SlideShare a Scribd company logo
1 of 127
Download to read offline
© Copyright Microsoft Corporation. All rights reserved.
FOR USE ONLY AS PART OF MICROSOFT VIRTUAL TRAINING DAYS PROGRAM. THESE MATERIALS ARE NOT AUTHORIZED
FOR DISTRIBUTION, REPRODUCTION OR OTHER USE BY NON-MICROSOFT PARTIES.
Microsoft Security
Virtual Training Day:
Security, Compliance
and Identity
Fundamentals
Module 1: Describe the
concepts of security,
compliance, and
identity
Module
Agenda
Describe security and compliance concepts.
Describe identity concepts.
Lesson 1: Describe security
and compliance concepts
© Copyright Microsoft Corporation. All rights reserved.
Lesson 1 Introduction
After completing this lesson, you'll be able to:
• Describe the shared responsibility and the defense in-depth security models.
• Describe the Zero Trust model.
• Describe the concepts of encryption and hashing.
• Describe some basic compliance concepts.
© Copyright Microsoft Corporation. All rights reserved.
The shared responsibility model
The responsibilities vary based
on where the workload is hosted:
• Software as a Service (SaaS)
• Platform as a Service (PaaS)
• Infrastructure as a Service
(IaaS)
• On-premises datacenter (On-
Prem)
© Copyright Microsoft Corporation. All rights reserved.
Defense in depth
Defense in depth uses a layered approach to security:
• Physical security such as limiting access to a datacenter to only authorized
personnel.
• Identity and access security controlling access to infrastructure and change
control.
• Perimeter security including distributed denial of service (DDoS) protection to
filter large-scale attacks before they can cause a denial of service for users.
• Network security can limit communication between resources using
segmentation and access controls.
• Compute layer security such as securing access to virtual machines either on-
premises or in the cloud by closing certain ports.
• Application layer security ensures that applications are secure and free of
security vulnerabilities.
• Data layer security controls access to business and customer data, and
encryption to protect data.
© Copyright Microsoft Corporation. All rights reserved.
Confidentiality, Integrity, Availability (CIA)
CIA – The goals of a cybersecurity strategy.
• Confidentiality refers to the need to keep confidential
sensitive data such as customer information, passwords, or
financial data.
• Integrity refers to keeping data or messages correct.
• Availability refers to making data available to those who
need it.
© Copyright Microsoft Corporation. All rights reserved.
The Zero Trust model
Zero Trust guiding principles
• Verify explicitly
• Least privileged access
• Assume breach
Six foundational pillars
• Identities may be users, services, or devices.
• Devices create a large attack surface as data flows.
• Applications are the way that data is consumed.
• Data should be classified, labeled, and encrypted based on
its attributes.
• Infrastructure whether on-premises or cloud based,
represents a threat vector.
• Networks should be segmented.
© Copyright Microsoft Corporation. All rights reserved.
Encryption
Encryption is the process of making data unreadable and
unusable to unauthorized viewers.
• Encryption of data at rest
• Encryption of data in transit
• Encryption of data in use
Two top-level types of encryption:
• Symmetric – uses same key to encrypt and decrypt data
• Asymmetric - uses a public key and private key pair
© Copyright Microsoft Corporation. All rights reserved.
Hashing
Hashing uses an algorithm to convert the original
text to a unique fixed-length hash value. Hash
functions are:
• Deterministic, the same input produces the same output.
• A unique identifier of its associated data.
• Different to encryption in that the hashed value isn't
subsequently decrypted back to the original.
• Used to store passwords. The password is “salted” to
mitigate risk of brute-force dictionary attack.
© Copyright Microsoft Corporation. All rights reserved.
Compliance concepts
Data residency - Regulations govern the physical locations where data can be stored and how and when it can be
transferred, processed, or accessed internationally.
Data sovereignty - Data, particularly personal data, is subject to the laws and regulations of the country/region in
which it's physically collected, held, or processed.
Data privacy - Providing notice and being transparent about the collection, processing, use, and sharing of personal
data are fundamental principles of privacy laws and regulations.
Lesson 2: Describe identity
concepts
© Copyright Microsoft Corporation. All rights reserved.
Lesson 2 Introduction
After completing this lesson, you’ll be able to:
• Understand the difference between authentication and authorization.
• Describe the concept of identity as a security perimeter.
• Describe identity-related services.
© Copyright Microsoft Corporation. All rights reserved.
Authentication and authorization
Authentication (AuthN)
Authentication is the process of proving that a person is who
they say they are. Authentication grants access.
Authorization (AuthZ)
Authorization determines the level of access or the
permissions an authenticated person has to your data and
resources.
© Copyright Microsoft Corporation. All rights reserved.
Identity as the primary security perimeter
Identity has become the new security perimeter that enables organizations to secure their assets.
An identity is how someone or something can be verified
and authenticated and may be associated with:
• User
• Application
• Device
• Other
Four pillars of an identity infrastructure:
• Administration
• Authentication
• Authorization
• Auditing
© Copyright Microsoft Corporation. All rights reserved.
Modern authentication and the role of the identity provider
Modern authentication is an umbrella term for authentication and authorization methods between a
client and a server.
At the center of modern authentication is the role of the identity provider (IdP).
IdP offers authentication, authorization, and auditing services.
IdP enables organizations to establish authentication and authorization policies, monitor user behavior, and more.
A fundamental capability of an IdP and “modern authentication” is the support for single sign-on (SSO).
Microsoft Azure Active Directory is an example of a cloud-based identity provider.
© Copyright Microsoft Corporation. All rights reserved.
The concept of directory services and Active Directory
A directory is a hierarchical structure that stores information about objects on the network.
A directory service stores directory data and makes it available to network users, administrators,
services, and applications.
The best-known service of this kind is Active Directory Domain Services (AD DS), a central component
in organizations with on-premises IT infrastructure.
Azure Active Directory is the evolution of identity and access management solutions, providing
organizations an Identity as a Service (IDaaS) solution for all their apps across cloud and on-premises.
© Copyright Microsoft Corporation. All rights reserved.
The concept of Federation
A simplified way to think about federation:
The website uses the authentication services of Identity
Provider A (IdP-A).
The user authenticates with Identity Provider B (IdP-B).
IdP-A has a trust relationship configured with IdP-B.
When the user signs-in to the website, the website can
trust the user’s credentials and allow access.
© Copyright Microsoft Corporation. All rights reserved.
Module Summary
In this module, you have:
• Learned about some important security and compliance concepts.
‒ Looked at the shared responsibility model.
‒ Learned about defense in depth and how the CIA triad represents the goals of a cybersecurity strategy.
‒ Learned about the guiding principles and the six foundational elements that make up the Zero Trust model.
‒ Learned about the data compliance concepts of data residency, data sovereignty, and data privacy.
• Learned about some important identity concepts.
‒ Learned about authentication and authorization.
‒ Learned about the concept of identity as a security perimeter & the four pillars of an identity infrastructure.
‒ Learned about identity-related services, including the role of an identity provider, directory services, and
federation.
Module 2: Describe the
capabilities of Microsoft
Identity and Access
Management Solutions
Module
Agenda
Explore the services and identity types of Azure Active Directory.
Explore the authentication capabilities of Azure Active Directory.
Explore the access management capabilities of Azure Active
Directory.
Describe identity protection governance capabilities of Azure
Active Directory.
Lesson 1: Explore the
services and identity types
of Azure Active Directory.
© Copyright Microsoft Corporation. All rights reserved.
Lesson 1 Introduction
After completing this lesson, you’ll be able to:
• Describe Azure AD.
• Describe the identity types that Azure AD supports.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Azure Active Directory (part of Entra)
Microsoft Entra is our product family that encompasses all of
Microsoft’s identity and access capabilities, including
Microsoft Azure Active Directory (Azure AD)
Azure AD is Microsoft’s cloud-based identity and access
management service. Capabilities of Azure AD include:
• Organizations can enable their employees, guests, and
others to sign in and access the resources they need.
• Provide a single identity system for their cloud and on-
premises applications.
• Protect user identities and credentials and to meet an
organization’s access governance requirements.
• Each Microsoft 365, Office 365, Azure, and Dynamics 365
Online subscription automatically use an Azure AD tenant.
© Copyright Microsoft Corporation. All rights reserved.
Azure AD identity types
Azure AD manages different types of identities: users, service principals, managed identities, and devices.
User – Generally speaking, a user is a representation of an individual’s identity that's managed by Azure AD.
Employees and guests are represented as users in Azure AD.
Device - A piece of hardware, such as mobile devices, laptops, servers, or printer. Device identities can be set up in
different ways in Azure AD, to determine properties such as who owns the device.
Service principal - You can think of it as an identity for an application. A service principal is created in every tenant
the application is used & defines who can access the app, what resources the app can access, and more.
Managed identity – A type of service principal, a managed identity provides an identity for applications to use
when connecting to resources that support Azure AD authentication. Developers don’t need to manage credentials.
Demo Azure Active Directory user settings
© Copyright Microsoft Corporation. All rights reserved.
External identities in Azure AD
Two different Azure AD External Identities:
B2B collaboration
B2B collaboration allows you to share your apps and
resources with external users.
B2C access management
B2C is an identity management solution for consumer
and customer facing apps.
© Copyright Microsoft Corporation. All rights reserved.
The concept of hybrid identities
• A hybrid identity is a common user identity for
authentication and authorization to all resources,
regardless of location (on-prem & cloud).
• With Azure AD Connect updates to your on-premises
AD DS, are synchronized to your Azure AD.
• Hybrid identity Authentication methods:
• Password hash sync
• Passthrough authentication
• Federated authentication
Lesson 2: Explore the
authentication capabilities
of Azure Active Directory
© Copyright Microsoft Corporation. All rights reserved.
Lesson 2 Introduction
After completing this lesson, you’ll be able to:
• Describe the authentication methods of Azure AD.
• Describe multi-factor authentication in Azure AD.
• Describe the password protection and management capabilities of Azure AD.
© Copyright Microsoft Corporation. All rights reserved.
Authentication methods of Azure AD
Passwords (primary auth)
Phone-based authentication
• SMS ( primary & secondary auth)
• Voice (secondary auth)
OATH standard for how codes are generated
in one-time passwords (secondary auth)
• SW tokens
• HW tokens
Passwordless (primary & secondary auth)
• Biometrics (Windows Hello)
• Microsoft Authenticator
• FIDO2
© Copyright Microsoft Corporation. All rights reserved.
Multi-factor authentication (MFA) in Azure AD
Multifactor authentication (MFA) & Security
Defaults
MFA requires more than one form of verification:
• Something you know
• Something you have
• Something you are
Security defaults:
• A set of basic identity security mechanisms
recommended by Microsoft.
• A great option for organizations that want to increase
their security posture but don’t know where to start, or
for organizations using the free tier of Azure AD
licensing.
© Copyright Microsoft Corporation. All rights reserved.
Self-service password reset (SSPR) in Azure AD
Benefits of Self-service password reset:
• Administrators can change settings to accommodate new security requirements.
• It saves the organization money by reducing the number of calls and requests to help desk staff.
• It increases productivity, allowing the user to return to work faster.
Self-service password reset works in the following scenarios:
• Password change
• Password reset
• Account unlock
Authentication method of SSPR:
• Mobile app notification • Mobile phone
• Mobile app code • Office phone
• email • Security questions
Demo Azure Active Directory
self-service password reset (SSPR)
© Copyright Microsoft Corporation. All rights reserved.
Password protection & management capabilities in Azure AD
Global banned password list
Custom banned password lists
Protecting against password spray
Hybrid security
Lesson 3: Explore the access
management capabilities of
Azure Active Directory
© Copyright Microsoft Corporation. All rights reserved.
Lesson 3 Introduction
After this lesson, you’ll be able to:
© Copyright Microsoft Corporation. All rights reserved.
Conditional access
Conditional Access signals:
• User or group membership
• Named location information
• Device
• Application
• Real-time sign-in risk detection
• Cloud apps or actions
• User risk
Access controls:
• Block access.
• Grant access.
• Require one or more conditions to be
met before granting access.
• Control user access based on session
controls to enable limited experiences
within specific cloud applications.
Demo
Azure Active Directory
Conditional Access
© Copyright Microsoft Corporation. All rights reserved.
Azure AD roles & role-based access control (RBAC)
Azure AD roles control permissions to manage Azure AD resources.
Built-in roles
Custom roles
Categories of Azure AD roles: Azure AD specific, service- specific, cross service
Only grant the access users need
Lesson 4: Describe the
identity
protection and governance
capabilities
of Azure Active Directory
© Copyright Microsoft Corporation. All rights reserved.
Lesson 4 Introduction
© Copyright Microsoft Corporation. All rights reserved.
Identity governance in Azure AD
The tasks of Azure AD identity governance
• Govern the identity lifecycle.
• Govern access lifecycle.
• Secure privileged access for administration.
Identity lifecycle
• Join: A new digital identity is created.
• Move: Update access authorizations.
• Leave: Access may need to be removed.
© Copyright Microsoft Corporation. All rights reserved.
Entitlement management and access reviews
Entitlement management
• It is an identity governance feature that enables organizations to
manage identity and access lifecycle at scale.
• It automates access request workflows, access assignments,
reviews, and expiration.
Access reviews
• Enable organizations to efficiently manage group memberships,
access to enterprise applications, and role assignment.
• Ensure that only the right people have access to resources.
• Used to review and manage access for both users and guests.
Terms of use
• Allow information to be presented to users, before they access
data or an application.
• Ensure users read relevant disclaimers for legal or compliance
requirements.
© Copyright Microsoft Corporation. All rights reserved.
Privileged Identity Management (PIM)
PIM enables you to manage, control, and monitor access to important resources in your organization.
Just in time, providing privileged access only when needed, and not before.
Time-bound, by assigning start and end dates that indicate when a user can access resources.
Approval-based, requiring specific approval to activate privileges.
Visible, sending notifications when privileged roles are activated.
Auditable, allowing a full access history to be downloaded.
© Copyright Microsoft Corporation. All rights reserved.
Azure Identity Protection
Enables organizations to accomplish three key tasks:
• Automate the detection and remediation of identity-based risks.
• Investigate risks using data in the portal.
• Export risk detection data to third-party utilities for further analysis.
It can categorize and calculate risk:
• Categorize risk into three tiers: low, medium, and high.
• Calculate the sign-in risk, and user identity risk.
It provides organizations with three reports:
• Risky users
• Risky sign-ins
• Risk detections
© Copyright Microsoft Corporation. All rights reserved.
Module Summary
Azure AD and services and identity types Azure AD supports.
• Explore the authentication capabilities of Azure AD and MFA.
• Explore the access management capabilities of Azure AD with Conditional
Access and Azure AD RBAC.
• Describe identity protection and governance capabilities of Azure AD, including
PIM, entitlement management, and access reviews.
Module 3 (part 1 of 2):
Describe the
Capabilities of Microsoft
Security Solutions
Module
Agenda
Describe basic security capabilities in Azure.
Describe security management capabilities of Azure.
Lesson 1: Describe basic
security capabilities in
Azure
© Copyright Microsoft Corporation. All rights reserved.
Lesson 1 Introduction
After completing this lesson, you should be able to:
Describe
Azure security
capabilities
for protecting
your network.
Describe
how Azure can
protect your VMs.
Describe
how encryption
on Azure can
protect your data.
© Copyright Microsoft Corporation. All rights reserved.
Azure DDoS protection
A Distributed Denial of Service
(DDoS) attack makes resources
unresponsive.
Azure DDoS Protection analyzes
network traffic and discards
anything that looks like a DDoS
attack.
Azure DDoS Protection tiers:
• Basic
• Standard
© Copyright Microsoft Corporation. All rights reserved.
Azure Firewall
Azure Firewall protects your Azure Virtual Network
(VNet) resources from attackers. Features include:
• Built-in high availability & Availability Zones
• Outbound SNAT & inbound DNAT
• Threat intelligence
• Network & application-level filtering
• Multiple public IP addresses
• Integration with Azure Monitor
© Copyright Microsoft Corporation. All rights reserved.
Web Application Firewall
Web Application Firewall (WAF) provides centralized
protection of your web applications from common exploits
and vulnerabilities.
• Simpler security management
• Improves the response time to a security threat
• Patching a known vulnerability in one place
• Protection against threats and intrusions
© Copyright Microsoft Corporation. All rights reserved.
Network segmentation and Azure VNet
Reasons for network segmentation:
• The ability to group related assets.
• Isolation of resources.
• Governance policies set by the organization.
Azure Virtual Network (VNet):
• Network level containment of resources with no
traffic allowed across VNets or inbound to VNet.
• Communication needs to be explicitly
provisioned.
• Control how resources in a VNet communicate
with other resources, the internet, and on-
premises networks.
© Copyright Microsoft Corporation. All rights reserved.
Azure Network Security groups
Network security groups (NSG) let you allow or deny network
traffic to and from Azure resources that exist in your Azure
Virtual Network.
• An NSG can be associated with multiple subnets or network interfaces
in a VNet.
• An NSG is made up of inbound and outbound security rules.
• Each rule specifies one or more of the following properties:
- Name - Priority - Source or destination
- Protocol - Direction - Port range
- Action
• Example default inbound rule labeled “DenyAllInbound”
Priority Source Source ports Destination Destination ports Protocol Access
6500 0.0.0.0/0 0-65535 0.0.0.0/0 0-65535 Any Any
Demo Azure Network Security Groups
© Copyright Microsoft Corporation. All rights reserved.
Secure remote access to VMs: Azure Bastion & Just-in-time access
Azure Bastion - secure
connectivity to your VMs from
the Azure portal.
Just-in-time access – secure
access when needed.
© Copyright Microsoft Corporation. All rights reserved.
Ways Azure encrypts data & use of Key Vault
Encryption on Azure
Azure Storage Service Encryption
Azure Disk Encryption
Transparent data encryption (TDE)
What is Azure Key Vault?
Secrets management
Key management
Certificate management
Store secrets backed by HW or SW
Lesson 2: Describe security
management capabilities of
Azure
© Copyright Microsoft Corporation. All rights reserved.
Lesson 2 Introduction
After completing this lesson, you’ll be able to:
Describe cloud
security posture
management.
Describe
Microsoft
Defender for
Cloud.
Understand the
Azure Security
Benchmark and
security baselines
in Azure.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Cloud
Microsoft Defender for Cloud is a tool for security posture management and threat protection. It strengthens
the security posture of your cloud resources, and with its integrated Microsoft Defender plans, protects
workloads running in Azure, hybrid, and other cloud platforms. Microsoft Defender for Cloud features cover two
broad pillars of cloud security:
Cloud security posture management(CSPM):
• Tools & services designed to improve cloud security
management.
• Monitor and prioritize security enhancements and features
in your cloud environment.
• Securescore in Microsoft Defender for Cloud provides
visibility to your current security situation & hardening
guidance to help improve security.
Cloud workload protection (CWP):
• Detect and resolve threats to resources, workloads, and
services.
• CWP provided through Microsoft Defender plans specific to
the types of resources in your subscriptions.
• Defender plans include Microsoft Defender for servers, App
Service, SQL, Key Vault, and more…
© Copyright Microsoft Corporation. All rights reserved.
Secure score in Microsoft Defender for Cloud
Your security posture at-a-glance
• Continually assesses your
resources, subscriptions, and
organization for security issue.
• Aggregates all the findings into a
single score.
• Hardening recommendations on
any identified security
misconfigurations & weaknesses.
© Copyright Microsoft Corporation. All rights reserved.
Enhanced security of Microsoft Defender for Cloud
Microsoft Defender for Cloud
plans offer Enhanced security
features for your workloads:
• Endpoint detection and response
• Vulnerability scanning
• Multi-cloud security
• Hybrid security
• Threat protection alerts
• Access and application controls
Demo Microsoft Defender for Cloud
© Copyright Microsoft Corporation. All rights reserved.
Azure Security Benchmark & Security baselines for Azure
The Azure Security Benchmark (ASB) provides prescriptive best practices & recommendations to improve the
security of workloads, data, and services on Azure. Security baselines for Azure apply guidance from the ASB to the
specific service for which it is defined. The image below is an extract from the security baseline for Azure AD.
© Copyright Microsoft Corporation. All rights reserved.
Module Summary
In this module, you have:
• Learned about basic security capabilities in Azure.
• Learned about the security management capabilities of Azure.
Module 3 (part 2 of 2):
Describe the
Capabilities of Microsoft
Security Solutions
Module
Agenda
Describe security capabilities of Microsoft Sentinel.
Describe threat protection with Microsoft 365 Defender.
Lesson 3: Describe security
capabilities of Microsoft
Sentinel
© Copyright Microsoft Corporation. All rights reserved.
Lesson 3 Introduction
After completing this lesson, you’ll be able to:
Describe
the security
concepts for
SIEM and SOAR.
Describe
how Microsoft
Sentinel provides
integrated threat
management.
© Copyright Microsoft Corporation. All rights reserved.
SIEM and SOAR
SIEM
What is security incident and
event management?
A SIEM system is a tool that an
organization uses to collect data from
across the whole estate, including
infrastructure, software, and resources.
It does analysis, looks for correlations
or anomalies, and generates alerts and
incidents.
SOAR
What is security orchestration
automated response?
A SOAR system takes alerts from many
sources, such as a SIEM system. The
SOAR system then triggers action-
driven automated workflows and
processes to run security tasks that
mitigate the issue.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Sentinel provides integrated threat management (Slide 1)
Collect data at cloud scale across all users, devices, applications,
and infrastructure, both on-premises and in multiple clouds.
Detect previously uncovered threats and minimize false positives
using analytics and unparalleled threat intelligence.
Investigate threats with AI and hunt suspicious activities at
scale, tapping into decades of cybersecurity work at Microsoft.
Respond to incidents rapidly with built-in orchestration and
automation of common security.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Sentinel provides integrated threat management (Slide 2)
Connect Microsoft Sentinel to your data: Use
connectors for Microsoft solutions providing real-
time integration.
Workbooks: Monitor the data using the Microsoft
Sentinel integration with Azure Monitor Workbooks.
Analytics: Using built-in analytics alerts, you’ll get
notified when anything suspicious occurs.
Manage incidents: An incident is created when an
alert that you've enabled is triggered.
Security automation and orchestration: Integrate
with Logic Apps, to create workflows & playbooks.
Notebooks: Use Jupyter notebooks to extend the
scope of what you can do with Microsoft Sentinel
data.
Investigation: Understand the scope of a potential
security threat and find the root cause.
Hunting: Use search-and-query tools, to hunt
proactively for threats, before an alert is triggered.
Community: Download content from the private
community GitHub repository to create custom
workbooks, hunting queries, and more.
Demo Microsoft Sentinel
Lesson 4: Describe threat
protection
with Microsoft 365
Defender
© Copyright Microsoft Corporation. All rights reserved.
Lesson 4 Introduction
After completing this lesson, you’ll be able to:
Describe
the Microsoft
365 Defender
service.
Describe
how Microsoft 365
Defender provides
integrated
protection against
sophisticated
attacks.
Describe and
explore the
Microsoft 365
Defender portal.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft 365 Defender services
Microsoft 365 Defender
Natively coordinate the
detection, prevention,
investigation, and response
to threats.
Protects identities,
endpoints, apps, and email
& collaboration.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Office 365
Microsoft Defender for Office 365 covers:
1 2 3 4
Threat protection
policies
Reports Threat investigation and
response capabilities
Automated investigation
and response capabilities
Microsoft Defender for
Office 365 Plan 1
• Safe Attachments
• Safe Links
• Safe Attachments for SharePoint,
OneDrive, & Microsoft Teams
• Anti-phishing protection
• Real-time detections
Microsoft Defender for
Office 365 Plan 2
· Threat Trackers & Threat Explorer
· Automated investigation & response (AIR)
· Attack Simulator
· Proactively hunt for threats
· Investigate incidents and alerts
Microsoft Defender for
Office 365 availability
· Microsoft 365 E5
· Office 365 E5
· Office 365 A5
· Microsoft 365 Business Premium
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Endpoint
Microsoft Defender for Endpoint is a platform designed to help enterprise networks protect
endpoints.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Cloud Apps
Microsoft Defender for Cloud Apps provides rich visibility to your cloud services, control over data travel, and
sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services.
The Defender for Cloud Apps framework
· Discover and control the use of Shadow IT
· Protect your sensitive information anywhere
in the cloud
· Protect against cyberthreats and anomalies
· Assess your cloud apps' compliance
Office 365 Cloud App Security
Enhanced Cloud App Discovery in
Azure Active Directory
Demo Microsoft Defender for Cloud Apps
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Defender for Identity
Microsoft Defender for Identity covers following key areas
Monitor and profile user
behavior and activities
Defender for Identity monitors
and analyzes user activities and
information across your
network, including permissions
and group membership,
creating a behavioral baseline
for each user.
Protect user identities and
reduce the attack surface
Defender for Identity gives
invaluable insights on identity
configurations and suggested
security best practices.
Through security reports and
user profile analytics.
Identify suspicious activities
and advanced attacks across
the cyberattack kill-chain
• Reconnaissance
• Compromised credentials
• Lateral movements
• Domain dominance
Investigate alerts and
user activities
Defender for Identity is
designed to reduce general
alert noise, providing only
relevant, important security
alerts in a simple, real-time
organizational attack
timeline.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft 365 Defender portal
The Microsoft 365 Defender portal combines
protection, detection, investigation, and
response to email, collaboration, identity,
and device threats, in a central portal.
View the security health
of your organization.
Act to configure devices,
users, and apps.
Get alerts for suspicious activity.
The Microsoft 365 Defender navigation pane include these
options and more:
Learning
hub
Incidents
& alerts
Action
center
Reports
Secure
Score
Hunting
Email &
collaboration
Permissions
& roles
Threat
analytics
Endpoints
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Secure Score
Microsoft Secure Score is a
representation of a company's
security posture.
Will show all possible
improvements for the product,
whatever the license edition,
subscription, or plan.
Supports recommendations for:
• Microsoft 365
• Azure Active Directory
• Microsoft Defender for
Endpoint
• Microsoft Defender for Identity
• Microsoft Defender for Cloud
Apps
Demo The Microsoft 365 Defender portal
© Copyright Microsoft Corporation. All rights reserved.
Module Summary
In this module, you have:
• Learned about the security capabilities of Microsoft Sentinel.
• Learned about the threat protection with Microsoft 365 Defender.
Module 4: Describe the
Capabilities of Microsoft
Compliance Solutions
Module
Agenda
Describe the Service Trust Portal and privacy with Microsoft
Describe the compliance management capabilities in Microsoft
Purview.
Describe information protection and data lifecycle management
capabilities in Microsoft Purview.
Describe insider risk capabilities in Microsoft Purview.
Describe eDiscovery & audit capabilities in Microsoft Purview.
Describe resource governance capabilities in Azure.
Lesson 1: Describe the
Service Trust
Portal and privacy with
Microsoft
© Copyright Microsoft Corporation. All rights reserved.
Lesson 1 Introduction
© Copyright Microsoft Corporation. All rights reserved.
Service Trust Portal
The Service Trust Portal provides:
• Information
• Tools
• Other resources about Microsoft security,
privacy, and compliance practices.
You can access below offerings:
• Service Trust Portal
• Trust Documents
• Industries & Regions
• Trust Center
• Resources
• My Library
Demo Service Trust Portal
© Copyright Microsoft Corporation. All rights reserved.
Microsoft's privacy principles
Control: Putting you, the customer, in control of your privacy with easy-to-use tools and clear choices.
Transparency: Being transparent about data collection and use so that everyone can make informed decisions.
Security: Protecting the data that's entrusted to Microsoft by using strong security and encryption.
Strong legal protections: Respecting local privacy laws and fighting for legal protection of privacy as a fundamental human right.
No content-based targeting: Not using email, chat, files, or other personal content to target advertising.
Benefits to you: When Microsoft does collect data, it's used to benefit you, the customer, and to make your experiences better.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Priva
Priva Privacy Risk Management
• Overview dashboard provides automatic
updates about your data with important
trends.
• Data profile provides a snapshot view of
the personal data your organization stores
in Microsoft 365 and where it lives.
• Set up policies that identify privacy risks in
your Microsoft 365 environment and
enable easy remediation.
Priva Subject Rights Requests
Workflow, automation, and collaboration
capabilities to help search for subject data,
review findings, collect the appropriate files,
and produce reports.
Lesson 2: Describe the
compliance management
capabilities in
Microsoft Purview
© Copyright Microsoft Corporation. All rights reserved.
Lesson 2 Introduction
• Describe the use and benefits of compliance score.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Purview compliance portal
Microsoft Purview compliance portal
• A view of how the organization is
meeting its compliance requirements
• Solutions that can be used to help with
compliance
• Information about active alerts
• And more…
Navigation
• Access to alerts, reports, policies, compliance
solutions, and more.
• Add or remove options for a customized
navigation pane.
• Customize navigation control.
© Copyright Microsoft Corporation. All rights reserved.
Compliance Manager
Compliance Manager simplifies
compliance and reduces risk by providing:
• Prebuilt assessments based on common standards
• Workflow capabilities to complete risk assessments
• Step-by-step improvement actions
• Compliance score, shows overall compliance posture
Key elements of Compliance Manager
• Controls
• Assessments
• Templates
• Improvement actions
© Copyright Microsoft Corporation. All rights reserved.
Compliance score
Benefits of compliance score:
• Help an organization understand its current
compliance posture.
• Help prioritize actions based on their potential
to reduce risk.
Understand your compliance score
• Actions
- Your improved actions
- Microsoft actions
• Action types ( & action subcategory)
- Mandatory (preventive, detective, or corrective)
- Discretionary (preventive, detective, or corrective)
Demo Microsoft Purview compliance portal
Lesson 3: Describe
information
protection and data
lifecycle
management in Microsoft
Purview
© Copyright Microsoft Corporation. All rights reserved.
Lesson 3 Introduction
© Copyright Microsoft Corporation. All rights reserved.
Know your data, protect your data, and govern your data
Know your data: Understand your data landscape and identify important
data across on-premises, cloud, and hybrid environments.
Protect your data: Apply flexible protection actions including encryption,
access restrictions, and visual markings.
Prevent data loss: Detect risky behavior and prevent accidental oversharing
of sensitive information.
Govern your data: Automatically keep, delete, and store data and records
in a compliant manner.
© Copyright Microsoft Corporation. All rights reserved.
Data classification capabilities of the compliance portal
Sensitive information types.
Trainable classifiers: Pre-trained classifiers and Custom trainable classifiers.
Understand and explore the data.
The content explorer: It enables administrators to gain visibility into the content that has been
summarized in the overview pane.
The activity explorer: It can monitor what's being done with labeled content across the organization.
© Copyright Microsoft Corporation. All rights reserved.
Sensitivity labels and policies
Sensitivity labels
Labels are:
• Customizable
• Clear text
• Persistent
Usage:
• Encrypt email and documents.
• Mark the content.
• Apply the label automatically.
• Protect content in containers: sites and groups.
• Extend sensitivity labels to third-party apps and services.
• Classify content without using any protection settings.
Label policies
Policies enable admins to:
• Choose the users and groups that can see labels
• Apply a default label to all new emails and documents
• Require justifications for label changes
• Require users to apply a label (mandatory labeling)
• Link users to custom help pages
Once a sensitivity label is applied to an email or document,
any configured protection settings for that label are enforced
on the content.
Demo Sensitivity labels
© Copyright Microsoft Corporation. All rights reserved.
Data loss prevention (DLP)
DLP protects sensitive information and prevents its
inadvertent disclosure.
• DLP policies protect information by identifying and automatically
protecting sensitive data.
• Protect sensitive information across Microsoft 365 – OneDrive for
Business, SharePoint Online, Exchange Online and Microsoft Teams
Endpoint Data Loss Prevention
• DLP extended to Windows 10 devices.
• Audit and manage activities including creating, coping,
printing, & renaming items
Data Loss Prevention in Microsoft Teams
• DLP capabilities extended to Microsoft Teams chat and
channel message.
© Copyright Microsoft Corporation. All rights reserved.
Retention labels and policies
Retention settings work with SharePoint, OneDrive, Teams, Yammer and Exchange and help organizations manage
and govern information by ensuring content is kept only for a required time, and then permanently deleted.
Retention labels:
• Are applied at an item level.
• Emails and documents can have only a single
retention label assigned to it at a time.
• Retention settings from retention labels travel
with the content in your Microsoft 365 tenant.
• Can be applied manually or automatically.
• Retention labels support disposition review of
the content before it's permanently deleted.
Retention policies:
• Are applied at site or mailbox level,
• Can be applied to multiple locations or
specific locations or users.
• Items inherit the retention settings from their
container.
• If an item is moved, the retention setting does
not travel to the new location.
© Copyright Microsoft Corporation. All rights reserved.
Records management
Records management helps an organization look after their legal obligations and helps to demonstrate
compliance with regulations.
• When content is labeled as a record, the
following happens:
- Restrictions are put in place to block
certain activities.
- Activities are logged.
- Proof of disposition is kept at the end of
the retention period.
• To enable items to be marked as records,
an administrator sets up retention labels.
Lesson 4:
Describe insider risk
capabilities in Microsoft
Purview
© Copyright Microsoft Corporation. All rights reserved.
Lesson 4 Introduction
© Copyright Microsoft Corporation. All rights reserved.
Insider risk solutions in Microsoft Purview
Insider risk management helps minimize internal risks by enabling you to detect, investigate, and act on
malicious and inadvertent activities in your organization.
Communication compliance helps minimize communication risks by helping you detect, capture, and act
on inappropriate messages in your organization. Supported services: Microsoft Teams, Exchange Online,
Yammer, & 3rd party communications in an org.
Information barriers allow you to restrict communication and collaboration between two internal groups
to avoid a conflict of interest from occurring in your organization. Supported in Microsoft Teams, OneDrive
for Business, SharePoint Online, and more.
Lesson 5: Describe
eDiscovery & Audit
capabilities in Microsoft
Purview
© Copyright Microsoft Corporation. All rights reserved.
Lesson 5 Introduction
© Copyright Microsoft Corporation. All rights reserved.
eDiscovery in Microsoft Purview
• Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be
used as evidence in legal cases.
• eDiscovery tools: Content search, eDiscovery (Standard), eDiscovery (Premium)
© Copyright Microsoft Corporation. All rights reserved.
Auditing in Microsoft Purview
• Microsoft Purview auditing solutions help organizations effectively respond to security events, forensic
investigations, internal investigations, and compliance obligations.
• Microsoft Purview provides two auditing solutions: Audit (Standard) and Audit (Premium).
Lesson 6: Describe resource
governance capabilities in
Azure
© Copyright Microsoft Corporation. All rights reserved.
Lesson 6 Introduction
• Describe Azure Policy.
• Describe Azure Blueprints.
• Describe Microsoft Purview.
© Copyright Microsoft Corporation. All rights reserved.
Azure Policy
Trigger a Policy
evaluation
• In-scope resource is created, deleted,
or updated
• A policy or an initiative is newly
assigned to a scope.
• A policy or an initiative assigned to a
scope is updated.
• The standard compliance evaluation
cycle
Azure Policy
• Help enforce standards and assess
compliance across your organization.
• A compliance dashboard, to evaluate
the overall state of the environment.
• Evaluates resources in Azure and Arc
enabled resources.
Responses to
non-compliant
resources
• Deny a change to a resource.
• Log changes to a resource.
• Alter a resource before or after
a change.
• Deploy related compliant
resources.
Demo Azure policy
© Copyright Microsoft Corporation. All rights reserved.
Azure Blueprints
• Azure Blueprints provide a way to define a repeatable set of Azure resources.
• Rapidly provision environments, that are in line with the organization’s compliance requirements.
• Provision Azure resources across several subscriptions simultaneously for quicker delivery.
• Declarative way to orchestrate the deployment of various resource templates and artifacts, including:
‒ Role Assignments
‒ Policy Assignments
‒ Azure Resource Manager templates (ARM templates)
‒ Resource Groups
• Blueprint objects are replicated to multiple Azure regions.
• The relationship between the blueprint definition and the blueprint assignment is preserved.
© Copyright Microsoft Corporation. All rights reserved.
Microsoft Purview
Microsoft Purview is a unified
data governance service that
helps organizations manage and
govern their on-premises, multi-
cloud, and SaaS data.
• Data Map - capture metadata
about enterprise data, to identify
and classify sensitive data.
• Data Catalog - quickly and easily
find relevant data.
• Data Estate Insights - understand
what data is actively scanned,
where sensitive data is, and how it
moves.
© Copyright Microsoft Corporation. All rights reserved.
Module Summary
• Learned about the information protection and data lifecycle management capabilities of
Microsoft Purview, including sensitivity & retention labels, DLP, and more.
• Learned about insider risk capabilities in Microsoft Purview.
• Learned about eDiscovery & audit capabilities of Microsoft Purview.
• Describe resource governance capabilities in Azure, including Azure policy, Blueprints, and
Microsoft Purview.
Thank you

More Related Content

Similar to original.pdf

B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonAdam Levithan
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingsahil lalwani
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsFredBrandonAuthorMCP
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...Editor IJCATR
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory ProposalMJ Ferdous
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementSafeNet
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 

Similar to original.pdf (20)

B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
SC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance SolutionsSC-900 Capabilities of Microsoft Compliance Solutions
SC-900 Capabilities of Microsoft Compliance Solutions
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key Management
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

original.pdf

  • 1. © Copyright Microsoft Corporation. All rights reserved. FOR USE ONLY AS PART OF MICROSOFT VIRTUAL TRAINING DAYS PROGRAM. THESE MATERIALS ARE NOT AUTHORIZED FOR DISTRIBUTION, REPRODUCTION OR OTHER USE BY NON-MICROSOFT PARTIES.
  • 2. Microsoft Security Virtual Training Day: Security, Compliance and Identity Fundamentals
  • 3. Module 1: Describe the concepts of security, compliance, and identity
  • 4. Module Agenda Describe security and compliance concepts. Describe identity concepts.
  • 5. Lesson 1: Describe security and compliance concepts
  • 6. © Copyright Microsoft Corporation. All rights reserved. Lesson 1 Introduction After completing this lesson, you'll be able to: • Describe the shared responsibility and the defense in-depth security models. • Describe the Zero Trust model. • Describe the concepts of encryption and hashing. • Describe some basic compliance concepts.
  • 7. © Copyright Microsoft Corporation. All rights reserved. The shared responsibility model The responsibilities vary based on where the workload is hosted: • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS) • On-premises datacenter (On- Prem)
  • 8. © Copyright Microsoft Corporation. All rights reserved. Defense in depth Defense in depth uses a layered approach to security: • Physical security such as limiting access to a datacenter to only authorized personnel. • Identity and access security controlling access to infrastructure and change control. • Perimeter security including distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for users. • Network security can limit communication between resources using segmentation and access controls. • Compute layer security such as securing access to virtual machines either on- premises or in the cloud by closing certain ports. • Application layer security ensures that applications are secure and free of security vulnerabilities. • Data layer security controls access to business and customer data, and encryption to protect data.
  • 9. © Copyright Microsoft Corporation. All rights reserved. Confidentiality, Integrity, Availability (CIA) CIA – The goals of a cybersecurity strategy. • Confidentiality refers to the need to keep confidential sensitive data such as customer information, passwords, or financial data. • Integrity refers to keeping data or messages correct. • Availability refers to making data available to those who need it.
  • 10. © Copyright Microsoft Corporation. All rights reserved. The Zero Trust model Zero Trust guiding principles • Verify explicitly • Least privileged access • Assume breach Six foundational pillars • Identities may be users, services, or devices. • Devices create a large attack surface as data flows. • Applications are the way that data is consumed. • Data should be classified, labeled, and encrypted based on its attributes. • Infrastructure whether on-premises or cloud based, represents a threat vector. • Networks should be segmented.
  • 11. © Copyright Microsoft Corporation. All rights reserved. Encryption Encryption is the process of making data unreadable and unusable to unauthorized viewers. • Encryption of data at rest • Encryption of data in transit • Encryption of data in use Two top-level types of encryption: • Symmetric – uses same key to encrypt and decrypt data • Asymmetric - uses a public key and private key pair
  • 12. © Copyright Microsoft Corporation. All rights reserved. Hashing Hashing uses an algorithm to convert the original text to a unique fixed-length hash value. Hash functions are: • Deterministic, the same input produces the same output. • A unique identifier of its associated data. • Different to encryption in that the hashed value isn't subsequently decrypted back to the original. • Used to store passwords. The password is “salted” to mitigate risk of brute-force dictionary attack.
  • 13. © Copyright Microsoft Corporation. All rights reserved. Compliance concepts Data residency - Regulations govern the physical locations where data can be stored and how and when it can be transferred, processed, or accessed internationally. Data sovereignty - Data, particularly personal data, is subject to the laws and regulations of the country/region in which it's physically collected, held, or processed. Data privacy - Providing notice and being transparent about the collection, processing, use, and sharing of personal data are fundamental principles of privacy laws and regulations.
  • 14. Lesson 2: Describe identity concepts
  • 15. © Copyright Microsoft Corporation. All rights reserved. Lesson 2 Introduction After completing this lesson, you’ll be able to: • Understand the difference between authentication and authorization. • Describe the concept of identity as a security perimeter. • Describe identity-related services.
  • 16. © Copyright Microsoft Corporation. All rights reserved. Authentication and authorization Authentication (AuthN) Authentication is the process of proving that a person is who they say they are. Authentication grants access. Authorization (AuthZ) Authorization determines the level of access or the permissions an authenticated person has to your data and resources.
  • 17. © Copyright Microsoft Corporation. All rights reserved. Identity as the primary security perimeter Identity has become the new security perimeter that enables organizations to secure their assets. An identity is how someone or something can be verified and authenticated and may be associated with: • User • Application • Device • Other Four pillars of an identity infrastructure: • Administration • Authentication • Authorization • Auditing
  • 18. © Copyright Microsoft Corporation. All rights reserved. Modern authentication and the role of the identity provider Modern authentication is an umbrella term for authentication and authorization methods between a client and a server. At the center of modern authentication is the role of the identity provider (IdP). IdP offers authentication, authorization, and auditing services. IdP enables organizations to establish authentication and authorization policies, monitor user behavior, and more. A fundamental capability of an IdP and “modern authentication” is the support for single sign-on (SSO). Microsoft Azure Active Directory is an example of a cloud-based identity provider.
  • 19. © Copyright Microsoft Corporation. All rights reserved. The concept of directory services and Active Directory A directory is a hierarchical structure that stores information about objects on the network. A directory service stores directory data and makes it available to network users, administrators, services, and applications. The best-known service of this kind is Active Directory Domain Services (AD DS), a central component in organizations with on-premises IT infrastructure. Azure Active Directory is the evolution of identity and access management solutions, providing organizations an Identity as a Service (IDaaS) solution for all their apps across cloud and on-premises.
  • 20. © Copyright Microsoft Corporation. All rights reserved. The concept of Federation A simplified way to think about federation: The website uses the authentication services of Identity Provider A (IdP-A). The user authenticates with Identity Provider B (IdP-B). IdP-A has a trust relationship configured with IdP-B. When the user signs-in to the website, the website can trust the user’s credentials and allow access.
  • 21. © Copyright Microsoft Corporation. All rights reserved. Module Summary In this module, you have: • Learned about some important security and compliance concepts. ‒ Looked at the shared responsibility model. ‒ Learned about defense in depth and how the CIA triad represents the goals of a cybersecurity strategy. ‒ Learned about the guiding principles and the six foundational elements that make up the Zero Trust model. ‒ Learned about the data compliance concepts of data residency, data sovereignty, and data privacy. • Learned about some important identity concepts. ‒ Learned about authentication and authorization. ‒ Learned about the concept of identity as a security perimeter & the four pillars of an identity infrastructure. ‒ Learned about identity-related services, including the role of an identity provider, directory services, and federation.
  • 22. Module 2: Describe the capabilities of Microsoft Identity and Access Management Solutions
  • 23. Module Agenda Explore the services and identity types of Azure Active Directory. Explore the authentication capabilities of Azure Active Directory. Explore the access management capabilities of Azure Active Directory. Describe identity protection governance capabilities of Azure Active Directory.
  • 24. Lesson 1: Explore the services and identity types of Azure Active Directory.
  • 25. © Copyright Microsoft Corporation. All rights reserved. Lesson 1 Introduction After completing this lesson, you’ll be able to: • Describe Azure AD. • Describe the identity types that Azure AD supports.
  • 26. © Copyright Microsoft Corporation. All rights reserved. Microsoft Azure Active Directory (part of Entra) Microsoft Entra is our product family that encompasses all of Microsoft’s identity and access capabilities, including Microsoft Azure Active Directory (Azure AD) Azure AD is Microsoft’s cloud-based identity and access management service. Capabilities of Azure AD include: • Organizations can enable their employees, guests, and others to sign in and access the resources they need. • Provide a single identity system for their cloud and on- premises applications. • Protect user identities and credentials and to meet an organization’s access governance requirements. • Each Microsoft 365, Office 365, Azure, and Dynamics 365 Online subscription automatically use an Azure AD tenant.
  • 27. © Copyright Microsoft Corporation. All rights reserved. Azure AD identity types Azure AD manages different types of identities: users, service principals, managed identities, and devices. User – Generally speaking, a user is a representation of an individual’s identity that's managed by Azure AD. Employees and guests are represented as users in Azure AD. Device - A piece of hardware, such as mobile devices, laptops, servers, or printer. Device identities can be set up in different ways in Azure AD, to determine properties such as who owns the device. Service principal - You can think of it as an identity for an application. A service principal is created in every tenant the application is used & defines who can access the app, what resources the app can access, and more. Managed identity – A type of service principal, a managed identity provides an identity for applications to use when connecting to resources that support Azure AD authentication. Developers don’t need to manage credentials.
  • 28. Demo Azure Active Directory user settings
  • 29. © Copyright Microsoft Corporation. All rights reserved. External identities in Azure AD Two different Azure AD External Identities: B2B collaboration B2B collaboration allows you to share your apps and resources with external users. B2C access management B2C is an identity management solution for consumer and customer facing apps.
  • 30. © Copyright Microsoft Corporation. All rights reserved. The concept of hybrid identities • A hybrid identity is a common user identity for authentication and authorization to all resources, regardless of location (on-prem & cloud). • With Azure AD Connect updates to your on-premises AD DS, are synchronized to your Azure AD. • Hybrid identity Authentication methods: • Password hash sync • Passthrough authentication • Federated authentication
  • 31. Lesson 2: Explore the authentication capabilities of Azure Active Directory
  • 32. © Copyright Microsoft Corporation. All rights reserved. Lesson 2 Introduction After completing this lesson, you’ll be able to: • Describe the authentication methods of Azure AD. • Describe multi-factor authentication in Azure AD. • Describe the password protection and management capabilities of Azure AD.
  • 33. © Copyright Microsoft Corporation. All rights reserved. Authentication methods of Azure AD Passwords (primary auth) Phone-based authentication • SMS ( primary & secondary auth) • Voice (secondary auth) OATH standard for how codes are generated in one-time passwords (secondary auth) • SW tokens • HW tokens Passwordless (primary & secondary auth) • Biometrics (Windows Hello) • Microsoft Authenticator • FIDO2
  • 34. © Copyright Microsoft Corporation. All rights reserved. Multi-factor authentication (MFA) in Azure AD Multifactor authentication (MFA) & Security Defaults MFA requires more than one form of verification: • Something you know • Something you have • Something you are Security defaults: • A set of basic identity security mechanisms recommended by Microsoft. • A great option for organizations that want to increase their security posture but don’t know where to start, or for organizations using the free tier of Azure AD licensing.
  • 35. © Copyright Microsoft Corporation. All rights reserved. Self-service password reset (SSPR) in Azure AD Benefits of Self-service password reset: • Administrators can change settings to accommodate new security requirements. • It saves the organization money by reducing the number of calls and requests to help desk staff. • It increases productivity, allowing the user to return to work faster. Self-service password reset works in the following scenarios: • Password change • Password reset • Account unlock Authentication method of SSPR: • Mobile app notification • Mobile phone • Mobile app code • Office phone • email • Security questions
  • 36. Demo Azure Active Directory self-service password reset (SSPR)
  • 37. © Copyright Microsoft Corporation. All rights reserved. Password protection & management capabilities in Azure AD Global banned password list Custom banned password lists Protecting against password spray Hybrid security
  • 38. Lesson 3: Explore the access management capabilities of Azure Active Directory
  • 39. © Copyright Microsoft Corporation. All rights reserved. Lesson 3 Introduction After this lesson, you’ll be able to:
  • 40. © Copyright Microsoft Corporation. All rights reserved. Conditional access Conditional Access signals: • User or group membership • Named location information • Device • Application • Real-time sign-in risk detection • Cloud apps or actions • User risk Access controls: • Block access. • Grant access. • Require one or more conditions to be met before granting access. • Control user access based on session controls to enable limited experiences within specific cloud applications.
  • 42. © Copyright Microsoft Corporation. All rights reserved. Azure AD roles & role-based access control (RBAC) Azure AD roles control permissions to manage Azure AD resources. Built-in roles Custom roles Categories of Azure AD roles: Azure AD specific, service- specific, cross service Only grant the access users need
  • 43. Lesson 4: Describe the identity protection and governance capabilities of Azure Active Directory
  • 44. © Copyright Microsoft Corporation. All rights reserved. Lesson 4 Introduction
  • 45. © Copyright Microsoft Corporation. All rights reserved. Identity governance in Azure AD The tasks of Azure AD identity governance • Govern the identity lifecycle. • Govern access lifecycle. • Secure privileged access for administration. Identity lifecycle • Join: A new digital identity is created. • Move: Update access authorizations. • Leave: Access may need to be removed.
  • 46. © Copyright Microsoft Corporation. All rights reserved. Entitlement management and access reviews Entitlement management • It is an identity governance feature that enables organizations to manage identity and access lifecycle at scale. • It automates access request workflows, access assignments, reviews, and expiration. Access reviews • Enable organizations to efficiently manage group memberships, access to enterprise applications, and role assignment. • Ensure that only the right people have access to resources. • Used to review and manage access for both users and guests. Terms of use • Allow information to be presented to users, before they access data or an application. • Ensure users read relevant disclaimers for legal or compliance requirements.
  • 47. © Copyright Microsoft Corporation. All rights reserved. Privileged Identity Management (PIM) PIM enables you to manage, control, and monitor access to important resources in your organization. Just in time, providing privileged access only when needed, and not before. Time-bound, by assigning start and end dates that indicate when a user can access resources. Approval-based, requiring specific approval to activate privileges. Visible, sending notifications when privileged roles are activated. Auditable, allowing a full access history to be downloaded.
  • 48. © Copyright Microsoft Corporation. All rights reserved. Azure Identity Protection Enables organizations to accomplish three key tasks: • Automate the detection and remediation of identity-based risks. • Investigate risks using data in the portal. • Export risk detection data to third-party utilities for further analysis. It can categorize and calculate risk: • Categorize risk into three tiers: low, medium, and high. • Calculate the sign-in risk, and user identity risk. It provides organizations with three reports: • Risky users • Risky sign-ins • Risk detections
  • 49. © Copyright Microsoft Corporation. All rights reserved. Module Summary Azure AD and services and identity types Azure AD supports. • Explore the authentication capabilities of Azure AD and MFA. • Explore the access management capabilities of Azure AD with Conditional Access and Azure AD RBAC. • Describe identity protection and governance capabilities of Azure AD, including PIM, entitlement management, and access reviews.
  • 50. Module 3 (part 1 of 2): Describe the Capabilities of Microsoft Security Solutions
  • 51. Module Agenda Describe basic security capabilities in Azure. Describe security management capabilities of Azure.
  • 52. Lesson 1: Describe basic security capabilities in Azure
  • 53. © Copyright Microsoft Corporation. All rights reserved. Lesson 1 Introduction After completing this lesson, you should be able to: Describe Azure security capabilities for protecting your network. Describe how Azure can protect your VMs. Describe how encryption on Azure can protect your data.
  • 54. © Copyright Microsoft Corporation. All rights reserved. Azure DDoS protection A Distributed Denial of Service (DDoS) attack makes resources unresponsive. Azure DDoS Protection analyzes network traffic and discards anything that looks like a DDoS attack. Azure DDoS Protection tiers: • Basic • Standard
  • 55. © Copyright Microsoft Corporation. All rights reserved. Azure Firewall Azure Firewall protects your Azure Virtual Network (VNet) resources from attackers. Features include: • Built-in high availability & Availability Zones • Outbound SNAT & inbound DNAT • Threat intelligence • Network & application-level filtering • Multiple public IP addresses • Integration with Azure Monitor
  • 56. © Copyright Microsoft Corporation. All rights reserved. Web Application Firewall Web Application Firewall (WAF) provides centralized protection of your web applications from common exploits and vulnerabilities. • Simpler security management • Improves the response time to a security threat • Patching a known vulnerability in one place • Protection against threats and intrusions
  • 57. © Copyright Microsoft Corporation. All rights reserved. Network segmentation and Azure VNet Reasons for network segmentation: • The ability to group related assets. • Isolation of resources. • Governance policies set by the organization. Azure Virtual Network (VNet): • Network level containment of resources with no traffic allowed across VNets or inbound to VNet. • Communication needs to be explicitly provisioned. • Control how resources in a VNet communicate with other resources, the internet, and on- premises networks.
  • 58. © Copyright Microsoft Corporation. All rights reserved. Azure Network Security groups Network security groups (NSG) let you allow or deny network traffic to and from Azure resources that exist in your Azure Virtual Network. • An NSG can be associated with multiple subnets or network interfaces in a VNet. • An NSG is made up of inbound and outbound security rules. • Each rule specifies one or more of the following properties: - Name - Priority - Source or destination - Protocol - Direction - Port range - Action • Example default inbound rule labeled “DenyAllInbound” Priority Source Source ports Destination Destination ports Protocol Access 6500 0.0.0.0/0 0-65535 0.0.0.0/0 0-65535 Any Any
  • 59. Demo Azure Network Security Groups
  • 60. © Copyright Microsoft Corporation. All rights reserved. Secure remote access to VMs: Azure Bastion & Just-in-time access Azure Bastion - secure connectivity to your VMs from the Azure portal. Just-in-time access – secure access when needed.
  • 61. © Copyright Microsoft Corporation. All rights reserved. Ways Azure encrypts data & use of Key Vault Encryption on Azure Azure Storage Service Encryption Azure Disk Encryption Transparent data encryption (TDE) What is Azure Key Vault? Secrets management Key management Certificate management Store secrets backed by HW or SW
  • 62. Lesson 2: Describe security management capabilities of Azure
  • 63. © Copyright Microsoft Corporation. All rights reserved. Lesson 2 Introduction After completing this lesson, you’ll be able to: Describe cloud security posture management. Describe Microsoft Defender for Cloud. Understand the Azure Security Benchmark and security baselines in Azure.
  • 64. © Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Cloud Microsoft Defender for Cloud is a tool for security posture management and threat protection. It strengthens the security posture of your cloud resources, and with its integrated Microsoft Defender plans, protects workloads running in Azure, hybrid, and other cloud platforms. Microsoft Defender for Cloud features cover two broad pillars of cloud security: Cloud security posture management(CSPM): • Tools & services designed to improve cloud security management. • Monitor and prioritize security enhancements and features in your cloud environment. • Securescore in Microsoft Defender for Cloud provides visibility to your current security situation & hardening guidance to help improve security. Cloud workload protection (CWP): • Detect and resolve threats to resources, workloads, and services. • CWP provided through Microsoft Defender plans specific to the types of resources in your subscriptions. • Defender plans include Microsoft Defender for servers, App Service, SQL, Key Vault, and more…
  • 65. © Copyright Microsoft Corporation. All rights reserved. Secure score in Microsoft Defender for Cloud Your security posture at-a-glance • Continually assesses your resources, subscriptions, and organization for security issue. • Aggregates all the findings into a single score. • Hardening recommendations on any identified security misconfigurations & weaknesses.
  • 66. © Copyright Microsoft Corporation. All rights reserved. Enhanced security of Microsoft Defender for Cloud Microsoft Defender for Cloud plans offer Enhanced security features for your workloads: • Endpoint detection and response • Vulnerability scanning • Multi-cloud security • Hybrid security • Threat protection alerts • Access and application controls
  • 68. © Copyright Microsoft Corporation. All rights reserved. Azure Security Benchmark & Security baselines for Azure The Azure Security Benchmark (ASB) provides prescriptive best practices & recommendations to improve the security of workloads, data, and services on Azure. Security baselines for Azure apply guidance from the ASB to the specific service for which it is defined. The image below is an extract from the security baseline for Azure AD.
  • 69. © Copyright Microsoft Corporation. All rights reserved. Module Summary In this module, you have: • Learned about basic security capabilities in Azure. • Learned about the security management capabilities of Azure.
  • 70. Module 3 (part 2 of 2): Describe the Capabilities of Microsoft Security Solutions
  • 71. Module Agenda Describe security capabilities of Microsoft Sentinel. Describe threat protection with Microsoft 365 Defender.
  • 72. Lesson 3: Describe security capabilities of Microsoft Sentinel
  • 73. © Copyright Microsoft Corporation. All rights reserved. Lesson 3 Introduction After completing this lesson, you’ll be able to: Describe the security concepts for SIEM and SOAR. Describe how Microsoft Sentinel provides integrated threat management.
  • 74. © Copyright Microsoft Corporation. All rights reserved. SIEM and SOAR SIEM What is security incident and event management? A SIEM system is a tool that an organization uses to collect data from across the whole estate, including infrastructure, software, and resources. It does analysis, looks for correlations or anomalies, and generates alerts and incidents. SOAR What is security orchestration automated response? A SOAR system takes alerts from many sources, such as a SIEM system. The SOAR system then triggers action- driven automated workflows and processes to run security tasks that mitigate the issue.
  • 75. © Copyright Microsoft Corporation. All rights reserved. Microsoft Sentinel provides integrated threat management (Slide 1) Collect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds. Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence. Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft. Respond to incidents rapidly with built-in orchestration and automation of common security.
  • 76. © Copyright Microsoft Corporation. All rights reserved. Microsoft Sentinel provides integrated threat management (Slide 2) Connect Microsoft Sentinel to your data: Use connectors for Microsoft solutions providing real- time integration. Workbooks: Monitor the data using the Microsoft Sentinel integration with Azure Monitor Workbooks. Analytics: Using built-in analytics alerts, you’ll get notified when anything suspicious occurs. Manage incidents: An incident is created when an alert that you've enabled is triggered. Security automation and orchestration: Integrate with Logic Apps, to create workflows & playbooks. Notebooks: Use Jupyter notebooks to extend the scope of what you can do with Microsoft Sentinel data. Investigation: Understand the scope of a potential security threat and find the root cause. Hunting: Use search-and-query tools, to hunt proactively for threats, before an alert is triggered. Community: Download content from the private community GitHub repository to create custom workbooks, hunting queries, and more.
  • 78. Lesson 4: Describe threat protection with Microsoft 365 Defender
  • 79. © Copyright Microsoft Corporation. All rights reserved. Lesson 4 Introduction After completing this lesson, you’ll be able to: Describe the Microsoft 365 Defender service. Describe how Microsoft 365 Defender provides integrated protection against sophisticated attacks. Describe and explore the Microsoft 365 Defender portal.
  • 80. © Copyright Microsoft Corporation. All rights reserved. Microsoft 365 Defender services Microsoft 365 Defender Natively coordinate the detection, prevention, investigation, and response to threats. Protects identities, endpoints, apps, and email & collaboration.
  • 81. © Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Office 365 Microsoft Defender for Office 365 covers: 1 2 3 4 Threat protection policies Reports Threat investigation and response capabilities Automated investigation and response capabilities Microsoft Defender for Office 365 Plan 1 • Safe Attachments • Safe Links • Safe Attachments for SharePoint, OneDrive, & Microsoft Teams • Anti-phishing protection • Real-time detections Microsoft Defender for Office 365 Plan 2 · Threat Trackers & Threat Explorer · Automated investigation & response (AIR) · Attack Simulator · Proactively hunt for threats · Investigate incidents and alerts Microsoft Defender for Office 365 availability · Microsoft 365 E5 · Office 365 E5 · Office 365 A5 · Microsoft 365 Business Premium
  • 82. © Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Endpoint Microsoft Defender for Endpoint is a platform designed to help enterprise networks protect endpoints.
  • 83. © Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Cloud Apps Microsoft Defender for Cloud Apps provides rich visibility to your cloud services, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your Microsoft and third-party cloud services. The Defender for Cloud Apps framework · Discover and control the use of Shadow IT · Protect your sensitive information anywhere in the cloud · Protect against cyberthreats and anomalies · Assess your cloud apps' compliance Office 365 Cloud App Security Enhanced Cloud App Discovery in Azure Active Directory
  • 84. Demo Microsoft Defender for Cloud Apps
  • 85. © Copyright Microsoft Corporation. All rights reserved. Microsoft Defender for Identity Microsoft Defender for Identity covers following key areas Monitor and profile user behavior and activities Defender for Identity monitors and analyzes user activities and information across your network, including permissions and group membership, creating a behavioral baseline for each user. Protect user identities and reduce the attack surface Defender for Identity gives invaluable insights on identity configurations and suggested security best practices. Through security reports and user profile analytics. Identify suspicious activities and advanced attacks across the cyberattack kill-chain • Reconnaissance • Compromised credentials • Lateral movements • Domain dominance Investigate alerts and user activities Defender for Identity is designed to reduce general alert noise, providing only relevant, important security alerts in a simple, real-time organizational attack timeline.
  • 86. © Copyright Microsoft Corporation. All rights reserved. Microsoft 365 Defender portal The Microsoft 365 Defender portal combines protection, detection, investigation, and response to email, collaboration, identity, and device threats, in a central portal. View the security health of your organization. Act to configure devices, users, and apps. Get alerts for suspicious activity. The Microsoft 365 Defender navigation pane include these options and more: Learning hub Incidents & alerts Action center Reports Secure Score Hunting Email & collaboration Permissions & roles Threat analytics Endpoints
  • 87. © Copyright Microsoft Corporation. All rights reserved. Microsoft Secure Score Microsoft Secure Score is a representation of a company's security posture. Will show all possible improvements for the product, whatever the license edition, subscription, or plan. Supports recommendations for: • Microsoft 365 • Azure Active Directory • Microsoft Defender for Endpoint • Microsoft Defender for Identity • Microsoft Defender for Cloud Apps
  • 88. Demo The Microsoft 365 Defender portal
  • 89. © Copyright Microsoft Corporation. All rights reserved. Module Summary In this module, you have: • Learned about the security capabilities of Microsoft Sentinel. • Learned about the threat protection with Microsoft 365 Defender.
  • 90. Module 4: Describe the Capabilities of Microsoft Compliance Solutions
  • 91. Module Agenda Describe the Service Trust Portal and privacy with Microsoft Describe the compliance management capabilities in Microsoft Purview. Describe information protection and data lifecycle management capabilities in Microsoft Purview. Describe insider risk capabilities in Microsoft Purview. Describe eDiscovery & audit capabilities in Microsoft Purview. Describe resource governance capabilities in Azure.
  • 92. Lesson 1: Describe the Service Trust Portal and privacy with Microsoft
  • 93. © Copyright Microsoft Corporation. All rights reserved. Lesson 1 Introduction
  • 94. © Copyright Microsoft Corporation. All rights reserved. Service Trust Portal The Service Trust Portal provides: • Information • Tools • Other resources about Microsoft security, privacy, and compliance practices. You can access below offerings: • Service Trust Portal • Trust Documents • Industries & Regions • Trust Center • Resources • My Library
  • 96. © Copyright Microsoft Corporation. All rights reserved. Microsoft's privacy principles Control: Putting you, the customer, in control of your privacy with easy-to-use tools and clear choices. Transparency: Being transparent about data collection and use so that everyone can make informed decisions. Security: Protecting the data that's entrusted to Microsoft by using strong security and encryption. Strong legal protections: Respecting local privacy laws and fighting for legal protection of privacy as a fundamental human right. No content-based targeting: Not using email, chat, files, or other personal content to target advertising. Benefits to you: When Microsoft does collect data, it's used to benefit you, the customer, and to make your experiences better.
  • 97. © Copyright Microsoft Corporation. All rights reserved. Microsoft Priva Priva Privacy Risk Management • Overview dashboard provides automatic updates about your data with important trends. • Data profile provides a snapshot view of the personal data your organization stores in Microsoft 365 and where it lives. • Set up policies that identify privacy risks in your Microsoft 365 environment and enable easy remediation. Priva Subject Rights Requests Workflow, automation, and collaboration capabilities to help search for subject data, review findings, collect the appropriate files, and produce reports.
  • 98. Lesson 2: Describe the compliance management capabilities in Microsoft Purview
  • 99. © Copyright Microsoft Corporation. All rights reserved. Lesson 2 Introduction • Describe the use and benefits of compliance score.
  • 100. © Copyright Microsoft Corporation. All rights reserved. Microsoft Purview compliance portal Microsoft Purview compliance portal • A view of how the organization is meeting its compliance requirements • Solutions that can be used to help with compliance • Information about active alerts • And more… Navigation • Access to alerts, reports, policies, compliance solutions, and more. • Add or remove options for a customized navigation pane. • Customize navigation control.
  • 101. © Copyright Microsoft Corporation. All rights reserved. Compliance Manager Compliance Manager simplifies compliance and reduces risk by providing: • Prebuilt assessments based on common standards • Workflow capabilities to complete risk assessments • Step-by-step improvement actions • Compliance score, shows overall compliance posture Key elements of Compliance Manager • Controls • Assessments • Templates • Improvement actions
  • 102. © Copyright Microsoft Corporation. All rights reserved. Compliance score Benefits of compliance score: • Help an organization understand its current compliance posture. • Help prioritize actions based on their potential to reduce risk. Understand your compliance score • Actions - Your improved actions - Microsoft actions • Action types ( & action subcategory) - Mandatory (preventive, detective, or corrective) - Discretionary (preventive, detective, or corrective)
  • 103. Demo Microsoft Purview compliance portal
  • 104. Lesson 3: Describe information protection and data lifecycle management in Microsoft Purview
  • 105. © Copyright Microsoft Corporation. All rights reserved. Lesson 3 Introduction
  • 106. © Copyright Microsoft Corporation. All rights reserved. Know your data, protect your data, and govern your data Know your data: Understand your data landscape and identify important data across on-premises, cloud, and hybrid environments. Protect your data: Apply flexible protection actions including encryption, access restrictions, and visual markings. Prevent data loss: Detect risky behavior and prevent accidental oversharing of sensitive information. Govern your data: Automatically keep, delete, and store data and records in a compliant manner.
  • 107. © Copyright Microsoft Corporation. All rights reserved. Data classification capabilities of the compliance portal Sensitive information types. Trainable classifiers: Pre-trained classifiers and Custom trainable classifiers. Understand and explore the data. The content explorer: It enables administrators to gain visibility into the content that has been summarized in the overview pane. The activity explorer: It can monitor what's being done with labeled content across the organization.
  • 108. © Copyright Microsoft Corporation. All rights reserved. Sensitivity labels and policies Sensitivity labels Labels are: • Customizable • Clear text • Persistent Usage: • Encrypt email and documents. • Mark the content. • Apply the label automatically. • Protect content in containers: sites and groups. • Extend sensitivity labels to third-party apps and services. • Classify content without using any protection settings. Label policies Policies enable admins to: • Choose the users and groups that can see labels • Apply a default label to all new emails and documents • Require justifications for label changes • Require users to apply a label (mandatory labeling) • Link users to custom help pages Once a sensitivity label is applied to an email or document, any configured protection settings for that label are enforced on the content.
  • 110. © Copyright Microsoft Corporation. All rights reserved. Data loss prevention (DLP) DLP protects sensitive information and prevents its inadvertent disclosure. • DLP policies protect information by identifying and automatically protecting sensitive data. • Protect sensitive information across Microsoft 365 – OneDrive for Business, SharePoint Online, Exchange Online and Microsoft Teams Endpoint Data Loss Prevention • DLP extended to Windows 10 devices. • Audit and manage activities including creating, coping, printing, & renaming items Data Loss Prevention in Microsoft Teams • DLP capabilities extended to Microsoft Teams chat and channel message.
  • 111. © Copyright Microsoft Corporation. All rights reserved. Retention labels and policies Retention settings work with SharePoint, OneDrive, Teams, Yammer and Exchange and help organizations manage and govern information by ensuring content is kept only for a required time, and then permanently deleted. Retention labels: • Are applied at an item level. • Emails and documents can have only a single retention label assigned to it at a time. • Retention settings from retention labels travel with the content in your Microsoft 365 tenant. • Can be applied manually or automatically. • Retention labels support disposition review of the content before it's permanently deleted. Retention policies: • Are applied at site or mailbox level, • Can be applied to multiple locations or specific locations or users. • Items inherit the retention settings from their container. • If an item is moved, the retention setting does not travel to the new location.
  • 112. © Copyright Microsoft Corporation. All rights reserved. Records management Records management helps an organization look after their legal obligations and helps to demonstrate compliance with regulations. • When content is labeled as a record, the following happens: - Restrictions are put in place to block certain activities. - Activities are logged. - Proof of disposition is kept at the end of the retention period. • To enable items to be marked as records, an administrator sets up retention labels.
  • 113. Lesson 4: Describe insider risk capabilities in Microsoft Purview
  • 114. © Copyright Microsoft Corporation. All rights reserved. Lesson 4 Introduction
  • 115. © Copyright Microsoft Corporation. All rights reserved. Insider risk solutions in Microsoft Purview Insider risk management helps minimize internal risks by enabling you to detect, investigate, and act on malicious and inadvertent activities in your organization. Communication compliance helps minimize communication risks by helping you detect, capture, and act on inappropriate messages in your organization. Supported services: Microsoft Teams, Exchange Online, Yammer, & 3rd party communications in an org. Information barriers allow you to restrict communication and collaboration between two internal groups to avoid a conflict of interest from occurring in your organization. Supported in Microsoft Teams, OneDrive for Business, SharePoint Online, and more.
  • 116. Lesson 5: Describe eDiscovery & Audit capabilities in Microsoft Purview
  • 117. © Copyright Microsoft Corporation. All rights reserved. Lesson 5 Introduction
  • 118. © Copyright Microsoft Corporation. All rights reserved. eDiscovery in Microsoft Purview • Electronic discovery, or eDiscovery, is the process of identifying and delivering electronic information that can be used as evidence in legal cases. • eDiscovery tools: Content search, eDiscovery (Standard), eDiscovery (Premium)
  • 119. © Copyright Microsoft Corporation. All rights reserved. Auditing in Microsoft Purview • Microsoft Purview auditing solutions help organizations effectively respond to security events, forensic investigations, internal investigations, and compliance obligations. • Microsoft Purview provides two auditing solutions: Audit (Standard) and Audit (Premium).
  • 120. Lesson 6: Describe resource governance capabilities in Azure
  • 121. © Copyright Microsoft Corporation. All rights reserved. Lesson 6 Introduction • Describe Azure Policy. • Describe Azure Blueprints. • Describe Microsoft Purview.
  • 122. © Copyright Microsoft Corporation. All rights reserved. Azure Policy Trigger a Policy evaluation • In-scope resource is created, deleted, or updated • A policy or an initiative is newly assigned to a scope. • A policy or an initiative assigned to a scope is updated. • The standard compliance evaluation cycle Azure Policy • Help enforce standards and assess compliance across your organization. • A compliance dashboard, to evaluate the overall state of the environment. • Evaluates resources in Azure and Arc enabled resources. Responses to non-compliant resources • Deny a change to a resource. • Log changes to a resource. • Alter a resource before or after a change. • Deploy related compliant resources.
  • 124. © Copyright Microsoft Corporation. All rights reserved. Azure Blueprints • Azure Blueprints provide a way to define a repeatable set of Azure resources. • Rapidly provision environments, that are in line with the organization’s compliance requirements. • Provision Azure resources across several subscriptions simultaneously for quicker delivery. • Declarative way to orchestrate the deployment of various resource templates and artifacts, including: ‒ Role Assignments ‒ Policy Assignments ‒ Azure Resource Manager templates (ARM templates) ‒ Resource Groups • Blueprint objects are replicated to multiple Azure regions. • The relationship between the blueprint definition and the blueprint assignment is preserved.
  • 125. © Copyright Microsoft Corporation. All rights reserved. Microsoft Purview Microsoft Purview is a unified data governance service that helps organizations manage and govern their on-premises, multi- cloud, and SaaS data. • Data Map - capture metadata about enterprise data, to identify and classify sensitive data. • Data Catalog - quickly and easily find relevant data. • Data Estate Insights - understand what data is actively scanned, where sensitive data is, and how it moves.
  • 126. © Copyright Microsoft Corporation. All rights reserved. Module Summary • Learned about the information protection and data lifecycle management capabilities of Microsoft Purview, including sensitivity & retention labels, DLP, and more. • Learned about insider risk capabilities in Microsoft Purview. • Learned about eDiscovery & audit capabilities of Microsoft Purview. • Describe resource governance capabilities in Azure, including Azure policy, Blueprints, and Microsoft Purview.