AZ 500 Terms Flashcards
(151 cards)
Azure Active Directory (Azure AD)
Definition:
Microsoft’s cloud based identity and access management service, used for managing users, groups and access to resources in Azure.
Key concepts:
Single sign on (SSO), Multi factor authentication and conditional access policies
Role Based Access Control (RBAC)
Definition:
A system for managing access to Azure resources based on user roles. These roles determine what actions users can perform.
Key concepts:
Roles like Owner, Contributor, and Reader. Roles can be assigned at different scopes such as subscription, resource group or specific resources
Azure Security Center
Definition:
A unified security management system that provides advanced threat protection across Azure workloads
Key Concepts:
Security score, security recommendations and vulnerability assessments
Network Security Groups (NSG)
Definition:
A tool used to filter network traffic to and from Azure resources within an Azure Virtual Network
Key Concepts:
Inbound and outbound rules to control traffic based on source/destination IP addresses, ports and protocols.
Azure Firewall
Definition:
A managed, cloud based network security service that protects Azure Virtual Network Resources
Key Concepts:
Stateful firewall that provides centralized control and protection over network traffic flows
Azure Key Vault
Definition:
A service for securely storing and managing cryptographic keys, secrets, and certificates
Key Concepts:
Provides encryption at rest, and integrates with services to safeguard data
Azure Policy
Definition:
A service used to create, assign and manage policies that enforce governance across Azure resources
Key Concepts:
Ensures compliance with security standards by preventing violations (like enabling encryption on storage accounts)
Azure DDoS Protection
Definition:
A service that protects Azure applications from DDoS attacks
Key Concepts:
Includes basic (default) and standard tiers, protecting against volumetric, protocol and application layer attacks
Azure Privileged Identity Management (PIM)
Definition:
A service that provides oversight of privileged roles, such as global administrator, to ensure controlled and limited user.
Key Concepts:
Just In Time Access, Approval Workflows, and monitoring of privileged roles
Azure Information Protection (AIP)
Definition:
A cloud based solution that helps organizations classify, label and protect documents and emails.
Key Concepts:
Data classification and protection based on sensitivity labels.
Azure Monitor
Definition:
A comprehensive solution for collecting, analyzing and acting on telemetry from Azure resources.
Key Concepts:
Centralized logging and monitoring with integration into security alerting systems like Azuree Security Center.
Azure Sentinel
A cloud native security information and event management (SIEM) tool that provides intelligent security analytics for enterprises.
Uses artificial intelligence to detect, prevent and respond to threats
Virtual Private Network (VPN) Gateway
A type of virtual network gateway that sends encrypted traffic between an Azure virtual network and an on premises location. This is used for hybrid cloud solutions and secure site to site or point to site VPN connections
Managed Identities
Azures service used for managing identity in Azure applications without the need to manage credentials. There are two types of managed identities, system assigned and user assigned
Encryption at rest
The process of encrypting data when it is stored, ensuring that data is inaccessible without proper key.s Azure Storage encryption, Azure SQL Database encryption (TDE) and Key Vault integrations
Conditional Access
A tool used to enforce access controls to applications and data based on conditions like user, location and device
Enforces MFA, restricts access based on device health or requires compliant devices
Just in Time VM Access
A feature in Azure Security Center that limits access to virtual machines by granting access only when needed
Reduces the attack surface by restricting the time a VM port is open
Azure Application Gateway
A web traffic load balancer that enables you to manage traffic to your web applications
This is application layer (layer 7) routing, web application firewall for protection from common threats like SQL injection and cross site scripting
Azure Log Analytics
A service in Azure Monitor that collects and analyzes log data from multiple sources which enables querying and alerting on log data for insights in resource operations and security incidents
Security Baselines
Pre configured security settings that service as recommendations or requirements for a secure environment
Baselines provided by Microsoft such as Azure Security Benchmark guide organizations in secure their workloads
Azure MFA
An authentication method that requires more than one verification method such as password and a phone based code to access resources. This helps secure user identities by requiring two or more verification methods
Service Endpoints
Extends virtual networks to Azure services by enabling private access to services like Azure storage, without the need for public IP.
This increases security by limiting traffic between resources to the Azure backbone network
Private Link and Private Endpoints
Allows you to securely connect to Azure services over a private virtual network, eliminating exposure to the public internet. This ensures that Azure resources such as storage accounts and databases are only accessible through a private endpoint
Azure Blueprint
A service that helps with deploying Azure resources according to organizational policies, ensuring compliance and governance. This automates resource configuration, policies and security controls to adhere to industry standards