SeentySeenty Docs

Azure Integration

Connect your Azure subscriptions to Seenty for automated cloud security scanning.

Azure Integration

Connect your Azure subscriptions to Seenty to automatically scan for security misconfigurations in RBAC, Storage, and Network Security Groups. Azure integration is available on Ultra plans and above.

Azure cloud scanning requires an Ultra plan or higher. Upgrade from Workspace > Billing to enable this integration.

What it scans

Seenty scans three core Azure service areas for security misconfigurations:

RBAC (Role-Based Access Control)

FindingSeverityDescription
Users without MFAHighAzure AD users with access to resources but no multi-factor authentication configured.
Inactive usersMediumAccounts that have not signed in for an extended period but still hold active role assignments.
Excessive role assignmentsMediumUsers with Owner or Contributor roles at broad scopes (subscription or resource group level) when a more restricted role would suffice.
Guest users with privileged rolesHighExternal guest accounts with elevated permissions in your directory.

Storage

FindingSeverityDescription
Public blob access enabledHighStorage accounts allowing anonymous public access to blob containers.
Encryption at rest disabledMediumStorage accounts without encryption at rest configured.
HTTP access allowedMediumStorage accounts that accept unencrypted HTTP connections instead of requiring HTTPS only.
Shared key access enabledLowStorage accounts allowing shared key authorization, which is less secure than Azure AD authentication.

NSG (Network Security Groups)

FindingSeverityDescription
SSH (22) open to any sourceHighNSG rules allowing SSH access from 0.0.0.0/0 or *.
RDP (3389) open to any sourceHighNSG rules allowing Remote Desktop from any source address.
All ports open inboundCriticalNSG rules allowing inbound traffic on all ports from any source.
Missing NSG on subnetMediumSubnets without any network security group attached, leaving all inbound traffic unfiltered.

Setup

Create a Service Principal in Azure AD

Seenty requires read-only access to scan your Azure resources. Create a Service Principal (app registration) for this purpose:

  1. Sign in to the Azure Portal.
  2. Go to Azure Active Directory > App registrations.
  3. Click New registration.
  4. Enter a name (e.g., "Seenty Scanner") and leave the redirect URI blank.
  5. Click Register.
  6. Note the Application (client) ID and Directory (tenant) ID from the overview page.

Create a client secret

  1. In the app registration, go to Certificates & secrets.
  2. Click New client secret.
  3. Enter a description (e.g., "Seenty") and choose an expiration period.
  4. Click Add.
  5. Copy the Client Secret value immediately -- it is only displayed once.

The client secret value is only shown at creation time. If you navigate away without copying it, you will need to create a new secret.

Assign the Reader role

Grant the Service Principal read-only access to the resources you want to scan:

  1. Go to the Subscription you want Seenty to scan.
  2. Click Access control (IAM) > Add role assignment.
  3. Select the Reader role.
  4. In the Members tab, select User, group, or service principal and search for the app name you registered (e.g., "Seenty Scanner").
  5. Click Review + assign.

The Reader role provides read-only access to all resources in the subscription. Seenty cannot modify, create, or delete any resources. For tighter scoping, you can assign the Reader role at the resource group level instead.

Add the Azure account in Seenty

  1. Go to Assets > Cloud Accounts in the Seenty dashboard.
  2. Click Add Azure Account.
  3. Enter a friendly name for the account (e.g., "Production Azure").
  4. Enter the Tenant ID, Client ID, and Client Secret from the previous steps.
  5. Click Test Connection to verify that Seenty can authenticate with the provided credentials.
  6. Click Save.

Enable scanning

Once the account is added and the connection is verified, enable scanning. Seenty will run an initial scan immediately and schedule periodic scans going forward.

Managing scans

  • Manual scan -- Trigger a scan at any time from the cloud account detail page by clicking Scan Now.
  • Scheduled scans -- Seenty runs periodic scans automatically after the initial scan.
  • Scan results -- Findings appear in Security Posture > Misconfigurations with the source labeled as Azure.

Credential security

Your Azure credentials are:

  • Encrypted at rest -- The Tenant ID, Client ID, and Client Secret are encrypted before being stored.
  • Never logged -- Credentials never appear in logs or error messages.
  • Used only for scanning -- Seenty only performs read operations through the Reader role. No resources are modified.

Credential rotation

Azure client secrets have an expiration date. Before the secret expires:

  1. Create a new client secret in the Azure Portal (App registrations > Certificates & secrets).
  2. Update the Client Secret in Seenty from Assets > Cloud Accounts by editing the Azure account.
  3. Test the connection with the new secret.
  4. Delete the old client secret in the Azure Portal.

If your Azure client secret expires without being rotated, scans will fail. Set a calendar reminder to rotate the secret before its expiration date.

Troubleshooting

Connection test failing?

  • Verify the Tenant ID, Client ID, and Client Secret are correct (no extra spaces or characters).
  • Ensure the client secret has not expired.
  • Check that the Service Principal has the Reader role assigned on the subscription or resource group you want to scan.

Missing findings?

  • Seenty scans RBAC, Storage accounts, and NSG configurations. Other Azure services are not currently covered.
  • Ensure the Reader role is assigned at the correct scope (subscription level for full coverage).

Scan showing stale results?

  • Trigger a manual rescan from the cloud account page. Results reflect the state at the time of the most recent scan.

Permission errors during scan?

  • Some Azure subscriptions have custom RBAC restrictions that may block certain read operations even with the Reader role. Check your subscription's access policies or contact your Azure administrator.