Friday 4 September 2020

AZ-500T00. Microsoft Azure Security Technologies

Microsoft Azure is a cloud platform on which you can deploy infrastructure solutions, databases, applications, services, and functions. It runs the well-known office cloud applications Office 365 and Microsoft 365. Here you can also store and process large amounts of data, use ready-made platform services in order to add additional functionality to custom applications. More than 260 services are running on Microsoft Azure . For convenience, they are divided into 22 areas, including DevOps, analytics, databases, security, blockchain, hybrid environments, artificial intelligence and machine learning, integration, IoT, mobile applications, multimedia, augmented reality, development tools and several others.

Microsoft pays great attention to information security issues. The company annually invests $ 1 billion in this area. More than 3,000 security professionals work here to ensure data protection and user privacy. Microsoft considers Azure to be the most secure cloud in the world and can show more certifications to prove the platform's security than any other similar system. We add that Microsoft Azure also complies with the requirements of the European General Data Protection Regulation (GDPR).

The Microsoft Azure platform was built on the "security in mind" principle. All platform services have built-in protection and threat detection tools. Specialized tools have been developed such as the Azure Security Center. The cloud can protect identities, networks, data and other secrets from the most common types of attacks such as DDoS, spoofing, or cross-scripting. It should also be noted that the "human factor" remains the main threat to information security. Microsoft Azure and other cloud platforms declare a “shared responsibility model”. This means that the cloud provider is only responsible for the “low-level” security of the virtual infrastructure and the physical security of the data center. Customers and users are responsible for the security of networks, operating systems, applications, data.

Secure cloud storage of data, including “big data”, has a high level of functionality and scalability. Data protection against unauthorized access and loss is ensured through encryption and replication, while providing the ability to use your own secret keys. Especially sensitive data, passwords, keys, connection strings, and certificates can be stored using Azure Key Vaults.

When working with any cloud service, it is important to remember that invulnerable systems do not exist, especially if they were manually deployed. Microsoft Azure provides the highest level of information security in the industry, but this platform will not be able to completely protect from the problems associated with the "human factor". Most problems in technical systems are caused by humans. Therefore, the best way to ensure the stability and security of cloud services is to install and configure them automatically. Therefore, in Microsoft Azure, everything is automated to the maximum, it provides the opportunity to use managed services or Azure Resource Manager templates. There is no need to manually deploy and configure components, the platform can handle this easily and safely how to become a cloud architect.

For security administrators and information security professionals, there are many options and conveniences. These include Azure AD functionality, a security center, VPN gateway builders, specialized DDoS protection, Azure Information Protection, Key Vault, and an Azure security analytics tool. Sentinel.

Microsoft Azure is a cloud platform. For her, both landline and mobile users are remote. This means that working with them is associated with increased risks. For account management, Microsoft Azure offers a range of services under the general name Azure AD. This one-stop identity management and security platform controls over 1.2 billion identities, performs over 8 billion daily authentications, and protects users from 99.9% of cyber attacks. For account security, Azure AD provides many tools, such as multi-factor authentication, Azure AD Identity Protection with automatic risk and threat analysis and detection.

For hybrid IT infrastructures that combine on-premises and cloud, we recommend using the fast private Azure Express Route. This will allow any, even encrypted corporate traffic to be transmitted exclusively through a separate private channel, and not the public Internet.

It is believed that IT and agriculture are the drivers of the Ukrainian economy. It is known that companies operating in these particular industries actively use Microsoft Azure in the IT infrastructure of their enterprises. If for IT companies this fact seems natural, then for large agricultural enterprises it is most likely indicative, demonstrating the advantages of clouds in practice.

Cloud services, including those based on Microsoft Azure, have become a daily routine for Internet users. Applications only for personal computers are becoming less and less popular, since now we spend 90% of the time at the computer in browsers. In the future, there will be no need for applications for computers at all; Internet access to applications deployed on the cloud architecture will be sufficient. An important point, in this case, the issues of information and network security become especially relevant.

No comments:

Post a Comment

What You Can Model with the Heat Transfer Module

Conduction, Convection, and Radiation Analyses The Heat Transfer Module can be used to study the three types of heat transfer in detail, exp...