Encryption in Azure

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
3 hours 51 minutes
Difficulty
Beginner
CEU/CPE
4
Video Transcription
00:00
encryption is the last line of defense for your data.
00:04
Let's see how azure helps you encrypt your data and protect it. Even if a breach occurs,
00:10
Encryption is the process of encoding the information in a way that only authorized parties can read it.
00:17
Here's an example where the plane Lauren Ipsum text is encrypted with the V's encryption command.
00:23
Unless you know the encryption key that is used to do the encryption, you will not be able to decrypt the file and read its contents.
00:32
There are two types of encryption,
00:34
symmetric and asymmetric.
00:37
The one we've shown in the previous slide is a symmetric encryption because it uses the same key to encrypt and decrypt the data.
00:44
Here's how it works.
00:46
The sender uses a key to encrypt the data
00:49
on the receiver side. The same key is used to decrypt the data.
00:54
If the receiver wants to send some data back,
00:56
she can use the same key to encrypt the data and send it over.
01:00
Because the key needs to remain secret, both parties need to find a way to distribute the key without compromising it.
01:07
This makes it hard to distribute the key over public infrastructure
01:11
to solve the issue. With the distribution of keys, asymmetric encryption was developed
01:17
instead of a single key to related keys are generated
01:21
a public key and a private key.
01:23
The public. He is derived from the pipe Ricky.
01:26
However, you cannot use the public key to generate the private key
01:32
the public. He is published so that anyone who needs it can have access to it, while the private key is kept secure with the receiving party.
01:41
When a sender wants to send information to the receiver, she uses the public key to encrypt the information.
01:48
The receiver uses the private key to decrypt the information and read It's content.
01:55
Asymmetric encryption is used to implement a negotiation part of protocols like Transport Layer Security, or TLS, as well as message signing, where only the owner of the private key can sign the message. But everybody else can verify the signature. Using the public key
02:14
data in transit is when the data is actively moving from one location to another.
02:19
The purpose of encryption is to protect the data from outside observers and limit the exposure.
02:25
You can achieve this by encrypting the data for the sending party before sending it over the network
02:30
Protocols like SSL, TLS and https help you do that at the application layer.
02:38
You can also use a secure channel like a VPN that encrypts all the traffic between the two parties Transparent to the application
02:47
at rest is data that is stored on a physical medium.
02:51
The purpose of encryption is to render the data unusable without an encryption key. If an authorized party gains access to the wrong medium,
03:00
regulatory requirements require that sensitive data be encrypted both at rest and in transit
03:08
as your provides several features and services to help you with the encryption of your data.
03:14
You should utilize those if you're looking to achieve regulatory compliance or certification
03:20
as your storage service. Encryption is a feature of azure storage that automatically encrypts the data before persisting it to azure blob as your disk, as your files or as your cue
03:32
as your disk. Encryption is a feature that helps you encrypt your Windows or Linux virtual machines.
03:38
It leverages bit locker for Windows and DM crypt for Lennox to provide encryption for the operating system and the data disks attached to the virtual machine.
03:49
H E is integrated with azure key vault to store the encryption keys,
03:53
and it uses the managed services identities functionality to obtain the keys to decrypt the disks.
04:00
Transparent data encryption is used to protect SQL databases in azure data warehouse instances against malicious activities,
04:10
T D e encrypts and decrypt the data base Any associated backup files as well as the transaction logs in real time,
04:18
and it is transparent to your application.
04:21
It does so using a symmetric key called the database Encryption Key that is generated for each unique database. Instance,
04:30
Integration with azure key vault allows you to also bring your own key.
04:35
Now we've mentioned Azure Key vault on several occasions already.
04:41
In addition to integrating with many services in azure and storing encryption keys as your key vault can be used to store and manage application secrets,
04:49
you can configure your application to use a managed services identity and retrieve the necessary secrets from azure key vault using API coats.
04:59
This way, you remove the need to store secrets and configuration files
05:03
as your key vault can also be used to manage certificates.
05:08
It integrates with external certificate authorities and allows you to easily provision deploy and manage DLS certificates for your application
05:17
as a key vault. Keys and secrets can also be protected by a software or hardware security module called HSN, validated by Phipps. 1 40 Dash to level two
05:29
With This will wrap up our discussion on encryption, and in the next video, we'll take a look at the network security options in Azure.
Up Next
AZ-900 Microsoft Azure Fundamentals

In this online Microsoft Azure Fundamentals training course, students will learn basic cloud computing concepts and how these concepts are applied specifically to Microsoft Azure. Upon completion, students will be prepared to take the AZ-900 certification exam.

Instructed By