WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Brk30177 securing paas
1.
2.
3. Through 2020, 95% of cloud security
failures will be the customer’s fault
Gartner
Source: Gartner Revels Top Predictions for IT Organizations and Users for 2016 and Beyond, October 2015, https://www.gartner.com/en/newsroom/press-
releases/2015-10-06-gartner-reveals-top-predictions-for-it-organizations-and-users-for-2016-and-beyond
4. Secure foundation
Physical assets
Datacenter operations
Cloud infrastructure and fabric
Microsoft provides built-in controls
Virtual machines and networks
Apps and workloads
Data
Cloud security is a shared responsibility
6. aka.ms/AFUN40 #MSIgniteTheTour
How does Tailwind Traders
understand the quality of their
security posture against security
controls that are possible to
configure within Azure?
8. Security management
Strengthen your security posture with insights and guidance
Visibility Control Guidance
Devices InfrastructureApps & dataIdentity
Across
10. aka.ms/AFUN40 #MSIgniteTheTour
How does Tailwind Traders
understand the quality of their
security posture against the Azure
CIS 1.1.0 and ISO 27001 benchmarks?
12. Security and Compliance
Standard Author Description
Azure CIS 1.1.0 Center for Internet
Security
Set of security controls published by the Center
for Internet Security
PCI DSS 3.2.1 Payment Card Industry
Standards Council
Standards required for organizations that
manage payment card data
ISO 27001 International Standards
Organization
Set of security controls for information security
systems. Standard 27017 is cloud computing
specific.
SOC TSP American Institute of
Certified Practicing
Accountants
Standards for the security, availability, privacy,
processing integrity, and confidentiality of
customer data.
27. Azure Sentinel
Collect data at
cloud scale—across
all users, devices,
applications, and
infrastructure, both
on-premises and in
multiple clouds.
Detect previously
uncovered threats
and minimize false
positives using
analytics and
unparalleled threat
intelligence.
Investigate threats
with AI and hunt
suspicious activities
at scale, tapping into
decades of
cybersecurity work
at Microsoft.
Respond to
incidents rapidly
with built-in
orchestration and
automation of
common tasks.
33. Please evaluate this session
Your feedback is important to us!
https://aka.ms/ignite.mobileapp
https://myignite.techcommunity.microsoft.com/evaluations
Editor's Notes
This is framing the shared responsibility model. A common misconception is that everything is taken care of for you in the cloud. The reality is that Microsoft (and other cloud providers) take care of only a limited set of things and that security is a "shared responsibility" (though mostly the responsibility of the customer)
Describe the shared responsibility model. Review the following blog post by Tom Shinder on this model: https://blogs.msdn.microsoft.com/azuresecurity/2016/04/18/what-does-shared-responsibility-in-the-cloud-mean/
This is a list of problems that you will solve during the presentation. You are introducing these problems here at a high level. During the presentation you will provide more detail about each issue and then use the demonstration to show how the issue is resolved. You will then explain the technology used to resolve the issue. This is a different approach to the traditional "technology awareness session" where the presenter talks about a technology and then gives a demo of a specific use case. Here we introduce the technology as a tool when we use it to solve a specific problem. We then provide some more information about the tool once the demo is complete, before moving on to another problem that we can solve with a separate tool. An attendee will think "I saw these problems solved with these tools" rather than "I saw an advertisement for a new tool available in Microsoft's cloud".
This question is TWT's first challenge that we are solving. How do we figure out what they've done to secure their environment compared to what they could do?
Then, what should Tailwind Traders be looking for to have a good security management solution?
In today’s connected, technology-driven world, where digital transformation is the only way to survive for any organization, an efficient security management practice becomes the cornerstone of any long term strategy of a CISO regardless of their industry.
Whether your assets are deployed in the cloud, on-premises or a across a hybrid environment, your organization’s security has 4 core components for you to manage and secure:- Identity
Devices or end points
Apps and data
And infrastructure
And across these 4 core components, an effective security management solution should provide 3 key tenets; Visibility, Control and Guidance.
- Full visibility that helps you understand the security state and risks across resources;
Built-in security controls to help you define consistent security policies;
Effective guidance to help elevate your security through actionable intelligence and recommendations.
An effective security management solution is not about a single console. Effective security management integrates where it counts, but also offers specialized tools for different functions.
We can help you consolidate from many to few while ensuring that your specialized teams have the flexibility and freedom to manage their security as per the unique needs of that component, whether it is identity, devices, apps or infrastructure.
So, our approach here is really to provide visibility, that's the ability to see that security state across the entire digital estate.
Control, that's the ability to make those policy configurations easily, quickly and coherently most importantly, across all of the layers of the estate.
And then we can provide guidance that helps the security operations person know what to do next. “This alert arrived, I'm not sure what it means. What do I do next?” is a common question that responders have when it comes to defending the digital estate.
We have to do this across, again a pretty broad surface area, from devices to applications and the data that they touch, and the infrastructure itself.
Review the following article on Secure Score: https://docs.microsoft.com/en-us/azure/security-center/security-center-secure-score
These specific benchmarks are called out here because we look at them in the demo. The PCI DSS benchmark is looked at in the MCO20 session on Governance (not the Fundamentals session on governance).
Here is reference material on this benchmark: https://www.cisecurity.org/blog/cis-microsoft-azure-foundations-benchmark-v1-0-0-now-available/ (the benchmark has been updated slightly since then, but this will give you a good overview)
Here is info on ISO 27001: https://en.wikipedia.org/wiki/ISO/IEC_27001
Further information about each standard:
SOC TSP: https://www.threatstack.com/blog/9-common-questions-about-soc-2-compliance
Azure CIS: https://www.cisecurity.org/blog/cis-microsoft-azure-foundations-benchmark-v1-0-0-now-available/
ISO 27001: https://en.wikipedia.org/wiki/ISO/IEC_27001
PCI DSS: https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard
Review the following docs.microsoft articles to understand Resource Security Hygiene
https://docs.microsoft.com/en-us/azure/security-center/security-center-recommendations
https://docs.microsoft.com/en-us/azure/security-center/security-center-remediate-recommendations
https://docs.microsoft.com/en-us/azure/security-center/security-center-monitoring
Review the following docs.microsoft article on Privileged Identity Management: https://docs.microsoft.com/en-us/azure/active-directory/privileged-identity-management/pim-configure
Review the following article on configuring Storage firewalls https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security
Review the following article https://docs.microsoft.com/en-us/azure/sql-database/sql-database-threat-detection-overview
Review the following documentation on Azure Sentinal: https://docs.microsoft.com/en-us/azure/sentinel/. This is the first slide in several that allows you to first contextualize what is different about Sentinal (basically using ML to find needles in haystacks).
The following document describes how to configure an automated response. https://docs.microsoft.com/en-us/azure/sentinel/tutorial-respond-threats-playbook
This is a slide that mirrors the one at the start of the deck. At the start you are saying "We want to solve these problems". Here you are saying "we solved these problems".