Security Operations for ACS¶
Managing the security of your communication infrastructure requires focus on authentication, key management, and auditing.
graph TD
SecOps[Security Operations] --> Auth[Authentication]
SecOps --> Audit[Audit Logging]
SecOps --> Compliance[Compliance Monitoring]
Auth --> Keys[Access Key Rotation]
Auth --> MI[Managed Identity]
Auth --> RBAC[Role-Based Access Control]
Audit --> Logs[Diagnostic Logs]
Audit --> Events[Azure Event Grid]
Compliance --> Pol[Azure Policy]
Compliance --> Reg[Regulatory Standards] Authentication and Key Management¶
ACS supports two primary authentication methods:
- Access Keys: Use Primary and Secondary keys for API authentication.
- Managed Identity: Use Azure Active Directory (Azure AD) for passwordless authentication.
Key Rotation Procedures¶
To rotate your access keys with zero downtime:
- Update your application to use the Secondary key.
- Regenerate the Primary key in the Azure Portal or via CLI:
- Update your application to use the new Primary key.
- Regenerate the Secondary key if desired.
RBAC Role Assignments¶
Assign specific roles to users and applications based on the principle of least privilege.
| Role | Permissions |
|---|---|
Communication Services Administrator | Full access to manage resources and settings. |
Communication Services User | Ability to send SMS, Email, and participate in calls. |
Communication Services Reader | Read-only access to resource configurations. |
Audit Logging and Compliance¶
Enable audit logs to track changes to your ACS resources:
- Resource Operations: Track when resources are created, updated, or deleted.
- Access Logs: Track who accessed your communication endpoints.
- Compliance: Use Azure Policy to enforce data residency and security standards.