CS-900 Microsoft Security Fundamentals Flashcards
(160 cards)
Describe the shared responsibility model
Identifies which security tasks are handled by the cloud provider, and which security tasks are handled by you, the customer. The responsibilities vary depending on where the workload is hosted. It makes responsibilities clear.
Defense in Depth
Layered approach to security, rather than relying on a single perimeter. A defense in-depth strategy uses a series of mechanisms to slow the advance of an attack. Each layer provides protection so that, if one layer is breached, a subsequent layer will prevent an attacker getting unauthorized access to data.
Zero Trust Model
Assumes everything is on an open and untrusted network, even resources behind the firewalls of the corporate network. The Zero Trust model operates on the principle of “trust no one, verify everything.”
Encryption
Is the process of making data unreadable and unusable to unauthorized viewers. To use or read encrypted data, it must be decrypted, which requires the use of a secret key. There are two top-level types of encryptions: symmetric and asymmetric.
Hashing
Uses an algorithm to convert text to a unique fixed-length value called a hash. Each time the same text is hashed using the same algorithm, the same hash value is produced.
Salted
Refers to adding a fixed-length random value to the input of hash functions to create unique hashes for same input.
Data Compliance
Regulations to help protect and govern the use of data. From personal and financial information to data protection and
privacy, organizations can be accountable for meeting dozens of regulations to be compliant
Data residency
Governs the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally. These regulations can differ significantly depending on jurisdiction.
Data sovereignty
The concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed. Can be subject to laws from different countries/regions if processing, storage or collection are done in different locations
Data privacy
Providing notice and being transparent about the collection, processing, use, and sharing of personal data are fundamental principles of privacy laws and regulations
Personal Data or PII
Any data that is directly linked or indirectly linkable back to a person
Azure Policy
Enforce standards and assess compliance across your organization no matter who you are, evaluates all
resources in Azure and Arc enabled resources
Azure Role Based Access Control (RBAC)
Manages who has access to Azure resources, what they can do with those resources,
and what areas they can access
Data Catalog
Find relevant data using a search experience with filters based on various lenses like glossary terms, classifications, sensitivity labels, and more
Data Estate Insights
Gives a bird’s eye view and at a glance understanding of what data is actively scanned, where sensitive data is, and how it moves
Data Map
Scanning registered data sources is able to capture metadata about enterprise data, to identify and classify sensitive data
Authentication (AuthN)
Process of proving that a person is who they claim to be.
Authorization (AuthZ)
What that person can see and touch and where they can go (Permissions).
Identity
Set of things that define or characterize someone or something. (Username and password)
4 Pillars:
Administration – creation and management/governance of identities for users, devices, and services
Authentication – sufficient proof that you are who you claim to be
Authorization – level of access granted to entity
Auditing – tracking of who does what, when, where, and how (in-depth reporting)
Identity Provider
Creates, maintains, and manages while providing authentication, authorization, and auditing
Active Directory
Stores info about members of the domain including devices and users, verifies their credentials and defines their access rights
Federation
Enables the access of services across organizational or domain boundaries by establishing trust relationships between the respective domain’s identity provider.
Azure AD Free
You can administer users, create groups, sync with on premise AD, create basic reports, config self service passwords, and enable single sign on