Shared Responsibility Guide Azure Security AWS Shared .

2y ago
49 Views
4 Downloads
1.22 MB
11 Pages
Last View : 2d ago
Last Download : 3m ago
Upload by : Audrey Hope
Transcription

Shared Responsibility GuideAzureSecurityAWS SharedResponsibilityModelChecklistfor 2021Expert Advice on Security and Risk Priorities1

IntroductionMicrosoft Azure is one of the top public cloud service providers, offeringAWS ResponsibilityLike most cloud providers, AWS operates under a shareda broad set of global compute, storage, database, analytics, application,AWS is focused on the security of AWS infrastructure,responsibility model. AWS takes care of the security ‘of’ theand deployment services that help enterprises move faster, lower IT costs,including protecting its computing, storage, security‘in’and scale applications. While this is great for development, securingAzureand databaseservices against intrusions because it can’tthe cloud.remainsone of the biggest cloud security issues in 2021, as companiesfacefully control how its customers use AWS. AWS issophisticated threats.AWS has made platform security a priority to protectresponsible for the security of the software, hardware, andthe physical facilities that host AWS services. Also, AWSOncustomers’the one hand,environmentsare frequentlyat risk fromcriticalAzureinformationand cketingplatformrecentlysufferedtakesresponsibility for the security configuration of itsresponsibility for its infrastructure’s security. AWS detectsa ueemailmanaged services such as AWS DynamoDB, RDS, Redshift,fraud and abuse and responds to incidents by notifyingaddresseswereremovedfrom an isunsecuredstagingserver. Elastic MapReduce, WorkSpaces, and others.customers.However,the customerresponsiblefor ensuringtheir AWS environment is configured securely and data is notshared with someone it shouldn’t be shared with inside oroutside the company, identifying when an identity humanor non-human misuses AWS, and enforcing complianceand governance policies.At the same time, companies are facing risinginternal security issues due to misconfigurations andmismanagement. In one highly publicized recentexample, Solarwinds blamed their data breach onan undisclosed intern.In one recent example, a publicly exposed cloudstorage bucket was found to contain images ofhundreds of passports and identity documentsbelonging to journalists and volleyball players fromaround the world. These sensitive documents werehosted on a Microsoft Azure Blob storage share that waspublicly accessible to anyone because the organizationfailed to appropriately configure it.2Research from McKinsey shows that insider threatspresent in 50% of cyber breaches — and 44% of rootcauses can be attributed to negligence. Often, breachesoccur when inexperienced or understaffed IT teamsare asked to handle large-scale cloud migrations.Azure can be incredibly complicated, and if you’re newto the platform, it’s effortless to make small mistakesthat can lead to catastrophic consequences.This document guides Microsoft Azure customersthrough recommended best practices for the highestprotection level for their Azure infrastructure and thesensitive data stored in Azure environments.

Microsoft Azure Shared Responsibility ModelCustomer ResponsibilityAWS customers are responsible for the secure usage of AWS services that are consideredunmanaged. For example, while AWS has built several layers of security features to preventunauthorized access to AWS, including multi-factor authentication, it is the customer’s responsibilityto make sure multi-factor authentication is turned on for users, particularly for those with the mostextensive IAM permissions in AWS.Furthermore, the default security settings of AWS services are often the least secure. Correctingmis-configured AWS security settings, therefore, is a low hanging fruit that organizations shouldprioritize to fulfill their end of AWS security responsibility.As enterprises continue to migrate to or build their custom applications in AWS, the threats they faceare no longer isolated like the old world of on-premises applications as identities are the newperimeter. Preventing many of these threats falls on the shoulders of the AWS customer.So how are you securing your data?Below are checklists to help you govern and secure your AWS, including but not limitedto the following:Customer ResponsibilityAzure customers are responsible for the security ‘in’their own cloud, or more simply put, everything thatthey instantiate, build and/or use. For example, whileAzure has built several layers of security featuresMicrosoft Azure has made platform security a priority toto prevent unauthorized access to Azure, includingprotect customers’ critical information and applicationsmulti-factorauthentication(MFA), itAWSis yby taking responsibility for its infrastructure’s security.responsibility to make sure multi-factor authentication isPreventing or detecting when an AWS account has been compromised Azure detects fraud and abuse and responds toturned on for users, particularly for those with the mostPreventingor detectinga privilegedor regulartheAWS user behavinginincidentsby notifyingcustomers.However,extensiveIAM permissionsin Azure. an insecure mannercustomer is responsible for ensuring their Azure Business continuitymanagement(availability,environmentis configuredsecurelyand dataincidentis not response)It is worth noting that the default security settings ofProtecting againstAWSaszero-dayand otherinappropriatelysharedwell asexploitsidentifyingwhenvulnerabilitiesanAzure services are often the least secure configuration. roviding environmental security assurance against things like mass astersenforcing compliance and governance policies.is a low hanging fruit that organizations should prioritizeas the first step to fulfill their end of Azure securityProviding physical access control to hardware/softwareMicrosoftAzure Responsibilityresponsibility. From there, they should examine theConfiguring AWS Managed Services in a secure manner Azure is focused on the security of the underlyingservices and resources that they are using to determineDatabase patching then put infrastructure, by protecting its computing, storage,what the target securitylevels should be, ITM),portnetworking, and database services against intrusions.a plan in place to configuretheir cloud as such. scanning)Azure is also responsible for the security of the software,Ensuring AWS and custom applications are being used in a manner hardware,andtheinternalphysicalhost AzureThe security perimeterhas changed. Identitycompliantwithandfacilitiesexternal thatpoliciesservices. Also, Azure takes responsibility for the securitynot firewalls - forms your security boundaries.Updating guest operating systems and applying security patches configuration of its managed services, such as AzureAs enterprises continueto migrate to or build theirRestricting access to AWS services or custom applications to onlyKubernetesService(AKS), itContainer Instances, Cosmoscustom applications in Azure, the threats they face arethose userswho require the old world of on-premisesDB, SQL, Data Lake Storage, Blob Storage, and others.no longer isolated likeConfiguring AWS services (except AWS Managed Services) in a secureapplications. Under this new paradigm, preventingmannermany of these threats falls on the shoulders of thePreventing sensitive data from being uploaded to or shared fromapplications in an inappropriate mannerAzure customer. So how are you securing your data?Like most cloud providers, Microsoft Azure operatesunder a shared responsibility model. Azure takes careof the security ‘of’ the cloud while Azure customers areresponsible for security ‘in’ the cloud.3

extensiveIAM permissionsin AWS.Furthermore,the theirdefaultsecurityofexample,AWS eto ged.whilehowAWSseverallayersofissecurityfeaturesto rlyfor thosewfully deremis-configured AWS xtensiveIAMpermissionsinAWS.AWS has made platform security a priority to protectFurthermore,theexample,default securitysettingsof AWSservicesareofoftenthe featuresleast ssecuritytoprevprioritizeto fulfilltheir endofmakeAWS ers,particularlyforthosewthe physical facilitiesthat hostAWS ofservices.Also, AWScustomers’ critical information and applicationstakingAWScustomers are responsiblefor the secureusageAWS servicesthat are consideremis-configuredAWS securitysettings, therefore,is aauthentication,low hanging fruitunauthorizedaccessto AWS,multi-factoristhatthe organizationcustomer’s rareinfrastructure’sno longer isolatedlikeAWSthe oldworldofon-premisesapplicationsasidentitiesare onfigurationofittheitsextensiveIAMForpermissionsin includingAWS.responsibility for ettingsof AWSservicesleast layerssecurityfeaturesto nedonforusers,particularlyforconsiderethose stomer.fraud and abuse fAWSservicesthataremis-configuredaccessAWS securityis aauthentication,low hanging nauthorizedto AWS, settings,includingtherefore,multi-factorit isthatthe organizationcustomer’s omers. ringSohoware ingsofAWSservicesarethe esseverallayerstopreventsecurityto prevprioritizetohasfulfilltheirendof enterprisescontinueto migrateto or buildtheircustomapplications in AWS, the heshouldersofistheAWScustomer.their AWS environmentis yextensiveIAMsecurepermissionsin sforfortheare responsibleusageofforservicesthe securethatusageareconsideredof AWS services that are considerecustomersresponsiblethethesecureusageof oldAWSservicesthatareconsideredareno pplicationsas identitiesare eleastsecure.CoSohowareyousecuringyourdata?shared with urityresponsibility.to make rlythe mostfeaturesfor thosewAsenterprisescontinuetomigrateto securityor buildtheircustomapplicationsin rsto preventpreventof securityto prevunmanaged. Forexample,whileAWShasbuiltseverallayersof hassecurityfeaturestoperimeter.Preventingmany settings,ofthesethreatsfallstheshouldersof thatthe AWScustomemis-configuredAWSsecuritytherefore,isona lowhangingfruitorganizationoutside the company,identifyingwhenan tsecure.CoAWScustomersareresponsiblefor themulti-factorsecureusageof includingAWS servicesthatconsideredunauthorizedaccessto AWS,includingaccessto �sauthentication,responsibilityit is the customer’s runauthorizedaccessto ourdata?prioritizeto or non-human misusesAWS,enforcingBeloware igrateto securityorbuildtheircustomapplicationsin AWSAWS,the soffeaturestopreventto tfor thosewto make sure multi-factor authentication is turned on for users, particularly for those with the mostand governance accessto AWS,multi-factorauthentication,it is the customer’s n includingAWS.IAMpermissionsin AWS.extensivepermissionsin AWS.Beloware checkliststotohelpyou governandtheirsecureyourapplicationsAWS, ateto securityorbuildin AWSAWS,unmanaged.example,whileAWS redsettings,therefore,AWSsecurityismanya customlowfruitthatorganizationto make owing:areno longerisolatedliketheold worldofon-premisesapplicationsas identities are fulfillresponsibility.theirendof utnotthrelimAsenterprisescontinuetomigratetoor buildtheircustomapplicationsin ctingoftenincludingthe tsfallsontheshouldersofthe AWS WSsecuritytherefore,isa alowlowhangingfruitthat ings,longerisolatedliketheoldworldof on-premisesidentitiesare ,AWS securityissettings,hangingtherefore,fruitthatis a SservicesthatareconsideredAs eirAWS,customthethreatsapplicationsfacein nsibilityprioritizetofulfilltheirendof threatsfallsontheshouldersof onsibility.Azure Shared Responsibility Model builtseverallayersof securityfeaturestopreventareno longerisolatedlike dentitiesareapplicationsthenewas identities are icularlyfor thosewithshouldthe secureyourAWS,includingnot orizedaccessto scontinuetoAsmigrateenterprisesto orbuildcontinuetheirtocustommigrateapplicationsto orbuildintheirAWS,customthe shouldersthreatsapplicationstheyfacein AWSAWS,customethe onsusers,particularlyfor ernandsecureyourAWS,but s g:As whenenterprisescontinuetomigrateto orbuildfallstheircustomapplicationsin AWSAWS,thethreatstheyfaceAWS reatsPreventingmanyontheofshouldersthesethreatsof thefallson customer.theshouldersof thePreventing or detectingan AWSaccounthasbeencompromised lowyouaregovernchecklistsand securetohelpyou AWS,governincludingandsecurebut efore,is no ng but not ta?Preventingdetectingor detectingwhen an gedorregularAWSuserbehavingintheir extensiveIAMpermissionsin licationsinAWS,thethreatsthey ng:tothefollowing:Preventing oror izetofulfilltheirendofAWSsecurityresponsibility. customer.ResponsibilityAWS Ran insecure manner perimeter. Preventing many of these threats falls on the shoulders of the ationsshouldPreventing or detectinga dbutnotyourlimitedAWS,includingbutnotlim Preventingor detectinga toprivilegedororregularAWSuserbehavingin he re,thedefaultsecuritysettingsoftheAWSservicesare oftentheleast secure.in ancontinuityinsecure manner eatstheyfacean insecure manner to the following:to the following:mis-configuredAWS security settings,therefore,is a lowarehangingfruit that Protecting against AWSzero-dayexploitsandothervulnerabilities s ludingbut not thelimited a ntresponse)Preventingor detectinganAWSaccounthas yourbeencompromised response)AWS nnerAscontinueto migrateto likeorbuildtheironcustomapplicationsin AWSAWS,customer.the threats they e shouldersof theto enterprisestheProviding environmentalsecurityassuranceagainstmassfalls abilitiesAzurezero-dayexploitsandvulnerabilities Preventingor AWS,behavingin ludingbut isolatedliketheaoldworldofapplicationsas ngordetectingwhenan AWSaccount incidenthas beencompromised AWS RCustomer Responsibilityan ildtheircustomapplicationsin AWS, the sthesethreatsfalls on the shoulders of the AWS customer. ware/software e) uroldworldofon-premisesapplicationsas identities oods,andotherdisastersPreventingor edSohowareyoucontinuitysecuringyourdata? Belowarecheckliststo edinsecuremannerConfiguring AWS ManagedanServicesinasecuremanner tyassuranceagainstthingslikemass to thefollowing:ProtectingagainstAWS zero-dayand othervulnerabilitiesProvidingphysical accesscontroltohardware/softwareor detectingwhenan exploitsAWSaccounthasbeencompromised a privilegedorregularAWSuserbehavinginProviding physical e/software limitedResponsibilityAWS RCustomerResponsibilityCustomerResponsibilitySo howyousecuringyourdata?Database patching Belowcheckliststo helpyouaregovernand secureyourAWS,including butnotanareinsecuremanner Configuring AWS ManagedProvidingServices ina secure mannerenvironmentalsecurity assurance against things like mass Preventingoradetectinga controlprivilegedorregularAWSuserbehavinginAWS ResponsibilityConfiguring Azure cessto hardware/softwareCustomerResponsibility ITM),portPreventingor counthasbeencompromised heckliststohelpyougovernandsecureyourAWS, AWS rResponsibility scanning) including but not ConfiguringAWSManagedServicesina eagainstthingslikemassEnsuring networksecurity(DoS, man-in-the-middle(MITM),Preventingor detectingwhenanAWSaccounthasbeencompromised bility,incidentresponse)tothefollowing: astersport beinginana manner an gwhenPreventingan hasbeen compromised Databasepatching scanning)ConfiguringAWSManagedServicesin accounta securemannerPreventingor detectingaexternalprivilegedor regularAWSuser behavingin against massAWS ResponsibilityCustomerResponsibilitycompliantwith internalandpolicies oftwareaninsecuremanner EnsuringAzure andcustomapplicationsarebeingused thquakes,andothernaturaldisasters Ensuringnetworksecurity(DoS,Preventingor detectinga andprivilegedPreventingororregulardetectingAWSa userprivilegedbehavingor regularinAWS (MITM),user behaving port in hesa internalexternalpolicies Preventingordetectingwhenan AWSaccounthasbeencompromised gsResponsibilitylike mass ,incidentresponse)an insecuremanneraninsecuremannerAWS sin a cting withagainstAWS ngphysicalaccesscontrolto hardware/software poweroutages,earthquakes,floods,and sstoAWSservicesorcustomapplicationsto (availability,only are being ularAWSuserbehavingin Databasepatching tchesscanning)Preventingordetectingan AWSaccounthas beencompromisedthoseuserswhorequirewhenitsecurity ConfiguringAWSManagedServicesina assagainstthings like mass ithinternalandexternalpoliciesan insecuremanner AWS Responsibility ersfloods,andotherothernaturaldisasters

Microsoft Azure Shared Responsibility Model Like most cloud providers, Microsoft Azure operates under a shared responsibility model. Azure takes care of the security ‘of’ the cloud while Azure customers are responsible for security ‘in’ the cloud. Microsoft Azure

Related Documents:

Resource Manager and the Azure portal through Azure Arc to facilitate resource management at a global level. This also means a single vendor for support and billing. Save time and resources with regular and consistent feature and security updates. Access Azure hybrid services such as Azure Security Center, Azure Backup, and Azure site recovery.

AZURE TAGGING BEST PRACTICES Adding tags to your Azure resources is very simple and can be done using Azure Portal, Azure PowerShell, CLI, or ARM JSON templates. You can tag any resources in Azure, and using this service is free. The tagging is done on the Azure platform level and does not impact the performance of the resource in any way.

DE LAS UNIDADES PROGRAMA CURRICULAR UNIDAD 2 - Introduccion a los servicios de azure - Los servicios de Azure - Cómo crear un App Service en Azure - Administrar App Service con Azure Cloud Shell Azure UNIDAD 3 - Introduccion al Modulo - Regiones y centros de datos en azure - Zonas Geograficas en

students solve a variety of challenges faced in education through Microsoft Azure and the cloud. Azure for research staff Azure for teaching staff Azure for students Azure for academic institutions Azure is a powerful tool for research and education, and Microsoft provides a number of programs to meet the needs of academic institutions.

Gain Insights into your Microsoft Azure Data using Splunk Jason Conger Splunk. Disclaimer 2 . Deploying Splunk on Azure Collecting Machine Data from Azure Splunk Add-ons Use cases for Azure Data in Splunk 3. Splunk available in Azure Marketplace 4. Splunk in Azure Marketplace

Azure Active Directory (AD) can be configured as the identity provider for GitHub 8. GitHub Commit tracked by Azure Board 9. Azure Pipelines integrates with the Terraform tool which can managing cloud infrastructure as code 10. Azure Pipelines enable Continuous Delivery (CD) to Azure Kubernetes Service

You need to collect and automatically analyze security events from Azure Active Directory (Azure AD). What should you use? A. Azure Sentinel B. Azure Key Vault C. Azure Synapse Analytics D. Azure AD Connect Answer: A Question: 93 HOTSPOT For each of the following statements, select Yes if the statement is true. Otherwise, select No. NOTE: Each .

Initial Counseling . If you are accidentally placed on guard, weekend duty, or special duties that contradict your team orders, it is incumbent upon you to let your chain of command know IMMEDIATELY so that they can find a replacement in time. If you do not inform them within 48 hours of the duty, it is your responsibility to find a replacement. ***A change from past years: Leadership .