Time
14 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello, Siberians Work on to Lesson 2.5. Off Ma do to off this car stated, is that Reserva one Microsoft Azure Arctic design.
00:10
So some quick information on what will be covering in this lesson
00:14
who started by covering azure key vote availability, and I'll talk about the concept of shared responsibility as it relates to this.
00:22
I will talk about security, which also has the concept of shared responsibility. But I'll give you best practices on what you need to do to ensure security of the azure key. Vote with us.
00:34
Then I'll talk about compliance and how that relates to azure key votes on. Finally, I'll talk about azure key vote monitoring.
00:43
When it comes to azure key vote availability, it's a shared responsibility. Microsoft has certain responsibilities that we need to be a way off on. We have certain responsibilities when we're doing our configuration in terms off Mike's off responsibilities.
00:58
Hey there.
00:59
So you cannot have a key vote resource and has your with doubt replication.
01:03
Because of the sensitivity of the type of service.
01:07
The key vote contents is automatically replicator to the P ed region of the vision that you selected if you're not familiar with the concept off Pierre regions. Our advice youto have a look at Sai Berries video content around other azure information.
01:26
If they were to be a failure, individually selected Microsoft automatically and transparently fails over
01:34
your service to the other vision to the P ed region. White been replicated toe.
01:38
Now be aware that if they went, if this were to happen, could take about few minutes for your savage to become online again. So whenever you're building your seven whenever whenever you're building and feel that using your keyboard service be aware of that and always implement, try back
01:57
into your court.
02:00
Also, after a fellow vice completed
02:05
Andi, your service becomes online in the secondary region.
02:08
It's only a limited set off operations that are possible because it's gonna be online. Invade on the moat, so certain requests types will not work
02:20
on DDE.
02:21
If your primary region comes back online and they feel back it's triggered by Microsoft or the request types, including video, right becomes available once again.
02:30
So when it comes to our responsibilities, their best practices for azure key vote availability number one enable soft the lead.
02:38
This is useful in cases off accidental leads or even malicious the leads that may happen.
02:45
So the same shows that when the key vote itself objects within, keep out of the later that's gonna be retained for 90 days
02:53
in the event off the key vote objects and it's been deleted.
02:58
Tow. Avoid that now being perched because if its parts that meat is gonna be deleted forever in the case way cannot recover. So what you may want to also do is to enable part protection.
03:08
So this and shows that when they give out our objects and keep water deleted, they cannot be parched until after the night of this retention has passed
03:19
both off this configuration for Sultanate and part protection cannot be enabled these in the azure part off for now. So you have to use it as your CLI or is your partial to enable them
03:31
using resource lock is also a good practice if you have very sensitive key votes recess on, but you don't want any modifications toe happen after you've configured it the way you want to configure it may want to use results lock toe lock That down.
03:47
Also taken back up is very important, especially when you're talking about you have a case of a rogue insider. Or maybe you deleted it about Italy that object in the vault, and then you change your mind later. In this case, you backup is what's gonna help you.
04:04
So let's talk about your key votes. Security number one. You want to limit access to the key of autumn management plane is involved. It's access control. Remember that if someone has access or sudden level of access in the management plane, the code in essence, give themselves permission to the data plane to be able to read
04:24
said in key information
04:26
from within the cave arteries. Us. So you want to lock this down and follow the principle off this privilege?
04:32
You also want to limit access to the key votes. Data plane is an access policies In other words, who as access into the data or the objects that you're stuck inside the key vote use access policies to lock that down
04:46
from a network connectivity perspective. If your key vote is only gonna be used by internal service is
04:53
especially if they're running and Microsoft Azure, you want to limit access on the network layer. Also, that's the defense in that right. You want to ensure that
05:02
you only allow access from networks that need to be able to access the key vote, and you can do this by just going under. The firewalls and virtual networks configuration off the key vote.
05:15
We talked about this earlier when it comes to availability, but also applies to security and neighbors off the leading part protection on. Also, remember to take backups. You'll be glad you do if you encounter a security attack that tries to deny you service.
05:33
And then finally, you want to enable diagnostic locks for monitoring and review. This especially important if you want to be able to review If Southern people are misusing their pre abilities and giving themselves permission into the data plane, you want diagnostic looks to be able to read who is accessing what from within
05:53
the resource itself.
05:56
When it comes to compliance. It's also shared responsibility on when I talk about complaints in Hangzhou. I like to emphasize that
06:03
there's nothing like its azure GDP are compliant or its Azure Phipps compliant. Compliance in hasher is on a service by service basis. It does this service have this level of compliance is the question to ask. So when it comes to azure key votes, this'd levels off compliance that
06:24
it's achieved
06:26
on. You can find this documentation on Microsoft website
06:30
no,
06:30
the way that we use the azure key vote resource also impacts on compliance in many cases. So friends like Hannibal in Logan is not something that Mike's off would do for us in terms of enable antagonistic lugging, but far be able to achieve certain compliance from walks.
06:48
We needs to enable diagnostic lugging Sophie's like enabling part protection or enabling soft leads.
06:56
It's also very important things like using resource lotsa purple protect from delusion off a modification feels like taking backups are very important when it comes to achieve in complaints. Off course. It goes beyond what I've listed on the screen, but you get the idea.
07:12
Let's talk about monitoring
07:14
when it comes to monitoring of azure key votes. There, two men levels off locks that you want to pay attention to. Number one is the activity lock.
07:23
Activity log is enabled by default. We don't need to do anything to enable activity logs.
07:29
This log event on the management plan. What created the results would litter. The results were created around objects with dilated, an object and all those sorts of stuff.
07:38
You can export the switch storage account for archiving. You can stream it to azure event or where you collect with the top party software or third party same system.
07:48
Or you could just pass it directly towards your monitor logs, also known as agile Logan. And it takes to be able to do set in Deep Dive analytics, and them is in the Cousteau query language.
08:01
Now we have the diagnostic locks, which is nine neighborhood by default, and this is very key and very important.
08:09
It's either recommended to enable this
08:11
once you enable that you can access the log in information in about 10 minutes. So it's not something that instant instance where you start seeing are the information. Give it about 10 minutes before you start seeing the locks. Also what is loved when you enable diagnostics looks hold the authenticated
08:28
rest a p I request to the key vote resource itself a lox. I include filled records and again, that's very important for security on complaints reasons, So oppressions on the key vote operations on the keys and the secrets and its certificate within the key vote on authenticated request that result in a 41 response.
08:46
So this information that you will not get if you do not enable diagnostic logs
08:52
So you always wants to ensure that this log is enabled
08:56
for every production key vote.
09:01
So what if we discussed in this video? So in this video with discussed azure key about availability, security compliance and monitoring which are different architectural principles or design principles for as your kid about service,
09:18
Yes, I'm good information for simplemente materials, which you can use for further studies
09:24
as a kid got documentation as your key vote fit back, which is for useful to be able to see what existing limitations, um
09:33
does your kid got service has
09:35
and what people are requesting for. You could also add the a vote on. Also, I just give up up there to give you information as makes off improve on the service and things that have changed. So thanks very much for joining me in this particular lesson.
09:48
This is the hand of this model. I'll see you in the next month

Up Next

AZ-301 Microsoft Azure Architect Design

This AZ-301 training covers the skills that are measured in the Microsoft Azure Architect Design certification exam. Learn strategies to plan for the exam, target your areas of study, and gain hands-on experience to prepare for the real world.

Instructed By

Instructor Profile Image
David Okeyode
Cloud Security Architect
Instructor