{"id":45931,"date":"2022-03-29T16:00:00","date_gmt":"2022-03-29T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=107544"},"modified":"2022-03-29T16:00:00","modified_gmt":"2022-03-29T16:00:00","slug":"3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/","title":{"rendered":"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc"},"content":{"rendered":"<p>As businesses around the world grapple with the growth of an industrialized, organized attacker ecosystem, the need for customers to secure multicloud and hybrid infrastructure and workloads is increasingly urgent.<\/p>\n<p>Today, organizations face an attacker ecosystem that is highly economically motivated to exploit security issues with your multicloud and hybrid workloads\u2014as made evident in the rise in <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\">human-operated ransomware<\/a>, with hackers launching an average of 50 million password attacks every day (579 per second), the rise of web shell attacks,<sup>1<\/sup> and increasing firmware attacks.<sup>2<\/sup> As with most attack vectors in this evolving threat landscape, prevention and detection are critical.<\/p>\n<p>These threats can present a growing challenge for organizations using a combination of on-premises, hybrid, and multicloud infrastructure and workloads. With this distributed infrastructure, it can be a challenge to protect resources against motivated attackers when security management, policies, and signals are not unified.<\/p>\n<h2 id=\"3-steps-to-securing-your-on-premises-and-hybrid-infrastructure\">Securing your multicloud and hybrid infrastructure in 3 steps<\/h2>\n<p>Securing infrastructure is fundamental to the business\u2014for every business. So, what does a solution for multicloud, on-premises, and hybrid infrastructure security look like? A powerful defense must be unified, simplified, and actionable. It must make it easier to enable digital transformation and not slow progress in this crucial area. For businesses who need to secure multicloud, on-premises, and hybrid infrastructure, an increased security stance can start with three simple steps: <\/p>\n<ol type=\"1\">\n<li>Connecting your hybrid infrastructure to <a href=\"https:\/\/azure.microsoft.com\/services\/azure-arc\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Arc<\/a>.<\/li>\n<li>Enhancing security for your Azure Arc-connected hybrid infrastructure using <a href=\"https:\/\/azure.microsoft.com\/services\/defender-for-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Cloud<\/a>.<\/li>\n<li>Further enhancing the security of on-premises workloads with Secured-core for <a href=\"https:\/\/azure.microsoft.com\/products\/azure-stack\/hci\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Stack HCI<\/a>.<\/li>\n<\/ol>\n<h3 id=\"1-connect-your-on-premises-and-hybrid-infrastructure-to-microsoft-security-services-using-azure-arc\">1. Connect your on-premises and hybrid infrastructure to Microsoft security services using Azure Arc<\/h3>\n<p>Many organizations today are challenged with the growing complexity of securing their infrastructure with disparate tools across multicloud, hybrid, and edge environments. To begin securing these assets, you can use Azure Arc to connect your resources to Microsoft Azure from wherever they are deployed, making them addressable by Azure security services and enabling you to manage them from a single pane of glass in Azure Resource Manager. Azure Arc extends the control plane to these resources so that they can be managed and secured centrally with tools including our cloud extended detection and response (XDR) solution, <a href=\"https:\/\/azure.microsoft.com\/services\/defender-for-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Cloud<\/a>, or the secure key management tool, <a href=\"https:\/\/azure.microsoft.com\/services\/key-vault\/?OCID=AID2200277_SEM_49586d15007d10dcc08d0ca9c4965620:G:s&amp;ef_id=49586d15007d10dcc08d0ca9c4965620:G:s&amp;msclkid=49586d15007d10dcc08d0ca9c4965620\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Key Vault<\/a>. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p><em>\u201cWhen you see how Azure security and compliance features benefit your on-premises infrastructure, it helps put your mind at ease regarding the capabilities and benefits of the cloud. It also makes you a harder target for would-be attackers, and that\u2019s what we\u2019re hoping to achieve.\u201d<\/em>\u2014Lody Mustamu, Manager of Marketing and Sales, ASAPCLOUD.<\/p>\n<\/blockquote>\n<p>Read more about how <a href=\"https:\/\/customers.microsoft.com\/story\/1422313900035509918-asapcloud-partner-professional-services-azure-arc\" target=\"_blank\" rel=\"noreferrer noopener\">ASAPCLOUD\u2019s story here<\/a>.<\/p>\n<h3 id=\"2-secure-your-azure-arc-enabled-infrastructure-using-microsoft-defender-for-cloud\">2. Secure your Azure Arc-enabled infrastructure using Microsoft Defender for Cloud<\/h3>\n<p>Once these distributed multicloud and hybrid environments are connected through Azure Arc, Microsoft Defender for Cloud enables you to find weak spots across your configuration, helps strengthen the overall security posture, and can help you meet any relevant compliance requirements for your resources across Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP). <\/p>\n<p>While prevention is critical, at the same time, the increasing sophistication of attacks requires that organizations have a comprehensive threat protection strategy in place. Microsoft Defender for Cloud provides vulnerability assessment with insights from industry-leading security research and provides advanced threat protection for a broad range of workloads across cloud and on-premises including virtual machines, containers, databases, storage, and more.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p><em>\u201cThe choice made sense to us because Microsoft Defender connects so tightly and automatically to Azure Arc,\u201d<\/em> says I\u00f1igo Martinez Lasala, Director of Technology and Systems at Prosegur. <em>\u201cThere are other tools out there, but Microsoft Defender provides additional functionality that other tools don\u2019t have, such as establishing rules of compliance, hardening servers, and launching scripts to fix server issues.\u201d&nbsp;<\/em><\/p>\n<\/blockquote>\n<p>Read more about how <a href=\"https:\/\/customers.microsoft.com\/story\/1427315910586187379-prosegur-professional-services-azure-arc\" target=\"_blank\" rel=\"noreferrer noopener\">Prosegur\u2019s story here<\/a>.<\/p>\n<p>Get started by enabling Microsoft Defender for Cloud for your Azure subscriptions and easily onboard other environments to understand your current <a href=\"https:\/\/docs.microsoft.com\/azure\/defender-for-cloud\/overview-page\" target=\"_blank\" rel=\"noreferrer noopener\">security posture<\/a>. You can then enable the <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-cloud\/ignite-2021-microsoft-defender-for-cloud-news\/ba-p\/2882807\" target=\"_blank\" rel=\"noreferrer noopener\">enhanced features<\/a> to protect and manage the security of all relevant workloads across your cloud and on-premises environments from a central place, all connected through Azure Arc.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1033\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD.jpg\" alt=\"Microsoft Defender for Cloud Dashboard featuring security posture chart, Firewall manage, regulatory compliance status, and workload protections. \" class=\"wp-image-110085\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD.jpg 1920w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD-300x161.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD-1024x551.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD-768x413.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD-1536x826.jpg 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD-389x209.jpg 389w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\"><\/figure>\n<p><em>Figure 1. Protect your workloads with Microsoft Defender for Cloud<\/em>.<\/p>\n<h3 id=\"3-further-secure-your-on-premises-and-hybrid-infrastructure-using-secured-core-for-azure-stack-hci\">3. Further secure your on-premises and hybrid infrastructure using Secured-core for Azure Stack HCI<\/h3>\n<p>As <a href=\"https:\/\/myinspire.microsoft.com\/sessions\/fbee74d5-03fc-4c19-a64d-26b61ed97e2f?source=search\" target=\"_blank\" rel=\"noreferrer noopener\">security threats<\/a> continue to become more sophisticated, they are moving lower in the stack to the operating system, firmware, and hardware level, so there is a growing need for additional security at these lower levels. One way to gain additional protection against these attacks is an integrated solution called <a href=\"https:\/\/hcicatalog.azurewebsites.net\/#\/catalog?FeatureSupported=securedCoreServer\" target=\"_blank\" rel=\"noreferrer noopener\">Secured-core<\/a>, now available for Azure Stack HCI. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/07\/new-secured-core-servers-are-now-available-from-the-microsoft-ecosystem-to-help-secure-your-infrastructure\/\">Secured-core servers<\/a> provide out-of-box safeguards with enhanced protections. For example, Secured-core servers help stop attacks in the event of a successful web application compromise with features like <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/windows-insider-program\/virtualization-based-security-vbs-and-hypervisor-enforced-code\/m-p\/240571\" target=\"_blank\" rel=\"noreferrer noopener\">virtualization-based security (VBS) and hypervisor-based code integrity<\/a> (HVCI). Credential protection in Azure Stack HCI helps mitigate the common attack of credential theft by using VBS to isolate credentials in their own virtual machine, a feature that is on by default in Secured-core servers. These features help prevent what could otherwise be a much larger breach.<\/p>\n<p>Secured-core servers have three focused pillars:<\/p>\n<ol type=\"1\">\n<li>Protect with hardware root of trust: Trusted platform modules (TPMs) ensure that even firmware malware cannot tamper hardware recordings of what firmware ran on the device.<\/li>\n<li>Defend against firmware level attack: System guard secured VBS protects by not relying on firmware for trust.<\/li>\n<li>Prevent access to unverified code: HVCI protects against both known vulnerable drivers and entire classes of problems<\/li>\n<\/ol>\n<p>All these capabilities built into Secured-core servers ensure that your servers are protected out-of-box, giving you confidence in your hardware. And managing the status and configuration of Secured-core servers is easy from the browser-based Windows Admin Center for both Windows Server and Azure Stack HCI solutions.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"975\" height=\"566\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6217739b9e9a1.png\" alt=\"indows Admin Center on Security tab showing Secured-core blade with green check marks next to 2 of 2 clustered nodes meet the requirements for Secured-core Server as well as green check marks indicating positive status on list of security features.\" class=\"wp-image-107550\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6217739b9e9a1.png 975w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6217739b9e9a1-300x174.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/02\/Picture2-6217739b9e9a1-768x446.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\"><\/figure>\n<p><em>Figure 2. Secured-core server cluster management in Windows Admin Center<\/em>.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p><em>\u201cTo help our customers remain secure and accelerate their business outcomes, Hewlett Packard Enterprise (HPE) is excited to release the new Gen 10 Plus (v2) products for Azure Stack HCI 21H2 and Windows Server 2022 which can be delivered with the HPE GreenLake edge-to-cloud platform,\u201d <\/em>said Keith White, Senior Vice President and General Manager, GreenLake Cloud Services Commercial Business. <em>\u201cThese offer unprecedented host protection by combining HPE\u2019s security technologies with Secured-core server functionalities for a secure, hybrid implementation.\u201d<\/em><\/p>\n<\/blockquote>\n<h2 id=\"take-steps-today-to-secure-your-on-premises-and-hybrid-infrastructure\">Take steps today to secure your on-premises and hybrid infrastructure<\/h2>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator is-style-wide\">\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/02\/11\/web-shell-attacks-continue-to-rise\/\" target=\"_blank\" rel=\"noreferrer noopener\">Web shell attacks continue to rise<\/a>, Detection and Response Team (DART), Microsoft 365 Defender Research Team, Microsoft Security. February 11, 2021.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/30\/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats\/\" target=\"_blank\" rel=\"noreferrer noopener\">New Security Signals study shows firmware attacks on the rise; here\u2019s how Microsoft is working to help eliminate this entire class of threats<\/a>, Microsoft Security Team, Microsoft Security. March 30, 2021.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/03\/29\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this blog, we will share how you can increase security for on-premises and hybrid infrastructure through offerings including Azure Arc, Microsoft Defender for Cloud, and Secured-core for Azure Stack HCI.<br \/>\nThe post 3 steps to secure your multicloud and hybrid infrastructure with Azure Arc appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":45932,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[9931,5531,347,9712,8533],"class_list":["post-45931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-arc","tag-azure-information-protection","tag-cybersecurity","tag-microsoft-defender-for-cloud","tag-secure-remote-work"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 steps to secure your multicloud and hybrid infrastructure with Azure Arc 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-29T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc\",\"datePublished\":\"2022-03-29T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\"},\"wordCount\":1164,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg\",\"keywords\":[\"Azure Arc\",\"Azure Information Protection\",\"Cybersecurity\",\"Microsoft Defender for Cloud\",\"Secure remote work\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\",\"name\":\"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg\",\"datePublished\":\"2022-03-29T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg\",\"width\":1920,\"height\":1033},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Arc\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/azure-arc\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/","og_locale":"en_US","og_type":"article","og_title":"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-29T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/03\/MCD.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc","datePublished":"2022-03-29T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/"},"wordCount":1164,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg","keywords":["Azure Arc","Azure Information Protection","Cybersecurity","Microsoft Defender for Cloud","Secure remote work"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/","url":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/","name":"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg","datePublished":"2022-03-29T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/03\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc.jpg","width":1920,"height":1033},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/3-steps-to-secure-your-multicloud-and-hybrid-infrastructure-with-azure-arc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Arc","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-arc\/"},{"@type":"ListItem","position":3,"name":"3 steps to secure your multicloud and hybrid infrastructure with Azure Arc"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=45931"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/45931\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/45932"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=45931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=45931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=45931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}