Azure – Security, Responsibility and Trust
In this, we will learn about the Azure – Security, Responsibility and Trust.
Azure Firewall
- Azure Firewall is a managed, cloud-based network security service that safeguards the resources of your Azure Virtual Network. It’s a stateful firewall as a service with high availability and unconstrained cloud scalability built in. Inbound security for non-HTTP/S protocols is provided by Azure Firewall.
- Remote Desktop Protocol (RDP), Secure Shell (SSH), and File Transfer Protocol are examples of non-HTTP/S protocols (FTP). Outbound network-level security is also provided for all ports and protocols, as well as application-level protection for outbound HTTP/S.
Azure DDoS Protection
- DDoS Protection takes use of Microsoft’s global network’s scalability and elasticity to deliver DDoS mitigation capabilities to every Azure area.
- The Azure DDoS Protection service secures your Azure applications by scrubbing traffic at the Azure network edge before it has a chance to affect the availability of your service. You get alert via Azure Monitor metrics within a few minutes of an attack detection.
Network Security Group (NSG)
- NSGs function at layers 3 and 4, and give a list of permitted and prohibited communications to and from network interfaces and subnets. NSGs are completely customisable, giving you complete control over network connectivity to and from your virtual machines. You may isolate applications between environments, layers, and services by utilising NSGs.
Authentication
- The process of establishing the identification of a person or service attempting to access a resource is authentication. It entails asking a party for genuine credentials and serves as the foundation for developing a security principal for use in identity and access management. It determines if they are who they claim to be.
Authorization
- The process of determining what level of access an authenticated person or service has is authorization. It lays out what data they have access to and what they can do with it.
Azure Active Directory (Authentication, SSO, Application Management, B2B Identity Services, Device Management)
Azure Active Directory (AD) is a cloud-based identity service. It has the ability to synchronise with your current on-premises Active Directory or operate independently. This implies that your credentials may share across all of your apps, whether they’re on-premises, in the cloud (including Office 365), or even on mobile. Using centralized rules and policies set in Azure AD, administrators and developers may restrict access to internal and external data and apps.
- Authentication
- Single Sign-On (SSO)
- Application Management
- Business to Business (B2B) Identity Services
- Device Management
Azure Multi-Factor Authentication
By requiring two or more pieces for complete authentication, multi-factor authentication (MFA) adds another layer of protection to your identities. These components are divided into three groups:
- Something you know (e.g. password)
- Next, something you possess (e.g. mobile app)
- Something you are (e.g. fingerprint or face scan)
Azure Security Center
Security Center is a monitoring solution that protects all of your services, both in Azure and on-premises, against threats. There are two tiers to choose from. It’s free (but just for assessments and suggestions); Typical (full suite of security-related services including continious monitoring, threat detection and just-in-time access control)
Azure Security Center – Usage Scenarios
- Incident Response (Detect, Assess, Diagnose)
- Implement Recommendations
Microsoft Azure Information Protection (MSIP)
- A cloud-based service that uses labels to help businesses identify and safeguard documents and communications. Analyze data flows, spot problematic behaviour, keep track of document access, and avoid data loss or abuse of sensitive information.
Azure Advanced Threat Protection (Azure ATP)
- A cloud-based security system that detects, identifies, and assists you in investigating sophisticated threats, compromised identities, and harmful insider acts directed against your company. Azure ATP can identify known malicious attacks and methodologies, as well as security vulnerabilities and threats to your network.
Resource Locks
- A resource lock is a setting that may apply to any resource to prevent it from modification or deletion. You can set resource locks to Delete or Read-only. All activities on the resource will be allowed, but the ability to remove it will be disabled. Read-only restricts access to the resource to just read operations, preventing it from being modified or deleted. When applied at higher levels, resource locks can be applied to subscriptions, resource groups, and individual resources, and they are inherited.
Azure Monitor
- Azure Monitor maximizes the availability and performance of your applications by delivering a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments. It helps you understand how your applications are performing and proactively identifies issues affecting them and the resources they depend on.
Azure Service Health
- When difficulties with Azure services affect you, Azure Service Health is a set of experiences that give tailored information and help. It may alert you, explain the implications of difficulties, and keep you updated when the problem is remedied. Azure Service Health may also assist you in planning for planned maintenance and changes that may influence your resources’ availability.
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
- The National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF) is a voluntary set of standards, recommendations, and best practises for managing cybersecurity risks.
- Independent, third-party Federal Risk and Authorization Management Program (FedRAMP) Moderate and High Baseline audits have been performed on Microsoft cloud services, and they have been certified according to FedRAMP requirements.
- Office 365 is also accredited to the NIST CSF goals thanks to a verified evaluation done by the Health Information Trust Alliance (HITRUST), a prominent security and privacy standards development and accreditation organisation.
Microsoft Privacy Statement
The Microsoft privacy statement explains what personal data Microsoft processes, how Microsoft processes it, and for what purposes.
- Trust Center
- Microsoft’s Trust Center is a digital resource that contains information and details about how the company implements and supports security, privacy, compliance, and transparency across all of its cloud products and services. The Trust Center is a key aspect of Microsoft’s Trusted Cloud Initiative, and it offers legal and compliance professionals with help and tools.
- Service Trust Portal
- The Compliance Manager service host on the Service Trust Portal (STP), which is also the Microsoft public portal for releasing audit results and other compliance-related information for Microsoft’s cloud services.
- Compliance Manager
- Compliance Manager is a Trust Portal workflow-type risk assessment dashboard that allows you to manage, allocate, and verify your organization’s regulatory compliance tasks that connects to Microsoft professional services and Microsoft cloud services including Office 365, Dynamics 365, and Azure.
- Azure Government Services
- Azure Government is a cloud environment exclusively for the US government’s compliance and security needs. A physically segregated instance of Microsoft Azure dedicated to the US government fulfils stringent compliance criteria and goes above and beyond US government regulations.
For more on Tutorial visit – Microsoft Azure Fundamental (AZ-900)