Security, Privacy, Compliance, and Trust Flashcards

1
Q

Describe “network security groups (NSG)”

A
Filter traffic inbound and outbound from Azure resources located in Azure Virtual Network.
Filtering by rules
Ability to have multiple inbound and outbound rules.
Rules specify:
  Source/Destination
  Protocol
  Port
  Direction
  Priority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe “application security groups (ASG)”

A

Feature that allows grouping of virtual machines located in Azure virtual network
Designed to reduce the maintenance effort.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe “User-defined Routes (UDR)”

A

Custom routes
Designed to override Azure’s default routing or add new routes
Managed via Azure Route Table resource
Associated with a zero or more Virtual Network subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe “Azure Firewall”

A
PaaS
Managed, cloud-based firewall service
Built-in high availability
Highly scalable
Inbound and outbound filtering rules
Support for fully qualified domain name
Integrated with Azure monitor for logging and analytics
Blocks traffic by default
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe “Azure DDoS Protection”

A

Detects malicious traffic and blocks it
Prevents additional costs
Basic: automatically enabled
Standard: additional mitigation and monitoring capabilities
Standard uses ML to analyze traffic patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe “authentication”

A

Authentication is the process of verification/assertion of identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe “authorization”

A

Authorization is the process of ensuring that only authenticated identities get access to the resources for which they have been granted access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe “access management”

A

The process of controlling, verifying, tracking, and managing access to authorized users and application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe “Azure Active Directory”

A

Identity and Access Management
Identities: users, groups, apps, servers
Access: subscriptions, resource groups, roles, role assignments, authentication and authorization, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe “Multi-Factor Authentication (MFA)”

A

Uses more than one factor to prove identity
Knowledge - something you know
Possession - something you have
Physical Characteristic Factor - something you are
Location Factor - somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe “Azure Security Center”

A

Centralized/unified infrastructure and platform security management service
Natively embedded
Integrated with Azure Advisor
Free: included, provide continuous assessments, security score, and actionable security recommendations
Paid: hybrid security, threat protection alerts, vulnerability scanning, just in time VM access, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe “Azure Key Vault”

A

PaaS
Managed service for securing sensitive information
Secure storage service for keys, secrets, and certificates
highly integrated with other services
centralization
access monitoring and logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe “Role-Based Access Control (RBAC)”

A
Authorization system built on Azure Resource Manager (ARM)
Designed for fine-grained access management of Azure Resources
Role assignment is combination of
  Role Definition
  Security Principle
  Scope
Hierarchical
Built-in and Custom roles are supported
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe “Resource Locks”

A

Designed to prevent accidental deletion and or modification
Used in conjunction with RBAC
Read-only
Delete
Scopes are hierarchical (inherited)
Management Groups cant be locked
Only Owner and User Access Administrator roles can manage locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe “tags”

A
Simple Name (key) Value pairs
Designed to help with organization of Azure resources
Used for resource governance, security, operations management, cost management, automation, etc
Typical tagging strategies use functional, classification, finance/accounting, partnership tags
Applicable to resources, resource groups, and subscriptions
Not inherited by default
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe “Azure policy”

A

Designed to help with resource governance, security, compliance, cost management, etc
Policies focus on resource properties (RBAC focused on user actions)
Policy definition with condition and effect
Built-in custom policies are supported
Policy initiative - group of policies
Policy assignment - management groups, subscriptions, resource groups, and resources
Policies allow for exclusion of scopes
Checked during resource creation or updates and existing ones with remediation tasks

17
Q

Describe “Azure Blueprints”

A

Package of various Azure components (artifacts)
Resource Groups
ARM Templates
Policy Assignments
Role assignments
Centralized storage for organizationally approved designed patterns
Blueprint definition - describing what should happen
Blueprint assignment - describing where it should happen

18
Q

Describe the “Cloud Adoption Framework”

A

The Cloud Adoption Framework is a set of tools, best practices, guidelines, and documentation prepared by Microsoft to help companies with their cloud adoption journey.

19
Q

Describe the purpose of the “Microsoft Privacy Statement”

A

The Microsoft Privacy Statement describes the collection, purpose, and usage of personal data.

20
Q

Describe the purpose of the “Online Service Terms (OST)”

A

The OST has licensing terms for usage rights about Azure services. This includes what can be done and what is forbidden.

21
Q

Describe the purpose of the “Data Protection Amendment (DPA)”

A

An addition to the OST, the DPA describes obligations by both parties with regards to the processing of customer and personal data.

22
Q

Describe the purpose of the “Trust Center” documentation

A

The Azure compliance documentation has all the documentation related to security, compliance, privacy, policies, best practices, etc.

23
Q

Describe the purpose of the “Azure Sovereign Regions”

A

The Azure Sovereign Regions provide Azure services in markets with very strict regulatory requirements.

Includes Azure Government designed for the US government and Azure China designed for the Chinese market.

24
Q

Describe the “Azure Compliance Documentation”

A

Web portal focused on compliance offering in Azure similar to the trust center but narrowed down.