Skip to content

Security Operations for ACS

Managing the security of your communication infrastructure requires focus on authentication, key management, and auditing.

graph TD
    SecOps[Security Operations] --> Auth[Authentication]
    SecOps --> Audit[Audit Logging]
    SecOps --> Compliance[Compliance Monitoring]

    Auth --> Keys[Access Key Rotation]
    Auth --> MI[Managed Identity]
    Auth --> RBAC[Role-Based Access Control]

    Audit --> Logs[Diagnostic Logs]
    Audit --> Events[Azure Event Grid]

    Compliance --> Pol[Azure Policy]
    Compliance --> Reg[Regulatory Standards]

Authentication and Key Management

ACS supports two primary authentication methods:

  1. Access Keys: Use Primary and Secondary keys for API authentication.
  2. Managed Identity: Use Azure Active Directory (Azure AD) for passwordless authentication.

Key Rotation Procedures

To rotate your access keys with zero downtime:

  1. Update your application to use the Secondary key.
  2. Regenerate the Primary key in the Azure Portal or via CLI:
    az communication regenerate-key --name my-acs-resource --resource-group my-rg --key-type Primary
    
  3. Update your application to use the new Primary key.
  4. Regenerate the Secondary key if desired.

RBAC Role Assignments

Assign specific roles to users and applications based on the principle of least privilege.

Role Permissions
Communication Services Administrator Full access to manage resources and settings.
Communication Services User Ability to send SMS, Email, and participate in calls.
Communication Services Reader Read-only access to resource configurations.

Audit Logging and Compliance

Enable audit logs to track changes to your ACS resources:

  • Resource Operations: Track when resources are created, updated, or deleted.
  • Access Logs: Track who accessed your communication endpoints.
  • Compliance: Use Azure Policy to enforce data residency and security standards.

See Also

Sources