SlideShare uma empresa Scribd logo
1 de 46
Presented by:
Ammar Hasayen | MS MVP
CISSP | Cybersecurity
http://ahasayen.com
CLOUD REFERENCE
ARCHITECTURE
PART 1 - FOUNDATION
Date: 9Th November 2019
Available on SlideShare &
YouTube
|
@ammarhasaye
n
About Me: http://ahasayen.com
Blog: http://blog.ahasayen.com
Social Media: @ammarhasayen
Microsoft MVP | Pluralsight Author | Blogger
Book Author
AMMAR HASAYEN
CISSP | CISM | AWS Architect | Azure Security Engineer | M365 Security Engineer
Cloud Migration
Handbook Vol. 1
Now available!
Authored by Jose A. Hernandez, myCloudDoor CTO,
Ammar Hasayen, a recognized worldwide expert on
cybersecurity and Javier Aguado, myCloudDoor
Cloud Services Director
https://me.ahasayen.com/cloud-migration/
OVERVIEW
Move to the cloud
– Agility and speed of delivery
– Governance and security
Cloud Reference Architecture
– ISO/IEC 17789:2014
Azure cloud computing
Audience
– Cloud architects
– Security professionals
– Any organization moving to the cloud
Introduction
The biggest blockers for
organizations to adopt cloud first
strategy are Security and
Compliance
CEO of AvaLAN Wireless, warns
that the United States next Pearl
Harbor will be cyber-attack
According to a recent Gartner
report, it is most likely that 95% of
cloud security failures will be the
customer’s fault
Just think about these facts for a
moment
Security &
ComplianceCloud Agility
ExtendTrust
Builder Blueprint
Blueprint
Cloud
Reference
Architecture
(CRA)
The Need For Cloud Reference
Architecture
Cloud Reference Architecture also known as CRA
Large-Scale
Workloads
Development
Environment
Testing and Exploring
Journey To The Cloud
Islands
Workload islands that are
managed separately
Cost
Managing cost of running workloads in
the cloud becomes a challenge
The End Result
Governance
Challenges
Automation Security models
Data Sovereignty
The Benefits of Cloud Reference
Architecture
Cloud reference architecture (CRA) helps organizations
address the need for detailed, modular and current architecture
guidance for building solutions in the cloud
CRA
Design Patterns
Guidance
CRA
Cloud Reference Architecture CRA
Deploy Workloads
User View
Functional
View
Implementation
View
Deployment
View
The ISO/IEC 17789 CRA defines four
different views:
1. User View
2. Functional View
3. Implementation View
4. Deployment View
Deployment View
- Framework for all cloud deployments.
- Reduce design effort
- Blueprint for all cloud projects.
• Quickly deploy workloads.
• Reduce complexity.
• Reduce Risk.
The Need for Enterprise Scaffold
Cost Management Layer
Governance Layer
Security Layer
Trust Layer
CRA
Deploy Resources
Engineers build a building
- Creating basis of the structure
(Scaffold)
- Provides anchor points of more
permanent systems to be mounted
https://bit.ly/2ZdYZIA
Enterprise Scaffold
Resources deployed in the cloud:
- Meet minimum security and governance
practices.
- Enable developers to deploy applications
quickly.
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
SUMMARY
What is the purpose of CRA
Balancing security & governance with agility &
speed of delivery
The need for ‘Enterprise Scaffold’ as a
framework to achieve that balance.
References
• ISO/IEC 17789:2014: Cloud computing - Reference architecture
https://www.iso.org/standard/60545.html
• Azure Enterprise Scaffold
https://docs.microsoft.com/en-us/azure/architecture/cloud-adoption/appendix/azure-
scaffold
• My Cloud Migration Handbook Vol. 1
http://me.ahasayen.com/cloud-migration
CHECK THE VIDEO
DESCRIPTION BELOW
PLEASE SHARE YOUR FEEDBACK ON ONE OF MY SOCIAL CHANNELS
@ammarhasayen
Let Me Know Your Feedback
YOU CAN ACCESS THE SLIDES FROM SlideShare @ammarhasayen
Thank You For Your Time
CONNECT ON
SOCIAL MEDIA
@ammarhasayen
CHECK OUT
MY BLOG
http://blog.ahasayen.com
CHECK OUT
MYCOURSES IN
PLURALSIGHT
https://www.pluralsight.com/authors/ammar-hasayen
Cloud Migration
Handbook Vol. 1
Now available!
Authored by Jose A. Hernandez, myCloudDoor CTO,
Ammar Hasayen, a recognized worldwide expert on
cybersecurity and Javier Aguado, myCloudDoor
Cloud Services Director
https://me.ahasayen.com/cloud-migration/
AMMAR HASAYEN
@ammarhasayen

Mais conteúdo relacionado

Mais procurados

App Modernisation with Microsoft Azure
App Modernisation with Microsoft AzureApp Modernisation with Microsoft Azure
App Modernisation with Microsoft AzureAdam Stephensen
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerAmazon Web Services
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...Edureka!
 
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018Amazon Web Services
 
AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019Amazon Web Services
 
Getting started on your AWS migration journey
Getting started on your AWS migration journeyGetting started on your AWS migration journey
Getting started on your AWS migration journeyAmazon Web Services
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_haveHow_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_haveAmazon Web Services
 
CAF presentation 09 16-2020
CAF presentation 09 16-2020CAF presentation 09 16-2020
CAF presentation 09 16-2020Michael Nichols
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialAlibaba Cloud
 

Mais procurados (20)

App Modernisation with Microsoft Azure
App Modernisation with Microsoft AzureApp Modernisation with Microsoft Azure
App Modernisation with Microsoft Azure
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
 
Cloud Migration Strategy Framework
Cloud Migration Strategy FrameworkCloud Migration Strategy Framework
Cloud Migration Strategy Framework
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Advanced Container Security
Advanced Container Security Advanced Container Security
Advanced Container Security
 
infrastructure as code
infrastructure as codeinfrastructure as code
infrastructure as code
 
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
 
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
 
AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019
 
Azure 101
Azure 101Azure 101
Azure 101
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Getting started on your AWS migration journey
Getting started on your AWS migration journeyGetting started on your AWS migration journey
Getting started on your AWS migration journey
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_haveHow_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
 
CAF presentation 09 16-2020
CAF presentation 09 16-2020CAF presentation 09 16-2020
CAF presentation 09 16-2020
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is Essential
 
Setting Up a Landing Zone
Setting Up a Landing ZoneSetting Up a Landing Zone
Setting Up a Landing Zone
 

Semelhante a Cloud Reference Architecture - Part 1 Foundation

(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...Amazon Web Services
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azureAbdul Khan
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPTAmazon Web Services
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Evolution to the Hybrid Data Center
Evolution to the Hybrid Data CenterEvolution to the Hybrid Data Center
Evolution to the Hybrid Data CenterCisco Canada
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Jeremy Gray
 
Windows Azure By Amr Horanieh
Windows Azure By Amr HoraniehWindows Azure By Amr Horanieh
Windows Azure By Amr HoraniehMSP@PSU
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...Amazon Web Services
 
AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015Hwee Bee Tan
 
Cloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azureCloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azureEduardo Castro
 
Azure Compute, Networking and Storage Overview
Azure Compute, Networking and Storage OverviewAzure Compute, Networking and Storage Overview
Azure Compute, Networking and Storage OverviewAzure Riyadh User Group
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Autodesk
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the CloudAmazon Web Services
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.Moshe Ferber
 
A Multi-Company Perspective: Enterprise Cloud and PaaS
A Multi-Company Perspective: Enterprise Cloud and PaaSA Multi-Company Perspective: Enterprise Cloud and PaaS
A Multi-Company Perspective: Enterprise Cloud and PaaSThoughtworks
 

Semelhante a Cloud Reference Architecture - Part 1 Foundation (20)

Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
 
Cloud security comparisons between aws and azure
Cloud security comparisons between aws and azureCloud security comparisons between aws and azure
Cloud security comparisons between aws and azure
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Evolution to the Hybrid Data Center
Evolution to the Hybrid Data CenterEvolution to the Hybrid Data Center
Evolution to the Hybrid Data Center
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
 
Windows Azure By Amr Horanieh
Windows Azure By Amr HoraniehWindows Azure By Amr Horanieh
Windows Azure By Amr Horanieh
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...
The Changing Landscape of Development with AWS Cloud - AWS PS Summit Canberra...
 
AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015AWSome Day Philippines Keynote 2015
AWSome Day Philippines Keynote 2015
 
Cloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azureCloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azure
 
Azure Compute, Networking and Storage Overview
Azure Compute, Networking and Storage OverviewAzure Compute, Networking and Storage Overview
Azure Compute, Networking and Storage Overview
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the Cloud
 
Architect secure cloud services.
Architect secure cloud services.Architect secure cloud services.
Architect secure cloud services.
 
A Multi-Company Perspective: Enterprise Cloud and PaaS
A Multi-Company Perspective: Enterprise Cloud and PaaSA Multi-Company Perspective: Enterprise Cloud and PaaS
A Multi-Company Perspective: Enterprise Cloud and PaaS
 

Mais de Ammar Hasayen

UAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPUAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPAmmar Hasayen
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAAmmar Hasayen
 
Introducing Azure Bastion
Introducing Azure BastionIntroducing Azure Bastion
Introducing Azure BastionAmmar Hasayen
 
Microsoft 365 Certification - How to become Enterprise Administrator Expert
Microsoft 365 Certification - How to become Enterprise Administrator ExpertMicrosoft 365 Certification - How to become Enterprise Administrator Expert
Microsoft 365 Certification - How to become Enterprise Administrator ExpertAmmar Hasayen
 
Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019Ammar Hasayen
 
The Emerge Of The Modern Workplace
The Emerge Of The Modern WorkplaceThe Emerge Of The Modern Workplace
The Emerge Of The Modern WorkplaceAmmar Hasayen
 
How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018Ammar Hasayen
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionSecure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionAmmar Hasayen
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASBAmmar Hasayen
 
Office 365 periodic table - editable
Office 365 periodic table - editableOffice 365 periodic table - editable
Office 365 periodic table - editableAmmar Hasayen
 
Migrating your certification authority hashing algorithm from sha 1 to sha-2
Migrating your certification authority hashing algorithm from sha 1 to sha-2Migrating your certification authority hashing algorithm from sha 1 to sha-2
Migrating your certification authority hashing algorithm from sha 1 to sha-2Ammar Hasayen
 
Strict KDC Validation
Strict KDC ValidationStrict KDC Validation
Strict KDC ValidationAmmar Hasayen
 
Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5Ammar Hasayen
 
Modern Workplace Deep Dive infographic
Modern Workplace Deep Dive infographicModern Workplace Deep Dive infographic
Modern Workplace Deep Dive infographicAmmar Hasayen
 
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture PosterMicrosoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture PosterAmmar Hasayen
 
Email edge security architecture EOP
Email edge security architecture EOPEmail edge security architecture EOP
Email edge security architecture EOPAmmar Hasayen
 
Era of disruption with Microsoft 365
Era of disruption with Microsoft 365Era of disruption with Microsoft 365
Era of disruption with Microsoft 365Ammar Hasayen
 
What is microsoft 365
What is microsoft 365What is microsoft 365
What is microsoft 365Ammar Hasayen
 
Exchange Online Protection EOP headers
Exchange Online Protection EOP headersExchange Online Protection EOP headers
Exchange Online Protection EOP headersAmmar Hasayen
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 

Mais de Ammar Hasayen (20)

UAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVPUAE Microsoft MVPs - How To become Microsoft MVP
UAE Microsoft MVPs - How To become Microsoft MVP
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRAVirtual Data Center VDC - Azure Cloud Reference Architecture CRA
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
 
Introducing Azure Bastion
Introducing Azure BastionIntroducing Azure Bastion
Introducing Azure Bastion
 
Microsoft 365 Certification - How to become Enterprise Administrator Expert
Microsoft 365 Certification - How to become Enterprise Administrator ExpertMicrosoft 365 Certification - How to become Enterprise Administrator Expert
Microsoft 365 Certification - How to become Enterprise Administrator Expert
 
Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019Windows Advance Threats - BSides Amman 2019
Windows Advance Threats - BSides Amman 2019
 
The Emerge Of The Modern Workplace
The Emerge Of The Modern WorkplaceThe Emerge Of The Modern Workplace
The Emerge Of The Modern Workplace
 
How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018How to plan your Modern Workplace Project - SPS Denver October 2018
How to plan your Modern Workplace Project - SPS Denver October 2018
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat ProtectionSecure Modern Workplace With Microsoft 365 Threat Protection
Secure Modern Workplace With Microsoft 365 Threat Protection
 
Microsoft Cloud App Security CASB
Microsoft Cloud App Security CASBMicrosoft Cloud App Security CASB
Microsoft Cloud App Security CASB
 
Office 365 periodic table - editable
Office 365 periodic table - editableOffice 365 periodic table - editable
Office 365 periodic table - editable
 
Migrating your certification authority hashing algorithm from sha 1 to sha-2
Migrating your certification authority hashing algorithm from sha 1 to sha-2Migrating your certification authority hashing algorithm from sha 1 to sha-2
Migrating your certification authority hashing algorithm from sha 1 to sha-2
 
Strict KDC Validation
Strict KDC ValidationStrict KDC Validation
Strict KDC Validation
 
Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5Microsoft 365 Threat Management and security - EMS E5
Microsoft 365 Threat Management and security - EMS E5
 
Modern Workplace Deep Dive infographic
Modern Workplace Deep Dive infographicModern Workplace Deep Dive infographic
Modern Workplace Deep Dive infographic
 
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture PosterMicrosoft EMS Enterprise Mobility and Security Architecture Poster
Microsoft EMS Enterprise Mobility and Security Architecture Poster
 
Email edge security architecture EOP
Email edge security architecture EOPEmail edge security architecture EOP
Email edge security architecture EOP
 
Era of disruption with Microsoft 365
Era of disruption with Microsoft 365Era of disruption with Microsoft 365
Era of disruption with Microsoft 365
 
What is microsoft 365
What is microsoft 365What is microsoft 365
What is microsoft 365
 
Exchange Online Protection EOP headers
Exchange Online Protection EOP headersExchange Online Protection EOP headers
Exchange Online Protection EOP headers
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 

Último

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxEasyPrinterHelp
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 

Último (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 

Cloud Reference Architecture - Part 1 Foundation

  • 1. Presented by: Ammar Hasayen | MS MVP CISSP | Cybersecurity http://ahasayen.com CLOUD REFERENCE ARCHITECTURE PART 1 - FOUNDATION Date: 9Th November 2019 Available on SlideShare & YouTube | @ammarhasaye n
  • 2. About Me: http://ahasayen.com Blog: http://blog.ahasayen.com Social Media: @ammarhasayen Microsoft MVP | Pluralsight Author | Blogger Book Author AMMAR HASAYEN CISSP | CISM | AWS Architect | Azure Security Engineer | M365 Security Engineer
  • 3. Cloud Migration Handbook Vol. 1 Now available! Authored by Jose A. Hernandez, myCloudDoor CTO, Ammar Hasayen, a recognized worldwide expert on cybersecurity and Javier Aguado, myCloudDoor Cloud Services Director https://me.ahasayen.com/cloud-migration/
  • 4. OVERVIEW Move to the cloud – Agility and speed of delivery – Governance and security Cloud Reference Architecture – ISO/IEC 17789:2014 Azure cloud computing Audience – Cloud architects – Security professionals – Any organization moving to the cloud
  • 6. The biggest blockers for organizations to adopt cloud first strategy are Security and Compliance
  • 7. CEO of AvaLAN Wireless, warns that the United States next Pearl Harbor will be cyber-attack
  • 8. According to a recent Gartner report, it is most likely that 95% of cloud security failures will be the customer’s fault
  • 9. Just think about these facts for a moment
  • 10.
  • 14. The Need For Cloud Reference Architecture Cloud Reference Architecture also known as CRA
  • 16. Islands Workload islands that are managed separately Cost Managing cost of running workloads in the cloud becomes a challenge The End Result
  • 19.
  • 20. The Benefits of Cloud Reference Architecture
  • 21. Cloud reference architecture (CRA) helps organizations address the need for detailed, modular and current architecture guidance for building solutions in the cloud CRA
  • 22. Design Patterns Guidance CRA Cloud Reference Architecture CRA Deploy Workloads
  • 23. User View Functional View Implementation View Deployment View The ISO/IEC 17789 CRA defines four different views: 1. User View 2. Functional View 3. Implementation View 4. Deployment View
  • 24. Deployment View - Framework for all cloud deployments. - Reduce design effort - Blueprint for all cloud projects. • Quickly deploy workloads. • Reduce complexity. • Reduce Risk.
  • 25. The Need for Enterprise Scaffold
  • 26. Cost Management Layer Governance Layer Security Layer Trust Layer CRA Deploy Resources
  • 27. Engineers build a building - Creating basis of the structure (Scaffold) - Provides anchor points of more permanent systems to be mounted https://bit.ly/2ZdYZIA
  • 28. Enterprise Scaffold Resources deployed in the cloud: - Meet minimum security and governance practices. - Enable developers to deploy applications quickly.
  • 29. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 30. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 31. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 32. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 33. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 34. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 35. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 36. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 37. SUMMARY What is the purpose of CRA Balancing security & governance with agility & speed of delivery The need for ‘Enterprise Scaffold’ as a framework to achieve that balance.
  • 38. References • ISO/IEC 17789:2014: Cloud computing - Reference architecture https://www.iso.org/standard/60545.html • Azure Enterprise Scaffold https://docs.microsoft.com/en-us/azure/architecture/cloud-adoption/appendix/azure- scaffold • My Cloud Migration Handbook Vol. 1 http://me.ahasayen.com/cloud-migration
  • 40. PLEASE SHARE YOUR FEEDBACK ON ONE OF MY SOCIAL CHANNELS @ammarhasayen Let Me Know Your Feedback
  • 41. YOU CAN ACCESS THE SLIDES FROM SlideShare @ammarhasayen Thank You For Your Time
  • 45. Cloud Migration Handbook Vol. 1 Now available! Authored by Jose A. Hernandez, myCloudDoor CTO, Ammar Hasayen, a recognized worldwide expert on cybersecurity and Javier Aguado, myCloudDoor Cloud Services Director https://me.ahasayen.com/cloud-migration/

Notas do Editor

  1. In this video series, we are going to talk about the cloud reference architecture and since this is an extremely strategic topic, I am going to cover it in more than one video, and today I am going to start with part 1 or the foundation of the cloud reference architecture
  2. A little bit about me, my name is Ammar Hasayen, I have over 15 years of experience and focusing now in cloud computing and cloud security. I am a Microsoft MVP, a Pluralsight author for many cloud security courses, I speak frequently in international conferences in Europe and the statues. I am certified in Azure and AWS and here are my social media links in this slides.
  3. I have recently published with two great authors and the book is called (Cloud Migration Handbook) and I highly recommend you follow this link in the slide to learn more about it. In fact, all what we are going to cover in this video series is only scratching the surface of what you can learn from this book.
  4. So you are considering that bold move to the cloud and of course, what we all want to is that magical balance between agilitiy and speed of delivery from one side, and governance and security from the other side. This is where the cloud reference architecture comes to the picture, so we are going to define it as per the ISO standard. All what we are going to cover applies any cloud, but for simplicity, I am going to use Azure cloud computing for my examples. Who are the audience of this video series, of course cloud architects , security professionals because we will have a lot of security stuff today, and other stackeholders and senior people in your organization who are part of the cloud migration project
  5. I want to start by sharing with you some insights to help you understand the urgency of what I am trying to teach you in this video.
  6. And I will start by asking you if you know that as per today, that the biggest blockers for organizations to adopt a cloud first strategy are security and compliance? I work a lot with banks, and this is the first thing that I hear when someone talks about cloud computing. It is not secured and can’t be trusted
  7. In fact, the CEO of AvaLan wireless warns that the united states next pearl harbor will be cyber-attack. The nightmare of data leaks and the fear of losing reputation and customer trust is top of mind of every CEO when thinking of moving to the cloud
  8. While cloud computing offers a lot of security features to customers that sometimes even on-premises deployments can’t provide, , 95% of cloud security failures will be customer’s fault according to a recent Gartner report. Security in the cloud is a shared responsibility between you as a customer and the cloud provider. Many organizations fail to identify this trust boundary and who is responsible of what is often lost in translation.
  9. So I want you to pause for a minute and think about these facts for a moment. I mean, your job as a security professional is to bridge that gap after all, and this is exactly what we are trying to achieve today.
  10. You might be asking, what gap are you talking about, well, organizations want to use cloud computing to take advantage of the agility and elasticity of the cloud and to help them digitally transform. However, the fear from trusting the cloud to host their data is still a concern and is slowing the cloud migration process for many organizations.
  11. But you might agree with me or not I believe that the cloud is not evil, it gives you the agility and elasticity your business needs to grow and transform, while security and compliance are slowing you down. What you need is a way to balance the two sides, to have the agility of the cloud without compromising security and compliance and also to trust your cloud to host your data and workloads. In other words, you need to extend the trust you have for your on-premises infrastructure to the cloud computing so that you can migrate and deploy workloads with confident. And this is exactly is your role as a cloud architect, as a security professional or a as a compliance offier.
  12. Congratulations, you are the cloud builder. You are assigned the task of achieving this balance by understanding the nature of cloud computing and by deeply considering your organization’s security and compliance requirements. Now I know this is much to ask for, but don’t worry, I am going to help you how to achieve this balance One way to accomplish that is to plan and design a blueprint. You can give your devops team this blueprint and ask : Could you please use this blueprint when you deploy any resource in the cloud? Hmmm, the devops team might ask for a reason, so you would tell them deploying cloud resources using this blueprint means what you build in the cloud is compliant, secure and meets your company’s policies and governance.
  13. Now between us, this blueprint is what we will be calling the cloud reference architecture or CRA for short.
  14. Before digging into the definition of CRA and its benefits, it is better to look at how things can go wrong without having one. You will quickly realize that it is better to spend some time before migration to plan your cloud migration journey with security and governance in mind. Doing that will not only save you time and money but will help you meet your security and governance needs. So let’s get started.
  15. When organizations start planning their cloud migration, and like anything else new, they start by trying and testing some capabilities. Perhaps they start hosting their development environment in the cloud while keeping their production one on-premises. It is also common to see small and isolated applications being migrated first, perhaps because of their size, low criticality and to give the cloud a chance to prove it is trust worthy. After all, migration to the cloud is a journey and doesn’t happen overnight. Then the benefits of cloud solutions became apparent and companies started to migrate multiple large-scale workloads. As more and more workloads move to the cloud, many organizations find themselves dealing with workload islands that are managed separately with different security models and independent data flows. Even worse, with the pressure to quickly get new applications deployed in the cloud with strict deadlines, developers find themselves rushing to consume new cloud services without reasonable consideration to organization’s security and governance needs.
  16. The unfortunate result in most cases is to end up with a cloud infrastructure that is hard to manage and maintain. Each application could end up deployed in a separate island with its own connectivity infrastructure and with poor access management. Managing cost of running workloads in the cloud becomes also challenge. There is no clear governance and accountability model which leads to a lot of management overhead and security concerns.
  17. The lack of governance, automation, naming convention and security models are even hard to achieve afterwards. In fact, it is nightmare to look at a poorly managed cloud infrastructure and then trying to apply security and governance afterword because these need to be planned a head before even deploying any cloud resources
  18. Even worse, data can be hosted in geographies that violates corporate’s compliance requirements, which is a big concern for most organizations. I remember once asking one of my customers if they knew where their cloud data is hosted, and most of them just don’t know.
  19. For example, you can see here different applications deployed in their own virtual networks. Each application maintains a separate security and connectivity infrastructure, now not only that this is extremely hard to manage environment, the chance that the security team is aware of all these deployed applications is not always good, which could easily lead to implementing an application environment with missing security equipments.
  20. Now that you understand what might go wrong without a reference architecture, let us introduce what a CRA means and see how it can help you in your cloud migration journey.
  21. Simply put, the cloud reference architecture (CRA) helps organizations address the need for detailed, modular and current architecture guidance for building solutions in the cloud.
  22. It serves as a collection of design guidance and design patterns to support structured approach to deploy services and applications in the cloud. This means that every workload is deployed with security, governance and compliance in mind from day one.
  23. The ISO/IEC 17789 Cloud Computing Reference Architecture defines four different views for the CRA: User View Functional View Implementation View Deployment View. We will be focusing on the Deployment View of the Cloud Reference Architecture for now.
  24. The CRA Deployment View provides a framework to be used for all cloud deployment projects, which reduces the effort during design and provides an upfront guidance for a deployment aligned to architecture, security and compliance. You can think of the CRA Deployment View as the blueprint for all cloud projects. What you get from this blueprint, the end goal if you are wondering, is to help you quickly develop and implement cloud-based solutions, while reducing complexity and risk. Therefore, having a foundation architecture not only helps you ensure security, manageability and compliance but also consistency for deploying resources. It includes network, security, management infrastructure, naming convention, hybrid connectivity and more. Now I know what you might be thinking right now? How does one blueprint fit the need for organizations with different sizes? Since not all organizations are the same, the CRA Deployment View does not outline a single design that fits all sizes. Rather, it provides a framework for decisions based on core cloud services, features and capabilities.
  25. One of the main concepts of a CRA that I would like to share with you today is the concept of an enterprise scaffold.
  26. Let’s start from the beginning. When you decide to migrate to the cloud and take advantage of all what the cloud has to offer, there are couple of concerns that you should address first. Things like: A way to manage and track cost effectively (how can you know what resources are deployed so you can account for it and bill it back accurately). Establishing governance framework to address key issues like data sovereignty. Deploy with mindset of security first (defining clear management roles, access management, and security controls across all deployments). Building trust in the cloud (have peace of mind that cloud resources are managed and protected from day one).   These concerns are top priority for every organization when migrating to the cloud and should be addressed early in the cloud migration planning phase.
  27. To address all these key concerns, you need to think of adopting a framework or an enterprise scaffold that can help you move to the cloud with confidence. Think about how engineers build a building. They start by creating the basis of the structure (scaffold) that provides anchor points for more permanent systems to be mounted.
  28. The same applies when deploying workloads in the cloud. You need an enterprise scaffold that provides structure to the cloud environment and anchors for services built on top. It is the foundation that builders (IT teams) use to build services with speed of delivery in mind. The enterprise scaffold ensures that workloads you deploy in the cloud meet the minimum security and governance practices your organization is adopting while giving developers the ability to deploy services and applications quickly to meet their goals and deadlines, which is a win win solution.
  29. To accomplish this, we need to define the components of the cloud reference architecture that we will use to build secure, compliant and flexible framework that developers can build application on top with agility and speed of delivery in mind. At the core of building an enterprise scaffold for cloud migration is the Enterprise Structure Layer which act as the foundation on which all other layers are built. Here you define a hierarchy that maps to your organization departments and cost centers to govern spending and get visibility of cost across departments, line of business applications or business units. On top, you define a Management Hierarchy that gives you even more flexibility when assigning permissions and applying policies to enforce your governance in the cloud. With that carefully defined, you start adopting key best practices and patterns that maps to your organization’s maturity level. You can think of these as the Deployment Essentials which includes establishing a proper naming convention, deploying with automation and using Infrastructure as Code instead of using the web interface to deploy resources which can cause a snow ball effect of changes that in the future becomes hard to manage, track or even audit. The idea here is to have a consistent way of deploying resources over and over again. Not only it gives you that speed of delivery we all want to have, but also a piece of mind that what you verified as a compliant environment in code, is the blueprint used to deploy resources across your subscriptions. Now it is time to start building the foundation infrastructure and this is the Core Networking layer. At this layer, governance can be achieved using different technologies that helps you isolate and deploy security controls to monitor and inspect traffic across your cloud infrastructure. One of the best recommendations here is to use a hub and spoke topology and adopt the shared service model where common resources are consumed from different LOB applications which has many benefits that we will discuss in great details later. In this layer, you decide how to extend your on-premises data center to the cloud. You also define how to design and implement isolation using virtual networks and user defined routes .This is also the time where you deploy Network Virtual Appliances (NVAs) and firewalls to inspect data flow inside your cloud infrastructure. Another key feature of the cloud is the Software Defined Networks (SDNs) that gives you the opportunity to do micro-segmentation by implementing Network Security Groups and Application Security Groups to better control traffic even within subnets, not only at the edge of the network which is an evolution of how we think about isolation and protection in such elastic cloud computing environment. After you are done with the core networking layer, and just before deploying your resources, you should consider how are you going to enforce Resource Governance. This is important because the goal of the cloud reference architecture is to give developers more control and freedom to deploy workloads quickly and meet their deadlines, while adhering to corporate security and governance needs. One way to achieve this balance is by applying resource tags, implementing cost management controls, and also by translating your organizational governance rules and policies into Azure policies that governs the usage of cloud resources. Once all this foundation work is finished, you can start planning how to deploy your line of business applications (LOB applications). Most likely you need to define different application lifecycle environments like (Production, Dev, and QA). Here you can also establish a shared services workspace to hosts shared infrastructure resources for your line of business applications to consume. If one of your business applications requires a connectivity to on-premises resources, it can use the VPN gateway for example deployed in the shared services workspace instead of implementing a gateway for each application’s workspace. The shared services workspace is a key element when defining your CRA as it hosts shared services like domain controllers, DNS services, jumpbox devices and security controls like firewalls. But your job is far from finished, as security is a never-ending process, and this is where the Security Layer comes to the picture. Here you define proper identity and access management model using Azure RBAC. Security practices like patching, encryption and secure DevOps are key areas in this layer. Furthermore, to gain the visibility and control you need in such rapidly changed environment, you need to think of a security as a service model which natively integrate with the cloud platform and services, so here you can use Azure security center to assess your environment for vulnerabilities but also as enabler to your incident response in the cloud, as you need to detect and remediate security incidents. You can also implement Just-in Time Virtual Machine Access to lock down management ports on your virtual machines. If you are highly regulated environment, you can also look at VNET Service Endpoints to protect access to PaaS Services like Azure Storage so that accessing these services does not pass through the public internet. With all this in mind, you need to consider Business Continuity, high availability and backup, and here I want to remind you of the shared reasonability model of the cloud. You are responsible of many things which might include planning how to do backups, how to design for high availability and even for disaster recovery And finally, How to think of monitoring and auditing in the cloud. Is there is a performance bottleneck that you should address right away, do you require that changes to your cloud environment is audited, so where are you going to keep the logs, are you going to integrate that with your on-premises SIEM solution, or use a cloud logging mechanism, and if so, does that solution retain the logs for the duration you need?      
  30. In summary, the cloud reference architecture helps organizations address the need for detailed, modular and current architecture guidance for building solutions in the cloud. It helps us achieve that balance between agility and speed of delivery from one side, and security and governance from the other side. To do that, we’ve defined the enterprise scaffold and the different layers and components that all work together as a blueprint for any cloud migration project
  31. I will leave you of course with some great resources, including a link to my cloud migration book that takes this conversation to the next level with more deep guidance and design patterns on how to approach any cloud migration project.
  32. Don’t forget to check the video description below for links to upcoming videos in this cloud reference architecture series.
  33. Let me know what you think and please share your feedback in the comments bellow.
  34. Thank you for your time and don’t forget to check the slides at slideshare
  35. Finally, I would love if we connect o social media, thank you again for your time, and see you in my next video.