4.1 Azure Security Features Flashcards

1
Q

What is Azure Security Center?

A

It helps you keep up with security best practices and provides steps to keep resources configured in a secure matter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many tiers does Azure Security Center offer?

A

Two tiers

Free tier: provides general assessment and recommendations for securing Azure resources. Also provides a security score.

Azure Defender tier: enables the securing of VMs, applications, and networks. It also has advanced threat detection, analysis from Microsoft Threat Intelligence, and enables the management of regulatory compliance. It also provides Microsoft Endpoint for servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Azure Key Vault?

A

It provides a secure way to store secrets, keys, and certificates.

Access to these secrets is controlled by security policies.

Key Vault is encrypted and Microsoft cannot see the encryption key or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two pricing tiers of Azure Key Vault?

A

Standard and Premium. There is only one difference. Premium tier stores keys in HARDWARE SECURITY MODULES (HSM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a HARDWARE SECURITY MODULE that is used in the premium version of Azure Key Vault?

A

A Hardware Security Module is hardware designed to securely store encrypted data and specializes in processing cryptographic data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Federal Information processing Standard (FIPS) 140-2 require for the storage of encryption keys?

A

It requires encryption keys to be stored in an HSM. Azure Key Vault Premium meets this requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can Azure Key Vault generate keys and certificates?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are keys accessed in Azure Key Vault?

A

Keys are accessed programmatically and retrieved each time an application needs the key rather than storing it in memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can Azure Key Vault be used for VHD disk encryption for VMs?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Azure Sentinel

A

Azure Sentinel enables you to implement SOAR and SIEM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SOAR stand for?

A

Security Orchestration, Automation, and Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does SIEM stand for?

A

Security Information and Event Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In Azure Sentinel, what does a PLAYBOOK do?

A

A Playbook is a workflow that runs in response to an alert in Sentinel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What doe PLAYBOOKS in Azure Sentinel use for their workflows?

A

Sentinel uses Logic Apps to process workflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Azure Dedicated Host?

A

Azure Dedicated Host reserves an entire physical host computer to run VMs. This is important for the security compliance of specific industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are updates applied to a host computer that is operating as an Azure Dedicated Host?

A

The person who has the dedicated host subscription chooses the timeframe of when updates are applied to the host computer.

17
Q

What are HOST GROUPs in Azure Dedicated Host?

A

Host groups support the use of availability zones and fault domains for fault tolerance.

Host groups contain Azure Dedicated Hosts and VMs that are deployed to the hosts in the group.

18
Q

What is a Network Security Group (NSG)?

A

A NSG lets you filter and apply rules to network traffic.

Azure predefined rules for NSGs to enable resources to communicate together.

NSGs can be used to control traffic into and out of a network or resource.

19
Q

What can Network Security Groups (NSG) be associated with?

A

NSGs can be associated with a subnet or network interface attached to a VM.

20
Q

How many NSGs can be assigned to each network interface or subnet?

A

Only one NSG can be assigned BUT one NSG can support up to 1000 rules.

21
Q

In a NSG, what do priority numbers range between?

A

In NSGs, priority numbers range between 100 and 4096.

22
Q

Why are rules created within a NSG assigned a priority number?

A

Assigning a PRIORITY NUMBER prevents rules from interfering with each other. The LOWEST priority number takes precedent over rules with HIGHER priority numbers.

23
Q

Why do Network Security Groups (NSGs) use a FLOW RECORD?

A

FLOW RECORDs store the state of a connection, thus allowing NSGs to allow traffic that corresponds to the flow record without an explicit rule.

This ensures that it is not necessary to create an inbound rule for every outbound rule and visa versa.

24
Q

When dealing with NSGs, what role does a SERVICE TAG play?

A

SERVICE TAGs are a special identifier that applies to the internet or specific service types within Azure.

25
Q

What is Azure Firewall?

A

Azure Firewall is a PaaS offering. It scales based on network needs thus preventing traffic spikes that cause latency or downtime of applications.

Azure Firewall is a STATEFUL firewall. Stateful firewalls stores data in memory about the state of the network connections that flow through it.

26
Q

In Azure Firewall, what is a JUMPBOX?

A

A JUMPBOX is a VM that you can remote into in order to manage other VMs in the network.

27
Q

What does a typical Azure Firewall setup look like?

A

A CENTRALIZED HUB NETWORK: Contains the Azure Firewall and a VM running the JUMPBOX. Exposes a public IP but is protected by the firewall.

SPOKE NETWORKS: Contain Azure resources. Do not expose their IP to the public.

28
Q

How do you remote into a VM that is located in a SPOKE NETWORK?

A

First you must remote into the JUMPBOX VM. From there, you remote into the VM located in the HUB NETWORK.

29
Q

After setting up an Azure Firewall, what next step should you take?

A

After setting up an Azure Firewall, you must direct Azure traffic to the firewall and configure firewall rules. These rules ensure that the firewall knows what to do with the traffic recieved.

You must also configure a ROUTE TABLE.

30
Q

What is a Route Table in Azure and what is it used for?

A

A Route table is an Azure resource that is associated with a subnet.

It contains rules (routes) that define how network traffic in the subnet is handled.

31
Q

What are the three RULE COLLECTIONS in Azure Firewall?

A

NAT RULE COLLECTION: This rule forwards traffic from the firewall to another device on the network.

NETWORK RULE COLLECTION: Allow traffic on specific IP address ranges and ports.

APPLICATION RULES COLLECTION: Allow applications to communicate across the network. Can also allow particular domain names.

32
Q

How does Azure Firewall prioritize all security rules?

A

Azure Firewall combines specific rule types into a RULE COLLECTION. The rules are prioritized from 100 to 65000. Lower numbers are higher priority

33
Q

In what order are Azure Firewall rule collections applied?

A

They are applied in order: NAT rules, Network rules, and then Application rules are applied.

34
Q

What are the two tiers of Azure DDoS Protection?

A

BASIC: protects against DDoS attacks by distributing the DDoS traffic across the entire Azure network infrastructure. Does not provide logging/reporting of DDoS mitigation, and does not provide reports.

STANDARD: combined with Azure Application Gateway, offers protection from attacks on application security. Offers logging and alerting, and provides expert help during a DDoS attack. Applies only to IPv6 public IP addresses.

35
Q

Can you add virtual networks from multiple Azure subscriptions to the same DDoS Protection plan?

A

Yes