cloud security

20
Cloud Security What’s so Funny About PaaS Love & Understanding?

Upload: francois-boucher

Post on 12-Apr-2017

71 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cloud security

Cloud SecurityWhat’s so Funny About PaaS Love & Understanding?

Page 2: Cloud security

About Us

[email protected]/in/ismail-jaghmani-58a3858

Frank BoucherCloud Solution Architect Microsoft Azure MVP P-Seller Technical Solution Professional

Ismail JaghmaniSr. Cloud Developer

[email protected]/in/fboucherosfrankysnotes.com

Page 3: Cloud security

Agenda

l Quick Context of Security in the cloudl General Best Practicesl Networking Servicesl Security and Identity Servicesl Management Tools

Page 4: Cloud security

SECURITY IS A HOT TOPIC

Page 5: Cloud security

Security is Shared Responsibility

Cloud ProviderCustomer

Application & Data

Identity & Access Management

Operating System, Network & firewall configuration

Compute Storage Databases

Availability

Zones Regions

Services

Cloud Infrastructure

Page 6: Cloud security

Application and Data Security Best Practices

l Enforce multi-factor authentication

l Use role based access control

l Use hardware security modules

l Manage with Secure Workstations

l Enable data encryption

Page 7: Cloud security

Network Services

AWS

Virtual Private Cloud (VPC)

Azure

Virtual Network

Description

-Network isolation. -Defined rules to satisfy your security needs.-Filter and inspect the outbound and inbound traffic.

ExpressRouteDirect ConnectEstablishes a dedicated, private

network connection from a location to the cloud.

Frank Boucher
I think it could be cool to have them on the sides of every slides... It look more like an AWS vs. Azure
Page 8: Cloud security

Identity Management

AWS

Identity & Access Management

Azure AD/Role-based access control

AzureDescription

Provides fine-grained access to resources in could.

Multi-Factor AuthenticationMulti-Factor

AuthenticationMore than one method of

authentication.

Page 9: Cloud security

Azure Active Directory

Page 10: Cloud security

AWS IAM

Page 11: Cloud security

Tools and Data protection

AWS

Encryption Encryption

DescriptionClient Side Encryption

Data in transit encryptionStorage encryption

VM encryption

Key VaultKey management

servicesCloudHSM

Creates, controls, and protects encryption keys. HSM provides hardware-based key storage.

Inspector Security CenterAutomatically assess Network,

VMs, OS and applications configuration for

vulnerabilities or deviations from best practices.

Azure

Page 12: Cloud security

Azure Security Center

Page 13: Cloud security

AWS Inspector

Page 14: Cloud security

Tools and Data protection

AWS

CloudTrail CloudWatch

Description

Collect, track, store, analyze, and deliver metrics and log files.

Trusted Advisor

Provides analysis of cloud resource configuration and

security in compliance with the best practices.

Availability, Performance, Security and cost.

Azure

Log Analytics

Advisor

Page 15: Cloud security

Log Analytics

Page 16: Cloud security

CloudWatch

Page 17: Cloud security

AWS Advisor

Page 18: Cloud security

Azure Advisor

Page 19: Cloud security

References

● Common Vulnerabilities and Exposures https://cve.mitre.org/index.html

● Center for Internet Security (CIS) Benchmarkshttps://benchmarks.cisecurity.org

● Azure security best practices and patterns https://docs.microsoft.com/en-us/azure/security/security-best-practices-and-patterns

● Microsoft Docshttps://docs.microsoft.com

Page 20: Cloud security