This feature request outlines a set of security enhancements that can be implemented by the FinOps Toolkit team, along with actionable recommendations for customers to strengthen the security of their deployments.
đ Tasks
FinOps Hubs security improvements
#### Network
- [ ] 1. Implement end-to-end support for private endpoint connections:
- [ ] 1.1 Azure Data Explorer
- [ ] 1.2 Azure Data Factory
- [ ] 1.3 Key Vault
- [ ] 1.4 Power BI
- [ ] 1.5 Storage Account
#### Key Vault
- [ ] 1. Enable Key Vault Firewall (either Trusted Services Only or vNET):
- [ ] 1.1 [Learn more about Key Vault network security](https://learn.microsoft.com/azure/key-vault/general/network-security)
- [ ] 2. Use role-based access control (RBAC) to manage access to Key Vault instead of Vault Access Policies:
- [ ] 2.1 [Best practices for controlling access to your vault](https://learn.microsoft.com/azure/key-vault/general/best-practices#control-access-to-your-vault)
#### General
- [ ] 1. Review the list of suggested permissions on the deployment page and ensure these follow the least privilege principle. Recommend customers adopt the "just enough administration" approach.
- [ ] TBD: Create a custom role to deploy FinOps Hubs ?
Actions to be documented for customers
#### Storage
- [ ] Enable Microsoft Defender for Storage to monitor anomalies and threats.
#### Key Vault
- [ ] Configure Private Link at the Power BI tenant level to restrict data access to private networks.
- [ ] Enable Microsoft Defender for Key Vault to enhance threat protection.
#### Power BI
- [ ] Review the Power BI Security White Paper for best practices: [Power BI Security White Paper](https://learn.microsoft.com/power-bi/guidance/whitepaper-powerbi-security).
#### General
- [ ] Recommend customers adopt the "just enough administration" (least privilege) principle.
- [ ] Use diagnostic settings to send logs to another location, such as Log Analytics or a Storage Account, to retain logs for more than 90 days.
- [ ] Enable Microsoft Defender for Cloud advanced threat protections, such as threat protection for Azure Network: [Learn more about threat protections](https://learn.microsoft.com/en-us/azure/defender-for-cloud/other-threat-protections).
âšī¸ Additional Context
This threat model review is based on the publicly available version 0.6 of FinOps Hubs, with the inclusion of Azure Data Explorer as part of the deployment.
đââī¸ Ask for the community
We could use your help:
Please vote this issue up (đ) to prioritize it.
đ Scenario
This feature request outlines a set of security enhancements that can be implemented by the FinOps Toolkit team, along with actionable recommendations for customers to strengthen the security of their deployments.
đ Tasks
FinOps Hubs security improvements
Actions to be documented for customers
âšī¸ Additional Context
This threat model review is based on the publicly available version 0.6 of FinOps Hubs, with the inclusion of Azure Data Explorer as part of the deployment.
đââī¸ Ask for the community
We could use your help: