Additional documentation and resources by focus area
This resource library contains additional links and references that are relevant to the secure implementation of Australian Government workloads in Azure Australia.
General references for all security and governance in Azure Australia
- Microsoft Service Trust Portal Australia Page
- Microsoft Trust Center CCSL Page
- Azure Security and Compliance Blueprints for PROTECTED
- Tenant Isolation in Microsoft Azure
- Australian Information Security Manual
- Australian Cyber Security Centre (ACSC) Certified Cloud List
Azure Key Vault
- Azure Key Vault Overview
- About keys, secrets, and certificates
- Configure Azure Key Vault firewalls and virtual networks
- Secure access to a key vault
- Azure Data Encryption-at-Rest
- How to use Azure Key Vault with Azure Windows Virtual Machines in .NET
- Azure Key Vault managed storage account - PowerShell
- Setup key rotation and auditing
Identity federation
- Azure AD Connect - Installation Guide
- Password Write-Back
- Install and Run the IDFix Tool
- Azure AD UPN Population
- Azure AD Connect - Synchronised Attributes
- Azure AD Connect - Best-Practice Configuration Guide
- Azure AD Connect - User Sign-In Options
- Azure AD Connect and Federation
- Pass-Through Authentication Documentation
- Deploying Azure AD Multi-Factor Authentication
- Azure Privileged Identity Management
Azure Backup and Azure Site Recovery
- Introduction to Azure Backup
- Azure Backup Overview
- Azure Site Recovery Overview
- Azure Governance
- Azure Paired Regions
- Azure Policy
- Azure Storage Service Encryption
- Azure Backup Tutorials
- Azure Site Recovery Tutorials
Azure role-based access control (Azure RBAC) and Privileged Identity Management (PIM)
- Azure RBAC Overview
- Azure Privileged Identify Management Overview
- Azure Management Groups Overview
- Azure Identity and Access Control Best Practices
- Managing Azure AD Groups
- Hybrid Identity
- Azure Custom Roles
- Azure Built-in Roles
- Securing Privileged Access in Hybrid Cloud Environments
- Azure Enterprise Scaffold
System monitoring for security
- Azure Governance
- Azure Security Best Practices
- Platforms and features supported by Microsoft Defender for Cloud
- Azure Activity Log
- Azure Diagnostic Logs
- Microsoft Defender for Cloud Alerts
- Azure Log Integration
- Analyze Log Data in Azure Monitor
- Stream Azure Monitor Logs to an Event Hub
- Event Hub Security and Authentication
Azure Policy and Azure Blueprints
- Azure Policy Overview
- Azure Blueprints Overview
- Azure Policy Samples
- Azure Policy Samples Repository
- Azure Policy Definition Structure
- Azure Policy Effects
- Azure Governance
- Azure Management Groups
- Azure role-based access control (Azure RBAC)
Next steps
Login to the Azure portal and start configuring your resources securely in Azure Australia.