SlideShare a Scribd company logo
P re s e n t e d b y
Control Freak: Risk and Control in
Azure DevOps
Barkha Herman
South Florida Code Camp ‘18
What will be covered:
• Audit and Controls for Environments
• Audit and Controls for Code
• Audit and Controls Data at Rest
• Audit and Controls Data In Motion
• Monitoring and Response
Audit and Control for Environments
Some sample Controls:
1. Logical and physical Segregation of Environments
2. Lifecycle Methodology for Deployments
3. Process set for Approvals and review
Implementation
1. Use ARM Templates to create PaaS and IaaS Applications
2. Use VSTS Branch Policies to control changes to Templates
3. Use a deployment Pipeline to control Environment Changes
Use ARM Templates to deploy
1. Azure Resource Manager
templates automate
Deployment.
2. Creating environment becomes
repeatable.
3. Creating environments can be
scripted.
1.Use VSTS for Templates
1. Use VSTS to maintain ARM
Templates and standardize
changes to environments.
2. Use gitflow Pull Request Process
to validate and audit any
changes to the environments.
1.Use Pipelines for Deployments
1. Use Deployment Pipelines for Deployments.
2. Use SPNs for environments; devops cannot deploy directly to an environment.
3. Approvers setup for each environment – QA approvers differ from PROD
approvers.
Demo…
Audit and Control for Code
Some Sample Controls
1. Code is located in a secure location
2. Access to modify code is restricted
3. Code is reviewed, tested and scanned etc.
4. Code deployment is “gated” and “Audited”
Implementation
1. Git Flow & Branch Policies in VSTS
2. Build once, deploy several for consistency
3. Deployment Pipeline with Approvals for “Gates” and audits
Git Flow + Controls
1. Use GitFlow
2. Pull Requests for Merges, required reviews
and Work Items
3. Developer code lives in PR branches, merged
into Develop
4. Master keeps release versions
5. Code must compile before merge to develop
6. Builds run tests, scan for issues
7. Deployments are gated
Deployment
Pipelines
1. Build artifacts are created once
2. Continuous deployment ensures
compile, unit tests, etc.
3. Deployment to any environment
from CD requires approvals
4. Create different groups for
approvals to different
environments
Demo..
Audit and Controls for Data at Rest
Some Sample Controls
1. Ensure that Data is Encrypted at rest
2. Access to static data is controlled and audited
3. Ensure that Data is “Highly Available”
4. Ensure Data is Restorable, i.e. Loss Prevention
5. Ensure Data is auditable, i.e., Retention Policies
Implementation - SQL
1. TDE is available for Azure SQL. Uses Key Vault for
Encryption Keys.
2. Always Encrypted Option available.
Implementation – Storage Blob / Files
1. Storage Service
Encryption is also
available.
2. Key Management using
Key Vault.
Implementation - CosmosDB
1. Encrypted by default.
2. Backup to Blob is also
encrypted.
Demo…
Audit and Control for Data in Motion
Some Sample Controls
1. All end points use TLS
2. Authentication and Authorization is Implemented
3. All communication is secure in transit – not only from client
to server, but within a data center
Implementation
1. TLS is default in PaaS Services
2. ASEs can be setup web apps and web api for performance,
virtual networks, isolation
3. Azure site-to-site VPN
4. Azure Point-to-site VPN
5. ExpressRoute
Monitoring and Response
Some Sample Controls
1. All end points have logs for auditing.
2. All end points have monitoring available.
3. Alerts are set for disaster as well as security related events.
4. Diagnostics are available for all services.
Logging and Analysis Tools available
1. Application Insights
2. Azure Policy
3. Security Center
4. Azure Monitor
5. Others…
Demo…
Stay Connected
If you have questions or would like more
information, feel free to contact me via email
barkha.herman@agilethought.com
• www.agilethought.com
• www. linkedin.com/company/AgileThought
• @AgileThought
Ad

Recommended

강성훈, 실버바인 대기열 서버 설계 리뷰, NDC2019
강성훈, 실버바인 대기열 서버 설계 리뷰, NDC2019
devCAT Studio, NEXON
 
Introduction to jira
Introduction to jira
Khubaib Ahmed
 
토스 이직기 & 적응기 (99Con)
토스 이직기 & 적응기 (99Con)
HyunSeob Lee
 
Azure Infrastructure as Code and Hashicorp Terraform
Azure Infrastructure as Code and Hashicorp Terraform
Alex Mags
 
Final terraform
Final terraform
Gourav Varma
 
Platform as a Product: How to Delight Your Developers and Deliver Value for Y...
Platform as a Product: How to Delight Your Developers and Deliver Value for Y...
VMware Tanzu
 
Lightening Talk: definition of ready
Lightening Talk: definition of ready
Agileee
 
Agile Reporting in JIRA
Agile Reporting in JIRA
Cprime
 
How to test infrastructure code: automated testing for Terraform, Kubernetes,...
How to test infrastructure code: automated testing for Terraform, Kubernetes,...
Yevgeniy Brikman
 
Azure devops
Azure devops
Mohit Chhabra
 
Are we done yet?
Are we done yet?
Richard Cheng
 
JİRA'ya Giriş / Atlassian
JİRA'ya Giriş / Atlassian
Cansu Kaya
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
Tom Laszewski
 
B2B EDI Formats and MuleSoft X12 Connector
B2B EDI Formats and MuleSoft X12 Connector
Vikalp Bhalia
 
Jira Agile
Jira Agile
Peter Perger
 
NDC17 장창완(최종)
NDC17 장창완(최종)
창완 장
 
VMware Tanzu Kubernetes Connect
VMware Tanzu Kubernetes Connect
VMware Tanzu
 
Azure API Management
Azure API Management
jeremysbrown
 
Docker Swarm 0.2.0
Docker Swarm 0.2.0
Docker, Inc.
 
Vault
Vault
Jean-Philippe Bélanger
 
GitHub Actions in action
GitHub Actions in action
Oleksii Holub
 
Continuous Delivery
Continuous Delivery
Mike McGarr
 
Microservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native Apps
Araf Karsh Hamid
 
Kanban in Action Workshop
Kanban in Action Workshop
Mark Grove
 
SOLID & Design Patterns
SOLID & Design Patterns
Grokking VN
 
How to estimate in scrum
How to estimate in scrum
Gloria Stoilova
 
Terraform on Azure
Terraform on Azure
Mithun Shanbhag
 
Azure DevOps CI/CD For Beginners
Azure DevOps CI/CD For Beginners
Rahul Nath
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
kloia
 
Azure Security Check List - Final.pdf
Azure Security Check List - Final.pdf
Okan YILDIZ
 

More Related Content

What's hot (20)

How to test infrastructure code: automated testing for Terraform, Kubernetes,...
How to test infrastructure code: automated testing for Terraform, Kubernetes,...
Yevgeniy Brikman
 
Azure devops
Azure devops
Mohit Chhabra
 
Are we done yet?
Are we done yet?
Richard Cheng
 
JİRA'ya Giriş / Atlassian
JİRA'ya Giriş / Atlassian
Cansu Kaya
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
Tom Laszewski
 
B2B EDI Formats and MuleSoft X12 Connector
B2B EDI Formats and MuleSoft X12 Connector
Vikalp Bhalia
 
Jira Agile
Jira Agile
Peter Perger
 
NDC17 장창완(최종)
NDC17 장창완(최종)
창완 장
 
VMware Tanzu Kubernetes Connect
VMware Tanzu Kubernetes Connect
VMware Tanzu
 
Azure API Management
Azure API Management
jeremysbrown
 
Docker Swarm 0.2.0
Docker Swarm 0.2.0
Docker, Inc.
 
Vault
Vault
Jean-Philippe Bélanger
 
GitHub Actions in action
GitHub Actions in action
Oleksii Holub
 
Continuous Delivery
Continuous Delivery
Mike McGarr
 
Microservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native Apps
Araf Karsh Hamid
 
Kanban in Action Workshop
Kanban in Action Workshop
Mark Grove
 
SOLID & Design Patterns
SOLID & Design Patterns
Grokking VN
 
How to estimate in scrum
How to estimate in scrum
Gloria Stoilova
 
Terraform on Azure
Terraform on Azure
Mithun Shanbhag
 
Azure DevOps CI/CD For Beginners
Azure DevOps CI/CD For Beginners
Rahul Nath
 
How to test infrastructure code: automated testing for Terraform, Kubernetes,...
How to test infrastructure code: automated testing for Terraform, Kubernetes,...
Yevgeniy Brikman
 
JİRA'ya Giriş / Atlassian
JİRA'ya Giriş / Atlassian
Cansu Kaya
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
Tom Laszewski
 
B2B EDI Formats and MuleSoft X12 Connector
B2B EDI Formats and MuleSoft X12 Connector
Vikalp Bhalia
 
NDC17 장창완(최종)
NDC17 장창완(최종)
창완 장
 
VMware Tanzu Kubernetes Connect
VMware Tanzu Kubernetes Connect
VMware Tanzu
 
Azure API Management
Azure API Management
jeremysbrown
 
Docker Swarm 0.2.0
Docker Swarm 0.2.0
Docker, Inc.
 
GitHub Actions in action
GitHub Actions in action
Oleksii Holub
 
Continuous Delivery
Continuous Delivery
Mike McGarr
 
Microservices Architecture - Cloud Native Apps
Microservices Architecture - Cloud Native Apps
Araf Karsh Hamid
 
Kanban in Action Workshop
Kanban in Action Workshop
Mark Grove
 
SOLID & Design Patterns
SOLID & Design Patterns
Grokking VN
 
How to estimate in scrum
How to estimate in scrum
Gloria Stoilova
 
Azure DevOps CI/CD For Beginners
Azure DevOps CI/CD For Beginners
Rahul Nath
 

Similar to Control Freak: Risk and Control in Azure DevOps (20)

Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
kloia
 
Azure Security Check List - Final.pdf
Azure Security Check List - Final.pdf
Okan YILDIZ
 
Tour of Azure DevOps
Tour of Azure DevOps
Callon Campbell
 
Everything as Code with Azure DevOps
Everything as Code with Azure DevOps
Venura Athukorala
 
ADC 2017 - DevOps by examples part I – forward pipeline
ADC 2017 - DevOps by examples part I – forward pipeline
Giulio Vian
 
Azure DevOps Interview Questions PDF By ScholarHat
Azure DevOps Interview Questions PDF By ScholarHat
Scholarhat
 
Microsoft Skills Bootcamp - The power of GitHub and Azure
Microsoft Skills Bootcamp - The power of GitHub and Azure
Davide Benvegnù
 
Azure Security Compass v1.1 - Presentation.pptx
Azure Security Compass v1.1 - Presentation.pptx
ZaheerEbrahim5
 
Azure DevOps in Action
Azure DevOps in Action
Callon Campbell
 
What are the key features of Azure DevOps and how are they beneficial to the ...
What are the key features of Azure DevOps and how are they beneficial to the ...
kzayra69
 
DevSecOps - automating security
DevSecOps - automating security
John Staveley
 
Azure DevOps työkalut - Roundtable 14.3.2019
Azure DevOps työkalut - Roundtable 14.3.2019
Janne Mattila
 
Security Scanning Solutions_ Protecting Applications in the DevOps Era.pdf
Security Scanning Solutions_ Protecting Applications in the DevOps Era.pdf
Devseccops.ai
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
2nd Sight Lab
 
Azure_DevOps_Customer1212121_201903.pptx
Azure_DevOps_Customer1212121_201903.pptx
Ganesh Shirsat
 
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon
 
Zure Azure PaaS Zero to Hero - DevOps training day
Zure Azure PaaS Zero to Hero - DevOps training day
Okko Oulasvirta
 
Implementing DevOps Automation: Best Practices & Common Mistakes - DevOps Eas...
Implementing DevOps Automation: Best Practices & Common Mistakes - DevOps Eas...
Derek Ashmore
 
Past, Present and Future of DevOps Infrastructure
Past, Present and Future of DevOps Infrastructure
Synergetics Learning and Cloud Consulting
 
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
Alex Senkevitch
 
Secure Your Code Implement DevSecOps in Azure
Secure Your Code Implement DevSecOps in Azure
kloia
 
Azure Security Check List - Final.pdf
Azure Security Check List - Final.pdf
Okan YILDIZ
 
Everything as Code with Azure DevOps
Everything as Code with Azure DevOps
Venura Athukorala
 
ADC 2017 - DevOps by examples part I – forward pipeline
ADC 2017 - DevOps by examples part I – forward pipeline
Giulio Vian
 
Azure DevOps Interview Questions PDF By ScholarHat
Azure DevOps Interview Questions PDF By ScholarHat
Scholarhat
 
Microsoft Skills Bootcamp - The power of GitHub and Azure
Microsoft Skills Bootcamp - The power of GitHub and Azure
Davide Benvegnù
 
Azure Security Compass v1.1 - Presentation.pptx
Azure Security Compass v1.1 - Presentation.pptx
ZaheerEbrahim5
 
What are the key features of Azure DevOps and how are they beneficial to the ...
What are the key features of Azure DevOps and how are they beneficial to the ...
kzayra69
 
DevSecOps - automating security
DevSecOps - automating security
John Staveley
 
Azure DevOps työkalut - Roundtable 14.3.2019
Azure DevOps työkalut - Roundtable 14.3.2019
Janne Mattila
 
Security Scanning Solutions_ Protecting Applications in the DevOps Era.pdf
Security Scanning Solutions_ Protecting Applications in the DevOps Era.pdf
Devseccops.ai
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
2nd Sight Lab
 
Azure_DevOps_Customer1212121_201903.pptx
Azure_DevOps_Customer1212121_201903.pptx
Ganesh Shirsat
 
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon Boston 2018: Securing the Automated Pipeline: A Tale of Navigating ...
DevSecCon
 
Zure Azure PaaS Zero to Hero - DevOps training day
Zure Azure PaaS Zero to Hero - DevOps training day
Okko Oulasvirta
 
Implementing DevOps Automation: Best Practices & Common Mistakes - DevOps Eas...
Implementing DevOps Automation: Best Practices & Common Mistakes - DevOps Eas...
Derek Ashmore
 
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
DevSecOps: A Secure SDLC in the Age of DevOps and Hyper-Automation
Alex Senkevitch
 
Ad

More from AgileThought (6)

Adventures in Agile Testing
Adventures in Agile Testing
AgileThought
 
From Device To Cloud
From Device To Cloud
AgileThought
 
Operationalizing Machine Learning
Operationalizing Machine Learning
AgileThought
 
Patterns Are Good For Managers
Patterns Are Good For Managers
AgileThought
 
The Agile Journey
The Agile Journey
AgileThought
 
Psychology In UX
Psychology In UX
AgileThought
 
Adventures in Agile Testing
Adventures in Agile Testing
AgileThought
 
From Device To Cloud
From Device To Cloud
AgileThought
 
Operationalizing Machine Learning
Operationalizing Machine Learning
AgileThought
 
Patterns Are Good For Managers
Patterns Are Good For Managers
AgileThought
 
Ad

Recently uploaded (20)

GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
PyCon SG 25 - Firecracker Made Easy with Python.pdf
PyCon SG 25 - Firecracker Made Easy with Python.pdf
Muhammad Yuga Nugraha
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
From Manual to Auto Searching- FME in the Driver's Seat
From Manual to Auto Searching- FME in the Driver's Seat
Safe Software
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 

Control Freak: Risk and Control in Azure DevOps

  • 1. P re s e n t e d b y Control Freak: Risk and Control in Azure DevOps Barkha Herman South Florida Code Camp ‘18
  • 2. What will be covered: • Audit and Controls for Environments • Audit and Controls for Code • Audit and Controls Data at Rest • Audit and Controls Data In Motion • Monitoring and Response
  • 3. Audit and Control for Environments
  • 4. Some sample Controls: 1. Logical and physical Segregation of Environments 2. Lifecycle Methodology for Deployments 3. Process set for Approvals and review
  • 5. Implementation 1. Use ARM Templates to create PaaS and IaaS Applications 2. Use VSTS Branch Policies to control changes to Templates 3. Use a deployment Pipeline to control Environment Changes
  • 6. Use ARM Templates to deploy 1. Azure Resource Manager templates automate Deployment. 2. Creating environment becomes repeatable. 3. Creating environments can be scripted.
  • 7. 1.Use VSTS for Templates 1. Use VSTS to maintain ARM Templates and standardize changes to environments. 2. Use gitflow Pull Request Process to validate and audit any changes to the environments.
  • 8. 1.Use Pipelines for Deployments 1. Use Deployment Pipelines for Deployments. 2. Use SPNs for environments; devops cannot deploy directly to an environment. 3. Approvers setup for each environment – QA approvers differ from PROD approvers.
  • 10. Audit and Control for Code
  • 11. Some Sample Controls 1. Code is located in a secure location 2. Access to modify code is restricted 3. Code is reviewed, tested and scanned etc. 4. Code deployment is “gated” and “Audited”
  • 12. Implementation 1. Git Flow & Branch Policies in VSTS 2. Build once, deploy several for consistency 3. Deployment Pipeline with Approvals for “Gates” and audits
  • 13. Git Flow + Controls 1. Use GitFlow 2. Pull Requests for Merges, required reviews and Work Items 3. Developer code lives in PR branches, merged into Develop 4. Master keeps release versions 5. Code must compile before merge to develop 6. Builds run tests, scan for issues 7. Deployments are gated
  • 14. Deployment Pipelines 1. Build artifacts are created once 2. Continuous deployment ensures compile, unit tests, etc. 3. Deployment to any environment from CD requires approvals 4. Create different groups for approvals to different environments
  • 16. Audit and Controls for Data at Rest
  • 17. Some Sample Controls 1. Ensure that Data is Encrypted at rest 2. Access to static data is controlled and audited 3. Ensure that Data is “Highly Available” 4. Ensure Data is Restorable, i.e. Loss Prevention 5. Ensure Data is auditable, i.e., Retention Policies
  • 18. Implementation - SQL 1. TDE is available for Azure SQL. Uses Key Vault for Encryption Keys. 2. Always Encrypted Option available.
  • 19. Implementation – Storage Blob / Files 1. Storage Service Encryption is also available. 2. Key Management using Key Vault.
  • 20. Implementation - CosmosDB 1. Encrypted by default. 2. Backup to Blob is also encrypted.
  • 22. Audit and Control for Data in Motion
  • 23. Some Sample Controls 1. All end points use TLS 2. Authentication and Authorization is Implemented 3. All communication is secure in transit – not only from client to server, but within a data center
  • 24. Implementation 1. TLS is default in PaaS Services 2. ASEs can be setup web apps and web api for performance, virtual networks, isolation 3. Azure site-to-site VPN 4. Azure Point-to-site VPN 5. ExpressRoute
  • 26. Some Sample Controls 1. All end points have logs for auditing. 2. All end points have monitoring available. 3. Alerts are set for disaster as well as security related events. 4. Diagnostics are available for all services.
  • 27. Logging and Analysis Tools available 1. Application Insights 2. Azure Policy 3. Security Center 4. Azure Monitor 5. Others…
  • 29. Stay Connected If you have questions or would like more information, feel free to contact me via email [email protected] • www.agilethought.com • www. linkedin.com/company/AgileThought • @AgileThought