CS-900 Microsoft Security Fundamentals Flashcards
Describe the shared responsibility model
Identifies which security tasks are handled by the cloud provider, and which security tasks are handled by you, the customer. The responsibilities vary depending on where the workload is hosted. It makes responsibilities clear.
Defense in Depth
Layered approach to security, rather than relying on a single perimeter. A defense in-depth strategy uses a series of mechanisms to slow the advance of an attack. Each layer provides protection so that, if one layer is breached, a subsequent layer will prevent an attacker getting unauthorized access to data.
Zero Trust Model
Assumes everything is on an open and untrusted network, even resources behind the firewalls of the corporate network. The Zero Trust model operates on the principle of “trust no one, verify everything.”
Encryption
Is the process of making data unreadable and unusable to unauthorized viewers. To use or read encrypted data, it must be decrypted, which requires the use of a secret key. There are two top-level types of encryptions: symmetric and asymmetric.
Hashing
Uses an algorithm to convert text to a unique fixed-length value called a hash. Each time the same text is hashed using the same algorithm, the same hash value is produced.
Salted
Refers to adding a fixed-length random value to the input of hash functions to create unique hashes for same input.
Data Compliance
Regulations to help protect and govern the use of data. From personal and financial information to data protection and
privacy, organizations can be accountable for meeting dozens of regulations to be compliant
Data residency
Governs the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally. These regulations can differ significantly depending on jurisdiction.
Data sovereignty
The concept that data, particularly personal data, is subject to the laws and regulations of the country/region in which it’s physically collected, held, or processed. Can be subject to laws from different countries/regions if processing, storage or collection are done in different locations
Data privacy
Providing notice and being transparent about the collection, processing, use, and sharing of personal data are fundamental principles of privacy laws and regulations
Personal Data or PII
Any data that is directly linked or indirectly linkable back to a person
Azure Policy
Enforce standards and assess compliance across your organization no matter who you are, evaluates all
resources in Azure and Arc enabled resources
Azure Role Based Access Control (RBAC)
Manages who has access to Azure resources, what they can do with those resources,
and what areas they can access
Data Catalog
Find relevant data using a search experience with filters based on various lenses like glossary terms, classifications, sensitivity labels, and more
Data Estate Insights
Gives a bird’s eye view and at a glance understanding of what data is actively scanned, where sensitive data is, and how it moves
Data Map
Scanning registered data sources is able to capture metadata about enterprise data, to identify and classify sensitive data
Authentication (AuthN)
Process of proving that a person is who they claim to be.
Authorization (AuthZ)
What that person can see and touch and where they can go (Permissions).
Identity
Set of things that define or characterize someone or something. (Username and password)
4 Pillars:
Administration – creation and management/governance of identities for users, devices, and services
Authentication – sufficient proof that you are who you claim to be
Authorization – level of access granted to entity
Auditing – tracking of who does what, when, where, and how (in-depth reporting)
Identity Provider
Creates, maintains, and manages while providing authentication, authorization, and auditing
Active Directory
Stores info about members of the domain including devices and users, verifies their credentials and defines their access rights
Federation
Enables the access of services across organizational or domain boundaries by establishing trust relationships between the respective domain’s identity provider.
Azure AD Free
You can administer users, create groups, sync with on premise AD, create basic reports, config self service passwords, and enable single sign on
Office 365 Apps – Everything from free plus self-service password reset, device writeback (2-way access with on prem).
Everything from free plus self-service password reset, device writeback (2-way access with on premise).
Azure AD Premium 1
Everything from Free and Office 365 plus advanced admin, dynamic groups, self-service group management, Microsoft IAM, and cloud write back.
Azure Ad Premium 2
All of the above plus Azure ID protection (risked based conditional access to apps), Privileged ID Management (discover, restrict, and monitor) admins and their access
Users
Representations of something that is managed in Azure (employees, guests).
Service Principal
Identity for an application, register with Azure AD, enables AuthN and AuthZ
Managed Identities
Type of service principal that are automatically managed in Azure AD. Eliminate the need for developers to manage credentials
System Assigned Identity
When you enable managed identity on a service instance. Tied to lifecycle and is deleted when resource is deleted.
User Assigned Identity– manage as a stand alone can be assigned to 1 or more instances of a service.
Manage as a stand alone can be assigned to 1 or more instances of a service.
Azure AD Registered Devices
Provides users with support for bring your own device (BYOD) or mobile device.
Azure AD Joined
Device joined to Azure AD through an organizational account, which is then used to sign into the device. Azure AD joined devices are generally owned by the organization
Hybrid Azure AD Joined
Existing on-premises Active Directory implementations can benefit from the functionality provided by Azure AD. The devices are joined to your on-premises Active Directory and Azure AD requiring organizational account to sign into the device
External Identities
Set of capabilities that enable organizations to allow access to external users, such as customers or partners
B2B
Allows you to share your organization’s applications and services with guest users from other organizations, while maintaining control over your own data
B2C
Customer identity access management (CIAM) solution. allows external users to sign in with their preferred social, enterprise, or local account identities
Hybrid Identity
Identity solutions span on-premises and cloud-based capabilities and create a common user identity for authentication and authorization to all resources, regardless of location
Azure AD Password hash synchronization
Simplest way to enable authentication for on-premises directory objects in Azure AD
Azure AD pass through authentication
Allows users to sign into both on-premises and cloud-based applications using the same passwords
Federated authentication
Azure AD hands off the authentication process to a separate trusted authentication system, to validate the user’s password
Windows Hello
Replaces passwords with strong two-factor authentication on devices. Key or certificate tied to a device and something that the person knows (a PIN) or something that the person is (biometrics)
Fido2
Open standard for password less authentication uses an external security key, or a platform key built into a device
Azure AD Password Protection
Detects, and blocks known weak passwords and their variants, and can also block other weak terms that are specific to your organization
Protecting against password spray
Password spray attacks submit only a few of the known weakest passwords against each of the accounts in an enterprise
Hybrid security
Component installed in the on-premises environment receives the global banned password list and custom password protection policies from Azure AD
Conditional Access
Policies that provides an extra layer of security before allowing authenticated users to access data or other assets.
Conditional Access Signals
User or group membership, Named Location, Device, Application, Real time sign in risk detection, Cloud apps or actions, User risk
Access Controls
Decisions to grant access, block access, that require extra verification (MFA, Device or App is Compliant, etc.)
Sessions controls
Enable limited experiences within specific cloud apps. (Blocking copy, paste, cut, print, etc.…)
Built-in-Roles
Pre-Configured and can not be altered in anyway (Global Admin, User Admin, Billing Admin)
Custom Roles
Allows you to choose permissions from a list of available permissions in the system
Scope
Set of Azure AD resources the role member has access to.
Azure AD Specific
Grant permissions to manage resources with Azure only
Azure AD Service Specific
For major Microsoft 365 services Azure has built in roles that grant permissions to manage those services
Azure AD Cross Service
Roles that span across services like security admin and compliance admin
Azure AD Cross Service
Roles that span across services like security admin and compliance admin
Azure AD RBAC
Control access to Azure AD resources like groups, users, and apps
Azure RBAC
Control access to Azure resource like virtual machines or storage
Identity Governance
Gives the ability to control the identity lifecycle, access lifecycle, and secure privileged access for admins
Identity Lifecycle
No access (Pre-Employment), Join (Hired), Move (Role change), Leave (retirement). Updating access to what a user needs access to at each point in the journey
Privileged access Lifecycle
Monitoring of admin access to reduce risk of misuse
Entitlement Management
Enables managing identity and access at scale by automating access request workflows, access assignments, reviews, and expirations