Specify security baselines for SaaS, PaaS, and IaaS services

Completed

As a security architect, you define security baselines that establish minimum security configurations for cloud resources. Security baselines translate organizational security requirements into actionable, measurable controls that can be consistently applied across SaaS, PaaS, and IaaS services.

Understand the shared responsibility model

Before specifying security baselines, you need to understand where your security responsibilities begin and end. The shared responsibility model defines which security tasks your cloud provider handles and which tasks you handle. These responsibilities vary by service model.

Diagram showing the division of security responsibilities between customer and cloud provider across SaaS, PaaS, and IaaS deployment models.

In IaaS deployments, you manage virtual machines, operating systems, and applications. PaaS shifts operating system and infrastructure management to Microsoft, but you remain responsible for application configuration and access controls. SaaS applications require you to focus primarily on data protection and identity management.

Regardless of service model, you always retain responsibility for protecting your data, managing identities, configuring access controls, and securing endpoints that access cloud services.

AI shared responsibility considerations

AI-enabled workloads introduce responsibilities beyond the traditional cloud model. The AI shared responsibility model defines three layers: the AI platform, the AI application, and AI usage. Microsoft secures the underlying AI infrastructure and builds safety systems into its PaaS and SaaS AI offerings. Your responsibilities vary by deployment type:

  • SaaS AI (for example, Microsoft Copilot): Microsoft manages the full application stack including model lifecycle, safety systems, and plugin governance. You remain responsible for access governance, data protection, acceptable use policies, and user education on AI-specific risks.
  • PaaS AI (for example, Azure OpenAI Service): Microsoft secures the platform and model hosting. You own model selection, prompt engineering, application safety systems, data grounding, and plugin configurations.
  • IaaS AI: You assume the broadest responsibility, including model training infrastructure, application design, and all security controls above the hypervisor.

Diagram showing AI responsibility zones.

Across all models, you must establish AI governance policies, protect sensitive data used in AI workloads, mitigate prompt injection risks, and validate AI-generated outputs. Apply Zero Trust principles to AI deployments by enforcing least privilege access, continuous verification, and dynamic risk assessment.

Use the Microsoft cloud security benchmark

The Microsoft cloud security benchmark (MCSB) provides the canonical framework for specifying security baselines in Azure. MCSB defines security controls aligned with industry standards including CIS Controls, NIST SP 800-53, PCI-DSS, and ISO 27001.

MCSB organizes security guidance into 12 security domains:

  • Network security: Secure virtual networks, establish private connections, and prevent external attacks
  • Identity management: Implement secure identity and access controls with strong authentication
  • Privileged access: Protect administrative accounts and privileged access workstations
  • Data protection: Control data at rest and in transit through encryption and access controls
  • Asset management: Ensure security visibility and governance over resources
  • Logging and threat detection: Enable detection, collection, and analysis of security events
  • Incident response: Prepare for and respond to security incidents
  • Posture and vulnerability management: Assess and improve security configuration continuously
  • Endpoint security: Deploy endpoint detection and response capabilities
  • Backup and recovery: Protect data through validated backup and recovery processes
  • DevOps security: Integrate security into development and deployment pipelines
  • Artificial intelligence security: Secure AI platform, applications, and monitoring

When specifying security baselines, map your organizational requirements to the relevant MCSB security domains and controls. Each Azure service has a published security baseline that provides service-specific guidance for implementing MCSB controls.

Specify IaaS security baselines

IaaS provides the most flexibility but also requires you to manage the largest portion of the security stack. Your IaaS security baseline should address the following areas.

Authentication and access control

Ensure that only authorized users can provision and access virtual machines. Use Azure Policy to establish conventions for resources and create policies that enforce security standards. Apply policies at the management group or subscription level so VMs inherit them automatically.

Use a least privilege approach and built-in Azure roles to restrict VM access. Assign roles like Virtual Machine Contributor, Security Admin, or DevTest Labs User based on job function. Use Azure RBAC to ensure only the central networking group has permissions to networking resources. For Linux VMs, integrate with Microsoft Entra authentication to centrally control and enforce access policies.

Endpoint protection

Require antimalware solutions on all virtual machines. Deploy Microsoft Defender for Endpoint or supported endpoint protection solutions. Use Microsoft Defender for Cloud to monitor endpoint protection status and remediate gaps.

Update management

Establish patching requirements and timelines for operating systems and applications. Use Azure Update Manager to assess update status, schedule maintenance windows, and deploy updates across Windows and Linux machines in Azure, on-premises, and other cloud environments.

Disk encryption

Require encryption for virtual hard disks to protect boot volumes and data volumes at rest. Use encryption at host for new VMs, which provides end-to-end encryption for VM data including temporary disks, OS and data disk caches, and data flows to Azure Storage. Encryption at host uses platform-managed keys by default with no extra configuration required. For organizations that require control over their own keys, configure customer-managed keys stored in Azure Key Vault or Azure Key Vault Managed HSM. Azure Disk Encryption (DM-Crypt/BitLocker) is scheduled for retirement and shouldn't be used for new deployments.

Network segmentation

Restrict direct internet connectivity for management interfaces. Use network security groups to control traffic flow between subnets. Implement just-in-time VM access to reduce exposure to brute-force attacks on management ports.

Specify PaaS security baselines

PaaS services shift infrastructure management to Microsoft, which changes your security focus. Your PaaS security baseline should emphasize identity-centric controls rather than traditional network perimeters.

Adopt identity as the primary security perimeter

Modern security practices assume that adversaries can breach network perimeters. Identity becomes your primary defense layer. Organizations must establish identity-based security with strong authentication and authorization.

Diagram showing identity as the new security perimeter.

Your PaaS baseline should require:

  • Managed identities for application authentication to eliminate credential storage in code or configuration files, reducing the risk of credential exposure
  • Microsoft Entra Conditional Access for administrative and sensitive workloads
  • Multifactor authentication for all users, with phishing-resistant methods like passkeys or FIDO2 for privileged roles
  • Privileged Identity Management (PIM) to eliminate standing privileges for administrative access
  • Secrets management: Store keys, secrets, and certificates in Azure Key Vault rather than in application code or configuration

Application security controls

For web applications hosted on Azure App Service or similar PaaS platforms, specify baseline requirements for:

  • Authentication: Integrate with Microsoft Entra ID using OAuth 2.0 and OpenID Connect
  • Transport security: Enforce HTTPS-only traffic and require TLS 1.2 or higher
  • Key protection: Store secrets, certificates, and encryption keys in Azure Key Vault
  • Web application firewall: Deploy Azure WAF to protect against common exploits like SQL injection and cross-site scripting
  • Network isolation: Use Private Link (private endpoints) and VNet integration to restrict access to PaaS resources and disable public network exposure where possible.

Threat modeling

Require threat modeling during application design as part of the Security Development Lifecycle (SDL). Use the STRIDE framework to enumerate threats across trust boundaries, catching design errors before deployment.

DDoS protection

Include DDoS protection requirements in your baseline. Azure offers two tiers: DDoS IP Protection for protecting specific public IP addresses in smaller deployments, and DDoS Network Protection for comprehensive virtual network coverage with advanced mitigation and analytics suited to enterprise environments. For application-layer (layer 7) protection, combine DDoS Protection with a web application firewall.

Application monitoring

Use Azure Monitor and Application Insights to monitor PaaS application availability, performance, and security anomalies. Application Insights provides deep analysis with Kusto query language for identifying errors and performance issues proactively.

Specify SaaS security baselines

SaaS applications require you to focus on data protection, identity management, and integration security. Use Microsoft Defender for Cloud Apps to discover SaaS applications in your environment, assess their risk, and enforce security policies.

Your SaaS baseline should address:

  • App discovery and assessment: Inventory SaaS applications and evaluate their security posture
  • Access governance: Implement Conditional Access policies that control how users access SaaS apps
  • Data protection: Apply sensitivity labels and data loss prevention policies to prevent unauthorized data sharing
  • Session controls: Use real-time session monitoring and controls for sensitive operations

Implement continuous baseline monitoring

Specifying a security baseline is only effective when you monitor compliance and remediate drift. Use Microsoft Defender for Cloud to:

  • Assess resources against MCSB controls automatically
  • View compliance status in the regulatory compliance dashboard
  • Generate recommendations for configuration gaps
  • Track secure score to measure security posture improvements

Enable the Foundational CSPM (Cloud Security Posture Management) plan to assess resources against the Microsoft cloud security benchmark. For enhanced capabilities, enable paid Defender plans that provide workload-specific threat protection for servers, storage, databases, and containers.

Schedule regular security tests including penetration testing and vulnerability scanning. Use automated tools to detect configuration drift and enforce remediation to maintain baseline compliance across your cloud environment.