Security, Pricing, Compliance and Trust Flashcards
Azure firewall
firewall that protects azure VPN resources.
- built in high availability
- unrestricted cloud scalability
Inbound protection for non HTTPS protocols e.g. remote desktops and file transfer (FTP)
Outbound protection, network level protection for all ports and protocols.
Network Security Group (NSG)
List of allowed and denied communication to and from network interfaces. Fully customisable and give the ability to lock down network communication to and from virtual machines.
Authentication
Who are you?
process of establishing identity of a person or service looking to access a resource.
It establishes if the person is who they say they are
Azure DDoS protection
protects azure applications by scrubbing/monitoring traffic at the azure network edge before it can impact the service’s availability.
Notifications of attacks through azure monitor metrics
protects against DoS attacks (aim to make services unavailable for users)
Authorisation
What are you allowed to do?
what level of access an authenticated person is allowed
Azure active directory
cloud based identity service, can sync with existing AD. Includes:
- authentication
- single sign on
- application management
- access controls
Azure MFA
additional security for identities by requiring 2 or more elements for authentication:
- something you know (password)
- something you possess (mobile phone)
- biometric (fingerprint, face scan)
Azure security centre
monitoring service that provides threat protection across all services - azure and on prem
Usage scenarios for azure security center
- incident response (detect, assess, diagnose)
- implement recommendations
Key Vault
Centralised cloud service for storing application secrets and keys
Azure Information Protection
cloud-based solution that helps organisations classify and protect documents and emails by applying labels.
analyse data flows, detect risky behaviour, track access, prevent data leakage
Azure advanced threat protection ATP
cloud-based security that identifies, detects and helps you investigate threats, compromised identities and malicious insider actions
Azure policies
service to create, assign and manage policies. Policies apply rules that resources need to follow.
Gives visibility into compliance
Initiatives
Initiatives work alongside policies in Azure policy.
A set or group of policy definitions to help track compliance state
Role-based access controls
fine grained access management for azure resources