{"id":35673,"date":"2020-06-22T20:35:27","date_gmt":"2020-06-22T20:35:27","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=544180"},"modified":"2020-06-22T20:35:27","modified_gmt":"2020-06-22T20:35:27","slug":"knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/","title":{"rendered":"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/AzureImage-300x225.png\" class=\"attachment-medium size-medium wp-post-image\" alt srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/AzureImage-300x225.png 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/AzureImage-440x330.png 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/AzureImage-380x285.png 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2020\/06\/AzureImage.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/p>\n<p>Trend Micro is excited to launch new Trend Micro Cloud One\u2122 \u2013 Conformity capabilities that will strengthen protection for Azure resources.<\/p>\n<p>As with any launch, there is a lot of new information, so we decided to sit down with one of the founders of Conformity, Mike Rahmati. Mike is a technologist at heart, with a proven track record of success in the development of software systems that are resilient to failure and grow and scale dynamically through cloud, open-source, agile, and lean disciplines. In the interview, we picked Mike\u2019s brain on how these new capabilities can help customers prevent or easily remediate misconfigurations on Azure. Let\u2019s dive in.<\/p>\n<p><strong>What are the common business problems that customers encounter when building on or moving their applications to Azure or Amazon Web Services (AWS)?<\/strong><\/p>\n<p>The common problem is there are a lot of tools and cloud services out there. Organizations are looking for tool consolidation and visibility into their cloud environment. Shadow IT and business units spinning up their own cloud accounts is a real challenge for IT organizations to keep on top of. Compliance, security, and governance controls are not necessarily top of mind for business units that are innovating at incredible speeds. That is why it is so powerful to have a tool that can provide visibility into your cloud environment and show where you are potentially vulnerable from a security and compliance perspective.<\/p>\n<p><strong>Common misconfigurations on AWS are an open Amazon Elastic Compute Cloud (EC2) or a misconfigured IAM policy. What is the equivalent for Microsoft?<\/strong><\/p>\n<p>The common misconfigurations are actually quite similar to what we\u2019ve seen with AWS. During the product preview phase, we\u2019ve seen customers with many of the same kinds of misconfiguration issues as we\u2019ve seen with AWS. For example, Microsoft Azure Blobs Storage is the equivalent to Amazon S3 \u2013 that is a common source of misconfigurations. We have observed misconfiguration in two main areas: Firewall and Web Application Firewall (WAF),which is equivalent to AWS WAF. The Firewall is similar to networking configuration in AWS, which provides inbound protection for non-HTTP protocols and network related protection for all ports and protocols. It is important to note that this is based on the 100 best practices and 15 services we currently support for Azure and growing, whereas, for AWS, we have over 600 best practices in total, with over 70 controls with auto-remediation.<\/p>\n<p><strong>Can you tell me about the CIS Microsoft Azure Foundation Security Benchmark?<\/strong><\/p>\n<p>We are thrilled to support the <a href=\"https:\/\/www.cisecurity.org\/blog\/cis-microsoft-azure-foundations-benchmark-v1-0-0-now-available\/\">CIS Microsoft Azure Foundation Security Benchmark<\/a>. The CIS Microsoft Azure Foundations Benchmark&nbsp;includes automated checks and remediation recommendations for the following: Identity and Access Management, Security Center, Storage Accounts, Database Services, Logging and Monitoring, Networking, Virtual Machines, and App Service. There are over 100 best practices in this framework and we have rules built to check for all of those best practices to ensure cloud builders are avoiding risk in their Azure environments.<\/p>\n<p><strong>Can you tell me a little bit about the Microsoft Shared Responsibility Model?<\/strong><\/p>\n<p>In terms of shared responsibility model, it\u2019s is very similar to AWS. The security OF the cloud is a Microsoft responsibility, but the security IN the cloud is the customers responsibility. Microsoft\u2019s ecosystem is growing rapidly, and there are a lot of services that you need to know in order to configure them properly. With Conformity, customers only need to know how to properly configure the core services, according to best practices, and then we can help you take it to the next level.<\/p>\n<p><strong>Can you give an example of how the shared responsibility model is used?<\/strong><\/p>\n<p>Yes. Imagine you have a Microsoft Azure Blob Storage that includes sensitive data. Then, by accident, someone makes it public. The customer might not be able to afford an hour, two hours, or even days to close that security gap.<\/p>\n<p>In just a few minutes, Conformity will alert you to your risk status, provide remediation recommendations, and for our AWS checks give you the ability to set up auto-remediation. Auto-remediation can be very helpful, as it can close the gap in near-real time for customers.<\/p>\n<p><strong>What are next steps for our readers?<\/strong><\/p>\n<p>I\u2019d say that whether your cloud exploration is just taking shape, you\u2019re midway through a migration, or you\u2019re already running complex workloads in the cloud, we can help. You can gain full visibility of your infrastructure with continuous cloud security and compliance posture management. We can do the heavy lifting so you can focus on innovating and growing. Also, you can ask anyone from our team to set you up with a complimentary cloud health check. Our cloud engineers are happy to provide an AWS and\/or Azure assessment to see if you are building a secure, compliant, and reliable cloud infrastructure.&nbsp;You can find out your risk level in just 10-minutes.<\/p>\n<p><a href=\"https:\/\/www.cloudconformity.com\/identity\/sign-up.html?source=AWS_OFFER\"><strong>Get started today<\/strong>&nbsp;<strong>with a<\/strong>&nbsp;<strong>60-day<\/strong>&nbsp;<strong>free trial<\/strong><\/a><strong><u>&nbsp;&gt;<\/u><\/strong><\/p>\n<p><a href=\"https:\/\/www.cloudconformity.com\/knowledge-base\/azure\/\"><strong>Check out our knowledge base of Azure best practice rules&gt;<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_ca\/business\/products\/hybrid-cloud\/cloud-one-conformity.html\"><strong>Learn more<\/strong><\/a><strong>&nbsp;&gt;<\/strong><\/p>\n<p><strong>&nbsp;<\/strong><\/p>\n<p><strong>Do you see value in building a security culture that is shifted left?<\/strong><\/p>\n<p>Yes, we have done this for our customers using AWS and it has been very successful. The more we talk about shifting security left the better, and I think that\u2019s where we help customers build a security culture. Every cloud customer is struggling with implementing earlier on in the development cycle and they need tools. Conformity is a tool for customers which is DevOps or DevSecOps friendly and helps them build a security culture that is shifted left.<\/p>\n<p>We help customers shift security left by integrating the Conformity API into their CI\/CD pipeline. The product also has preventative controls, which our API and template scanners provide. The idea is we help customers shift security left to identify those misconfigurations early on, even before they\u2019re actually deployed into their environments.<\/p>\n<p>We also help them scan their infrastructure-as-code templates before being deployed into the cloud. Customers need a tool to bake into their CI\/CD pipeline. Shifting left doesn\u2019t simply mean having a reporting tool, but rather a tool that allows them to shift security left. That\u2019s where our product, Conformity, can help.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/azure-avoiding-misconfigurations\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#160; Trend Micro is excited to launch new Trend Micro Cloud One&#x2122; \u2013 Conformity capabilities that will strengthen protection for Azure resources. &#160; As with any launch, there is a lot of new information, so we decided to sit down with one of the founders of Conformity, Mike Rahmati. Mike is a technologist at heart,&#8230;<br \/>\nThe post Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35674,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[1252,536,343,1254,672,254],"class_list":["post-35673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-cloud","tag-cloud-security","tag-compliance-regulations","tag-devops","tag-misconfiguration","tag-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-22T20:35:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations\",\"datePublished\":\"2020-06-22T20:35:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/\"},\"wordCount\":1049,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png\",\"keywords\":[\"cloud\",\"Cloud Security\",\"Compliance &amp; Regulations\",\"devops\",\"misconfiguration\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/\",\"name\":\"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png\",\"datePublished\":\"2020-06-22T20:35:27+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png\",\"width\":300,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cloud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/","og_locale":"en_US","og_type":"article","og_title":"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-22T20:35:27+00:00","og_image":[{"width":300,"height":225,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations","datePublished":"2020-06-22T20:35:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/"},"wordCount":1049,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png","keywords":["cloud","Cloud Security","Compliance &amp; Regulations","devops","misconfiguration"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/","url":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/","name":"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png","datePublished":"2020-06-22T20:35:27+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations.png","width":300,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/knowing-your-shared-security-responsibility-in-microsoft-azure-and-avoiding-misconfigurations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"cloud","item":"https:\/\/www.threatshub.org\/blog\/tag\/cloud\/"},{"@type":"ListItem","position":3,"name":"Knowing your shared security responsibility in Microsoft Azure and avoiding misconfigurations"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35673"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35673\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35674"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}