Module 9 Flashcards
(146 cards)
Systems need to be designed with security in mind,
What service allows you to recieve and processes millions of events each second via dynamic data pipelines and intergrate with other Azure Services
Azure Event Hubs
Whose responsibility is Security in the cloud
Cloud Security is a shared responsibility.
In cloud some security is baked into service whilst addressing others remains the customers responsibility
What are some of the challenges involved with security in On-Prem data centers
Many tools and experts required to keep pace with volume and complexity of threats
Moving from On prem to cloud shifts some of the security responsibility, Security of the operational environment is now shared by Customer and Cloud Service Provider. With a shift to the cloud what can organisations reduce there forcus on
Moving from On prem to cloud shifts some of the security responsibility
Which model (IaaS, PaaS, SaaS) makes it the customers responsibility to patch and secure OS + Software. As well as configuring the network to be secure.
- With VMs/IaaS it is the customers responsibility to patch and secure OS + Software. As well as configuring the network to be secure.
- However you have outsourced the concern of physical security
When using PaaS what elements of Security are removed from the customer
With PaaS…Azure takes care of OS + Foundational Software, everything is updated/patched and can be intergrated with Azure AD
In terms of infrastructure, what benefits does PaaS bring?
- PaaS offers advantage of not needing to build infra’s and subnets
- You can point and click OR script complex secured systems that can be scaled as needed
With SaaS, everything is more or less outsourced, Software is run on internet infrastructure and code is controlled by Vendor.
What is an example of SaaS
Office 365 is an example
You outsource nearly everything, S/W runs on internet infra, code controlled by vendor and only configured by the customer
With all deployment types, what do you always own
With all deployment types you own data and identities
With all deployment types you are responsible for helping secure data and identities, what else is it
always your responsibility to secure?
- Data
- Endpoints
- Accounts
- Access Management
Defense In Depth is known as a “****” approach
Layered Approach
As a Strategy what does defense in depth employ
- Defense in depth is a strategy that employs a series of mechanisms to slow advance of an attack.
- Each layer provides protection, if one layer is breached there is another to prevent further exposure.
- M/S applies a layered approach to physical security and across Azure services
What is the objective of Defense in depth
- Objective of defense in depth is to protect and prevent data form being stolen by people not authorized to access it
How can Defense in Depth be visualise, and how does it remove the reliance on a single layer of protection
- Defense in Depth can be visualised as concentric rings, with data secured at the centre, each ring adding an additional layer of security.
- Removes reliance on single layer of protection and acts to slow down an attack + provides alerts telemetry for auto or manual effort
In almost all cases what is it that an attacked wants to get
- In almost all cases DATA is what the attacker wants whether that be Stored on
- Disk(VM) - DB - SaaS App - Cloud Storage
Who’s responsibility is it to ensure data is secured?
What often dictates controls with processs to ensure HA, Confidentialty and Intergrity
It is the Responsibility of those who store and control access to ensure it’s secured.
- Often there are regulatory requirements that dictate controls with processes to ensure HA, Confidentiality and Intergrity
What points should be implemented within an Application, with regards to security
- Ensure apps free of vunrabilites
- Store sensitive app secrets on secure medium
- Make security a design requirement for all in app development
- Intergrating security into app development life cycle will help reduce vunrabilities in code. Encourage all Dev teams to ensure apps are secure by default making security requirements non negotiable
What points should be implemented within “Compute”, with regards to security
- Secure VM access
- Implement endpoint protection
- Keep systems patched
- Malware + Unpatched systems, improperly secured systems open environment to attacks
- Focus in this layer is to make sure you secure with proper controls to minimize security risks
What points should be implemented within “Networking”, with regards to security
- Limit resource communication
- Deny by Default
- Restrict inbound traffic, limit outbound (where appropriate)
- Implement secure connectivity to on-prem network
- Focus on limiting network connectivity across all resources only allow what is required this reduces risk of lateral movement through the network.
What points should be implemented within “Perimeter”, with regards to security
- Use DDoS protection to filter large scale attacks before denial of service to end users
- Use perimeter firewalls to identify and detect malicious attacks
- About protecting from network based attacks against resources - Identify these attacks, eliminating impact, alert when they happen Important to keeping network secure.
What points should be implemented within “Identity and Access”, with regards to security
- Control access to infrastructure and use change control
- Use Single Sign On and Multi Factor Authentication
- Audit events and changes
- Ensure identities are secure and can only access what is needed (log changes made)
What points should be implemented within “Physical Security”, with regards to security
- Building security, Controlling access with DC = 1st line of defense
- Provide physical safeguard against access to assets, this ensures other layers can’t be bypassed + loss is handled appropriately
Azure Helps _______ security concerns but still ______ responsibility and how much depends on which model is used within Azure
Defense in ____ is used as a _____ for considering what protections are ______ for our environments.
Azure Helps alleviate security concerns but still shared responsibility and how much depends on which model is used within Azure
Defense in depth is used as a guideline for considering what protections are adequate for our environments.
Azure Security Center is a good starting point for investigating security of Azure based solutions, it is a monitoring service providing threat protection across….?
Monitoring service providing threat protection across Azure Services + On prem