Understand security, privacy, compliance, and trust Flashcards

1
Q

Describe describe Azure Multi-Factor Authentication

A

Multi-factor authentication (MFA) provides additional security for your identities by requiring two or more elements for full authentication. These elements fall into three categories:

Something you know
Something you possess
Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Azure Active Directory

A

Directory or can be used stand-alone. This means that all your applications, whether on-premises, in the cloud (including Office 365), or even mobile can share the same credentials. Administrators and developers can control access to internal and external data and applications using centralized rules and policies configured in Azure AD.

Azure AD provides services such as:

Authentication. This includes verifying identity to access applications and resources, and providing functionality such as self-service password reset, multi-factor authentication (MFA), a custom banned password list, and smart lockout services.
Single-Sign-On (SSO). SSO enables users to remember only one ID and one password to access multiple applications. A single identity is tied to a user, simplifying the security model. As users change roles or leave an organization, access modifications are tied to that identity, greatly reducing the effort needed to change or disable accounts.
Application management. You can manage your cloud and on-premises apps using Azure AD Application Proxy, SSO, the My apps portal (also referred to as Access panel), and SaaS apps.
Business to business (B2B) identity services. Manage your guest users and external partners while maintaining control over your own corporate data Business-to-Customer (B2C) identity services. Customize and control how users sign up, sign in, and manage their profiles when using your apps with services.
Device Management. Manage how your cloud or on-premises devices access your corporate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the difference between authentication and authorization

A

Two fundamental concepts that need to be understood when talking about identity and access control are authentication and authorization. They underpin everything else that happens and occur sequentially in any identity and access process:

Authentication is the process of establishing the identity of a person or service looking to access a resource. It involves the act of challenging a party for legitimate credentials, and provides the basis for creating a security principal for identity and access control use. It establishes if they are who they say they are.

Authorization is the process of establishing what level of access an authenticated person or service has. It specifies what data they’re allowed to access and what they can do with it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Azure Security Center

A

Azure Security Center (ASC) is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises. It can:

Provide security recommendations based on your configurations, resources, and networks.
Monitor security settings across on-premises and cloud workloads and automatically apply required security to new services as they come online.
Continuously monitor all your services and perform automatic security assessments to identify potential vulnerabilities before they can be exploited.
Use machine learning to detect and block malware from being installed in your services and virtual machines. You can also allowlist applications to ensure that only the apps you validate are allowed to execute.
Analyze and identify potential inbound attacks and help to investigate threats and any post-breach activity which might have occurred.
Just-In-Time access control for ports, reducing your attack surface by ensuring the network only allows traffic you require.
ASC is part of t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe describe Role-Based Access Control (RBAC)

A

Roles are sets of permissions, like “Read-only” or “Contributor”, that users can be granted to access an Azure service instance.

Identities are mapped to roles directly or through group membership. Separating security principals, access permissions, and resources provides simple access management and fine-grained control. Administrators are able to ensure the minimum necessary permissions are granted.

Roles can be granted at the individual service instance level, but they also flow down the Azure Resource Manager hierarchy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Azure Firewall

A

Azure Firewall is a managed, cloud-based, network security service that protects your Azure Virtual Network resources. It is a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. Azure Firewall provides inbound protection for non-HTTP/S protocols. Examples of non-HTTP/S protocols include: Remote Desktop Protocol (RDP), Secure Shell (SSH), and File Transfer Protocol (FTP). It also provides outbound, network-level protection for all ports and protocols, and application-level protection for outbound HTTP/S.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe policies and initiatives with Azure Policy

A

Azure Policy is an Azure service you use to create, assign and, manage policies. These policies enforce different rules and effects over your resources so that those resources stay compliant with your corporate standards and service level agreements. Azure Policy meets this need by evaluating your resources for noncompliance with assigned policies. For example, you might have a policy that allows virtual machines of only a certain size in your environment. After this policy is implemented, new and existing resources are evaluated for compliance. With the right type of policy, existing resources can be brought into compliance.

https://docs.microsoft.com/en-us/learn/modules/intro-to-governance/2-azure-policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly