Architecture Flashcards
Common Attacks: Data Layer
Exposing an encryption key or using weak encryption can leave your data vulnerable
Common Attacks: Application Layer
Malicious code injection and execution are the hallmarks of application-layer attacks
Common Attacks: VM/compute layer
Malware is a common method of attacking an environment
Common Attacks: Networking Layer
Attacks through open ports, (ssh rdp)
Common Attacks: Perimeter Layer
Denial of Service
Common Attacks: Policies and access layer
Exposed credentials
Common Attacks: Physical layer
Unauthorised access to premises
Waste can show up in several ways. Lets look at a few examples
- A virtual machine that is always 90% idle
- Paying for a license included in a virtual machine when a license is already owned
- Retaining infrequently accessed data on a storage medium optimized for frequent access
- Manually repeating the build of a non-production environment
By leveraging Azure AD for SSO you’ll also have the ability to combine multiple data sources into an
intelligent security graph.
By leveraging Azure AD for SSO you’ll also have the ability to combine multiple data sources into an intelligent security graph. This security graph enables
the ability to provide threat analysis and real-time identity protection to all accounts in Azure AD, including accounts that are synchronized from your on-premises AD
Management groups are an additional hierarchical level recently introduced into the RBAC model. Management groups add the ability to
group subscriptions together and apply policy at an even higher level.
The ability to flow roles through an arbitrarily defined subscription hierarchy also allows administrators to
grant temporary access to an entire environment for authenticated users
This is an additional paid-for offering that provides oversight of role assignments, self-service, and just-in-time role activation and Azure AD & Azure resource access reviews.
Azure AD Privileged Identity Management (PIM)
What is an identity?
A thing that can be authenticated - username, application or server
What is a principal?
An identity acting with certain roles - eg sudo
What is a service principal?
an identity that is used by a service or application. Like other identities it can be assigned roles.
The creation of service principals can be a tedious process, and there are a lot of touch points that can make maintaining them difficult. What is the solution?
Managed identities for Azure resources
True or false, an Azure based VM can be given a managed identity that allows grants it the rights to stop and start other machines
True
There are two top-level types of encryption:
Symmetric and Asymmetric.
In encryption what does AES stand for
Advanced Encryption Standard
SSE automatically encrypts data in
- All Azure Storage services including Azure Managed Disks, Azure Blob storage, Azure Files, Azure Queue storage, and Azure Table storage
- Both performance tiers (Standard and Premium)
- Both deployment models (Resource Manager and classic)