Security, responsibility and trust in Azure Flashcards

1
Q

Describe security concept “Defense in depth”

A

strategy that employs a series of mechanisms to slow the advance of an attack aimed at acquiring unauthorized access to information. Each layer provides protection so that if one layer is breached, a subsequent layer is already in place to prevent further exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layers of defense in depth strategy

A
DATA
APPLICATION
COMPUTE
NETWORKING 
PERIMETER FIREWALLS
IDENTITY & ACCESS
PHYSICAL SECURITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Azure Security Center

A

Security Center is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Azure Security Center is available in two tiers

A

Free. Available as part of your Azure subscription, this tier is limited to assessments and recommendations of Azure resources only.
Standard. This tier provides a full suite of security-related services including continuous monitoring, threat detection, just-in-time access control for ports, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Use cases

A

Use Security Center for incident response - You can use Security Center during the detect, assess, and diagnose stages.

Use Security Center recommendations to enhance security.
You can reduce the chances of a significant security event by configuring a security policy, and then implementing the recommendations provided by Azure Security Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the difference between authentication and authorisation

A

Authentication is the process of establishing the identity of a person or service looking to access a resource. It involves the act of challenging a party for legitimate credentials, and provides the basis for creating a security principal for identity and access control use. It establishes if they are who they say they are.

Authorization is the process of establishing what level of access an authenticated person or service has. It specifies what data they’re allowed to access and what they can do with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Azure AD?

A

cloud-based identity service
built in support for synchronizing with your existing on-premises Active Directory or can be used stand-alone
Services:
Authentication - to apps and resources (includes MFA, password reset, password reqs)
SSO - one ID + pw for multiple apps. Identity tied to user.
App management - mange cloud and on-prem apps using Azure AD App Proxy, SSO and SaaS apps
B2B identity services - guest users
B2C identity services - users sign-up, sign-in etc
Device management - how cloud or on-prem accesses corporate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Multi-factor authentication

A

Multi-factor authentication (MFA) provides additional security for your identities by requiring two or more elements for full authentication. These elements fall into three categories:

Something you know - password
Something you possess - auth app
Something you are - biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service Principal
First > Identity
Second > Principal

A

Identity - thing that can be authenticated (users, apps, servers)
Principal - identity with certain roles or claims

A service principal is an identity that is used by a service or application. And like other identities, it can be assigned roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Managed identity

A

A managed identity can be instantly created for any Azure service that supports it

When you create a managed identity for a service, you are creating an account on your organization’s Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RBAC

A

Roles are sets of permissions, like “Read-only” or “Contributor”, that users can be granted to access an Azure service instance.

Identities are mapped to roles directly or through group membership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privileged Identity Management

A

Azure AD Privileged Identity Management (PIM) is an additional, paid-for offering that provides oversight of role assignments, self-service, and just-in-time role activation and Azure AD and Azure resource access reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encryption?

A

Encryption is the process of making data unreadable and unusable to unauthorized viewers. To use or read the encrypted data, it must be decrypted, which requires the use of a secret key. There are two top-level types of encryption: symmetric and asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric encryption

A

Symmetric encryption uses the same key to encrypt and decrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Asymmetric encryption

A

Asymmetric encryption uses a public key and private key pair.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption at rest

A

Data is unreadable without the keys and secrets needed to decrypt it.

17
Q

Encryption in transit

A

application layer prior to sending it over a network. HTTPS is an example of application layer in transit encryption.

set up a secure channel, like a virtual private network (VPN), at a network layer, to transmit data between two systems.

18
Q

Azure Storage Service Encryption

A

Azure storage platform automatically encrypts your data before persisting it to Azure Managed Disks, Azure Blob storage, Azure Files, or Azure Queue storage, and decrypts the data before retrieval.

19
Q

Azure Disk Encryption

A

Disk Encryption leverages the industry-standard BitLocker feature of Windows and the dm-crypt feature of Linux to provide volume encryption for the OS and data disks. The solution is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets (and you can use managed service identities for accessing Key Vault).

20
Q

Transparent data encryption

A

helps protect Azure SQL Database and Azure Data Warehouse against the threat of malicious activity. It performs real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application.

21
Q

Azure Key Vault

A

Azure Key Vault is a centralized cloud service for storing your application secrets.

22
Q

Azure Key Vault - useful scenarios

A

Secrets management. You can use Key Vault to securely store and tightly control access to tokens, passwords, certificates, Application Programming Interface (API) keys, and other secrets.
Key management. You also can use Key Vault as a key management solution. Key Vault makes it easier to create and control the encryption keys used to encrypt your data.
Certificate management. Key Vault lets you provision, manage, and deploy your public and private Secure Sockets Layer/ Transport Layer Security (SSL/ TLS) certificates for your Azure, and internally connected, resources more easily.
Store secrets backed by hardware security modules (HSMs). The secrets and keys can be protected either by software, or by FIPS 140-2 Level 2 validated HSMs.

23
Q

The benefits of using Key Vault include:

A

Centralized application secrets. Centralizing storage for application secrets allows you to control their distribution, and reduces the chances that secrets may be accidentally leaked.
Securely stored secrets and keys. Azure uses industry-standard algorithms, key lengths, and HSMs, and access requires proper authentication and authorization.
Monitor access and use. Using Key Vault, you can monitor and control access to company secrets.
Simplified administration of application secrets. Key Vault makes it easier to enroll and renew certificates from public Certificate Authorities (CAs). You can also scale up and replicate content within regions, and use standard certificate management tools.
Integrate with other Azure services. You can integrate Key Vault with storage accounts, container registries, event hubs, and many more Azure services.

24
Q

Types of certificates

A

Service certificates are used for cloud services

Management certificates are used for authenticating with the management API

25
Q

What is a Firewall?

A

A firewall is a service that grants server access based on the originating IP address of each request. You create firewall rules that specify ranges of IP addresses. Only clients from these granted IP addresses will be allowed to access the server. Firewall rules, generally speaking, also include specific network protocol and port information.

26
Q

NB: Azure Firewall

A

managed, cloud-based, network security service that protects your Azure Virtual Network resources.

It is a fully stateful (full state of active network connections) firewall as a service with built-in high availability and unrestricted cloud scalability.

27
Q

Azure Application Gateway

A

LB + WAF - is a load balancer that includes a Web Application Firewall (WAF) that provides protection from common, known vulnerabilities in websites.

HTTP - It is designed to protect HTTP traffic.

28
Q

NB: Azure DDoS Protection

A

DDoS Protection leverages the scale and elasticity of Microsoft’s global network to bring DDoS mitigation capacity to every Azure region. The Azure DDoS Protection service protects your Azure applications by monitoring traffic at the Azure network edge before it can impact your service’s availability.

BASIC - Always-on traffic monitoring and real-time mitigation of common network-level attacks
STANDARD - provides additional mitigation capabilities that are tuned specifically to Microsoft Azure Virtual Network resources

29
Q

Types of DDoS attacks

A

Volumetric attacks. The attackers goal is to flood the network layer with a substantial amount of seemingly legitimate traffic.
Protocol attacks. These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stack.
Resource (application) layer attacks. These attacks target web application packets to disrupt the transmission of data between hosts.

30
Q

NB: Network Security Groups (NSG’s)

A

FILTER - allow you to filter network traffic to and from Azure resources in an Azure virtual network.

An NSG can contain multiple inbound and outbound security rules that enable you to filter traffic to and from resources by source and destination IP address, port, and protocol.

31
Q

ExpressRoute

A

ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider.

32
Q

NB: Microsoft Azure Information Protection (AIP)

A

(sometimes referred to as AIP) is a cloud-based solution that helps organizations classify and optionally protect documents and emails by applying labels.

33
Q

NB: Azure Advanced Threat Protection (ATP)

A

is a cloud-based security solution that identifies, detects, and helps you investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.

34
Q

Azure ATP portal

A

Azure ATP has its own portal, through which you can monitor and respond to suspicious activity.

35
Q

Azure ATP sensor

A

installed directly on your domain controllers.

sensor monitors domain controller traffic without requiring a dedicated server or configuring port mirroring.

36
Q

Azure AD ID Protection

A

Enforce Azure MFA based on a condition