SlideShare uma empresa Scribd logo
1 de 33
© Cloud Mechanix 2020 www.cloudmechanix.com
Trust No-One Architecture For
Services And Data
Aidan Finn, MVP
Cloud Mechanix & Innofactor Norway
© Cloud Mechanix 2020 www.cloudmechanix.com
• 13 year MVP – currently Microsoft Azure (3)
• Previously Hyper-V and SCCM
• Owner of Cloud Mechanix
• Custom-written Azure training
• Principal Consultant for Innofactor Norway
• Azure infrastructure – networking & security
• Working as consultant/sys admin since 1996
• Windows Server, Hyper-V, System Center, desktop managment, and Azure
• http://aidanfinn.com
• http://innofactor.com
• http://www.cloudmechanix.com
• @joe_elway
Aidan Finn
Introduction
© Cloud Mechanix 2020 www.cloudmechanix.com
Infrastructure and Platforms
© Cloud Mechanix 2020 www.cloudmechanix.com
• It’s the cloud
• Networks:
• Connection to/from Internet
• Between components of your service
• Not limited to virtual machines!
There Is Always A Network
Even with PaaS
© Cloud Mechanix 2020 www.cloudmechanix.com
• Control:
• Inbound flows
• Flows between components of your service
• Data access
• Outbound flows
• Log & report:
• Flows
• Classification of threats
• Alert
• Security threat
Network Security
Governance, compliance, and security
© Cloud Mechanix 2020 www.cloudmechanix.com
• Usual data center approach:
• “Open up everything inside the network”
• It’s easy for admins … and malware and attackers
• Micro-Segmentation
• Breaking up a network into smaller secure zones
• Right down to the workload
• A “trust no one” concept
Essential Concept – Micro-Segmentation
Nothing new – but rarely used
© Cloud Mechanix 2020 www.cloudmechanix.com
• Public IP Addresses
• Multi-directional:
• North-south
• East-west
• Layer-4 (transport)
• Layer-7 (application)
• Services:
• Into a service
• Between services
• Maybe even between tiers of a service
Micro-Segmentation
Protection
© Cloud Mechanix 2020 www.cloudmechanix.com
• Limit public IP addresses
• Eliminate Poor “default” virtual machine deployments
• Better platform resource deployment
• Network architecture
• Control the edge
• Routing
• Firewalls
• Implement security at depth
• NSGs
• Resource-based firewalls
• Log and monitor
• Logging & auditing
• Azure Security Center & Azure Sentinel
Micro-Segmentation
Architecture
© Cloud Mechanix 2020 www.cloudmechanix.com
Limit Public IP Addresses
© Cloud Mechanix 2020 www.cloudmechanix.com
• The default experience in the Azure Portal
• Click > Click > Click > “magic VM on the Internet”
• Every VM:
• Has a Public IP Address (PIP)
• Has a Network Security Group (NSG) of its own
• Use Azure Policy:
• Prevent PIP association with virtual machine NICs
• Allow exceptions for virtual appliances
• Route inbound traffic using other means:
• RDP/SSH: Azure Bastion, RDGW, Guacamole, etc
• Application traffic: VPN, ExpressRoute, SD-WAN, Firewall NAT, Web Application
Firewall
Default Virtual Machine Deployment
Azure Portal focuses on getting you working, not secure
© Cloud Mechanix 2020 www.cloudmechanix.com
• Every platform resource is network connected
• Has 1+ public IP addresses
• “Naked” on the Internet
• Some expensive SKUs for full VNet integration:
• SQL Managed Instance, App Service Environment, and more
• Service Endpoints
• Route from virtual network to resource over private Azure backbone
• Private Link + Private Endpoint
• Resource/service gets a private IP address on subnet of your choice
• Routable from VNet and via site-to-site networking
Platform
The virtual network is always there
© Cloud Mechanix 2020 www.cloudmechanix.com
Network Architecture
Abstract of what we want to achieve
Public IP
Addresses
Resources Resources Resources
© Cloud Mechanix 2020 www.cloudmechanix.com
Hub & Spoke (VNet Peering)
Enterprise abstract of what we want to achieve
Hub VNet
Spoke
VNet
Spoke
VNet
Spoke
VNet
© Cloud Mechanix 2020 www.cloudmechanix.com
Hub & Spoke
Using a VNet-based hub (legacy)
RouteTable
VirtualSubnet
VirtualNetwork
Firewall
VirtualNetwork Gateway
RouteTable
VirtualSubnet
RouteTable
VirtualSubnet
VirtualNetwork
RouteTable
VirtualSubnet
VirtualMachineScale Set VirtualMachineWindows
RouteTable
VirtualSubnet
VirtualNetwork
RouteTable
VirtualSubnet
SQL Database
Application Service
© Cloud Mechanix 2020 www.cloudmechanix.com
Hub & Spoke (Virtual WAN)
Using a Azure WAN hub
VirtualSubnet
VirtualNetwork
VirtualSubnet
VirtualMachineScale Set VirtualMachineWindows
VirtualSubnet
VirtualNetwork
VirtualSubnet
SQL Database
Application Service
VirtualWAN
Gateway
VirtualWAN
Firewall
© Cloud Mechanix 2020 www.cloudmechanix.com
Control The Edge
© Cloud Mechanix 2020 www.cloudmechanix.com
• In a physical network, you control flows using network cables
• In the cloud:
• There are no cables
• Packets go directly from source to destination (SDN)
• Routing is the most important part of secure network architecture
• “It’s always routing, and then it’s DNS”
• How you force flows:
• In through a firewall
• Out through a firewall
• Through a firewall to get to another service
• Bypass a firewall for platform control plane
Routing
A firewall in Azure always requires understanding of Azure routing
© Cloud Mechanix 2020 www.cloudmechanix.com
• Mandatory learning:
• There is always a per-subnet “route table”
• Longest Path First (LPF)
• The most accurate route is always chosen
• Priority – when there are clashing routes:
1. User-defined route
2. BGP
3. Default (“system”) routes
• Routes must exist both ways (client > service, service > client)
• Example: spoke subnet propagates to on-premises
• There is literally hours of learning in this essential topic!
Subnet Routing
This topic is a session all of its own!
© Cloud Mechanix 2020 www.cloudmechanix.com
• “Softly launched” feature (Sept 2020)
• Used in Azure Virtual WAN
• Central “one time” configuration
• Route tables configured in the regional hub
• Propagated out to connections (branches and spokes)
• Adds support for 3rd party firewall hosted in a spoke
Custom Routing
Routes centrally propagated from Azure WAN Hub
© Cloud Mechanix 2020 www.cloudmechanix.com
• Azure Firewall
• Platform
• Optional ARM configuration (DevSecOps)
• Optional component of Azure Virtual WAN Hub
• Third-Party firewall
• Familiar
• Already trusted
• Added cost of IaaS maintenance
• Layer-4 protection
• At the edge (North-South)
• In the hub (East-West)
Network Firewall
Network isolation for north-south & east-west traffic
© Cloud Mechanix 2020 www.cloudmechanix.com
• Layer-7 protection for inbound HTTP/S traffic
• Network:
• Azure Application Gateway w/ Web Application Firewall (OWASP)
• Third-party appliance
• Typically outside of the network firewall flow
• Edge data centers:
• Azure Front Door w/ Web Application Firewall (OWASP)
• Third-party cloud services, e.g. Cloud Flare, Imperva, etc
Web Application Firewall
Often in addition to a network firewall
© Cloud Mechanix 2020 www.cloudmechanix.com
• Every VNet has DDoS Basic
• You pay (a lot) for Standard
• Enabled on edge VNets with public IP
addresses
• WAF/firewall VNets
• It takes 2 weeks for the machine learning
to “learn” your network
• Don’t wait until you are attacked!
• But it’s really pricey
Distributed Denial of Service (DDoS) Protection
https://docs.microsoft.com/en-us/azure/virtual-network/ddos-protection-overview
© Cloud Mechanix 2020 www.cloudmechanix.com
Implement Security At Depth
© Cloud Mechanix 2020 www.cloudmechanix.com
• The “hard egg shell” approach is proven to fail:
• UK NHS, Norway NorskHydro, etc
• Defence must exist everywhere
• Do not trust on-premises
• Do not trust other services
• Do not trust other tiers in a service
• Limit all traffic to absolute minimum needed:
• Source
• Destination
• Protocol/port
• Direction
The Proven Need
We need to learn from past mistakes
© Cloud Mechanix 2020 www.cloudmechanix.com
• Layer-4 security at the subnet
• Control:
• Ingress
• Egress (I do this centrally at in the hub firewall)
• Implement on a per-subnet basis (best practice according to Azure Networking
product group)
• Not per-NIC
• Scalability and support for platform services
• Recommended:
• Enable NSG Flow Logging/Traffic Analytics
Network Security Groups
Free resource provides a foundation of network security
© Cloud Mechanix 2020 www.cloudmechanix.com
• Virtual machines:
• Guest OS Firewall
• Platform resources:
• Storage Account
• Azure SQL
• Azure Key Vault
• And many more
• Note, some resource types add identity based protections
• Azure Key Vault access policies
Resource-Based Firewalls
Additional protection at the resource (the last hurdle)
© Cloud Mechanix 2020 www.cloudmechanix.com
• Virtual Machines
• NIC with private IP address
• Platform resources
• Private Link/Private Endpoint
• Resource gets a private IP
• Expanding rapidly to (planned) every resource type
• Many interesting architectural options (on-prem, SaaS, IP overlap)
• VNet Integration
• Limited resource types
• Typically very expensive SKUs
• App Service Environment, SQL Managed Instance, etc
• Service Endpoints
• Limited resource types, no private IPs
Connect The Resources
VNet/Subnet connection for governance/compliance/security
© Cloud Mechanix 2020 www.cloudmechanix.com
Log And Monitor
© Cloud Mechanix 2020 www.cloudmechanix.com
• Send logging & auditing data to Log Analytics
• Azure Firewall, WAF, NSG, VM logs, etc
• Benefits:
• Solution classification (NSG Traffic Analytics)
• Troubleshooting (routing and firewall rules)
• Investigation
• Seamless integration into Azure Sentinel (SIEM)
• Reporting with Azure Workbooks & Power BI
• Using Splunk etc?
• Keep data in Log Analytics for 30 days
• Use Log Analytics to power the Azure toolset
• Keep sending data to Splunk, etc
Logging
Implement this on day 0
© Cloud Mechanix 2020 www.cloudmechanix.com
• Basic Tier:
• Recommendations (use as a suggestion, not as a rule)
• Data collection from VM guest OS (Azure Sentinel!)
• Standard Tier:
• Machine Learning monitoring
• Adaptive Application Controls
• Adaptive Network Hardening
• Threat Intelligence
• File Integrity Monitoring
• Just-In-Time VM Access
Azure Security Center
Recommendations, compliance, and some operations tools
© Cloud Mechanix 2020 www.cloudmechanix.com
• Data collection
• Existing logging data from Azure
• Additional data from Azure, other on-premises, and other MSFT & competing
clouds/SaaS
• Machine-learning based threat protection
• Threat hunting
• Notebooks
• Workbooks
• Playbooks
Azure Sentinel (SIEM)
Security Information & Event Management as-a-service
© Cloud Mechanix 2020 www.cloudmechanix.com
Wrap Up
© Cloud Mechanix 2020 www.cloudmechanix.com
• http://aidanfinn.com
• http://www.cloudmechanix.com
• http://www.innofactor.com
• @joe_elway
Thank You!
Aidan Finn, Cloud Mechanix

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Azure Saturday: Security + DevOps + Azure = Awesomeness
Azure Saturday: Security + DevOps + Azure = AwesomenessAzure Saturday: Security + DevOps + Azure = Awesomeness
Azure Saturday: Security + DevOps + Azure = Awesomeness
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
EUC State of the Union 2021
EUC State of the Union 2021EUC State of the Union 2021
EUC State of the Union 2021
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Microsoft azure - the cloud for modern business
Microsoft azure - the cloud for modern businessMicrosoft azure - the cloud for modern business
Microsoft azure - the cloud for modern business
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration Testing
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Azure security basics
Azure security basicsAzure security basics
Azure security basics
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security Center
 
Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure Delivering and optimizing citrix from microsoft azure
Delivering and optimizing citrix from microsoft azure
 
Security OF The Cloud
Security OF The CloudSecurity OF The Cloud
Security OF The Cloud
 
Global Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security CenterGlobal Azure Bootcamp 2018 - Azure Security Center
Global Azure Bootcamp 2018 - Azure Security Center
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 

Semelhante a Trust No-One Architecture For Services And Data

Private cloud-webinar
Private cloud-webinarPrivate cloud-webinar
Private cloud-webinar
WSO2
 

Semelhante a Trust No-One Architecture For Services And Data (20)

Securely Publishing Azure Services
Securely Publishing Azure ServicesSecurely Publishing Azure Services
Securely Publishing Azure Services
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
10052016115136.pptx
10052016115136.pptx10052016115136.pptx
10052016115136.pptx
 
A Deepdive into Azure Networking
A Deepdive into Azure NetworkingA Deepdive into Azure Networking
A Deepdive into Azure Networking
 
Cloud computing & windows azure intro
Cloud computing & windows azure introCloud computing & windows azure intro
Cloud computing & windows azure intro
 
Tokyo azure meetup #8 azure update, august
Tokyo azure meetup #8   azure update, augustTokyo azure meetup #8   azure update, august
Tokyo azure meetup #8 azure update, august
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, August
 
Microsoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For TechiesMicrosoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For Techies
 
Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
 
CCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best PracticesCCI2018 - Azure Network - Security Best Practices
CCI2018 - Azure Network - Security Best Practices
 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
 
Private cloud-webinar
Private cloud-webinarPrivate cloud-webinar
Private cloud-webinar
 
Onboarding a Historical Company on the Cloud Journey
Onboarding a Historical Company on the Cloud JourneyOnboarding a Historical Company on the Cloud Journey
Onboarding a Historical Company on the Cloud Journey
 
Security as an Enabler – Cloud Security
Security as an Enabler – Cloud SecuritySecurity as an Enabler – Cloud Security
Security as an Enabler – Cloud Security
 
The Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep VittalThe Future of SDN in CloudStack by Chiradeep Vittal
The Future of SDN in CloudStack by Chiradeep Vittal
 
Azure privatelink
Azure privatelinkAzure privatelink
Azure privatelink
 
JDD 2016 - Jacek Bukowski - "Flying To Clouds" - Can It Be Easy?
JDD 2016 - Jacek Bukowski - "Flying To Clouds" - Can It Be Easy?JDD 2016 - Jacek Bukowski - "Flying To Clouds" - Can It Be Easy?
JDD 2016 - Jacek Bukowski - "Flying To Clouds" - Can It Be Easy?
 
Flying to clouds - can it be easy? Cloud Native Applications
Flying to clouds - can it be easy? Cloud Native ApplicationsFlying to clouds - can it be easy? Cloud Native Applications
Flying to clouds - can it be easy? Cloud Native Applications
 
Cloudstack for beginners
Cloudstack for beginnersCloudstack for beginners
Cloudstack for beginners
 
vRA + NSX Technical Deep-Dive
vRA + NSX Technical Deep-DivevRA + NSX Technical Deep-Dive
vRA + NSX Technical Deep-Dive
 

Mais de Aidan Finn

Hyper-V 2008 R2: What's New Since RTM?
Hyper-V 2008 R2: What's New Since RTM?Hyper-V 2008 R2: What's New Since RTM?
Hyper-V 2008 R2: What's New Since RTM?
Aidan Finn
 

Mais de Aidan Finn (20)

Digitally Transform (And Keep) Your On-Premises File Servers
Digitally Transform (And Keep) Your On-Premises File ServersDigitally Transform (And Keep) Your On-Premises File Servers
Digitally Transform (And Keep) Your On-Premises File Servers
 
When Disaster Strikes
When Disaster StrikesWhen Disaster Strikes
When Disaster Strikes
 
End-to-End Azure Site Recovery Solutions for Small-Medium Enterprises
End-to-End Azure Site Recovery Solutions for Small-Medium EnterprisesEnd-to-End Azure Site Recovery Solutions for Small-Medium Enterprises
End-to-End Azure Site Recovery Solutions for Small-Medium Enterprises
 
Windows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined StorageWindows Server 2012 R2 Software-Defined Storage
Windows Server 2012 R2 Software-Defined Storage
 
TechEd North America Speaker Idol Heat Presentation
TechEd North America Speaker Idol Heat PresentationTechEd North America Speaker Idol Heat Presentation
TechEd North America Speaker Idol Heat Presentation
 
Microsoft Azure & Hybrid Cloud
Microsoft Azure & Hybrid CloudMicrosoft Azure & Hybrid Cloud
Microsoft Azure & Hybrid Cloud
 
What's New in Windows Server 2012 R2
What's New in Windows Server 2012 R2What's New in Windows Server 2012 R2
What's New in Windows Server 2012 R2
 
E2EVC Copenhagen What’s New With Microsoft Virtualization
E2EVC Copenhagen What’s New With Microsoft VirtualizationE2EVC Copenhagen What’s New With Microsoft Virtualization
E2EVC Copenhagen What’s New With Microsoft Virtualization
 
Why Upgrade To Windows Server 2012
Why Upgrade To Windows Server 2012Why Upgrade To Windows Server 2012
Why Upgrade To Windows Server 2012
 
Windows Server 8 Hyper V Networking
Windows Server 8 Hyper V NetworkingWindows Server 8 Hyper V Networking
Windows Server 8 Hyper V Networking
 
Top Hyper-V Implementation Issues
Top Hyper-V Implementation IssuesTop Hyper-V Implementation Issues
Top Hyper-V Implementation Issues
 
Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010Private Cloud Academy: Backup and DPM 2010
Private Cloud Academy: Backup and DPM 2010
 
Private Cloud Academy: Managing Hyper-V
Private Cloud Academy: Managing Hyper-VPrivate Cloud Academy: Managing Hyper-V
Private Cloud Academy: Managing Hyper-V
 
Virtualisation Academy - Private Cloud
Virtualisation Academy - Private CloudVirtualisation Academy - Private Cloud
Virtualisation Academy - Private Cloud
 
Hyper-V 2008 R2: What's New Since RTM?
Hyper-V 2008 R2: What's New Since RTM?Hyper-V 2008 R2: What's New Since RTM?
Hyper-V 2008 R2: What's New Since RTM?
 
Hyper-V 2008 R2 Best Practices
Hyper-V 2008 R2 Best PracticesHyper-V 2008 R2 Best Practices
Hyper-V 2008 R2 Best Practices
 
Windows Deployment Tools And Methodologies
Windows Deployment Tools And MethodologiesWindows Deployment Tools And Methodologies
Windows Deployment Tools And Methodologies
 
What's New In 2008 R2 Hyper V and VMM 2008 R2 - Updated Oct 2009
What's New In 2008 R2 Hyper V and VMM 2008 R2 - Updated Oct 2009What's New In 2008 R2 Hyper V and VMM 2008 R2 - Updated Oct 2009
What's New In 2008 R2 Hyper V and VMM 2008 R2 - Updated Oct 2009
 
Whats New In 2008 R2 Hyper V And Vmm 2008 R2
Whats New In 2008 R2 Hyper V And Vmm 2008 R2Whats New In 2008 R2 Hyper V And Vmm 2008 R2
Whats New In 2008 R2 Hyper V And Vmm 2008 R2
 
Pub Forum Introducing Hyper V R2
Pub Forum   Introducing Hyper V R2Pub Forum   Introducing Hyper V R2
Pub Forum Introducing Hyper V R2
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Trust No-One Architecture For Services And Data

  • 1. © Cloud Mechanix 2020 www.cloudmechanix.com Trust No-One Architecture For Services And Data Aidan Finn, MVP Cloud Mechanix & Innofactor Norway
  • 2. © Cloud Mechanix 2020 www.cloudmechanix.com • 13 year MVP – currently Microsoft Azure (3) • Previously Hyper-V and SCCM • Owner of Cloud Mechanix • Custom-written Azure training • Principal Consultant for Innofactor Norway • Azure infrastructure – networking & security • Working as consultant/sys admin since 1996 • Windows Server, Hyper-V, System Center, desktop managment, and Azure • http://aidanfinn.com • http://innofactor.com • http://www.cloudmechanix.com • @joe_elway Aidan Finn Introduction
  • 3. © Cloud Mechanix 2020 www.cloudmechanix.com Infrastructure and Platforms
  • 4. © Cloud Mechanix 2020 www.cloudmechanix.com • It’s the cloud • Networks: • Connection to/from Internet • Between components of your service • Not limited to virtual machines! There Is Always A Network Even with PaaS
  • 5. © Cloud Mechanix 2020 www.cloudmechanix.com • Control: • Inbound flows • Flows between components of your service • Data access • Outbound flows • Log & report: • Flows • Classification of threats • Alert • Security threat Network Security Governance, compliance, and security
  • 6. © Cloud Mechanix 2020 www.cloudmechanix.com • Usual data center approach: • “Open up everything inside the network” • It’s easy for admins … and malware and attackers • Micro-Segmentation • Breaking up a network into smaller secure zones • Right down to the workload • A “trust no one” concept Essential Concept – Micro-Segmentation Nothing new – but rarely used
  • 7. © Cloud Mechanix 2020 www.cloudmechanix.com • Public IP Addresses • Multi-directional: • North-south • East-west • Layer-4 (transport) • Layer-7 (application) • Services: • Into a service • Between services • Maybe even between tiers of a service Micro-Segmentation Protection
  • 8. © Cloud Mechanix 2020 www.cloudmechanix.com • Limit public IP addresses • Eliminate Poor “default” virtual machine deployments • Better platform resource deployment • Network architecture • Control the edge • Routing • Firewalls • Implement security at depth • NSGs • Resource-based firewalls • Log and monitor • Logging & auditing • Azure Security Center & Azure Sentinel Micro-Segmentation Architecture
  • 9. © Cloud Mechanix 2020 www.cloudmechanix.com Limit Public IP Addresses
  • 10. © Cloud Mechanix 2020 www.cloudmechanix.com • The default experience in the Azure Portal • Click > Click > Click > “magic VM on the Internet” • Every VM: • Has a Public IP Address (PIP) • Has a Network Security Group (NSG) of its own • Use Azure Policy: • Prevent PIP association with virtual machine NICs • Allow exceptions for virtual appliances • Route inbound traffic using other means: • RDP/SSH: Azure Bastion, RDGW, Guacamole, etc • Application traffic: VPN, ExpressRoute, SD-WAN, Firewall NAT, Web Application Firewall Default Virtual Machine Deployment Azure Portal focuses on getting you working, not secure
  • 11. © Cloud Mechanix 2020 www.cloudmechanix.com • Every platform resource is network connected • Has 1+ public IP addresses • “Naked” on the Internet • Some expensive SKUs for full VNet integration: • SQL Managed Instance, App Service Environment, and more • Service Endpoints • Route from virtual network to resource over private Azure backbone • Private Link + Private Endpoint • Resource/service gets a private IP address on subnet of your choice • Routable from VNet and via site-to-site networking Platform The virtual network is always there
  • 12. © Cloud Mechanix 2020 www.cloudmechanix.com Network Architecture Abstract of what we want to achieve Public IP Addresses Resources Resources Resources
  • 13. © Cloud Mechanix 2020 www.cloudmechanix.com Hub & Spoke (VNet Peering) Enterprise abstract of what we want to achieve Hub VNet Spoke VNet Spoke VNet Spoke VNet
  • 14. © Cloud Mechanix 2020 www.cloudmechanix.com Hub & Spoke Using a VNet-based hub (legacy) RouteTable VirtualSubnet VirtualNetwork Firewall VirtualNetwork Gateway RouteTable VirtualSubnet RouteTable VirtualSubnet VirtualNetwork RouteTable VirtualSubnet VirtualMachineScale Set VirtualMachineWindows RouteTable VirtualSubnet VirtualNetwork RouteTable VirtualSubnet SQL Database Application Service
  • 15. © Cloud Mechanix 2020 www.cloudmechanix.com Hub & Spoke (Virtual WAN) Using a Azure WAN hub VirtualSubnet VirtualNetwork VirtualSubnet VirtualMachineScale Set VirtualMachineWindows VirtualSubnet VirtualNetwork VirtualSubnet SQL Database Application Service VirtualWAN Gateway VirtualWAN Firewall
  • 16. © Cloud Mechanix 2020 www.cloudmechanix.com Control The Edge
  • 17. © Cloud Mechanix 2020 www.cloudmechanix.com • In a physical network, you control flows using network cables • In the cloud: • There are no cables • Packets go directly from source to destination (SDN) • Routing is the most important part of secure network architecture • “It’s always routing, and then it’s DNS” • How you force flows: • In through a firewall • Out through a firewall • Through a firewall to get to another service • Bypass a firewall for platform control plane Routing A firewall in Azure always requires understanding of Azure routing
  • 18. © Cloud Mechanix 2020 www.cloudmechanix.com • Mandatory learning: • There is always a per-subnet “route table” • Longest Path First (LPF) • The most accurate route is always chosen • Priority – when there are clashing routes: 1. User-defined route 2. BGP 3. Default (“system”) routes • Routes must exist both ways (client > service, service > client) • Example: spoke subnet propagates to on-premises • There is literally hours of learning in this essential topic! Subnet Routing This topic is a session all of its own!
  • 19. © Cloud Mechanix 2020 www.cloudmechanix.com • “Softly launched” feature (Sept 2020) • Used in Azure Virtual WAN • Central “one time” configuration • Route tables configured in the regional hub • Propagated out to connections (branches and spokes) • Adds support for 3rd party firewall hosted in a spoke Custom Routing Routes centrally propagated from Azure WAN Hub
  • 20. © Cloud Mechanix 2020 www.cloudmechanix.com • Azure Firewall • Platform • Optional ARM configuration (DevSecOps) • Optional component of Azure Virtual WAN Hub • Third-Party firewall • Familiar • Already trusted • Added cost of IaaS maintenance • Layer-4 protection • At the edge (North-South) • In the hub (East-West) Network Firewall Network isolation for north-south & east-west traffic
  • 21. © Cloud Mechanix 2020 www.cloudmechanix.com • Layer-7 protection for inbound HTTP/S traffic • Network: • Azure Application Gateway w/ Web Application Firewall (OWASP) • Third-party appliance • Typically outside of the network firewall flow • Edge data centers: • Azure Front Door w/ Web Application Firewall (OWASP) • Third-party cloud services, e.g. Cloud Flare, Imperva, etc Web Application Firewall Often in addition to a network firewall
  • 22. © Cloud Mechanix 2020 www.cloudmechanix.com • Every VNet has DDoS Basic • You pay (a lot) for Standard • Enabled on edge VNets with public IP addresses • WAF/firewall VNets • It takes 2 weeks for the machine learning to “learn” your network • Don’t wait until you are attacked! • But it’s really pricey Distributed Denial of Service (DDoS) Protection https://docs.microsoft.com/en-us/azure/virtual-network/ddos-protection-overview
  • 23. © Cloud Mechanix 2020 www.cloudmechanix.com Implement Security At Depth
  • 24. © Cloud Mechanix 2020 www.cloudmechanix.com • The “hard egg shell” approach is proven to fail: • UK NHS, Norway NorskHydro, etc • Defence must exist everywhere • Do not trust on-premises • Do not trust other services • Do not trust other tiers in a service • Limit all traffic to absolute minimum needed: • Source • Destination • Protocol/port • Direction The Proven Need We need to learn from past mistakes
  • 25. © Cloud Mechanix 2020 www.cloudmechanix.com • Layer-4 security at the subnet • Control: • Ingress • Egress (I do this centrally at in the hub firewall) • Implement on a per-subnet basis (best practice according to Azure Networking product group) • Not per-NIC • Scalability and support for platform services • Recommended: • Enable NSG Flow Logging/Traffic Analytics Network Security Groups Free resource provides a foundation of network security
  • 26. © Cloud Mechanix 2020 www.cloudmechanix.com • Virtual machines: • Guest OS Firewall • Platform resources: • Storage Account • Azure SQL • Azure Key Vault • And many more • Note, some resource types add identity based protections • Azure Key Vault access policies Resource-Based Firewalls Additional protection at the resource (the last hurdle)
  • 27. © Cloud Mechanix 2020 www.cloudmechanix.com • Virtual Machines • NIC with private IP address • Platform resources • Private Link/Private Endpoint • Resource gets a private IP • Expanding rapidly to (planned) every resource type • Many interesting architectural options (on-prem, SaaS, IP overlap) • VNet Integration • Limited resource types • Typically very expensive SKUs • App Service Environment, SQL Managed Instance, etc • Service Endpoints • Limited resource types, no private IPs Connect The Resources VNet/Subnet connection for governance/compliance/security
  • 28. © Cloud Mechanix 2020 www.cloudmechanix.com Log And Monitor
  • 29. © Cloud Mechanix 2020 www.cloudmechanix.com • Send logging & auditing data to Log Analytics • Azure Firewall, WAF, NSG, VM logs, etc • Benefits: • Solution classification (NSG Traffic Analytics) • Troubleshooting (routing and firewall rules) • Investigation • Seamless integration into Azure Sentinel (SIEM) • Reporting with Azure Workbooks & Power BI • Using Splunk etc? • Keep data in Log Analytics for 30 days • Use Log Analytics to power the Azure toolset • Keep sending data to Splunk, etc Logging Implement this on day 0
  • 30. © Cloud Mechanix 2020 www.cloudmechanix.com • Basic Tier: • Recommendations (use as a suggestion, not as a rule) • Data collection from VM guest OS (Azure Sentinel!) • Standard Tier: • Machine Learning monitoring • Adaptive Application Controls • Adaptive Network Hardening • Threat Intelligence • File Integrity Monitoring • Just-In-Time VM Access Azure Security Center Recommendations, compliance, and some operations tools
  • 31. © Cloud Mechanix 2020 www.cloudmechanix.com • Data collection • Existing logging data from Azure • Additional data from Azure, other on-premises, and other MSFT & competing clouds/SaaS • Machine-learning based threat protection • Threat hunting • Notebooks • Workbooks • Playbooks Azure Sentinel (SIEM) Security Information & Event Management as-a-service
  • 32. © Cloud Mechanix 2020 www.cloudmechanix.com Wrap Up
  • 33. © Cloud Mechanix 2020 www.cloudmechanix.com • http://aidanfinn.com • http://www.cloudmechanix.com • http://www.innofactor.com • @joe_elway Thank You! Aidan Finn, Cloud Mechanix

Notas do Editor

  1. To add your image, first delete the place holder image as shown in the white box. Then insert your picture and scale it to be bigger than the size of the white box shown. Finally, right click on your image and select ‘Send to back’ – your image should now be framed correctly.