SlideShare a Scribd company logo
TRACK:
Introduction
to the Azure
Cloud
An IT Operations perspective
Introduction to Microsoft Azure Security
TRACK:
Introduction
to the Azure
Cloud @CloudPowerUs
er
TRACK:
Introduction
to the Azure
Cloud
Thank you to our Sponsors!
Power of the Cloud
Microsoft Cloud Power User Conference
@CloudPowerUs
er
TRACK:
Introduction
to the Azure
Cloud
Who we are
Adin Ermie
• Manager, Cloud Infrastructure Consulting @ Avanade
• Cloud Solutions Architect (Datacenter/Azure)
• Azure (IaaS, PaaS, Recovery Services)
• Operations Management Suite (OMS), Azure Monitor,
Azure Security Center (ASC)
• 3x MVP - Cloud and Datacenter Management (CDM)
Adin.Ermie@outlook.com
@AdinErmie
https://AdinErmie.com
https://www.linkedin.com/in/adinermie
TRACK:
Introduction
to the Azure
Cloud
S.E.C.U.R.I.T.Y
What do you think of when you hear this word?
IDENTITY & ACCESS DATA ENCRYPTION
ENCRYPTION KEY
MANAGEMENT
NETWORK SECURITY
THREAT
PROTECTION &
SECURITY MGMT
ENVIRONMENT
PROTECTION
TRACK:
Introduction
to the Azure
Cloud
Security Topics
Vague and nebulous
TRACK:
Introduction
to the Azure
Cloud
IDENTITY &
ACCESS
• Azure Active
Directory (AAD)
• Azure Information
Protection (AIP)
• Identity and
Access
Management
(IAM)
• Privileged Identity
Management
(PIM)
• Business-to-
Business (B2B)
• Business-to-
Consumer (B2C)
DATA
ENCRYPTION
• Azure Storage
Encryption (ASE)
• Azure Disk
Encryption (ADE)
• SSL / TLS
ENCRYPTION KEY
MANAGEMENT
• Azure Key Vault
• Certificates
• Secrets /
Passphrases
• Secure Credentials
NETWORK
SECURITY
• Azure Advanced
Threat Protection
(ATP)
• Network Security
Groups (NSGs)
• Application
Security Groups
(ASGs)
• DDos Protection
Plans
• Azure Service
Endpoints
• Site-to-Site VPNs
/ Express Route
THREAT
PROTECTION &
SECURITY MGMT
• Azure Security
Center (ASC)
• Threat Intelligence
• Log Analytics (LA)
/ Operation
Management
Suite (OMS)
ENVIRONMENT
PROTECTION
• Azure Policy
• Resource Group
Locks
• Azure Backup
• Cloud App
Security (CAS)
• Enterprise
Mobility and
Security (EMS)
• Intune
• Internet of Things
(IOT)
TRACK:
Introduction
to the Azure
Cloud
Security Fundaments
Design, Code, Environment, Operations
Secure
by design
Secure
the code
Secure the
environment
Secure the
operations
TRACK:
Introduction
to the Azure
Cloud
• Security Perspectives:
• IT Operations
• Identity
• Data
• Network
• Resources
What we will cover…
©2017 Avanade Inc. All Rights Reserved.
Secure your IT resources with Azure
Security Center
TRACK:
Introduction
to the Azure
Cloud
Hybrid cloud
requires a new
approach for
security
Distributed
infrastructure
Rapidly changing
cloud resources
Increasingly
sophisticated threats
TRACK:
Introduction
to the Azure
Cloud
Microsoft Azure Security Center
Unify security management and enable advanced threat protection for hybrid cloud workloads
Dynamically discover and manage the
security of your hybrid cloud workloads
in a single cloud-based console
TRACK:
Introduction
to the Azure
Cloud
Understand security state across
hybrid workloads
Built-in Azure, no setup required
Automatically discover
and monitor security of
Azure resources
Gain insights for hybrid resources
Easily onboard resources running
in other clouds and on-premises
TRACK:
Introduction
to the Azure
Cloud
Central policy management
Define a security policy for each
subscription in Security Center
Apply across multiple subscriptions
using Azure Management Groups
Ensure compliance with
policy management
TRACK:
Introduction
to the Azure
Cloud
Gain deeper insights with
integrated log analytics
Quickly identify list of notable
events that require your attention
Out of the box notable events in
dashboard or create custom
queries
Search and analyze security data
using a flexible query language
Use built-in or custom queries with
Log Analytics search
TRACK:
Introduction
to the Azure
Cloud
Integrated partners
Connected security solutions
running in Azure, e.g. firewalls
and antimalware solutions
Microsoft security
Azure Active Directory
Information Protection
Advanced Threat Analytics
Many others
Any security solution that
supports Common Event Format
(CEF)
Analyze security information
from variety of sources
Enable actionable, adaptive protections
that identify and mitigate risk to reduce
exposure to attacks
TRACK:
Introduction
to the Azure
Cloud
Identify and remediate
vulnerabilities quickly
Continuous assessment of
machines, networks, and
Azure services
Hundreds of built-in security
assessments, or create your
own
Fix vulnerabilities quickly
Prioritized, actionable security
recommendations
TRACK:
Introduction
to the Azure
Cloud
Limit exposure to brute-force
attacks
Lock down ports on virtual machines
Enable just-in-time access
to virtual machines
Access automatically granted
for limited time
TRACK:
Introduction
to the Azure
Cloud
Block malware and other
unwanted applications
Allow safe applications only
Adaptive whitelisting learns
application patterns
Simplified management with
recommended whitelists
Use advanced analytics and Microsoft
Intelligent Security Graph to rapidly detect and
respond to evolving cyber threats
TRACK:
Introduction
to the Azure
Cloud
Built-in Intelligence and
advanced analytics
Partners
Integrates alerts from partner
solutions, like firewalls and
antimalware Fusion
Combines events and alerts from across
the kill chain to map the attack timeline
Behavioral analytics
Looks for known patterns
and malicious behaviours
Threat intelligence
Looks for known malicious
actors using Microsoft
global threat intelligence
Anomaly detection
Uses statistical profiling to build
historical baselines
Alerts on deviations that conform to
a potential attack vector
TRACK:
Introduction
to the Azure
Cloud
Detect threats across the
kill chain
Target and attack
Inbound brute-force RDP,
SSH,
SQL attacks and more
Application and DDoS attacks
(WAF partners)
Intrusion detection
(NG Firewall partners)
Install and exploit
In-memory malware and
exploit attempts
Suspicious process execution
Lateral movement
Internal reconnaissance
Communication to a known
malicious IP (data exfiltration or
command and control)
Using compromised resources to
mount additional attacks (outbound
port scanning, brute-force RDP/SSH
attacks, DDoS, and spam)
Post breach
TRACK:
Introduction
to the Azure
Cloud
Get prioritized security alerts
Details about detected threats
and recommendations
Detect threats across the kill chain
Alerts that conform to kill
chain patterns are fused into
a single incident
Focus on the most
critical threats
TRACK:
Introduction
to the Azure
Cloud
Gain valuable insights
about attackers
Visualize source of attacks with
interactive map
Analyzes data from your
computers and firewalls logs
Gain insights through threat
reports
Attacker’s known objectives,
tactics, and techniques
TRACK:
Introduction
to the Azure
Cloud
Simplify security operations
and investigation
Quickly assess the scope and
impact of an attack
Interactive experience to
explore links across alerts,
computers and users
Use predefined or ad hoc
queries for deeper
examination
TRACK:
Introduction
to the Azure
Cloud
Respond quickly to threats
Automate and orchestrate common
security workflows
Create playbooks with integration
of Azure Logic Apps
Trigger workflows from any alert
to enable conditional actions
TRACK:
Introduction
to the Azure
Cloud
Thank you
Adin Ermie
Adin.Ermie@outlook.com
@AdinErmie
https://AdinErmie.com
https://www.linkedin.com/in/adinermie
Thank you

More Related Content

PDF
Microsoft Azure Security Overview
PPTX
CSS17: DC - The AWS Shared Responsibility Model in Practice
PDF
Building an Enterprise-Grade Azure Governance Model
PDF
Building a Hyper Secure VPC on AWS with Puppet
PDF
AWS Shared Security Model in Practice
PDF
Amazon Web Services Security
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PPTX
Securing your cloud perimeter with azure network security brk3185
Microsoft Azure Security Overview
CSS17: DC - The AWS Shared Responsibility Model in Practice
Building an Enterprise-Grade Azure Governance Model
Building a Hyper Secure VPC on AWS with Puppet
AWS Shared Security Model in Practice
Amazon Web Services Security
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Securing your cloud perimeter with azure network security brk3185

What's hot (6)

PPTX
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
PPTX
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
PPTX
Trust No-One Architecture For Services And Data
PDF
Azure DDoS Protection Standard
PPTX
Shared Security Responsibility for the Azure Cloud
PDF
AWS Security Best Practices (March 2017)
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
Trust No-One Architecture For Services And Data
Azure DDoS Protection Standard
Shared Security Responsibility for the Azure Cloud
AWS Security Best Practices (March 2017)
Ad

Similar to Power of the Cloud - Introduction to Microsoft Azure Security (20)

PPTX
Power of the cloud - Introduction to azure security
PDF
Azure Security Center
PDF
366864108 azure-security
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PPTX
Secure hybrid workload with azure
PDF
Azure Security Overview
PDF
do you want to know about what is Microsoft Sentinel.pdf
PPTX
SC-900 Capabilities of Microsoft Security Solutions
PPTX
Azure Security Center- Zero to Hero
PDF
Azure governance v4.0
PDF
Microsoft Azure Cloud Services
PDF
Nicholas DiCola | Secure your IT resources with Azure Security Center
PPTX
Azure Security Center
PPTX
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
PDF
Tour to Azure Security Center
PPTX
Enter The Matrix Securing Azure’s Assets
PPTX
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PDF
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
PPTX
Cloudbrew 2019 - Azure Security
Power of the cloud - Introduction to azure security
Azure Security Center
366864108 azure-security
Global Azure Bootcamp 2018 - Azure Security Center
Secure hybrid workload with azure
Azure Security Overview
do you want to know about what is Microsoft Sentinel.pdf
SC-900 Capabilities of Microsoft Security Solutions
Azure Security Center- Zero to Hero
Azure governance v4.0
Microsoft Azure Cloud Services
Nicholas DiCola | Secure your IT resources with Azure Security Center
Azure Security Center
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Tour to Azure Security Center
Enter The Matrix Securing Azure’s Assets
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
Cloudbrew 2019 - Azure Security
Ad

More from Adin Ermie (7)

PPTX
Deploying Azure DevOps using Terraform
PPTX
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)
PPTX
Infrastructure-as-Code (IaC) Using Terraform (Intermediate Edition)
PPTX
Infrastructure-as-Code (IaC) using Terraform
PPTX
Global Azure Bootcamp 2018 - Azure Resource Manager (ARM)
PPTX
Global Azure Bootcamp 2017 - Performance and Health Management for Modern App...
PPTX
The Azure Group - Azure Network Watcher
Deploying Azure DevOps using Terraform
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)
Infrastructure-as-Code (IaC) Using Terraform (Intermediate Edition)
Infrastructure-as-Code (IaC) using Terraform
Global Azure Bootcamp 2018 - Azure Resource Manager (ARM)
Global Azure Bootcamp 2017 - Performance and Health Management for Modern App...
The Azure Group - Azure Network Watcher

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Advanced IT Governance
PDF
Electronic commerce courselecture one. Pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
“AI and Expert System Decision Support & Business Intelligence Systems”
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
Advanced IT Governance
Electronic commerce courselecture one. Pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Big Data Technologies - Introduction.pptx

Power of the Cloud - Introduction to Microsoft Azure Security

  • 1. TRACK: Introduction to the Azure Cloud An IT Operations perspective Introduction to Microsoft Azure Security TRACK: Introduction to the Azure Cloud @CloudPowerUs er
  • 2. TRACK: Introduction to the Azure Cloud Thank you to our Sponsors! Power of the Cloud Microsoft Cloud Power User Conference @CloudPowerUs er
  • 3. TRACK: Introduction to the Azure Cloud Who we are Adin Ermie • Manager, Cloud Infrastructure Consulting @ Avanade • Cloud Solutions Architect (Datacenter/Azure) • Azure (IaaS, PaaS, Recovery Services) • Operations Management Suite (OMS), Azure Monitor, Azure Security Center (ASC) • 3x MVP - Cloud and Datacenter Management (CDM) Adin.Ermie@outlook.com @AdinErmie https://AdinErmie.com https://www.linkedin.com/in/adinermie
  • 4. TRACK: Introduction to the Azure Cloud S.E.C.U.R.I.T.Y What do you think of when you hear this word? IDENTITY & ACCESS DATA ENCRYPTION ENCRYPTION KEY MANAGEMENT NETWORK SECURITY THREAT PROTECTION & SECURITY MGMT ENVIRONMENT PROTECTION
  • 5. TRACK: Introduction to the Azure Cloud Security Topics Vague and nebulous TRACK: Introduction to the Azure Cloud IDENTITY & ACCESS • Azure Active Directory (AAD) • Azure Information Protection (AIP) • Identity and Access Management (IAM) • Privileged Identity Management (PIM) • Business-to- Business (B2B) • Business-to- Consumer (B2C) DATA ENCRYPTION • Azure Storage Encryption (ASE) • Azure Disk Encryption (ADE) • SSL / TLS ENCRYPTION KEY MANAGEMENT • Azure Key Vault • Certificates • Secrets / Passphrases • Secure Credentials NETWORK SECURITY • Azure Advanced Threat Protection (ATP) • Network Security Groups (NSGs) • Application Security Groups (ASGs) • DDos Protection Plans • Azure Service Endpoints • Site-to-Site VPNs / Express Route THREAT PROTECTION & SECURITY MGMT • Azure Security Center (ASC) • Threat Intelligence • Log Analytics (LA) / Operation Management Suite (OMS) ENVIRONMENT PROTECTION • Azure Policy • Resource Group Locks • Azure Backup • Cloud App Security (CAS) • Enterprise Mobility and Security (EMS) • Intune • Internet of Things (IOT)
  • 6. TRACK: Introduction to the Azure Cloud Security Fundaments Design, Code, Environment, Operations Secure by design Secure the code Secure the environment Secure the operations
  • 7. TRACK: Introduction to the Azure Cloud • Security Perspectives: • IT Operations • Identity • Data • Network • Resources What we will cover… ©2017 Avanade Inc. All Rights Reserved.
  • 8. Secure your IT resources with Azure Security Center
  • 9. TRACK: Introduction to the Azure Cloud Hybrid cloud requires a new approach for security Distributed infrastructure Rapidly changing cloud resources Increasingly sophisticated threats
  • 10. TRACK: Introduction to the Azure Cloud Microsoft Azure Security Center Unify security management and enable advanced threat protection for hybrid cloud workloads
  • 11. Dynamically discover and manage the security of your hybrid cloud workloads in a single cloud-based console
  • 12. TRACK: Introduction to the Azure Cloud Understand security state across hybrid workloads Built-in Azure, no setup required Automatically discover and monitor security of Azure resources Gain insights for hybrid resources Easily onboard resources running in other clouds and on-premises
  • 13. TRACK: Introduction to the Azure Cloud Central policy management Define a security policy for each subscription in Security Center Apply across multiple subscriptions using Azure Management Groups Ensure compliance with policy management
  • 14. TRACK: Introduction to the Azure Cloud Gain deeper insights with integrated log analytics Quickly identify list of notable events that require your attention Out of the box notable events in dashboard or create custom queries Search and analyze security data using a flexible query language Use built-in or custom queries with Log Analytics search
  • 15. TRACK: Introduction to the Azure Cloud Integrated partners Connected security solutions running in Azure, e.g. firewalls and antimalware solutions Microsoft security Azure Active Directory Information Protection Advanced Threat Analytics Many others Any security solution that supports Common Event Format (CEF) Analyze security information from variety of sources
  • 16. Enable actionable, adaptive protections that identify and mitigate risk to reduce exposure to attacks
  • 17. TRACK: Introduction to the Azure Cloud Identify and remediate vulnerabilities quickly Continuous assessment of machines, networks, and Azure services Hundreds of built-in security assessments, or create your own Fix vulnerabilities quickly Prioritized, actionable security recommendations
  • 18. TRACK: Introduction to the Azure Cloud Limit exposure to brute-force attacks Lock down ports on virtual machines Enable just-in-time access to virtual machines Access automatically granted for limited time
  • 19. TRACK: Introduction to the Azure Cloud Block malware and other unwanted applications Allow safe applications only Adaptive whitelisting learns application patterns Simplified management with recommended whitelists
  • 20. Use advanced analytics and Microsoft Intelligent Security Graph to rapidly detect and respond to evolving cyber threats
  • 21. TRACK: Introduction to the Azure Cloud Built-in Intelligence and advanced analytics Partners Integrates alerts from partner solutions, like firewalls and antimalware Fusion Combines events and alerts from across the kill chain to map the attack timeline Behavioral analytics Looks for known patterns and malicious behaviours Threat intelligence Looks for known malicious actors using Microsoft global threat intelligence Anomaly detection Uses statistical profiling to build historical baselines Alerts on deviations that conform to a potential attack vector
  • 22. TRACK: Introduction to the Azure Cloud Detect threats across the kill chain Target and attack Inbound brute-force RDP, SSH, SQL attacks and more Application and DDoS attacks (WAF partners) Intrusion detection (NG Firewall partners) Install and exploit In-memory malware and exploit attempts Suspicious process execution Lateral movement Internal reconnaissance Communication to a known malicious IP (data exfiltration or command and control) Using compromised resources to mount additional attacks (outbound port scanning, brute-force RDP/SSH attacks, DDoS, and spam) Post breach
  • 23. TRACK: Introduction to the Azure Cloud Get prioritized security alerts Details about detected threats and recommendations Detect threats across the kill chain Alerts that conform to kill chain patterns are fused into a single incident Focus on the most critical threats
  • 24. TRACK: Introduction to the Azure Cloud Gain valuable insights about attackers Visualize source of attacks with interactive map Analyzes data from your computers and firewalls logs Gain insights through threat reports Attacker’s known objectives, tactics, and techniques
  • 25. TRACK: Introduction to the Azure Cloud Simplify security operations and investigation Quickly assess the scope and impact of an attack Interactive experience to explore links across alerts, computers and users Use predefined or ad hoc queries for deeper examination
  • 26. TRACK: Introduction to the Azure Cloud Respond quickly to threats Automate and orchestrate common security workflows Create playbooks with integration of Azure Logic Apps Trigger workflows from any alert to enable conditional actions
  • 27. TRACK: Introduction to the Azure Cloud Thank you Adin Ermie Adin.Ermie@outlook.com @AdinErmie https://AdinErmie.com https://www.linkedin.com/in/adinermie