4. Bulut Hizmetleri
Altyapın Hazır !
Platformun Altyapınla
Beraber Kurulu Geliyor !
Sadece Kullan !
Servis Olarak
Altyapı
Servis Olarak
Platform
Servis Olarak
Yazılım
Uygulama / Veri
Uygulama / Veri
Uygulama / Veri
Uygulama / Veri
Platform
Platform
Platform
Platform
Altyapı
Altyapı
Altyapı
Altyapı
Şirket İçi
• Altyapı: Sunucu, Ağ,
Güvenlik, Depo,
Sanallaştırma..vs
• Platform: Veritabanı, Web
Hosting, Ortakatman,..vs
• Uygulama: Exchange,
Office..
• Sanal Makineler
• Sanal Ağ
• Servis Olarak Uygulama
Yönetimi
• Servis Olarak Veritabanı
• Servis Olarak AD
• Entegrasyon Servisleri
•
•
•
•
Servis Olarak ERP
Servis Olarak EPosta
Servis Olarak CRM
Servis Olarak DYS
Sizin
Yönettiğiniz
Bulut
Sağlayıcılarının
Yönettiği
9. Service security starts with the data center
Perimeter Security
Fire Suppression
Multi-factor
authentication
Extensive Monitoring
10. ISO / IEC 27001:2005 Certification
SAS 70 Type I and II attestations
(transitioning to SSAE 16/ISAE 3402 SOC 1, 2, and 3)
HIPAA/HITECH
PCI Data Security Standard Certification
FISMA Certification and Accreditation
Various State, Federal, and International Privacy Laws
(95/46/EC—aka EU Data Protection Directive; California SB1386; etc.)
12. DDoS Protection in Azure
•
•
•
•
•
•
•
•
DDoS attacks aiming to exhaust compute, memory, network bandwidth or other resources of a
service
Windows Azure network infrastructure deploys DDoS defense system
Standard DDoS volumetric mitigation techniques such as SYN floods, rate limiting and connection
limits
Combined with SLBs to sanitize TCP/UDP traffic, including automated DDoS detection and mitigation
On ongoing basis we validate that core Windows Azure services have adequate resilience to DDoS
attacks
DDoS protection for platform services also benefits tenant applications
However, it is still possible for tenant applications to be targeted individually
§ Customers should actively monitor their applications
§ Customers should test their applications for interface specific attacks
§ Deploy third part web application firewalls e.g. https://www.barracuda.com/programs/azure
If a customer notices their application is attacked, they should contact Azure Customer Support for
assistance
13. Platform Integrity
• Reduced OS footprint
• Compute and Access Isolation
§ Isolation of the Host from the Guest VMs
§ Isolation of Guest VMs from one another
§ Host-mediated Guest VM access to network and disk
• Anti-Malware
• Patch management
14. Data Protection
•
Redundant storage
§ Replicated at least three times in the same datacenter
§ Geo-replication to different datacenter
•
•
•
•
•
•
Storage accounts and keys
Data backup
Data deletion and destruction
SQL Azure inherits SQL’s authentication/authorization system
Data encryption in transit
Data encryption at rest - IaaS customers may implement using .NET
cryptographic services or EFS
15. Securing Engineering System and Operations
• Strong Identity Assurance
• Granular Access Control
• Access to Customer Data is highly restricted
• Logging and monitoring
• Customers have access to logs of administrator actions affecting them