SlideShare a Scribd company logo
1 of 60
Download to read offline
Microsoft©
Information
Security - Cloud & Mobile
Presented by
Vijay Mohire
1
Introduction
2
Information Security and Risk
Management (IS&RM)
• Microsoft’s Information Security (InfoSec) organization
• Responsible for information security risk management
• Information protection, enterprise business continuity
planning
• Accelerate secure and reliable business for Microsoft,
partners and customers
• Publisher of The Security Risk Management Guide
3
ACE team
• The ACE (Assessment, Consulting & Engineering) team
is the assessment arm of Microsoft’s Information
Security & Risk Mgmt. (IS&RM) organization
• Provides security assessment services to both Microsoft
and Microsoft’s enterprise + public sector customers
• Shares and showcases with external customers how
Microsoft manages risks
• Learns and brings back best practices from Microsoft’s
customers
4
My planned contributions to ACE
Assessments
• Risk assessments – Threat modeling, business impact
analysis, threat to vulnerability pairing, qualitative/
quantitative analysis, STREAD, DREAD
• Compliance checks- ISO, HIPAA, PCI
• Due diligence – Security gap analysis, Future state model
design, constraints assessments
• Strategy - Assess the capability, maturity and roadmaps
for investments in Info Sec, business continuity , migration
to cloud
5
My planned contributions to ACE
Consultation
• Assist clients in achieving their goals in areas of
cloud and mobile security
• Provide advice on use of Microsoft’s security tools,
SDL based development methodology
• Assist clients’ in leveraging security frameworks
• Educate in effective use of security best practices
• Help companies in developing & establishing security
practice, programs, RFP/ RFI 6
My planned contributions to ACE
Engineering
• Manage installation, instrumentation of data center
components where security is in scope
•
• Manage security features in electrical cabling, power
units, physical security devices, storage areas
• Triage and delegate security issues, related to
engineering systems, motherboards
7
My planned contributions to ACE
Program Management
• Plan, design, develop strategies for innovative
security features for ―mobile-first, cloud-first‖
environment
• Delegate, monitor project activities based on program
needs and client feedbacks
• Manage red / blue teams related to penetration
testing / ethical hackers
• Work on internal training programs and mentor
juniors in achieving capabilities in Info Sec 8
Info-Sec basics
9
Risk
What is risk ?
• Risk is a function of the
likelihood of a given threat-
source’s exercising a
particular potential
vulnerability, and the
resulting impact of that
adverse event on the
organization/asset
10
Threat-sources
• Accidental / intentional disclosure
• Alteration of licensed IT components
• System Configuration errors
• Network errors
• Equipment malfunction
• Natural disaster
• War
11
Vulnerability
• A flaw or weakness in
system security
procedures, design,
implementation, or
internal controls
• This could be
exercised (accidentally
triggered or intentionally
exploited) and result in
a security breach or a
violation of the system’s
security policy
12
Risk assessment
• Risk is assessed by identifying threats and
vulnerabilities, then determining the likelihood and
impact for each risk
• Broadly two types
1. Quantitative risk assessment
2. Qualitative risk assessment
13
Quantitative risk assessment
• By assigning values to information, systems, business
processes, recovery costs, etc., impact, and therefore
risk, can be measured in terms of direct and indirect
costs
• Mathematically, quantitative risk can be expressed as
Annualized Loss Expectancy (ALE)
14
Quantitative risk assessment
ALE = SLE * ARO
Where:
• ALE is the expected monetary loss that can be
expected for an asset due to a risk being realized over a
one-year period
• SLE (Single Loss Expectancy) is the value of a single
loss of the asset. This is the impact of the loss
•
• ARO (Annualized Rate of Occurrence) is how often the
loss occurs. This is the likelihood
15
Qualitative risk assessments
• Qualitative risk assessments typically give risk
results of ―High‖, Moderate‖ and ―Low‖.
• By providing the impact and likelihood definition
tables and the description of the impact, it is possible
to adequately communicate the assessment to the
organization’s management
16
Impact and likelihood table
Tabulating the variables to determine the criticality
of the risk that need to be prioritized and addressed
17
Relating threats to vulnerabilities
• Establishing the relationship is
a mandatory activity, since
risk is defined as the exercise
of a threat against vulnerability
• This is often called threat-
vulnerability (T-V) pairing
• For instance, a threat of ―flood‖
obviously applies to a
vulnerability of ―lack of
contingency planning‖
18
How is risk managed?
• There are four basic strategies for
managing risk: mitigation,
transference, acceptance and
avoidance
• For each risk management
strategy, the cost associated with
the strategy and the basic steps
for achieving the strategy (known
as the Plan Of Action &
Milestones or POAM) must also
be determined
19
Mitigation
• Mitigation is the most commonly
considered risk management
strategy
• Mitigation involves fixing the
flaw or providing some type of
compensatory control to reduce
the likelihood or impact
associated with the flaw
• A common mitigation for a
technical security flaw is to
install a patch provided by the
vendor 20
Transference
• Transference is the process of allowing another party to
accept the risk on your behalf
• This is not widely done for IT systems, however cloud
models provide an opportunity
• Using SaaS, PaaS cloud models, some amount of risk
is being transferred to CSP – cloud service provider
21
Acceptance
• Acceptance is the practice of
simply allowing the system to
operate with a known risk
• Many low risks are simply
accepted
• Risks that have an extremely
high cost to mitigate are also
often accepted
22
Avoidance
• Avoidance is the practice of
removing the vulnerable
aspect of the system or even
the system itself
• Example is removing a legacy
admin system that is causing
hi-impact errors in operations
23
Communicating risks
24
Communicating risks
• A Plan Of Action & Milestones (POAM) should be
part of the risk assessment report presented to
management
• The POAM is a tool to communicate to management
on the proposed and actual completion of the
implementation of the risk management strategies
25
Communicating risks
26
Risk management process
27
Framing risk
• Risk framing establishes the context and provides a
common perspective on how organizations manage risk
•
• Risk framing, as its principal output, produces a risk
management strategy that addresses how
organizations intend to assess risk, respond to risk, and
monitor risk
• Mainly senior leaders, program manager at Tier 1 & 2
are responsible
28
Risk assessment
• Risk assessment identifies, prioritizes, and
estimates risk to organizational operations (i.e.,
mission, functions, image, and reputation),
organizational assets, individuals, other
organizations, and the Nation
• All tiers provide their reports to the security officer
for further action plan
29
Risk response
• Risk response identifies, evaluates, decides on, and
implements appropriate courses of action to accept,
avoid, mitigate, share, or transfer risk to organizational
operations and assets, individuals, other
organizations, and the Nation
• Typically occurs at Tier 1 or Tier 2, with feedbacks
from Tier 3
30
Risk monitoring
Risk monitoring provides organizations with the means
to:
(i) verify compliance
(ii) determine the ongoing effectiveness of risk
response measures; and
(iii) identify risk-impacting changes to organizational
information systems and environments of operation
31
Information technology continuity plan
Conduct a business impact analysis to identify:
1. Critical IT resources
2. Outage impacts and allowable outage times
3. Protocols to provide uninterrupted power by using
UPS devices, power
4. Store backup data in a secure and protected offsite
location
5. Develop recovery strategies that allow critical IT
resources to be recovered within 24 hours.
6. Document the recovery strategy
32
Microsoft’s impact analysis
33
General risk assessment tools
• National Institute of Standards & Technology (NIST)
Methodology – US Federal based
• OCTAVE
®
- The Software Engineering Institute (SEI) at
Carnegie Mellon University developed the Operationally
Critical, Threat, Asset and Vulnerability Evaluation
(OCTAVE) process
• FRAP - The Facilitated Risk Assessment Process (FRAP)
is the creation of Thomas Peltier. FRAP uses formal
qualitative risk analysis methodologies using Vulnerability
Analysis, Hazard Impact Analysis, Threat Analysis and
Questionnaires
34
General risk assessment tools
• COBRA - The Consultative, Objective and Bi-functional
Risk Analysis (COBRA) process was created by C & A
Systems Security Ltd.. Risk assessment is a business
issue rather than a technical issue, tools that can be
purchased and utilized to perform self-assessments of
risk
• Risk Watch- Uses an expert knowledge database to
walk the user through a risk assessment and provide
reports on compliance as well as advice on managing
the risks
35
Microsoft security stack / tools
36
Claims based identity for Azure
37
Microsoft offerings
38
AD-DS, WIF, AD-FS
39
Azure - gatekeeper design pattern
40
Microsoft’s STRIDE threat categories
• Spoofing identity – pose as another user
• Tampering with data – malicious modification of data
• Repudiation – can the action (prohibited action) be traced?
• Information disclosure – disclose of information to
individuals who aren’t supposed to have it
• Denial of service – deny access to valid users (e.g.
consume all the CPU time)
• Elevation of privilege – unprivileged user gains privileged
access (becomes part of the trusted system)
41
Microsoft’s DREAD model to rank threat’s
severity
• Damage potential: The extent of the damage if
vulnerability is exploited
• Reproducibility: How often an attempt at exploiting
vulnerability works
• Exploitability: How much effort is required? Is
authentication required?
• Affected users: How widespread could the exploit
become?
• Discoverability: The likelihood that the researcher or
hacker will find it
42
Security development lifecycle (SDL)
• SDL is a software development process that helps
developers build secure code, address compliance
43
SDL tools
Requirements tools
• Microsoft Solutions Framework (MSF) for Capability
Maturity Model Integration (CMMI) / Microsoft
Solutions Framework (MSF) for Agile
Design tool
• Microsoft Threat Modeling Tool 2014 / 2016
44
SDL tools
Implementation tools
• banned.h
• Code Analysis for C/C++
• SiteLock ATL Template
• Anti-Cross Site Scripting (Anti-XSS) Library
• FxCop (assemblies)
• Microsoft Code Analysis Tool .NET (CAT.NET) - binary
code analysis for XSS, SQL Injection
45
SDL tools
Verification tools
• BinScope binary analyzer- binary files
• SDL Regex fuzzer – tests reg. exp for DoS
• SDL MiniFuzz file fuzzer-detects file-handling flaws
• Attack surface analyzer-detect changes in OS, ACL,
registry, Active-X control
• Application verifier-runtime verification tool for native
code 46
SDL tools
Release tools
SDL process template- integrates the policy,
process, and tools associated with Microsoft SDL
Process Guidance version 4.1 directly into your
VSTS
47
Azure network security
• VNet for isolation of VMs
• ACL and NSG – for access control at VM and subnet
level
• Azure Virtual Filtering Platform (VFP) exposes an easy-
to-program interface to network agents that act on behalf
of network controllers and packet processing on each
host running in the datacenter
• Service endpoint and azure fabric level security
mechanism
48
Security for mobile-first, cloud-first world
• Office 365 app permissions - ability to approve or revoke
permissions
• Azure AD Identity Protection - prevents the use of
compromised credentials
• Microsoft Cloud App Security - new advanced security
capability
• Customer Lockbox - integrates the customer into the
approval process
• Azure Security Center- Centralized security policy at the
subscription level+ Resource Group level ( tailored as per
workloads)
49
Security for mobile-first, cloud-first world
• Azure Active Directory Identity Protection - detects
suspicious act, user risk severity is calculated and risk-
based policies can be configured at user level
• WindowsAzure.MobileServices.Backend.Security-
security extensions for your .NET mobile backend (
controller code level permissions)hosted in Microsoft
Azure
• System Center 2012 and InTune- mobile device
management (MDM), BYOD policies, remote wipe out
of data in case of theft
50
Industrial standards
51
Industry security management frameworks
( ISO series )
52
Industry security management frameworks
53
Industry security management frameworks
54
The Payment Card Industry Data Security
Standard (PCI DSS)
• PCI DSS provides a baseline of technical and
operational requirements designed to protect
cardholder data
• PCI DSS applies to all entities involved in payment
card processing—including merchants, processors,
acquirers, issuers, and service providers
55
The Payment Card Industry Data Security
Standard (PCI DSS)
56
The Payment Card Industry Data Security
Standard (PCI DSS)
AUDIT TESTING
57
Disclaimer
• Logos, images, text have been referenced from various sources
like NIST, SANS, PCI journals, David Chappell, Microsoft
websites, and internet data that is freely available. Full rights
belong to the individual owners. References are made strictly for
educational and illustration purposes only and for non-commercial
use. Please take advice of original authors before using them. I
am not responsible for any damages, monetary loss arising from
the use of this document
58
Q & A
59
Thank you
60

More Related Content

What's hot

IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop Ersoy AKSOY
 
Security risk management
Security risk managementSecurity risk management
Security risk managementbrijesh singh
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by FirstMutualHoldings
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30timmcguinness
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security ManagementLuis Martins
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk ManagementSocial Tables
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software IndustryRehan Akhtar
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsArun Prabhakar
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsToño Herrera
 

What's hot (19)

Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop IIA Facilitated Risk Workshop
IIA Facilitated Risk Workshop
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
DEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTERDEVELOPING AN ICT RISK REGISTER
DEVELOPING AN ICT RISK REGISTER
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Risk Based Security Management
Risk Based Security ManagementRisk Based Security Management
Risk Based Security Management
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacs
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Technology Risk Management
Technology Risk ManagementTechnology Risk Management
Technology Risk Management
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
IT Risk Management
IT Risk ManagementIT Risk Management
IT Risk Management
 
Risk management in Software Industry
Risk management in Software IndustryRisk management in Software Industry
Risk management in Software Industry
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management Fundamentals
 

Similar to Microsoft InfoSec for cloud and mobile

Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdfdotco
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptYasirShaikh34
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in ManufacturingWilliam McBorrough
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
R I S K M A N A G E M E N T
R I S K  M A N A G E M E N TR I S K  M A N A G E M E N T
R I S K M A N A G E M E N Tmadhav shirur
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptxdotco
 
Risk Management
Risk ManagementRisk Management
Risk ManagementSaqib Raza
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk ManagementHayat Denzi
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxRanjitKdk
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessInvensis Learning
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfAbdulrafiiMohammed
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best PracticesPMILebanonChapter
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Shashi Kumar
 

Similar to Microsoft InfoSec for cloud and mobile (20)

Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
Risk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.pptRisk-Management-05012023-025512pm.ppt
Risk-Management-05012023-025512pm.ppt
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
R I S K M A N A G E M E N T
R I S K  M A N A G E M E N TR I S K  M A N A G E M E N T
R I S K M A N A G E M E N T
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Project Risk Management
 Project Risk Management Project Risk Management
Project Risk Management
 
OOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptxOOSE-PRESENTATION.pptx
OOSE-PRESENTATION.pptx
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
IS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdfIS-Risk-Management-Lecture-2.pdf
IS-Risk-Management-Lecture-2.pdf
 
Project Risk management
Project Risk management Project Risk management
Project Risk management
 
Risk Management Best Practices
Risk Management Best PracticesRisk Management Best Practices
Risk Management Best Practices
 
Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) - Unit 8-risk manaegement (1) -
Unit 8-risk manaegement (1) -
 

More from Vijayananda Mohire

Certificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on MLCertificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on MLVijayananda Mohire
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and EngineeringVijayananda Mohire
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and EngineeringVijayananda Mohire
 
Bhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAIBhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAIVijayananda Mohire
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
Azure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuitsAzure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuitsVijayananda Mohire
 
Key projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AIKey projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AIVijayananda Mohire
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceVijayananda Mohire
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureVijayananda Mohire
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureVijayananda Mohire
 
Bhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud OfferingsBhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud OfferingsVijayananda Mohire
 
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsPractical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsVijayananda Mohire
 
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)Vijayananda Mohire
 
Red Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise LinuxRed Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise LinuxVijayananda Mohire
 
Generative AI Business Transformation
Generative AI Business TransformationGenerative AI Business Transformation
Generative AI Business TransformationVijayananda Mohire
 
Microsoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohireMicrosoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohireVijayananda Mohire
 
Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0
Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0
Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0Vijayananda Mohire
 
Intel Partnership - Gold Member - 2024
Intel Partnership - Gold Member - 2024Intel Partnership - Gold Member - 2024
Intel Partnership - Gold Member - 2024Vijayananda Mohire
 

More from Vijayananda Mohire (20)

Certificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on MLCertificate- Peer Review of Book Chapter on ML
Certificate- Peer Review of Book Chapter on ML
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
 
Key projects Data Science and Engineering
Key projects Data Science and EngineeringKey projects Data Science and Engineering
Key projects Data Science and Engineering
 
Bhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAIBhadale IT Hub-Multi Cloud and Multi QAI
Bhadale IT Hub-Multi Cloud and Multi QAI
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
Azure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuitsAzure Quantum Workspace for developing Q# based quantum circuits
Azure Quantum Workspace for developing Q# based quantum circuits
 
Key projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AIKey projects in AI, ML and Generative AI
Key projects in AI, ML and Generative AI
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial Intelligence
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
 
Bhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for AgricultureBhadale IT Cloud Solutions for Agriculture
Bhadale IT Cloud Solutions for Agriculture
 
Bhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud OfferingsBhadale IT Intel and Azure Cloud Offerings
Bhadale IT Intel and Azure Cloud Offerings
 
GitHub Copilot-vijaymohire
GitHub Copilot-vijaymohireGitHub Copilot-vijaymohire
GitHub Copilot-vijaymohire
 
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical ImplicationsPractical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
Practical ChatGPT From Use Cases to Prompt Engineering & Ethical Implications
 
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)Cloud Infrastructure - Partner Delivery Accelerator (APAC)
Cloud Infrastructure - Partner Delivery Accelerator (APAC)
 
Red Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise LinuxRed Hat Sales Specialist - Red Hat Enterprise Linux
Red Hat Sales Specialist - Red Hat Enterprise Linux
 
RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024RedHat_Transcript_Jan_2024
RedHat_Transcript_Jan_2024
 
Generative AI Business Transformation
Generative AI Business TransformationGenerative AI Business Transformation
Generative AI Business Transformation
 
Microsoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohireMicrosoft Learn Transcript Jan 2024- vijaymohire
Microsoft Learn Transcript Jan 2024- vijaymohire
 
Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0
Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0
Bhadale Group of Companies -Futuristic Products Brief-Ver 1.0
 
Intel Partnership - Gold Member - 2024
Intel Partnership - Gold Member - 2024Intel Partnership - Gold Member - 2024
Intel Partnership - Gold Member - 2024
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Microsoft InfoSec for cloud and mobile

  • 1. Microsoft© Information Security - Cloud & Mobile Presented by Vijay Mohire 1
  • 3. Information Security and Risk Management (IS&RM) • Microsoft’s Information Security (InfoSec) organization • Responsible for information security risk management • Information protection, enterprise business continuity planning • Accelerate secure and reliable business for Microsoft, partners and customers • Publisher of The Security Risk Management Guide 3
  • 4. ACE team • The ACE (Assessment, Consulting & Engineering) team is the assessment arm of Microsoft’s Information Security & Risk Mgmt. (IS&RM) organization • Provides security assessment services to both Microsoft and Microsoft’s enterprise + public sector customers • Shares and showcases with external customers how Microsoft manages risks • Learns and brings back best practices from Microsoft’s customers 4
  • 5. My planned contributions to ACE Assessments • Risk assessments – Threat modeling, business impact analysis, threat to vulnerability pairing, qualitative/ quantitative analysis, STREAD, DREAD • Compliance checks- ISO, HIPAA, PCI • Due diligence – Security gap analysis, Future state model design, constraints assessments • Strategy - Assess the capability, maturity and roadmaps for investments in Info Sec, business continuity , migration to cloud 5
  • 6. My planned contributions to ACE Consultation • Assist clients in achieving their goals in areas of cloud and mobile security • Provide advice on use of Microsoft’s security tools, SDL based development methodology • Assist clients’ in leveraging security frameworks • Educate in effective use of security best practices • Help companies in developing & establishing security practice, programs, RFP/ RFI 6
  • 7. My planned contributions to ACE Engineering • Manage installation, instrumentation of data center components where security is in scope • • Manage security features in electrical cabling, power units, physical security devices, storage areas • Triage and delegate security issues, related to engineering systems, motherboards 7
  • 8. My planned contributions to ACE Program Management • Plan, design, develop strategies for innovative security features for ―mobile-first, cloud-first‖ environment • Delegate, monitor project activities based on program needs and client feedbacks • Manage red / blue teams related to penetration testing / ethical hackers • Work on internal training programs and mentor juniors in achieving capabilities in Info Sec 8
  • 10. Risk What is risk ? • Risk is a function of the likelihood of a given threat- source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization/asset 10
  • 11. Threat-sources • Accidental / intentional disclosure • Alteration of licensed IT components • System Configuration errors • Network errors • Equipment malfunction • Natural disaster • War 11
  • 12. Vulnerability • A flaw or weakness in system security procedures, design, implementation, or internal controls • This could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy 12
  • 13. Risk assessment • Risk is assessed by identifying threats and vulnerabilities, then determining the likelihood and impact for each risk • Broadly two types 1. Quantitative risk assessment 2. Qualitative risk assessment 13
  • 14. Quantitative risk assessment • By assigning values to information, systems, business processes, recovery costs, etc., impact, and therefore risk, can be measured in terms of direct and indirect costs • Mathematically, quantitative risk can be expressed as Annualized Loss Expectancy (ALE) 14
  • 15. Quantitative risk assessment ALE = SLE * ARO Where: • ALE is the expected monetary loss that can be expected for an asset due to a risk being realized over a one-year period • SLE (Single Loss Expectancy) is the value of a single loss of the asset. This is the impact of the loss • • ARO (Annualized Rate of Occurrence) is how often the loss occurs. This is the likelihood 15
  • 16. Qualitative risk assessments • Qualitative risk assessments typically give risk results of ―High‖, Moderate‖ and ―Low‖. • By providing the impact and likelihood definition tables and the description of the impact, it is possible to adequately communicate the assessment to the organization’s management 16
  • 17. Impact and likelihood table Tabulating the variables to determine the criticality of the risk that need to be prioritized and addressed 17
  • 18. Relating threats to vulnerabilities • Establishing the relationship is a mandatory activity, since risk is defined as the exercise of a threat against vulnerability • This is often called threat- vulnerability (T-V) pairing • For instance, a threat of ―flood‖ obviously applies to a vulnerability of ―lack of contingency planning‖ 18
  • 19. How is risk managed? • There are four basic strategies for managing risk: mitigation, transference, acceptance and avoidance • For each risk management strategy, the cost associated with the strategy and the basic steps for achieving the strategy (known as the Plan Of Action & Milestones or POAM) must also be determined 19
  • 20. Mitigation • Mitigation is the most commonly considered risk management strategy • Mitigation involves fixing the flaw or providing some type of compensatory control to reduce the likelihood or impact associated with the flaw • A common mitigation for a technical security flaw is to install a patch provided by the vendor 20
  • 21. Transference • Transference is the process of allowing another party to accept the risk on your behalf • This is not widely done for IT systems, however cloud models provide an opportunity • Using SaaS, PaaS cloud models, some amount of risk is being transferred to CSP – cloud service provider 21
  • 22. Acceptance • Acceptance is the practice of simply allowing the system to operate with a known risk • Many low risks are simply accepted • Risks that have an extremely high cost to mitigate are also often accepted 22
  • 23. Avoidance • Avoidance is the practice of removing the vulnerable aspect of the system or even the system itself • Example is removing a legacy admin system that is causing hi-impact errors in operations 23
  • 25. Communicating risks • A Plan Of Action & Milestones (POAM) should be part of the risk assessment report presented to management • The POAM is a tool to communicate to management on the proposed and actual completion of the implementation of the risk management strategies 25
  • 28. Framing risk • Risk framing establishes the context and provides a common perspective on how organizations manage risk • • Risk framing, as its principal output, produces a risk management strategy that addresses how organizations intend to assess risk, respond to risk, and monitor risk • Mainly senior leaders, program manager at Tier 1 & 2 are responsible 28
  • 29. Risk assessment • Risk assessment identifies, prioritizes, and estimates risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation • All tiers provide their reports to the security officer for further action plan 29
  • 30. Risk response • Risk response identifies, evaluates, decides on, and implements appropriate courses of action to accept, avoid, mitigate, share, or transfer risk to organizational operations and assets, individuals, other organizations, and the Nation • Typically occurs at Tier 1 or Tier 2, with feedbacks from Tier 3 30
  • 31. Risk monitoring Risk monitoring provides organizations with the means to: (i) verify compliance (ii) determine the ongoing effectiveness of risk response measures; and (iii) identify risk-impacting changes to organizational information systems and environments of operation 31
  • 32. Information technology continuity plan Conduct a business impact analysis to identify: 1. Critical IT resources 2. Outage impacts and allowable outage times 3. Protocols to provide uninterrupted power by using UPS devices, power 4. Store backup data in a secure and protected offsite location 5. Develop recovery strategies that allow critical IT resources to be recovered within 24 hours. 6. Document the recovery strategy 32
  • 34. General risk assessment tools • National Institute of Standards & Technology (NIST) Methodology – US Federal based • OCTAVE ® - The Software Engineering Institute (SEI) at Carnegie Mellon University developed the Operationally Critical, Threat, Asset and Vulnerability Evaluation (OCTAVE) process • FRAP - The Facilitated Risk Assessment Process (FRAP) is the creation of Thomas Peltier. FRAP uses formal qualitative risk analysis methodologies using Vulnerability Analysis, Hazard Impact Analysis, Threat Analysis and Questionnaires 34
  • 35. General risk assessment tools • COBRA - The Consultative, Objective and Bi-functional Risk Analysis (COBRA) process was created by C & A Systems Security Ltd.. Risk assessment is a business issue rather than a technical issue, tools that can be purchased and utilized to perform self-assessments of risk • Risk Watch- Uses an expert knowledge database to walk the user through a risk assessment and provide reports on compliance as well as advice on managing the risks 35
  • 37. Claims based identity for Azure 37
  • 40. Azure - gatekeeper design pattern 40
  • 41. Microsoft’s STRIDE threat categories • Spoofing identity – pose as another user • Tampering with data – malicious modification of data • Repudiation – can the action (prohibited action) be traced? • Information disclosure – disclose of information to individuals who aren’t supposed to have it • Denial of service – deny access to valid users (e.g. consume all the CPU time) • Elevation of privilege – unprivileged user gains privileged access (becomes part of the trusted system) 41
  • 42. Microsoft’s DREAD model to rank threat’s severity • Damage potential: The extent of the damage if vulnerability is exploited • Reproducibility: How often an attempt at exploiting vulnerability works • Exploitability: How much effort is required? Is authentication required? • Affected users: How widespread could the exploit become? • Discoverability: The likelihood that the researcher or hacker will find it 42
  • 43. Security development lifecycle (SDL) • SDL is a software development process that helps developers build secure code, address compliance 43
  • 44. SDL tools Requirements tools • Microsoft Solutions Framework (MSF) for Capability Maturity Model Integration (CMMI) / Microsoft Solutions Framework (MSF) for Agile Design tool • Microsoft Threat Modeling Tool 2014 / 2016 44
  • 45. SDL tools Implementation tools • banned.h • Code Analysis for C/C++ • SiteLock ATL Template • Anti-Cross Site Scripting (Anti-XSS) Library • FxCop (assemblies) • Microsoft Code Analysis Tool .NET (CAT.NET) - binary code analysis for XSS, SQL Injection 45
  • 46. SDL tools Verification tools • BinScope binary analyzer- binary files • SDL Regex fuzzer – tests reg. exp for DoS • SDL MiniFuzz file fuzzer-detects file-handling flaws • Attack surface analyzer-detect changes in OS, ACL, registry, Active-X control • Application verifier-runtime verification tool for native code 46
  • 47. SDL tools Release tools SDL process template- integrates the policy, process, and tools associated with Microsoft SDL Process Guidance version 4.1 directly into your VSTS 47
  • 48. Azure network security • VNet for isolation of VMs • ACL and NSG – for access control at VM and subnet level • Azure Virtual Filtering Platform (VFP) exposes an easy- to-program interface to network agents that act on behalf of network controllers and packet processing on each host running in the datacenter • Service endpoint and azure fabric level security mechanism 48
  • 49. Security for mobile-first, cloud-first world • Office 365 app permissions - ability to approve or revoke permissions • Azure AD Identity Protection - prevents the use of compromised credentials • Microsoft Cloud App Security - new advanced security capability • Customer Lockbox - integrates the customer into the approval process • Azure Security Center- Centralized security policy at the subscription level+ Resource Group level ( tailored as per workloads) 49
  • 50. Security for mobile-first, cloud-first world • Azure Active Directory Identity Protection - detects suspicious act, user risk severity is calculated and risk- based policies can be configured at user level • WindowsAzure.MobileServices.Backend.Security- security extensions for your .NET mobile backend ( controller code level permissions)hosted in Microsoft Azure • System Center 2012 and InTune- mobile device management (MDM), BYOD policies, remote wipe out of data in case of theft 50
  • 52. Industry security management frameworks ( ISO series ) 52
  • 55. The Payment Card Industry Data Security Standard (PCI DSS) • PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data • PCI DSS applies to all entities involved in payment card processing—including merchants, processors, acquirers, issuers, and service providers 55
  • 56. The Payment Card Industry Data Security Standard (PCI DSS) 56
  • 57. The Payment Card Industry Data Security Standard (PCI DSS) AUDIT TESTING 57
  • 58. Disclaimer • Logos, images, text have been referenced from various sources like NIST, SANS, PCI journals, David Chappell, Microsoft websites, and internet data that is freely available. Full rights belong to the individual owners. References are made strictly for educational and illustration purposes only and for non-commercial use. Please take advice of original authors before using them. I am not responsible for any damages, monetary loss arising from the use of this document 58