Shared Responsibility Model

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 51 minutes
Difficulty
Beginner
CEU/CPE
4
Video Transcription
00:00
Welcome back to Microsoft Azure Fundamentals.
00:03
This is Module nine. Security and Azure
00:08
in this module will first look at the shared security responsibility model in Azure.
00:13
Then we'll get an overview of Azure Security Center.
00:17
We'll also learn how we can manage users and access using Azure Active Directory.
00:22
We will explore the encryption options in Azure and learn about network protection,
00:27
and at the end, we'll take a quick look at Azure Advanced Threat Protection Service.
00:32
Let's get started
00:34
before we look at what services and tools are available in azure to secure your applications and data.
00:40
Let's take a look at the security responsibility in the cloud.
00:44
Let's start with how security is done in the traditional way, where each enterprise owns their own data center.
00:53
The first thing you need to think about is the physical security of the data center
00:57
restricting access to the building, installing surveillance equipment, hiring guards and so on.
01:02
Next, you need to make sure that the personnel that is working in the data center and the users of the equipment, like developers and I T administrators, comply with certain security policies and follow security procedures.
01:15
Those can be things like registering visitors, requiring valid identification documents for registration requiring strong passwords, et cetera.
01:25
The last thing is the digital security that deals with securing the digital infrastructure, like network segmentation, firewalls, application and user access and other things.
01:37
As you can see, ensuring the security of your own data center is no trivial job and requires a lot of expertise.
01:47
So how does this change in the cloud?
01:49
Well, when you use the cloud,
01:52
you don't maintain the data center, and Microsoft is fully responsible for physically securing the facilities, surveying the building and hiring physical security personnel.
02:02
Microsoft is solely responsible for the physical security of the data center.
02:07
Microsoft is also responsible for establishing policies and procedures when it pertains to the data center or the hardware infrastructure in it.
02:16
They're also responsible for any policies and procedures related to the azure platform itself.
02:23
However, you as a customer are responsible for establishing policies and procedures for your own applications and the data that they handle.
02:32
And last but not least, Microsoft is responsible for the digital security of the azure platform.
02:38
This includes ensuring the platform itself cannot be compromised, that the tenants residing on the platform are authenticated and authorized to use only their resources. That management a p I s are always available and so on.
02:53
But again, you as a customer are responsible for the digital security of your applications and the data they handle.
03:00
This means that you should ensure the users of your application are authenticated. Data is properly encrypted, and so on.
03:07
Now let's take a look at each layer in the application stack and specifically, who is responsible for security In each scenario
03:17
on premises, I asked pass and sass,
03:21
as we've already established
03:23
for the on premises deployments. The responsibility for security falls completely on you, the customer
03:30
starting with the physical security, going to the operating system and network security and ending with the data security and governance
03:37
you manage every security aspect,
03:40
as you may remember I asked, is the closest to the on premises model
03:46
in the eyes model. The cloud vendor is responsible for the physical security, but you, as the customer, have the responsibility of securing the rest, including the operating system, application and data.
03:59
You still need to think about applying security patches to the OS, run times and frameworks, properly configuring the network controls and so on.
04:06
In the past model, the responsibility shifts even more towards Microsoft.
04:13
Microsoft is fully responsible for the physical security and the operating system. Security and you as a customer share the responsibility for securing the network application and the identity infrastructure.
04:24
The rest of the stack is still your responsibility, though.
04:28
In the Saas model,
04:30
the majority of the security responsibility is handled by Microsoft.
04:33
You still share the responsibility for the identity infrastructure and you take care of the account and access managements and points and data. But
04:42
everything else is handled by Microsoft.
04:46
Microsoft applies a layered approach to security, known as defense in depth
04:51
defense. In depth is a strategy that employs a series of mechanisms to slow the advance of an attack targeted at acquiring unauthorized access to information.
05:02
It can be visualized as concentric circles, with the data to be secured at the very center
05:10
each layer provides protection. But if one is breached, the subsequent one is in place to prevent further exposure.
05:17
The data layer is the inner layer of the circle.
05:20
The owner of the data is responsible for the security of the data and is also responsible for controlling the access to it.
05:28
Quite often there are compliance and regulatory requirements that dictate the controls and processes that need to be in place to ensure confidentiality, integrity and availability of the data.
05:40
Things you can do it. This layer are ensure the data is encrypted at rest and in transit and restrict the access to data on a need to know basis.
05:50
The next layer is the application layer.
05:54
By integrating security in the application development life cycle
05:57
application owners can ensure that the application is secure by default.
06:02
Making security a required part of the application design will reduce the number of vulnerabilities introduced in the code.
06:12
Make sure the security is included in the application design code is free from known vulnerabilities, and secrets are taken out of the configuration files and stored in secure storage.
06:24
Securing the computing infrastructure ensures proper access controls and endpoint protections are in place.
06:30
Patching and updates are also integral parts of ensuring the compute infrastructure of your application
06:38
at the network layer. The goal is to limit the connectivity between systems to the minimum that is required.
06:46
By doing this, you can prevent lateral movement throughout the network.
06:51
Make sure you deny access by default and only allow ports and systems that you need to interact with
06:58
at the perimeter. You protect the access to your network from external Attackers.
07:03
Utilizing the firewalls functionality will allow you to identify and be alerted upon malicious activity against your network.
07:13
DDOS protection services filter large scale attacks before they even reach your endpoints.
07:19
The identity and access layer ensures that identities are not compromised.
07:25
Access is granted to authorized parties and activities are monitored.
07:30
Make sure that login attempts are logged, that the respective user is notified
07:33
that the user uses single signing for easier management and that they use multi factor authentication for stronger protection.
07:42
The physical layer is the first line of defense.
07:45
Its goal is to prevent unauthorized physical access to the assets and to not allow the bypassing of the other security measures.
07:54
In the next video, we'll take an in depth look at the tools and services as your offers to implement the security
Up Next