• Home
  • Schedule
  • Categories
    • Programming
    • Cloud Native
      • CI/CD
      • Docker & Contatiner
      • Kubernetes
    • IaC
    • Cloud Platform
      • AWS
      • Azure
      • GCP
      • Migration
    • Data
      • Data Science
      • Database
    • Bespin Global
      • Case
      • Messages
      • SW & Service
    • Business
      • Compliance
      • English
      • Leadership
      • New Bespineers
      • Sales
      • Trend & Work
    Login
    BespinAcademyBespinAcademy
    • Home
    • Schedule
    • Categories
      • Programming
      • Cloud Native
        • CI/CD
        • Docker & Contatiner
        • Kubernetes
      • IaC
      • Cloud Platform
        • AWS
        • Azure
        • GCP
        • Migration
      • Data
        • Data Science
        • Database
      • Bespin Global
        • Case
        • Messages
        • SW & Service
      • Business
        • Compliance
        • English
        • Leadership
        • New Bespineers
        • Sales
        • Trend & Work

      Azure

      • Home
      • All courses
      • Azure
      • Microsoft Certified: Azure Solutions Architect Expert_3. Architect great solutions in Azure
      CoursesCloud PlatformAzureMicrosoft Certified: Azure Solutions Architect Expert_3. Architect great solutions in Azure
      • Pillars of a great Azure architecture 6

        54 min Module 7 Units

        • Lecture1.1
          Introduction 02 min
        • Lecture1.2
          Pillars of a great Azure Architecture 10 min
        • Lecture1.3
          Design for security 10 min
        • Lecture1.4
          Design for performance and scalability 10 min
        • Lecture1.5
          Design for availability and recoverability 10 min
        • Lecture1.6
          Design for efficiency and operations 10 min
        • Quiz1.1
          Pillars of a great Azure architecture – Knowledge Check & Summary 10 questions
      • Design for security in Azure 7

        54 min Module 7 Units

        • Lecture2.1
          Introduction 02 min
        • Lecture2.2
          Defense in depth 10 min
        • Lecture2.3
          Identity management 10 min
        • Lecture2.4
          Infrastructure protection 10 min
        • Lecture2.5
          Encryption 10 min
        • Lecture2.6
          Network security 10 min
        • Quiz2.1
          Design for security in Azure – Knowledge Check & Summary 8 questions
      • Design for performance and scalability in Azure 6

        48 min Module 6 Units

        • Lecture3.1
          Introduction 02 min
        • Lecture3.2
          Scaling up and scaling out 15 min
        • Lecture3.3
          Optimize network performance 10 min
        • Lecture3.4
          Optimize storage performance 09 min
        • Lecture3.5
          Identify performance bottlenecks in you application 09 min
        • Quiz3.1
          Design for performance and scalability in Azure – Knowledge Check & Summary 9 questions
      • Design for efficiency and operations in Azure 5

        42 min Module 5 Units

        • Lecture4.1
          Introduction 02 min
        • Lecture4.2
          Maximize efficiency of cloud spend 15 min
        • Lecture4.3
          Use monitoring and analytics to gain operational insights 08 min
        • Lecture4.4
          Use automation to reduce effort and error 12 min
        • Quiz4.1
          Design for efficiency and operation in Azure – Knowledge Check & Summary 6 questions
      • Design for availability and recoverability in Azure 5

        59 min Module 5 Units

        • Lecture5.1
          Introduction 01 min
        • Lecture5.2
          Build a highly available architecture 20 min
        • Lecture5.3
          Develop a disaster recovery strategy 20 min
        • Lecture5.4
          Protect your data with backup and restore 15 min
        • Quiz5.1
          Design for availability and recoverability in Azure – Knowledge Check & Summary 6 questions
        https://docs.microsoft.com/en-us/learn/modules/pillars-of-a-great-azure-architecture/3-design-for-security

        Design for security

        Design for security

        • 10 minutes

        Your healthcare organization stores personal and potentially sensitive client data. A security incident could expose this sensitive data, which could cause personal embarrassment or financial harm. How do you ensure the integrity of their data and ensure your systems are secure?

        Here, we’ll talk about how to approach the security of an architecture.

        What should I protect?

        The data your organization stores or handles is at the heart of your securable assets. This data could be sensitive data about customers, financial information about your organization, or critical line-of-business data supporting your organization. Along with data, securing the infrastructure it exists on, and the identities we use to access it, are also critically important.

        Your data may be subject to additional legal and regulatory requirements depending on where you are located, the type of data you are storing, or the industry that your application operates in. For instance, in the healthcare industry in the US, there is a law called the Health Insurance Portability and Accountability Act (HIPAA). In the financial industry, the Payment Card Industry Data Security Standard is concerned with the handling of credit card data. Organizations that store data that is in scope for these laws and standards are required to ensure certain safeguards are in place for the protection of this data. In Europe, the General Data Protection Regulation (GDPR) lays out the rules of how personal data is protected, and defines individuals’ rights related to stored data. Some countries require that certain types of data do not leave their borders.

        When a security breach occurs, there can be substantial impacts to the finances and reputation of both organizations and customers. This breaks down the trust customers are willing to instill in your organization, and can impact its long-term health.

        Defense in depth

        A multilayered approach to securing your environment will increase the security posture of your environment. Commonly known as defense in depth, we can break down the layers as follows:

        • Data
        • Applications
        • VM/compute
        • Networking
        • Perimeter
        • Policies & access
        • Physical security

        Each layer focuses on a different area where attacks can happen and creates a depth of protection, should one layer fail or be bypassed by an attacker. If we were to just focus on one layer, an attacker would have unfettered access to your environment should they get through this layer. Addressing security in layers increases the work an attacker must do to gain access to your systems and data. Each layer will have different security controls, technologies, and capabilities that will apply. When identifying the protections to put in place, cost will often be of concern, and will need to be balanced with business requirements and overall risk to the business.

        An illustration showing Defense in depth with Data at the center. The rings of security around data are: application, compute, network, perimeter, identity and access, and physical security.

        There is no single security system, control, or technology that will fully protect your architecture. Security is more than just technology, it’s also about people and processes. Creating an environment that looks holistically at security, and making it a requirement by default will help ensure your organization is as secure as possible.

        Common attacks

        At each layer, there are some common attacks that you will want to protect against. These are not all-inclusive, but can give you an idea of how each layer can be attacked and what types of protections you may need to look at.

        • Data layer: Exposing an encryption key or using weak encryption can leave your data vulnerable should unauthorized access occur.
        • Application layer: Malicious code injection and execution are the hallmarks of application-layer attacks. Common attacks include SQL injection and cross-site scripting (XSS).
        • VM/compute layer: Malware is a common method of attacking an environment, which involves executing malicious code to compromise a system. Once malware is present on a system, further attacks leading to credential exposure and lateral movement throughout the environment can occur.
        • Networking layer: Unnecessary open ports to the Internet are a common method of attack. These could include leaving SSH or RDP open to virtual machines. When open, these could allow brute-force attacks against your systems as attackers attempt to gain access.
        • Perimeter layer: Denial-of-service (DoS) attacks are often seen at this layer. These attacks attempt to overwhelm network resources, forcing them to go offline or making them incapable of responding to legitimate requests.
        • Policies & access layer: This is where authentication occurs for your application. This could include modern authentication protocols such as OpenID Connect, OAuth, or Kerberos-based authentication such as Active Directory. Exposed credentials are a risk here and it’s important to limit the permissions of identities. We also want to have monitoring in place to look for possible compromised accounts, such as logins coming from unusual places.
        • Physical layer: Unauthorized access to facilities through methods such as door drafting and theft of security badges can be seen at this layer.

        Shared security responsibility

        Revisiting the model of shared responsibility, we can reframe this in the context of security. Depending on the type of service you select, some security protections will be built in to the service, while others will remain your responsibility. Careful evaluation of the services and technologies you select will be necessary, to ensure you are providing the proper security controls for your architecture.

        An illustration showing how cloud providers and customers share security responsibilities under different types of cloud service models: on-premises, infrastructure as a service, platform as a service, and software as a service.

        Prev Pillars of a great Azure Architecture
        Next Design for performance and scalability

        Leave A Reply 응답 취소

        댓글을 달기 위해서는 로그인해야합니다.

        All Courses

        • Bespin Global
          • Case
          • Learn-Do-Share 베스픽 커피챗
          • Learn-Do-Share 프로젝트 세미나
          • Messages
          • OpsNow
          • Project Management
          • SW & Service
        • Bespin Global(Eng.)
          • Cloud Native
        • Business
          • Compliance
          • English
          • Leadership
          • New Bespineers
          • Sales
          • Trend & Work
        • Cloud Native
          • CI/CD
          • Docker & Contatiner
          • Kubernetes
        • Cloud Platform
          • AWS
          • Azure
          • GCP
          • Migration
          • NCP
        • Data
          • Data Science
          • Database
        • IaC
        • Monitoring
        • Programming

        Latest Courses

        DBMS 아키텍처 비교(Oracle vs. PostgreSQL vs. MySQL)

        Free
        제 33회 『주니어들의 플랫폼 시스템 향상을 위한 좌충우돌 운영기』

        제 33회 『주니어들의 플랫폼 시스템 향상을 위한 좌충우돌 운영기』

        Free
        신규입사자 법무교육: Compliance, 반드시 지키기

        신규입사자 법무교육: Compliance, 반드시 지키기

        Free

        © 2020 BESPIN GLOBAL, All Rights Reserved.


        No apps configured. Please contact your administrator.

        Login with your site account

        No apps configured. Please contact your administrator.

        Lost your password?