Subscribe Us

Header Ads

Friday 11 February 2022

Describe general security and network security features

 Describe general security and network security features

Azure General security:

When you ask anyone who is considering migrating to the cloud about their worries, the majority will cite security. But, exactly, what does "security" imply? Security has several facets, and it begins with ensuring that your resources are properly set for security. Even if you have done everything correctly, you may still be vulnerable to malicious actors. Employees acquire access to critical data and systems, posing a risk from inside. Employees that are malicious can compromise security, and there's also the possibility that a well-intentioned employee can accidentally create a security problem.

·         Azure Security Center:

Most businesses have someone whose job it is to learn best practises and guarantee that the business follows them. Because of the enormous number of services accessible in Azure, knowing those best practises might be difficult. This work is made considerably more difficult by the fact that Azure is always growing and evolving.

Fortunately, Azure Security Center can not only keep you up to date on best practises, but it can also guide you through the actions you need to do to maintain your resources set in a safe manner. Security Center can also assist you in maintaining the security of your on-premises resources.

·         Key Vault:

The majority of apps make use of confidential or sensitive data. An application that utilises a database, for example, has to know how to connect to the database, and this information is kept in a connection string. A username and password that secures the database may be contained in the connection string, and keeping that username and password in a plain text file would be an apparent security issue.

Secrets, keys, and certificates can be safely stored with Azure Key Vault. Once an item is saved in Key Vault, security policies may be applied to control which people and programs have access to it. Key Vault is protected with encryption keys, however neither the encryption keys nor the encrypted data are visible to Microsoft.

·         Azure Sentinel:

Many firms employ tested and proven frameworks to secure data and resources, such as SOAR (Security Orchestration, Automation, and Response) or SIEM (Security Information and Event Management) (Security Information and Event Management). In fact, several businesses employ SOAR and SIEM in tandem.

SOAR and SIEM implementation might be difficult. Many firms use security specialists to establish security measures in their operations. Microsoft wants SOAR and SIEM to be simple to set up, even for non-security professionals. Azure Sentinel is the product of their efforts.


·         Azure Dedicated Host:

When you build a virtual machine, it operates on a host computer, whether it's in Azure or elsewhere. The virtual machine is generated on the host computer, which is a physical computer with its own operating system. The VMs you create in Azure are devoted to you, but the host machine frequently contains VMs allocated to other customers running on it.

Many individuals benefit from a dedicated VM on a shared host machine, but if you work in an industry or for a firm that has compliancy criteria that can't be satisfied with a shared host computer, you may have some apps that you can't shift to the cloud. Fortunately, Azure Dedicated Host offers a solution.

When you utilise an Azure Dedicated Host to host your VMs, the actual host computer that hosts your VMs is only for your usage. On that host computer, no other customer VMs will run. Naturally, Azure Dedicated Host isn't the cheapest method to host VMs, but if your compliance needs demand absolute isolation of your VMs, the expense of a dedicated host machine is justified.

Azure Network security:

The network is yet another aspect of security. Securing the network necessitates a distinct set of tools and abilities. Businesses frequently hire experts to assist with network security, much as they do when planning data and resource security. However, with Azure, a substantial portion of network security is handled for you. Even so, you'll need to take certain precautions to protect yourself.

·         Defense in depth:

Take a trip back to mediaeval times and imagine what it was like to live in a castle for a minute. In many respects, these were not friendly times, and there was constantly a hostile army attempting to gain access to the citadel. Moats were erected around castles to keep invaders out. The moat's goal was to keep an opposing force from digging beneath the wall and obtaining access.

 

Archers along the castle's high wall would constitute a significant threat to attackers approaching the castle even before they reached the moat. If an enemy force managed to get past the archers and across the moat, they would be confronted by a high wall and a solid gate. They might be able to make it if they work hard enough.


·         Network Security Groups (NSGs):

 

You may use a Network Security Group (NSG) to filter traffic on your network and apply rules to it. An NSG has many Azure-provided built-in rules that enable your virtual network's resources to connect with one another. The NSG may then be customised to regulate traffic into and out of the network, as well as between network resources.

·         Azure Firewall:

A firewall, in computer terms, is an appliance that allows network traffic to flow into and out of a specific network. A firewall's job is to allow only desired traffic onto the network while rejecting any communication that might be harmful or originates from an unknown source. Using rules that describe a source and destination IP address range and port combination, a firewall enforces network control.

By default, all traffic is rejected in a conventional firewall arrangement. A rule must match the traffic in order for the firewall to enable it to get through. Create a firewall rule that enables communication to ports 80 and 443 if you want to allow someone on the public Internet to access a web application you have operating on a specific server (the ports for HTTP and HTTPS traffic). The rule is then set up to deliver that traffic to your web server.

The Azure Marketplace has a number of firewalls from third parties, but Microsoft also has its own firewall, Azure Firewall. Azure Firewall is a PaaS solution in Azure that's simple to use and has a 99.95% uptime guarantee. You don't have to worry about traffic surges creating delay or downtime for your apps since Azure Firewall adjusts according to your networking requirements.


·         Azure DDoS Protection:

Distributed denial of service (DDoS) attacks can affect cloud services that are accessible from the Internet through a public IP address. DDoS assaults can exhaust an application's resources and, in certain cases, render it entirely unusable until the attack is neutralised. DDoS assaults may also be used to exploit application security holes and target systems that the application connects to.

 

DDoS Protection is a feature of Azure that helps guard against DDoS attacks. Azure Virtual Networks has a function called DDoS Protection.

No comments:

Post a Comment

Adbox

About

authorHello, my name is Jack Sparrow. I'm a 50 year old self-employed Pirate from the Caribbean.
Learn More →



Categories

Labels