Security and Network Security Flashcards
Azure Security Center
Azure Security Center can help to keep up best practices, providing steps to take to keep resources secure. Azure Security Center offers two tiers of services: Free tier and Azure Defender tier
Key Vault
Azure Key Vault provides a secure way to store secrets, keys, and certificates. Once an item is stored in key vault, security policies that define which users, applications can access items.
A common use scenario for Key Vault is to store encryption keys for VMs. Whole disks of VMs can be encrypted and decrypted using Key Vault
Azure Sentinel
Azure Sentinel is designed for implement security process SOAR (Security Orchestration, Automation, and Response) or SIEM (Security Information and Event Management)
Azure Dedicated Host
Azure Dedicated Host provide a solution to run VMs on dedicated host computers where there is no usage of other customers on such host computers. Azure Dedicated Host helps to solve issues for companies with strict compliance rules.
Free tier
The free tier provides general assessment and recommendations for securing Azure resources, provide secure score overall security of resources
Azure Defender tier
The Azure Defender tier add functionality for securing VMs, applications and networks. It add features like advanced threat detection, analysis from Microsoft Threat Intelligence, abilities to manage the regulatory compliance of Azure resources, and Microsoft Defender for end points of servers. Price of Azure Defender tier is calculated after hours.
Defense in depth
Defense in depth is often referred to as the “castle approach”, in which network security is protected by multiple layers.
Network Security Group
Azure Firewall
Azure DDoS Protection
Inbound Security Rule
Rules that allow traffic into subnets from address spaces of other virtual network
Security Rule
A Security Rule can be associated with subnets or Network Interfaces used by a VM.
Flow Record
Outbound security rules are not always required for each Inbound security rule. Network Security Group(NSG) maintain a flow record that store state of connection, and NSG will allow traffic that corresponds to that flow record without any explicit rule.
Flow records will automatically invalid once traffic stops flowing for a few minutes