⬆️ ⬇️

The book "Microsoft Azure Security Infrastructure"

This book provides general information, design considerations, deployment scenarios, best practices, technology survey questions, and instructions to help you make a comprehensive presentation of the Azure security features.



An expert level of Azure or PowerShell is not required. It is also assumed that the reader has experience with enterprise-class information technology and a sufficient level of skill to work in the data center.



Today we publish part of the first chapter of this book. You can download the full version for free at the link .






Table of contents





Cloud Security



Before you begin to consider the main subject of this book, namely the security infrastructure of Microsoft Azure, it is important to understand what level of security can be provided in the cloud. To find out why the Azure cloud platform is truly reliable, you need to consider a number of important factors that affect the security of solutions in the cloud. Cloud security is the result of the joint efforts of your company and the cloud service provider. This chapter discusses the most important factors that will help you understand the limitations, areas of responsibility, and the capabilities of cloud technologies for later use as a reliable business platform.

')

Important factors affecting cloud security



Before embarking on the full-scale implementation of cloud systems, it is important for the responsible employees of the organization to understand how security is organized within the cloud model. This understanding needs to be developed before planning. If participants are not adequately familiar with the security features in the cloud, then the success of the entire project for the implementation of cloud systems may be at risk.



When planning the introduction of cloud technologies, it is important to evaluate the following aspects of their security:





Each of these aspects needs attention. The required depth of study of individual issues depends on the specifics of your company: for example, the priorities of a medical institution and a manufacturing enterprise can vary greatly. In the following sections, we will look at each of these aspects in more detail.



Compliance with the requirements



Each organization has certain requirements, and it is important not to break them when moving to the cloud. The source of these requirements may be internal or external rules - for example, industry standards that are mandatory for compliance. Cloud service providers must be prepared to help customers meet the necessary requirements when implementing a cloud system. In many cases, customers must rely on a cloud service provider to comply.



To help customers comply with current requirements, Microsoft uses the following three methodologies.





It is recommended in close cooperation with the cloud service provider to analyze what requirements your organization should meet and to what extent the cloud service provider offers match them. It is also very important to make sure that the cloud service provider already has experience in implementing the most secure and reliable cloud services that ensure the highest confidentiality and protection of customer data.

Learn more: For more information on how Microsoft helps customers ensure compliance, see the article .

Management of risks



For the successful implementation of cloud systems, it is very important that the client can trust the security system of the supplier’s infrastructure. The cloud service provider must implement and strictly adhere to the rules and security risk management programs of the Internet. When managing risks in a cloud environment, it is important to consider the level of its dynamism.



Microsoft has been successfully providing online services to customers for many years. During this time, highly efficient processes have been developed that allow controlling these new risks. As part of risk management, the cloud service provider should perform the following tasks:





It is very important that customers actively cooperate with cloud service providers and require them to ensure maximum transparency of processes. In this case, customers will be able to analyze the measures taken to counter risks and assess how they correspond to the level of data privacy and the degree of protection that is required for their organization.



Identity and Access Management



In today's world, users often have the opportunity to perform work anywhere in the world using a wide range of devices, while accessing the most diverse cloud services. In such circumstances, the security of user identities becomes especially important. When using cloud systems, it is the certificates that become the border between "their" and "alien". Certificates represent the management plane of your entire infrastructure, whether it is local or cloudy. Certificates are used to control access to any services from any device and allow you to track and analyze data usage patterns.



In order to embed cloud technologies in your organization, you need to familiarize yourself with the available identity and access management capabilities, as well as understand how these methods allow you to interact with the existing local infrastructure. When planning identity and access management, it is important to consider the following factors:





Security operations



For organizations that are switching to cloud technologies, it is important to adapt internal processes accordingly, including security monitoring, auditing, incident response, and forensic examinations. The cloud platform should enable IT administrators to monitor the status of services in real time in order to monitor their performance and quickly restore functioning after a failure.



You must ensure that all deployed services are monitored and maintained in accordance with the service level agreement (SLA) between the cloud service provider and the client organization. The following are other factors that affect the security of operations in the cloud.





Endpoint protection



Cloud service provider infrastructure security is not the only factor determining cloud security. Later in this chapter, we will look at the concept of distributed responsibility. One of its aspects is that when deploying cloud technologies, an organization must ensure endpoint security. When implementing cloud systems in a company, it is recommended to increase the security of endpoints, since after such a transition they will open external connections more often and access more applications that can be deployed in environments of other cloud service providers.



The main target of attacks are users, and it is through the endpoints that users usually receive information. The user's work computer, his smartphone, any other device that can be used to access cloud resources are all endpoints. The attackers know that it is the users who are the weakest link in the security chain, and they are constantly improving social engineering methods (for example, phishing e-mails), the task of which is to force the user to perform an action that compromises the end point. When designing endpoint protection as part of an overall cloud security strategy, it is recommended to follow the following principles.





Note. Protecting privileged access is a critical step in ensuring business security. We recommend that you read the article on privileged access workstations (PAW) at aka.ms/cyberpaw and learn more about the Microsoft methodology for protecting your most valuable assets.


Data protection



From a security point of view, the ultimate goal when transferring data to the cloud is to protect data wherever it is located. The process of data transfer consists of several stages. A stage is determined by the location of the data at a specific point in time. See the diagram in the picture:







The diagram shows the following steps:



  1. Data is stored on the user device. The data is at the end point, which can be any device. It is necessary to ensure that the data stored on user devices used for business purposes (BYOD scripts), as well as on company devices, must be encrypted.
  2. Data is transferred from the user's device to the cloud. The data must be protected when they leave the user device. There are many technologies to protect data regardless of location, for example, Azure Rights Management. The data channel must be encrypted. Appropriate technologies, such as TLS, must be enforced.
  3. The data is stored in the data center of the cloud service provider. When data is sent to the servers of the cloud service provider, the storage infrastructure must ensure their redundancy and protection. Be sure to find out exactly how your cloud service provider encrypts data during storage, who is responsible for key management, and how data redundancy is ensured.
  4. Data is transferred from the cloud to the local environment. In this case, the recommendations for stage 2 are valid. It is necessary to ensure encryption of both the file itself and the transport layer.
  5. Data is stored in a local environment. Securing data in a local environment is a client's task. A critical stage in its implementation is the encryption of data stored in the company's data center. Your infrastructure should provide the necessary level of encryption, data redundancy and key management.


Important factors affecting cloud security

In the transition to the use of cloud technologies, other principles begin to operate. Cloud services differ from local virtual machines and mainframes with access time sharing in a variety of relationships, including scalability, speed, and architecture. Therefore, the approach to them should be different. When collaborating with a cloud service provider (for example, using Azure), it is recommended to analyze the following issues.



A well-designed cloud service allows you to put machines into operation or stop using them in a few minutes or hours. Many services of this type allow you to cope with peak loads that are more than 10 times greater than normal and operate during the day. Software development is now very fast, and weekly (and even daily) code changes have become the norm. Therefore, testing should be carried out on the basis of working services, but without the use of confidential working data. For any organization that moves to the use of cloud technologies, it is important to establish trust with the cloud service provider and use all available tools to define and mutually follow mutually accepted requirements within these relationships.



I sometimes give my friends the following example. If in the 90s I needed a dozen servers for a new project, then planning, ordering, delivering, placing, connecting, setting up and deploying could take 4-6 months, and only after that could the team start testing the working version of the service . Today, thanks to Azure, I can do it in 30 minutes using only one phone.



Jim Molini

Senior Program Manager, C + E Security

Division of responsibility



In a traditional data center, the responsibility for all aspects of the infrastructure lies with the IT company itself. This is how local computing environments have worked since the advent of modern client-server architectures (and even earlier, in the era of mainframes). If the network, storage or computing systems did not work as they should, then it was the IT company that had to determine the cause and correct the problem.



With security units, the situation was similar. The security department worked with the IT department, and together they secured the components of the IT infrastructure. The company's security department set the requirements, discussed them with the IT department, and defined management tools that IT infrastructure and operators could implement. In addition, the security department defined standards and regularly conducted an infrastructure audit for compliance with these standards.



For data centers located outside of local environments, all this remains in force. However, with the advent of computing environments based on public clouds, IT and security departments have a new partner — a cloud service provider. Such a supplier has its own IT infrastructure and is obliged to ensure its compliance with the requirements of security and manageability.



This means that you will not only need to prepare and take into account your own security requirements, but also to have sufficient capabilities to monitor the security infrastructure of the cloud service provider and monitor its operations. The required capabilities for such monitoring depend on the cloud security model that your company uses in the infrastructure of the service provider.



Cloud computing



In this section, we will briefly look at the topic of cloud computing in order to proceed from the general concepts of what is and is not related to them. This section will help you understand how security works in the cloud, which approaches used in familiar data centers have remained in place, and which have changed.



Cloud computing definition published by NIST



For a while, the term "cloud computing" was not a formal definition. Of course, people with experience in the industry under the "cloud" understood the Internet. For some, the essence of cloud computing was precisely to provide services via the Internet.



Separate analysts used the term utility computing ("computing as a utility service"), thus focusing on the service delivery model. Within the framework of the communal model there is a certain set of opportunities that are available to everyone. Payment is charged according to the amount of resources used. Very similar to the consumption, for example, of electricity and gas by private individuals.



Currently, authorities and companies from many countries use the definition of cloud computing, which was published by NIST. They find it most reliable and useful. NIST is the US National Institute of Standards and Technology.



The NIST Institute has published "five basic characteristics" of cloud computing, as well as the definition of cloud service and cloud deployment models. These formulations have significantly advanced the understanding of the nature of cloud computing.



The figure shows the five basic characteristics, cloud service models, and cloud deployment models.







Cloud Computing Characteristics



NIST outlines the following five basic cloud computing features:





Cloud Service Models



In the definition of cloud computing, which published the Institute NIST, there are three service models and four deployment models. The service model determines which level of service from the entire solution package the cloud service provider provides to its customers. The deployment model determines how and to whom these services are provided.



Cloud service models:





Cloud deployment models



NIST outlines four deployment models:





Azure Security Architecture



As we said in this chapter, responsibility for cloud security is shared among several participants. Azure is no exception. However, the design of the Azure platform initially used the principles that are called the Security Development Lifecycle (SDL), or "the life cycle of developing secure applications." The Azure platform implements many features that enhance the protection of client resources located in it.



Security is built into the Azure infrastructure at various levels: physical security, data security, identity and access management, application security. Figure 1-4 shows some of the core components of the Azure architecture.







The first line of protection is verification of the user's identity at the subscription level. The subscription owner or account administrator is the person who signed up for your Azure subscription. He has access to the account management center and the ability to perform all available management operations. In new subscriptions, the account administrator is also assigned the role of the services administrator, and therefore the right to manage the Azure portal. The client must exercise the utmost discretion in giving anyone access to this account.

Note. Azure administrators must use role-based access control (RBAC) to grant users the necessary permissions. Learn more about RBAC here: azure.microsoft.com/documentation/articles/role-based-access-control-configure.
After the user is authenticated according to his level of authorization, he can manage the resources available to him using the Azure portal. The Azure portal is a centralized resource with convenient capabilities for preparing cloud resources, deploying and managing them. In addition, there is a report on current costs and the estimated cost of resources that are expected to be spent in a month.



A subscription may include several cloud services and several storage accounts (however, both are optional components). On the Azure portal, you can prepare for work a new cloud service — for example, a virtual machine. These virtual machines run on the basis of resources that come from the compute and storage components of Azure.



Virtual machines can be configured to be accessible over the Internet, or so that they can only interact with components of the Azure infrastructure. You can protect the resources available in virtual machines (for example, on a web server) and restrict access to these resources using access control lists (ACLs). To isolate virtual machines in the cloud, you can create multiple virtual networks and control the transfer of traffic between them using network security groups (NSGs).



More details. For more information about Azure Active Directory, see Chapter 2, “Identity Protection in Azure.” For more information about network security groups, see Chapter 3, "Azure Network Security."


The next, deeper level of Azure is called the Azure structure. Microsoft manages this structure and protects its resources. The purpose of this structure is to manage computational resources and storage, allocate resources and ensure recoverability in the event of a hardware failure. The most important task of this level is to provide a sufficient level of redundancy and error resilience to fulfill the conditions of a service level agreement (SLA).






Download the full version of the book for free and study it at the link below.



→ Download

Source: https://habr.com/ru/post/423177/



All Articles