Azure Security and Privacy Concepts Flashcards
Authentication vs Authorization
Authentication - The act of proving who or what something is
Authorization - Granting the correct level of access to a resource or service
Azure Active Directory (Azure AD)
Sits at the heart of Authentication in the Microsoft Cloud
Azure AD Functionality
Provides: User Management Application Integration Single Sign on Integration with other directory services
Azure AD single sign-on
One of the key features of Azure AD
Users should be asked for their credentials once
Can integrate with Microsoft provided and 3rd party applications
Application integration includes the ability to provision users and assign levels of access
Azure AD Conditional Access
Control access to apps no matter where our users are
We create conditional access policies (if-then statements)
Signals are used to make decisions
IP location information
risk analysis
device information
Conditional Access decisions
Block Access
Grant Access
Azure Role Based Access Control (RBAC)
Tool used to provide shared access
RBAC - Roles
Roles allow you to group together sets of permissions
We can make users or groups members of roles
Members of roles inherit all the permissions assigned to the role
RBAC - Three Built-in Roles
Owner - manage everything including access to resources
Contributor - manage everything EXCEPT granting access to resources
Reader - view everything but not make changes
RBAC Custom Roles
Use Built-in roles first, if unsuitable define custom roles
Always follow principal of least privilege
Resource Locks
Override permissions at various scopes.
subscription locks
group locks
resource locks
Locks are inherited by child resources
Types of Azure Locks
ReadOnly
authorized users that have permission to view the resource are able to view but cannot update or delete
CanNotDelete
authorized users that have permission to view and modify the resource cannot delete the resource
Azure Tags
Key Value pairs assigned to resources
Tags can be used to
enforce security requirements
control costs
deploy software
Azure Policy
is a collection of rules
each policy is assigned to a scope
Azure Initiatives
a collection of policies
initiatives are assigned to a scope (i.e., resource group)
Built-in Policies (types)
Storage accounts Resource types Allowed locations Enforce tags Virtual machine SKUs
Azure Blueprints
A way of orchestrating the deployment of resource templates and artifacts
Blueprints include Azure Policy and Azure Initiatives
Defining a blueprint
Resource groups can be defined and created
Azure Resource Manager (ARM) templates can be included to deploy resources
Azure policy can be included to enforce compliance
Roles can be assigned resources that blueprints have created
Azure Advisor Security Assistance
Azure advisor integrates with Azure security center
Advisor security assistance helps prevent, detect and respond to threats
Azure Network Security Groups (NSGs)
NSGs filter traffic - allow/deny in/outbound traffic
NSGs contain rules - rules are processed in order based on a number 100 (processed first) to 4096 (processed last)
Properties of NSGs
Attached to subnets or network cards
can be linked to multiples resources
are stateful
Problems with NSGs
Can become complex - containing lots of rules
Can be difficult to maintain - adding more resources may result in a need to update several network security groups
Application Security Groups
Allows us to reference a group of resources
Used as a source or destination in network security groups
Can be used in NSGs