Security

- Storage security: data encryption, client encryption, key vaults
- Network security: VPN, Network Security Groups
- Identity/Access control: RBAC, MFA, password policies
- Monitoring practices: Storage Analytics, and security logs
- Security Center is a service that monitors, recommends, use ML to detect/block malware
- Policies and compliance
- Hygiene: actionable items for each resource type
- Free tier only provides assessment and recommendations v/s Standard tier
- Azure SQL Transparent Data Encryption TDE should be turned on only in the resource groups where it's needed.
- OpenID Connect is used for user authentication
- Azure Key Vault can be used to store keys, secrets and certificates
- Key Vault must exist in the same region as the resources being protected
- Forced Tunneling forces all network traffic through VPN (can't have direct access to internet)
- Privileged Identity Management PIM: Best practice: use temporary admin
RBAC
- Role Based Access Control RBAC for Azure AD defined users and groups.
- Role consists of
- AssignableScopes: eg. subscriptions, RG, individual resource or management group
- Permissions: 1 or more of:
- Actions: 1 or more of type of operations, eg.
Microsoft.Compute/VirtualMachines/*/start/action
- NotActions: exclusions from Actions
- DataActions: Action on the data contained by the resource
- NotDataActions: exclusion from DataActions
MFA Multi Factor Auth
- Access keys based access for users not in AD -- typically applications
- two access keys, primary and secondary are provisioned.
- secondary access key is used to regenerate primary should it be compromised
- Shared Access Signature (SAS) is a temporary, restricted access to a non-customer
- is a URI that can be generated with specific permissions, services, duration and IP
- CORS rules can be specified for access to all storage services for cross-domain requests
- Azure Information Protection allows labeling, either manually or rule-based, web-based documents
- Use Azure Data Flow for tracking, preventing misuse of sensitive information
- Advanced Threat Protection ATP is cloud based solution towards malicious insider threats
- ATP Sensor is installed on domain controllers
- ATP Service runs on Azure cloud and ATP Portal provides UI to monitor, investigate etc
Role Based Access Control RBAC
- Uses allow model, permission from multiple roles add up
- Can act on a single user or a group, and single resource or resource group
- Use resource lock (delete or read-only) to prevent accidental modification or deletion of resources
Authentication
- using Azure AD, which is OAuth OpenID Connect
- Azure user account is belongs to an Azure AD
- Azure AD can be synced with customer's Active Directory Domain Service
- has multiple AD instances, each one is called tenant
- all accounts are stored in Azure AD tenant
- Organization 1:M subscriptions 1:M licenses 1:1 Users
- A subscription allows use of Azure service
- Subscriptions are grouped into Organization (typically identified by its DNS)
- resources are associated with a subscription,
- has multiple licenses
- A license allows a user to use a service
- A tenant is a specific instance of Azure AD containing accounts and groups
- For SaaS, a tenant is a regional location that provides services
- E.g. Corp X is tenant at European Region
- For PaaS or IaaS VM, tenant can be anywhere in the world
- subscriptions have trust relationship with tenant
- Only resources for one tenant are viewable at a time. Must switch tenant to view
Identities
- Identity is something that can be authenticated. It can be people or services
- Account is data associated with Identity, e.g. an account on Azure AD
- Principal is an Identity acting with certain roles or claims
- Service Principal is an Identity used by a service that holds claims and roles
Encryption
- In-transit (SSL) and at-rest
- Storage Service Encryption SSE used for storage services
- Disk Encryption used for VM VHD
- Transparent Data Encryption TDE protects SQL Database and Azure Data Warehouse is enabled by default
Network Security
- Azure Firewall is used for inbound non-HTTP/S and all outbound network traffic
- DDOS protection levels are Basic or Standard
- Basic DDOS protection is free that monitors large amount of traffic and blocks it
- Standard DDOS protection is adaptive and offers Volumetric, Protocol, Resource Layer attacks
- Use Network Security Group to limit and isolate network traffic within Virtual Network