Bulut Bilişim ve
Güvenlik
Bulut Bilişim | Özellikler

The
image
part with
relations
hip ID
rId12
was not
found in
the file.
Yönetim

Maliyet

• 
• 
• 
• 
• 

• 
• 
• 
• 
• 

Üretkenlik

• 
• 
• 
• 
Bulut Hizmetleri
Altyapın Hazır !

Platformun Altyapınla
Beraber Kurulu Geliyor !

Sadece Kullan !

Servis Olarak
Altyapı

Servis Olarak
Platform

Servis Olarak
Yazılım

Uygulama / Veri

Uygulama / Veri

Uygulama / Veri

Uygulama / Veri

Platform

Platform

Platform

Platform

Altyapı

Altyapı

Altyapı

Altyapı

Şirket İçi

•  Altyapı: Sunucu, Ağ,
Güvenlik, Depo,
Sanallaştırma..vs
•  Platform: Veritabanı, Web
Hosting, Ortakatman,..vs
•  Uygulama: Exchange,
Office..

•  Sanal Makineler
•  Sanal Ağ

•  Servis Olarak Uygulama
Yönetimi
•  Servis Olarak Veritabanı
•  Servis Olarak AD
•  Entegrasyon Servisleri

• 
• 
• 
• 

Servis Olarak ERP
Servis Olarak EPosta
Servis Olarak CRM
Servis Olarak DYS

Sizin
Yönettiğiniz
Bulut
Sağlayıcılarının
Yönettiği
Microsoft’un bulut tanımı

Microsoft

Tek
tutarlı

Siz

deneyim

Bulut
Hizmet
Sağlayıcı
Microsoft’un kapsamlı bulut çözümleri

Microsoft

Tek
tutarlı

Siz

deneyim

Bulut
Hizmet
Sağlayıcı
Unparalleled experience in online security

7
Physical
Security

Network
Security

Platform
Integrity

Data
Identity Application
Protection and Access Security

Engineering System and Operational Security
Service security starts with the data center

Perimeter Security

Fire Suppression

Multi-factor
authentication

Extensive Monitoring
ISO / IEC 27001:2005 Certification
SAS 70 Type I and II attestations
(transitioning to SSAE 16/ISAE 3402 SOC 1, 2, and 3)

HIPAA/HITECH
PCI Data Security Standard Certification
FISMA Certification and Accreditation
Various State, Federal, and International Privacy Laws
(95/46/EC—aka EU Data Protection Directive; California SB1386; etc.)
DDoS Protection in Azure
• 
• 
• 
• 
• 
• 
• 

• 

DDoS attacks aiming to exhaust compute, memory, network bandwidth or other resources of a
service
Windows Azure network infrastructure deploys DDoS defense system
Standard DDoS volumetric mitigation techniques such as SYN floods, rate limiting and connection
limits
Combined with SLBs to sanitize TCP/UDP traffic, including automated DDoS detection and mitigation
On ongoing basis we validate that core Windows Azure services have adequate resilience to DDoS
attacks
DDoS protection for platform services also benefits tenant applications
However, it is still possible for tenant applications to be targeted individually
§  Customers should actively monitor their applications
§  Customers should test their applications for interface specific attacks
§  Deploy third part web application firewalls e.g. https://www.barracuda.com/programs/azure
If a customer notices their application is attacked, they should contact Azure Customer Support for
assistance
Platform Integrity
•  Reduced OS footprint
•  Compute and Access Isolation
§  Isolation of the Host from the Guest VMs
§  Isolation of Guest VMs from one another
§  Host-mediated Guest VM access to network and disk
•  Anti-Malware
•  Patch management
Data Protection
• 

Redundant storage
§  Replicated at least three times in the same datacenter
§  Geo-replication to different datacenter

• 
• 
• 
• 
• 
• 

Storage accounts and keys
Data backup
Data deletion and destruction
SQL Azure inherits SQL’s authentication/authorization system
Data encryption in transit
Data encryption at rest - IaaS customers may implement using .NET
cryptographic services or EFS
Securing Engineering System and Operations
•  Strong Identity Assurance

•  Granular Access Control
•  Access to Customer Data is highly restricted

•  Logging and monitoring

•  Customers have access to logs of administrator actions affecting them
Application Security
http://www.windowsazure.com/en-us/support/trust-center/

• 

One location to aggregate
content across Security,
Privacy, and Compliance
ISTSEC 2013 - Bulut Bilişim ve Güvenlik

ISTSEC 2013 - Bulut Bilişim ve Güvenlik

  • 1.
  • 2.
    Bulut Bilişim |Özellikler The image part with relations hip ID rId12 was not found in the file.
  • 3.
  • 4.
    Bulut Hizmetleri Altyapın Hazır! Platformun Altyapınla Beraber Kurulu Geliyor ! Sadece Kullan ! Servis Olarak Altyapı Servis Olarak Platform Servis Olarak Yazılım Uygulama / Veri Uygulama / Veri Uygulama / Veri Uygulama / Veri Platform Platform Platform Platform Altyapı Altyapı Altyapı Altyapı Şirket İçi •  Altyapı: Sunucu, Ağ, Güvenlik, Depo, Sanallaştırma..vs •  Platform: Veritabanı, Web Hosting, Ortakatman,..vs •  Uygulama: Exchange, Office.. •  Sanal Makineler •  Sanal Ağ •  Servis Olarak Uygulama Yönetimi •  Servis Olarak Veritabanı •  Servis Olarak AD •  Entegrasyon Servisleri •  •  •  •  Servis Olarak ERP Servis Olarak EPosta Servis Olarak CRM Servis Olarak DYS Sizin Yönettiğiniz Bulut Sağlayıcılarının Yönettiği
  • 5.
  • 6.
    Microsoft’un kapsamlı bulutçözümleri Microsoft Tek tutarlı Siz deneyim Bulut Hizmet Sağlayıcı
  • 7.
    Unparalleled experience inonline security 7
  • 8.
  • 9.
    Service security startswith the data center Perimeter Security Fire Suppression Multi-factor authentication Extensive Monitoring
  • 10.
    ISO / IEC27001:2005 Certification SAS 70 Type I and II attestations (transitioning to SSAE 16/ISAE 3402 SOC 1, 2, and 3) HIPAA/HITECH PCI Data Security Standard Certification FISMA Certification and Accreditation Various State, Federal, and International Privacy Laws (95/46/EC—aka EU Data Protection Directive; California SB1386; etc.)
  • 12.
    DDoS Protection inAzure •  •  •  •  •  •  •  •  DDoS attacks aiming to exhaust compute, memory, network bandwidth or other resources of a service Windows Azure network infrastructure deploys DDoS defense system Standard DDoS volumetric mitigation techniques such as SYN floods, rate limiting and connection limits Combined with SLBs to sanitize TCP/UDP traffic, including automated DDoS detection and mitigation On ongoing basis we validate that core Windows Azure services have adequate resilience to DDoS attacks DDoS protection for platform services also benefits tenant applications However, it is still possible for tenant applications to be targeted individually §  Customers should actively monitor their applications §  Customers should test their applications for interface specific attacks §  Deploy third part web application firewalls e.g. https://www.barracuda.com/programs/azure If a customer notices their application is attacked, they should contact Azure Customer Support for assistance
  • 13.
    Platform Integrity •  ReducedOS footprint •  Compute and Access Isolation §  Isolation of the Host from the Guest VMs §  Isolation of Guest VMs from one another §  Host-mediated Guest VM access to network and disk •  Anti-Malware •  Patch management
  • 14.
    Data Protection •  Redundant storage § Replicated at least three times in the same datacenter §  Geo-replication to different datacenter •  •  •  •  •  •  Storage accounts and keys Data backup Data deletion and destruction SQL Azure inherits SQL’s authentication/authorization system Data encryption in transit Data encryption at rest - IaaS customers may implement using .NET cryptographic services or EFS
  • 15.
    Securing Engineering Systemand Operations •  Strong Identity Assurance •  Granular Access Control •  Access to Customer Data is highly restricted •  Logging and monitoring •  Customers have access to logs of administrator actions affecting them
  • 16.
  • 17.
    http://www.windowsazure.com/en-us/support/trust-center/ •  One location toaggregate content across Security, Privacy, and Compliance