SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
HOW TO DEPLOY & SECURE
YOUR APPLICATIONS IN AZURE
Develop Security & Compliances in Azure
23.03.22
SEVEN PEAKS TEAM
Team Presentation
Tech Lead of Cloud Solutions
● Working from 2006 in IT industries
● Experienced into Developer / Consultant /
Team Leader positions
BIOGRAPHY
Giorgio Desideri
● Starting from Azure Account
● Stepping through Identity
● Database and Application Security
● Frameworks & Models
● Conclusions
AGENDA
Points which are presented today
AZURE ACCOUNT
Starting from the base
● Audience
○ Project / Product ( engineers, testers, managers,
etc. )
○ Application ( users, customers, etc. )
○ Maintenance ( support team, operators, etc. )
● Access method
○ Credentials or Certificates
○ MFA
○ Devices ( desktops, laptops, mobile, etc. )
AZURE ACCOUNT
Consideration before open an account
AZURE ACCOUNT
Consideration before open an account
https://docs.microsoft.com/en-us/azure/active-directory/
People Devices Management
Domain Service
Identity Governance
Identity Protection
Roles
Application
Hybrid Azure Active
Directory
● Licenses ( Price )
○ Free
○ Office 365
○ Premium P1 / P2
● Identity Governance
○ Access policy
○ Password Sync / Reset
○ Synchronization with on-premises
○ Synchronization with 3rd parties
AZURE ACCOUNT
Consideration before open an account
● Scope
○ Active Directory Policies
○ Azure Resources ( RBAC )
● Device Governance
○ Device Management
○ Mobile Device Management (MDM)
○ Access Reviews
● Monitoring
○ Alert & Reports
IDENTITIES
Stepping through access management in Azure
IDENTITIES
Access Management
User
Services
Application
POLICY
Roles
Groups
Devices
● Assigned
● Dynamic
● Built-In
● Custom
“Metadata” :
{
…
},
IDENTITIES
Access Management
● User Type
○ Guest
○ Member
○ Microsoft 365 (Enterprise)
○ Work / Consumer Account (Azure B2C)
User
Services
Application
Devices
IDENTITIES
Access Management
● Identity Type
○ Managed Identity
■ System-defined
■ User-defined
○ Service Principal ( Application Registration )
○ Enterprise Application
User
Services
Application
Devices
IDENTITIES
Access Management
● Identity Type
○ Programmatic defined by SDK
○ Service inherited ( supported by SDK )
User
Services
Application
Devices
IDENTITIES
Access Management
● Registration Type / Method
○ AD Join
○ Mobile Device Management ( MDM )
○ Windows Autopilot
○ Hybrid environment ( group policy )
○ AD Connect / Federation
User
Services
Application
Devices
IDENTITIES
Access Management
User
Services
Application
RBAC
AD Roles
Devices
Resources
Active Directory
IDENTITIES
Access Management
User
Services
Application
RBAC
AD Roles
Devices
Resources
Active Directory
DATABASE & APPLICATION
How can apply a “secure development” ?
DEVELOPER,
DEVELOPER,
DEVELOPER
DATABASE SECURITY
Development
Authentication
Encryption
Network Restriction
RBAC
Protect Keys
DATABASE SECURITY
Development
Authentication
Encryption
Network Restriction
Azure AD Authentication vs SQL
Authentication
● Decouple Database permissions
● Benefits of Azure AD identity access and
permissions management
● Password and Secret storage
● Certificate / Token authentication
DATABASE SECURITY
Development
Authentication
Encryption
Network Restriction
Data Encryption
● Transparent Data Encryption ( TDE )
● Encryption-at-rest
DATABASE SECURITY
Development
Authentication
Encryption
Network Restriction
Network access restriction
● IP restrictions
● Azure SQL Firewall
● Azure Synapse analysis
● Encryption-in-transit
APPLICATION SECURITY
Development
Authentication
RBAC
Protect Key
Integrated
● Azure Active Directory
○ Azure B2C
● OAuth 2.0
● OpenID Connect
● Social ( Facebook, Google, Twitter )
Network Restriction
APPLICATION SECURITY
Development
Authentication
RBAC
Protect Key
Scope definitions & restrictions
● Users, groups, applications
● Against Azure resources
● Integration and/or connectivity
regulation
Network Restriction
APPLICATION SECURITY
Development
Authentication
RBAC
Protect Key
My Secrets are mine and only mine !
● Azure KeyVault
● Hardware Security Modules
Network Restriction
APPLICATION SECURITY
Development
Authentication
RBAC
Protect Key
Network access regulation
● App Service Environment
● IP restrictions
● Azure Web Firewall ( WAF )
● VNet integration ( NSG, ASG )
Network Restriction
FRAMEWORKS & MODELS
Approaches to follow
FRAMEWORKS & MODELS
Azure Cloud Adoption Framework
FRAMEWORKS & MODELS
Azure Zero Trust Model
CONCLUSIONS
Considerations
CONCLUSIONS
● Consider your requirements and check against the Azure
account
● Access Management of your identities:
○ Audiences ( engineers and not )
○ Permissions
○ Methods
○ Operations ( SecOps )
Take Away points
CONCLUSIONS
● What is important for a “secure development” ?
○ Knowledge & Practice
■ “Close the door behind you”
■ “Welcome, how are you ?”
○ Monitor & Alerts
○ Review & Enforcement
Take Away points
CONCLUSIONS
● Azure Security Best Practices
○ https://docs.microsoft.com/en-us/azure/security/f
undamentals/best-practices-and-patterns
● Azure Zero-Trust Center
○ https://docs.microsoft.com/en-us/security/zero-tru
st/
● Azure Cloud Adoption Framework
○ https://docs.microsoft.com/en-us/azure/cloud-ado
ption-framework/
Take Away points
Questions ?
Thanks for joining
UPCOMING MEETUP
Check out our event page
Stay tuned for whatʼs coming next!

Contenu connexe

Tendances

Tendances (20)

Recipe for good secrets management
Recipe for good secrets managementRecipe for good secrets management
Recipe for good secrets management
 
Intoduction to lagom framework
Intoduction to lagom frameworkIntoduction to lagom framework
Intoduction to lagom framework
 
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
DevSecCon Asia 2017 Joel Divekar: Using Open Source Automation tools for DevS...
 
Codemotion Azure Container Apps
Codemotion Azure Container AppsCodemotion Azure Container Apps
Codemotion Azure Container Apps
 
Contributing to Open Source
Contributing to Open SourceContributing to Open Source
Contributing to Open Source
 
Implementation of IPsec with PKI
Implementation of IPsec with PKIImplementation of IPsec with PKI
Implementation of IPsec with PKI
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with DatadogMonitoring Your AWS EKS Environment with Datadog
Monitoring Your AWS EKS Environment with Datadog
 
Shifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environmentsShifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environments
 
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony GoddardOSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
OSMC 2017 | Monitoring Challenges in a World of Automation by Anthony Goddard
 
Application Security from the Inside - OWASP
Application Security from the Inside - OWASPApplication Security from the Inside - OWASP
Application Security from the Inside - OWASP
 
Logic Apps, the power of new integration
Logic Apps, the power of new integrationLogic Apps, the power of new integration
Logic Apps, the power of new integration
 
Tce automation-d4
Tce automation-d4Tce automation-d4
Tce automation-d4
 
Application Security in a Container World - Akash Mahajan - BCC 2017
Application Security in a Container World - Akash Mahajan - BCC 2017Application Security in a Container World - Akash Mahajan - BCC 2017
Application Security in a Container World - Akash Mahajan - BCC 2017
 
Istio as a Service Mesh
Istio as a Service MeshIstio as a Service Mesh
Istio as a Service Mesh
 
Programming with Azure Active Directory
Programming with Azure Active DirectoryProgramming with Azure Active Directory
Programming with Azure Active Directory
 
Logic Apps, the power of new integration
Logic Apps, the power of new integrationLogic Apps, the power of new integration
Logic Apps, the power of new integration
 
Logic Apps, the power of new integration
Logic Apps, the power of new integrationLogic Apps, the power of new integration
Logic Apps, the power of new integration
 
MRA AMA Part 6: Service Mesh Models
MRA AMA Part 6: Service Mesh ModelsMRA AMA Part 6: Service Mesh Models
MRA AMA Part 6: Service Mesh Models
 
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster ManagementAddressing the 8 Key Pain Points of Kubernetes Cluster Management
Addressing the 8 Key Pain Points of Kubernetes Cluster Management
 

Similaire à Develop Security & Compliances in Azure

20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium
Robin Vermeirsch
 

Similaire à Develop Security & Compliances in Azure (20)

Azure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDKAzure Community Tour 2019 - AZUGDK
Azure Community Tour 2019 - AZUGDK
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Microsoft certified azure fundamentals exam code az-900
Microsoft certified azure fundamentals   exam code az-900Microsoft certified azure fundamentals   exam code az-900
Microsoft certified azure fundamentals exam code az-900
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD 2018 November - AZUGDK - Azure AD
2018 November - AZUGDK - Azure AD
 
December 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know WebinarDecember 2022 Microsoft 365 Need to Know Webinar
December 2022 Microsoft 365 Need to Know Webinar
 
Power of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure security
 
20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
AppProxy.pdf
AppProxy.pdfAppProxy.pdf
AppProxy.pdf
 
Microsoft Azure Tutorial | Microsoft Cloud Computing | Microsoft Azure Traini...
Microsoft Azure Tutorial | Microsoft Cloud Computing | Microsoft Azure Traini...Microsoft Azure Tutorial | Microsoft Cloud Computing | Microsoft Azure Traini...
Microsoft Azure Tutorial | Microsoft Cloud Computing | Microsoft Azure Traini...
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
What are the basic key concepts before learning Azure Data Engineer.docx
What are the basic key concepts before learning Azure Data Engineer.docxWhat are the basic key concepts before learning Azure Data Engineer.docx
What are the basic key concepts before learning Azure Data Engineer.docx
 
Introduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDKIntroduction to basic governance in Azure - #GABDK
Introduction to basic governance in Azure - #GABDK
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
7.habits.every.azure.admin.must.have.v082020
7.habits.every.azure.admin.must.have.v0820207.habits.every.azure.admin.must.have.v082020
7.habits.every.azure.admin.must.have.v082020
 
Securing your Azure Identity Infrastructure
Securing your Azure Identity InfrastructureSecuring your Azure Identity Infrastructure
Securing your Azure Identity Infrastructure
 
Migrate to Azure with Confidence - Inovar Consulting
Migrate to Azure with Confidence - Inovar ConsultingMigrate to Azure with Confidence - Inovar Consulting
Migrate to Azure with Confidence - Inovar Consulting
 
Windows Azure Active Directory
Windows Azure Active DirectoryWindows Azure Active Directory
Windows Azure Active Directory
 

Plus de Seven Peaks Speaks

BKK Web: Working with SEO
BKK Web: Working with SEOBKK Web: Working with SEO
BKK Web: Working with SEO
Seven Peaks Speaks
 

Plus de Seven Peaks Speaks (20)

BKK Web: Working with SEO
BKK Web: Working with SEOBKK Web: Working with SEO
BKK Web: Working with SEO
 
Seven Peaks Speaks - Compose Screenshot Testing Made Easy
Seven Peaks Speaks - Compose Screenshot Testing Made EasySeven Peaks Speaks - Compose Screenshot Testing Made Easy
Seven Peaks Speaks - Compose Screenshot Testing Made Easy
 
Seven Peaks Speaks - Android Jetpack Compose Animation
Seven Peaks Speaks - Android Jetpack Compose AnimationSeven Peaks Speaks - Android Jetpack Compose Animation
Seven Peaks Speaks - Android Jetpack Compose Animation
 
Seven Peaks Speaks - Compose Navigation
Seven Peaks Speaks - Compose NavigationSeven Peaks Speaks - Compose Navigation
Seven Peaks Speaks - Compose Navigation
 
RxSubject And Operators
RxSubject And OperatorsRxSubject And Operators
RxSubject And Operators
 
Effective Lists Management
Effective Lists ManagementEffective Lists Management
Effective Lists Management
 
Layout Preview Tooling
Layout Preview ToolingLayout Preview Tooling
Layout Preview Tooling
 
Background Processing With Work Manager
Background Processing With Work ManagerBackground Processing With Work Manager
Background Processing With Work Manager
 
Graph ql vs rest api - Seven Peaks Software (Node.JS Meetup 18 nov 2021)
Graph ql vs rest api - Seven Peaks Software (Node.JS Meetup 18 nov 2021)Graph ql vs rest api - Seven Peaks Software (Node.JS Meetup 18 nov 2021)
Graph ql vs rest api - Seven Peaks Software (Node.JS Meetup 18 nov 2021)
 
Structuring node.js projects - Seven Peaks Software (Node.JS Meetup 18 nov 2021)
Structuring node.js projects - Seven Peaks Software (Node.JS Meetup 18 nov 2021)Structuring node.js projects - Seven Peaks Software (Node.JS Meetup 18 nov 2021)
Structuring node.js projects - Seven Peaks Software (Node.JS Meetup 18 nov 2021)
 
Delivering react app with confidence: Testing Pyramid
Delivering react app with confidence: Testing PyramidDelivering react app with confidence: Testing Pyramid
Delivering react app with confidence: Testing Pyramid
 
React context
React context  React context
React context
 
Getting hooked on performance and clean code
Getting hooked on performance and clean codeGetting hooked on performance and clean code
Getting hooked on performance and clean code
 
Establishing secure Biometric authentication in Android
Establishing secure Biometric authentication in AndroidEstablishing secure Biometric authentication in Android
Establishing secure Biometric authentication in Android
 
Utilizing kotlin flows in an android application
Utilizing kotlin flows in an android applicationUtilizing kotlin flows in an android application
Utilizing kotlin flows in an android application
 
Continuously deploy a containerized app to “Azure App Service”
Continuously deploy a containerized app to “Azure App Service”Continuously deploy a containerized app to “Azure App Service”
Continuously deploy a containerized app to “Azure App Service”
 
Static web apps by GitHub action
Static web apps by GitHub actionStatic web apps by GitHub action
Static web apps by GitHub action
 
Developers Guide to Cosmos DB
Developers Guide to Cosmos DBDevelopers Guide to Cosmos DB
Developers Guide to Cosmos DB
 
Seven Peaks Speaks: Accessibility for iOS, Android and Web
Seven Peaks Speaks: Accessibility for iOS, Android and WebSeven Peaks Speaks: Accessibility for iOS, Android and Web
Seven Peaks Speaks: Accessibility for iOS, Android and Web
 
Seven Peaks Speaks: User testing to action
Seven Peaks Speaks: User testing to actionSeven Peaks Speaks: User testing to action
Seven Peaks Speaks: User testing to action
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Develop Security & Compliances in Azure