140 likes | 149 Views
Learn how to secure your Azure resources effectively with Azure Security Center. This session covers platform, application, and identity management, operating system and network configurations, encryption, authentication, and more.
E N D
Built-in, not bolted on - securing your Azure resources in practice Johan Dahlbom Accenture @daltondhcp THR3064 Stefan Schörling Innofactor @stefanschorling
Shared responsibility Customer Software Platform, application and Identity and Access Management Operating system, network and firewall configuration Software Compute Storage Database Networking Hardware, physical security and global infrastructure • Server-side encryption Availability Zones Client-side data Encryption and data integrity Authentication Regions Networking traffic protection (encryption, integrity, identity) Edge locations
Security Posture and Intelligent Security Graph Industry Partners Antivirus Network CERTs Cyber DefenseOperations Center Malware Protection Center Cyber Hunting Teams Security Response Center Digital Crimes Unit Key Vault Cloud App Security Event Management Information Protection Security Center Conditional Access Active Protection Service Windows Update Office 365 Advanced Threat Protection SmartScreen Azure Active Directory Device Identity Apps and Data Infrastructure IaaS ActiveDirectory Advanced Threat Analytics PaaS SaaS
Azure Security Center helps you to improve your security posture and protect against threats Platform, application and Identity and Access Management Operating system, network and firewall configuration Azure Security Center Server-side encryption Client-side data Encryption and data integrity Authentication Networking traffic protection (encryption, integrity, identity)
Review and implement security recommendations • Remove external accounts with owner permissions from your subscription • Enable MFA for accounts with owner permissions in your subscription • Restrict access through internet facing endpoint • Add web application firewall • Add a next generation firewall
Create a governed and secure environment with Policies and Blueprints
Summary Security Posture Threat protection Get secure faster http://aka.ms/asc
Thank you! Johan Dahlbom Accenture @daltondhcp Stefan Schörling Innofactor @stefanschorling
Please evaluate this sessionYour feedback is important to us! Please evaluate this session through MyEvaluations on the mobile appor website. Download the app:https://aka.ms/ignite.mobileApp Go to the website: https://myignite.techcommunity.microsoft.com/evaluations