Design and Implement Data Security Flashcards

1
Q

Describe Transparent Data Encryption (TDE) the services that use it.

A

TDE protects against the threat of malicious offline activity by encrypting data rest.

TDE is used for

  1. SQL Database: Enabled automatically for all new, must be manually enabled for older DBs.
  2. SQL Managed Instance: Enabled at the instance level and newly created DBs.
  3. Azure Synapse Analytics: Must be manually enabled.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Shared Access Signatures (SAS) and how they are used.

A

SAS’ provide secure delegated access to resources in your storage account by defining 1) what resources the client may access, 2) what permissions they have to those resources and 3) how long the SAS is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Role Based Access Control (RBAC) and it is used.

A

RBAC is used to manage who has access to Azure resources (Authentication) and what they can do with those resources and what areas they have access to (Authorization & Permissions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In regards to data security on Azure, what does CIA stand for?

A

Confidentiality, Integrity, Availability.
Confidentiality: least privilege.
Integrity: data integrity with hashing.
Availability: Protection against availability loss (ie DDoS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main steps required to utilize SAS?

A
  1. End device accesses a Provider Service to Authenticate.
  2. Once Authenticated, a URI is generated based on Auth Info.
  3. The end device can then access a Microsoft Azure Service based on the generated URI.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which environments have the encrypting data at rest service available? Paas, IaaS, Saas, or all of the above?

A

All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 3 types of SAS are there?

A

User delegation SAS
Service SAS.
Account SAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the Access Control model for Data Lake Storage Gen 2

A

Uses these 4 authorization mechanisms:

  1. Shared Key Authorization
  2. Shared Access Signature (SAS) Authorization
  3. Role-based Access Control (RBAC) or AD in this case
  4. Access Control Lists (ACLs)

Shared Key and SAS authorization grants access to a user (or application) without requiring them to have an identity in Azure Active Directory (Azure AD). With these two forms of authentication, Azure RBAC and ACLs have no effect.

Azure RBAC and ACL both require the user (or application) to have an identity in Azure AD. Azure RBAC lets you grant “coarse-grain” access to storage account data, such as read or write access to all of the data in a storage account, while ACLs let you grant “fine-grained” access, such as write access to a specific directory or file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TDE is auto-enabled on many Azure big data solutions. True or false?

A

True. Although TDE is auto-enabled on most Azure big data solutions it is something that should always be considered and checked as part of Defense in Depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly