Top 10 Best Practices for Azure Security

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
- Hi, welcome to the Top 10 Azure Security Best Practices. My name is Mark Simos, Lead Cyber Security Architect. And today we will be talking about the most important things to do as you go through your Azure Adoption. And as you look to secure an existing Azure set of resources. So the first thing to keep in mind, as we take a look at, is really take a look at the problem. What is it that we are trying to solve when we talk about securing Azure? So let us take a look at this through the criminal's point of view or for the attacker's point of view. And the easiest way to look at this and get a good sense of it is by looking at what those criminals, those attackers, and sometimes nation state intelligence folks, what they can actually buy off of the dark web, the bad neighborhoods on the internet. First of all, you can actually hire an attacker to do all the work for you. And that cost anywhere from 250 is the cheapest that we see all the way up. You can buy a ransomware kit, which is really designed for sort of those new criminals, those just getting started. And it costs about 60, $65 upfront, but they also have affiliate models where they can take the ransomware kit author can take a portion of the proceeds of the ransomware attacks that the actual operator, the person, the customer of them uses. Compromised computers and mobile devices are actually fairly cheap, less than a dollar in most cases, quite less when you looked at the PC market and the mobile devices tend to be a little bit more expensive, a little bit closer to a dollar all the way up to $3 a piece again, on average. And these numbers just as a point of reference, have stayed fairly steady over the past three, four years that we have been tracking them closely. Spearfishing for hire to take over the account, payment upon, Hey, I sent you an email from that account, that is the account and I am in control of it anywhere from 100 to a $1000 U.S. dollars. And then we also have stolen passwords, these usually come from one or more breaches that have already happened, and they are about a dollar to 1000, a little bit cheaper in bulk. And those are essentially someone's username and password that have been used somewhere else, but because users tend to and people tend to use the same password over and over again, on average, in any given enterprise organization, it is about a 1% hit rate for that username password to match within that environment. So actually pretty good odds for the attackers fairly cheap. So we see a lot of password spray style of attacks, and then denial of service to keep a website down on a monthly basis costs a little bit less than $800 per month, so fairly inexpensive. And this is really the threat landscape or one view of the threat landscape that organizations face as they are trying to keep their Azure resources secure and available and not tampered with. So as we look to what our customers needed in Azure and where do we need to invest to help keep our customers secure. This information led to a couple of different investment areas. The first there is native threat detection, including a native cloud based SIEM Azure Sentinel, but it was not just about having a place to do long analytics, we wanted to have what is the industry is coming to call XDR detection response, being any detection response, which is very much based on EDR, Endpoint Detection Response started this whole trend, but that was native threat detections that really have high quality alerts and response and investigation and remediation experiences. And so we have invested quite a bit to help secure all the different kinds of assets our organizations tend to find our under attacks, Azure, Azure AD the identity is there, Windows, Linux, iOS, Android, SaaS apps. So lots of investment there, even operational technology, Microsoft recently acquired a company named CyberX that does great monitoring of operational technology. So SCADA or ICS for those computers that control physical machines and physical operations. Passwordless and multifactor authentication is really where we focus on those identity and password based attacks. Passwords nobody enjoys them, admins don't enjoy them, users don't enjoy them, but actually the attackers do technically, but we don't want them to. So passwordless is a big, big initiative at Microsoft because we want to get out of the business of passwords. We want to just look at the machine, have it do a facial read of a biometric or a fingerprint, or just the fact that you have your phone and your phone can do similar things. We want to get out of the business of passwords, investing heavily in there as well as all the different forms of multifactor authentication to support that and to secure where we are today. So the third area that we focused on is native firewalls and network security because we found that customers as they move to The Cloud , they obviously need to bring network security capabilities with them and they bring those requirements with them, but they often find that they want it to be simpler and easier like the rest of IT. And so we have invested deeply into native security capabilities within the Azure platform, including network security groups and a number of others, we will discuss a little bit more later, but also we have a builtin native firewall so that you can protect the edge of your network, that internet inverse egress point with a essentially firewall as a service. And it is fairly simple and easy to configure. A lot less complexity helps you get up and running with that security quicker. So this is one set of the things that we have invested in. The other thing that we have been focused on is really learning and then teaching our customers. We have learned a lot from our customers. there is a lot of very sophisticated customers that we have learned from. We also work with NIST and the Open Group and many other experts in industry working together because we want to build guidance for our customers because we know The Cloud is new, we will be talking about that quite a bit. And so it takes a lot of education, but we also found that customers really want clear prescriptive guidance that says exactly what to do. And so we have invested quite a bit into a number of different forms of that guidance. So the Top 10 Best Practices, which we will be talking about today, we also have the Azure Security Benchmarks, which essentially are best practices and controls. For security and Azure what is the right way to apply industry best practices to Azure specifically, which has mapped to CIS and NIST and PCI and all these other common security frameworks that organizations aligned to. And then we know that the journey to The Cloud itself can be pretty significant. And so Microsoft invested in the Cloud Adoption Framework or CAF as we like to call it, to help people with that journey of going to The Cloud , how do you do governance and cost and security and all these big picture elements. And so that is an area where we are continuing to invest. So organizations can have this smooth journey to The Cloud , and then on a per workload basis, when it comes down to brass tacks and you actually have to architect and design a specific workload replication we have also invested in the Azure, Well Architected Framework, WAF, not to be confused with Web Application Firewall, but that Well Architected Framework of what does a Well architected application look like. So that is efficient, it is secure and all of the other attributes you are looking for in an application. And so a lot of guidance there, but today is about the Top 10. So before we get into the Top 10, we have a small announcement to make around the Azure Security Benchmarks, actually. So some of you may or may not be familiar with the Azure Security Compass, which is a set of guidance that was out there. What we have done is we have worked together as a team, quite a few hours actually over the past few months with the Azure Security Benchmarks Team and the Azure Security Compass contributors. And we decided to actually bring all those together into the Azure Security Benchmarks going forward. So the Azure Security Compass is being retired slowly. It is actually being migrated to Microsoft Best Practices. So that there is one set of Microsoft Best Practices across all of the different areas that people need guidance on. And specifically the Azure Security Benchmarks are taking a lot of those lessons learned from the Compass. And so there is no one place to go for Azure Security Best Practices, and that version two is out. And that includes not only the benchmarks themselves mapped to all these other industry best practices. And of course, Microsoft's take on them with modern cloud, but also how do you apply those to individual Azure services? So Azure SQL, Azure Functions, Azure Storage, the API Gateway, all of these different kinds of capabilities. How do you apply the benchmarks to those? And so that a version two of Azure Security Benchmarks is out and we are in the process of updating all of those services baselines that are associated with it. So onto the Top 10. So these Top 10, we view as essential cloud security in a way. And we wanted to make them as actionable as possible. We wanted to take a holistic view to look at the whole problem space. And we wanted to look at it from both the short-term and long-term. What are the quick wins I need to get today to make sure I don't get myself into trouble with an incident or an attack or something I should have known better, but we also want to make sure that they have a long view and that you are investing into things that are not going to, that we are not overlooking those long-term things that are going to go ahead and come back and bite us. And so we broke this up into really four areas. People, because people at the end of the day are the center of any system. It is really about people enabling and empowering people. And particularly insecurity often forgotten because it is been such a technical discipline, but ultimately you have got defenders and you have got attackers. And even though it seems like it is a technical attack and it is, and there is automation, it is. There is a human there that is designing that automation, that is designing that malware, that is operating it in many cases in a targeted attack as an actual attack operator. And so we want to make sure that we are focusing on the people, because there is also the equivalent on the defense side where people need to focus on making sure that people have the information they need, the context they need to be successful. And of course, there is a lot of things that you end up having to do over and over again. And you want to capture those in processes so that we know who owns what, we know where that goes. We know what to do next, so that people have those things. And then the technology, which really automates as much of that process as it can to make things as easy as possible for people. So we are using those human minds, those great computers in our heads to do the most effective and useful things instead of boring, repetitive drudge work. And then the last piece is something that we found is very interesting because we are new with The Cloud and we are starting to do things that we are going to be living with for the next five, 10, 20 years much like we were 20 years ago when we started putting up Active Directory and Windows 2000 and setting those kinds of LDF directories up that did not exist in the 90s. we are in that same kind of phase now with The Cloud. And we want to make sure that, when we pour this concrete, when we make those key long-term decisions, we don't want to have to go back and break it later, or just say, you know what, we are going to live with that, it was a bad decision, but we have no choice, it is too hard to change. So we want to get ahead of that and making sure we are setting these right foundational architecture decisions correctly. So let us go ahead and jump in. So one of the first things we realized is that it helps to take a step back and actually apply some perspective because this is, as I mentioned earlier, a generational shift in technology and in computing. So we want to recognize that and understand that how we are doing our jobs today. we are going to be doing the same job, what we do is not changing, but how we do it is going to change. So the perfect analogy for this is moving from a house where you have to mow your lawn and feed it and fertilize it and take care of all those things and maintain all of that. To moving to a luxury apartment building with a great view of the ocean or the city or whatever you prefer, and that you are in a shared building. And that you are actually, you are still going to have plumbing problems, you always will, that is just natural. You are still going to have electrical things, but you need to know, do I call my plumber when there is a problem here or do I need to call my landlord and make them fix it? So you need to understand that sort of shared responsibility model of what do I have to do and what do I not have to do? there is a lot of things that actually get done for you in the Cloud that you no longer have to do. A displaced forensics is one of those things where the data sources are actually moving. And so there is a number of places where that happen. But recognizing that how you do your job is different than what you are doing for your job. What is it that you are providing to your boss and to the organization in terms of value, and then taking a look, what is that what, and how do I apply it to this new world of the Cloud? And so it was very important to take a look at it through that lens and recognize what you are doing is important. It just has to be done differently as you move to the Cloud, especially as you are doing a hybrid over cloud and on premises. So starting with people. First thing to remember is that it is, as I mentioned earlier, really a system of people because people are the ones making the decisions, they are the ones implementing the technology. If you want to go into it, people are also the ones that actually made the microchips and typed in every line of programming. And even if you do have a program that writes other programs, that one was originally written by human. So we have got to remember that it is a people-centric discipline, even though we work with technology every day. The way to think about what people need, quite frankly is education and context, as they move to The Cloud is what we found. So think about it like you have a special operations team, in the military context here, and these may be some of the brightest men and women they are really good at their job, but if you drop them into a situation where they don't have any intelligence, they don't understand what is going on, who the bad guys are, who the good guys are, who they are trying to protect. they are probably going to do a better job than any random other person, because they are training from the past, but they are not going to be doing it at their best. And so the things that you need to provide your really talented team that you have is they need education on the overall journey, the context, how things are changing, things like what are the important cultural elements as you move to The Cloud, because we have built so many cultural assumptions around how on-premise technology works. We have got to look at those threats, the threats themselves are changing. What are the things and the kinds of attacks that work and don't work? Shared responsibility, how does that shared responsibility work that I was discussing earlier? What is it that the Cloud provider's job to do? What is it that it is my job to do? And what can I expect from them? What phone numbers will I have to call? What do I have to do to work successfully with them? And we invested quite a bit at Microsoft to provide training around all of that as part of our online documentation. So we will be sending you links to each of these best practices and where to get that. So that is one of the big areas that we focused on because we know it is something our customers need. Now, the second piece is, okay, great, I have got the big picture, I have got the context. I know what is changing at a high level, but I need to do my job. I need to know where the logs are. I need to know where the storage is. I need to know how to do this. I need to know what tools I am going to be looking at. How do I set permission? Where is the firewalls. So we know that organizations, excuse me, people and professionals need that specific training on it as well. And so we have got quite a few resources on that, that we have collected together at Microsoft to make it as easy as possible for folks to learn exactly how The Cloud works and exactly how to do very specific tasks. So best practice to is really around educating on that cloud technology, how it works, and we have got all that published. So you can find that very quickly as you are ramping yourself up or having your team ramp up. Moving onto process, so the first thing that we have noticed in the process space is that nobody owns the decision, nobody's accountable for making a decision, the decision is not going to get made. And then the project to go to The Cloud, is not going to go forward, the businesses is not going to realize value, the IT teams are not going to be seen as successful. And the security teams, are not going to be able to secure it because nobody knows who is making in this case, the security decisions are going to be The Cloud. So that is one of the first things we found is it is so critical to figure out who is making what kinds of security decisions. So we publish very clear guidance on the, I think it is five or six categories of exactly which decisions need to be made, which types of decisions and which teams that we find within the customer typically are the ones that actually make these decisions. Because we found that helps clear obstacles and make the project not only go faster, but be a lot more secure because you don't end up having the project getting frustrated that security is not moving forward and then just bypassing them. So it is very important to get those security decision- - making assignments made as quickly as possible. Next one is really around incident response. You don't want to have to plan for a crisis during a crisis. So we found security incidents happen. We have a principle of assumed wage and compromise because it happens. Attackers are constantly doing their thing. It is fairly cheap, there is really good return on investment for the attackers. So they will be constantly attacking. As you move to The Cloud, the attackers will continue attacking you there. So it is important that you have that preparation. Some of which has the education we mentioned earlier, but some of which is updating the processes. So if we get this kind of attack, how do I do host based investigation? What is the process for this, who is responsible for it? Who is going to do these pieces, what kind of training do they need and what tools do they need, etc. And so we found that updating your incident response processes really helps as you move to The Cloud. It is very important to focus on that as early as you can. Last one, posture management. So in the process space, there is something new in The Cloud that has not been possible before, security industries talked for a long time about continuous monitoring. We want to have a continuous view of where our security posture is and what kind of attacks are happening so we can make real time decisions. Well, when it comes to cloud and guess what? You got your wish. And so the challenge that we see organizations face is they are not quite sure who is responsible for fixing this with this real time data that is coming in, who is responsible for monitoring it. So Microsoft based on our interactions with different customers and others, we have put together a set of recommendations on using Secure Score, who is the one that is monitoring the Secure Score and the other security posture pieces, who is making sure that they are holding everyone else accountable to remediate it. And then who is actually fixing it, who are the ones that are responsible? Hey, we found that SQL needs this configuration change. We found that there needs a patch that needs to be applied to these Vms, who is going to actually do that, who is going to apply it. And simple theme is as close to the resource owners we can get. So those decisions should be made by the same people that are accountable for the risk of that not being available. So the people that own those resources, the application owners, or say the storage and database owners really depends on your model, how much you are doing dev ops and how much you are doing kind of specialization, but ultimately whoever owns the resources should be responsible for also securing them and actually honestly held accountable for it. And then you have another group, usually a governance style group that should be doing the monitoring to make sure that we are moving forward in our security posture and not moving backwards. This is particularly important in The Cloud because of how fast things change. Not only are new features coming out all the time, but resources are being created and modified and removed all the time by these teams that are doing it because they need to keep up and they need to keep their organization agile. And so with all this change, it is super important to have very good clarity on who is monitoring and then who is remediating all these. And we built in a lot of automation in Azure Security Center and Secure Score and other capabilities to make this as easy as possible. And now we get to technology. So technology, the first one and this is extremely important is passwordless or MFA. In most cases, you have to use some form of multifactor authentication as a stepping stone to passwordless because passwordless is something that is possible, but it is not perfectly applicable and universally easy for every single scenario. I personally have not used my own password in a very long time, usually two to three months, sometimes six or eight months between actual uses of the password. And frequently it is when I get a new computer, because I use the Windows Hello biometrics, easy to log in, it looks at my face, allows me in and is much stronger than my password ever was or ever will be. So passwordless is very possible in a number of scenarios, but it is not 100% applicable in all cases, but at a minimum multifactor authentication especially for admins, but really for all users start with the admins role to ever users. Very, very important here. The great thing is, is that it is actually easier than remembering and typing a password. So very, very strongly recommend that, super important. So the next one, number seven, native network security and firewall, we have learned that organizations are looking for more simplicity. Sometimes simplicity comes in the form of using, Hey, I have an existing familiar capability, a checkpoint, a Palo Alto or some other next gen firewall. Great, so we have got that it is in the marketplace and we can do that. we are also seeing organizations demand a different kind of simplicity that they actually want to have firewalls a service. I want something simple. I want something easy. I just want something built in where I just click, click and I am done. I don't want to have to set up load balancers and virtual appliances. So we offer that choice. And in Azure, and we focused on building more and more capabilities into Azure Firewall, which is our native firewall as a service, and allows you to do things. So I will be showing that in the demo, just a few minutes, that a native network security and firewall, in addition, it is more than just firewall there is network security groups, web application firewalls. There is quite a few different capabilities in there, but we found that organizations increasingly want more and more built into the platform, so that is all manageable in one way. And it is as simple as possible because we have learned that complexity quite frankly, is often the enemy of security, because if no one can understand it, then it really ends up getting in people's ways, or it is not as secure as we think it is because nobody quite frankly understands it. Similarly, we are seeing some of the same things in the native threat detection, and now the native threat detection is also important for an additional reason other than just it is built into the platform. We found that it is very difficult as all these new types of capabilities, IOT devices, and some of the older ones, the OT devices as well, Kubernetes and containers, and all these different kinds of new objects are really challenging for vendors to keep up with because The Cloud moves so fast. And so increasingly we see organizations demanding, I just want threat detection built into Azure. I want it easy, I want to be able to click a box and I want the storage accounts to just send those alerts right on up. I want the SQL to send the alerts right on up, I just want them all in one console, and I want to instrument all of the different stuff, all the different assets that I have into that one place. And so Microsoft is investing very aggressively into native threat detection, so not only do we have the, Azure Sentinel, which is a SIEM to pull all these sources together, and we also have Azure Defender and all of the different resources that are either in Azure or connecting to Azure, have that first party threat detection capability in there, so you can get a high quality alert that you don't have to waste time trying to write a similar one. You have detection, and you also have the response capabilities to help with investigation so that you can make it easier as the analysts are dealing with, a live investigation to make it as easy as possible for them to get the data they need and query it and dig deeper. So let us go ahead and move on and actually say, take a look at how some of these native controls work. This demo, I am going to give a quick overview, and then I am going to actually do the demo. we are going to show some of the native threat detection capabilities, as I just mentioned, and what those alerts look like and where they come from. And then we are also going to take a look through native security and governance capabilities. So Azure Security Center, Secure Score, and those capabilities for that big picture view from a risk perspective, not just the threat perspective, sort of what could happen as opposed to what is happening. Then we are going to take a quick look at the firewall and how that is configured as well as Firewall Manager, the web application firewalls show you a sense of what that looks like, SQL protection and a few other security features just to get a sense of where this native security is, and where you can find it and a little bit about how to configure it. All right, so we have got our demo up now, and we are going to take a very quick tour through a lot of these security features and capabilities that are built into the Azure platform, these native capabilities, just to give you kind of a sense of where they are and where to look, we are going to be going through quite a few. So, not going to go through all of them in a lot of depth, but just want to give a quick sense of what is there so that you are familiar with where to look for those in the platform. So we are starting here in Azure Security Center, it is a fairly easy place to find. Actually, if you are on the home screen of Azure, there is that little green shield icon there to find that. And so as of Ignite, we now have two different names for what used to be known as Azure Security Center, the first is still Azure Security Center for sort of the Secure Score, hygiene compliance and those capabilities but all of the things that formerly were known as Azure Security Center Standard are now known as Azure Defender, and that is part of what we are calling our XDR strategy started with EDR, Endpoint Detection Response, it is now X for any detection response. And so tools that are specialized to a platform to provide those threat detection, threat response, and unrelated features, and so Azure Defender is right there up front and Security Center still, which is where it originated. And so we are going to take a look first at the Azure Secure Score elements of it. For those of you that are not familiar, this capability is really designed to help you plan and figure out what to do. The Top 10 are a great way to get started, but you are going to want detailed guidance and detailed actionability of specifically what to address. And so that is where Secure Score comes in and gives you a nice rating and ranking of how you are doing versus your peers, et cetera. So we can go ahead and click into Secure Score here, see what the score is in this particular environment, and then if you have multiple subscriptions, you'll be able to see all those there. you'll also be able to see which subscriptions you don't have visibility into so that you can go and work with those subscription owners to get those. And this covers a whole lot of things you can see which ones give you the most points, and the remediating vulnerabilities. No surprise here, you'll see that multifactor authentication is one of the higher ones, I am sorry, that is actually its own one. That is individually one of the highest ones in this case this one is good, that is the largest amount of points typically there. And then in this case, this particular demo tenant here has a number of different things, and you'll notice that some of these have a quick fix button to them. So the ones that we could automate remember we are trying to simplify and automate folks jobs, there is a quick fix button. This is typically done by the people that are responsible for the resources to remediate them, as opposed to the governance function, that is kind of looking at the all up report, but we did want to make it as easy as possible for folks so that they could fix these issues as fast as possible and lower your attack, surface and vulnerability. So now let us go back to the main screen here, and you'll notice that there is also a lot of compliance capabilities so we know a lot of organizations have to meet regulatory requirements, and so we have built in the ability and mapped in all of these similar types of controls to all these different compliance regimes or compliance requirements, and it details out there is some things you can detect technically, there is some things you can't. And so all the ones that we can detect, we do mark there, whether it is being met, the nice green check box there and whether they are not. And then the ones that are grayed out are the ones that are actually are not able to be measured either at this time or at all with the platform. And so quite a bit of coverage here as your CIS PCI DSS, we have our own Azure Security Benchmark, which just got updated, HIPAA high trust and the like. So we do take customer feedback on which ones to address first and focus on. And then let us go back to the Security Center Hub for a moment and take a look through the Secure Score itself. I am sorry, not the Secure Score itself, I got confused, we can take a look at the different recommendations that are being made here. And if we look for Linux, you'll notice that there is a whole lot of recommendations here specific to Linux, you look for Kubernetes, because say that is your responsibility, is that you have to handle the container security and the orchestration security you can search for those and find those same thing is true of SQL and IOT and a bunch of other technologies. So it is a pretty quick way for someone that is only responsible for those to focus on what they can do to improve the organization Secure Score. So let us switch over to Azure Defender now to give you a quick sense of that, and so we can take a look here and get a nice summary of how well we are doing from a coverage perspective, do we have a good coverage? Then notice here in this inventory piece, we can also notice where we have healthy and unhealthy agents, so we have visibility. Again, building on this software defined data center because everything is software defined, it is all instrumented, and we have good visibility into it to say, hey, we are not going to be surprised that we lost or more often found some old Windows 2003 or Solaris box or something like that in a physical data center, because everything in here is an object, it is managed, it is defined. So it is fairly easy and straightforward to pick that up, so if you look in the Azure Defender piece, you'll notice again, that coverage across, Kubernetes app services, key vaults, SQL, you name it IOT, and also with our new acquisition, very soon you'll see legacy operational technology. So SCADA ICS types of devices, from the 1990s, 1980s, and sometimes before. So we have got coverage for that coming in here as well. So the Azure Defender for IOT will actually include not just the modern IOT, but the old stuff. And so you can see where you are going on there. What are the top threats on the attacks that are happening? The alerts that are affecting the most resources. So lots and lots of insights here, don't have time to go into all of those, but all of the things you are familiar with, if you are using Azure Security Center Standard are here and the effective app control just-in-time access to the AMS for the management ports and whatnot. So lots to explore there, lots to learn. So the next thing we are going to do is we are going to switch out of Azure Security Center Azure Defender and into Azure Firewall to have a quick sense of that. So we can take a look at the Azure Firewall here. We do have a test firewalls, so we are going to take a look at that. And the nice thing about this is because it is viral as a service, you don't have a lot of load balancing and similar kind of configuration setups and routing to do, you simply just connect that firewall to a particular virtual network, and then, what is the public IP, if any that this is associated with and then you are off to the races and then it is essentially acting as a firewall. there is obviously the activity log, there is the access control to who can manage this particular firewall there is tags, so you can keep track of them, if you have different firewalls for different business purposes or different layers or tiers within your environment. I am working on some DNS elements there. And then you notice that there is a threat intelligence tab and so within the threat intelligence piece, we have eight trillion signals a day coming into Microsoft and so we have a lot of rich context on what is going out on the internet in terms of which identities are bad, which IP is bad, or which DNS is bad. Now firewall only can really apply a bad DNS address or a bad IP address that are known to be malicious. And so you can actually just simply turn the alerts or the alert and deny on, and that is really all you have to do to take that huge amount of threat intelligence has been essentially processed down for you there. Go into Firewall Manager. And so there is an interesting, most folks are familiar with VNS or virtual networks that are a collection of subnets effectively, where it can be broken down into subnets. We can look at it either way. A Firewall Manager really takes advantage and is kind of a reflection of the maturing of how we have gone from those V nets up, because the V nets are just basic virtual network. And then we realized as people peer to peer connect to that with V net pairing, it got complicated, it got difficult to kind of track and understand and set a enterprise policy on. And so we created this Azure virtual Lan concept, and then that allowed us to do a hierarchy. And then when we wanted to add firewalls in there, Microsoft also do support third party department firewalls as well. Then we created this concept called a Virtual Hubs, which allow us to assemble essentially make it very easy to manage the connections and the routing between those as well as the routing through the firewalls, either the Azure builtin firewall in a number of actually partner firewalls as well. So that is really what the Security Virtual Hubs does. And of course, as Firewall Manager implies, we can also do the firewall policies and manage those centrally and set up those Azure firewall policies and configure them. Firewalls are great for sort of unsolicited traffic. But we also want to make sure that we are addressing the WAF scenario, which is terrific that is targeted your application and intended to be malicious to try and exploit that application. And so we have a web application firewalls built in as well. And so we will go ahead and create a policy here to give you a quick sense of what that looks like. And we will just say in this case application gateway, it does link to the front door or the application gateway or the CDN, Content Delivery Network. So you have those options there where you are going to put the WAF and then let us pick a resource group demo is just fine, because we are not going to actually create this. And then we will just call this test WAF. And the policy settings themselves, you can put some exceptions in there, et cetera. And then prevention or detection, of course manage rules. (mumbles) support those custom rules. If you do have learnings on your specific app that you want to have or you want to tailor over time, as opposed to these and it quite a few builtin rules for all the different on this case best practices and the specific rules that support those. So quite a bit of capability there in the application firewall. And then in all of the different Azure services, there are varying different types of security capabilities. we are going to take a look at SQL today, but there is quite a bit in storage as well. So if you take a look at the SQL databases, we will just go ahead and jump into one of these here. And you'll see here that you have, as you look at this database, quite a bit of security context and information, the SQL team has done a great job of pulling through, how are you doing on your transparent data encryption your Azure defender for SQL your auditing and really kind of pulling some of those things, this is the SQL interface. This is not the SQL security interface. This is SQL interface. So they have done a great job of exposing security very naturally through there. And so this one is a great example of kind of how we do stuff. And there is a couple other features that I want to cover very quickly. Some of these services, all of them offer and support what is known as Private Link allows you, I am sorry, not all services, but all of them will do this. we are going through every single service and making sure they all support what is called Private Link. And so when you do that, you can set up a private endpoint on each of these different services, instead of having your instance of SQL, your instance of functions, your instance of Kubernetes or whatever it is exposed through the public networks and the public internet really the Azure networks, we actually are putting the option that all of them will be able to project onto a private network. And so instead of being exposed through a public IP address, it will only be exposed through your internal, private IPS, and then you would publish through the normal sort of WAF application gateway pieces. And so that is coming for nearly all the services we are making really solid progress on getting the three, 400, I can't remember the number Azure services set up for that, but a few of them also, including SQL additionally, have the ability to set specific network filtering rules often called a server firewall or a firewall settings for that specific service. So you'll see that in there as well. And so you can then go ahead and block and allow addresses in there. So that is another one of the capabilities that is there. And the other thing, and this is the reason I picked SQL to show the demo on as opposed to storage or the others. Is there something else going on, so somebody who you may have heard of Microsoft information protection, which is our vision for really having a single set of policies that you can do classifying labeling protection of all types of data, structured, unstructured, you name it. And so we have gotten very, very strong capabilities in the unstructured the document space, and we are starting to see those features and we are investing here in continuing to invest in the structured space so in SQL we do have data classification as well. And so let us take a look here in the data discovering classification. we are not at the point where we can based on the classification labeling actually protect the different cells and rows, et cetera differently, but we are on that journey and we are moving in that direction. And so you'll see here using very similar identical policies, actually as your Azure information protection for documents, you can set those same sets of policies and labels up in SQL. And so we can label those and then make sure that we then set up the appropriate, transparent data encryption or other types of protections within SQL, there is a lot to SQL. I don't have time to cover them all, but wanted to give you a sense of that, because this is a sign of things to come. we are investing very heavily because we want customers to have this single set of things, and then it just, you can apply it to any types of data. So with that, we have covered quite a few of the different technologies. And so now we will get back and close out on the best practices. Now that we have gone through the demo, we are going to talk a little bit about longterm. So we are going to talk about, the way I like to think about this, and this is the reason why we have kind of the bricks and mortar kind of concrete icon there, is if you pour the foundations wrong, when you are building a house or a building it is really, really hard to change later. And there is a couple of decisions as you build your architecture and Azure and any other cloud that if you get them wrong, you pretty much have to break the concrete and spend a lot of time and effort kind of changing those foundational underpinnings. So we really want to get those foundations right the first time because it is no fun to try and fix them later. Those are ugly projects. So number nine here, single directory and identity. We know that enterprise organizations have a lot of different directories in many cases or different identity management systems. It is a very common configuration, especially among medium and larger size enterprises for The Cloud and going forward, we strongly recommend you want to get to a single directory in a single identity for each user, for each person. there is one minor exception to that, which is admins. Administrators with high privilege access should not be using their day to day use account for doing administrative tasks. Those two should be separated because there is a security risk of merging those two. But for every other user in the organization, including the admins day to day account, you want to have a single directory, so there is an account in one place. And Azure Director Directory and Active Directory, essentially act as one directory at this point in time, that is evolved quite a bit over the years. And so you want to have that single directory and you want to have a single identity because when you look at this from everybody's perspective, the end user trying to remember different passwords, different accounts, different usernames, very painful. You look at the admins that have to administer different directories and slightly similar things. And all the connections you have to have between them, it gets very complicated quickly. And then you look at the SOC analyst and the people that are supporting the SIEM and the other analytical pieces to correlate all of the security stuff happening. When you have multiple identities, you have to integrate even more systems into this and then figure out how to correlate between, well that happened on this LDAP directory, but this was on the enterprise one. And this is our customer database. And are these the same actual John Smith? It gets really complicated, really fast. So we have learned at least from the now going forward, make sure you are standardizing on a single directory. So pick one enterprise active directory tenant, and that is the enterprise going forward for most organizations, this is the active directory tenant. When you went to Azure, excuse me, when you went to Office 365, because it is the same active directory that is underpins office 365 as all of the other Azure services. And again, like I said, we have really extended active directory on prem to a Azure Active Directory and made it as if it is one single system where you make a modification one side and it will sink in either way, depending on your configuration. So we want you to have that single directory, single identity. It makes everybody's life easier and security, and IT all your end users. It is a victory in all corners. So get this foundational decision, don't be trying to layer on virtual directories and extra things just use one if you can. Number 10 identity access, instead of keys, we have learned you can't be 100% perfect on this. You can't always use an Azure ID account instead of a key, like a shared access signature or an access key because The Cloud initially the first early versions of it, both Amazon, ourselves, GCP and whatnot, The Cloud started doing authentication heavily using keys instead of identities. And for those of you that have not done key management is painful for those of you that are doing key management, I am sorry, it is painful. Key management is not fun. Now you can't be 100% off of key management, there is always a case where you may need to do that. there is always particular applications, legacy architectures certain ways things have been done where you actually have to do keys, but where there is a choice and Microsoft is pushing very heavily on our internal engineering teams to make sure that every single Azure service will be able to use Azure ID for authentication. Again, back to that single directory, single identity, and nine in all those cases, in all of the Azure services, we will support Azure Active Directory. That is a path we are on and we were working very hard to make that 100% across every service. We recognize that there are still gaps now, we recognize there are certain applications that require using and managing a key. We get that, but in every place that you have a choice of using in a managed identity, use it instead of a key. I like to think of key management as being similar to handling raw nuclear material. It is possible, but it is not fun and it is not safe. It is really easy to make a mistake. You want to have something that is packaged up nicely. And that has its lifecycle management, which is what identity does. Identities are very much key based under the hood, but you manage them in a nice directory. They have got a lifecycle, They have got a password reset process. They have got all these different things to make managing it easier. So avoid keys everywhere you can, because you don't want to be educating developers on how to handle a key well, you would rather just say, use this identity and let their identity admins deal with it. Much, much better process, so everywhere you can avoid using keys, use identities. And the last, this is kind of the special bonus. there is actually 11 best practices. Sorry, couldn't contain ourselves, couldn't help it. So 11 yes, 11 of 10, little special bonus, no extra charge. So single strategy. So I am going to start with a story on this one. If you go and you go to any sort of enterprise organization, you ask the networking team, tell me about your enterprise segmentation strategy, they are going to tell you about IP addresses and ranges and siters and all sorts of things. And is it a slash 24, slash whatever and go through all that kind of stuff. And it is going to be very much based on sites and physical networks and whatnot. Then you go to the identity team and they are going to talk to you about, OU structures and many cases and groups and how those things are set up. And then you go to the application team and you ask them the same question, then you say, we don't really use those much. We kind of do, but not really. And by the way, the application teams are the ones that actually talked to the business into to the business stakeholders. And so you end up with what I like to call misaligned cheeseburger, where you have all these different teams that are trying to do roughly the same thing, but they are not talking to each other and they are not sharing, they are not aligning, they are not actually coordinating well. And so you ended up with a situation where the defenders are really at a disadvantage and the attackers have all sorts of extra opportunities because of this lack of coordination between the teams. And of course, there is also all sorts of organizational friction. And so even though, and I use this example of an enterprise segmentation strategy, but there is so many more decisions. Whereas if your teams are not working together, they are not coordinating and you don't have the networking folks and the identity folks and the application team and the productivity team, all working together to figure this out, that you are going to have these challenges and you are going to have a lot of friction, you are going to have a lot of gaps. And we have learned as we work with our customers and we do architecture design sessions and have these conversations. If we don't have everyone in the same room, as we are making these strategic decisions, we are going to keep repeating that meeting over and over again. Oh, we did not have the networking team in the room and we did not have these guys and we did not have the identity team in the room. Well, then you are going to have the same set of meetings all over again until you have everyone there, because everybody has to understand this new world. They all have to make decisions together because the silos that we built over the past 20 plus years in Enterprise IT on premises, are not necessarily the way things should be divided up as you move to The Cloud, there is some subtle differences. And so everybody has to realign and reorient around this new world and figuring out, okay, what does your team do? What does my team do? What does this team do? What does that team do? Understand who makes the decisions and move forward. So it is very important to build a single strategy together as an entire organization, and really it is time to start connecting those silos and working forward. So some of you may have seen some of my sessions before, and you may be thinking to yourself, wait a second. This is the Mark Simos talk. And all the slides have been very simple and clean. there is been no really big, complicated diagrams. Is that really Mark Simos? Well, for those of you that are looking forward to that, we do have a special treat for you. There is a big complicated slide that brings a lot of concepts together. So this is really targeted at sort of those security professionals, IT professionals among you that are trying to pull all this together. So these best practices are great, but tell me how all this really works. Give me the specific features and technology names and how do these things connect with the arrows. And so what we did was we put together this diagram that really describes how this native security for Azure works. Keep in mind, we love our partners. We love the existing capabilities our customers have. We want them to be successful with it. This is representing the Microsoft capabilities because quite frankly, we ran out of room to include everybody. And there is a lot of partner integrations here that is not necessarily depicted, but we wanted to show all of these native capabilities and how they come together. So that middle black bar there is really showing sort of the end to end lifecycle of Azure and all things related to Azure and the security of it. We have learned that teams need two things to be successful in security. And the first is visibility, the second is control, and you have visibility into both the risk factors and governance things, and the overall, how are we doing? And are we vulnerable? As well as the threat detection, which is high quality alerts, as well as the raw data and logs and signal, to be able to do something with that, the control side has that same governance need. You need to be able to sort of set up policy and guide developer teams and IT teams and whatnot, but we also need preventive controls to block the attack. So if we can block an attack, it is a lot cheaper, it is a lot more effective. You can't always block an attack often you have to detect it because the things that an attacker can do are so broad, you can't block everything. You could notpossibly block everything. So you have this flow. And the first thing everybody asks us in the security team is where are the logs? I want logs, give me logs. Of course, we provide the logs, all the Azure services through Azure monitor and whatnot, we provide all those different logs. And we have learned that there is something that organizations and security people are not used to asking for. And this kind of goes into what I was discussing at the beginning, which is alerts. We want organizations need, but are not used to asking for high quality alerts. I want a high quality alert on my IOT and my legacy OT, my legacy operational technology. I want high quality alerts on my containers, on my SQL, on my storage accounts, for my VMs. I don't want to have to write a SIEM role. Everybody's used to writing a similar a SIEM query and do their static analysis. Everybody's used to that, they are not used to getting high quality alerts that are ready to go, I can investigate this. I need to investigate it now, they are used to just getting raw data. And so we focus very much on providing not only that raw data, but also those high quality alerts. One of the things we have learned is that protecting Azure is not just about protecting the stuff that is literally on Azure. If you lose control over the account, that is an administrator of Azure or the workstation where that account logs in that is an administrator of Azure. You also lose control over your Azure tenant and the resources in it because the attacker can impersonate those accounts either by taking over it from the machine or just taking over the account directly, password theft and whatnot. So we have learned it is important to have that full end to end view. Now this is not Azure presentation, so we are not going to go over it too much depth. But when you look at the whole picture, Microsoft has also put a lot of investment into that front end. So taking those same high quality alerts on the end points and the identities, et cetera, feeding those into the preventive controls and into the endpoint management. So you can make better decisions and you can make real time access decisions through conditional access and all these other kinds of pieces, essentially providing that zero trust access control there, and that kind of T-shaped box, the upside down T so that is very much part of Azure Security as well, but we are going to spend more time focusing on the right today. So when most people think about how do I protect stuff, they think in the paradigm of what we were able to do in the on premise world, and we call that data plane security, and this is very much focused on pro application and pro workload controls and protections. So this includes things like firewalls, even though we are quote unquote, "protecting the network with the firewall," we are actually protecting the workloads that are on our network, or that are in our environment. It is things like encryption and using key vault to manage those keys for the ones that you do have to have. It is about following DevSecOps and securing your code. It is about just application security in general. It is about securing the API access, securing the network, so that you are securing assets against a network based attacks, DDoS protections. What about firewall to protect the applications? So all of these are really about protecting the application either in aggregate as a whole at that network edge or on the specific applications themselves. So this is kind of the classic security piece. Microsoft has invested quite a bit to make sure all of those things are there in a cloud native format so that you can use them to secure it. The thing that is new and interesting and different about The Cloud is we are no longer sitting inside of a dumb building. we are not in a building where you badge in, and that is how you get access to, putting a server into a 19 and track or blades or VMs or whatever else you have in your physical data center. We actually have a software defined data center because it is software defined, it can be intelligent. And so Microsoft, we took advantage of this fact, so everything that is created in Azure or update or destroyed all the resources in it, go through the Azure Resource Manager or ARM as we like to call it. And so, because it is software defined, we can intercept all of those requests. All of those changes, all those creations, all those deletions. And we can apply policy where you can set up and say, if this thing happens, you always add a firewall. If this does not have a firewall, you block it from being created or whatever the case may be. there is a lot of different scenarios in this, but you have policy control that is built into the data center itself. That is what we call Management Plane Security in that darker green box. And so plenty to read up on and research there, but we invested a lot into that to take advantage of that and really have an intelligent software defined data center, not just a simple dumb platform. We wanted to have something that was actually taking advantage of the data streams that we have, the intercept we have to apply policy and really help make the platform a lot more secure, very top there on the right Azure cloud Adoption Framework, I mentioned earlier really about going to The Cloud securely or investing more and more and putting more and more security guidance in there. there is quite a bit already on security roles, responsibilities, and whatnot and strategies and then we are continuing to develop that as well. And then in the middle there, the Azure Security Benchmarks in that gray box is like I mentioned before, those prescriptive best practices and the controls and lots of investment there so that throughout all of this, you have those best practices that you can use to apply, when to apply these and how to fit in your existing third party capabilities, and what do you do to configure it so that you are not vulnerable to those attacks. So as we wrap up here and in case it was not clear before, we want you to follow these best practices. We want you to go to that Azure Security, Top 10 linked on the top right. We have also provided convenient links to each specific one, so you can dig into that and we have provided a lot more detail on exactly what we mean and the resources available, the videos, the documentation, feature capabilities, you name it. So all of that is link in each of these to make it as easy as possible for you to follow these best practices. So please continue to read up on the Azure Security Top 10. Starting with the people side, cloud security journey, people need to know the context of the journey they are on. Technical training, they need to understand the specific components they are going to be responsible for. People in IT are really good at learning technology as they go. The cloud is a lot to learn quickly. So keep that in mind, as much as you can provide them training documentation guidance, the better we have provided a number of resources there, but as much as possible, provide people as much training, because it gets very difficult to learn hundreds of things at once or tens of things at once. One or two things at once, not so hard, but when you get a lot, it is overwhelming. Assign accountability, make sure that, you know who is making security decisions, make sure you are updating your incident response process. Posture management, you have the data, you have the dashboards, you have the information. It is all part of the free part of Azure Security center, use it, take advantage of it. Passwordless and MFA, I think the statistic, if I recall correctly is 99.9% of identity attacks, identity attacks on all attacks would have been blocked with MFA. The attackers don't even have to try. They don't even have to invest to get around MFA. So get your admins on MFA, make them work for it, make them earn it. Native Network Security and Firewall, take a look at the stuff that is built into the system and see if it is got what you need or see if you are going to bring your existing firewall capabilities with you, very important there. Native Threat Detection, take a look at the stuff we have in the platform. there is an amazing set of threat detection capabilities. Some of which we took a look at today to help make your life easier. So you don't have to pull a bunch of logs in the SIEM and then try and figure something out. So great capability is there. Foundational decisions, single directory, single identity make life simple. Separate accounts for admins, but for all of the things, single directory, single identity. Identity Access Controls, use them instead of keys, avoid key management if you can, if you have to use Azure Key Vault or something similar, but avoid keys, if you can. And lastly, get everybody on the same page. Single strategy, get the teams working together. Use the enterprise segmentation strategy as a way to get everyone on the same page. Use the move to Azure and the need to make these decisions up front. That is the way to get all the teams in the same room. you'll be amazed at how many connections happen, how many good conversations happen and how many good things start off as people start working together instead of working in their individual silos. And with that, I thank you very much for watching. Stay safe out there, thank you.
Info
Channel: Microsoft Security
Views: 17,812
Rating: undefined out of 5
Keywords: Microsoft Security, intelligent security, data privacy, cyber security, security essentials, cloud security, business security, device security, security software, microsoft, security, microsoft azure, azure security center, azure security, azure information protection, azure network security group, azure ad identity protection, microsoft azure security, identity protection azure, azure compliance, azure identity management, azure identity, microsoft security
Id: g0hgtxBDZVE
Channel Id: undefined
Length: 61min 26sec (3686 seconds)
Published: Tue Sep 22 2020
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.