Mastering Azure Security
eBook - ePub

Mastering Azure Security

Safeguard your Azure workload with innovative cloud security measures

  1. 262 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Mastering Azure Security

Safeguard your Azure workload with innovative cloud security measures

About this book

Leverage Azure security services to architect robust cloud solutions in Microsoft Azure

Key Features

  • Secure your Azure cloud workloads across applications and networks
  • Protect your Azure infrastructure from cyber attacks
  • Discover tips and techniques for implementing, deploying, and maintaining secure cloud services using best practices

Book Description

Security is always integrated into cloud platforms, causing users to let their guard down as they take cloud security for granted.Cloud computing brings new security challenges, but you can overcome these with Microsoft Azure's shared responsibility model. Mastering Azure Security covers the latest security features provided by Microsoft to identify different threats and protect your Azure cloud using innovative techniques. The book takes you through the built-in security controls and the multi-layered security features offered by Azure to protect cloud workloads across apps and networks. You'll get to grips with using Azure Security Center for unified security management, building secure application gateways on Azure, protecting the cloud from DDoS attacks, safeguarding with Azure Key Vault, and much more. Additionally, the book covers Azure Sentinel, monitoring and auditing, Azure security and governance best practices, and securing PaaS deployments. By the end of this book, you'll have developed a solid understanding of cybersecurity in the cloud and be able to design secure solutions in Microsoft Azure.

What you will learn

  • Understand cloud security concepts
  • Get to grips with managing cloud identities
  • Adopt the Azure security cloud infrastructure
  • Grasp Azure network security concepts
  • Discover how to keep cloud resources secure
  • Implement cloud governance with security policies and rules

Who this book is for

This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. A fundamental understanding of security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively.

Trusted by 375,005 students

Access to over 1.5 million titles for a fair monthly price.

Study more efficiently using our study tools.

Information

Year
2020
Print ISBN
9781839218996
Edition
1
eBook ISBN
9781839216053

Section 1: Identity and Governance

In this section, you will learn how to create and enforce policies in Azure, how to manage and secure identity in Azure, and what is cybersecurity in the cloud.
This section comprises the following chapters:
Chapter 1, Azure Security Introduction
Chapter 2, Governance and Security
Chapter 3, Managing Cloud Identities

Chapter 1: Introduction to Azure security

When cloud computing comes up as the subject of a conversation, security is, very often, the main topic. When data leaves local datacenters, many wonder what happens to it. We are used to having complete control over everything, from physical servers, networks, and hypervisors, to applications and data. Then, all of a sudden, we are supposed to transfer much of that to someone else. It's natural to feel a little tension and distrust at the beginning, but, if we dig deep, we'll see that cloud computing can offer us more security than we could ever achieve on our own.
Microsoft Azure is a cloud computing service provided through Microsoft-managed datacenters dispersed around the world. Azure datacenters are built to top industry standards and comply with all the relevant certification authorities, such as ISO/IEC 27001:2013 and NIST SP 800-53, to name a couple. These standards guarantee that Microsoft Azure is built to provide security and reliability.
In this chapter, we'll learn about Azure security concepts and how security is structured in Microsoft Azure datacenters, using the following topics:
  • Exploring the shared responsibility model
  • Physical security
  • Azure network
  • Azure infrastructure availability
  • Azure infrastructure integrity
  • Azure infrastructure monitoring
  • Understanding Azure security foundations

Exploring the shared responsibility model

While Microsoft Azure is very secure, responsibility for building a secure environment doesn't rest with Microsoft alone. Its shared responsibility model divides responsibility between Microsoft and its customers.
Before we can discuss which party looks after which aspect of security, we need to first discuss cloud service models. There are three basic models:
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Software as a Service (SaaS)
These models differ in terms of what is controlled by Microsoft and the customer. A general break up can be seen in the following diagram:
Figure 1.1 – Basic cloud service models
Figure 1.1 – Basic cloud service models
Let's look at these services in a little more detail:

On-premises

In an on-premises environment, we, as users, take care of everything: the network, physical servers, storage, and so on. We need to set up virtualization stacks (if used), configure and maintain servers, install and maintain software, manage databases, and so on. Most importantly, all aspects of security are our responsibility: physical security, network security, host and OS security, and application security for all application software running on our servers.

Infrastructure as a Service

With IaaS, Microsoft takes over some of the responsibilities. We only take care of data, runtime, applications, and some aspects of security, which we'll discuss a little later on. An example of an IaaS product in Microsoft Azure is Azure Virtual Machines (VM).

Platform as a Service

PaaS gives Microsoft even more responsibility. We only take care of our applications. However, this still means looking after a part of the security. Some examples of PaaS in Microsoft Azure are Azure SQL Database and web apps.

Software as a Service

SaaS gives a large amount of control away, and we manage very little, including some aspects of security. In Microsoft's ecosystem, a popular example of SaaS is Office365; however, we will not discuss this in this book.
Now that we have a basic understanding of shared responsibility, let's understand how responsibility for security is allocated.

Division of security in the shared responsibility model

The shared responsibility model divides security into three zones:
  • Always controlled by the customer
  • Always controlled by Microsoft
  • Varies by service type
Irrespective of the cloud service model, customers will always retain the following security responsibilities:
  • Data governance and right management
  • Endpoints
  • Account and access management
Similarly, Microsoft always handles the following, in terms of security, for any of its cloud service models:
  • Physical datacenter
  • Physical network
  • Physical hosts
Finally, there are a few security responsibilities that are allocated based on the cloud service model:
  • Identity and directory infrastructure
  • Applications
  • Network
  • Operating system
Responsibility distribution, based on different cloud service models, is shown in the following diagram:
Figure 1.2 – Responsibility distribution between the customer and service provider for different cloud service models (image courtesy of Microsoft, License: MIT)
Figure 1.2 – Responsibility distribution between the customer and service provider for different cloud service models (image courtesy of Microsoft, License: MIT)
Now that we know how security is divided, let's move on to one specific aspect of it: the physical security that Microsoft manages. This section is important as we won't discuss it in much detail in the chapters to come.

Physical security

It all starts with physical security. No matter what we do to protect our data from attacks coming from outside of our network, it would all be in vain if someone was to walk into datacenters or server rooms and take away disks from our servers. Microsoft takes physical security very seriously in order to reduce risk from unauthorized access to data and datacenter resources.
Azure datacenters can be accessed only through strictly defined access points. A facility's perimeter is safeguarded by tall fences made of steel and concrete. In order to enter Azure datacenters, a person needs to go through at least two checkpoints: first to enter the facility perimeter, and second to enter the building. Both checkpoints are staffed by professional and trained security personnel. In addition to the access points, security personnel patrol the facility's perimeter. The facility and its buildings are covered by video surveillance, which is monitored by the security personnel.
After entering the building, two-factor authentication with biometrics is required to gain access to the inside of the datacenter. If their identity is validated, a person can access only approved parts of the datacenter. Approval, besides defining areas that can be accessed, also defines periods that can be spent inside these areas. It also strictly defines whether a person can access these areas alone or needs to be accompanied by someone.
Before accessing each area inside the datacenter, a mandatory metal detector check is performed. In order to prevent unauthorized data leaving or entering the datacenter, only approved devices are allowed. Additionally, all server racks are monitored from the front and back using video surveillance. When leaving a datacenter area, an additional metal detector screening is required. This helps Microsoft make sure that nothing that can compromise its data's security is brought in or removed from the datacenter without authorization.
A review of physical security is conducted periodically for all facilities. This aims to satisfy all security requirements at all times.
After equipment reaches the end of its life, it is disposed of in a secure way, with rigorous data and hardware disposal policies. During the disposal process, Microsoft personnel ensure that data is not available to untrusted parties. All data devices are either wiped (if possible) or physically destroyed in order to render the recovery of any information impossible.
All Microsoft Azure datacenters are designed, built, and operated in a way that satisfies top industry standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1, and SOC 2, to name a few. In many cases, specific region or country standards are followed as well, such as Australia IRAP, UK GCloud, and Singapore MTCS.
As an added precaution, all data inside any Microsoft Azure datacenter is encrypted at rest. Even if someone managed to get their hands on disks with customers' data, which is virtually impossible with all the security measures, it would take an enormous effort (both from a financial and time perspective) to decrypt any of the data.
But in the cloud era, network security is equally, if not more, important as physical security. Most services are accessed over the internet, and even isolated services depend on the network layer. So next, we need to take a look at Azure network architecture.

Azure network

Networking in Azure can be separated into two parts: managed by Microsoft and managed by us. In this section, we will discuss the part of networking managed by Microsoft. It's important to understand the architecture, reliability, and security setup of this part to provide more context once we move to parts of network security that we need to manage.
As with Azure datacenters generally, the Azure network follows industry standards with three distinct models/layers:
  • Core
  • Distribution
  • Access
All three models use distinct hardware in order to completely separate all the layers. The core layer uses datacenter routers, the distribution layer uses access routers and L2 aggregation (this layer separates L3 routing from L2 switching), and the access layer uses L2 switches.
Azure network architecture includes two levels of L2 switches:
  • First level: Aggregates traffic
  • Second level: Loops to incorporate redundancy
This approach allows for more flexibility and better port scaling. Another benefit of this approach is that L2 and L3 are totally separated, which allows for the use of distinct hardware for each layer in the netw...

Table of contents

  1. Mastering Azure Security
  2. Why subscribe?
  3. Preface
  4. Section 1: Identity and Governance
  5. Chapter 1: Introduction to Azure security
  6. Chapter 2: Governance and Security
  7. Chapter 3: Managing Cloud Identities
  8. Section 2: Cloud Infrastructure Security
  9. Chapter 4: Azure Network Security
  10. Chapter 5: Azure Key Vault
  11. Chapter 6: Data Security
  12. Section 3: Security Management
  13. Chapter 7: Azure Security Center
  14. Chapter 8: Azure Sentinel
  15. Chapter 9: Security Best Practices
  16. Assessments
  17. Other Books You May Enjoy

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn how to download books offline
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.5M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1.5 million books across 990+ topics, we’ve got you covered! Learn about our mission
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more about Read Aloud
Yes! You can use the Perlego app on both iOS and Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app
Yes, you can access Mastering Azure Security by Mustafa Toroman,Tom Janetscheck in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over 1.5 million books available in our catalogue for you to explore.