Azure Virtual Datacenter
Azure Virtual Datacenter
Azure Engineering
November 2017
Azure Virtual Datacenter
Contents
Overview ..............................................................................................................................................................5
PART 1 WHAT IS AZURE VIRTUAL DATACENTER? ............................................................................7
Introduction: the essential components ..................................................................................................8
A logical isolation for multiple workspaces ....................................................................................................... 9
2
Azure Virtual Datacenter
Encryption .................................................................................................................................................................... 39
Operations ................................................................................................................................................................... 41
List of figures
Figure 1. The four components that make the Azure Virtual Datacenter possible: identity,
encryption, software-defined networking, and compliance. ............................................................................. 5
Figure 2. Compliance with security and policy is the foundation of the Azure Virtual Datacenter
approach to trust, where automated auditing capabilities uncover potential issues. ............................. 8
Figure 6. How the central firewall uses load balancers and traffic routing. ............................................... 23
Figure 7. The gateway subnet routes traffic to the appropriate part of the central IT infrastructure.
.................................................................................................................................................................................................. 24
Figure 9. The Azure platform offers a range of options to suit the level of control DevOps needs
for workloads deployed to the virtual datacenter. .............................................................................................. 28
Figure 10. Virtual datacenter activities are continuously logged and monitored. Logging data is
imported into OMS and is also available for use in on-premises log analytics. ...................................... 29
Figure 11. Final Contoso architecture with major components and traffic flows (on-premises to
workload, workload to on-premises, on-premises to management, and DNS). ..................................... 32
3
Azure Virtual Datacenter
Figure 12: Enterprise IT and governance should be balanced against developer agility in a
successful cloud datacenter transformation. ......................................................................................................... 34
Figure 13: Virtual datacenter patterns showing the range of platform services used. On one end,
IaaS virtual machines use only on-premises data; on the other, the full use of cloud-based PaaS
services. ................................................................................................................................................................................. 35
© 2017 Microsoft Corporation. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR
IMPLIED, IN THIS SUMMARY. The names of actual companies and products mentioned herein may be the trademarks of their
respective owners.
4
Azure Virtual Datacenter
Overview
Azure Virtual Datacenter is an approach to making the most of the Azure cloud platform's
capabilities while respecting your existing security and networking policies. When deploying
enterprise workloads to the cloud, IT organizations and business units must balance governance
with developer agility. Azure Virtual Datacenter provides models to achieve this balance with an
emphasis on governance.
Deploying workloads to the cloud introduces the need to develop and maintain trust in the cloud
to the same degree you trust your existing datacenters. The first model of Azure Virtual
Datacenter guidance is designed to bridge that need through a locked-down approach to virtual
infrastructures. This approach isn’t for everyone. It’s specifically designed to guide enterprise IT
groups in extending their on-premises infrastructure to the Azure public cloud. We call this
approach the trusted datacenter extension model. Over time, several other models will be offered,
including those that allow secure Internet access directly from a virtual datacenter.
Figure 1. The four components that make the Azure Virtual Datacenter possible: identity, encryption,
software-defined networking, and compliance.
In the Azure Virtual Datacenter model, you can apply isolation policies, make the cloud more like
the physical datacenters you know, and achieve the levels of security and trust you need. Four
components any enterprise IT team would recognize make it possible: software-defined
networking, encryption, identity management, and the Azure platform's underlying compliance
standards and certifications. These four are key to making a virtual datacenter a trusted extension
of your existing infrastructure investment.
Central to this model is the idea that your cloud infrastructure has isolation boundaries that can
be thought of as your corporate namespace. Think of it as your isolated cloud within Azure.
Within this virtual boundary, security controls, network policies, and compliance come together,
providing you with an IT infrastructure on Azure capable of securely integrating cloud resources
with your existing on-premises datacenter.
You can deploy new virtual workspaces in the virtual datacenter much as you would deploy
additional capacity to your physical datacenter. These virtual workspaces are self-contained
5
Azure Virtual Datacenter
environments where workloads can run independently, and workload teams can get workspace-
specific access. Workspaces enable teams to build solutions and manage workloads with great
freedom while adhering to the overall access and security policies defined in the central IT
infrastructure.
This guide is intended for enterprise IT architects and executives. Using the lens of the physical
datacenter, the guide discusses an approach to designing secure, trusted virtual datacenters on
the Azure platform. Azure Virtual Datacenter is not a specific product or service but rather a way
to think about cloud infrastructures. It offers proven practices and guidance to help smooth your
migration to the cloud.
At the end of this guide, you can learn about the upcoming Virtual Datacenter Automation
guidance. This guidance includes a collection of scripts and Azure Resource Manager templates
that will help you build an Azure Virtual Datacenter using the trusted extension model.
6
Azure Virtual Datacenter
PART 1
WHAT IS AZURE VIRTUAL
DATACENTER?
Azure Virtual Datacenter is a way to think about deploying your application estate in a cloud-
based architecture while preserving key aspects of your current IT governance and taking
advantage of cloud computing’s agility.
There are very real, underlying differences between hosting in the cloud and running in a
traditional datacenter. Achieving the level of governance in the cloud environment that you
experience in a traditional datacenter requires a sound understanding of why you do what you do
today, and how that is achieved in Azure.
Unlike your existing on-premises datacenter environment, the Azure public cloud operates using
shared physical infrastructure and a software-defined environment abstraction. The Azure Virtual
Datacenter model allows you to structure isolated workloads in the Azure multitenant
environment that meet your governance policies.
7
Azure Virtual Datacenter
A key tenet of the Azure Virtual Datacenter model is to place as little trust as possible in the
surrounding hosting environment. Therefore, the virtual datacenter must impose isolation,
security, and compliance measures within its environment just as a physical datacenter would. The
main difference is how these measures are implemented. Azure Virtual Datacenter relies on the
following essential components:
Figure 2. Compliance with security and policy is the foundation of the Azure Virtual Datacenter approach to
trust, where automated auditing capabilities uncover potential issues.
• Identity management and role-based access control (RBAC) govern access to the
computing, networking, data, and applications in a virtual datacenter. Based on the least
privilege model of access control, the virtual datacenter denies access to resources by default.
Access must be explicitly granted to specific users, groups, or applications performing
particular roles.
• Encryption. Data in transit, at rest, and in process is encrypted. This Encryption isolates
confidential information from the rest of the environment, including the underlying platform.
Even virtual machines are booted with encryption. This conservative approach may not be
needed for all Azure hosting scenarios but is a foundation of the virtual datacenter's
intentionally strict trust model.
• Compliance. Azure infrastructure and services meet a broad set of international, industry-
specific, and country-specific compliance standards. To help ensure the safety of your data,
Microsoft also verifies how compliance is achieved through rigorous third-party audits that
validate Azure’s adherence to standards-mandated security controls. In addition, virtual
datacenters make extensive use of automated compliance monitoring, logging, and reporting
8
Azure Virtual Datacenter
systems, operational rigor, transparency through audit reports, and aggressive testing
methods such as red teaming.
The Microsoft Compliance Manager tool provides transparency into the controls managed by the
platform and the controls you are responsible for managing. The tool also helps you understand
compliance for those controls. Whether that involves a configuration on the platform such as
encryption or multi-factor authentication or a knowledgebase article on a process like role
assignments, the goal is the same.
9
Azure Virtual Datacenter
A global platform
Azure organizes its platform capabilities into geographic regions. Each contains one or more
datacenters located in relative proximity to each other to support robust high availability and
disaster recovery scenarios. A world map shows Azure datacenters (as of October 2017) on most
every continent. This reach enables you to deliver your solutions close to your customers and
employees and compete in even more geographic markets.
Figure 4. The Azure platform is supported by a growing network of Azure-managed datacenters around the
world.
10
Azure Virtual Datacenter
Azure datacenters contain physical network, compute, and storage devices like any traditional
physical datacenter, just at hyper-scale. So at some level, the same facility maintenance, security,
and access control requirements you already apply in your physical datacenter also apply to Azure
datacenters. The main difference is that those requirements are managed by the Azure datacenter
staff, rather than your own teams.
Because of Azure's global reach, data sovereignty can be an important concern that you didn't
have to deal with when only maintining your on-premises infrastructure. Governance policies can
be applied to your Azure subscriptions to ensure that resources are deployed only to regions that
meet your data residency requirements. To see which Azure region is right for you, see the Azure
datacenters website.
A regional infrastructure
For business continuity and disaster recovery scenarios, each Azure region is paired with
complementary geo-political regions (for example, North Europe and West Europe regions).
Regional pairs (with the exception of Brazil South and Southeast Asia/East Asia) offer the same
data-residency and sovereignity for both members of the pair. Replicating resources across paired
regions reduces the likelihood of natural disasters, civil unrest, power outages, or physical
network outages affecting both regions at once.
Azure further breaks down regions into multiple availability zones—low-latency, connected
environments supporting highly available applications. Availability zones help protect against any
potential outage within a specific datacenter in a region.
By default, resources in a virtual datacenter exist within a single Azure region, allowing
components to connect with greater security and with minimum network latency. Just as you
might replicate your physical datacenter to provide a high-availability infrastructure, instances of
a virtual datacenter can be created in multiple regions. Applications executing within a workspace
can take advantage of all Azure high-availability features within a region and across regions. For
example, using Global VNet Peering, it is possible to extend the virtual datacenter across regions.
Features such as SQL Database geo-replication also help to keep multiple instances of workloads
in sync and available.
placed on individual resources and collections called resource groups. For example, central IT
administrators might apply a read-only lock to a virtual network, allowing users and other
resources to use but not modify the network. Or a workspace owner could apply a delete lock to a
virtual machine in the workspace to allow DevOps teams to configure the resource but not delete
it.
Regardless of the level of isolation and security applied to a resource group or resource, any
attempt to access, modify, or delete a resource leaves an audit trail. Azure Activity Log records all
resource activity, including actions, actors, and if an action was successful.
Another way to isolate resources is to enable just in time access control of virtual machines. This
recommended feature limits the amount of time a management endpoint attached to a virtual
machine remains open. Locking down inbound traffic in this way is particularly important for any
virtual machines used to perform broad management functions within the virtual datacenter.
As with an on-premises datacenter, regular security tests should be run against Azure–hosted
resources, using both automated processes and manual review. These tests should always include
port scanning, penetration testing, and fuzz testing. Azure Security Center provides threat
prevention, detection, and response capabilities that are built in to Azure, including and includes
risk-mitigation tools such as endpoint protection for virtual machine anti-malware protection.
See also
Introduction to Azure Security
Azure Key Vault is the primary mechanism for storing and managing the keys, secrets, and
certificates associated with encryption, authentication, and cryptographic non-repudiation
processes within a virtual datacenter.
All cryptographic keys, connection strings, certificates, and other secrets used by applications or
resources in a virtual datacenter must be stored and managed as well. Key Vault supports a FIPS
140-2 Level 2-validated hardware security model (HSM), and allows you to generate keys using
your on-premises HSM and securely transfer them to Key Vault.
Keys stored in Key Vault can also be used to encrypt storage assets, and to help secure PaaS
services or individual applications. For example, a database connection string can be stored in Key
Vault instead of an application's configuration files or environment variables. Authorized
applications and services within Azure Virtual Datacenter can use, but not modify, keys stored in
12
Azure Virtual Datacenter
Key Vault. Only key owners can make changes to keys stored in Key Vault.
Data in transit
The Azure Virtual Datacenter model uses encryption to enforce isolation of data as it moves
between:
• On-premises networks and the virtual datacenter. Data passes through either an encrypted
site-to-site virtual private network (VPN) connection or an isolated, private ExpressRoute.
• Applications running in a different virtual datacenter (that is, from one virtual datacenter to
another).
In these scenarios, the Azure Virtual Datacenter approach is to use the SSL/TLS protocols to
exchange data between both the virtual datacenter and application components. All network
traffic has some degree of encryption applied at all times. In addition, all communication between
internal Azure components within the virtual datacenter are protected using SSL/TLS, enforced by
a firewall in the central IT infrastructure.
Data at rest
Data at rest is also encrypted, including data stored on Azure Storage and in relational databases,
which may offer additional encryption. For example, Azure SQL Database includes Transparent
Data Encryption (TDE).
The central IT infrastructure uses Azure Storage for several tasks, such as storing logs. Azure
Storage Service Encryption (SSE) provides encryption at rest for all Azure Storage services by
encrypting data before writing it to storage. SSE decrypts the data immediately prior to retrieval.
SSE-enabled Azure Storage accounts can handle encryption, decryption, and key management in
a totally transparent fashion. All data is encrypted using 256-bit AES encryption, and both
Microsoft-managed and customer-managed encryption keys are supported.
Virtual machine disk image encryption is also a critical part of ensuring isolation and virtual
machine security within a shared tenant environment. The Azure Virtual Datacenter model
depends on the platform's ability to securely create, host, and access virtual machines with
encrypted disks. Azure supports two models for encrypting virtual machines:
• For virtual machines created in Azure, you can use Azure Disk Encryption. The BitLocker
feature of Windows and the DM-Crypt feature of Linux provide volume encryption for the
operating system and data disks. The Azure Marketplace contains hundreds of
preconfigured virtual machine images that you can quickly deploy and encrypt.
• You can also use pre-encrypted virtual machines created using your on-premises Hyper-V
hosts, using DM-Crypt or BitLocker with your internal policies and configuration. After
validating an image on-premises, you can then upload the relevant internally managed
keys to your Key Vault instance, then deploy the pre-encrypted VHD disk images as Azure
virtual machines.
13
Azure Virtual Datacenter
Data in process
Another near-term addition to the Azure platform is support for Confidential Computing through
Trusted Execution Environments (TEE) using technologies such as enclaves. Intel Secure Guard
Extensions (SGX) and other enclave technologies allow developers to create secure, trusted
execution environments. Enclaves provide an encrypted area for data and code that can only be
processed by CPU-based security mechanisms in the process-embedded TEE.
Microsoft is also investing in cryptographic research. For example, homomorphic encryption (HE)
can be used to encrypt stored data so that storage can be outsourced to an untrusted cloud.
Applications can make use of HE data as is without first decrypting it. For more information about
using HE in a bioinformatics context, see the paper from Microsoft Research, Manual for Using
Homomorphic Encryption for Bioinformatics.
See also
Encryption in the Microsoft Cloud
14
Azure Virtual Datacenter
PART 2
HOW CONTOSO COMPOSES A
TRUSTWORTHY DATACENTER
Virtual datacenters introduce new challenges to the service management landscape. Together
with Azure Virtual Datacenter principles, good IT management processes help enterprises realize
the benefits of public cloud computing such as self-service, scalability, and elasticity.
This section describes a reference implementation for Contoso, a fictional financial services
enterprise. It is based on real-life engagements with global organizations that have successfully
made the transition to the cloud with the requisite regulatory approval.
15
Azure Virtual Datacenter
On-premises network
On-premises
datacenter
ExpressRoute / VPN
DNS Gateway
Workloads
Workspace
Hub VNet
Central IT infrastructure
Virtual network peering connects hub and spoke networks
Workloads Workloads
Workspace Workspace
16
Azure Virtual Datacenter
On-premises connectivity
To avoid sending traffic over the public Internet, Contoso wants to use a dedicated, private
connection between their on-premises network and the virtual datacenter. The Azure Virtual
Datacenter model supports two methods of connecting a virtual datacenter center to on-
premises networks:
• ExpressRoute uses a dedicated, private connection facilitated by a connectivity provider.
• Azure VPN gateways create a site-to-site connection that passes encrypted traffic over
the public Internet.
Contoso plans to set up an ExpressRoute connection, which offers more reliability, faster speeds,
and lower latencies than typical connections over the Internet. ExpressRoute creates a direct link
between the on-premises network and Azure. However, ExpressRoute connections take time to
acquire and deploy. While they wait for ExpressRoute, Contoso can immediately set up a site-to-
site VPN gateway, a common tactic used by many organizations to quickly get started using
Azure resources.
After the ExpressRoute connection is in place, they can convert the VPN gateway to a failover
connection in case the ExpressRoute goes down. They could also use it as a secondary connection
for workloads that don't require the increased speed and lower latency of ExpressRoute.
Any significant change to resources or infrastructure involves multiple roles—that is, more than
one person must review and approve a change. This separation of responsibilities limits the ability
of a single person to access sensitive data or introduce vulnerabilities without the knowledge of
other team members.
For example, the Network Operations person responsible for the central network infrastructure
must approve certain infrastructure requests from the Network Operations person who oversees a
specific application’s virtual network. Contoso decided that these two similar roles should be split
between the central team overseeing the common components of the infrastructure (Corporate
NetOps) and the many people who oversee the individual application deployments (Application
NetOps). Likewise, they take the same approach to Security Operations and other roles. Contoso
can centrally manage policy for the organization as well as unleash application teams to innovate
within those policies.
17
Azure Virtual Datacenter
Management roles
Contoso’s current IT service management organization revolves around the activities that occur
throughout the entire IT lifecycle: managing compliance, configurations, and audits. To handle
these activities for the new virtual datacenter, Contoso organizes IT users from both the central
and application teams into the following roles:
Following Azure Virtual Datacenter principles, access and security for resources within each
workspace should be handled through workspace-specific groups independent of the central IT
groups. Workload teams can then maintain their own resources, deploy solutions, and create
access policies, while the central IT teams retain overall control of the virtual datacenter and
communication into and out of it.
Each group should have a unique and easily identifiable name that indicates the section of the
datacenter they are responsible for. Contoso creates a nomenclature to differentiate the roles
associated with managing the central virtual datacenter services from the roles associated with
managing the workspaces and workloads.
18
Azure Virtual Datacenter
See also
Microsoft hybrid identity solutions
The design calls for isolated workspaces that support Contoso’s various workload deployments
such as Microsoft SharePoint or SAP services. Each workspace has its own management resources
and spoke virtual networking infrastructure. Teams can add other policies to control access and
resource usage within their workspace while adhering to central policies.
The central IT infrastructure environment and each workspace are created as separate Azure
subscriptions. This policy decision is designed to increase workload flexibility and avoid
subscription-related limits. Each central IT and workspace subscription is associated with the main
organizational Azure AD tenant, but teams can also set up additional workspace-specific access
controls and policies. For example, workspace-level RBAC enables teams to deploy resources for
specific workloads or projects. If some teams want to run more than one workload in their
workspace, they can do so without needing another subscription. Enforcement of global
organizational policies is maintained on all subscriptions.
19
Azure Virtual Datacenter
• The central hub virtual network, through which all traffic between cloud workloads and the
on-premises network must pass.
• The central firewall that, in line with the trusted extension model, inspects and redirects traffic
passing through the virtual datacenter to an on-premises network.
• Operational tools and shared management services used by the virtual datacenter.
• Resource Manager policy settings that prevent direct access to external networks and route
traffic through the central IT infrastructure.
• Workload resources.
Central IT and workspace subscriptions are created separately by Contoso's Azure Account
Administrator, who ensures all subscriptions created for the virtual datacenter are associated with
the organization's Azure AD tenant.
After a subscription is created, the standard SecOps, NetOps, SysOps, and DevOps roles for that
subscription are added to Azure AD and given appropriate permissions.
Contoso will create the following resource groups in the central IT subscription:
The breakdown of resource groups within workspaces depends on the needs of individual
workloads, but Contoso will provide each workspace with the following groups on creation:
Policies Description
Deny public IP Prevents the creation of any new public IP
endpoints. For workspaces, this policy applies at
the subscription level. The central IT infrastructure
applies this policy on all resource groups, allowing
the subscription owner to add a public IP for a
VPN connection if necessary.
After creating resource groups, Contoso provisions Key Vault for each environment—central IT
and all workspace subscriptions. When the provisioning is complete, a cryptographic key is
created and stored in Key Vault, which is then used to perform storage encryption tasks. An
encrypted storage account is created in the Key Vault resource group for storing audit log
information related to the vault.
Edit access to secrets and keys within the vault is restricted to the CorpSecOps or workload-
specific SecOps role. Other roles can use secrets and keys to encrypt and decrypt storage and
access encrypted virtual machines, but they cannot modify or otherwise access any keys.
Central firewall
Data exfiltration is a major concern to Contoso, so they want to implement a layer-7 whitelisting
mechanism to control data leaving the virtual datacenter. They set up a firewall using one or more
network virtual appliances (NVAs) in the central IT infrastructure, and all traffic from a workspace
to the outside world must pass through it. These virtual devices are designed to handle the
networking and security functionality traditionally handled by physical firewall devices.
Through the central firewall, the central IT infrastructure controls the traffic allowed to pass in and
out of the virtual datacenter and determines how that traffic is directed. The central firewall
manages network flow within the virtual datacenter and between resources hosted in the virtual
datacenter and those in external environments, including the on-premises datacenter.
22
Azure Virtual Datacenter
UDRs on the workspace subnets route outbound traffic to the central firewall.
Figure 6. How the central firewall uses load balancers and traffic routing.
Contoso is expecting a large amount of traffic between their on-premises network and workloads
hosted on the virtual datacenter. To handle the load and provide redundancy, the central firewall
will consist of multiple NVAs. Two load balancers, using the High Availability Ports feature, will
distribute traffic: A front-end load balancer handles traffic going to the workspaces from the
network on-premises, and a back-end load balancer handles traffic going from workloads to the
network on-premises.
See also
Secure networks with virtual appliances
In Contoso's implementation of the trusted extension model, a DMZ is not required, because all
traffic flows only between the on-premises network and the virtual datacenter. This traffic passes
through either an isolated ExpressRoute connection or a secure site-to-site VPN, and subscription
policy prevents any public access to the virtual datacenter itself.
23
Azure Virtual Datacenter
Figure 7. The gateway subnet routes traffic to the appropriate part of the central IT infrastructure.
This gateway is configured in a subnet of the central IT infrastructure's hub virtual network. The
subnet implements UDRs to send incoming traffic to one of three destinations. Requests for
workspace resources are processed through the central firewall. Administrator requests for
remote access to configure network resources are sent to the management jumpboxes. Requests
for tasks such as name resolution are routed to the shared services subnet.
In any case where the perimeter borders an untrusted source such as a public Internet
connection, the Azure Virtual Datacenter model requires a full DMZ. To use this option, Contoso’s
perimeter network would include UDRs to send traffic to NVAs hosted on a DMZ subnet. This
traffic gets processed, and only approved requests make it through either to the outside world or
into the secured central IT hub virtual network, where it can be forwarded to the appropriate
workspace spoke network.
See also
Azure Reference Architectures: Connect an On-premises Network to Azure
24
Azure Virtual Datacenter
Figure 8. Administrators on-premises use hardened jumpboxes (bastion hosts) to remotely configure the
central firewall and manage virtual machines and NVAs over the virtual network. NSGs restrict access to
specific ports and IP addresses.
See also
Implementing Secure Administrative Hosts
25
Azure Virtual Datacenter
Shared services
The shared services subnet provides a central place to deploy core functionality used by
workspaces. For example, workloads in the virtual datacenter need to resolve names for on-
premises resources, and the on-premises network needs to resolve names for virtual datacenter
resources, so Contoso deploys DNS as the first shared service. Contoso also wants to integrate
their DNS infrastructure, so they can use consistent name resolution across virtual and on-
premises environments.
Contoso will provide DNS services by creating a primary and secondary domain controller
running Azure Active Directory Domain Services in the central IT infrastructure environment,
configured to handle DNS resolution for the virtual datacenter. These servers are configured to
forward DNS requests from the virtual datacenter to the on-premises environment, and the on-
premises DNS servers are likewise configured to forward DNS requests for names of workspace
resources to the shared services DNS servers.
See also
Name Resolution for VMs and Role Instances
26
Azure Virtual Datacenter
The workspace SecOps and NetOps roles have the responsibility to lock down the workspace
virtual networks based on Contoso policy for each specific workload. DevOps teams can have
considerable flexibility in deploying any operating resources they need to support a workload. If
DevOps activities require Internet or ExpressRoute access, the traffic goes through the central IT
hub virtual network controlled by the central IT CorpSecOps team. Central firewall rules must be
implemented for this traffic to make it through to the on-premises network, and the CorpSecOps
team will be responsible for reviewing and implementing any requested updates to the firewall.
27
Azure Virtual Datacenter
Figure 9. The Azure platform offers a range of options to suit the level of control DevOps needs for
workloads deployed to the virtual datacenter.
They can integrate Azure services in a virtual network, which enables private, secured access for
services such as HDInsight, Azure Batch, and Azure Storage. Two patterns are supported. In the
first pattern, the service deploys dedicated instances into the virtual network, where they can only
be used by resources with access to that network. Azure Batch and HDInsight follow this pattern.
The second pattern, virtual network service endpoints, is an Azure feature that extends a virtual
network's private address space and identity to Azure services over a direct connection. This
option helps secure service resources by allowing access only from the virtual network, providing
private connectivity to these resources and preventing access from external networks. Service
endpoints use the Microsoft backbone network and allow PaaS resources to be restricted to a
single virtual network, or inside a single subnet capable of using NSGs to further secure network
access.
Azure Storage and SQL Database follow this pattern. Additional Azure services are planning to
support this feature in the future.
See also
Virtual network integration for Azure services
Announcing Virtual Network integration for Azure Storage and Azure SQL
Different types of logging and monitoring services can be used to track the behavior of virtual
datacenter resources. The Contoso SysOps team uses the two main types of logs offered by
Azure:
• Audit logs (also called operational logs) provide insight into the operations performed on
resources in an Azure subscription. Every Azure resource within a virtual datacenter produces
audit logs.
• Azure diagnostic logs are generated by a resource and provide rich, frequent data about the
operation of that resource. The content of these logs varies by resource type.
On-premises
OMS Log
Operations Management
Analytics
Suite workspace
Azure blob
OMS
repository
NSG NSG
Application
Gateway
Virtual
machine
Figure 10. Virtual datacenter activities are continuously logged and monitored. Logging data is imported into
OMS and is also available for use in on-premises log analytics.
Contoso wants to extend the standard monitoring framework already used for their on-premises
systems and integrate the logs generated by virtual datacenter resources. If they want to keep
logging activities in the cloud, they can use OMS. Its log analyzer helps to collect, correlate,
search, and act on log and performance data generated by operating systems, applications, and
infrastructure cloud components.
See also
Azure Logging and Auditing
29
Azure Virtual Datacenter
Tool Description
30
Azure Virtual Datacenter
See also
Azure Operational Security best practices
Best practices for creating management solutions in Operations Management Suite (OMS)
Area Decisions
31
Azure Virtual Datacenter
datacenter
When complete, the Contoso virtual datacenter is ready to deploy workloads accessible only
through the central IT infrastructure, and subject to the access controls, policy, and networking
configuration enforced by Contoso’s central IT management team.
Figure 11. Final Contoso architecture with major components and traffic flows (on-premises to workload,
workload to on-premises, on-premises to management, and DNS).
32
Azure Virtual Datacenter
PART 3
The cloud datacenter transformation
33
Azure Virtual Datacenter
Figure 12: Enterprise IT and governance should be balanced against developer agility in a successful cloud
datacenter transformation.
Enterprise IT wants their cloud-based applications to be governed by many of the same policies
as their on-premises implementations. Even born-in-the-cloud applications, especially multitenant
PaaS offerings and SaaS application such as Office 365, need to have well defined isolation
boundaries and role-based policy enforcement. The Azure Virtual Datacenter model begins to
give enterprise IT the controls they need to enforce governance.
34
Azure Virtual Datacenter
Figure 13: Virtual datacenter patterns showing the range of platform services used. On one end, IaaS virtual
machines use only on-premises data; on the other, the full use of cloud-based PaaS services.
The first pattern is usually called a partial lift and shift, or strictly IaaS, where no multitenant
platform services are consumed. In this pattern, the virtual machines processing data are hosted
in the cloud, but all data is stored on-premises and accessed over ExpressRoute. Even Active
Directory services are located on-premises. This pattern includes scenarios where the data can
flow to the cloud in an anonymized or tokenized fashion. Such scenarios remove much of the
data sensitivity but severely limit what types of processing that can be done with that data.
The second pattern involves a limited integration of IaaS resources to build a basic cloud
infrastructure. For example, virtual machines may make use of essential PaaS services such as
Storage or Key Vault. Some additional services such as Azure SQL Database may also be
consumed to provide cost and management savings.
The third pattern fully uses PaaS services to construct a complete solution such as an Azure data
analytics pipeline (IoT Hub, Azure Machine Learning, HDInsight, Azure Data Lake).
Future editions of this model will show how additional elements can be used to achieve isolation
of more complex scenarios, such as orchestrator based workloads, or workloads composed of
platform services. Future models will also support secure Internet access directly from the virtual
datacenter.
35
Azure Virtual Datacenter
To learn more about Virtual Datacenter Automation, contact your Microsoft Account Team and
visit the Azure Architecture reference site.
Azure Active Directory Provides authentication and access control capabilities for Azure-based
resources. Azure AD is a cloud-based, multitenant directory and identity service. Azure AD
supports integration with on-premises identity providers and supports RBAC and just in time
access controls. Azure AD supports MFA using phone, text, mobile app, or custom authentication
methods using an oAuth token. A good practice is to enable MFA for your various IT roles and
application users.
Azure Key Vault The primary mechanism for storing, managing, and accessing cryptographic
keys on the Azure platform. Key Vault is a centralized service that provides management for
certificates, connection strings, secrets, and cryptographic keys used to encrypt storage assets and
secure PaaS services or individual applications. With Key Vault, you can use cryptographic keys
generated and managed by Microsoft, or custom keys managed by your organization and
uploaded to Key Vault. It supports a virtual HSM container service that provides access to physical
HSMs.
Azure Resource Manager Provides the mechanism for provisioning and managing resources
within a virtual datacenter. Resource Manager and related APIs allow you to implement policies
enforcing data residency when creating resources.
Disaster recovery A process used to help recover data and ensure business continuity in the
case of a major technology infrastructure and systems failure.
Homomorphic Encryption (HE) Refers to a special type of encryption technique that allows for
computations to be done on encrypted data, without requiring access to a secret (decryption)
key. The results of the computations remain encrypted and can be revealed only by the owner of
the secret key.
Load balancer In Azure, a Layer 4 (TCP, UDP) load balancer that distributes incoming traffic
among resources in your virtual network.
MFA Multi-Factor Authentication.
Network security group (NSG) Simple, stateful packet inspection devices that allow the creation
of allow/deny rules for network traffic. An NSG can allow or deny traffic to and from a single IP
address, to and from multiple IP addresses, or even to and from entire subnets. When an NSG is
associated with a subnet, the rules apply to all resources connected to the subnet. Traffic can
further be restricted by also associating additional NSGs to individual virtual machines.
Network virtual appliance (NVA) A dedicated and preconfigured virtual machine image
designed to handle the type of networking and security functionality traditionally handled by
gateways, routers, and firewall devices.
Resource group A collection of Azure resources, such as virtual machines, services, and
networking devices within a subscription. You can apply access control and security policies at the
resource group level, rather than managing individual resources.
Secure Boot An upcoming feature in Azure. Secure Boot will make sure each component loaded
during the boot process is digitally signed and validated.
Shielded virtual machine An upcoming feature in Azure designed to protect virtual machines
from compromised or malicious administrators. Shielded virtual machines encrypt the disk and
state of virtual machines so only the virtual machine or tenant administrators can access it.
Shielded virtual machines use a virtual TPM module, are encrypted using BitLocker, and only run
on approved hosts.
User-defined route (UDR) Custom route tables you create within your virtual network. UDRs are
attached to subnets within your virtual networks and establish next-hop and IP forwarding rules
for any traffic leaving that subnet.
Virtual machine (VM) An on-demand, scalable Azure compute resource. A virtual machine can
run Windows or Linux based workloads in the Azure virtual environment.
Virtual network A logical representation of your network in the cloud. On the Azure platform,
virtual networks act as a cloud analog to physical networks on-premises. Virtual networks also
provide the default isolation boundary between resources on the platform. Sometimes called a
VNet.
VM Virtual machine.
37
Azure Virtual Datacenter
VPN gateway A type of network connection that sends encrypted traffic across a shared or
public network. The Azure VPN Gateway service connects your on-premises networks to Azure
through site-to-site VPNs, similar to the way you set up and connect to a remote branch office.
Connectivity uses the industry-standard protocols, Internet Protocol Security (IPsec) and Internet
Key Exchange (IKE).
• Red Teaming: Using Cutting-Edge Threat Simulation to Harden the Microsoft Enterprise
Cloud: https://azure.microsoft.com/en-us/blog/red-teaming-using-cutting-edge-threat-
simulation-to-harden-the-microsoft-enterprise-cloud/
38
Azure Virtual Datacenter
Encryption
• Encryption in the Microsoft Cloud: https://www.microsoft.com/en-
us/download/details.aspx?id=55848
• Azure Disk Encryption for Windows and Linux IaaS VMs: https://docs.microsoft.com/en-
us/azure/security/azure-security-disk-encryption
• How to generate and transfer HSM-protected keys for Azure Key Vault:
https://docs.microsoft.com/en-us/azure/key-vault/key-vault-hsm-protected-keys
Virtual networking
• Microsoft Azure Virtual Data Center (VNet-focused): https://docs.microsoft.com/en-
us/azure/networking/networking-virtual-datacenter
• Announcing Virtual Network integration for Azure Storage and Azure SQL:
https://azure.microsoft.com/en-us/blog/announcing-virtual-network-integration-for-azure-
storage-and-azure-sql/
40
Azure Virtual Datacenter
Operations
• Azure Operational Security best practices: https://docs.microsoft.com/en-
us/azure/security/azure-operational-security-best-practices
41