Security, responsibility, and trust in Azure Flashcards

1
Q

Security Note1

A

Regardless of the deployment type, you always retain responsibility for the following:

  • Data
  • Endpoints
  • Accounts
  • Access management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a strategy that employs a series of mechanisms to slow the advance of an attack aimed at acquiring unauthorized access to information. Each layer provides protection so that if one layer is breached, a subsequent layer is already in place to prevent further exposure.

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a monitoring service that provides threat protection across all of your services both in Azure, and on-premises.

A

Azure Security Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Authentication.
  • Single-Sign-On (SSO)
  • Application management: You can manage your cloud and on-premises apps using Azure AD Application Proxy, SSO, the My apps portal (also referred to as Access panel), and SaaS apps.
  • Business to business (B2B) identity services: Manage your guest users and external partners while maintaining control over your own corporate data Business-to-Customer (B2C) identity services. Customize and control how users sign up, sign in, and manage their profiles when using your apps with services.
  • Device Management
A

Azure AD services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

uses the same key to encrypt and decrypt the data. Consider a desktop password manager application. You enter your passwords and they are encrypted with your own personal key (your key is often derived from your master password). When the data needs to be retrieved, the same key is used, and the data is decrypted.

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

uses a public key and private key pair. Either key can encrypt but a single key can’t decrypt its own encrypted data. To decrypt, you need the paired key. Asymmetric encryption is used for things like Transport Layer Security (TLS) (used in HTTPS) and data signing.

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

for data at rest helps you protect your data to meet your organizational security and compliance commitments. With this feature, the Azure storage platform automatically encrypts your data before persisting it to Azure Managed Disks, Azure Blob storage, Azure Files, or Azure Queue storage, and decrypts the data before retrieval.

A

Azure Storage Service Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is a capability that helps you encrypt your Windows and Linux IaaS virtual machine disks. Azure Disk Encryption leverages the industry-standard BitLocker feature of Windows and the dm-crypt feature of Linux to provide volume encryption for the OS and data disks. The solution is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets

A

Azure Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

centralized cloud service for storing your application secrets.

A

Azure Key Vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a managed, cloud-based, network security service that protects your Azure Virtual Network resources. It is a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.

A

Azure FW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are ideal options for non-HTTP services or advanced configurations, and are similar to hardware firewall appliances.

A

Network virtual appliances (NVAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

allow you to filter network traffic to and from Azure resources in an Azure virtual network.

A

Network Security Groups (NSG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly