Unit 3
Unit 3
Trust
Amrish khari, Assistant Professor
Unit-3
• Operations
• Applications
• Storage
• Networking
• Compute and Identity
Azure Secure Operations
Microsoft Sentinel
Microsoft Sentinel is a scalable, cloud-native, security information and event
management (SIEM) and security orchestration, automation, and response (SOAR)
solution. Microsoft Sentinel delivers intelligent security analytics and threat
intelligence across the enterprise, providing a single solution for attack detection,
threat visibility, proactive hunting, and threat response.
Operations Contd..
Microsoft Defender for Cloud
Microsoft Defender for Cloud helps you prevent, detect, and respond to threats with
increased visibility into and control over the security of your Azure resources. It provides
integrated security monitoring and policy management across your Azure subscriptions,
helps detect threats that might otherwise go unnoticed, and works with a broad ecosystem of
security solutions.
In addition, Defender for Cloud helps with security operations by providing you a single
dashboard that surfaces alerts and recommendations that can be acted upon immediately.
Often, you can remediate issues with a single click within the Defender for Cloud console.
Application Insights
Azure Monitor
Azure Monitor offers visualization, query, routing, alerting, auto scale, and
automation on data both from the Azure subscription (Activity Log) and each
individual Azure resource (Resource Logs). You can use Azure Monitor to alert you
on security-related events that are generated in Azure logs.
Application Insights contd..
Azure Monitor logs
Azure Monitor logs – Provides an IT management solution for both on-premises and
third-party cloud-based infrastructure (such as AWS) in addition to Azure resources.
Data from Azure Monitor can be routed directly to Azure Monitor logs so you can see
metrics and logs for your entire environment in one place.
Azure Monitor logs can be a useful tool in forensic and other security analysis, as the
tool enables you to quickly search through large amounts of security-related entries
with a flexible query approach. In addition, on-premises firewall and proxy logs can
be exported into Azure and made available for analysis using Azure Monitor logs.
Azure Storage Security
Azure role-based access control (Azure RBAC)
You can secure your storage account with Azure role-based access control (Azure
RBAC). Restricting access based on the need to know and least privilege security
principles is imperative for organizations that want to enforce Security policies for
data access. These access rights are granted by assigning the appropriate Azure role to
groups and applications at a certain scope. You can use Azure built-in roles, such as
Storage Account Contributor, to assign privileges to users. Access to the storage keys
for a storage account using the Azure Resource Manager model can be controlled
through Azure RBAC.
Azure Storage Security
Encryption in Transit
Encryption in transit is a mechanism of protecting data when it is transmitted across
networks. With Azure Storage, you can secure data using:
Transport-level encryption, such as HTTPS when you transfer data into or out of
Azure Storage.
Wire encryption, such as SMB 3.0 encryption for Azure File shares.
Client-side encryption, to encrypt the data before it is transferred into storage and to
decrypt the data after it is transferred out of storage.
Azure Storage Security
Encryption at rest
For many organizations, data encryption at rest is a mandatory step towards data privacy,
compliance, and data sovereignty. There are three Azure storage security features that provide
encryption of data that is “at rest”:
Storage Service Encryption allows you to request that the storage service automatically encrypt
data when writing it to Azure Storage.
Client-side Encryption also provides the feature of encryption at rest.
Azure Disk Encryption for Linux VMs and Azure Disk Encryption for Windows VMs allows
you to encrypt the OS disks and data disks used by an IaaS virtual machine.
Azure Networking Security
Network Layer Controls
Network access control is the act of limiting connectivity to and from specific devices
or subnets and represents the core of network security. The goal of network access
control is to make sure that your virtual machines and services are accessible to only
users and devices to which you want them accessible.
Azure Networking Security Contd..
Azure Firewall
Azure Firewall is a cloud-native and intelligent network firewall security service that
provides threat protection for your cloud workloads running in Azure. It's a fully stateful
firewall as a service with built-in high availability and unrestricted cloud scalability.
Azure Firewall is offered in two variants Standard and Premium. Azure Firewall
Standard provides L3-L7 filtering and threat intelligence feeds directly from Microsoft Cyber
Security. Azure Firewall Premium provides advanced capabilities include signature-based
IDPS to allow rapid detection of attacks by looking for specific patterns.
Identity and Access Management (IAM)
What is identity and access management (IAM)?
Identity Access Management gives secure access to company resources—like emails,
databases, data, and applications—to verified entities, ideally with a bare minimum of
interference. The goal is to manage access so that the right people can do their jobs and
the wrong people, like hackers, are denied entry.
With an IAM system, the organization can quickly and accurately verify a person’s
identity and that they have the necessary permissions to use the requested resource during
each access attempt.
How IAM works
There are two parts to granting secure access to an organization’s resources:
Identity management and access management.
Servers: Azure AD uses Azure AD Domain Services to manage servers that live in the
Azure cloud virtual machine environment
Data Protection in Microsoft Azure:
Azure provides a range of services and features to help protect data stored and processed
within its cloud environment. Here's how Azure addresses data protection:
Encryption: Azure offers encryption mechanisms to protect data both at rest and in transit.
Azure Storage Service Encryption (SSE) automatically encrypts data stored in Azure Blob
storage, Azure Files, and Azure Queue storage.
Access Controls: Azure Role-Based Access Control (RBAC) allows you to manage access
to Azure resources by assigning permissions to users, groups, and applications. This helps
ensure that only authorized individuals can access sensitive data.
Contd…
Network Security: Azure Virtual Network enables you to isolate and secure your Azure
resources by creating private networks and implementing network security groups (NSGs)
and Azure Firewall to control inbound and outbound traffic.
Data Compliance: Azure services adhere to various compliance standards, such as GDPR,
HIPAA, ISO/IEC 27001, and PCI DSS. Azure Compliance Manager provides tools and
documentation to assess your compliance posture and manage compliance requirements.
Backup and Disaster Recovery: Azure Backup and Azure Site Recovery enable you to
back up data and applications, and replicate workloads to Azure for disaster recovery
purposes, ensuring data availability and business continuity.
Compliance Frameworks in Microsoft Azure:
Azure aligns with a wide range of compliance standards and frameworks to help customers
meet their regulatory and industry-specific requirements. Some key compliance frameworks
include:
GDPR Compliance:The General Data Protection Regulation (GDPR) is a legal framework
that sets guidelines for the collection and processing of personal information from
individuals.
HIPAA Compliance: The Health Insurance Portability and Accountability Act of 1996
(HIPAA) is a federal law that required the creation of national standards to protect sensitive
patient health information from being disclosed without the patient's consent or knowledge.
Contd…
PCI DSS Compliance: Azure services such as Azure Key Vault, Azure Security Center, and
Azure Monitor can help organizations comply with PCI DSS requirements for securing
payment card data and environments.
ISO/IEC 27001 Compliance: Azure itself is certified against ISO/IEC 27001, and it
provides customers with a range of services and features to help build and maintain ISO/IEC
27001-compliant environments, including identity and access management, encryption, and
auditing capabilities.
Azure Governance Methodologies:
Azure Governance encompasses practices and processes for managing Azure resources
effectively, ensuring security, compliance, and cost management.
Azure Policy: Azure Policy enables you to enforce organizational standards and compliance
controls by defining and applying policies across your Azure environment. These policies
can enforce configurations, access controls, and compliance requirements.
Azure RBAC: Role-Based Access Control (RBAC) in Azure allows you to manage access
to Azure resources by granting permissions to users, groups, or applications based on their
roles and responsibilities within your organization.
Contd…
Azure Security Center: Azure Security Center provides unified security management and
advanced threat protection across hybrid cloud workloads. It helps identify and remediate
security vulnerabilities, implement security best practices, and comply with regulatory
requirements.
Azure Cost Management & Billing: Azure Cost Management + Billing provides tools and
insights to monitor, allocate, and optimize Azure spending. It helps you track resource usage,
analyze costs, and implement budgeting and cost control measures to optimize cloud
spending.
www.paruluniversity.ac.in