You are on page 1of 22

MICROSOFT AZURE

SECURITY
OVERVIEW

Tom Quinn
Azure Security Specialist, Microsoft
Microsoft Azure
Security and Compliance
Discussion

Tom Quinn
Azure Security Specialist
Topics
Microsoft and Security
Shared Responsibility
How does Microsoft Secure the Platform
Azure Regions Azure Gov Cloud
Securing Customer environment
Data Security
Encryption
Identity
Network Security
Network isolation
First party and third party controls
Hybrid Cloud - VPN and Express Route Connectivity
Logging, Monitoring, and Operations
Azure Security Center and OMS
Partner Security Solutions

Microsoft Azure
Microsoft industry leading security
capabilities

Visibility Context

Experience Expertise

VISIBILITY CONTEXT EXPERIENCE EXPERTISE


Malware largest anti-virus and Trillions of URLs indexed 1M+ Corporate Machines Development Security
protected by enterprise IT security established Security Development
antimalware service Hundreds of Billions of Lifecycle (SDL) - ISO/IEC 27034-1
Clients Windows Updates, Error authentications, monthly emails Multi-platform cloud-first
Reports analyzed hybrid enterprise Operational Security for
Billions of daily web pages Hyper-scale cloud services
Email Outlook.com, Office 365 Decades of experience
scans, Windows devices reporting as a global enterprise Combatting Cybercrime
Web content Bing, Azure AD Hundreds of Millions of in the cloud & partnering with law
reputation look ups Runs on multi-tenant enforcement to disrupt malware
Cloud platform Azure IaaS Azure environment,
and PaaS, Azure Security Center Millions of daily suspicious files same as you
Incident Investigation and
detonations recovery for customers
Responsibility SaaS PaaS IaaS On-prem

Data governance &


rights management

Client endpoints

Account & access


management
Identity & directory
infrastructure

Application

Network controls

Operating system

Physical hosts
Cloud service provider responsibility
Physical network

Physical datacenter
Tenant responsibility

Microsoft Customer
Microsoft Cloud Security Practices
Dedicated security expert Global, 24x7 incident
Microsoft makes security a priority at every step, red team that simulate
real-world attacks at
response service that
works to mitigate the
from code development to incident response. network, platform, and effects of attacks and
malicious activity.
application layers, testing
the ability of Azure to
Focus on Identity detect, protect against, and
Controls and tools recover from breaches.
including mitigation of
Extensive threat internal threat
intelligence gathering, throughout stack
modelling, analysis and including operations. Incident
Company-wide,
controls incorporated Response
mandatory development
into systems. Assume
process that embeds Breach
Defense in Depth
security into every phase Simulation
of development process.
Approach across all
cloud services from Identity and Access
Physical to app/data
layers.
Threat Intelligence

Security Development
Lifecycle (SDL)

Defense in Depth
Achieve global scale, in local regions
Trust

42
Azure regions

US Gov: US Gov Texas and US Gov Arizona


NEWLY ANNOUNCED:
France: France Central and France South
Africa: South Africa North and South Africa West
Data in Azure
Azure Cloud Storage:
Object based, durable, massively scalable storage subsystem
Designed from ground up by Microsoft
Presents as Blobs, Disks, Tables, Queues and Files
Accessed via REST APIs, Client Libraries and Tools
Access control:
Leverage Symmetric Shared Key Authentication
Trusted service that owns the storage accounts
Shared Access Signature (SAS)

Scale:
More than 25 trillion stored objects
2.5+ Million requests/sec on average

Storage System Design and Architecture:


Architecture and design details published and available Windows Azure
Storage A Highly Available Cloud Storage Service with Strong Consistency
Azure Data Encryption - Data at Rest
Application Layer
K Azure Key
BYO Encryption - <.NET Librabries, Leverage on-prem HSM, etc.>
e
Always Encrypted Vault
PaaS Services y
s <Keys and Secrets
SQL Database - <Transparent Data Encryption, Always Encrypted> controlled by
HDInsight - <SQL Database>
customers in their
M key vault>
Azure Backup Service - <Leverages Azure Disk Encryption>
a
Virtual Machine/OS Layer Windows, Linux n
a Authentication
Azure Disk Encryption - <BitLocker [Windows], DM-Crypt [Linux]> g
Partner Volume Encryption <CloudLink SecureVM> to Key Vault
e
BYO Encryption <Customer provided> m <Authentication
e to Key Vault is
Storage System n using Azure AD>
Azure Storage Service Encryption <AES-256, Block, t
Append, and page Blobs>
Enterprise cloud identity Azure AD
AZURE:
Provides enterprise cloud identity and
access management
Enables single sign-on across cloud
applications
Offers Multi-Factor Authentication for
Azure
Cloud Apps
enhanced security
Active Directory
CUSTOMER:
Centrally manages users and access to
End Users Azure, O365, and hundreds of pre-
integrated cloud applications
Builds Azure AD into their web and
Active Directory mobile applications
Can extend on-premises directories to
Azure AD
Microsoft Azure 12
Azure Virtual Networking
AZURE:
Allows customers to create INTERNET Client

isolated virtual private


networks Microsoft Azure
CUSTOMER: RDP Endpoint
Cloud Access (password access)
Creates Virtual Networks with
Subnets and Private IP Customer 1 Customer 2
addresses Subnet 1 Subnet 2 Subnet 3 Deployment X Deployment Y

Enables communications Corp 1 VPN

between their Virtual VNET to VNET

Networks
Can apply security controls
Can connect to corpnet via DNS Server
Isolated Virtual Networks
VPN or Express Route Isolated Virtual Network

Microsoft Azure
Platform Network Control
Network Security Groups (NSG)
Grouping of network traffic rules as Internet
security group

Security groups associated with virtual


machines or virtual subnets Microsoft Azure

Controlled access between machines in


subnets Front End Subnet Back End Subnet

Controlled access to and from the


Internet NSG

Network traffic rules updated


independent of virtual machines
Virtual Network

Microsoft Azure
Azure
What Example
Service Internet

http://news.com
Cross-region
Traffic apac.news.com
redirection & Azure Traffic Manager (DNS Load Balancer)
Manager emea.news.com
availability
us.news.com
In-region emea.news.com
Azure Load AppGw1
scalability &
Balancer AppGw2
availability AppGw2
Application Application Application Application
URL/content- Gateway Gateway Gateway Gateway
Azure news.com/topnews
based routing
Application news.com/sports
& load
Gateway news.com/images VM VM VM VM VM VM VM VM
balancing

VMs Web Servers


App
Gateway
Typical Tiered Architecture
App
Gateway
User Defined Routing and Virtual Appliances
Internet

Private
WAN
Monitoring & logging
Microsoft Azure
Enable Monitoring Agent
AZURE:
Customer VMs
Performs monitoring & alerting on
security events for the platform
Portal
Guest VM Guest VM Cloud Services
Enables security data collection via
SMAPI
Azure
Monitoring Agent or Windows Event
Event
s Storage HDInsight Forwarding
Customer
Admin Extract event information to SIEM
or other Reporting System
CUSTOMER:

SIEM Admin View


Configures monitoring
Event ID Computer Event Description Severity DateTime Exports events to SQL Database,
Alerting & 1150 Machine1 4 04/29/2014
HDInsight or a SIEM for analysis
Example security event

reporting
2002 Machine2 Signature Updated Successfully
4 04/29/2014

5007 Machine3 Configuration Applied


4 04/29/2014
Monitors alerts & reports
1116 Machine2 Example security event
1 04/29/2014 Responds to alerts
1117 Machine2 Access attempted
1 04/29/2014

Microsoft Azure 20
Azure Security Center
What is the feature?
Prevent, detect and respond to threats with increased visibility
and control over the security of your Azure resources and
advanced analytics, which identify attacks that might otherwise
go unnoticed

Benefits
Understand the security state of Azure resources Automatic Log
Take control of cloud security with policies that enable you to
Collection
recommend and monitor security configurations
Make it easy for DevOps to deploy integrated Microsoft and partner
security solutions
Find threats with advanced analysis of your security-related events
developed using Microsofts vast global intelligence assets and expertise
Respond and recover from incidents faster with real-time security alerts Rome Analytics Engine
Export security events to a SIEM for further analysis Analyzes Windows Security
Events, IIS Logs, AV Logs,
Firewall Logs, Syslog,
Operations Management Suite
Log analytics
Near real time perf. data collection/monitoring Operations
Linux agents including monitoring integrations Management
Mobile Apps in Windows, Android and iOS Suite Windows Windows Linux Linux Linux
Custom fields Server
(VM)
Server
(VM) (VM) (VM) (VM)
SOC1 and SOC2 Type 1 Compliant
Amazon Web
Services
Backup & disaster recovery
Backup >1.6TB support
ASR integration with SQL Always-On public preview
ASR CSP and IaaS V2 support
IaaS v1 & v2 VMs backup
Azure backup server for application workload backups Windows Windows Windows Windows Linux
Server Server Server Server
IT automation (VM) (VM) (VM) (VM) (VM)

Automation DSC
Private clouds
(Azure Stack, Hyper-V, VMware,
Source Control support through GitHub for runbooks OpenStack)
Hybrid support for schedules / test jobs
PowerShell script support on hybrid workers
Linux DSC support
Security & compliance

Wire data solution


Azure network analytics solution
Malicious IP detection
Partner Security Solutions
Microsoft is dedicated to working with partners across the ecosystem
enabling customers to augment their security posture

Network Virtual Appliances


Hosted Network Controls Firewalls,WAF, Ddos, IDS/IPS, DLP
Operations/Management Monitoring, logging, correlation
Penetration Testing
Vulnerability assessments/Threat Modeling

You might also like