Skillquality 0.70

azure-security

Expert knowledge for Azure Security development including troubleshooting, best practices, decision making, security, configuration, integrations & coding patterns, and deployment. Use when securing AKS workloads, SBOMs, Notation image signing, Key Vault/HSM keys, or Customer Loc

Price
free
Protocol
skill
Verified
no

What it does

Azure Security Skill

This skill provides expert guidance for Azure Security. Covers troubleshooting, best practices, decision making, security, configuration, integrations & coding patterns, and deployment. It combines local quick-reference content with remote documentation fetching capabilities.

How to Use This Skill

IMPORTANT for Agent: Use the Category Index below to locate relevant sections. For categories with line ranges (e.g., L35-L120), use read_file with the specified lines. For categories with file links (e.g., [security.md](security.md)), use read_file on the linked reference file

IMPORTANT for Agent: If metadata.generated_at is more than 3 months old, suggest the user pull the latest version from the repository. If mcp_microsoftdocs tools are not available, suggest the user install it: Installation Guide

This skill requires network access to fetch documentation content:

  • Preferred: Use mcp_microsoftdocs:microsoft_docs_fetch with query string from=learn-agent-skill. Returns Markdown.
  • Fallback: Use fetch_webpage with query string from=learn-agent-skill&accept=text/markdown. Returns Markdown.

Category Index

CategoryLinesDescription
TroubleshootingL35-L39Diagnosing and resolving common Azure Customer Lockbox issues, including access request problems, approval/denial errors, and configuration or permission-related failures.
Best PracticesL40-L58Security hardening checklists and patterns for Azure (IaaS/PaaS), covering identity, network, data encryption, secrets, DNS, and app/database protection best practices
Decision MakingL59-L63Guidance on choosing Azure key management options (Key Vault, managed HSM, app-managed keys), including security, compliance, performance, and integration trade-offs.
SecurityL64-L94Securing Azure workloads: threat modeling mitigations, AKS image signing, crypto and data protection, ransomware defense, incident response, and Azure-specific security/operational best practices.
ConfigurationL95-L102Configuring Azure security features like antimalware, firewalls, container vulnerability tools, security logging/auditing, and upcoming managed TLS/DCV changes
Integrations & Coding PatternsL103-L107Guidance on generating signed SBOMs for container images, attaching them in CI/CD, and integrating software supply chain security into deployment workflows.
DeploymentL108-L114Guides for signing and verifying container images with Notation in Azure Pipelines/GitHub Actions, plus comparing security feature availability in Azure vs Azure Government.

Troubleshooting

TopicURL
Resolve common issues with Azure Customer Lockboxhttps://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-faq

Best Practices

TopicURL
Harden Azure Marketplace images before publishinghttps://learn.microsoft.com/en-us/azure/security/fundamentals/azure-marketplace-images
Implement Azure data security and encryption best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/data-encryption-best-practices
Use Azure SQL database security checklisthttps://learn.microsoft.com/en-us/azure/security/fundamentals/database-security-checklist
Apply security best practices to Azure IaaS workloadshttps://learn.microsoft.com/en-us/azure/security/fundamentals/iaas
Apply Microsoft Entra identity security best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/identity-management-best-practices
Apply Azure network security best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/network-best-practices
Apply operational security best practices for Azure assetshttps://learn.microsoft.com/en-us/azure/security/fundamentals/operational-best-practices
Secure Azure App Service web and mobile applicationshttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-applications-using-app-services
Secure PaaS databases with Azure SQL and Synapsehttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-applications-using-sql
Secure PaaS applications using Azure Storage featureshttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-applications-using-storage
Design and operate secure PaaS deployments on Azurehttps://learn.microsoft.com/en-us/azure/security/fundamentals/paas-deployments
Apply Azure-specific best practices for protecting secretshttps://learn.microsoft.com/en-us/azure/security/fundamentals/secrets-best-practices
Apply security best practices to Azure Service Fabrichttps://learn.microsoft.com/en-us/azure/security/fundamentals/service-fabric-best-practices
Implement five-step checklist to secure Entra IDhttps://learn.microsoft.com/en-us/azure/security/fundamentals/steps-secure-identity
Prevent Azure subdomain takeover with DNS and App Servicehttps://learn.microsoft.com/en-us/azure/security/fundamentals/subdomain-takeover

Decision Making

TopicURL
Select the right Azure key management solutionhttps://learn.microsoft.com/en-us/azure/security/fundamentals/key-management-choose

Security

TopicURL
Enforce AKS image signature validation with Ratify and Azure Policyhttps://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/validating-image-signatures-using-ratify-aks
Implement auditing and logging mitigations with Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-auditing-and-logging
Implement authentication mitigations with Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-authentication
Mitigate authorization threats in Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-authorization
Secure communications based on Threat Modeling Tool findingshttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-communication-security
Harden configuration management using Threat Modeling Tool mitigationshttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-configuration-management
Implement cryptography mitigations from Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-cryptography
Secure exception management using Threat Modeling Tool guidancehttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-exception-management
Apply secure input validation mitigations from Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-input-validation
Protect sensitive data using Threat Modeling Tool mitigationshttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-sensitive-data
Implement secure session management from Threat Modeling Toolhttps://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-session-management
Apply Azure-specific security best practices for AI workloadshttps://learn.microsoft.com/en-us/azure/security/fundamentals/ai-security-best-practices
Configure Microsoft Antimalware in Azure with PowerShellhttps://learn.microsoft.com/en-us/azure/security/fundamentals/antimalware-code-samples
Use Azure Certificate Authority roots and requirementshttps://learn.microsoft.com/en-us/azure/security/fundamentals/azure-certificate-authority-details
Design Azure backup and restore plan against ransomwarehttps://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware
Implement Azure resource security best practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/best-practices-and-patterns
Configure alternate email notifications for Customer Lockboxhttps://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-alternative-email
Control Microsoft engineer data access with Customer Lockboxhttps://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview
Implement Azure-specific incident response practiceshttps://learn.microsoft.com/en-us/azure/security/fundamentals/incident-response-overview
Review Azure SQL Database built-in security featureshttps://learn.microsoft.com/en-us/azure/security/fundamentals/infrastructure-sql
Apply Azure operational security checklist actionshttps://learn.microsoft.com/en-us/azure/security/fundamentals/operational-checklist
Understand security access methods for Azure production networkhttps://learn.microsoft.com/en-us/azure/security/fundamentals/production-network
Understand Azure controls for protection of customer datahttps://learn.microsoft.com/en-us/azure/security/fundamentals/protection-customer-data
Detect and respond to ransomware using Azure security toolshttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-detect-respond
Use Azure-native features to protect against ransomwarehttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-features-resources
Prepare Azure environments to withstand ransomware attackshttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-prepare
Configure Azure Firewall Premium to mitigate ransomwarehttps://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-protection-with-azure-firewall

Configuration

TopicURL
Configure Dependabot and Copacetic for container securityhttps://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/container-secure-supply-chain-implementation/cssc-depenadabot-quickstart
Configure firewalls using Azure domain patternshttps://learn.microsoft.com/en-us/azure/security/fundamentals/azure-domains
Configure and analyze Azure security logging and auditinghttps://learn.microsoft.com/en-us/azure/security/fundamentals/log-audit
Adapt to upcoming Azure managed TLS and DCV changeshttps://learn.microsoft.com/en-us/azure/security/fundamentals/managed-tls-changes

Integrations & Coding Patterns

TopicURL
Create and attach signed SBOMs to container imageshttps://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/attach-sbom

Deployment

TopicURL
Sign and verify container images in Azure Pipelines with Notationhttps://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/notation-ado-task-sign
Sign container images with Notation in GitHub Actionshttps://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/notation-sign-gha
Verify container image signatures with Notation in GitHub Actionshttps://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/verify-gha
Check Azure vs Azure Government security feature availabilityhttps://learn.microsoft.com/en-us/azure/security/fundamentals/feature-availability

Capabilities

skillsource-microsoftdocsskill-azure-securitytopic-agenttopic-agent-skillstopic-agentic-skillstopic-agentskilltopic-ai-agentstopic-ai-codingtopic-azuretopic-azure-functionstopic-azure-kubernetes-servicetopic-azure-openaitopic-azure-sql-databasetopic-azure-storage

Install

Installnpx skills add MicrosoftDocs/Agent-Skills
Transportskills-sh
Protocolskill

Quality

0.70/ 1.00

deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 497 github stars · SKILL.md body (11,366 chars)

Provenance

Indexed fromgithub
Enriched2026-04-22 00:53:36Z · deterministic:skill-github:v1 · v1
First seen2026-04-18
Last seen2026-04-22

Agent access