Learn how to add your security to your Microsoft Azure infrastructure and platforms to keep your organization secure from today's threats. In this session we will explore the security options available in Azure fabric components, platform as a service components and virtual machines.
5. AZURE
The truth about security
• How do breaches occur?
• What is common about breaches?
6. AZURE
What can we learn?
• 97% of breaches were avoidable
• Get the simple things right
• Invest in notification and discovery
• Find out before the outside world!
7. AZURE
The Azure Security Stack
Platform
Policy Role Based Access
Resources Settings
Edge
Vendor
You
Vendor + You
8. AZURE
Which product?
Azure Security Center
Azure Key Vault
Log Analytics
Azure Storage Encryption Service
Azure Dev/Test Labs
StorSimple Encrypted Hybrid Storage
Azure Client Side Encryption
Azure Storage SAS
Azure Storage Account Keys
Azure File Shares
Azure Storage Analytics
Azure SQL Firewall
Cell Level Encryption
Transparent Data Encryption
Database Auditing
Role Based Access Control
Multi-Factor Authentication
Network Security GroupsApplication Gateway
Load Balancer
Traffic Manager
Application Proxy
13. AZURE
Do you want to gain more
knowledge about Microsoft
technology?
The Future Ready Skills program
offers online courseware, online
labs, live Q&A’s and expert
sessions, so you can acquire
your official Microsoft Certificate
in the most efficient way.
For more information:
aka.ms/frsblog
FUTURE READY
SKILLS
Of 2,000 breaches up to the beginning of 2018:
81% form of hacking
69% malware
10% physical
7% social engineering
5% privilege misuse
What commonalities exist between them?
79% targets of opportunity
96% were not difficult attacks
94% involved compromised servers
85% took weeks or more to discover
92% were discovered by a third party
By simple or intermediate controls
Firewalls, patching, security rules, policy and other non technical solutions such as monitoring, training and awareness
In cryptography, we don’t make a new encryption algorithm, we use something that already exists! Do the same with security