top of page

Understanding Defender for Cloud: Recommendations, Compliance & Threat Protection (AZ-500 Study Series)

Cloud security logo.

In this blog:


Goal: Learn how Microsoft Defender for Cloud provides security recommendations, evaluates compliance, detects threats, and integrates with tools such as Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps.


1️⃣ Enabling Defender Plans (Free → Defender Capabilities)


Start by navigating to: Azure Portal → Defender for Cloud → Environment Settings → Your Subscription

Defender for Cloud Environment Settings.
Defender for Cloud Environment Settings.

Under your subscription, Foundational CSPM is enabled by default. This gives you:

  • Basic security recommendations

  • Secure Score

  • Limited regulatory compliance insights

Defender plans.
Defender plans.

For this lab, we don’t need to enable any paid Defender plans because we’re not using VMs — but Defender will still generate identity-level and subscription-level recommendations.

You can now view the recommendations generated for your subscription:

Subscription recommendations.
Subscription recommendations.

2️⃣ Creating a Storage Account (to Trigger Defender Insights)


We’ll create a Storage Account so Defender for Cloud can analyse it and produce real recommendations.


A full step-by-step setup guide is already available in my Azure environment setup post:


Use default settings:

Creating a Storage Account.
Creating a Storage Account.

Once deployed, wait 2–5 minutes for Defender to generate recommendations.

Next, create a container and upload any file (I used an image). Make sure Anonymous access level = Private.

Create a Container in the Storage Account.
Create a Container in the Storage Account.
Uploading a blob file into the container.
Uploading a blob file into the container.

Now go to: Defender for Cloud → Recommendations → Filter → Resource type = Storage Account

You should now see three recommendations:

Storage Account recommendations in Defender for Cloud.
Storage Account recommendations in Defender for Cloud.

We’ll go through each recommendation and remediate them — exactly what a SOC analyst or cloud security engineer would do.

🔧 Recommendation 1: “Storage Accounts Should Use a Private Link Connection”


Why this matters:

A Private Endpoint exposes your Storage Account only over your private Azure VNet. Traffic never touches the public internet, massively reducing your attack surface.

Private Link Connection recommendation.
Private Link Connection recommendation.

How to fix it

  1. Go to Storage Account → Networking → Private Endpoint Connections

    Private endpoint connections in our Storage Account.
    Private endpoint connections in our Storage Account.
  2. Select + Private Endpoint

  3. Configure:

    • Name: privendpoint-storage-lab

    • Region: Same as the storage account (e.g., UK West)

    • Target sub-resource: blob

    • Virtual Network / Subnet: Select an existing VNet (or create a temporary one)

  4. Review + Create

Once deployed, the Private Endpoint should show Approved, and your storage account receives a private IP.


Architecture overview:

Storage account/ private endpoint architecture.
Storage account/ private endpoint architecture.

To fully test connectivity, a VM inside the same VNet would normally be used. For this lab, we validated the private endpoint via the Azure settings.


⚠️ Note: Defender recommendations may take several hours to fully update.

🔧 Recommendation 2: “Storage Accounts Should Prevent Shared Key Access”


Why this matters:

Shared keys are considered less secure than identity-based authentication methods like Microsoft Entra ID (formerly Azure AD) or managed identities because they are static credentials that can be compromised if exposed, potentially leading to unauthorized access to data.

Shared Access Key Access recommendation in Defender.
Shared Access Key Access recommendation in Defender.

Fix applied:


  1. Go to your Storage Account → Settings → Configuration.

  2. Find the option “Allow storage account key access”.

  3. Toggle it Off.

  4. Click Save.


We disabled shared key access, which forces all authentication to use:

  • Azure AD identities

  • Role-based Access Control (RBAC)

  • SAS tokens


This removes a major attack path: shared keys being leaked or misused.

Defender may still temporarily show the recommendation, but the configuration is active.

Toggling Shared Access keys OFF.
Toggling Shared Access keys OFF.

🔧 Recommendation 3: “Storage Accounts Should Restrict Network Access Using Virtual Network Rules”


Why this matters:


By default, storage accounts allow public network access — meaning anyone on the internet with valid credentials could connect. Restricting access to specific VNets or IPs significantly improves security.

Network Access restriction using VNET recommendation in Defender.
Network Access restriction using VNET recommendation in Defender.

How to fix it:


  1. Storage Account → Networking → Public Network Access

  2. Choose:

    • Disabled, or

    • Selected networks

  3. Add allowed VNets or IP ranges

Save


Restricting Network Access to the storage account.
Restricting Network Access to the storage account.

✅ End of Defender CSPM Lab


In this lab, we explored how Defender for Cloud:


✔️ Identifies misconfigurations

✔️ Generates real-time security recommendations

✔️ Guides remediation aligned to frameworks like NIST, GDPR, and DPA

✔️ Integrates with other Defender products for threat detection


This aligns closely with the responsibilities of SOC analysts and cloud security engineers — improving cloud posture, protecting sensitive data, and ensuring compliance.


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
  • GitHub
  • Twitter
  • LinkedIn
bottom of page