SlideShare a Scribd company logo
TRACK:
Introduction
to the Azure
Cloud
A Developer and IT Operations perspective
Introduction to Microsoft Azure Security
TRACK:
Introduction
to the Azure
Cloud @CloudPowerUs
er
TRACK:
Introduction
to the Azure
Cloud
Thank you to our Sponsors!
Power of the Cloud
Microsoft Cloud Power User Conference
@CloudPowerUs
er
TRACK:
Introduction
to the Azure
Cloud
Who we are
Bruno Capuano
• Group Manager, Regional Innovation Lead @ Avanade
• Artificial Intelligence
• Machine Learning
• Application Lifecycle Management
• 11x MVP - Visual Studio and Development Technologies,
Windows Development
BrunoCapuano@msn.com
@ElBruno
https://elbruno.com
https://www.linkedin.com/in/elbruno
TRACK:
Introduction
to the Azure
Cloud
Who we are
Adin Ermie
• Manager, Cloud Infrastructure Consulting @ Avanade
• Cloud Solutions Architect (Datacenter/Azure)
• Azure (IaaS, PaaS, Recovery Services)
• Operations Management Suite (OMS), Azure Monitor,
Azure Security Center (ASC)
• 3x MVP - Cloud and Datacenter Management (CDM)
Adin.Ermie@outlook.com
@AdinErmie
https://AdinErmie.com
https://www.linkedin.com/in/adinermie
TRACK:
Introduction
to the Azure
Cloud
S.E.C.U.R.I.T.Y
What do you think of when you hear this word?
IDENTITY & ACCESS DATA ENCRYPTION
ENCRYPTION KEY
MANAGEMENT
NETWORK SECURITY
THREAT
PROTECTION &
SECURITY MGMT
ENVIRONMENT
PROTECTION
TRACK:
Introduction
to the Azure
Cloud
Security Topics
Vague and nebulous
TRACK:
Introduction
to the Azure
Cloud
IDENTITY &
ACCESS
• Azure Active
Directory (AAD)
• Azure Information
Protection (AIP)
• Identity and
Access
Management
(IAM)
• Privileged Identity
Management
(PIM)
• Business-to-
Business (B2B)
• Business-to-
Consumer (B2C)
DATA
ENCRYPTION
• Azure Storage
Encryption (ASE)
• Azure Disk
Encryption (ADE)
• SSL / TLS
ENCRYPTION KEY
MANAGEMENT
• Azure Key Vault
• Certificates
• Secrets /
Passphrases
• Secure Credentials
NETWORK
SECURITY
• Azure Advanced
Threat Protection
(ATP)
• Network Security
Groups (NSGs)
• Application
Security Groups
(ASGs)
• DDos Protection
Plans
• Azure Service
Endpoints
• Site-to-Site VPNs
/ Express Route
THREAT
PROTECTION &
SECURITY MGMT
• Azure Security
Center (ASC)
• Threat Intelligence
• Log Analytics (LA)
/ Operation
Management
Suite (OMS)
ENVIRONMENT
PROTECTION
• Azure Policy
• Resource Group
Locks
• Azure Backup
• Cloud App
Security (CAS)
• Enterprise
Mobility and
Security (EMS)
• Intune
• Internet of Things
(IOT)
TRACK:
Introduction
to the Azure
Cloud
Security Fundaments
Design, Code, Environment, Operations
Secure
by design
Secure
the code
Secure the
environment
Secure the
operations
TRACK:
Introduction
to the Azure
Cloud
• Security Perspectives:
• Developers
• Code
• Data
• Authentication
• IT Operations
• Identity
• Data
• Network
• Resources
What we will cover…
©2017 Avanade Inc. All Rights Reserved.
Secure your IT resources with Azure
Security Center
TRACK:
Introduction
to the Azure
Cloud
Hybrid cloud
requires a new
approach for
security
Distributed
infrastructure
Rapidly changing
cloud resources
Increasingly
sophisticated threats
TRACK:
Introduction
to the Azure
Cloud
Microsoft Azure Security Center
Unify security management and enable advanced threat protection for hybrid cloud workloads
Dynamically discover and manage the
security of your hybrid cloud workloads
in a single cloud-based console
TRACK:
Introduction
to the Azure
Cloud
Understand security state across
hybrid workloads
Built-in Azure, no setup required
Automatically discover
and monitor security of
Azure resources
Gain insights for hybrid resources
Easily onboard resources running
in other clouds and on-premises
TRACK:
Introduction
to the Azure
Cloud
Central policy management
Define a security policy for each
subscription in Security Center
Apply across multiple subscriptions
using Azure Management Groups
Ensure compliance with
policy management
TRACK:
Introduction
to the Azure
Cloud
Gain deeper insights with
integrated log analytics
Quickly identify list of notable
events that require your attention
Out of the box notable events in
dashboard or create custom
queries
Search and analyze security data
using a flexible query language
Use built-in or custom queries with
Log Analytics search
TRACK:
Introduction
to the Azure
Cloud
Integrated partners
Connected security solutions
running in Azure, e.g. firewalls
and antimalware solutions
Microsoft security
Azure Active Directory
Information Protection
Advanced Threat Analytics
Many others
Any security solution that
supports Common Event Format
(CEF)
Analyze security information
from variety of sources
Enable actionable, adaptive protections
that identify and mitigate risk to reduce
exposure to attacks
TRACK:
Introduction
to the Azure
Cloud
Identify and remediate
vulnerabilities quickly
Continuous assessment of
machines, networks, and
Azure services
Hundreds of built-in security
assessments, or create your
own
Fix vulnerabilities quickly
Prioritized, actionable security
recommendations
TRACK:
Introduction
to the Azure
Cloud
Limit exposure to brute-force
attacks
Lock down ports on virtual machines
Enable just-in-time access
to virtual machines
Access automatically granted
for limited time
TRACK:
Introduction
to the Azure
Cloud
Block malware and other
unwanted applications
Allow safe applications only
Adaptive whitelisting learns
application patterns
Simplified management with
recommended whitelists
Use advanced analytics and Microsoft
Intelligent Security Graph to rapidly detect and
respond to evolving cyber threats
TRACK:
Introduction
to the Azure
Cloud
Built-in Intelligence and
advanced analytics
Partners
Integrates alerts from partner
solutions, like firewalls and
antimalware Fusion
Combines events and alerts from across
the kill chain to map the attack timeline
Behavioral analytics
Looks for known patterns
and malicious behaviours
Threat intelligence
Looks for known malicious
actors using Microsoft
global threat intelligence
Anomaly detection
Uses statistical profiling to build
historical baselines
Alerts on deviations that conform to
a potential attack vector
TRACK:
Introduction
to the Azure
Cloud
Detect threats across the
kill chain
Target and attack
Inbound brute-force RDP,
SSH,
SQL attacks and more
Application and DDoS attacks
(WAF partners)
Intrusion detection
(NG Firewall partners)
Install and exploit
In-memory malware and
exploit attempts
Suspicious process execution
Lateral movement
Internal reconnaissance
Communication to a known
malicious IP (data exfiltration or
command and control)
Using compromised resources to
mount additional attacks (outbound
port scanning, brute-force RDP/SSH
attacks, DDoS, and spam)
Post breach
TRACK:
Introduction
to the Azure
Cloud
Get prioritized security alerts
Details about detected threats
and recommendations
Detect threats across the kill chain
Alerts that conform to kill
chain patterns are fused into
a single incident
Focus on the most
critical threats
TRACK:
Introduction
to the Azure
Cloud
Gain valuable insights
about attackers
Visualize source of attacks with
interactive map
Analyzes data from your
computers and firewalls logs
Gain insights through threat
reports
Attacker’s known objectives,
tactics, and techniques
TRACK:
Introduction
to the Azure
Cloud
Simplify security operations
and investigation
Quickly assess the scope and
impact of an attack
Interactive experience to
explore links across alerts,
computers and users
Use predefined or ad hoc
queries for deeper
examination
TRACK:
Introduction
to the Azure
Cloud
Respond quickly to threats
Automate and orchestrate common
security workflows
Create playbooks with integration
of Azure Logic Apps
Trigger workflows from any alert
to enable conditional actions
TRACK:
Introduction
to the Azure
Cloud
Develop with Security in mind
DEV
SEC
OPS
“Secure” code
“Secure” deploy
“Secure” ops
TRACK:
Introduction
to the Azure
Cloud
Security Fundaments
Design, Code, Environment, Operations
Secure
by design
Secure
the code
Secure the
environment
Secure the
operations
TRACK:
Introduction
to the Azure
Cloud
End-to-End
DES IG N | CODE | ENVIRONMENT | OP S
YOU HAVE TO INCLUDE ALL PHASES TO BE SECURE
username = ‘{0}’
API App SQLWeb
http name=johndoe
TRACK:
Introduction
to the Azure
Cloud
“Secure” ops
“Secure” deploy
Demo
DEV - S EC- OP S F LOW
“Secure” code
TRACK:
Introduction
to the Azure
Cloud
“Secure” ops
“Secure” deploy
Demo
DEV - S EC- OP S F LOW
“Secure” code
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
Code security
THE BURDEN OF OUR ‘SECRETS’
Service to service authentication — the two challenges:
• Chicken-and-egg problem for keys/secrets storage
• Working seamlessly between local development and deployed service instance
• Managed Service Identity (MSI)
• Azure Services Authentication Library (ASAL)
Access secrets
Azure Key Vault
Data access
Web App
Azure Storage
Azure AD
Authentication
“Secure” code
TRACK:
Introduction
to the Azure
Cloud
“Secure” ops
“Secure” deploy
Demo
DEV - S EC- OP S F LOW
“Secure” code
TRACK:
Introduction
to the Azure
Cloud
“Secure” ops
“Secure” deploy
Demo
DEV - S EC- OP S F LOW
“Secure” code
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
“Secure” ops
“Secure” deploy
Demo
DEV - S EC- OP S F LOW
“Secure” code
TRACK:
Introduction
to the Azure
Cloud
“Secure” ops
“Secure” deploy
Demo
DEV - S EC- OP S F LOW
“Secure” code
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
TRACK:
Introduction
to the Azure
Cloud
Takeaways
Culture
You own security for your service
• We can’t outsource it or do it later (Security Feature != Secure Feature)
Security is end-to-end
Leverage existing tools and use automation to include security in all stages of DevOps
• Install and use the Secure DevOps Kit for Azure
• Use Static Code Analysis Tools
• Monitor End Points
Monitor your service
No one knows your app/service better
• You have to share the responsibility of monitoring
• Use Azure Security Center and Operations Management Suite
• New attacks are increasing in frequency and size of breach!
Learning mindset
Azure will constantly improve and release new features. Attacks will continue to evolve
TRACK:
Introduction
to the Azure
Cloud
Resources
Microsoft Build Sessions
BRK4001 Building secure cloud apps
https://medius.studios.ms/Embed/Video/BRK4001?sid=BRK4001
Secure DevOps Kit for Azure (AzSK)
AzSK Module
https://www.powershellgallery.com/packages/AzSK/
AzSK Documentation
https://github.com/azsk/DevOpsKit-docs
AzSK Source
https://github.com/azsk/DevOpsKit
Security IntelliSense
https://marketplace.visualstudio.com/items?itemName=AzSDKTeam.Security
IntelliSense-Preview
Visual Studio Online CICD Build/Release Extension
https://marketplace.visualstudio.com/items?itemName=azsdktm.AzSDK-
task
TRACK:
Introduction
to the Azure
Cloud
Thank you
Adin Ermie
Adin.Ermie@outlook.com
@AdinErmie
https://AdinErmie.com
https://www.linkedin.com/in/adinermie
Bruno Capuano
BrunoCapuano@msn.com
@ElBruno
https://elbruno.com
https://www.linkedin.com/in/elbruno
Thank you

More Related Content

PDF
Azure Arc Overview from Microsoft
PDF
Microsoft Azure Security Overview
PDF
Azure Security Overview
PPTX
Azure Security Fundamentals
PDF
Microsoft Defender and Azure Sentinel
PDF
Microsoft 365 Security and Compliance
PPTX
Azure Security and Management
PPTX
Azure Security Center- Zero to Hero
Azure Arc Overview from Microsoft
Microsoft Azure Security Overview
Azure Security Overview
Azure Security Fundamentals
Microsoft Defender and Azure Sentinel
Microsoft 365 Security and Compliance
Azure Security and Management
Azure Security Center- Zero to Hero

What's hot (20)

PPTX
Azure Security Overview
PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
PDF
TechnicalTerraformLandingZones121120229238.pdf
PPTX
Microsoft Azure Information Protection
PDF
Azure Information Protection
PPTX
Deep dive into Microsoft Purview Data Loss Prevention
PDF
Azure governance v4.0
PDF
Microsoft 365 Enterprise Security with E5 Overview
PPTX
Azure active directory
PDF
Understanding Azure AD
PDF
Azure Monitoring Overview
PPTX
Introduction to Azure monitor
PDF
Identity and Access Management 101
PDF
Microsoft Azure Sentinel
PPTX
Microsoft Azure Technical Overview
PPTX
2 Modern Security - Microsoft Information Protection
PPTX
Cloud Security Architecture.pptx
PPTX
Azure Identity and access management
PPTX
48. Azure Active Directory - Part 1
PPTX
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Azure Security Overview
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
TechnicalTerraformLandingZones121120229238.pdf
Microsoft Azure Information Protection
Azure Information Protection
Deep dive into Microsoft Purview Data Loss Prevention
Azure governance v4.0
Microsoft 365 Enterprise Security with E5 Overview
Azure active directory
Understanding Azure AD
Azure Monitoring Overview
Introduction to Azure monitor
Identity and Access Management 101
Microsoft Azure Sentinel
Microsoft Azure Technical Overview
2 Modern Security - Microsoft Information Protection
Cloud Security Architecture.pptx
Azure Identity and access management
48. Azure Active Directory - Part 1
Secure your Access to Cloud Apps using Microsoft Defender for Cloud Apps
Ad

Similar to Power of the cloud - Introduction to azure security (20)

PPTX
Power of the Cloud - Introduction to Microsoft Azure Security
PDF
Nicholas DiCola | Secure your IT resources with Azure Security Center
PDF
366864108 azure-security
PDF
Azure Security Center
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PDF
CSS17: Houston - Azure Shared Security Model Overview
PPTX
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
PPTX
SC-900 Capabilities of Microsoft Security Solutions
PDF
Microsoft Azure Cloud Services
PPTX
Enter The Matrix Securing Azure’s Assets
PPTX
Azure Fundamentals Part 3
 
PPTX
Secure hybrid workload with azure
PDF
Tour to Azure Security Center
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PPTX
security-compass-presentation-microsft.pptx
PDF
azure-security-overview-slideshare-180419183626.pdf
PPTX
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
PPTX
Primend Pilvekonverents - Azure Infrastruktuur
PDF
do you want to know about what is Microsoft Sentinel.pdf
PDF
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
Power of the Cloud - Introduction to Microsoft Azure Security
Nicholas DiCola | Secure your IT resources with Azure Security Center
366864108 azure-security
Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
CSS17: Houston - Azure Shared Security Model Overview
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
SC-900 Capabilities of Microsoft Security Solutions
Microsoft Azure Cloud Services
Enter The Matrix Securing Azure’s Assets
Azure Fundamentals Part 3
 
Secure hybrid workload with azure
Tour to Azure Security Center
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
security-compass-presentation-microsft.pptx
azure-security-overview-slideshare-180419183626.pdf
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Primend Pilvekonverents - Azure Infrastruktuur
do you want to know about what is Microsoft Sentinel.pdf
Microsoft Azure Security Techniquesand How Azure security can enhance your or...
Ad

More from Bruno Capuano (20)

PPTX
Let's code a drone to follow faces using Python 🐍
PPTX
Using Azure IoT to feed my squirrels ️
PPTX
2021 12 01 Global XR Conference - My experiences adapting a Digital Twin WebG...
PPTX
2021 06 19 ms student ambassadors nigeria ml net 01 slide-share
PPTX
Global AI on Virtual Tour Oslo - Anomaly Detection using ML.Net on a drone te...
PPTX
2021 04 21 Azure Sydney User Group - Scaling a POC to an Enterprise using Azu...
PPTX
2021 02 23 MVP Fusion Getting Started with Machine Learning.Net and AutoML
PPTX
2021 02 13 CodeGen Verona - Let’s code a drone to follow faces syncing everyt...
PPTX
2020 11 19 MVP Days Israel 2020 - Introduction to Machine Learning.Net and Au...
PPTX
2020 10 22 AI Fundamentals - Azure Machine Learning
PPTX
2020 09 24 - CONDG ML.Net
PPTX
2020 08 06 Global XR Talks - Lessons Learned creating a multiplatform AI proj...
PPTX
2020 06 27 Global AI On Tour Virtual GTA
PPTX
2020 06 13 Best of Build 2020 - Canada Community Edition - Artificial Intelli...
PPTX
Global Azure AI Tour Buenos Aires Argentina, Drones and AI
PPTX
2020 04 18 Global AI On Tour Monterrey - Program a Drone using AI
PPTX
2020 04 10 Catch IT - Getting started with ML.Net
PPTX
2020 04 09 Global AI Community Virtual Tour - Drones and AI
PPTX
2020 04 04 NetCoreConf - Machine Learning.Net
PPTX
2020 02 29 TechDay Conf - Getting started with Machine Learning.Net
Let's code a drone to follow faces using Python 🐍
Using Azure IoT to feed my squirrels ️
2021 12 01 Global XR Conference - My experiences adapting a Digital Twin WebG...
2021 06 19 ms student ambassadors nigeria ml net 01 slide-share
Global AI on Virtual Tour Oslo - Anomaly Detection using ML.Net on a drone te...
2021 04 21 Azure Sydney User Group - Scaling a POC to an Enterprise using Azu...
2021 02 23 MVP Fusion Getting Started with Machine Learning.Net and AutoML
2021 02 13 CodeGen Verona - Let’s code a drone to follow faces syncing everyt...
2020 11 19 MVP Days Israel 2020 - Introduction to Machine Learning.Net and Au...
2020 10 22 AI Fundamentals - Azure Machine Learning
2020 09 24 - CONDG ML.Net
2020 08 06 Global XR Talks - Lessons Learned creating a multiplatform AI proj...
2020 06 27 Global AI On Tour Virtual GTA
2020 06 13 Best of Build 2020 - Canada Community Edition - Artificial Intelli...
Global Azure AI Tour Buenos Aires Argentina, Drones and AI
2020 04 18 Global AI On Tour Monterrey - Program a Drone using AI
2020 04 10 Catch IT - Getting started with ML.Net
2020 04 09 Global AI Community Virtual Tour - Drones and AI
2020 04 04 NetCoreConf - Machine Learning.Net
2020 02 29 TechDay Conf - Getting started with Machine Learning.Net

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
KodekX | Application Modernization Development
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Chapter 3 Spatial Domain Image Processing.pdf
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Power of the cloud - Introduction to azure security