Matproof × Microsoft Azure
Azure — automated compliance evidence from Entra ID, Defender for Cloud, Policy, Monitor.
Matproof's Azure integration collects continuous evidence across your subscriptions — Entra ID users and conditional access, Azure Policy compliance, Defender for Cloud findings, activity logs, Key Vault configuration, storage account security, network security groups. Supports multi-tenant and multi-subscription setups via Service Principal.
Evidence Matproof collects from Microsoft Azure
- Entra ID users, groups, roles, conditional access policies, MFA enrollment
- Azure Policy assignment and compliance status
- Microsoft Defender for Cloud recommendations and findings
- Activity logs, Azure Monitor diagnostic settings
- Key Vault configuration, access policies, rotation status
- Storage account encryption, firewall, private endpoints
- Network Security Groups and flow logs
- Subscription-level RBAC and access reviews
Frameworks supported
SOC 2ISO 27001NIS2DORAGDPRTISAXBSI C5
Typical use cases
- SOC 2 CC6 access controls via Entra ID evidence
- ISO 27001 A.5.15-18 access management evidence
- DORA Art. 9 + 11 ICT resilience on Azure infrastructure
- NIS2 Art. 21(2)(i) access management + MFA evidence
- Automatic quarterly access-review evidence
Setup
- 1Register a Matproof App in Entra ID (App Registration)
- 2Grant Reader + Security Reader roles at subscription or management-group level
- 3For Entra ID data: grant Directory.Read.All + Policy.Read.All API permissions (admin consent)
- 4Copy the Tenant ID, Client ID, and Client Secret into Matproof's Azure integration setup
- 5Evidence syncs within 10-15 minutes of connection
Questions on the setup? Contact us — our team can pair with yours on the connection.
Related integrations
See Matproof × Microsoft Azure in action.
30-minute demo — we connect a sandbox to show evidence flowing for your actual Microsoft Azure setup.