Azure security baseline for Azure Load Balancer
This security baseline applies guidance from the Microsoft cloud security benchmark version 1.0 to Azure Load Balancer. The Microsoft cloud security benchmark provides recommendations on how you can secure your cloud solutions on Azure. The content is grouped by the security controls defined by the Microsoft cloud security benchmark and the related guidance applicable to Azure Load Balancer.
You can monitor this security baseline and its recommendations using Microsoft Defender for Cloud. Azure Policy definitions will be listed in the Regulatory Compliance section of the Microsoft Defender for Cloud portal page.
When a feature has relevant Azure Policy Definitions, they are listed in this baseline to help you measure compliance with the Microsoft cloud security benchmark controls and recommendations. Some recommendations may require a paid Microsoft Defender plan to enable certain security scenarios.
Note
Features not applicable to Azure Load Balancer have been excluded. To see how Azure Load Balancer completely maps to the Microsoft cloud security benchmark, see the full Azure Load Balancer security baseline mapping file.
Security profile
The security profile summarizes high-impact behaviors of Azure Load Balancer, which may result in increased security considerations.
Service Behavior Attribute | Value |
---|---|
Product Category | Networking |
Customer can access HOST / OS | No Access |
Service can be deployed into customer's virtual network | False |
Stores customer content at rest | False |
Network security
For more information, see the Microsoft cloud security benchmark: Network security.
NS-1: Establish network segmentation boundaries
Features
Virtual Network Integration
Description: Service supports deployment into customer's private Virtual Network (VNet). Learn more.
Supported | Enabled By Default | Configuration Responsibility |
---|---|---|
True | False | Customer |
Feature notes: While the Azure Load Balancer resource does not directly deploy into a Virtual Network, the Internal SKU can create one or more frontend IP configurations using a target Azure Virtual Network.
Configuration Guidance: Azure offers two types of Load Balancer offerings, Standard and Basic. Use internal Azure Load Balancers to only allow traffic to backend resources from within certain virtual networks or peered virtual networks without exposure to the internet. Implement an external Load Balancer with Source Network Address Translation (SNAT) to masquerade the IP addresses of backend resources for protection from direct internet exposure.
Reference: Internal Load Balancer Frontend IP configuration
Network Security Group Support
Description: Service network traffic respects Network Security Groups rule assignment on its subnets. Learn more.
Supported | Enabled By Default | Configuration Responsibility |
---|---|---|
True | False | Customer |
Feature notes: Users can configure a NSG on their virtual network but not directly on the Load Balancer.
Configuration Guidance: Implement network security groups and only allow access to your application's trusted ports and IP address ranges. In cases where there is no network security group assigned to the backend subnet or NIC of the backend virtual machines, traffic will not be allowed to access these resources from the load balancer. Standard Load Balancers provide outbound rules to define outbound NAT with a network security group. Review these outbound rules to tune the behavior of your outbound connections.
The Standard Load Balancer is designed to be secure by default and part of a private and isolated Virtual Network. It is closed to inbound flows unless opened by network security groups to explicitly permit allowed traffic, and to disallow known malicious IP addresses. Unless a network security group on a subnet or NIC of your virtual machine resource exists behind the Load Balancer, traffic is not allowed to reach this resource.
Note: Using a Standard Load Balancer is recommended for your production workloads and typically the Basic Load Balancer is only used for testing since the basic type is open to connections from the internet by default and doesn't require network security groups for operation.
Reference: Azure Load Balancer Frontend IP configuration
Microsoft Defender for Cloud monitoring
Azure Policy built-in definitions - Microsoft.Network:
Name (Azure portal) |
Description | Effect(s) | Version (GitHub) |
---|---|---|---|
Subnets should be associated with a Network Security Group | Protect your subnet from potential threats by restricting access to it with a Network Security Group (NSG). NSGs contain a list of Access Control List (ACL) rules that allow or deny network traffic to your subnet. | AuditIfNotExists, Disabled | 3.0.0 |
Asset management
For more information, see the Microsoft cloud security benchmark: Asset management.
AM-2: Use only approved services
Features
Azure Policy Support
Description: Service configurations can be monitored and enforced via Azure Policy. Learn more.
Supported | Enabled By Default | Configuration Responsibility |
---|---|---|
True | False | Customer |
Configuration Guidance: Define and implement standard security configurations for Azure resources using Azure Policy. Assign built-in policy definitions related to your specific Azure Load Balancer resources. When there are not built-in Policy definitions available you can use Azure Policy aliases to create custom policies to audit or enforce the configuration of your Azure Load Balancer resources in the 'Microsoft.Network' namespace.
Next steps
- See the Microsoft cloud security benchmark overview
- Learn more about Azure security baselines