Azure security architecture

Karl Ots
AZURE SECURITY
ARCHITECTURE
FAUG TAMPERE
20.2.2018
KARL OTS @ KOMPOZURE
• Co-organizer of Finland Azure User Group and IglooConf
• Podcast host at Cloud Gossip
• Working on Azure since 2011
• Patented inventor
• Worked with tens of different customers on full-scale Azure projects,
from startups to Fortune 500 enterprises
Managing Consultant
karl.ots@kompozure.com
+358 50 480 1102
IN THIS SESSION…
• Trusted cloud infrastructure
• Subscription governance
o Policies
o Resource Groups and
Subscriptions as management
level isolation
• Access control
o RBAC
o Azure AD
2 Mil
kilometers
intra-datacenter
fiber
72+
Tb per second
Backbone
100+
datacenters
42
Azure regions
Millions
of servers
ACCESS
APPROVAL
Background check
System
check
PERIMETER
One defined
access point
Video
coverage
Perimeter
fencing
BUILDING
Two-factor
authentication with
biometrics
24x7x365
security
operations Verified single
person entry
SERVER
ENVIRONMENT
Employee &
contractor vetting
Inability to identify location
of specific customer data
Secure
destruction bins
SUBSCRIPTION
MANAGEMENT
Azure security architecture
Azure security architecture
ACCESS CONTROL
ROLE BASED ACCESS CONTROL SCOPES
Subscription
Resource Groups
Resources
RBAC ROLES
Owner
• Can perform all management operations for a resource and its child
resources including access management and granting access to
others.
Contributor
• Can perform all management operations for a resource including
create and delete resources. A contributor cannot grant access to
other.
Reader
• Has read-only access to a resource and its child resources. A reader
cannot read secrets.
RBAC AND POLICIES
Role Based Access
Control (RBAC)
• Controls what actions a
user may take on Azure
resources
Resource Manager
Policies
• Controls what actions
may be taken at a given
scope
RESOURCE POLICIES
• Resource Policies are used for maintaining consistency and enforcing the
governance model.
• Resource Policies are a core governance capability and provide ability
create defined organizational controls on Azure resources which restrict,
enforce or audit certain actions.
• Subscription-scope policies should be used to enforce data location
• Resource-scope policies should be used for appending tags
GEOPOLICY POLICIES
• Customers explicitly control geographic
placement of their assets according to their
sovereignty, security, compliance or latency
policies
• Azure also provides centralized Policy
controls to allow/disallow specific
geographies for all Azure services
RESOURCES
• Azure Trust Center
o https://www.microsoft.com/en-us/TrustCenter/
• Microsoft Azure Security - Getting Started (free Pluralsight course):
o https://www.pluralsight.com/courses/microsoft-azure-security-getting-
started?twoid=43eb6e26-b9fd-4aa0-b88f-2604b82e810f
• Azure Virtual Datacenter (eBook)
o https://azure.microsoft.com/en-us/resources/azure-virtual-
datacenter/en-us/
• PCI-DSS Compliant PaaS Blueprint
o aka.ms/pciblueprints
KOMPOZURE
YOUR AZURE PARTNER
1 sur 15

Recommandé

Azure security and Compliance par
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
695 vues28 diapositives
Azure Identity and access management par
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access managementDinusha Kumarasiri
1.3K vues15 diapositives
Microsoft Azure Security Overview par
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
8.7K vues22 diapositives
Azure governance v4.0 par
Azure governance v4.0Azure governance v4.0
Azure governance v4.0Marcos Oikawa
2.1K vues37 diapositives
Azure Security Overview par
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
1.6K vues44 diapositives
Azure governance par
Azure governanceAzure governance
Azure governancegirish goudar
736 vues32 diapositives

Contenu connexe

Tendances

Power of the cloud - Introduction to azure security par
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure securityBruno Capuano
507 vues55 diapositives
Azure Security Overview par
Azure Security OverviewAzure Security Overview
Azure Security OverviewDavid J Rosenthal
897 vues38 diapositives
Azure Security and Management par
Azure Security and ManagementAzure Security and Management
Azure Security and ManagementAllen Brokken
416 vues45 diapositives
[Azure Governance] Lesson 1 : Azure Naming Convention par
[Azure Governance] Lesson 1 : Azure Naming Convention[Azure Governance] Lesson 1 : Azure Naming Convention
[Azure Governance] Lesson 1 : Azure Naming Convention☁ Hicham KADIRI ☁
8.6K vues25 diapositives
Azure Migrate par
Azure MigrateAzure Migrate
Azure MigrateMustafa
4.6K vues19 diapositives
Security Architectures on AWS par
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWSAmazon Web Services
799 vues23 diapositives

Tendances(20)

Power of the cloud - Introduction to azure security par Bruno Capuano
Power of the cloud - Introduction to azure securityPower of the cloud - Introduction to azure security
Power of the cloud - Introduction to azure security
Bruno Capuano507 vues
Azure Security and Management par Allen Brokken
Azure Security and ManagementAzure Security and Management
Azure Security and Management
Allen Brokken416 vues
Azure Migrate par Mustafa
Azure MigrateAzure Migrate
Azure Migrate
Mustafa 4.6K vues
AZ-900 Azure Fundamentals.pdf par ssuser5813861
AZ-900 Azure Fundamentals.pdfAZ-900 Azure Fundamentals.pdf
AZ-900 Azure Fundamentals.pdf
ssuser58138612.7K vues
Stephane Lapointe: Governance in Azure, keep control of your environments par MSDEVMTL
Stephane Lapointe: Governance in Azure, keep control of your environmentsStephane Lapointe: Governance in Azure, keep control of your environments
Stephane Lapointe: Governance in Azure, keep control of your environments
MSDEVMTL416 vues
Azure Key Vault - Getting Started par Taswar Bhatti
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
Taswar Bhatti4.6K vues
Building an Enterprise-Grade Azure Governance Model par Karl Ots
Building an Enterprise-Grade Azure Governance ModelBuilding an Enterprise-Grade Azure Governance Model
Building an Enterprise-Grade Azure Governance Model
Karl Ots1.6K vues
Getting Started with AWS Database Migration Service par Amazon Web Services
Getting Started with AWS Database Migration ServiceGetting Started with AWS Database Migration Service
Getting Started with AWS Database Migration Service
Microsoft Cloud Adoption Framework for Azure: Governance Conversation par Nicholas Vossburg
Microsoft Cloud Adoption Framework for Azure: Governance ConversationMicrosoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Microsoft Azure - Introduction to microsoft's public cloud par Atanas Gergiminov
Microsoft Azure - Introduction to microsoft's public cloudMicrosoft Azure - Introduction to microsoft's public cloud
Microsoft Azure - Introduction to microsoft's public cloud
Atanas Gergiminov5.3K vues
Best Practices in Cloud Security par Alert Logic
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
Alert Logic 564 vues
Migrating On-Premises Workloads with Azure Migrate par Dinusha Kumarasiri
Migrating On-Premises Workloads with Azure MigrateMigrating On-Premises Workloads with Azure Migrate
Migrating On-Premises Workloads with Azure Migrate

Similaire à Azure security architecture

Azure security architecture / FAUG JKL 15.2.2018 par
Azure security architecture / FAUG JKL 15.2.2018Azure security architecture / FAUG JKL 15.2.2018
Azure security architecture / FAUG JKL 15.2.2018Karl Ots
151 vues14 diapositives
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise par
Techorama Belgium 2019 - Building an Azure Governance model for the EnterpriseTechorama Belgium 2019 - Building an Azure Governance model for the Enterprise
Techorama Belgium 2019 - Building an Azure Governance model for the EnterpriseKarl Ots
431 vues33 diapositives
TechDays Finland 2020: Azuren tietoturva haltuun! par
TechDays Finland 2020: Azuren tietoturva haltuun!TechDays Finland 2020: Azuren tietoturva haltuun!
TechDays Finland 2020: Azuren tietoturva haltuun!Karl Ots
269 vues41 diapositives
FAUG #9: Azure security architecture and stories from the trenches par
FAUG #9: Azure security architecture and stories from the trenchesFAUG #9: Azure security architecture and stories from the trenches
FAUG #9: Azure security architecture and stories from the trenchesKarl Ots
199 vues18 diapositives
Introducing Azure Arc par
Introducing Azure ArcIntroducing Azure Arc
Introducing Azure ArcMohamed Wali
246 vues18 diapositives
Improving Application Security With Azure par
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With AzureSoftchoice Corporation
915 vues25 diapositives

Similaire à Azure security architecture(20)

Azure security architecture / FAUG JKL 15.2.2018 par Karl Ots
Azure security architecture / FAUG JKL 15.2.2018Azure security architecture / FAUG JKL 15.2.2018
Azure security architecture / FAUG JKL 15.2.2018
Karl Ots151 vues
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise par Karl Ots
Techorama Belgium 2019 - Building an Azure Governance model for the EnterpriseTechorama Belgium 2019 - Building an Azure Governance model for the Enterprise
Techorama Belgium 2019 - Building an Azure Governance model for the Enterprise
Karl Ots431 vues
TechDays Finland 2020: Azuren tietoturva haltuun! par Karl Ots
TechDays Finland 2020: Azuren tietoturva haltuun!TechDays Finland 2020: Azuren tietoturva haltuun!
TechDays Finland 2020: Azuren tietoturva haltuun!
Karl Ots269 vues
FAUG #9: Azure security architecture and stories from the trenches par Karl Ots
FAUG #9: Azure security architecture and stories from the trenchesFAUG #9: Azure security architecture and stories from the trenches
FAUG #9: Azure security architecture and stories from the trenches
Karl Ots199 vues
Ready.Set.Cloud - Enterprise Cloud Migration Framework par Idan Tohami
Ready.Set.Cloud - Enterprise Cloud Migration FrameworkReady.Set.Cloud - Enterprise Cloud Migration Framework
Ready.Set.Cloud - Enterprise Cloud Migration Framework
Idan Tohami176 vues
IglooConf 2019 Secure your Azure applications like a pro par Karl Ots
IglooConf 2019 Secure your Azure applications like a proIglooConf 2019 Secure your Azure applications like a pro
IglooConf 2019 Secure your Azure applications like a pro
Karl Ots198 vues
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud par Susan Wu
Interop ITX: Moving applications: From Legacy to Cloud-to-CloudInterop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Susan Wu378 vues
Five Tips for Running Cloudera on AWS par Cloudera, Inc.
Five Tips for Running Cloudera on AWSFive Tips for Running Cloudera on AWS
Five Tips for Running Cloudera on AWS
Cloudera, Inc.6.1K vues
IT Camp 19: Top Azure security fails and how to avoid them par Karl Ots
IT Camp 19: Top Azure security fails and how to avoid themIT Camp 19: Top Azure security fails and how to avoid them
IT Camp 19: Top Azure security fails and how to avoid them
Karl Ots457 vues
DevSum - Top Azure security fails and how to avoid them par Karl Ots
DevSum - Top Azure security fails and how to avoid themDevSum - Top Azure security fails and how to avoid them
DevSum - Top Azure security fails and how to avoid them
Karl Ots533 vues
Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec... par AzureEzy1
Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec...Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec...
Az 900 Session 3 Security, privacy, compliance, trust, pricing, SLA and Lifec...
AzureEzy15.2K vues
Azure Security Check List - Final.pdf par Okan YILDIZ
Azure Security Check List - Final.pdfAzure Security Check List - Final.pdf
Azure Security Check List - Final.pdf
Okan YILDIZ36 vues
Azure Governance for Enterprise par Mohit Chhabra
Azure Governance for EnterpriseAzure Governance for Enterprise
Azure Governance for Enterprise
Mohit Chhabra137 vues
Securing Azure Infrastructure par Karl Ots
Securing Azure InfrastructureSecuring Azure Infrastructure
Securing Azure Infrastructure
Karl Ots136 vues
Azure Meetup: Keep your secrets and configurations safe in azure! par dotnetcode
Azure Meetup: Keep your secrets and configurations safe in azure!Azure Meetup: Keep your secrets and configurations safe in azure!
Azure Meetup: Keep your secrets and configurations safe in azure!
dotnetcode92 vues

Plus de Karl Ots

TechDays Finland 2020: Best practices of securing web applications running on... par
TechDays Finland 2020: Best practices of securing web applications running on...TechDays Finland 2020: Best practices of securing web applications running on...
TechDays Finland 2020: Best practices of securing web applications running on...Karl Ots
552 vues39 diapositives
IglooConf 2020: Best practices of securing web applications running on Azure ... par
IglooConf 2020: Best practices of securing web applications running on Azure ...IglooConf 2020: Best practices of securing web applications running on Azure ...
IglooConf 2020: Best practices of securing web applications running on Azure ...Karl Ots
521 vues43 diapositives
CloudBurst Malmö: Best practices of securing web applications running on Azur... par
CloudBurst Malmö: Best practices of securing web applications running on Azur...CloudBurst Malmö: Best practices of securing web applications running on Azur...
CloudBurst Malmö: Best practices of securing web applications running on Azur...Karl Ots
793 vues39 diapositives
FAUG Jyväskylä 28.5.2019 - Azure Monitoring par
FAUG Jyväskylä 28.5.2019 - Azure MonitoringFAUG Jyväskylä 28.5.2019 - Azure Monitoring
FAUG Jyväskylä 28.5.2019 - Azure MonitoringKarl Ots
240 vues21 diapositives
Techorama Belgium 2019: top Azure security fails and how to avoid them par
Techorama Belgium 2019: top Azure security fails and how to avoid themTechorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid themKarl Ots
300 vues31 diapositives
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid... par
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...Karl Ots
469 vues18 diapositives

Plus de Karl Ots(20)

TechDays Finland 2020: Best practices of securing web applications running on... par Karl Ots
TechDays Finland 2020: Best practices of securing web applications running on...TechDays Finland 2020: Best practices of securing web applications running on...
TechDays Finland 2020: Best practices of securing web applications running on...
Karl Ots552 vues
IglooConf 2020: Best practices of securing web applications running on Azure ... par Karl Ots
IglooConf 2020: Best practices of securing web applications running on Azure ...IglooConf 2020: Best practices of securing web applications running on Azure ...
IglooConf 2020: Best practices of securing web applications running on Azure ...
Karl Ots521 vues
CloudBurst Malmö: Best practices of securing web applications running on Azur... par Karl Ots
CloudBurst Malmö: Best practices of securing web applications running on Azur...CloudBurst Malmö: Best practices of securing web applications running on Azur...
CloudBurst Malmö: Best practices of securing web applications running on Azur...
Karl Ots793 vues
FAUG Jyväskylä 28.5.2019 - Azure Monitoring par Karl Ots
FAUG Jyväskylä 28.5.2019 - Azure MonitoringFAUG Jyväskylä 28.5.2019 - Azure Monitoring
FAUG Jyväskylä 28.5.2019 - Azure Monitoring
Karl Ots240 vues
Techorama Belgium 2019: top Azure security fails and how to avoid them par Karl Ots
Techorama Belgium 2019: top Azure security fails and how to avoid themTechorama Belgium 2019: top Azure security fails and how to avoid them
Techorama Belgium 2019: top Azure security fails and how to avoid them
Karl Ots300 vues
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid... par Karl Ots
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
ISC2 Secure Summit EMEA - Top Microsoft Azure security fails and how to avoid...
Karl Ots469 vues
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha... par Karl Ots
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
Azure Low Lands 2018: Monitoring real life Azure applications when to use wha...
Karl Ots293 vues
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an... par Karl Ots
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
UpdateConf 2018: Monitoring real-life Azure applications: When to use what an...
Karl Ots134 vues
UpdateConf 2018: Top 18 Azure security fails and how to avoid them par Karl Ots
UpdateConf 2018: Top 18 Azure security fails and how to avoid themUpdateConf 2018: Top 18 Azure security fails and how to avoid them
UpdateConf 2018: Top 18 Azure security fails and how to avoid them
Karl Ots139 vues
Top Azure security fails and how to avoid them par Karl Ots
Top Azure security fails and how to avoid themTop Azure security fails and how to avoid them
Top Azure security fails and how to avoid them
Karl Ots238 vues
Top 18 azure security fails and how to avoid them par Karl Ots
Top 18 azure security fails and how to avoid themTop 18 azure security fails and how to avoid them
Top 18 azure security fails and how to avoid them
Karl Ots223 vues
Monitoring real-life Azure applications: When to use what and why par Karl Ots
Monitoring real-life Azure applications: When to use what and whyMonitoring real-life Azure applications: When to use what and why
Monitoring real-life Azure applications: When to use what and why
Karl Ots624 vues
Azure Saturday: Security + DevOps + Azure = Awesomeness par Karl Ots
Azure Saturday: Security + DevOps + Azure = AwesomenessAzure Saturday: Security + DevOps + Azure = Awesomeness
Azure Saturday: Security + DevOps + Azure = Awesomeness
Karl Ots841 vues
Navigating in the sea of containers in azure when to choose which service and... par Karl Ots
Navigating in the sea of containers in azure when to choose which service and...Navigating in the sea of containers in azure when to choose which service and...
Navigating in the sea of containers in azure when to choose which service and...
Karl Ots188 vues
Kubernetes in Azure par Karl Ots
Kubernetes in AzureKubernetes in Azure
Kubernetes in Azure
Karl Ots1.2K vues
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness par Karl Ots
CloudBrew 2017 - Security + DevOps + Azure = AwesomenessCloudBrew 2017 - Security + DevOps + Azure = Awesomeness
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
Karl Ots281 vues
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200 par Karl Ots
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
Monitoring advanced Azure PaaS workloads in the enterprise - Level: 200
Karl Ots847 vues
Building globally scalable media solutions with Azure Media Services part 2 par Karl Ots
Building globally scalable media solutions with Azure Media Services part 2Building globally scalable media solutions with Azure Media Services part 2
Building globally scalable media solutions with Azure Media Services part 2
Karl Ots229 vues
Security + DevOps + Azure = Awesomeness par Karl Ots
Security + DevOps + Azure = AwesomenessSecurity + DevOps + Azure = Awesomeness
Security + DevOps + Azure = Awesomeness
Karl Ots461 vues
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ... par Karl Ots
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
Sovellusmodernisoinnin webinaarisarja, osa 3: modernisoidun sovelluksen integ...
Karl Ots15 vues

Dernier

The Importance of Cybersecurity for Digital Transformation par
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital TransformationNUS-ISS
27 vues26 diapositives
Future of Learning - Khoong Chan Meng par
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan MengNUS-ISS
33 vues7 diapositives
Uni Systems for Power Platform.pptx par
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
50 vues21 diapositives
Attacking IoT Devices from a Web Perspective - Linux Day par
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 vues68 diapositives
Understanding GenAI/LLM and What is Google Offering - Felix Goh par
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix GohNUS-ISS
41 vues33 diapositives
handbook for web 3 adoption.pdf par
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdfLiveplex
19 vues16 diapositives

Dernier(20)

The Importance of Cybersecurity for Digital Transformation par NUS-ISS
The Importance of Cybersecurity for Digital TransformationThe Importance of Cybersecurity for Digital Transformation
The Importance of Cybersecurity for Digital Transformation
NUS-ISS27 vues
Future of Learning - Khoong Chan Meng par NUS-ISS
Future of Learning - Khoong Chan MengFuture of Learning - Khoong Chan Meng
Future of Learning - Khoong Chan Meng
NUS-ISS33 vues
Attacking IoT Devices from a Web Perspective - Linux Day par Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 vues
Understanding GenAI/LLM and What is Google Offering - Felix Goh par NUS-ISS
Understanding GenAI/LLM and What is Google Offering - Felix GohUnderstanding GenAI/LLM and What is Google Offering - Felix Goh
Understanding GenAI/LLM and What is Google Offering - Felix Goh
NUS-ISS41 vues
handbook for web 3 adoption.pdf par Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex19 vues
PharoJS - Zürich Smalltalk Group Meetup November 2023 par Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi120 vues
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze par NUS-ISS
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng TszeDigital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
Digital Product-Centric Enterprise and Enterprise Architecture - Tan Eng Tsze
NUS-ISS19 vues
Special_edition_innovator_2023.pdf par WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2216 vues
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica... par NUS-ISS
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
Emerging & Future Technology - How to Prepare for the Next 10 Years of Radica...
NUS-ISS16 vues
STPI OctaNE CoE Brochure.pdf par madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb12 vues
Empathic Computing: Delivering the Potential of the Metaverse par Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Combining Orchestration and Choreography for a Clean Architecture par ThomasHeinrichs1
Combining Orchestration and Choreography for a Clean ArchitectureCombining Orchestration and Choreography for a Clean Architecture
Combining Orchestration and Choreography for a Clean Architecture
Voice Logger - Telephony Integration Solution at Aegis par Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma17 vues
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen... par NUS-ISS
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
Upskilling the Evolving Workforce with Digital Fluency for Tomorrow's Challen...
NUS-ISS28 vues
Business Analyst Series 2023 - Week 3 Session 5 par DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10209 vues
The details of description: Techniques, tips, and tangents on alternative tex... par BookNet Canada
The details of description: Techniques, tips, and tangents on alternative tex...The details of description: Techniques, tips, and tangents on alternative tex...
The details of description: Techniques, tips, and tangents on alternative tex...
BookNet Canada121 vues

Azure security architecture

  • 2. KARL OTS @ KOMPOZURE • Co-organizer of Finland Azure User Group and IglooConf • Podcast host at Cloud Gossip • Working on Azure since 2011 • Patented inventor • Worked with tens of different customers on full-scale Azure projects, from startups to Fortune 500 enterprises Managing Consultant karl.ots@kompozure.com +358 50 480 1102
  • 3. IN THIS SESSION… • Trusted cloud infrastructure • Subscription governance o Policies o Resource Groups and Subscriptions as management level isolation • Access control o RBAC o Azure AD
  • 4. 2 Mil kilometers intra-datacenter fiber 72+ Tb per second Backbone 100+ datacenters 42 Azure regions Millions of servers ACCESS APPROVAL Background check System check PERIMETER One defined access point Video coverage Perimeter fencing BUILDING Two-factor authentication with biometrics 24x7x365 security operations Verified single person entry SERVER ENVIRONMENT Employee & contractor vetting Inability to identify location of specific customer data Secure destruction bins
  • 9. ROLE BASED ACCESS CONTROL SCOPES Subscription Resource Groups Resources
  • 10. RBAC ROLES Owner • Can perform all management operations for a resource and its child resources including access management and granting access to others. Contributor • Can perform all management operations for a resource including create and delete resources. A contributor cannot grant access to other. Reader • Has read-only access to a resource and its child resources. A reader cannot read secrets.
  • 11. RBAC AND POLICIES Role Based Access Control (RBAC) • Controls what actions a user may take on Azure resources Resource Manager Policies • Controls what actions may be taken at a given scope
  • 12. RESOURCE POLICIES • Resource Policies are used for maintaining consistency and enforcing the governance model. • Resource Policies are a core governance capability and provide ability create defined organizational controls on Azure resources which restrict, enforce or audit certain actions. • Subscription-scope policies should be used to enforce data location • Resource-scope policies should be used for appending tags
  • 13. GEOPOLICY POLICIES • Customers explicitly control geographic placement of their assets according to their sovereignty, security, compliance or latency policies • Azure also provides centralized Policy controls to allow/disallow specific geographies for all Azure services
  • 14. RESOURCES • Azure Trust Center o https://www.microsoft.com/en-us/TrustCenter/ • Microsoft Azure Security - Getting Started (free Pluralsight course): o https://www.pluralsight.com/courses/microsoft-azure-security-getting- started?twoid=43eb6e26-b9fd-4aa0-b88f-2604b82e810f • Azure Virtual Datacenter (eBook) o https://azure.microsoft.com/en-us/resources/azure-virtual- datacenter/en-us/ • PCI-DSS Compliant PaaS Blueprint o aka.ms/pciblueprints