Security Flashcards

1
Q

Azure Active Directory

A

Microsofts identity and access management service which helps employees sign in and access resources.

RBAC Controls access to resources E.g. O365, SaaS, Azure portal, apps in internal network, workstations.

There’s also Azure AD roles which the highest is Global Administrator

Uses Single sign on (SSO)

B2B (invite guest users from other orgs. Can then give them RBAC) and B2C (selling app, allows users to login with facebook etc)

Can transfer subscriptions to a new AAD (tenant)

Hybrid identity (sign in to local machine on prem. These credentials are extended out to cloud) - offered by product called Azure AD connect (free)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 tiers of Azure Active Directory

A
  1. Free - MFA, SSO, basic security and usage reports, self service password change, User and group mngt.
  2. Office 365 apps: Company branding, SLA, two sync between on prem and cloud
  3. Premium 1: Hybrid architecture, Advanced Group Access, Conditional Access
  4. Premium 2: Identity protection, Identity Governance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Multi Factor Authentication

A

Additional security. Use second device to confirm it’s you logging in.

MFA Server needed for authentication when supporting users located on on-prem AD only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Azure Security Center

A

Unified infrastructure security management system

Strengthens security posture of data centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Azure Key vault

A

Centralized cloud service for storing application secrets.
Can store tokens, passwords, API keys and others.
Benefits:
- Centralized store: reduces chances of being leaked.
- Strong storage with Azure.
- Monitor access and use of secrets.
- Easy integration with other apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hardware security modules (HSM)

A

Piece of hardware where keys are stored.

Stored in memory (not written to disc) therefore if it shuts down, keys are gone.

Can have multiple tenants storing keys on one module (FIPS 140-2)
More secure is a single tenant on one device (FIPS 140-3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Azure DDOS Protection
What is DDOS
What is included by default
What are the tiers of coverage offered (2)

A

Distributed Denial of Service attack - flooding website with requests.
Azure has this security built in by default.

Two tiers (Basic and Standard)
Standard starts at 3000USD per month.
Guarenteed SLAs and expert support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Azure Firewall

A

Cloud based network security service.

Restricts access to server based on originating IP address (can supply a range)

Acts as entrance for all traffic to vNet.

Enforces polciies across subscriptions and Vnets.

Uses static public IP address for Vnet

High availability built in - no additional load balancers required.

Have additional Vnet spokes. Firewall chooses how traffic distributed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Azure Information Protection (AIP)

A

Protects sensitive info such as emails, docs with encryption.

Integrated in Office apps - enables user to select Publib, Internal,

Confidential, Secret, Personal etc. in Microsoft Word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Azure Application Gateway

A

Web traffic load balancer.

Includes web application firewall

Re-routes traffic to other places based on set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion Detection (Protection) System (IDS / IPS)

A

Software that monitors network or system for malicious activity/ policy violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Azure Advanced Threat Protection (ATP)

A

Identifies, detects, and helps you investigate threats and malicious actions.

Contains several components and has it’s own portal (portal.atp.azure.com)

Azure ATP is part of Enterprise Mobility Suite E5 and has standalone license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Development Lifecycle (SDL)

A

Industry leading software assurance process.

Embedding security and privacy in software.

Building it throughout the development of a product.

Detailed Process:
Training - make sure developers build security into apps and services.
Define Security Requirements - Start planning this early in product dev.
Define Metrics and Compliance reporting - define minimum acceptable level of security and hold teams accountable to this. Use KPIs to track.
Perform threat modelling - what if scenarios.
Encryption - use but leave to the experts
Be careful with 3rd party components
Use approved tools
Create standard incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Role based access control (RBAC)

3 steps to setup

A

Controls who can do what with resources. E.g. IT can manage settings, devs have read only, admin can do everything.

Steps to apply: Who, Rule, Scope

  1. Security Principal (who e.g. User, Group, Service Principal for services requiring access, Managed Identity)
  2. Role Definition (collection of permissions. Read, Write, Delete). Can be high level (Owner) or specific (VM Reader).
  3. Scope (set of resources that role gets access to). Can set at various levels (Management Group, Subscription, Resource Group or Resources)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Resource locks

A

Can lock Subscription, RG or Resource to prevent accidental modification or deletion.

Delete - can’t delete

ReadOnly - can’t delete or update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Management Groups

A

Manage multiple subscriptions (accounts) into a hierarchical structure.

All subscriptions auto roll up into the Root.

17
Q

Encryption

what is it, two types, two methods

A

Last line of security in securing data - this is the process of making data unreadable.

Can have encrpytion at rest (where data is saved) or in transit (when it is being transferred)

Symetric
- uses same key to encrypt and decrypt

vs

Asymetric

  • uses publickey and private key pair.
  • either can encrypt but a single key can’t decrypt.
18
Q

Transport Layer Security (TLS)

A

Basis for encrypting website data in transit.

Uses certificates to encrypt/decrypt.

19
Q

Network Security Groups (NSG)

A

Control communication between resources to minimise interaction and make them more secure (based on IP addresses).

20
Q

Application Security Groups (ASG)

A

Allow us to define fine grained security policies based on applications rather than explicity IP addresses.

E.g. group VMs and base security on these groups.

Part of Network Security Groups

21
Q

User Defined Routes (UDR)

A

In subnets, Azure always creates system routes defining how traffic will flow. User Defined Routes allow you to override this.

22
Q

4 RBAC roles built into Azure by Default

A

Owner - Full access, incl right to delegate access to others.
Contributor - Can create and manage, but can’t grant access to others
Reader - Can view resources
User Access Admin - Can ONLY grant access (can’t read or edit)