Azure security documentation
Azure offers security advantages that support compliance efforts, and provide cost-effective security for your organization, and help protect your hybrid and multicloud platforms, applications, and data.
Concept
Build a Zero Trust FoundationHow-To Guide
Aggregate data with summary rulesConcept
Optimize security operationsConcept
Azure Network SecurityModernize security operations
Data security & governance, risk, and compliance
Secure identities and access
Security guidance for each phase of your cloud migration
Strategy and planning
Define business justification and expected outcomes of adoption
Implementation and operation
Migrate and modernize security operations management
Cloud architecture
Design, build, and continuously improve your cloud architecture
Continued learning
Discover learning paths that help you improve your security in the cloud
Additional security guidance
If you're new to security, build your skills with Microsoft Learn training
Secure methodology designed to help cloud architects and business decision makers create and implement security strategies for the cloud
Learn how to secure your cloud solutions on Azure
Best practices and recommendations to secure your cloud deployments
Design principles for a securely architected system hosted on cloud or on-premises datacenters
A set of guiding tenets that can be used to protect your applications and data from threats
Learn how to develop and deploy secure applications on Azure with our sample apps, best practices, and guidance
Security services and capabilities
Microsoft Sentinel
See and stop threats before they cause harm
Microsoft Defender for Cloud
Unify security management and advanced threat protection across hybrid cloud workloads
Microsoft Defender for Identity
Improve security of hybrid environments from cyber attacks and insider threats
Azure key management
Key management solutions in Azure
Microsoft Defender for Cloud Apps
Cloud Access Security Broker (CASB) that operates on multiple clouds
Microsoft Defender for IoT
Threat detection for IoT/OT environments
Microsoft Entra ID
Multitenant, cloud-based identity, and access management service
Microsoft Defender XDR
Security solutions that protect your enterprise across attack surfaces