SlideShare a Scribd company logo
Lai Yoong Seng
Senior Consultant | MVP Hyper-V
Yoongseng.lai@infrontconsulting.com | Infront
http://www.ms4u.info
How secure?
Compliance with world
class industry standard
verified by third parties
• ISO 27001/27002
• SOC 1/SSAE 16/ISAE 3402 and SOC 2
• Cloud Security Alliance CCM
• FedRAMP
• FISMA
• FBI CJIS (Azure Government)
• PCI DSS Level 1
• United Kingdom G-Cloud
• Australian Government IRAP
• Singapore MTCS Standard
• HIPAA
• EU Model Clauses
• Food and Drug Administration 21 CFR Part 11
• FERPA
• FIPS 140-2
• CCCPPF
• MLPS
http://azure.microsoft.com/en-us/support/trust-center/compliance/
• Regular testing by Microsoft
• Security Assessment
https://security-forms.azure.com/penetration-testing/terms
https://security-forms.azure.com/penetration-testing
http://technet.microsoft.com/en-us/security/ff852094
Existing
Datacenter
Active
Directory
SharePoint SQL
Server
Windows
Azure
Branch
Datacenter
Active
Directory
SharePoint SQL
Server
Windows
Azure
Point-to-Site VPN
For Remote Users
• Username/Password
• Patching
• Access Control List (ACL)
Security Extensions
Ability to deploy anti-virus
solutions at provision time
from:
• Microsoft (Preview)
• Symantec
• Trend Micro
Inbound Traffic from Internet (Endpoints)
Network Security Groups (NSG)
Enables network segmentation
& DMZ scenarios
Access Control List
Filter conditions with allow/deny
Individual addresses, address prefixes, wildcards
Associate with VMs or subnets
ACLs can be updated
independent of VMs
Virtual Network
Backend
10.3/16
Mid-tier
10.2/16
Frontend
10.1/16
VPN
GW
Internet
On Premises 10.0/16
S2S
VPNs
Internet
Access Control Lists
Tighten security with Access Control Lists
Multiple NICs in Azure VMs
Multiple NICs enable virtual
appliances in Azure
MAC/IP addresses persist through
VM life cycle
Separate frontend-backend traffic,
and management-data planes
Requires a virtual network and
specific instance sizes
Up to 4 NICs per VM
Azure Virtual Machine
NIC2 NIC1 Default
Internet
10.2.2.2210.2.3.33 10.2.1.11
VIP:
133.44.55.66
Microsoft Azure
Storage
Microsoft Azure Storage
Highly Durable Storage
continuous storage
geo-replication
WEST
DC
EAST
DC
> 400 miles
Microsoft Azure
Storage
Geo-Replicated Storage
Backup datacenter data to Windows using
System Center Data Protection Manager
Backup and recover files/folders from
Windows Server 2012
Benefits
Reliable offsite data protection
Simple, familiar, integrated
Efficient backup and recovery
Easy set up
Your On-Premises Datacenter
http://azure.microsoft.com/en-us/support/trust-center/faq/
How Secure is Azure?
www.ms4u.info
Virtual
Lai’s Blog
Q&A
Microsoft Azure Trust Center:-
http://azure.microsoft.com/en-
us/support/trust-center/security/
Azure Security, Privacy and
Compliance :-
http://go.microsoft.com/fwlink/?l
inkid=392408&clcid=0x409
Thank you

More Related Content

PDF
Microsoft Azure Security Infographic
PPTX
Windows Azure Security & Compliance
PPTX
Security on Windows Azure
PDF
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
PPTX
Security in microservices architectures
PDF
Web application firewall advanced
PDF
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
PPTX
Zero trust Architecture
Microsoft Azure Security Infographic
Windows Azure Security & Compliance
Security on Windows Azure
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Security in microservices architectures
Web application firewall advanced
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
Zero trust Architecture

What's hot (19)

PDF
2 what is the best firewall (sizing)
PDF
Cloud Security Introduction
PPTX
WSO2 Identity Server 5.3.0 - Product Release Webinar
PPTX
Symantec SSL Explained
PDF
Microservices Security: dos and don'ts
PPTX
Forecast odcau6 100_eb
PDF
Skip the Security Slow Lane with VMware Cloud on AWS
PPTX
Global Azure Bootcamp 2017 - Azure Key Vault
PPTX
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
PDF
Understanding SSL Certificate for Apps by Symantec
PDF
17 palo alto threat prevention concept
PPTX
Microsoft Exchange Server & SSL Certificates: Everything you need to know
PDF
OpenAM Best Practices - Corelio Media Case Study
PDF
The identity of things & the smart cities of tomorrow webinar may 2015
PDF
Access Security - Hybrid Identity
PPTX
Let's get started with passwordless authentication using windows hello in you...
PDF
Alternatives and Enhancements to CAs for a Secure Web
PDF
Pimping the ForgeRock Identity Platform for a Billion Users
PDF
SSL Certificate and Code Signing
2 what is the best firewall (sizing)
Cloud Security Introduction
WSO2 Identity Server 5.3.0 - Product Release Webinar
Symantec SSL Explained
Microservices Security: dos and don'ts
Forecast odcau6 100_eb
Skip the Security Slow Lane with VMware Cloud on AWS
Global Azure Bootcamp 2017 - Azure Key Vault
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
Understanding SSL Certificate for Apps by Symantec
17 palo alto threat prevention concept
Microsoft Exchange Server & SSL Certificates: Everything you need to know
OpenAM Best Practices - Corelio Media Case Study
The identity of things & the smart cities of tomorrow webinar may 2015
Access Security - Hybrid Identity
Let's get started with passwordless authentication using windows hello in you...
Alternatives and Enhancements to CAs for a Secure Web
Pimping the ForgeRock Identity Platform for a Billion Users
SSL Certificate and Code Signing
Ad

Viewers also liked (20)

PDF
Share pointsummit vancouver2014 habanerocp case study
PDF
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
PPTX
Intranet systems beyond SharePoint
PDF
Windows Azure ミニシアター@日経BP Cloud Days 2013春展示会場
PDF
2014年OSC 東京 LT 「某開始記念!OSS利用者向けWindows Azureの ライトなライトな使い方」
PPTX
JAZUG Sendai Windows Azure Update 20131109
PDF
Azure Service Fabric - Azure Global Bootcamp 2016
PDF
Developers Summit 2014 14E-5 Azureでターイムアタック
PPTX
NoSQL Bigtable and Azure Table
PDF
[BPStudy#80] パブリック クラウド プラットフォーム「Microsoft Azure」 最新アップデート #bpstudy
PDF
Azureで、動け動け動けconcrete5 !!
PDF
プログラミング生放送第7回 比べてみようPaaSクラウド~Azure VS GAE~
PPT
IWMW 2006: CMS Debate: Challenging the Consensus
PDF
[SendGridローンチイベント] パブリック クラウド プラットフォーム「Windows Azure」
PDF
Enterprise Cloud Design Pattern 前編:クラウドアーキテクチャ-の3要素
PPTX
Anatomy of a Dynamic SharePoint Website
PPTX
Design Practices for a Secure Azure Solution
PDF
PaaSを使い倒すためにapp serviceのおさらいしよう
PDF
Microsoft Office 2013 - Looking at PowerPoint 2013 New Features - by Denver I...
Share pointsummit vancouver2014 habanerocp case study
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
Intranet systems beyond SharePoint
Windows Azure ミニシアター@日経BP Cloud Days 2013春展示会場
2014年OSC 東京 LT 「某開始記念!OSS利用者向けWindows Azureの ライトなライトな使い方」
JAZUG Sendai Windows Azure Update 20131109
Azure Service Fabric - Azure Global Bootcamp 2016
Developers Summit 2014 14E-5 Azureでターイムアタック
NoSQL Bigtable and Azure Table
[BPStudy#80] パブリック クラウド プラットフォーム「Microsoft Azure」 最新アップデート #bpstudy
Azureで、動け動け動けconcrete5 !!
プログラミング生放送第7回 比べてみようPaaSクラウド~Azure VS GAE~
IWMW 2006: CMS Debate: Challenging the Consensus
[SendGridローンチイベント] パブリック クラウド プラットフォーム「Windows Azure」
Enterprise Cloud Design Pattern 前編:クラウドアーキテクチャ-の3要素
Anatomy of a Dynamic SharePoint Website
Design Practices for a Secure Azure Solution
PaaSを使い倒すためにapp serviceのおさらいしよう
Microsoft Office 2013 - Looking at PowerPoint 2013 New Features - by Denver I...
Ad

Similar to How Secure is Azure? (20)

PPTX
Enter The Matrix Securing Azure’s Assets
PPTX
Azure Security Overview
PDF
azure-security-overview-slideshare-180419183626.pdf
PDF
Azure for business
PDF
KoprowskiT_SQLAzureLandingInBelfast
PDF
KoprowskiT_session1_SDNEvent_WASDforBeginners
PPTX
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
PDF
Building a Secure and Compliant Azure Virtual Data Center
PDF
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
PDF
Security As A Service
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PPTX
Azure Bootcamp for IT pros
PPTX
security-compass-presentation-microsft.pptx
PDF
366864108 azure-security
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
PDF
KoprowskiT_SQLSat419_WADBforBeginners
PDF
Microsoft security compass presentation latest
PPTX
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
PPTX
ECS19 - Mustafa Toroman, Sasa Kranjac - SOUP TO NUTS: MICROSOFT AZURE POWERCLASS
PDF
Microsoft Azure Security Overview
Enter The Matrix Securing Azure’s Assets
Azure Security Overview
azure-security-overview-slideshare-180419183626.pdf
Azure for business
KoprowskiT_SQLAzureLandingInBelfast
KoprowskiT_session1_SDNEvent_WASDforBeginners
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Building a Secure and Compliant Azure Virtual Data Center
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
Security As A Service
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Azure Bootcamp for IT pros
security-compass-presentation-microsft.pptx
366864108 azure-security
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
KoprowskiT_SQLSat419_WADBforBeginners
Microsoft security compass presentation latest
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
ECS19 - Mustafa Toroman, Sasa Kranjac - SOUP TO NUTS: MICROSOFT AZURE POWERCLASS
Microsoft Azure Security Overview

More from Lai Yoong Seng (20)

PPTX
Are You Protected From Downtime and Data Loss?
PPTX
ISV -Microsoft and Veeam Better Together
PPTX
Ransomware Resiliency, Recoverability and Availability
PPTX
Visibility With Veeam One
PPTX
What's next: Veeam Backup for Microsoft O365 2.0
PPTX
Enterprise Mobility Suite- Azure RMS
PPTX
Enterprise Mobility Suite-Microsoft Intune
PPTX
Enterprise Mobility Suite- Azure AD Premium
PPTX
Enterprise Mobility Suite- Introduction
PPTX
Get started With Microsoft Azure Virtual Machine
PPTX
Disaster Recovery to the Cloud with Microsoft Azure
PPTX
MAP Toolkit
PPTX
Common Scenario to Start With
PPTX
Extending On-Premise Infrastructure To Cloud
PPTX
Managing and Automating Hybrid Cloud Infrastructure
PPTX
Private Cloud R2: Scaling From Server To Cloud Services
PPTX
What's New in windows server 2012 R2 Hyper V?
PPTX
Storage options in the cloud os
PPTX
Why Hyper- V is Your Best Virtualization Cloud OS Platform?
PPTX
Setting up Storage Features in Windows Server 2012
Are You Protected From Downtime and Data Loss?
ISV -Microsoft and Veeam Better Together
Ransomware Resiliency, Recoverability and Availability
Visibility With Veeam One
What's next: Veeam Backup for Microsoft O365 2.0
Enterprise Mobility Suite- Azure RMS
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Introduction
Get started With Microsoft Azure Virtual Machine
Disaster Recovery to the Cloud with Microsoft Azure
MAP Toolkit
Common Scenario to Start With
Extending On-Premise Infrastructure To Cloud
Managing and Automating Hybrid Cloud Infrastructure
Private Cloud R2: Scaling From Server To Cloud Services
What's New in windows server 2012 R2 Hyper V?
Storage options in the cloud os
Why Hyper- V is Your Best Virtualization Cloud OS Platform?
Setting up Storage Features in Windows Server 2012

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Encapsulation_ Review paper, used for researhc scholars
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

How Secure is Azure?

Editor's Notes

  • #4: Microsoft makes it easier for customers to achieve compliance for the infrastructure and applications they run in Azure. ISO/EC 27001:2005 is a standard that specifies requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System. 
  • #5: customers to carry out authorized penetration testing on their applications hosted in Azure. Because such testing can be indistinguishable from a real attack, it is critical that customers conduct penetration testing only after obtaining approval in advance from Azure Customer Support. 
  • #6: Built-in SSL and TLS cryptography enables customers to encrypt communications within and between deployments, from Azure to on-premises datacenters, and from Azure to administrators and users. 1st- Site to Site VPN -setup a vpn tunnel- 2nd – Site to Multisite VPN 3rd – Vnet to Vnet 4th – Point to site VPN -client computer can connect using certificate (protected connection)
  • #7: No Admin/Administrator Password – 8 char long (must contain upper case,lower case, number & a special char
  • #13: How it work? We store data is 3 disk – like mirror
  • #14: If die, it is durable. Azure will mark as die and create another copy
  • #15: If 3 disk not enough, you can enable geo redundant by replicating to another DC. (more than 400 miles away) Why 400 miles?
  • #17: Data (It your own) – own control No advertising or Commercial If request, then will redirect to user