SlideShare a Scribd company logo
#TechforPeople.
welcome.
Innovative technology consulting for business.
Azure Infrastructure
SecurityUltimate security in the cloud era
Tom Janetscheck, Principal Cloud Security Architect &
Microsoft MVP
about me.
Tom Janetscheck
Principal Cloud Security Architect @ Devoteam Alegri
Focused on Azure Identity, Security, Governance, and Infrastructure
Community Lead of Azure Meetup Saarbrücken
Co-organizer of Azure Saturday
Tech blogger and book author
@azureandbeyond
https://blog.azureandbeyond.com
● Cloud security challenges
Why is cloud security so difficult and identity security so
important?
● Azure Governance
Define your guardrails to enable security
● Azure Security Center
Improve your hybrid cloud security posture
● Microsoft Intelligent Security
Graph
Unique insights, informed by trillions of signals
● Best practices
● Demo
agenda.
Federal criminal agency – 2018 cybercrime situation report
87.000 cases of cybercrime in
2018
60.000.000 € amount of
damage with an immense dark
figure
Estimated amount of damage
according to Bitcom: 100.000.000.000
(!) € per yearSource: BKA - 2018 Cybercrime situation report
Today‘s cloud security challenges
Increasingly
sophisticated attacks
It’s both, a strength and a challenge
of the cloud. How do you make sure
that ever-changing services are up to
your security standards?
Attack automation and evasion
techniques are evolving along
multiple dimensions
We need human expertise,
adaptability, and creativity to combat
human threat actors.
Office 365
Modernizing the security perimeter
•
•
+
=


Cloud Security is a Shared Responsibility
Securing and managing the cloud foundation
JOINT RESPONSIBILITYMICROSOFT COMMITMENT
Physical assets
Datacenter operations
Cloud infrastructure
Securing and managing your cloud resources
Virtual machines
Applications & workloads
Data
Governance – a definition
Establishment of policies, and
continuous monitoring of their
proper implementation, by the
members of the governing body of
an organization[…]1
1Source: BusinessDictionary
5 tips and best practices
Common
Sense
Protect
your IDs
and
implement
RBAC
Use tags and
policies
Secure
your
network
Monitor your
resources
Cloudbrew 2019 - Azure Security
5 tips and best practices
Common
Sense
Protect
your IDs
and
implement
RBAC
Use tags and
policies
Secure
your
network
Monitor your
resources
5 tips and best practices
Protect your
IDs and
implement
RBAC
Use tags
and
policies
Secure your
network
Monitor
your
resources
Common
Sense
Identity protection is essential!
uuuuuuu
uu$$$$$$$$$$$uu
uu$$$$$$$$$$$$$$$$$uu
u$$$$$$$$$$$$$$$$$$$$$u
u$$$$$$$$$$$$$$$$$$$$$$$u
u$$$$$$$$$$$$$$$$$$$$$$$$$u
u$$$$$$$$$$$$$$$$$$$$$$$$$u
u$$$$$$" "$$$" "$$$$$$u
"$$$$" u$u $$$$"
$$$u u$u u$$$
$$$u u$$$u u$$$
"$$$$uu$$$ $$$uu$$$$"
"$$$$$$$" "$$$$$$$"
u$$$$$$$u$$$$$$$u
u$"$"$"$"$"$"$u
uuu $$u$ $ $ $ $u$$ uuu
u$$$$ $$$$$u$u$u$$$ u$$$$
$$$$$uu "$$$$$$$$$" uu$$$$$$
u$$$$$$$$$$$uu """"" uuuu$$$$$$$$$$
$$$$"""$$$$$$$$$$uuu uu$$$$$$$$$"""$$$"
""" ""$$$$$$$$$$$uu ""$"""
uuuu ""$$$$$$$$$$uuu
u$$$uuu$$$$$$$$$uu ""$$$$$$$$$$$uuu$$$
$$$$$$$$$$"""" ""$$$$$$$$$$$"
"$$$$$" ""$$$$""
$$$" $$$$"
88 88 88
88 88 88
88 88 88
88,dPPYba, ,adPPYYba, ,adPPYba, 88 ,d8 ,adPPYba, ,adPPYb,88
88P' "8a "" `Y8 a8" "" 88 ,a8" a8P_____88 a8" `Y88
88 88 ,adPPPPP88 8b 8888[ 8PP""""""" 8b 88
88 88 88, ,88 "8a, ,aa 88`"Yba, "8b, ,aa "8a, ,d88
88 88 `"8bbdP"Y8 `"Ybbd8"' 88 `Y8a `"Ybbd8"' `"8bbdP"Y8
Implement multi-
factor authentication
Adhere to the
principle of least
privilege
Establish privileged
identity/access
management
(PIM/PAM)
Enable conditional
access policies
Use passphrases
rather than (complex)
passwords
or go password-less
Identity protection is essential!
oooo$$$$$$$$$$$$oooo
oo$$$$$$$$$$$$$$$$$$$$$$$$o
oo$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$o o$ $$ o$
o $ oo o$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$o $$ $$ $$o$
oo $ $ "$ o$$$$$$$$$ $$$$$$$$$$$$$ $$$$$$$$$o $$$o$$o$
"$$$$$$o$ o$$$$$$$$$ $$$$$$$$$$$ $$$$$$$$$$o $$$$$$$$
$$$$$$$ $$$$$$$$$$$ $$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$
$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$ $$$$$$$$$$$$$$ """$$$
"$$$""""$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ "$$$
$$$ o$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ "$$$o
o$$" $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$o
$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$" "$$$$$$ooooo$$$$o
o$$$oooo$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ o$$$$$$$$$$$$$$$$$
$$$$$$$$"$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$""""""""
"""" $$$$ "$$$$$$$$$$$$$$$$$$$$$$$$$$$$" o$$$
"$$$o """$$$$$$$$$$$$$$$$$$"$$" $$$
$$$o "$$""$$$$$$"""" o$$$
$$$$o oo o$$$"
"$$$$o o$$$$$$o"$$$$o o$$$$
"$$$$$oo ""$$$$o$$$$$o o$$$$""
""$$$$$oooo "$$$o$$$$$$$$$"""
""$$$$$$$oo $$$$$$$$$$
""""$$$$$$$$$$$
$$$$$$$$$$$$
$$$$$$$$$$"
"$$$""""
Role-based access control
1. Security principal = user, group, service principal
Role-based access control
1. Security principal = user, group, service principal
2. Role definition = set of management rights
Owner
Contributor
Reader
…
Backup Operator
Security Reader
User Access Administrator
Virtual Machine Contributor
Reader Support Tickets
Virtual Machine Operator
Built in
Custom
Role-based access control
1. Security principal = user, group, service principal
2. Role definition = set of management rights
Owner
Contributor
Reader
…
Backup Operator
Security Reader
User Access Administrator
Virtual Machine Contributor
Reader Support Tickets
Virtual Machine Operator
Built in
Custom
Contributor
"permissions": [
{
"actions": [
"*"
],
"notActions": [
"Authorization/*/Delete"
"Authorization/*/Write"
"Authorization/elevateAccess/Action"
],
"dataActions": [
],
"notDataActions": [
],
}
],
Role-based access control
1. Security principal = user, group, service principal
2. Role definition = set of management rights
3. Scope = MG, subscription, RG, resource
Owner
Contributor
Reader
…
Backup Operator
Security Reader
User Access Administrator
Virtual Machine Contributor
Reader Support Tickets
Virtual Machine Operator
Built in
Custom
Contributor
"permissions": [
{
"actions": [
"*"
],
"notActions": [
"Authorization/*/Delete"
"Authorization/*/Write"
"Authorization/elevateAccess/Action"
],
"dataActions": [
],
"notDataActions": [
],
}
],
Azure
subscription
Resource
group
Management Group
Role-based access control – Role assignment
Owner
Contributor
Reader
…
Backup Operator
Security Reader
User Access Administrator
Virtual Machine Contributor
Reader Support Tickets
Virtual Machine Operator
Built in
Custom
"actions": [
"*"
],
"notActions": [
"Auth/*/Delete"
"Auth/*/Write"
"Auth/elevate…
],
Azure
subscription
Resource
group
Management Group
DevOps Group
Contributor
DevOps Resource
Group
Role Assignment
5 tips and best practices
Protect your
IDs and
implement
RBAC
Use tags
and
policies
Secure your
network
Monitor
your
resources
Common
Sense
5 tips and best practices
Use tags
and policies
Secure
your
network
Monitor your
resources
Common
Sense
Protect your
IDs and
implement
RBAC
Resource Tags
Name:Value, e.g. CostCenter:ProdIT, ResourceOwner:Tom
Help to define responsibility and view consolidated billing
Always tag RGs
• Owner
• Dept
• CostCenter
• […]
Tag resources as needed
Define tags in advance
Resource Policies
Rule enforcements on MG, subscription or RG level
Initiative definitions vs. Policy definitions
Effect types:
• Append
• Deny
• Audit
5 tips and best practices
Use tags
and policies
Secure
your
network
Monitor your
resources
Common
Sense
Protect your
IDs and
implement
RBAC
5 tips and best practices
Secure your
network
Monitor
your
resources
Common
Sense
Protect
your IDs
and
implement
RBAC
Use tags
and policies
Hybrid network risks
5 tips and best practices
Secure your
network
Monitor
your
resources
Common
Sense
Protect
your IDs
and
implement
RBAC
Use tags
and policies
5 tips and best practices
Monitor your
resources
Common
Sense
Protect your
IDs and
implement
RBAC
Use tags
and
policies
Secure your
network
Azure Security Center
Microsoft Azure Security Center
Security Center assesses your
environment and enables you to
understand the status of your
resources, and whether they are
secure.
Enable actionable, adaptive
protections that identify and mitigate
risk to reduce exposure to attacks
Use advanced analytics and Microsoft
Intelligent Security Graph to rapidly
detect and respond to evolving cyber
threats
Strengthen your security posture
Identify shadow IT
subscriptions
Optimize and
improve resource
security
Continous
assessments
Microsoft Azure Security Center
Security Center assesses your
environment and enables you to
understand the status of your
resources, and whether they are
secure.
Enable actionable, adaptive
protections that identify and mitigate
risk to reduce exposure to attacks
Use advanced analytics and Microsoft
Intelligent Security Graph to rapidly
detect and respond to evolving cyber
threats
Adaptive threat prevention
Advanced Threat Protection
Native integration with
Microsoft Defender ATP for
Windows machines
Advanced Threat Detection
for Linux machines
Microsoft Azure Security Center
Security Center assesses your
environment and enables you to
understand the status of your
resources, and whether they are
secure.
Enable actionable, adaptive
protections that identify and mitigate
risk to reduce exposure to attacks
Use advanced analytics and Microsoft
Intelligent Security Graph to rapidly
detect and respond to evolving cyber
threats
Microsoft Intelligent Security Graph
Inside the Intelligent Security Graph
Microsoft Trust Center
Protect your cloud
storage/networkin
g!
Data leaks in the cloud often refer
to unprotected/publicly available
storage accounts or configuration
issues in both, platform and
infrastructure services.
Protect your
identities!
Most of today’s cyber attacks are
identity-focused. Keep that in
mind when planning your security
strategy.
Have your
governance
ready!
You need to define rules as
guardrails to avoid shadow IT and
other security issues.
Monitor the heck
out of
everything!
You need to know what’s going on
in your environment. Massive
telemetry is necessary!
Repeat!
Cloud security is an ongoing
process. Make sure you regularly
assess your current configuration
by leveraging automation tools.
Witness on-stage live attacks, see
adaptive identity protection,
passwordless signins and MFA, and
learn how Azure Security Center can
help you to protect your hybrid cloud
environment.
demo.
thank you.
#TechforPeople.

More Related Content

PPTX
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
PPTX
What is Microsoft Azure security technologies?-Microsoft Azure security techn...
PPTX
What is Microsoft Azure Security?-Microsoft Azure security
PPTX
Security on Windows Azure
PDF
Global Azure Bootcamp 2018 - Azure Security Center
PPTX
Azure Security Center- Zero to Hero
PPTX
cyber-security-reference-architecture
PPTX
Power of the cloud - Introduction to azure security
Importance of Azure infrastructure?-Microsoft Azure security infrastructure
What is Microsoft Azure security technologies?-Microsoft Azure security techn...
What is Microsoft Azure Security?-Microsoft Azure security
Security on Windows Azure
Global Azure Bootcamp 2018 - Azure Security Center
Azure Security Center- Zero to Hero
cyber-security-reference-architecture
Power of the cloud - Introduction to azure security

What's hot (20)

PDF
Azure Sentinel Tips
PDF
Stefan van der Wiele | Protect users identities and control access to valuabl...
PPTX
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
PDF
Msft cloud architecture_security_commonattacks
PDF
Nicholas DiCola | Secure your IT resources with Azure Security Center
PDF
Daniel Grabski | Microsofts cybersecurity story
PDF
Cloud Computing Security - Cloud Controls Security
PPTX
LIFT OFF 2017: AWS and Cloud Computing
PPTX
Azure Security Fundamentals
PPTX
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
PDF
Tour to Azure Security Center
PPTX
Azure sentinal
PDF
Getting Started with Azure Security Center
PDF
Azure vm introduction
PPTX
1 Modern Security - Keynote
PDF
Govern Your Cloud: The Foundation for Success
PPTX
The Top Cloud Security Issues
PPTX
3 Modern Security - Secure identities to reach zero trust with AAD
PDF
Azure security architecture
PDF
7 Experts on Implementing Azure Sentinel
Azure Sentinel Tips
Stefan van der Wiele | Protect users identities and control access to valuabl...
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
Msft cloud architecture_security_commonattacks
Nicholas DiCola | Secure your IT resources with Azure Security Center
Daniel Grabski | Microsofts cybersecurity story
Cloud Computing Security - Cloud Controls Security
LIFT OFF 2017: AWS and Cloud Computing
Azure Security Fundamentals
Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6
Tour to Azure Security Center
Azure sentinal
Getting Started with Azure Security Center
Azure vm introduction
1 Modern Security - Keynote
Govern Your Cloud: The Foundation for Success
The Top Cloud Security Issues
3 Modern Security - Secure identities to reach zero trust with AAD
Azure security architecture
7 Experts on Implementing Azure Sentinel
Ad

Similar to Cloudbrew 2019 - Azure Security (20)

PDF
Experts Live Norway - Azure Infrastructure Security
PDF
Azure Security Overview
PDF
Azure governance v4.0
PDF
Secure remote work
PDF
Security management
PDF
Microsoft Azure Security Overview
PDF
366864108 azure-security
PDF
Microsoft 365 Security and Compliance
PPTX
Practical Security for the Cloud
PPTX
Softchoice & Microsoft: Public Cloud Security Webinar
PDF
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
PPTX
Get ahead of cybersecurity with MS Enterprise Mobility + Security
PPTX
Identity and Security in the Cloud
PPTX
Enter The Matrix Securing Azure’s Assets
PPTX
Azure Fundamentals Part 3
 
PPTX
Azure security and Compliance
PPTX
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
PDF
Azure 101: Shared responsibility in the Azure Cloud
PDF
Microsoft Azure Cloud Services
PDF
ScotSecure Cyber Security Summit 2025 Edinburgh
Experts Live Norway - Azure Infrastructure Security
Azure Security Overview
Azure governance v4.0
Secure remote work
Security management
Microsoft Azure Security Overview
366864108 azure-security
Microsoft 365 Security and Compliance
Practical Security for the Cloud
Softchoice & Microsoft: Public Cloud Security Webinar
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Identity and Security in the Cloud
Enter The Matrix Securing Azure’s Assets
Azure Fundamentals Part 3
 
Azure security and Compliance
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Azure 101: Shared responsibility in the Azure Cloud
Microsoft Azure Cloud Services
ScotSecure Cyber Security Summit 2025 Edinburgh
Ad

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
Chapter 3 Spatial Domain Image Processing.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Cloudbrew 2019 - Azure Security

  • 3. Innovative technology consulting for business. Azure Infrastructure SecurityUltimate security in the cloud era Tom Janetscheck, Principal Cloud Security Architect & Microsoft MVP
  • 4. about me. Tom Janetscheck Principal Cloud Security Architect @ Devoteam Alegri Focused on Azure Identity, Security, Governance, and Infrastructure Community Lead of Azure Meetup Saarbrücken Co-organizer of Azure Saturday Tech blogger and book author @azureandbeyond https://blog.azureandbeyond.com
  • 5. ● Cloud security challenges Why is cloud security so difficult and identity security so important? ● Azure Governance Define your guardrails to enable security ● Azure Security Center Improve your hybrid cloud security posture ● Microsoft Intelligent Security Graph Unique insights, informed by trillions of signals ● Best practices ● Demo agenda.
  • 6. Federal criminal agency – 2018 cybercrime situation report 87.000 cases of cybercrime in 2018 60.000.000 € amount of damage with an immense dark figure Estimated amount of damage according to Bitcom: 100.000.000.000 (!) € per yearSource: BKA - 2018 Cybercrime situation report
  • 7. Today‘s cloud security challenges Increasingly sophisticated attacks It’s both, a strength and a challenge of the cloud. How do you make sure that ever-changing services are up to your security standards? Attack automation and evasion techniques are evolving along multiple dimensions We need human expertise, adaptability, and creativity to combat human threat actors.
  • 8. Office 365 Modernizing the security perimeter • • + =  
  • 9. Cloud Security is a Shared Responsibility Securing and managing the cloud foundation JOINT RESPONSIBILITYMICROSOFT COMMITMENT Physical assets Datacenter operations Cloud infrastructure Securing and managing your cloud resources Virtual machines Applications & workloads Data
  • 10. Governance – a definition Establishment of policies, and continuous monitoring of their proper implementation, by the members of the governing body of an organization[…]1 1Source: BusinessDictionary
  • 11. 5 tips and best practices Common Sense Protect your IDs and implement RBAC Use tags and policies Secure your network Monitor your resources
  • 13. 5 tips and best practices Common Sense Protect your IDs and implement RBAC Use tags and policies Secure your network Monitor your resources
  • 14. 5 tips and best practices Protect your IDs and implement RBAC Use tags and policies Secure your network Monitor your resources Common Sense
  • 15. Identity protection is essential! uuuuuuu uu$$$$$$$$$$$uu uu$$$$$$$$$$$$$$$$$uu u$$$$$$$$$$$$$$$$$$$$$u u$$$$$$$$$$$$$$$$$$$$$$$u u$$$$$$$$$$$$$$$$$$$$$$$$$u u$$$$$$$$$$$$$$$$$$$$$$$$$u u$$$$$$" "$$$" "$$$$$$u "$$$$" u$u $$$$" $$$u u$u u$$$ $$$u u$$$u u$$$ "$$$$uu$$$ $$$uu$$$$" "$$$$$$$" "$$$$$$$" u$$$$$$$u$$$$$$$u u$"$"$"$"$"$"$u uuu $$u$ $ $ $ $u$$ uuu u$$$$ $$$$$u$u$u$$$ u$$$$ $$$$$uu "$$$$$$$$$" uu$$$$$$ u$$$$$$$$$$$uu """"" uuuu$$$$$$$$$$ $$$$"""$$$$$$$$$$uuu uu$$$$$$$$$"""$$$" """ ""$$$$$$$$$$$uu ""$""" uuuu ""$$$$$$$$$$uuu u$$$uuu$$$$$$$$$uu ""$$$$$$$$$$$uuu$$$ $$$$$$$$$$"""" ""$$$$$$$$$$$" "$$$$$" ""$$$$"" $$$" $$$$" 88 88 88 88 88 88 88 88 88 88,dPPYba, ,adPPYYba, ,adPPYba, 88 ,d8 ,adPPYba, ,adPPYb,88 88P' "8a "" `Y8 a8" "" 88 ,a8" a8P_____88 a8" `Y88 88 88 ,adPPPPP88 8b 8888[ 8PP""""""" 8b 88 88 88 88, ,88 "8a, ,aa 88`"Yba, "8b, ,aa "8a, ,d88 88 88 `"8bbdP"Y8 `"Ybbd8"' 88 `Y8a `"Ybbd8"' `"8bbdP"Y8 Implement multi- factor authentication Adhere to the principle of least privilege Establish privileged identity/access management (PIM/PAM) Enable conditional access policies Use passphrases rather than (complex) passwords or go password-less
  • 16. Identity protection is essential! oooo$$$$$$$$$$$$oooo oo$$$$$$$$$$$$$$$$$$$$$$$$o oo$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$o o$ $$ o$ o $ oo o$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$o $$ $$ $$o$ oo $ $ "$ o$$$$$$$$$ $$$$$$$$$$$$$ $$$$$$$$$o $$$o$$o$ "$$$$$$o$ o$$$$$$$$$ $$$$$$$$$$$ $$$$$$$$$$o $$$$$$$$ $$$$$$$ $$$$$$$$$$$ $$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$ $$$$$$$$$$$$$$ """$$$ "$$$""""$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ "$$$ $$$ o$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ "$$$o o$$" $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$o $$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$" "$$$$$$ooooo$$$$o o$$$oooo$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ o$$$$$$$$$$$$$$$$$ $$$$$$$$"$$$$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $$$$"""""""" """" $$$$ "$$$$$$$$$$$$$$$$$$$$$$$$$$$$" o$$$ "$$$o """$$$$$$$$$$$$$$$$$$"$$" $$$ $$$o "$$""$$$$$$"""" o$$$ $$$$o oo o$$$" "$$$$o o$$$$$$o"$$$$o o$$$$ "$$$$$oo ""$$$$o$$$$$o o$$$$"" ""$$$$$oooo "$$$o$$$$$$$$$""" ""$$$$$$$oo $$$$$$$$$$ """"$$$$$$$$$$$ $$$$$$$$$$$$ $$$$$$$$$$" "$$$""""
  • 17. Role-based access control 1. Security principal = user, group, service principal
  • 18. Role-based access control 1. Security principal = user, group, service principal 2. Role definition = set of management rights Owner Contributor Reader … Backup Operator Security Reader User Access Administrator Virtual Machine Contributor Reader Support Tickets Virtual Machine Operator Built in Custom
  • 19. Role-based access control 1. Security principal = user, group, service principal 2. Role definition = set of management rights Owner Contributor Reader … Backup Operator Security Reader User Access Administrator Virtual Machine Contributor Reader Support Tickets Virtual Machine Operator Built in Custom Contributor "permissions": [ { "actions": [ "*" ], "notActions": [ "Authorization/*/Delete" "Authorization/*/Write" "Authorization/elevateAccess/Action" ], "dataActions": [ ], "notDataActions": [ ], } ],
  • 20. Role-based access control 1. Security principal = user, group, service principal 2. Role definition = set of management rights 3. Scope = MG, subscription, RG, resource Owner Contributor Reader … Backup Operator Security Reader User Access Administrator Virtual Machine Contributor Reader Support Tickets Virtual Machine Operator Built in Custom Contributor "permissions": [ { "actions": [ "*" ], "notActions": [ "Authorization/*/Delete" "Authorization/*/Write" "Authorization/elevateAccess/Action" ], "dataActions": [ ], "notDataActions": [ ], } ], Azure subscription Resource group Management Group
  • 21. Role-based access control – Role assignment Owner Contributor Reader … Backup Operator Security Reader User Access Administrator Virtual Machine Contributor Reader Support Tickets Virtual Machine Operator Built in Custom "actions": [ "*" ], "notActions": [ "Auth/*/Delete" "Auth/*/Write" "Auth/elevate… ], Azure subscription Resource group Management Group DevOps Group Contributor DevOps Resource Group Role Assignment
  • 22. 5 tips and best practices Protect your IDs and implement RBAC Use tags and policies Secure your network Monitor your resources Common Sense
  • 23. 5 tips and best practices Use tags and policies Secure your network Monitor your resources Common Sense Protect your IDs and implement RBAC
  • 24. Resource Tags Name:Value, e.g. CostCenter:ProdIT, ResourceOwner:Tom Help to define responsibility and view consolidated billing Always tag RGs • Owner • Dept • CostCenter • […] Tag resources as needed Define tags in advance
  • 25. Resource Policies Rule enforcements on MG, subscription or RG level Initiative definitions vs. Policy definitions Effect types: • Append • Deny • Audit
  • 26. 5 tips and best practices Use tags and policies Secure your network Monitor your resources Common Sense Protect your IDs and implement RBAC
  • 27. 5 tips and best practices Secure your network Monitor your resources Common Sense Protect your IDs and implement RBAC Use tags and policies
  • 29. 5 tips and best practices Secure your network Monitor your resources Common Sense Protect your IDs and implement RBAC Use tags and policies
  • 30. 5 tips and best practices Monitor your resources Common Sense Protect your IDs and implement RBAC Use tags and policies Secure your network
  • 32. Microsoft Azure Security Center Security Center assesses your environment and enables you to understand the status of your resources, and whether they are secure. Enable actionable, adaptive protections that identify and mitigate risk to reduce exposure to attacks Use advanced analytics and Microsoft Intelligent Security Graph to rapidly detect and respond to evolving cyber threats
  • 33. Strengthen your security posture Identify shadow IT subscriptions Optimize and improve resource security Continous assessments
  • 34. Microsoft Azure Security Center Security Center assesses your environment and enables you to understand the status of your resources, and whether they are secure. Enable actionable, adaptive protections that identify and mitigate risk to reduce exposure to attacks Use advanced analytics and Microsoft Intelligent Security Graph to rapidly detect and respond to evolving cyber threats
  • 35. Adaptive threat prevention Advanced Threat Protection Native integration with Microsoft Defender ATP for Windows machines Advanced Threat Detection for Linux machines
  • 36. Microsoft Azure Security Center Security Center assesses your environment and enables you to understand the status of your resources, and whether they are secure. Enable actionable, adaptive protections that identify and mitigate risk to reduce exposure to attacks Use advanced analytics and Microsoft Intelligent Security Graph to rapidly detect and respond to evolving cyber threats
  • 38. Inside the Intelligent Security Graph Microsoft Trust Center
  • 39. Protect your cloud storage/networkin g! Data leaks in the cloud often refer to unprotected/publicly available storage accounts or configuration issues in both, platform and infrastructure services.
  • 40. Protect your identities! Most of today’s cyber attacks are identity-focused. Keep that in mind when planning your security strategy.
  • 41. Have your governance ready! You need to define rules as guardrails to avoid shadow IT and other security issues.
  • 42. Monitor the heck out of everything! You need to know what’s going on in your environment. Massive telemetry is necessary!
  • 43. Repeat! Cloud security is an ongoing process. Make sure you regularly assess your current configuration by leveraging automation tools.
  • 44. Witness on-stage live attacks, see adaptive identity protection, passwordless signins and MFA, and learn how Azure Security Center can help you to protect your hybrid cloud environment. demo.

Editor's Notes

  • #6: SIEM Security Information and Event Management SOAR security orchestration automation and response
  • #37: ASC is supercharged by the Microsoft Intelligent Security Graph
  • #38: Unique insights, informed by trillions of signals