SlideShare uma empresa Scribd logo
1 de 34
1
ENTERPRISE SECURITY
IN PRACTICE
RADU VUNVULEA, OCTOBER 2017
@RADU VUNVULEA
ENTERPRISE AND SECURITY
RADU VUNVULEA
Technology Enthusiast
Dreamer
Microsoft Azure MVP
Speaker & Trainer
Writer & Blogger
Idealist Software
Architecture Crafter
SANDBOX
Group resources
Control
Manage
DIRECT ACCESS
Same network
Visible between
each other
Easy access and
control
ISOLATION
Restric traffic
Controls what goes
to and from VNET
Isolate from outside
NSG – TIPS AND TRICKS
CROSS SYSTEM COMMUNICATION
Specify what can be
exchange between
systems
Full control on
inbound and
outbound traffic
NSG
NETWORK VIRTUAL APPLIANCE
Control security from
only one location
Cross location
synchronization
MONITOR AND AUDIT
All traffic goes
through virtual
appliance
Push audit data to
on-premises system
Firewall, IDS, IPS
UDR
EXTERNAL TRAFFIC CONTROL
Full control of IP
Filtering
Traffic goes through
VPN
S2S
VPN
Internet
IPSEC VPN TERMINATED OUTSIDE FIREWALL
Cannot be done using S2S
VPN
VPN terminated before NGFW,
inside Virtual Gateway
Appliance
VPN
IPSEC VPN TERMINATED OUTSIDE FIREWALL
Cannot be done using S2S
VPN
VPN terminated before NGFW,
inside Virtual Gateway
Appliance
VPN
OpenVPN
IPSEC VPN TERMINATED OUTSIDE FIREWALL
Appliance plays the role of
firewall and VPN Gateway
VPN
DEVICE AUTHENTICATION USING CERTIFICATES
Supported only for Point-to-Site
VPN
Site-to-Site VPN is connected
directly to VPN hardware
certificates
CASCADED VIRTUAL APPLIANCES
Multiple virtual appliances
connected together
VNET TO VNET CONNECTIVITY
Peering – Fast and
reliable
VPN Gateway –
More granular
control of what goes
in or out
Peering /
VPN
Gateway
CENTRAL LOGGING DATA
Activity Logs
Azure Diagnostic Logs
AAD Reporting
VM and Cloud Services
Storage Analytics
Network Security Groups
Application Insights
Security Alert
Configurable, +180 days, 90
days
MONITOR AND REACT - OMS
API AND INFRASTRUCTURE CHANGES
CLOUD SERVICE PROVIDER CAN MAKE CHANGES ONLY AFTER THE NATURE OF CHANGE IS
UNDERSTOOD AND A SECURITY ASSESSMENT IS DONE
YES
• Microsoft announce 12 months in advance any
breaking changes at API or functionality level
NO
• Infrastructure and services change are done on the
fly as long as the API or functionality is not altered
IDENTITY AND ACCESS MANAGEMENT
AZURE ACTIVE DIRECTORY
Mitigation
Azure Enterprise Security in Practice Radu Vunvulea Codecamp Cluj Napoca  Nov 2017
Azure Enterprise Security in Practice Radu Vunvulea Codecamp Cluj Napoca  Nov 2017

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
 
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
 
Cloud Management for WiFi networks
Cloud Management for WiFi networksCloud Management for WiFi networks
Cloud Management for WiFi networks
 
DevSecOps: control and monitoring of zero-day vulnerabilities.
DevSecOps: control and monitoring of zero-day vulnerabilities.DevSecOps: control and monitoring of zero-day vulnerabilities.
DevSecOps: control and monitoring of zero-day vulnerabilities.
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Making AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSHMaking AI based monitoring a platform feature with the power of BOSH
Making AI based monitoring a platform feature with the power of BOSH
 
SonicWall
SonicWallSonicWall
SonicWall
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?Virtualized Firewall: Is it the panacea to secure distributed enterprises?
Virtualized Firewall: Is it the panacea to secure distributed enterprises?
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Secure access to applications on Microsoft Azure
Secure access to applications on Microsoft AzureSecure access to applications on Microsoft Azure
Secure access to applications on Microsoft Azure
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewall
 
RSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics OverviewRSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics Overview
 

Semelhante a Azure Enterprise Security in Practice Radu Vunvulea Codecamp Cluj Napoca Nov 2017

Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheet
Advantec Distribution
 

Semelhante a Azure Enterprise Security in Practice Radu Vunvulea Codecamp Cluj Napoca Nov 2017 (20)

CCI2019 - Architecting and Implementing Azure Networking
CCI2019 - Architecting and Implementing Azure NetworkingCCI2019 - Architecting and Implementing Azure Networking
CCI2019 - Architecting and Implementing Azure Networking
 
Trisul for Managed Security Service Providers
Trisul for Managed Security Service ProvidersTrisul for Managed Security Service Providers
Trisul for Managed Security Service Providers
 
Trisul for Managed Security Service Providers
Trisul for Managed Security Service ProvidersTrisul for Managed Security Service Providers
Trisul for Managed Security Service Providers
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
ISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptx
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
App gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_accessApp gate sdp_use_case_secure_cloud_access
App gate sdp_use_case_secure_cloud_access
 
palo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptxpalo-alto-networks-sase-overview-deck.pptx
palo-alto-networks-sase-overview-deck.pptx
 
Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!Securing the Internet of Things in Smart Buildings!
Securing the Internet of Things in Smart Buildings!
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Ras pro
Ras proRas pro
Ras pro
 
Ras pro
Ras proRas pro
Ras pro
 
SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.SDN and Security: A Marriage Made in Heaven. Or Not.
SDN and Security: A Marriage Made in Heaven. Or Not.
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – BarracudaProtección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
 
Ad enterprise datasheet
Ad enterprise datasheetAd enterprise datasheet
Ad enterprise datasheet
 
ClearPass_Customer_Presentation
ClearPass_Customer_PresentationClearPass_Customer_Presentation
ClearPass_Customer_Presentation
 
Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheet
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Azure Enterprise Security in Practice Radu Vunvulea Codecamp Cluj Napoca Nov 2017

Notas do Editor

  1. Images: https://pixabay.com/en/snail-slug-shell-animal-nature-918899/ https://pixabay.com/en/chain-rust-iron-metal-macro-rusty-566778/ https://pixabay.com/en/directory-traffic-note-shield-road-641914/
  2. https://docs.microsoft.com/en-us/azure/security/azure-log-audit Activity Logs - config Azure Diagnostic Logs - config AAD Reporting – 180 days VM and Cloud Services - config Color map: Configurable +180 days 90 days Storage Analytics - config Network Security Groups – 1 year Application Insights – 90 days Security Alert - config
  3. Migrate to on-prem
  4. https://azure.microsoft.com/en-us/blog/an-introduction-to-eai-bridges/
  5. https://azure.microsoft.com/en-us/blog/an-introduction-to-eai-bridges/
  6. Picture source: https://pixabay.com/en/sting-free-snuff-snuff-2-in-1-snuff-2526043/