Understand Security, Privacy, Compliance, and Trust Flashcards
What is a Network Security Group (NSG)?
It allows or denies inbound network traffic to your Azure resources. Think of a network security group as a cloud-level firewall for your network.
What’s Multi-Factor Authentication (MFA)?
It is a form of authentication that requires more than one element for full authentication. These elements can fall into three categories: something you know (security question), something you own (mobile app, token generating device), something you are (fingerprint, face scan).
What’s an identity?
It is something that can be authenticated - users, applications, servers.
What’s a principal?
It is an identity acting with certain roles or claims.
What’s a service principal?
It is an identity that is used by a service or an application and can be assigned roles.
What is Role Based Access Control?
Roles are sets of permissions, like “Read-only” or “Contributor”, that users can be granted to access an Azure service instance. Identities are mapped to roles directly or through group membership.
What’s Azure AD Privileged Identity Management (PIM)?
It is an additional, paid-for offering that provides oversight of role assignments, self-service, and just-in-time role activation and Azure AD and Azure resource access reviews.
What’s encryption?
It is the process of making data unreadable and unusable to unauthorized viewers.
What’s the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key to encrypt and decrypt the data, while in asymmetric encryption either key can encrypt the data but a single key can’t decrypt its own encrypted data.
What’s Azure Key Vault?
It is a cloud service that works as a secure secrets store. Key Vault allows you to create multiple secure containers, called vaults. Key Vault is designed to support any type of secret. These secrets could be passwords, database credentials, API keys, and certificates.
What’s Azure Application Gateway?
It is a load balancer that includes a web application firewall that provides protection from common, known vulnerabilities.
What’s DDoS?
Distributed Denial of Service is an attack that attempts to overwhelm a network resource by sending so many requests that the resource becomes slow or unresponsive.
How does Azure DDoS Protection work?
It identifies the attacker’s attempt to overwhelm the network and blocks further traffic from reaching Azure services. Legitimate traffic from customers still flows into Azure without any interruption of service.
What’s defense in depth?
It is a strategy that employs a series of mechanisms to slow the advance of an attack aimed at acquiring unauthorized access to information. Each layer provides protection so that if one layer is breached, a subsequent layer is already in place to prevent further exposure.
To which scopes can RBAC be applied:
- Subscription
- Resource group
- Files and folders withing a Linux filesystem
- Resource
- Subscription
- Resource group
- Resource
Files and folders within a Linux file system can be secured with various methods, but not with RBAC.