Security, responsibility and trust in Azure Flashcards
Describe security concept “Defense in depth”
strategy that employs a series of mechanisms to slow the advance of an attack aimed at acquiring unauthorized access to information. Each layer provides protection so that if one layer is breached, a subsequent layer is already in place to prevent further exposure.
Layers of defense in depth strategy
DATA APPLICATION COMPUTE NETWORKING PERIMETER FIREWALLS IDENTITY & ACCESS PHYSICAL SECURITY
Azure Security Center
Security Center is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises.
Azure Security Center is available in two tiers
Free. Available as part of your Azure subscription, this tier is limited to assessments and recommendations of Azure resources only.
Standard. This tier provides a full suite of security-related services including continuous monitoring, threat detection, just-in-time access control for ports, and more.
Use cases
Use Security Center for incident response - You can use Security Center during the detect, assess, and diagnose stages.
Use Security Center recommendations to enhance security.
You can reduce the chances of a significant security event by configuring a security policy, and then implementing the recommendations provided by Azure Security Center.
Describe the difference between authentication and authorisation
Authentication is the process of establishing the identity of a person or service looking to access a resource. It involves the act of challenging a party for legitimate credentials, and provides the basis for creating a security principal for identity and access control use. It establishes if they are who they say they are.
Authorization is the process of establishing what level of access an authenticated person or service has. It specifies what data they’re allowed to access and what they can do with it.
What is Azure AD?
cloud-based identity service
built in support for synchronizing with your existing on-premises Active Directory or can be used stand-alone
Services:
Authentication - to apps and resources (includes MFA, password reset, password reqs)
SSO - one ID + pw for multiple apps. Identity tied to user.
App management - mange cloud and on-prem apps using Azure AD App Proxy, SSO and SaaS apps
B2B identity services - guest users
B2C identity services - users sign-up, sign-in etc
Device management - how cloud or on-prem accesses corporate data
Describe Multi-factor authentication
Multi-factor authentication (MFA) provides additional security for your identities by requiring two or more elements for full authentication. These elements fall into three categories:
Something you know - password
Something you possess - auth app
Something you are - biometric
Service Principal
First > Identity
Second > Principal
Identity - thing that can be authenticated (users, apps, servers)
Principal - identity with certain roles or claims
A service principal is an identity that is used by a service or application. And like other identities, it can be assigned roles.
Managed identity
A managed identity can be instantly created for any Azure service that supports it
When you create a managed identity for a service, you are creating an account on your organization’s Active Directory
RBAC
Roles are sets of permissions, like “Read-only” or “Contributor”, that users can be granted to access an Azure service instance.
Identities are mapped to roles directly or through group membership.
Privileged Identity Management
Azure AD Privileged Identity Management (PIM) is an additional, paid-for offering that provides oversight of role assignments, self-service, and just-in-time role activation and Azure AD and Azure resource access reviews.
What is encryption?
Encryption is the process of making data unreadable and unusable to unauthorized viewers. To use or read the encrypted data, it must be decrypted, which requires the use of a secret key. There are two top-level types of encryption: symmetric and asymmetric.
Symmetric encryption
Symmetric encryption uses the same key to encrypt and decrypt the data.
Asymmetric encryption
Asymmetric encryption uses a public key and private key pair.