Connect Azure Cloud account
Securing your cloud infrastructure is crucial to protecting your data. You can leverage Aikido's security checks to detect and address any misconfigurations in your infrastructure.
To view the list of security checks performed by Aikido on your cloud environment, go to the 'checks' tab on the cloud overview page at. Filter to Azure to see specific checks performed on your connected Azure project(s).
To get started, head to the cloud overview page on Aikido and click 'Connect cloud.' Follow the step-by-step setup wizard to connect your Azure project with Aikido.

The setup wizard will guide you through creating a new 'App registration' inside of the Microsoft Entra ID service with an API secret specifically for Aikido. In the last step, you'll assign specific reader roles ("Security reader", "Log analytics reader") to grant limited, read-only access to specific services in your Azure cloud. This ensures that Aikido can perform its security checks without the risk of unintended modifications to your resources.
The API secret will be used by Aikido to make the necessary API requests to scan your resources. Aikido will notify you via email when the secret is about to expire.
Finally, you can name your connected project in Aikido and specify the environment it operates in (development, production,..). This information helps Aikido prioritize findings based on the severity and impact to your business.

Within 1-2 minutes after connecting your account, Aikido will report misconfigurations that could pose a threat.
Advanced Rules
Besides the checks mentioned above, Aikido offers a suit of complementary checks/rules that you can enable. We call these advanced cloud rules and you can find them here. After enabling any of these rules, you can expect to see the results (as new issues in the feed) within a few seconds.
Just like the standard checks, these are evaluated with each scan of your cloud environments. Moreover, they are mapped to the compliance reports. By default, the advanced rules will appear as disabled in the compliance reports, unless you activate them.
Azure Advanced Rules Changelog
Azure Container Registry allows unrestricted network access
Medium
Jul 25, 2025
Azure Storage Accounts do not have blob soft delete enabled
Medium
Jul 25, 2025
Azure Storage Accounts do not require secure transfer
Low
Jul 25, 2025
Azure Storage Accounts allow cross-tenant replication
Medium
Jul 25, 2025
Azure Storage Accounts do not have blob versioning enabled
Medium
Jul 25, 2025
Azure File Shares do not have soft delete enabled
Mediun
Jul 25, 2025
Last updated
Was this helpful?