Intelligence Section 05.B
Azure Cloud Findings
Comprehensive exposure analysis of the Microsoft Enterprise Stack.
ID: 9d9c58a5-57e1
142 Failed Findings
{[
{ label: 'Critical Exposure', value: '00', color: 'text-dark-text-disabled', bg: 'bg-white/5' },
{ label: 'High Risk Gaps', value: '110', color: 'text-orange-500', bg: 'bg-orange-500/10' },
{ label: 'Tactical Medium', value: '32', color: 'text-accent-amber', bg: 'bg-accent-amber/10' },
{ label: 'Baseline Low', value: '00', color: 'text-dark-text-disabled', bg: 'bg-white/5' }
].map(metric => (
))}
{metric.value}
{metric.label}
Severity Density
Service Vector Map
Primary Mission Gaps
{[
{ t: 'VM Disks Without CMK Encryption', d: '6 managed disks rely on platform-managed keys (PMK). This limits organization control over the encryption lifecycle and rotation auditability.', s: 'HIGH', c: 'text-orange-500', bg: 'bg-orange-500/10' },
{ t: 'Storage Account Shared Key Access', d: '3 accounts allow legacy key-based authentication. Shared keys provide unscoped access and lack individual audit trails compared to Entra ID auth.', s: 'HIGH', c: 'text-orange-500', bg: 'bg-orange-500/10' },
{ t: 'NSG Allows HTTP Ingress', d: '2 security groups permit inbound port 80. Unencrypted plaintext traffic across the network plane creates significant interception risk.', s: 'HIGH', c: 'text-orange-500', bg: 'bg-orange-500/10' },
{ t: 'Service Health Alerts Missing', d: 'Lack of activity log alerts for platform events. Operational blindspot regarding Azure region outages or security advisories.', s: 'HIGH', c: 'text-orange-500', bg: 'bg-orange-500/10' }
].map(row => (
))}
{row.s} MISSION RISK
{row.t}
{row.d}
Failed Check Registry
142 Operational Gaps Analyzed