Evaluating Cloud Security: How Well Azure Detects Common Attacks

Faculty Mentor

Stu Steiner

Presentation Type

Oral Presentation

Start Date

4-14-2026 10:00 AM

End Date

4-14-2026 10:20 AM

Location

PUB 321

Primary Discipline of Presentation

Cybersecurity

Abstract

Cloud computing is widely adopted, yet insecure configurations have exposed sensitive data in many breaches. This study evaluates how effective Microsoft Azure's built-in security is at detecting cyberattacks. In controlled tests, we simulated realistic attack chains involving stolen credentials, unauthorized access, and attempts to discover and extract cloud data. Each simulation measured whether native security detected attacks and the time delay in alerting. Results show which parts of attacks Azure is likely to detect, which may evade notice, and how early detection can boost organizational security. By examining various attack scenarios, this research reveals strengths and gaps in Azure's default controls. These findings guide organizations relying on built-in protections, stressing the need for proactive monitoring and proper configuration to maintain a secure environment.

This document is currently not available here.

Share

COinS
 
Apr 14th, 10:00 AM Apr 14th, 10:20 AM

Evaluating Cloud Security: How Well Azure Detects Common Attacks

PUB 321

Cloud computing is widely adopted, yet insecure configurations have exposed sensitive data in many breaches. This study evaluates how effective Microsoft Azure's built-in security is at detecting cyberattacks. In controlled tests, we simulated realistic attack chains involving stolen credentials, unauthorized access, and attempts to discover and extract cloud data. Each simulation measured whether native security detected attacks and the time delay in alerting. Results show which parts of attacks Azure is likely to detect, which may evade notice, and how early detection can boost organizational security. By examining various attack scenarios, this research reveals strengths and gaps in Azure's default controls. These findings guide organizations relying on built-in protections, stressing the need for proactive monitoring and proper configuration to maintain a secure environment.