SlideShare a Scribd company logo
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Azure
Professor Christian Toinard
[Some elements come from ’’Exam Ref 70-533 Implementing Microsoft Azure
Infrastructure Solutions 2nd Edition’’ second Edition. Microsoft Press. 2018]
[Other elements come from the Microsoft Online Documentation]
[However, the experiments come from the author work]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Introduction
In Azure, functionalities are constantly changing with new capabilities added
and new scenarios opening to make it easier to protect the data. Security is a key
topic of the evolutions. Ensure you read the large and precise documentation to
stay up-to-date on supported and unsupported scenarios at
https://docs.microsoft.com/en-us/azure/security.
This documentation is an introduction. It does not cover all the large range of
security functionalities. Advanced mechanisms of security operation center are
also available such as proposed in Azure Security Center.
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [1]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [2]
https://www.znetlive.com/blog/comparing-top-4-public-cloud-providers-in-2018-microsoft-
azure-vs-aws-vs-ibm-vs-google/
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [3]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [4]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [5]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [6]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [7]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [8]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [9]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [10]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [11]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [12]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Comparison with other approaches [13]
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
A global approach
IaaS, PaaS and SaaS service for both Azure resources
and on-premise resources.
Propose management, monitoring, IAM and security
services for both Azure and on-premise resources.
Five different kinds of service are proposed:
Azure App Service enables to build and host web apps in any programming
language without managing infrastructure (auto-scaling, high availability,
Windows and Linux, automated deployments from GitHub, Azure DevOps, or
any Git repo).
Azure virtual machines allow to create and deploy Windows and Linux virtual
machines and VM templates. It supports a wide range of solutions for creating
and managing virtual IT associated with on-premise hosts (monitoring,
authentication, access control, encryption, threats detection, …).
Azure Service Fabric is a platform that makes it easy to package, deploy, and
manage scalable and reliable microservices and containers. It manages the
complex infrastructure problems. Developers and administrators focus on
implementing mission-critical, demanding workloads that are scalable, reliable,
and manageable.
Azure Cloud Services is a platform as a service (PaaS) designed to support
applications that are scalable, reliable, and inexpensive to operate. In contrast with
App Service, Azure Cloud Services offers more control over the infrastructure.
Software for general purpose such as IoT, AI and machine learning and SaaS.
These components enable to develop end-user application for medicine, finance
and so on.
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Methods for managing VM
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Opening an access
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Opening an access
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Overview of the portal
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Opening a subscription
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Opening a subscription
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Creating a virtual machine
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Creating a virtual machine
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Creating a virtual machine
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Creating a virtual machine and model
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Creating a virtual machine and model
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Creating a virtual machine and model
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Deploying a virtual machine
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Advisor recommendations
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Supervision: Insights a virtual machine
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Distant connection to the virtual machine
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Log analysis workspace
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Creating an alert rule for a network load
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Analysis of network load with Excel export
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Viewing alerts for a network load
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Encryption
There are many ways to encrypt data:
- programmatically encrypting it in your own
application and storing the encryption keys in
Azure Key Vault
- encrypting VM disks
- taking advantage of the Azure Storage Service
Encryption feature
- implementing encryption plus role-based access
control with Azure Data Lake Store
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Azure Disk Encryption
You can take direct control of key management by
enabling disk-level encryption directly on your
Windows and Linux VMs.
Azure Disk Encryption leverages the industry standard
BitLocker feature of Windows, and the DM-Crypt
feature of Linux to provide volume encryption for the
operating system and the data disks.
The solution is integrated with Azure Key Vault and
Azure Active Directory to help you control and manage
the disk-encryption keys and secrets in your key vault
subscription.
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Azure Storage Service Encryption
Azure Storage Service encryption automatically
encrypts and decrypts data using 256-bit AES
encryption as it is written in an Azure Storage Account.
https://docs.microsoft.com/en-us/azure/storage/common/storage-service-encryption
The feature automatically encrypts data in:
• Azure storage services:
o Azure Managed Disks
o Azure Blob storage
o Azure Files
o Azure Queue storage
o Azure Table storage.
• Both performance tiers (Standard and Premium).
• Both deployment models (Azure Resource Manager and classic).
You can use Microsoft-managed encryption keys with Storage Service Encryption, or
use your own keys, see Storage Service Encryption using customer-managed keys in
Azure Key Vault.
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Azure Storage Service Encryption
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Azure Data Lake Store
Azure Data Lake is a repository designed for big data
workloads. It provides both encryption and access
control.
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Azure Data Lake Store
Azure Data Lake Store implements an access control
model that derives from HDFS, which in turn derives
from the POSIX access control model.
To configure permissions on a data item in your data
lake, open the Data Lake Store in the Azure portal and
click Data Lake Explorer.
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Azure Monitoring
Azure Monitor
This tool allows you to get base-level infrastructure metrics and logs across your Azure subscription including alerts,
metrics, subscription activity, and Service Health information. The Azure Monitor landing page provides a jumping off point
to configure other more specific monitoring services such as Application Insights, Network Watcher, Log Analytics, Manage-
ment Solutions, and so on. You can learn more about Azure Monitor at https://docs.microsoft. com/en-
us/azure/monitoring-and-diagnostics/monitoring-overview-azure-monitor.
Application Insights
Application Insights is used for development and as a production monitoring solution. It works by installing a package into
your app, which can provide a more internal view of what’s going on with your code. Its data includes response times of
dependencies, exception traces, debugging snapshots, and execution profiles. It provides powerful smart tools for analyzing
all this telemetry both to help you debug an app and to help you understand what users are doing with it. You can tell
whether a spike in response times is due to something in an app, or some external resourcing issue. If you use Visual Studio
and the app is at fault, you can be taken right to the problem line(s) of code so you can fix it. Application Insights provides
significantly more value when your application is instrumented to emit custom events and exception information. You can
learn more about Application Insights including samples for emitting custom telemetry at https://docs.microsoft.com/en-
us/azure/application-insights/.
Network Watcher
The Network Watcher service provides the ability to monitor and diagnose networking issues without logging in to your
virtual machines (VMs). You can trigger packet capture by setting alerts, and gain access to real-time performance
information at the packet level. When you see an issue, you can investigate in detail for better diagnoses. This service is
ideal for troubleshooting network connectivity or performance issues.
Azure Log Analytics
Log Analytics is a service in that monitors your cloud and on-premises environments to maintain their availability and
performance. It collects data generated by resources in your cloud and on-premises environments and from other
monitoring tools to provide analysis across multiple sources. Log Analytics provides rich tools to analyze data across
multiple sources, allows complex queries across all logs, and can proactively alert you on specified conditions. You can even
collect custom data into its central repository so you can query and visualize it. You can learn more about Log Analytics at
https://docs.microsoft.com/en-us/azure/log-analytics/ log-analytics-overview, as well as in Chapter 7.
Azure Diagnostics Extension
The Azure Diagnostics Extension is responsible for installing and configuring the Azure Diagnostics agent on both Windows
and Linux VMs to provide a richer set of diagnostics data. On Windows, this agent can collect a comprehensive set of
performance counter data, event and IIS log files, and even crash dumps. It also provides the ability to automatically
transfer this data to Azure Storage as well as surfacing telemetry to the Azure portal for visualization and alerts. The
capabilities on Linux are more limited, but they still expose a broad range of performance telemetry to act on for reporting
and alerts.
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
Logs analysis
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019
INSA CVL Engineering School 5th
Year of the Security Department – 4AS Option
© CHRISTIAN TOINARD Cloud Security - 9/01/2019

More Related Content

Similar to Azure Cloud management and auditing

Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Amazon Web Services
 
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Amazon Web Services
 
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...
Amazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
 
Splunk und Multi-Cloud
Splunk und Multi-CloudSplunk und Multi-Cloud
Splunk und Multi-Cloud
Splunk
 
Splunk and Multicloud
Splunk and MulticloudSplunk and Multicloud
Splunk and Multicloud
Splunk
 
Splunk and Multicloud
Splunk and Multicloud Splunk and Multicloud
Splunk and Multicloud
Splunk
 
A Practical Guide to Migrating Legacy Applications
A Practical Guide to Migrating Legacy ApplicationsA Practical Guide to Migrating Legacy Applications
A Practical Guide to Migrating Legacy Applications
Cloudsoft
 
Hans Bos
Hans BosHans Bos
Hans Bos
Dutch Power
 
Integrated mca cloud technology & information security
Integrated mca cloud technology & information securityIntegrated mca cloud technology & information security
Integrated mca cloud technology & information security
iNurture Education Solution pvt ltd
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon Web Services
 
BCA – cloud technology & information security
BCA – cloud technology & information securityBCA – cloud technology & information security
BCA – cloud technology & information security
iNurture Education Solution pvt ltd
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application security
John Varghese
 
Business Cloud Adoption models in Canada
Business Cloud Adoption models in CanadaBusiness Cloud Adoption models in Canada
Business Cloud Adoption models in Canada
Cisco Canada
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
 
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real WorldIntelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
NetCraftsmen
 
How security analytics helps UCAS protect 700,000 student applications
How security analytics helps UCAS protect 700,000 student applicationsHow security analytics helps UCAS protect 700,000 student applications
How security analytics helps UCAS protect 700,000 student applications
Splunk
 
Cyber Defense in 2016
Cyber Defense in 2016Cyber Defense in 2016
Cyber Defense in 2016
Nixu Corporation
 
B.tech cloud technology and information security
B.tech cloud technology and information securityB.tech cloud technology and information security
B.tech cloud technology and information security
iNurture Education Solution pvt ltd
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
Netskope
 

Similar to Azure Cloud management and auditing (20)

Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
 
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
 
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM07...
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Splunk und Multi-Cloud
Splunk und Multi-CloudSplunk und Multi-Cloud
Splunk und Multi-Cloud
 
Splunk and Multicloud
Splunk and MulticloudSplunk and Multicloud
Splunk and Multicloud
 
Splunk and Multicloud
Splunk and Multicloud Splunk and Multicloud
Splunk and Multicloud
 
A Practical Guide to Migrating Legacy Applications
A Practical Guide to Migrating Legacy ApplicationsA Practical Guide to Migrating Legacy Applications
A Practical Guide to Migrating Legacy Applications
 
Hans Bos
Hans BosHans Bos
Hans Bos
 
Integrated mca cloud technology & information security
Integrated mca cloud technology & information securityIntegrated mca cloud technology & information security
Integrated mca cloud technology & information security
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
BCA – cloud technology & information security
BCA – cloud technology & information securityBCA – cloud technology & information security
BCA – cloud technology & information security
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application security
 
Business Cloud Adoption models in Canada
Business Cloud Adoption models in CanadaBusiness Cloud Adoption models in Canada
Business Cloud Adoption models in Canada
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
Intelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real WorldIntelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World
 
How security analytics helps UCAS protect 700,000 student applications
How security analytics helps UCAS protect 700,000 student applicationsHow security analytics helps UCAS protect 700,000 student applications
How security analytics helps UCAS protect 700,000 student applications
 
Cyber Defense in 2016
Cyber Defense in 2016Cyber Defense in 2016
Cyber Defense in 2016
 
B.tech cloud technology and information security
B.tech cloud technology and information securityB.tech cloud technology and information security
B.tech cloud technology and information security
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 

Azure Cloud management and auditing

  • 1. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Azure Professor Christian Toinard [Some elements come from ’’Exam Ref 70-533 Implementing Microsoft Azure Infrastructure Solutions 2nd Edition’’ second Edition. Microsoft Press. 2018] [Other elements come from the Microsoft Online Documentation] [However, the experiments come from the author work]
  • 2. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Introduction In Azure, functionalities are constantly changing with new capabilities added and new scenarios opening to make it easier to protect the data. Security is a key topic of the evolutions. Ensure you read the large and precise documentation to stay up-to-date on supported and unsupported scenarios at https://docs.microsoft.com/en-us/azure/security. This documentation is an introduction. It does not cover all the large range of security functionalities. Advanced mechanisms of security operation center are also available such as proposed in Azure Security Center.
  • 3. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [1]
  • 4. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 5. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [2] https://www.znetlive.com/blog/comparing-top-4-public-cloud-providers-in-2018-microsoft- azure-vs-aws-vs-ibm-vs-google/
  • 6. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [3]
  • 7. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [4]
  • 8. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [5]
  • 9. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [6]
  • 10. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [7]
  • 11. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [8]
  • 12. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [9]
  • 13. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [10]
  • 14. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [11]
  • 15. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [12]
  • 16. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Comparison with other approaches [13]
  • 17. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 A global approach IaaS, PaaS and SaaS service for both Azure resources and on-premise resources. Propose management, monitoring, IAM and security services for both Azure and on-premise resources. Five different kinds of service are proposed: Azure App Service enables to build and host web apps in any programming language without managing infrastructure (auto-scaling, high availability, Windows and Linux, automated deployments from GitHub, Azure DevOps, or any Git repo). Azure virtual machines allow to create and deploy Windows and Linux virtual machines and VM templates. It supports a wide range of solutions for creating and managing virtual IT associated with on-premise hosts (monitoring, authentication, access control, encryption, threats detection, …). Azure Service Fabric is a platform that makes it easy to package, deploy, and manage scalable and reliable microservices and containers. It manages the complex infrastructure problems. Developers and administrators focus on implementing mission-critical, demanding workloads that are scalable, reliable, and manageable. Azure Cloud Services is a platform as a service (PaaS) designed to support applications that are scalable, reliable, and inexpensive to operate. In contrast with App Service, Azure Cloud Services offers more control over the infrastructure. Software for general purpose such as IoT, AI and machine learning and SaaS. These components enable to develop end-user application for medicine, finance and so on.
  • 18. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Methods for managing VM
  • 19. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Opening an access
  • 20. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Opening an access
  • 21. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Overview of the portal
  • 22. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 23. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 24. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 25. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 26. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 27. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 28. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Opening a subscription
  • 29. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Opening a subscription
  • 30. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Creating a virtual machine
  • 31. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Creating a virtual machine
  • 32. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Creating a virtual machine
  • 33. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 34. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Creating a virtual machine and model
  • 35. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Creating a virtual machine and model
  • 36. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Creating a virtual machine and model
  • 37. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Deploying a virtual machine
  • 38. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Advisor recommendations
  • 39. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Supervision: Insights a virtual machine
  • 40. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Distant connection to the virtual machine
  • 41. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Log analysis workspace
  • 42. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Creating an alert rule for a network load
  • 43. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Analysis of network load with Excel export
  • 44. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Viewing alerts for a network load
  • 45. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Encryption There are many ways to encrypt data: - programmatically encrypting it in your own application and storing the encryption keys in Azure Key Vault - encrypting VM disks - taking advantage of the Azure Storage Service Encryption feature - implementing encryption plus role-based access control with Azure Data Lake Store
  • 46. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Azure Disk Encryption You can take direct control of key management by enabling disk-level encryption directly on your Windows and Linux VMs. Azure Disk Encryption leverages the industry standard BitLocker feature of Windows, and the DM-Crypt feature of Linux to provide volume encryption for the operating system and the data disks. The solution is integrated with Azure Key Vault and Azure Active Directory to help you control and manage the disk-encryption keys and secrets in your key vault subscription.
  • 47. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Azure Storage Service Encryption Azure Storage Service encryption automatically encrypts and decrypts data using 256-bit AES encryption as it is written in an Azure Storage Account. https://docs.microsoft.com/en-us/azure/storage/common/storage-service-encryption The feature automatically encrypts data in: • Azure storage services: o Azure Managed Disks o Azure Blob storage o Azure Files o Azure Queue storage o Azure Table storage. • Both performance tiers (Standard and Premium). • Both deployment models (Azure Resource Manager and classic). You can use Microsoft-managed encryption keys with Storage Service Encryption, or use your own keys, see Storage Service Encryption using customer-managed keys in Azure Key Vault.
  • 48. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Azure Storage Service Encryption
  • 49. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 50. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 51. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 52. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 53. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 54. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 55. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Azure Data Lake Store Azure Data Lake is a repository designed for big data workloads. It provides both encryption and access control.
  • 56. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Azure Data Lake Store Azure Data Lake Store implements an access control model that derives from HDFS, which in turn derives from the POSIX access control model. To configure permissions on a data item in your data lake, open the Data Lake Store in the Azure portal and click Data Lake Explorer.
  • 57. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Azure Monitoring Azure Monitor This tool allows you to get base-level infrastructure metrics and logs across your Azure subscription including alerts, metrics, subscription activity, and Service Health information. The Azure Monitor landing page provides a jumping off point to configure other more specific monitoring services such as Application Insights, Network Watcher, Log Analytics, Manage- ment Solutions, and so on. You can learn more about Azure Monitor at https://docs.microsoft. com/en- us/azure/monitoring-and-diagnostics/monitoring-overview-azure-monitor. Application Insights Application Insights is used for development and as a production monitoring solution. It works by installing a package into your app, which can provide a more internal view of what’s going on with your code. Its data includes response times of dependencies, exception traces, debugging snapshots, and execution profiles. It provides powerful smart tools for analyzing all this telemetry both to help you debug an app and to help you understand what users are doing with it. You can tell whether a spike in response times is due to something in an app, or some external resourcing issue. If you use Visual Studio and the app is at fault, you can be taken right to the problem line(s) of code so you can fix it. Application Insights provides significantly more value when your application is instrumented to emit custom events and exception information. You can learn more about Application Insights including samples for emitting custom telemetry at https://docs.microsoft.com/en- us/azure/application-insights/. Network Watcher The Network Watcher service provides the ability to monitor and diagnose networking issues without logging in to your virtual machines (VMs). You can trigger packet capture by setting alerts, and gain access to real-time performance information at the packet level. When you see an issue, you can investigate in detail for better diagnoses. This service is ideal for troubleshooting network connectivity or performance issues. Azure Log Analytics Log Analytics is a service in that monitors your cloud and on-premises environments to maintain their availability and performance. It collects data generated by resources in your cloud and on-premises environments and from other monitoring tools to provide analysis across multiple sources. Log Analytics provides rich tools to analyze data across multiple sources, allows complex queries across all logs, and can proactively alert you on specified conditions. You can even collect custom data into its central repository so you can query and visualize it. You can learn more about Log Analytics at https://docs.microsoft.com/en-us/azure/log-analytics/ log-analytics-overview, as well as in Chapter 7. Azure Diagnostics Extension The Azure Diagnostics Extension is responsible for installing and configuring the Azure Diagnostics agent on both Windows and Linux VMs to provide a richer set of diagnostics data. On Windows, this agent can collect a comprehensive set of performance counter data, event and IIS log files, and even crash dumps. It also provides the ability to automatically transfer this data to Azure Storage as well as surfacing telemetry to the Azure portal for visualization and alerts. The capabilities on Linux are more limited, but they still expose a broad range of performance telemetry to act on for reporting and alerts.
  • 58. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019 Logs analysis
  • 59. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 60. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 61. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 62. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 63. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 64. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 65. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 66. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 67. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 68. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 69. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 70. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 71. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019
  • 72. INSA CVL Engineering School 5th Year of the Security Department – 4AS Option © CHRISTIAN TOINARD Cloud Security - 9/01/2019