Guidance: Configure Azure Conditional Access to limit users' ability to interact with Azure Resource Manager (ARM) by configuring "Block access" for the "Microsoft Azure Management" App. Credential Scanner will also encourage moving discovered credentials to more secure locations such as Azure Key Vault. It's a dedicated offering managed by Microsoft, to build highly scalable and responsive applications by providing you super-fast access to your data. I hope you enjoyed reading the article. https://secdevtools.azurewebsites.net/helpcredscan.html.
The service is operated by Microsoft, hosted on Azure, and accessible to any application within or outside of Azure. Customers also benefit from unified billing and the familiar Microsoft Azure Portal user experience. Understand Azure AD reporting: Guidance: You have access to Azure Active Directory (AD) sign-in activity, audit and risk event log sources, which allow you to integrate with Azure Sentinel or a third-party SIEM. Additional features include: Geo-replication, when enabled, allows two separate Azure Cache for Redis instances across Azure regions to be linked together in a primary/replica relationship. Guidance: Not applicable; this guideline is intended for compute resources. Azure Security Center monitoring: Not applicable. Guidance: Use Azure Policy [deny] and [deploy if not exist] to enforce secure settings across your Azure resources. Get Azure innovation everywhere—bring the agility and innovation of cloud computing to your on-premises workloads. ", "Azure PaaS (platform as a service) gave us access to a complete set of capabilities such as Azure Cache for Redis that we didn't have to build ourselves. Reconcile inventory on a regular basis and ensure unauthorized resources are deleted from the subscription in a timely manner. Gain massive cache sizes at a lower price point by using the Enterprise Flash tier to run Redis on speedy flash storage. Microsoft anti-malware is enabled on the underlying host that supports Azure services (for example, Azure Cache for Redis), however it does not run on customer content. The following table helps describe some of the features supported by tier: You should consider the following when choosing an Azure Cache for Redis tier. With five pricing tiers and reserved pricing options, you have the flexibility to tailor performance to your workload. The Azure Security Baseline for Azure Cache for Redis contains recommendations that will help you improve the security posture of your deployment. Additionally, develop a process and pipeline for managing policy exceptions.