Azure Security Concepts Flashcards
An application you are developing needs access to a resource such as CosmosDb Blob storage or Service Bus.
The connection strings are stored in an Azure Key Vault as a Secret key value
To configure access to the Key Vault , what permissions will you need to assign to the App Identity
You will need the Read permission to read the secret by name.
The reference material often combines this with the List permission to access the secrets name.
Use Managed Identity For Azure App Services to create an identity for the App to allow your code access
You should NOT allow the app code to store the access key and password for the whole KeyVault (principle) - this means the credentials are visible in code.
Be aware that this solution allows access to all of the secrets in the key vault - if you just want to access the connection string then you should consider using Azure Key Vault Configuration Provider
https: //docs.microsoft.com/en-us/azure/app-service/overview-managed-identity?tabs=dotnet
https: //docs.microsoft.com/en-us/aspnet/core/security/key-vault-configuration?view=aspnetcore-5.0
True Or False
In Active Directory - An identity is always a User account on the system, with a username and password
False
An identity is just a thing that can be authenticated.
Obviously, this includes users with a user name and password, but it can also include apps or other servers, which might authenticate with secret keys or certificates.
In Azure Active Directroy - What is a Principle?
A principal is an identity acting with certain roles or claims. Usually, it is not useful to consider identity and principal separately, but think of using ‘sudo’ on a Bash prompt in Linux or on Windows using “run as Administrator.” In both those cases, you are still logged in as the same identity as before, but you’ve changed the role under which you are executing.
Groups are often also considered principals because they can have rights assigned.
In Azure Active Directroy - What is a Service Principle?
A service principal is an identity that is used by a service or app. And like other identities, it can be assigned roles.
What are the benefits and features of Managed identities for Azure services
The creation of service principals can be a tedious process, and there are a lot of touch points that can make maintaining them difficult. Managed identities for Azure services are much easier and will do most of the work for you.
A managed identity can be instantly created for any Azure service that supports it.
When you create a managed identity for a service, you are creating an account on your organization’s Azure AD (a specific organization’s Azure AD instance is known as an “Azure AD Tenant”).
The Azure infrastructure will automatically take care of authenticating the service and managing the account.
You can then use that account like any other Azure AD account, including allowing the authenticated service secure access of other Azure resources.
What is meant by the following security concept:
Tenant
Tenant is the location where Principals and Identities are stored
When you create a managed identity for a service, you are creating an account on your organization’s Azure AD (a specific organization’s Azure AD instance is known as an “Azure AD Tenant”)
What is meant by the following security concept:
Role
Roles are sets of permissions, like “Read-only” or “Contributor”, that users can be granted to access an Azure service instance.
Roles can be granted at the individual service instance level, but they also flow down the Azure Resource Manager hierarchy.
What is meant by the following security concept:
Identities
Identities include users with a user name and password, but it can also include apps or other servers, which might authenticate with secret keys or certificates.
Identities are mapped to roles directly or through group membership. Separating security principals, access permissions, and resources provides simple access management and fine-grained control.
Administrators are able to ensure the minimum necessary permissions are granted.
Certificates are used in Azure for two primary purposes and are given a specific designation based on their intended use.
What are the two types of certificate?
Certificates are used in Azure for two primary purposes and are given a specific designation based on their intended use.
Service certificates are used for cloud services
Management certificates are used for authenticating with the management API
True or False
Management certificates enable Secure communication with clients over HTTPS thourgh browsers and API clients
False
Management certificates are used for authenticating with the management API
Service certificates are used for cloud services and enable secure communication to and from the service. For example, if you deploy a web site, you would want to supply a certificate that can authenticate an exposed HTTPS endpoint
They are assigned to a deployment in the service definition file.
True or False
Service certificates can be stored in a KeyVault
True
You can create certificates in Key Vault, or import existing certificates
You can securely store and manage certificates without interaction with private key material.
You can create a policy that directs Key Vault to manage the life cycle of a certificate.
You can provide contact information for notification about life-cycle events of expiration and renewal of certificate.
You can automatically renew certificates with selected issuers - Key Vault partner x509 certificate providers / certificate authorities.
You want to store certificates in Azure to centrally manage them for your services. Which Azure service should you use?
A: AIP
B: Azure AD
C: Azure Key Vault
D: Azure ATP
Azure Key Vault is the correct answer, because it is a centralized cloud service for storing application secrets, referred to as a secret store.
AIP is a cloud-based solution that helps an organization classify, and optionally, protect its documents and emails by applying labels.
Azure AD is Microsoft’s cloud-based identity and access management service that helps employees of an organization sign-in and access resources.
Azure ATP is a cloud-based security solution that identifies, detects, and helps organizations investigate advanced threats, compromised identities, and malicious insider actions directed at that organization.
Which of these options helps you most easily disable an account when an employee leaves your company?
A: Enforce multi-factor authentication (MFA)
B: Monitor sign-on attempts
C: Use single sign-on (SSO)
Use single sign-on (SSO)
SSO centralizes user identity, so you can disable an inactive account in a single step.
Enforce multi-factor authentication (MFA) is incorrect
While MFA provides additional security by requiring two or more elements for full authentication, it doesn’t help you disable inactive accounts.
Monitor sign-on attempts is incorrect
While monitoring can help you discover when someone attempts unauthorized access to one of your services, monitoring alone won’t help you disable inactive accounts.
Cloud security is a shared responsibility between you and your cloud provider. Which category of cloud services requires the greatest security effort on your part?
A: Infrastructure as a service (IaaS)
B: Platform as a service (PaaS)
C: Software as a service (SaaS)
Infrastructure as a service (IaaS)
At this level, the cloud provider provides physical security to compute resources. However, it’s your responsibility to patch and secure your operating systems and software, as well as configure your network to be secure
Paas is incorrect
At this level, the cloud provider handles many security concerns, more than with other categories. The cloud provider handles physical security and keeping operating systems patched and up to date.
Software as a service (SaaS) is incorrect
At this level, the cloud provider handles most security concerns for you. Your main responsibility is to provide your organization’s users with proper access to the software.
Which of these approaches is the strongest way to protect sensitive customer data?
A: Encrypt data as it sits in your database
B: Encrypt data as it travels over the network
C: Encrypt data both as it sits in your database and as it travels over the network
Encrypt data both as it sits in your database and as it travels over the network
Encrypting your data at all times, both as it sits in your database and as it travels over the network, minimizes the opportunity for an attacker to access your data in plain text.
While encrypting your data as it travels over the network (encryption in transit) is important, your data may be vulnerable as it sits in your database.
While encrypting your data as it sits in your database (encryption at rest) is important, your data may be read by others as it travels over the network between systems.
Which sentence correctly describes OpenID Connect?
A: OpenID Connect is an authentication standard.
B: OpenID Connect is an authorization standard.
C: OpenID Connect is an identity provider.
A: OpenID Connect is an authentication standard. An example of an authorization standard is OAuth 2.0.
An example of an identity provider is Azure AD.
You want users of your application to authenticate by using their accounts, which are stored in Microsoft 365. What must you do in Azure AD?
A: Register every Microsoft 365 user account in Azure AD.
B: Register the application in Azure AD.
C: Add the users to a single security group and register the group in Azure AD.
B Register the application in Azure AD.
If you want to use Azure AD as an authentication provider for an application, you must register that application in Azure AD.
A Is incorrect Only the application needs a record in Azure AD, not all the user accounts.
C is incorrect Only the application needs a record in Azure AD, not any security groups.