Evaluating Cloud Security: How Well Azure Detects Common Attacks
Faculty Mentor
Stu Steiner
Presentation Type
Oral Presentation
Start Date
4-14-2026 10:00 AM
End Date
4-14-2026 10:20 AM
Location
PUB 321
Primary Discipline of Presentation
Cybersecurity
Abstract
Cloud computing is widely adopted, yet insecure configurations have exposed sensitive data in many breaches. This study evaluates how effective Microsoft Azure's built-in security is at detecting cyberattacks. In controlled tests, we simulated realistic attack chains involving stolen credentials, unauthorized access, and attempts to discover and extract cloud data. Each simulation measured whether native security detected attacks and the time delay in alerting. Results show which parts of attacks Azure is likely to detect, which may evade notice, and how early detection can boost organizational security. By examining various attack scenarios, this research reveals strengths and gaps in Azure's default controls. These findings guide organizations relying on built-in protections, stressing the need for proactive monitoring and proper configuration to maintain a secure environment.
Recommended Citation
Greene, Tristen, "Evaluating Cloud Security: How Well Azure Detects Common Attacks" (2026). 2026 Symposium. 4.
https://dc.ewu.edu/srcw_2026/op_2026/o3_2026/4
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Evaluating Cloud Security: How Well Azure Detects Common Attacks
PUB 321
Cloud computing is widely adopted, yet insecure configurations have exposed sensitive data in many breaches. This study evaluates how effective Microsoft Azure's built-in security is at detecting cyberattacks. In controlled tests, we simulated realistic attack chains involving stolen credentials, unauthorized access, and attempts to discover and extract cloud data. Each simulation measured whether native security detected attacks and the time delay in alerting. Results show which parts of attacks Azure is likely to detect, which may evade notice, and how early detection can boost organizational security. By examining various attack scenarios, this research reveals strengths and gaps in Azure's default controls. These findings guide organizations relying on built-in protections, stressing the need for proactive monitoring and proper configuration to maintain a secure environment.