Design for Identity and Security Flashcards

1
Q

What license does Azure Identity Protection Require

A

Azure AD P2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Azure Identity Protection?

A

Azure Identity Protection is a cloud-based service that helps organizations detect and respond to identity-based risks and threats in real-time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What types of risk does Azure Identity Protection detect?

A

Anonymous IP address use
Atypical travel
Malware linked IP address
Unfamiliar sign-in properties
Leaked credentials
Password spray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Azure AD Conditional Access

A

Azure AD Conditional Access is a feature that allows you to enforce specific access controls and policies for users accessing your organization’s resources based on certain conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Azure AD Conditional Access work

A

Azure AD Conditional Access evaluates conditions such as user sign-in risk, device compliance, location, and application sensitivity to determine whether to allow or block access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits of using Azure AD Conditional Access?

A

Enhanced security: It provides an additional layer of protection by allowing you to control access to resources based on various factors.

Adaptive access controls: You can create policies that dynamically adjust access requirements based on real-time risk assessments.

User-friendly experience: Users can access resources from anywhere, on any device, while still adhering to your organization’s security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some examples of scenarios where Azure AD Conditional Access can be used?

A

Requiring multi-factor authentication (MFA) for high-risk sign-in attempts.

Blocking access from unmanaged devices.

Allowing access only from specific IP ranges or locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the key features of Azure Identity Protection?

A

Risk detection: It continuously analyzes user behavior, sign-in events, and device information to identify potential risks and anomalies.

Risk-based policies: You can create policies that trigger specific actions or require additional authentication based on risk levels.

Real-time notifications: It provides alerts and notifications to security administrators for immediate action.

Investigative experience: It offers tools and reports to investigate and remediate identity-related incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does Azure Identity Protection work?

A

It leverages machine learning algorithms and Microsoft’s threat intelligence to detect and analyze suspicious activities and risky sign-in events.

It integrates with Azure AD Conditional Access to apply risk-based policies and enforce additional security measures.

It provides security reports and recommendations to help organizations understand and mitigate identity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some examples of identity risks that Azure Identity Protection can detect?

A

Password spray attacks: Detects when an attacker tries common passwords across multiple accounts to gain unauthorized access.

Impossible travel: Identifies sign-in events from geographically distant locations within a short time frame, suggesting potential account compromise.

Atypical sign-in activity: Recognizes unusual sign-in patterns, such as sign-ins at odd hours or from unknown locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the benefits of using Azure Identity Protection?

A

Enhanced security: It helps protect against identity-based attacks and unauthorized access to resources.

Proactive risk management: It enables organizations to detect and respond to identity risks in real-time, reducing the impact of potential threats.

Simplified administration: It provides a centralized interface to monitor and manage identity risks across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Azure Privileged Identity Management (PIM)?

A

Azure Privileged Identity Management is a service that helps organizations manage, control, and monitor access to privileged roles and resources in Azure Active Directory (Azure AD) and other Azure services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the key features of Azure Privileged Identity Management?

A

Just-in-time access: Users can be granted time-bound, on-demand access to privileged roles, reducing the risk of continuous access.

Privileged role assignments: Administrators can assign users to privileged roles and require approvals or justification for access.

Access reviews: Periodic reviews are conducted to ensure that users still require their assigned privileged roles.

Activity and audit logs: Detailed logs capture and record all privileged role assignments and activities for auditing and compliance purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Azure Privileged Identity Management work?

A

Administrators define eligible roles and users who can request access to these roles.

Users can request temporary access to privileged roles through an approval workflow.

Upon approval, users are granted access for a specific time window to perform privileged tasks.

Access reviews help ensure ongoing necessity and revoke access when no longer required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the benefits of using Azure Privileged Identity Management?

A

Minimized exposure: Privileged access is granted only when needed and for a limited time, reducing the risk of unauthorized access.

Accountability and auditing: Detailed logs provide visibility into privileged role assignments and activities, aiding in compliance and forensic investigations.

Streamlined access management: Administrators can centrally manage and control privileged access across Azure services.

Segregation of duties: By separating privileged roles from day-to-day roles, organizations can enforce security and reduce the risk of misuse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Azure services does Azure Privileged Identity Management support?

A

Azure Privileged Identity Management supports managing privileged access to Azure AD, Azure Resource Manager, Azure DevOps, and other Azure services.

17
Q

Is Azure Privileged Identity Management available in all Azure AD editions?

A

No, Azure Privileged Identity Management is available in Azure AD Premium P2 edition, as well as Microsoft 365 E5 and Microsoft 365 E5 Security subscriptions.

18
Q

What is Azure Key Vault?

A

Azure Key Vault is a cloud service that provides a secure and centralized location for storing and managing cryptographic keys, secrets, certificates, and other sensitive data.

19
Q

What are the key features of Azure Key Vault?

A

Key Management: It allows you to create, import, and manage cryptographic keys for encrypting and decrypting data.

Secret Management: It provides a secure storage for sensitive information such as connection strings, API keys, and passwords.

Certificate Management: It supports the management and lifecycle of X.509 certificates used for authentication and secure communication.

Access Control: It offers fine-grained access policies and integrates with Azure Active Directory for authentication and authorization.

20
Q

How does Azure Key Vault ensure security?

A

Hardware Security Modules (HSMs): Azure Key Vault uses FIPS 140-2 Level 2 validated HSMs to protect cryptographic keys and ensure their confidentiality and integrity.

Key Encryption: Keys stored in Azure Key Vault are encrypted at rest and can be protected with access policies and permissions.

Auditing and Monitoring: Azure Key Vault logs all access and usage events, providing visibility into key operations and potential security threats.

21
Q

How can Azure Key Vault be used?

A

Secure Application Secrets: Developers can store sensitive information, such as database connection strings and API keys, securely in Azure Key Vault and access them programmatically.

Key Management: Azure Key Vault enables cryptographic operations for applications, including key generation, encryption, decryption, and signing.

Certificate Management: Organizations can centralize and manage their digital certificates for secure communication and authentication.

22
Q

Is Azure Key Vault compliant with industry standards?

A

Yes, Azure Key Vault is compliant with various industry standards and regulations, such as PCI DSS, HIPAA, ISO 27001, and GDPR.

23
Q

Can Azure Key Vault integrate with other Azure services?

A

Yes, Azure Key Vault seamlessly integrates with other Azure services like Azure Functions, Azure Virtual Machines, Azure App Service, and more, allowing secure storage and retrieval of secrets and keys.

24
Q

What is Azure Identity Governance?

A

Azure Identity Governance is a suite of services and features that helps organizations manage and govern access to resources in Azure Active Directory (Azure AD).

25
Q

What are the key features of Azure Identity Governance?

A

Access Reviews: It enables periodic reviews of user access rights to ensure compliance and identify and revoke unnecessary permissions.

Privileged Identity Management: It allows administrators to manage and control access to privileged roles and resources.

Entitlement Management: It provides a workflow-based approach to manage access to applications and resources, including user access requests and approvals.

Terms of Use: It allows organizations to present terms and conditions to users before accessing specific resources or applications.

26
Q

How does Azure Identity Governance work?

A

Access Reviews: Administrators can define review scopes, reviewers, and review frequencies. Reviewers evaluate user access and provide recommendations for access modifications.

Privileged Identity Management: Administrators can assign privileged roles, require approvals, and enforce just-in-time access for elevated privileges.

Entitlement Management: Organizations define catalogs, access packages, and workflows to streamline access request, approval, and assignment processes.

Terms of Use: Administrators can configure terms and conditions that users must accept before accessing specific resources.

27
Q

What are the benefits of using Azure Identity Governance?

A

Enhanced security: It helps ensure that user access rights align with business requirements and reduces the risk of unauthorized access.

Regulatory compliance: Access reviews and entitlement management support compliance with regulations and industry standards.

Streamlined access management: Workflow-based processes automate access requests, approvals, and assignment, reducing manual effort and improving efficiency.

Increased visibility: Azure Identity Governance provides reporting and auditing capabilities to monitor access reviews, approvals, and user entitlements.

28
Q

Is Azure Identity Governance available in all Azure AD editions?

A

No, Azure Identity Governance features are available in Azure AD Premium P2 edition, as well as Microsoft 365 E5 and Microsoft 365 E5 Security subscriptions.