Governance and Security Flashcards

(39 cards)

1
Q

When designing a Azure environment, what steps need to be done first?

A

Plan the management and governance of the azure tenant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define governance in azure

A

Establishment of policies, and continuous monitoring of their proper implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 steps in defining governance

A
  1. Set policies/rules to be enforced
  2. Configure monitoring to enforce/account policies and implementation
  3. Implementation/deployment in accordance to policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What mechanism precents accidental deletion in Azure environments?

A

management locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two types of management locks in Azure?

A

Delete and read only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a “delete” management lock

A

Ensures that no one can delete resources from your Azure subscription, by accident or on purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a “read only” management lock?

A

Ensures that only authorized users can read a resource, but also that they cannot modify it nor delete it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the benefit/purpose of using a “core resource group”?

A

To deploy resources that are used across several other resource groups; . For example, if I have a virtual network that is used by several services across the entire subscription, or an Azure key vault in which I store administrative credentials as secrets, then these types
of resources are created in one of my core resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the organizational unit hierarchy in Azure, and in what direction do policies flow?

A

Management groups - > Subscription - > Resource Group - > Resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose/function of a management group?

A

Configure different management scopes that allow
us to granularly manage governance settings at a scope above the subscription; Enables customers to
create global policies and role assignments that are valid for all Azure subscriptions within an Azure tenant’s scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be logically stored in a management group?

A

Other management groups, subscriptions, resource groups, and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the “root management group”

A

Each Azure AD directory is given a top-level management group; All subscriptions and management groups that are created for this Azure tenant belong to this root group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“Must knows” of root management group

A
  • Only user accounts that have been assigned Owner or Contributor roles on the tenant root group can change their display name.
  • The root group cannot be deleted or moved to another management group.
  • No one is given default access to the tenant root group. Only Azure AD global administrators have the right to elevate themselves to gain access and to make changes if necessary.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is best practice to allow admins to see all resources/subscriptions/management groups

A

You may want to give your security administrators read access to all resources that are created within the scope of your Azure Entra ID tenant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How would a resource/application be able to automatically deploy resources?

A

Give the application/resource access to all your Azure subscriptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can a global admin elevate access to modify the root management group?

A
  1. Sign in to the Azure portal or Azure Active Directory Admin Center as a Global administrator.
  2. Click Azure Active Directory and then Properties in the navigation pane.
  3. Under Access management for Azure resources, set the toggle switch to Yes, as
    shown in the preceding screenshot.

OR

Add-AzRoleAssignment -SignInName username@example.com -RoleDefinitionName “User Access Administrator” -Scope “/”

17
Q

Describe “Azure Policy”

A

Azure Policy allows you to create, assign, and manage
policies. Policies that you define enforce different rules for resources that you create in a policy’s scope.

18
Q

How does azure policy actively monitor compliance?

A

Azure Policy service evaluates resources for non-compliance with assigned policies and then applies a defined action.

19
Q

How do policy definitions and initiatives/actions work together to enforce polices?

A

Each policy definition includes a policy rule with an effect that determines the action to be taken if the conditions are satisfied.

20
Q

Define a “policy definition”

A

Policy definitions in Azure Policy express what to evaluate and what action to take when certain conditions are met; A JSON file that describes resource compliance and what effect to take when a resource is, or becomes, non-compliant.

21
Q

What effects/initiatives/actions can azure policy implement if it detects non-compliance?

A
  • Disabled is checked first to determine whether a policy’s rule should be evaluated. It is useful when testing the effect of a new policy definition or when you want to disable only one assignment instead of all assignments of a particular policy definition.
  • Append and Modify are evaluated next. Append is used to add additional fields to a requested resource during resource creation or a resource update. With an append policy, you can, for example, specify allowed IP addresses for a resource. The modifyeffect is helpful when adding tags to a resource, for example, resourceOwner or costCenter.
  • Deny is then evaluated and used to deny a resource request that does not match your compliance standard. The resource request will fail after evaluation. With a deny policy, you can, for example, prevent your administrators from creating resources in Azure regions that you do not allow, or prevent them from deploying VM SKU sizes you have not approved.
  • Audit and AuditIfNotExists are evaluated last and used to create a warning event in the activity log when evaluating a non-compliant resource. The resource request will not be stopped, but you will be able to be informedabout non-compliance.
  • Similar to AuditIfNotExists, the DeployIfNotExists (DINE) effect will evaluate a resource and, if it is non-compliant, start a template deployment to auto-remediate the non-compliant resource. For example, if you create a storage account without requesting HTTPS access, you can use a DINE policy to enforce this setting on the storage account.
22
Q

What elements does a policy definition contain?

A
  • Mode
  • Parameters
  • Display name (as it is found in the Azure portal or in the CLI)
  • Description (what this policy is actually doing, when to use it, and so on)
  • Policy rule (the rule definition)
  • Logical evaluation (what is the condition for resource compliance)
  • Effect (what happens if a resource is non-compliant)
23
Q

Describe the “mode” of a policy definition

A

The policy mode determines which resource types are evaluated by the policy. There are two modes supported:
* All: All resource groups and resource types are evaluated.
* Indexed: Only resource types that support tags and locations are evaluated.

24
Q

Describe the “parameters” property of a policy definition

A

Helps to give more granular control of what is being evaluated and what is happing in the event of non-compliance:
* name: The name of your parameter.
* type: The parameter type can be string, array, object, boolean, integer, float, or datetime.
* metadata: The parameter’s sub-properties used by the Azure portal to display user-friendly information about the parameter. These include description, display name, strongType, and assignPermissions.
* description: An explanation of what the parameter is used for.
* display name: A friendly name for the parameter shown in the Azure portal.
* strongType: (Optional) This property is used when assigning the policy through the Azure portal.
assignPermission: (Optional) If this value is set to true, Azure Portal will create role assignments during policy assignment. This option can be useful if you want to assign permissions outside the policy’s assignment scope.
* defaultValue: (Optional) If no value is specified during policy assignment, this value is used. defaultValue is mandatory if you update an existing policy definition that is already assigned.
* allowedValues: (Optional) This property provides an array of values that the parameter will accept during policy assignment.

25
Describe "policy assignment"
When you create a policy definition, you need to assign it to a specific scope for the policy to take effect
26
Where can policy definitions be assigned/scoped to?
The scope for a policy assignment can be anything from a management group over a subscription down to a resource group.
27
If policy definitions are passed down, how are they passed down and appllied?
Policy assignments are passed on from parent to child resources; Policies that are assigned to a management group or a subscription are also applied to all downstream resources within that scope
28
Can a sub-scope be excluded from a policy assignment?
Yes; you can exempt particular resources or scopes with additional contextual information
29
Define an initiative definition
Initiatives are collections of several rules that belong together; Initiatives are used to simplify policy assignments. With initiatives, you do not need to assign several policies. You assign one initiative and add the corresponding policies to it.
30
What are the two types of policy exemptions?
* Waiver is selected in case you want to temporarily accept the non-compliant state of a resource. * Mitigated is selected in case the policy intent is already met by a different method or process.
31
Azure Policy best practices
* Define policies and initiatives at the management group level. By doing so, you can assign them to all child subscriptions and resource groups without needing to redefine them. If you define policies and initiatives at the subscription level, you can only assign them to this single subscription. So, in short, definitions should be created at the management group level, while assignments can be at the management, subscription, or resource group level. * As always, before blocking your users from working, you should first test your new policies. You can do so by defining audit policies instead of starting with a deny policy. With the audit effect, you can get a feeling for the impact your policy definition will make. A deny policy could break your DevOps deployment chain and, with an audit effect, you will get an idea of what your policy will do later. * It is a good idea to create initiative definitions, even if you only want to create a single policy definition. If you have an initiative, you can easily add further policies later if you need to do so. * All policies within an initiative definition are evaluated when the initiative definition is evaluated. If you have a particular policy you do not want to be evaluated within that context, you should remove it from the definition and assign it individually. * Instead of disabling a policy definition or creating several assignments, consider using policy exemptions in case you want to exempt a resource or scope from being evaluated. Policy exemptions are great for keeping track for compliance reasons.
32
Describe "Azure Blueprints"
A repeatable declarative template that you define once and then use during the creation of all your Azure subscriptions in the future
33
At which level are blueprints assigned?
Management group or subscription
34
What can be deployed using azure blueprint?
* Role assignments * Policy assignments * ARM templates * Resource groups * Locks
35
What is best practice for creating and publishing azure blueprints that ensure proper version tracking?
When publishing a blueprint, you need to define a version string and optional change notes. When additional changes are made to this blueprint, the published version will still exist and changes are done in draft mode, again.
36
What Azure service is used to monitor and poll information about deployed resources?
Azure Resource Graph is a service that helps you to gather information about all your Azure resources across all your tenant's Azure subscriptions
37
What query language does Azure Resource graph use?
Kusto Query Language (KQL)
38
What permissions are necessary to use Azure Resource Graph?
Need to have at least read access to the resources you want to query
39
Can Azure Resource Graph be used with PowerShell?
Yes; First, install the PowerShell module for Azure Resource Graph: Install-module -name Az.resourcegraph