SlideShare a Scribd company logo
Pace University
IT 612 – Web Server Setup
Configuration & Security
Student: Yao, Chung-Hui
Professor: Dr. Hevel Jean-Baptiste
Date: May, 2014
Security in Microsoft Azure
6/10/2014 Enter Your Main Title Here 1
IT 612 – Web Server Setup,
Configuration & Security
Abstract:
Microsoft Azure is a cloud computing platform and
infrastructure created by Microsoft. It’s said that 54% of
Fortune 500 companies already use Azure. This project will
look at the potential threat/attack web applications will
face when hosting on Microsoft Azure platform and some
of the best practice for secure environment.
6/10/2014 2
IT 612 – Web Server Setup, Configuration
& Security
Introduction:
Hosting application, services, and website on
Microsoft Azure means the physical infrastructure is left in
the hands of cloud provider. Since we no longer need to
secure the network or the host, it is up to the developer to
secure the application.
We will exam how security is handled differently in
cloud platform by reviewing OWASP Top 10 Vulnerabilities
from 2013. we will also highlight unique feature in Microsoft
Azure help mitigate vulnerabilities.
6/10/2014 3
IT 612 – Web Sever Setup
Configuration & Security
Background of your study:
This topic idea began when I had the opportunity
to compare the two different cloud platforms: Amazon
Web Service (AWS) and Microsoft Azure. At that time,
someone told me that the cloud provider will take care of
everything so we do not need to implement any security
measure. After learning more about web and internet
security from another class, I am interested to explore if
we need to apply different security baseline when our
web application is hosted on Microsoft Azure
6/10/2014 4
IT 612 – Web Sever Setup
Configuration & Security
Analysis:
OWASP Top 10
• Injection
• Broken Authentication and Session
• Cross-Site Scripting (XSS)
• Insecure Direct Object References
• Security Misconfiguration
6/10/2014 5
IT 612 – Web Sever Setup
Configuration & Security
• Sensitive Data Exposure
• Missing Function Level Access Control
• Cross-Site Request Forgery
• Using Components with Known Vulnerabilities
• Unvalidated Redirect and Forwards
Notable mention
• Distributed Denial-of-Service (DDoS)
6/10/2014 6
IT 612 – Web Server Setup, Configuration
& Security
Injection
• Azure will patch SQL
• Avoid building connection strings using string
concatenation, use SqlConnectionStringBuilder
class instead.
• Implement “escaping” to validate input
• Run SQL query with least privilege possible
6/10/2014 7
IT 612 – Web Server Setup, Configuration
& Security
Broken Authentication and Session
• SSL connection to management portal
• Assign random port number for RDP and
Powershell to manage VM
• Access Control Service (ACS)
 authenticate with existing, mature account service
such as Google, Yahoo, Facebook account.
 developer need to follow recommendation
6/10/2014 8
IT 612 – Web Server Setup, Configuration
& Security
Cross-Site Scripting (XSS)
• Follow same security practice within Azure
environment
• Validate and sanitize user input
• Protect session authentication cookie
6/10/2014 9
IT 612 – Web Server Setup, Configuration
& Security
Insecure Direct Object References
• Isolation
 VM to VM within deployment
 different deployment within subscription cannot
communicate unless assigned to same virtual
network
• Private IP ACL and Public IP ACL
6/10/2014 10
IT 612 – Web Server Setup, Configuration
& Security
Security Misconfiguration
• VM provisioned from template with strict security
baseline
• Block inbound connection from internet by default
• Have to specifically open ports
• Azure Active Directory with Access Control Service
fine-tune permission
6/10/2014 11
IT 612 – Web Server Setup, Configuration
& Security
Sensitive Data Exposure
• Encrypt database content or database itself
• Built-in firewall in Azure SQL database
• Enable encrypted connection (SSL) to Azure
SQL Database
• Encrypt connection from web server to client
• Encrypt session cookies on client side
6/10/2014 12
IT 612 – Web Server Setup, Configuration
& Security
Missing Function Level Access Control
• Azure Active Directory Control
 Provide group based or role based entitlement
• Microsoft Azure Dashboard
 access to logs and status for auditing
• Third Party App to audit application workflow
 Cerebrata Azure Management Studio
6/10/2014 13
IT 612 – Web Server Setup, Configuration
& Security
Cross-Site Request Forgery
• Follow traditional practice
 Set shorter session time
 Prevent user from submitting form data multiple
times
 Implement CAPTCHA before submits
6/10/2014 14
IT 612 – Web Server Setup, Configuration
& Security
Using Components with Known Vulnerabilities
• Azure handle OS Update and Software Patches
• Monitor vulnerabilities through public database
such as NVD and CVE
• NVD listed vulnerability in Azure SDK v 1.3
which has since updated.
6/10/2014 15
IT 612 – Web Server Setup, Configuration
& Security
Unvalidated Redirect and Forwards
• Avoid using redirect and forwards
• Validate redirect and forward request
• Microsoft Azure isolation restrict destination
• Developer should use mapped value within
application instead of URL
6/10/2014 16
IT 612 – Web Server Setup, Configuration
& Security
Distributed Denial-of-Service (DDoS)
• Azure has built-in defense against DDoS
- limit rate and connection
- drop offending VM within environment
• Deploy application firewall(Ex. Barracuda)
• Windows Azure Traffic Manager; load balance
• High-Availability; deploy more instance in case
of attack
6/10/2014 17
IT 612 – Web Server Setup
Configuration & Security
Diagram and others:
6/10/2014 18
IT 612 – Web Sever Setup
Configuration & Security
Conclusion and other researches:
After reviewing OWASP Top 10 vulnerabilities from
2013 and Distributed Denial-of-Service attack, we see that
Microsoft Azure does have certain unique features that
mitigate some of the vulnerabilities such as Windows Azure
Traffic Manager and Access Control Service. We don’t need
to worry about securing network or securing the host. But
Developers have more responsibility now and need to
concentrate on securing the application itself. Code review
and code analyze become very important in the cloud
platform since now the environment is as secure as the
application it host.
6/10/2014 19
IT 612 – Web Server Setup Configuration
& Security
Q&A
6/10/2014 20

More Related Content

PDF
Identity Security - Azure Active Directory
PPTX
Assessing security of your Active Directory
PDF
Active Directory & LDAP | Security for Elasticsearch
PDF
Access Security - Hybrid Identity
PPTX
Spring Security 5
PPTX
Azure Security Fundamentals
PPTX
Azure security and Compliance
PPTX
Azure Security Overview
Identity Security - Azure Active Directory
Assessing security of your Active Directory
Active Directory & LDAP | Security for Elasticsearch
Access Security - Hybrid Identity
Spring Security 5
Azure Security Fundamentals
Azure security and Compliance
Azure Security Overview

What's hot (20)

PPTX
Trust No-One Architecture For Services And Data
PDF
Azure Penetration Testing
PPTX
Azure Security and Management
PDF
Programming with Azure Active Directory
PPTX
Zero Credential Development with Managed Identities
PDF
Azure for beginners series session 4
PPT
Novell® iChain® 2.3
PPTX
Azure security
PPT
Oracle Database Vault
PDF
Microsoft Azure Security Overview
PPTX
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
PPTX
Zero Credential Development with Managed Identities for Azure resources
DOC
Oracle Audit vault
PPTX
Server update management optimization
PDF
Access Security - Enterprise governance
PDF
Azure Penetration Testing
PDF
SafeNet ProtectV Data Protection for Virtual Infrastructure
PPTX
Spring security
PPTX
Azure Networking - The First Technical Challenge
PPTX
SQL Server Security and Intrusion Prevention
Trust No-One Architecture For Services And Data
Azure Penetration Testing
Azure Security and Management
Programming with Azure Active Directory
Zero Credential Development with Managed Identities
Azure for beginners series session 4
Novell® iChain® 2.3
Azure security
Oracle Database Vault
Microsoft Azure Security Overview
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
Zero Credential Development with Managed Identities for Azure resources
Oracle Audit vault
Server update management optimization
Access Security - Enterprise governance
Azure Penetration Testing
SafeNet ProtectV Data Protection for Virtual Infrastructure
Spring security
Azure Networking - The First Technical Challenge
SQL Server Security and Intrusion Prevention
Ad

Viewers also liked (16)

PPTX
How to Build a Modern Social Enterprise
PPTX
Clouding with Microsoft Azure - Omal Perera
PPTX
A Quick Introduction to Microsoft Azure Public Cloud
PPTX
Intro to Azure Webjobs
PPTX
Aws compete latest (00000005) js
PDF
Microsoft cloud profitability scenarios
PPTX
Introduzione al cloud computing e microsoft azure
PPTX
Intro to cloud computing
PPTX
Microsoft Azure Overview
PDF
Microsoft Azure Security Infographic
PDF
Microsoft Azure Explained - Hitesh D Kesharia
PPTX
Extending your Data center to the cloud with windows Azure
PDF
The Layman's Guide to Microsoft Azure
PDF
Integrating Cloudera & Microsoft Azure
PPTX
Azure Cloud PPT
PPT
Cloud computing ppt
How to Build a Modern Social Enterprise
Clouding with Microsoft Azure - Omal Perera
A Quick Introduction to Microsoft Azure Public Cloud
Intro to Azure Webjobs
Aws compete latest (00000005) js
Microsoft cloud profitability scenarios
Introduzione al cloud computing e microsoft azure
Intro to cloud computing
Microsoft Azure Overview
Microsoft Azure Security Infographic
Microsoft Azure Explained - Hitesh D Kesharia
Extending your Data center to the cloud with windows Azure
The Layman's Guide to Microsoft Azure
Integrating Cloudera & Microsoft Azure
Azure Cloud PPT
Cloud computing ppt
Ad

Similar to Class Project: Security in Microsoft Azure (20)

PPTX
Enter The Matrix Securing Azure’s Assets
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PPTX
Azure presentation nnug dec 2010
PDF
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
PPTX
Microsoft Azure Hybrid Cloud - Getting Started For Techies
PDF
70-534_architecturing Azure le complet.pdf
PPTX
Introducing Windows Azure
PPTX
Design Practices for a Secure Azure Solution
PPTX
Migrare Applicazioni Web su Azure
PPTX
Architectural Patterns for the Cloud
PPTX
Azure Security Compass v1.1 - Presentation.pptx
PDF
Run your business more efficiently with Windows Server on Azure
PDF
Developing Applications for the Cloud on the Microsoft Windows Azure Platform...
PPTX
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
PPTX
657682018-Azure-Migration-Modernization.pptx
PPT
Microsoft Azure a cloud computing platform
PPTX
Webinar: Microsoft Azure-2016-10-19
PDF
Session 1: Einführung in Windows Azure
PPTX
Azure platform for customers
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
Enter The Matrix Securing Azure’s Assets
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Azure presentation nnug dec 2010
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Azure Hybrid Cloud - Getting Started For Techies
70-534_architecturing Azure le complet.pdf
Introducing Windows Azure
Design Practices for a Secure Azure Solution
Migrare Applicazioni Web su Azure
Architectural Patterns for the Cloud
Azure Security Compass v1.1 - Presentation.pptx
Run your business more efficiently with Windows Server on Azure
Developing Applications for the Cloud on the Microsoft Windows Azure Platform...
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
657682018-Azure-Migration-Modernization.pptx
Microsoft Azure a cloud computing platform
Webinar: Microsoft Azure-2016-10-19
Session 1: Einführung in Windows Azure
Azure platform for customers
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Per capita expenditure prediction using model stacking based on satellite ima...

Class Project: Security in Microsoft Azure

  • 1. Pace University IT 612 – Web Server Setup Configuration & Security Student: Yao, Chung-Hui Professor: Dr. Hevel Jean-Baptiste Date: May, 2014 Security in Microsoft Azure 6/10/2014 Enter Your Main Title Here 1
  • 2. IT 612 – Web Server Setup, Configuration & Security Abstract: Microsoft Azure is a cloud computing platform and infrastructure created by Microsoft. It’s said that 54% of Fortune 500 companies already use Azure. This project will look at the potential threat/attack web applications will face when hosting on Microsoft Azure platform and some of the best practice for secure environment. 6/10/2014 2
  • 3. IT 612 – Web Server Setup, Configuration & Security Introduction: Hosting application, services, and website on Microsoft Azure means the physical infrastructure is left in the hands of cloud provider. Since we no longer need to secure the network or the host, it is up to the developer to secure the application. We will exam how security is handled differently in cloud platform by reviewing OWASP Top 10 Vulnerabilities from 2013. we will also highlight unique feature in Microsoft Azure help mitigate vulnerabilities. 6/10/2014 3
  • 4. IT 612 – Web Sever Setup Configuration & Security Background of your study: This topic idea began when I had the opportunity to compare the two different cloud platforms: Amazon Web Service (AWS) and Microsoft Azure. At that time, someone told me that the cloud provider will take care of everything so we do not need to implement any security measure. After learning more about web and internet security from another class, I am interested to explore if we need to apply different security baseline when our web application is hosted on Microsoft Azure 6/10/2014 4
  • 5. IT 612 – Web Sever Setup Configuration & Security Analysis: OWASP Top 10 • Injection • Broken Authentication and Session • Cross-Site Scripting (XSS) • Insecure Direct Object References • Security Misconfiguration 6/10/2014 5
  • 6. IT 612 – Web Sever Setup Configuration & Security • Sensitive Data Exposure • Missing Function Level Access Control • Cross-Site Request Forgery • Using Components with Known Vulnerabilities • Unvalidated Redirect and Forwards Notable mention • Distributed Denial-of-Service (DDoS) 6/10/2014 6
  • 7. IT 612 – Web Server Setup, Configuration & Security Injection • Azure will patch SQL • Avoid building connection strings using string concatenation, use SqlConnectionStringBuilder class instead. • Implement “escaping” to validate input • Run SQL query with least privilege possible 6/10/2014 7
  • 8. IT 612 – Web Server Setup, Configuration & Security Broken Authentication and Session • SSL connection to management portal • Assign random port number for RDP and Powershell to manage VM • Access Control Service (ACS)  authenticate with existing, mature account service such as Google, Yahoo, Facebook account.  developer need to follow recommendation 6/10/2014 8
  • 9. IT 612 – Web Server Setup, Configuration & Security Cross-Site Scripting (XSS) • Follow same security practice within Azure environment • Validate and sanitize user input • Protect session authentication cookie 6/10/2014 9
  • 10. IT 612 – Web Server Setup, Configuration & Security Insecure Direct Object References • Isolation  VM to VM within deployment  different deployment within subscription cannot communicate unless assigned to same virtual network • Private IP ACL and Public IP ACL 6/10/2014 10
  • 11. IT 612 – Web Server Setup, Configuration & Security Security Misconfiguration • VM provisioned from template with strict security baseline • Block inbound connection from internet by default • Have to specifically open ports • Azure Active Directory with Access Control Service fine-tune permission 6/10/2014 11
  • 12. IT 612 – Web Server Setup, Configuration & Security Sensitive Data Exposure • Encrypt database content or database itself • Built-in firewall in Azure SQL database • Enable encrypted connection (SSL) to Azure SQL Database • Encrypt connection from web server to client • Encrypt session cookies on client side 6/10/2014 12
  • 13. IT 612 – Web Server Setup, Configuration & Security Missing Function Level Access Control • Azure Active Directory Control  Provide group based or role based entitlement • Microsoft Azure Dashboard  access to logs and status for auditing • Third Party App to audit application workflow  Cerebrata Azure Management Studio 6/10/2014 13
  • 14. IT 612 – Web Server Setup, Configuration & Security Cross-Site Request Forgery • Follow traditional practice  Set shorter session time  Prevent user from submitting form data multiple times  Implement CAPTCHA before submits 6/10/2014 14
  • 15. IT 612 – Web Server Setup, Configuration & Security Using Components with Known Vulnerabilities • Azure handle OS Update and Software Patches • Monitor vulnerabilities through public database such as NVD and CVE • NVD listed vulnerability in Azure SDK v 1.3 which has since updated. 6/10/2014 15
  • 16. IT 612 – Web Server Setup, Configuration & Security Unvalidated Redirect and Forwards • Avoid using redirect and forwards • Validate redirect and forward request • Microsoft Azure isolation restrict destination • Developer should use mapped value within application instead of URL 6/10/2014 16
  • 17. IT 612 – Web Server Setup, Configuration & Security Distributed Denial-of-Service (DDoS) • Azure has built-in defense against DDoS - limit rate and connection - drop offending VM within environment • Deploy application firewall(Ex. Barracuda) • Windows Azure Traffic Manager; load balance • High-Availability; deploy more instance in case of attack 6/10/2014 17
  • 18. IT 612 – Web Server Setup Configuration & Security Diagram and others: 6/10/2014 18
  • 19. IT 612 – Web Sever Setup Configuration & Security Conclusion and other researches: After reviewing OWASP Top 10 vulnerabilities from 2013 and Distributed Denial-of-Service attack, we see that Microsoft Azure does have certain unique features that mitigate some of the vulnerabilities such as Windows Azure Traffic Manager and Access Control Service. We don’t need to worry about securing network or securing the host. But Developers have more responsibility now and need to concentrate on securing the application itself. Code review and code analyze become very important in the cloud platform since now the environment is as secure as the application it host. 6/10/2014 19
  • 20. IT 612 – Web Server Setup Configuration & Security Q&A 6/10/2014 20