Connect Azure Cloud account

Securing your cloud infrastructure is crucial to protecting your data. You can leverage Aikido's security checks to detect and address any misconfigurations in your infrastructure.

To view the list of security checks performed by Aikido on your cloud environment, go to the 'checks' tab on the cloud overview page at. Filter to Azure to see specific checks performed on your connected Azure project(s).

To get started, head to the cloud overview page on Aikido and click 'Connect cloud.' Follow the step-by-step setup wizard to connect your Azure project with Aikido.

The setup wizard will guide you through creating a new 'App registration' inside of the Microsoft Entra ID service with an API secret specifically for Aikido. In the last step, you'll assign specific reader roles ("Security reader", "Log analytics reader") to grant limited, read-only access to specific services in your Azure cloud. This ensures that Aikido can perform its security checks without the risk of unintended modifications to your resources.

The API secret will be used by Aikido to make the necessary API requests to scan your resources. Aikido will notify you via email when the secret is about to expire.

Finally, you can name your connected project in Aikido and specify the environment it operates in (development, production,..). This information helps Aikido prioritize findings based on the severity and impact to your business.

Within 1-2 minutes after connecting your account, Aikido will report misconfigurations that could pose a threat.

Advanced Rules

Besides the checks mentioned above, Aikido offers a suit of complementary checks/rules that you can enable. We call these advanced cloud rules and you can find them here. After enabling any of these rules, you can expect to see the results (as new issues in the feed) within a few seconds.

Just like the standard checks, these are evaluated with each scan of your cloud environments. Moreover, they are mapped to the compliance reports. By default, the advanced rules will appear as disabled in the compliance reports, unless you activate them.

Azure Advanced Rules Changelog

Rule
Severity
Release Date

Azure Container Registry allows unrestricted network access

Medium

Jul 25, 2025

Azure Storage Accounts do not have blob soft delete enabled

Medium

Jul 25, 2025

Azure Storage Accounts do not require secure transfer

Low

Jul 25, 2025

Azure Storage Accounts allow cross-tenant replication

Medium

Jul 25, 2025

Azure Storage Accounts do not have blob versioning enabled

Medium

Jul 25, 2025

Azure File Shares do not have soft delete enabled

Mediun

Jul 25, 2025


Last updated

Was this helpful?