AZ 500 Terms Flashcards
Azure Active Directory (Azure AD)
Definition:
Microsoft’s cloud based identity and access management service, used for managing users, groups and access to resources in Azure.
Key concepts:
Single sign on (SSO), Multi factor authentication and conditional access policies
Role Based Access Control (RBAC)
Definition:
A system for managing access to Azure resources based on user roles. These roles determine what actions users can perform.
Key concepts:
Roles like Owner, Contributor, and Reader. Roles can be assigned at different scopes such as subscription, resource group or specific resources
Azure Security Center
Definition:
A unified security management system that provides advanced threat protection across Azure workloads
Key Concepts:
Security score, security recommendations and vulnerability assessments
Network Security Groups (NSG)
Definition:
A tool used to filter network traffic to and from Azure resources within an Azure Virtual Network
Key Concepts:
Inbound and outbound rules to control traffic based on source/destination IP addresses, ports and protocols.
Azure Firewall
Definition:
A managed, cloud based network security service that protects Azure Virtual Network Resources
Key Concepts:
Stateful firewall that provides centralized control and protection over network traffic flows
Azure Key Vault
Definition:
A service for securely storing and managing cryptographic keys, secrets, and certificates
Key Concepts:
Provides encryption at rest, and integrates with services to safeguard data
Azure Policy
Definition:
A service used to create, assign and manage policies that enforce governance across Azure resources
Key Concepts:
Ensures compliance with security standards by preventing violations (like enabling encryption on storage accounts)
Azure DDoS Protection
Definition:
A service that protects Azure applications from DDoS attacks
Key Concepts:
Includes basic (default) and standard tiers, protecting against volumetric, protocol and application layer attacks
Azure Privileged Identity Management (PIM)
Definition:
A service that provides oversight of privileged roles, such as global administrator, to ensure controlled and limited user.
Key Concepts:
Just In Time Access, Approval Workflows, and monitoring of privileged roles
Azure Information Protection (AIP)
Definition:
A cloud based solution that helps organizations classify, label and protect documents and emails.
Key Concepts:
Data classification and protection based on sensitivity labels.
Azure Monitor
Definition:
A comprehensive solution for collecting, analyzing and acting on telemetry from Azure resources.
Key Concepts:
Centralized logging and monitoring with integration into security alerting systems like Azuree Security Center.
Azure Sentinel
A cloud native security information and event management (SIEM) tool that provides intelligent security analytics for enterprises.
Uses artificial intelligence to detect, prevent and respond to threats
Virtual Private Network (VPN) Gateway
A type of virtual network gateway that sends encrypted traffic between an Azure virtual network and an on premises location. This is used for hybrid cloud solutions and secure site to site or point to site VPN connections
Managed Identities
Azures service used for managing identity in Azure applications without the need to manage credentials. There are two types of managed identities, system assigned and user assigned
Encryption at rest
The process of encrypting data when it is stored, ensuring that data is inaccessible without proper key.s Azure Storage encryption, Azure SQL Database encryption (TDE) and Key Vault integrations
Conditional Access
A tool used to enforce access controls to applications and data based on conditions like user, location and device
Enforces MFA, restricts access based on device health or requires compliant devices
Just in Time VM Access
A feature in Azure Security Center that limits access to virtual machines by granting access only when needed
Reduces the attack surface by restricting the time a VM port is open
Azure Application Gateway
A web traffic load balancer that enables you to manage traffic to your web applications
This is application layer (layer 7) routing, web application firewall for protection from common threats like SQL injection and cross site scripting
Azure Log Analytics
A service in Azure Monitor that collects and analyzes log data from multiple sources which enables querying and alerting on log data for insights in resource operations and security incidents
Security Baselines
Pre configured security settings that service as recommendations or requirements for a secure environment
Baselines provided by Microsoft such as Azure Security Benchmark guide organizations in secure their workloads
Azure MFA
An authentication method that requires more than one verification method such as password and a phone based code to access resources. This helps secure user identities by requiring two or more verification methods
Service Endpoints
Extends virtual networks to Azure services by enabling private access to services like Azure storage, without the need for public IP.
This increases security by limiting traffic between resources to the Azure backbone network
Private Link and Private Endpoints
Allows you to securely connect to Azure services over a private virtual network, eliminating exposure to the public internet. This ensures that Azure resources such as storage accounts and databases are only accessible through a private endpoint
Azure Blueprint
A service that helps with deploying Azure resources according to organizational policies, ensuring compliance and governance. This automates resource configuration, policies and security controls to adhere to industry standards
Azure AD Identity Protection
A tool within Azure AD that uses machine learning to detect and remediate identity based risks. This detects suspicious user activities, such as leaked credentials and risky sign ins
Microsoft Defender for Identity
A cloud based security solution that identifies and protects against identity based attacks within your on premises Active Directory. This monitors suspicious user activity such as lateral movement and helps detect compromised identities
Microsoft Defender for Endpoint
An endpoint security platform designed to help enterprises prevent, detect, investigate and respond to advanced threats. Provides endpoint detection and response, vulnerability management and attack surface reduction
Azure Disk Encryption (ADE)
A feature that uses BitLocker (for Windows) or DM Crypt (for Linux) to encrypt operating system and data disks of VMs. This ensures data security at rest using keys stored in Azure Key Vault
Azure Storage Encryption
Automatically encrypts data at test using Microsoft managed keys or customer managed keys in Azure Storage. Data is encrypted using 256 bit AES encryption
Shared Access Signature (SAS)
A URI that grants restricted access rights to Azure Storage resources, such as blobs, queues and tables. You can specify the levels of access, time constraints, and IP restrictions for a SAS token.
Azure Policy Initiative
A collection of Azure policies that are grouped together to track compliance across multiple policies. This helps ensure compliance with governance standards across resources by enforcing multiple policies simultaneously
Azure Bastion
A fully managed service that provides secure and seamless RDP/SSH access to virtual machines without exposing them to the internet. This eliminates the need for a public IP on VMs and reduces security risks
Custom RBAC roles
Customizable roles in Azure RBAC that allow for precise control over what actions a user can perform on Azure
SIEM
System that provide real time analysis of security alerts generate by network hardware and applications
Security Orchestration, Automation and Response (SOAR)
Technology that enables organizations to collect security data and alerts from different sources, automate the response to low level threats and orchestrate activities across multiple teams and tools. Azure Sentinel offers SOAR capabilities to automate threat response.
Azure DDos Protection Standard
An enhanced DDoS protection service for protecting Azure applications from volumetric, protocol and application layer DDoS attacks. Provides mitigation against large scale attacks by absorbing and mitigating DDoS traffic before it affects the application
Azure Application Security Groups (ASG)
Logical groups of VMs used to simplify the management of network security rules in Azure NSGs. This reduces complexity in NSG rules by grouping VMs based on application functions or tiers
Azure SQL Database Auditing
A feature that tracks database activities and writes audit logs to an audit log destination such as a storage account or Log Analytics. This helps in maintaining compliance and detecting security violations or unusual database activity
Network Virtual Appliances (NVA)
Pre configured network solutions deployed in Azure as VMs, used to control network traffic, inspect traffic for malware or set up secure networking environments. This includes firewalls load balances and VPN gateways deployed in a virtual network
Microsoft Cloud App Security (MCAS)
A Cloud Access Security Broker (CASB) that protects your cloud apps by providing visibility, control over data movement and sophisticated analytics to identify and combat cyber threats. MCAS monitors and manages the security of cloud applications and enforces security policies
Azure Dedicated Hosts
A service that provides physical servers that host one or more Azure virtual machines, offering isolation from other customer VMs. This ensures full control over compliance and regulatory requirements, especially for workloads with strict compliance needs
Azure Security Benchmark
A collection of best practices and recommendations for securing Azure services, aligned with common compliance frameworks. This helps establish a secure foundation by guiding the implementation of security controls
Azure SQL Always Encrypted
A feature that encrypts sensitive data inside databases so that it is encrypted both in rest and in use, protecting it from high privileged users. Data remains encrypted throughout the lifecycle and the keys are managed separately in Azure Key Vault
Azure Policy Exemptions
A configuration that allows specific resources to be exempt from policy evaluation without removing the policy itself. This is useful for managing compliance in special cases where resources need temporary exemptions
Azure Disk Encryption Sets
A resource for managing encryption keys across multiple disks in Azure virtual machines. Allows for uniform encryption policies across different VMs by centralizing key management
Azure Resource Locks
Locks that prevent accidental deletion or modification of critical Azure resources. Two types of locks are CanNotDelete (prevents deletion) and ReadOnly (prevents modification)
Azure Automation
A service that allows you to automate repetitive tasks like patching, deployment and configuration management . This is used for automating security related tasks like updating VMs and monitoring compliance.
Azure Site Recovery (ASR)
A disaster recovery service that replicates workloads running on VMs to secondary locations to ensure business continuity. This protects from site outages and ensures fail-over to a secondary location
Azure Security Center Regulatory Compliance
A dashboard in Azure Security Center that provides insights in your organizations compliance posture . This assesses your environment against regulatory standards like ISO, NIST and CIS
Azure Availability Zones
Physically separate data centers within an Azure region that provide high availability for workloads. This protects from data center failures by distributing services across different zones.
Azure ExpressRoute
A service that enables private connections between Azure data centers and on premises infrastructure. This provides a secure, fast, and reliable connection for hybrid cloud architectures.
Azure App Service Environments (ASE)
A fully isolated and dedicated environment for securely running Azure App Service apps at scale.THis is used for running mission critical applications with high security and compliance requirements
Azure Policy Compliance State
The compliance state of Azure resources as evaluated against the assigned Azure polices. This helps track whether resources comply with organizational policies and security standards
Azure Front Door
A scalable and secure entry point for global applications that provides routing, load balancing and security. This supports SLL offloading, Web Application Firewall and DDoS protection
Azure Network Watcher
A network performance monitoring and diagnostics tools for Azure Virtual Networks. This provides tools for packet capture, network diagnostics and connection monitoring
Azure Backup
A service that provides scalable solutions for backing up data and virtual machines in Azure. This protects data from accidental deletion, corruption or ransomware attacks
Azure Identity Risk Policies
Policies in Azure AD Identity Protection that can automatically respond to detected risks by enforcing access controls like MFA. This automates remediation of risky users, sign ins and vulnerabilities
Managed Service Identity (MSI)
A feature that provides Azure services with an automatically managed identity in Azure AD. This eliminates the need to manage credentials in applications that access Azure resources
Azure Log Analytics Workspaces
A workspace that allows you to collect and analyze log data from different Azure resources and on premises systems. This is used for security monitoring, troubleshooting and alerting
Azure Devps Security
Security features and practices to secure the Azure DevOps environment, including repository protection and pipeline security. This protects the software development lifecycle with RBAC, auditing and secure code practices