Azure Security Center

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

8 hours 33 minutes
Video Transcription
Hello, Siberians. Welcome to this lesson on as your security center. This lesson is part of the seven spot do off. The Is that 500 Microsoft Azure security technologist costs.
Quick information on watch will be covering in this lesson.
We'll start with a conversation on the cloud. Security challenges would end this cause our hard Your security center can help us to miss this challenges with cloud security posture, management,
cloud complaints, pusher management and trade protection
and finally would discuss security center service years. Let's get into this.
When we talk about cloud security challenges, it's important to know where the traitor, the number one costs off breaches and the public cloud is Miss con figuration off cloud services on This is where, as your customers have configured controls in an insecure way,
the Miss configuration is then exploited by after cast to cost a bridge.
This challenge is compounded by the fact that workloads in the cloud a dynamic and they're constantly changing.
On this characteristic off the cloud can be both restraint and also a challenge.
So, for example, and users, I am power watch to do more with the cloud behind the other hand, it's challenging to ensure that the ever changing services and workloads are configured up to security and compliance standards. Attackers are also not relent in India, effort
attacks are increasingly getting more sophisticated,
and they could be from anywhere.
They could be hinting now trades or they could be excellent tracked. The order challenge is the security skews are also in short supply. I mean, just by looking at the logs that we covered in the previous lesson off this muddy. There's a world of security inside that could be obtained from activity logs on resource logs.
But there's just not enough people house there that have expertise
to know what to look for toe. Identify every trust in House Day.
And also, if they have the expertise, they did not have enough time to go to such volume off. Lux. How the Shelling Is Address by Security Center on there. Three men functionality State uses. To address these,
you have cloud security. Push a management
cloud compliance poster management, Andi trade protection.
So let's go have a look at this tree. Men functionalities.
Let's talk about cloud security posture management. This is where security center uses as your policy to monitor the con figuration off our services in Azur, it's done flags. If an insecure configuration is detected on the way this works, is that when we enable security Center
a Butte Insecurity for Cost Policy Initiative
is automatically assigned toe all security center registers subscriptions but talked about policy initiatives in the previous model, this policy initiative would don't continually discover new services that were deploying in harsher on assess if they're configured according to security best practices,
if they're not configured according Security best practices,
you're great to reflect on. We can get a privatised list of recommendations for what we needs to do to fix the security posture off the services on the men. Benefit of this functionality is to improve a security hygiene as a whole before also
to reduce the attacks a face off our azure environments.
The next functionality is the cloud compliance pushed. A management
on dysfunctionality extends to posture management capability of security center to regulatory compliance frameworks. So when we register I subscription in Security Center, it automatically assigns policy initiatives that are lies with the following regulatory standards. The C I has bench Mac
I still 27,000 and one and sock TSP.
It would then flag services that are configured in a way that is not compliant with the requirements off this frameworks.
We can also download complaints with parts in a PDF format. The men benefit off. This functionality is to streamline the process for meeting regulatory compliance requirements. One quick thing to mention about those two previous functionalities light organizations that have multiple subscriptions
on my using management groups to structure their subscription. Iraqi could leverage this capability to configure security center policies at a central level.
So if you look at the diagram on the screen,
security Center policies have been assigned at the management group level instead off using individual subscriptions. And we can do this from the agile Pato. After we've done, these would needs to go toe as your policy on removed the Default Policy Initiative assignment from the subscription level,
let's look at the Todman functionality, which is straight protection.
The trade protection capability off security center allows us to address treads. Would doubt requiring us to be a security expert on their security capability covers tree areas. We have tried protection for azure computer sources
on discovers windows on dinner. Six
on discovers windows on Denard systems anywhere not just in Hajer.
It also Converse platform compute services like the azure half service on as your containers. Then we have trade protection for azure data resources on discovers platform stoppage on databases in Asia. So we're talking about sequel database, Sicko Data Warehouse on Just Started and Cosmos TV.
And finally, we have tread protection for azure service Layers
on discovers the actual natural cleared the management layer on even as a key vote. So the general way that trade protection works is that event from all these different sources are collected into a Log Analytics workspace Security center, then uses different methods
like information from security intelligence defeats,
machine learning algorithms, reputation assessment toe. Identify undertaxed threats on the streets have raised a security a lot. Insecurity center.
Let's review other features off security center.
We have the network map feature, which enables us to see the topology off our workloads so that we can see if it's note is properly configured,
and in some cases this can help us to easily identify network mis configuration where we're allowing traffic that we should not be allowing we have just in time VM access and VM vulnerability assessment that we talked about in the post security model.
We also have the content of registry vulnerability assessments that we talked about
in the continent physician model
there to service tears off security center. We have the free tier, and we have the stand that
the free tier foster ball is only for azure resources. It can only assess as your services and has limited functionalities. As we'll see in a minute. The tear off security center that we've enabled determines the functionalities that we can use. The continuous security assessment capability is supported by boat to tears.
Remember that the Frito hasn't limitation for actual resources. Only
The continuous complaints assessment is supported only by the service. Tear trade protection for both infrastructure and platform services is only supported by the stand that's here just in time. VM access is under supported by the standards here, and finally,
adaptive application controls on network Adnan functionality is only supported by the standards here.
Here are some supplementary links for further studies off the topics that we covered in this lesson,
and here's a summary off what we covered in this lesson who started out with the conversation on the cloud security challenges we don't talked about Our address. Security Center can help us To address those using cloud security posture, management cloud complaints pushed her management and threat protection and finally would discuss security center service years.
Thanks very much for watching,
and I'll see you in the next lesson.
Up Next