, configuration, integrations & coding patterns, and deployment. Use when building, debugging, or optimizing Azure Security applications. Not for Azure Defender For Cloud (use azure-defender-for-cloud), Azure DDos Protection (use azure-ddos-protection), Azure Firewall (use azure-firewall), Azure Web Application Firewall (use azure-web-application-firewall).

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "azure-security" with this command: npx skills add microsoftdocs/agent-skills/microsoftdocs-agent-skills-azure-security

Azure Security Skill

This skill provides expert guidance for Azure Security. Covers troubleshooting, best practices, decision making, limits & quotas, security, configuration, integrations & coding patterns, and deployment. It combines local quick-reference content with remote documentation fetching capabilities.

How to Use This Skill

IMPORTANT for Agent: This file may be large. Use the Category Index below to locate relevant sections, then use read_file with specific line ranges (e.g., L136-L144) to read the sections needed for the user's question

IMPORTANT for Agent: If metadata.generated_at is more than 3 months old, suggest the user pull the latest version from the repository. If mcp_microsoftdocs tools are not available, suggest the user install it: Installation Guide

This skill requires network access to fetch documentation content:

  • Preferred: Use mcp_microsoftdocs:microsoft_docs_fetch with query string from=learn-agent-skill. Returns Markdown.
  • Fallback: Use fetch_webpage with query string from=learn-agent-skill&accept=text/markdown. Returns Markdown.

Category Index

CategoryLinesDescription
TroubleshootingL36-L40Diagnosing and resolving common Azure Customer Lockbox issues, including access request problems, approval/denial errors, and configuration or permission-related failures.
Best PracticesL41-L59Security hardening checklists and patterns for Azure IaaS/PaaS: identity, network, data encryption, secrets, DNS, and app/database/service configurations to reduce attack surface.
Decision MakingL60-L64Guidance on choosing between Azure Key Vault, Managed HSM, Cloud HSM, and Payment HSM based on security, compliance, key management, and workload requirements.
Limits & QuotasL65-L69Which Azure services support customer-managed encryption keys, and how to determine CMK capabilities and options across different Azure resources
SecurityL70-L99Security best practices for Azure workloads: threat modeling mitigations, AKS image validation, ransomware defense, incident response, data protection, certificates, and operational/SQL security features
ConfigurationL100-L108Configuring Azure security features like antimalware, firewalls, container vulnerability tools, security logging/auditing, and upcoming managed TLS/DCV changes
Integrations & Coding PatternsL109-L113Guidance on generating signed SBOMs for container images, attaching them in CI/CD, and integrating software supply chain security into deployment workflows.
DeploymentL114-L120Guides for signing and verifying container images with Notation in Azure Pipelines/GitHub Actions, plus comparing security feature availability in Azure vs Azure Government.

Troubleshooting

TopicURL
Resolve common issues with Azure Customer Lockboxhttps://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-faq

Best Practices

TopicURL
Harden Azure Marketplace images before publishinghttps://learn.microsoft.com/en-us/azure/security/fundamentals/azure-marketplace-images
Apply Azure data security and encryption best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/data-encryption-best-practices
Use Azure SQL database security checklisthttps://learn.microsoft.com/en-us/azure/security/fundamentals/database-security-checklist
Apply security best practices to Azure IaaS workloadshttps://learn.microsoft.com/en-us/azure/security/fundamentals/iaas
Apply Microsoft Entra identity security best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/identity-management-best-practices
Apply Azure network security best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/network-best-practices
Apply operational security best practices for Azure assetshttps://learn.microsoft.com/en-us/azure/security/fundamentals/operational-best-practices
Secure Azure App Service web and mobile applicationshttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-applications-using-app-services
Secure PaaS databases with Azure SQL and Synapsehttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-applications-using-sql
Secure PaaS applications using Azure Storage featureshttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-applications-using-storage
Design and operate secure PaaS deployments on Azurehttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-deployments
Protect secrets across Azure services and pipelineshttps://learn.microsoft.com/en-us/azure/security/fundamentals/secrets-best-practices
Apply security best practices to Azure Service Fabrichttps://learn.microsoft.com/en-us/azure/security/fundamentals/service-fabric-best-practices
Implement five-step checklist to secure Entra IDhttps://learn.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity
Prevent Azure subdomain takeover with DNS and App Servicehttps://learn.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover

Decision Making

TopicURL
Choose between Azure Key Vault, Managed HSM, Cloud HSM, Payment HSMhttps://learn.microsoft.com/en-us/azure/security/fundamentals/key-management-choose

Limits & Quotas

Security

TopicURL
Enforce AKS image signature validation with Ratify and Azure Policyhttps://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/validating-image-signatures-using-ratify-aks
Implement auditing and logging mitigations with Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-auditing-and-logging
Apply authentication mitigations using Microsoft Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-authentication
Mitigate authorization threats in Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-authorization
Secure communications based on Threat Modeling Tool findingshttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-communication-security
Harden configuration management using Threat Modeling Tool mitigationshttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-configuration-management
Implement cryptography mitigations from Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-cryptography
Secure exception management using Threat Modeling Tool guidancehttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-exception-management
Apply secure input validation mitigations from Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-input-validation
Protect sensitive data using Threat Modeling Tool mitigationshttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-sensitive-data
Implement secure session management from Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-session-management
Apply Azure-specific security best practices for AI workloadshttps://learn.microsoft.com/en-us/azure/security/fundamentals/ai-security-best-practices
Use Azure Certificate Authority roots and requirementshttps://learn.microsoft.com/en-us/azure/security/fundamentals/azure-certificate-authority-details
Design Azure backup and restore plan against ransomwarehttps://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware
Implement Azure resource security best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/best-practices-and-patterns
Configure alternate email notifications for Customer Lockboxhttps://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-alternative-email
Control Microsoft engineer data access with Customer Lockboxhttps://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview
Implement Azure-specific incident response practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/incident-response-overview
Review Azure SQL Database built-in security featureshttps://learn.microsoft.com/en-us/azure/security/fundamentals/infrastructure-sql
Apply Azure operational security checklist actionshttps://learn.microsoft.com/en-us/azure/security/fundamentals/operational-checklist
Understand security access methods for Azure production networkhttps://learn.microsoft.com/en-us/azure/security/fundamentals/production-network
Understand Azure controls for protection of customer datahttps://learn.microsoft.com/en-us/azure/security/fundamentals/protection-customer-data
Detect and respond to ransomware using Azure security toolshttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-detect-respond
Use Azure-native features to protect against ransomwarehttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-features-resources
Prepare Azure environments to withstand ransomware attackshttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-prepare
Configure Azure Firewall Premium to mitigate ransomwarehttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-protection-with-azure-firewall

Configuration

Integrations & Coding Patterns

Deployment

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Automation

azure-architecture

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

azure-blob-storage

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

azure-logic-apps

No summary provided by upstream source.

Repository SourceNeeds Review
Automation

azure-functions

No summary provided by upstream source.

Repository SourceNeeds Review