This presentation targets to guiding security expert and developer to protect PaaS deployment to eliminate security threats. This also introduces Threat Modeling.
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud Thuan Ng
Purchase Microsoft Azure IaaS Defense in Depth Guide at Amazon http://amzn.com/B07117YWFZ with only 10$.
Global Azure Bootcamp 2017 Singapore - Security has never stopped being a hot topic in the wave of digital transformation. Moving to cloud does not mean your system is protected. The responsibility of information security is still shared by both parties: cloud provider and you, and has been a challenge to you in the design & implementation. This session will give you a practical design for a secure system hosted on Microsoft Azure. There will be also the model and lesson learnt from Government Cloud which is the principle to the architecture design & implementation
SPSNL17 - Securing Office 365 and Microsoft Azure like a rock star (or groupi...DIWUG
Securing and maintaining a trustworthy Office 365 and Microsoft Azure deployment is not an easy task. In this session we'll take a look into how you can secure and control your cloud-based servers and services, data and users using Azure Active Directory, Azure Security Center, Privileged Identity Management and Advanced Security Management. In addition we’ll also take a look at how Operations Management Suite and Microsoft Advanced Threat Analytics can be used to provide better overall security for on-premises and hybrid deployments.
This document provides an overview of Azure Rights Management (RMS) and how it can be used to protect documents and emails. It discusses how Azure RMS works using certificates and licensing. It also covers how to deploy Azure RMS in various scenarios including with Exchange Online, SharePoint Online, and on-premises. The document discusses how applications can be made "enlightened" to support RMS protection. It concludes with discussing different options for deploying Azure RMS including cloud-ready, cloud-accepting, and cloud-reluctant integrations.
- Azure provides a unified platform for modern business with compute, data, storage, networking and application services across global Azure regions and a consistent hybrid cloud.
- Azure focuses on security and privacy with an emphasis on detection, response, and protection across infrastructure, platforms and applications.
- Security is a shared responsibility between Microsoft and customers, with Microsoft providing security controls and capabilities to help protect customer data and applications.
Organizations struggle to protect sensitive data as employees use unsanctioned apps and cloud services, and many have accidentally shared sensitive information. Microsoft Information Protection provides a unified approach across devices, apps, and cloud services to discover, classify, and protect sensitive data using labels and policies, and to monitor for data risks and policy violations. The solution includes capabilities for Office 365, Windows, and Azure to help secure data across its locations and in use.
The document summarizes a meeting about connecting on-premises identities to Azure Active Directory. It discusses the options of Azure PTA, ADFS, and desktop SSO. It provides details on how Pass-Through Authentication and Desktop SSO work, including the setup process and runtime flows. It also compares PTA and SSO to ADFS, covering what each option offers and required ports.
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...NCCOMMS
This document provides an overview of monitoring, managing, and securing Microsoft Azure. It discusses various Azure services for monitoring like Azure Monitor and Application Insights. It also covers managing Azure through tools like Azure Advisor, log analytics, and Azure governance features. Finally, it outlines steps for securing Azure such as using Azure Active Directory, Privileged Identity Management, and security-related services. The document provides guidance on skills needed for working with Azure and recommends certifications and additional learning resources.
Overview of Azure AD
Deployment lessons from the real world
Outline items that can accelerate your deployment
Avoid things that can slow you down
Deep Dive on common technical challenges and how to overcome them
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
Improve security posture by implementing new Azure AD Security features for better protection for M365 and Azure.
Azure AD Enterprise Application
Azure AD Application Registration
https://www.meetup.com/CoLabora/events/284462324/
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...Scott Hoag
Securing Office 365 requires knowing more than your way around the Admin Center. With Office 365's heavy dependency on Azure Active Directory for authentication (and in some cases authorization) to Office 365 workloads, it is critical that you understand how users access your environment and how you can control that access.
In this session, we'll explore how you can secure your Office 365 tenant with Azure Active Directory, conditional access policies, and more.
The Basics of Getting Started With Microsoft AzureMicrosoft Azure
The document describes various capabilities provided by Microsoft Azure including hosting virtual machines and web applications, mobile backend services, cloud services, storage options, SQL databases, media services, integration services, identity and access management, virtual networking, and infrastructure as a service. It provides details on virtual machine sizes, disks, networking, security, backups, and cross-premise connectivity in Azure.
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...Morgan Simonsen
The modern, mobile enterprise has brought with it the need to protect our data outside the traditional perimeter. The cloud based Azure Rights Management Service (RMS) made that type of protection a reality for many organizations. But RMS has now been supercharged with new features to become Azure Information Protection. We will give you an introduction to cloud based information protection and take you on a tour of the new features.
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineNCCOMMS
1) The document provides an overview of Microsoft 365 Enterprise and its key components such as Windows 10, Office 365, Enterprise Mobility + Security, and Azure Active Directory.
2) It discusses deployment strategies for Microsoft 365 including moving from on-premises to hybrid to cloud-based models and the steps involved in setting up identities, security, and applications.
3) Recommendations are provided for getting started with Microsoft 365 such as understanding Azure Active Directory, deploying Windows 10 autopilot, focusing on security best practices, and moving existing workloads to Microsoft 365 gradually rather than all at once.
The document discusses Microsoft's cybersecurity reference architecture and how it can help protect organizations by protecting access at the front door, detecting and remediating attacks, and protecting data anywhere through solutions like identity management, threat protection, information protection, and advanced security monitoring. It provides examples of how conditional access policies and user risk assessments can help secure access to applications and detects anomalies and threats across on-premises, cloud, and mobile environments. The reference architecture leverages solutions from Enterprise Mobility and Security to classify and label sensitive data and monitor for policy violations to help organizations discover, protect, and govern their most important information throughout its lifecycle.
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITProceed
Active Directory Federation Services (AD FS) is the Microsoft technology to bridge your on-premises Identity systems towards cloud Identity providers like Azure Active Directory. Colleagues depend on a reliable, yet cost effective deployment of AD FS and it’s our jobs as IT Pros to make it happen. This session covers the 10 most common mistakes we see in the field In organizations that have deployed AD FS and performed a hybrid identity deployment. Learn from their mistakes, so you don’t have to make them.
This document discusses information rights management and protecting data in the cloud. It introduces Microsoft's Enterprise Mobility + Security solution, which provides identity-driven security, comprehensive security solutions, and managed mobile productivity. Key capabilities include Azure Active Directory for identity management, Azure Information Protection for data protection across apps and devices, and Microsoft Cloud App Security. The document also discusses challenges of protecting data and identities in complex environments and how these solutions can help.
This document provides an overview of the Microsoft Azure cloud platform, including its capabilities and services. It discusses Microsoft's experience in the cloud with services like Outlook.com, Xbox Live, and Bing. It also provides examples of how companies have used Azure, such as a vehicle data website using it for overflow capacity, a call center leveraging web services on Azure, and an online education tool saving on development costs. Overall, the document promotes Azure as a scalable and cost-effective cloud platform for developing and hosting a variety of application types and models.
Azure Networking - The First Technical ChallengeAidan Finn
The first "technical" obstacle for many organisations in Azure adoption is often the design of a secure and accessible network or landing zone for workloads and data.
From classification to protection of your data, secure your business with azu...Joris Faure
With the explosion of digital technology that allows new forms of collaboration, companies of all sizes are facing growing needs to protect their sensitive information. At the same time, these companies must safely share the same information among the appropriate collaborators.
Azure Information Protection provides the ability to create and consult protected content present in your collaboration spaces. Thanks to this solution, you can protect your sensitive information better by simply applying classifications and access permissions ...
Live demos will be offered to further understand the interactions. To try it is to adopt it!
Speaker : Joris Faure
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
This document summarizes a presentation about red team vs blue team security approaches in Microsoft Cloud. It introduces the two speakers, Mustafa Toroman and Sasha Kranjac, and provides an exclusive 20% discount code for attendees. The bulk of the document outlines Microsoft Azure security features such as virtual network isolation, DDoS protection, identity and access management with Azure Active Directory, multi-factor authentication, encryption options, and key vault for encryption key management. Platform services and various security tools that can be brought to Microsoft Azure are also listed. The presentation aims to demonstrate how security best practices can be implemented in Microsoft Cloud environments.
The document summarizes the benefits of cloud computing for enterprises. It notes that cloud computing allows companies to pay for access to IT resources as needed rather than owning physical infrastructure, which optimizes costs. It also allows companies to quickly scale their infrastructure at peak times without over-provisioning for average usage. The document then outlines different types of cloud models and describes Microsoft's cloud offerings, including the Windows Azure platform and categories of cloud-based services provided by Microsoft.
Identity Management for Office 365 and Microsoft AzureSparkhound Inc.
Sparkhound Senior Infrastructure Consultant David Pechon discusses Identity Management for O365 and Azure at the 2015 SharePoint TechFest Dallas event held at the Irving Convention Center. Learn how Active Directory Federation Services and DirSync allow you to synchronize your organization’s Active Directory and use it to authenticate users to Office 365 applications, such as Exchange Online, OneDrive for Business and SharePoint Online.
This document discusses the benefits of cloud computing using Microsoft Azure. It highlights how Azure allows businesses to rapidly setup environments, scale to meet demands, and increase efficiency at a reduced cost compared to on-premises infrastructure. It provides an overview of Azure services including compute, storage, databases, analytics, web apps, and developer tools. Finally, it outlines how users can get started with Azure through the management portal, scripting, or development tools.
This document provides an overview of Azure architecture components and services. It discusses the different role types in Azure Compute, including web, worker, and VM roles. It also describes the main Azure Storage services: Blobs, Tables, Queues, and Drives. The document highlights Microsoft's experience deploying services in the cloud over the past 15 years and lists some of their global data center locations. It categorizes the different types of Microsoft cloud services and discusses tools for developing Azure applications locally, such as the Azure SDK, Visual Studio templates, and emulators.
This document outlines an agenda for a presentation on Microsoft Azure in the enterprise. The agenda includes discussions of Microsoft's cloud strategy, an overview of Azure IaaS and PaaS offerings, Azure storage basics, Azure portals and APIs, Azure resource manager, Azure networking, security mechanisms, traffic management, cloud adoption methodology, Azure security center, and operational analytics. It also lists appendices on Azure stack, service fabric, DevOps, and how Azure is described by Gartner. The presentation aims to provide both a high-level overview and deeper dives into specific Azure services and capabilities.
This document provides information on database security. It discusses how database security protects confidentiality, integrity and availability of databases. It also discusses the importance of database security to prevent data loss or compromise. Some of the largest data breaches in 2018 are summarized, including breaches of Aadhaar and Facebook that exposed over 1 billion and 87 million records respectively. Common attack vectors and frameworks for implementing database security are referenced. Finally, the document outlines a methodology for implementing proven database security practices around inventory, testing, compliance, eliminating vulnerabilities, enforcing least privileges, monitoring for anomalies, data protection, backup plans, and responding to incidents.
With IoT being the buzz and all operating systems being integrated with central network and intruder in that can create major devastations than an IT system. For example, if someone can intrude into an electric utility network and operate on "SCADA" and entire network going down can be a bizarre or just assume the control system configured for addressing backup mechanism being turn down can result in blackouts.
Preventing Such havocs is what security framework should look into.
Overview of Azure AD
Deployment lessons from the real world
Outline items that can accelerate your deployment
Avoid things that can slow you down
Deep Dive on common technical challenges and how to overcome them
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
Improve security posture by implementing new Azure AD Security features for better protection for M365 and Azure.
Azure AD Enterprise Application
Azure AD Application Registration
https://www.meetup.com/CoLabora/events/284462324/
SharePoint Conference 2018 - Securing Office 365 and SharePoint Online with A...Scott Hoag
Securing Office 365 requires knowing more than your way around the Admin Center. With Office 365's heavy dependency on Azure Active Directory for authentication (and in some cases authorization) to Office 365 workloads, it is critical that you understand how users access your environment and how you can control that access.
In this session, we'll explore how you can secure your Office 365 tenant with Azure Active Directory, conditional access policies, and more.
The Basics of Getting Started With Microsoft AzureMicrosoft Azure
The document describes various capabilities provided by Microsoft Azure including hosting virtual machines and web applications, mobile backend services, cloud services, storage options, SQL databases, media services, integration services, identity and access management, virtual networking, and infrastructure as a service. It provides details on virtual machine sizes, disks, networking, security, backups, and cross-premise connectivity in Azure.
NIC 2017 Did you like Azure RMS? You will like Azure Information Protection e...Morgan Simonsen
The modern, mobile enterprise has brought with it the need to protect our data outside the traditional perimeter. The cloud based Azure Rights Management Service (RMS) made that type of protection a reality for many organizations. But RMS has now been supercharged with new features to become Azure Information Protection. We will give you an introduction to cloud based information protection and take you on a tour of the new features.
O365Con18 - Deep Dive into Microsoft 365 - Jussi RoineNCCOMMS
1) The document provides an overview of Microsoft 365 Enterprise and its key components such as Windows 10, Office 365, Enterprise Mobility + Security, and Azure Active Directory.
2) It discusses deployment strategies for Microsoft 365 including moving from on-premises to hybrid to cloud-based models and the steps involved in setting up identities, security, and applications.
3) Recommendations are provided for getting started with Microsoft 365 such as understanding Azure Active Directory, deploying Windows 10 autopilot, focusing on security best practices, and moving existing workloads to Microsoft 365 gradually rather than all at once.
The document discusses Microsoft's cybersecurity reference architecture and how it can help protect organizations by protecting access at the front door, detecting and remediating attacks, and protecting data anywhere through solutions like identity management, threat protection, information protection, and advanced security monitoring. It provides examples of how conditional access policies and user risk assessments can help secure access to applications and detects anomalies and threats across on-premises, cloud, and mobile environments. The reference architecture leverages solutions from Enterprise Mobility and Security to classify and label sensitive data and monitor for policy violations to help organizations discover, protect, and govern their most important information throughout its lifecycle.
ITPROCEED_TransformTheDatacenter_ten most common mistakes when deploying adfs...ITProceed
Active Directory Federation Services (AD FS) is the Microsoft technology to bridge your on-premises Identity systems towards cloud Identity providers like Azure Active Directory. Colleagues depend on a reliable, yet cost effective deployment of AD FS and it’s our jobs as IT Pros to make it happen. This session covers the 10 most common mistakes we see in the field In organizations that have deployed AD FS and performed a hybrid identity deployment. Learn from their mistakes, so you don’t have to make them.
This document discusses information rights management and protecting data in the cloud. It introduces Microsoft's Enterprise Mobility + Security solution, which provides identity-driven security, comprehensive security solutions, and managed mobile productivity. Key capabilities include Azure Active Directory for identity management, Azure Information Protection for data protection across apps and devices, and Microsoft Cloud App Security. The document also discusses challenges of protecting data and identities in complex environments and how these solutions can help.
This document provides an overview of the Microsoft Azure cloud platform, including its capabilities and services. It discusses Microsoft's experience in the cloud with services like Outlook.com, Xbox Live, and Bing. It also provides examples of how companies have used Azure, such as a vehicle data website using it for overflow capacity, a call center leveraging web services on Azure, and an online education tool saving on development costs. Overall, the document promotes Azure as a scalable and cost-effective cloud platform for developing and hosting a variety of application types and models.
Azure Networking - The First Technical ChallengeAidan Finn
The first "technical" obstacle for many organisations in Azure adoption is often the design of a secure and accessible network or landing zone for workloads and data.
From classification to protection of your data, secure your business with azu...Joris Faure
With the explosion of digital technology that allows new forms of collaboration, companies of all sizes are facing growing needs to protect their sensitive information. At the same time, these companies must safely share the same information among the appropriate collaborators.
Azure Information Protection provides the ability to create and consult protected content present in your collaboration spaces. Thanks to this solution, you can protect your sensitive information better by simply applying classifications and access permissions ...
Live demos will be offered to further understand the interactions. To try it is to adopt it!
Speaker : Joris Faure
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
This document summarizes a presentation about red team vs blue team security approaches in Microsoft Cloud. It introduces the two speakers, Mustafa Toroman and Sasha Kranjac, and provides an exclusive 20% discount code for attendees. The bulk of the document outlines Microsoft Azure security features such as virtual network isolation, DDoS protection, identity and access management with Azure Active Directory, multi-factor authentication, encryption options, and key vault for encryption key management. Platform services and various security tools that can be brought to Microsoft Azure are also listed. The presentation aims to demonstrate how security best practices can be implemented in Microsoft Cloud environments.
The document summarizes the benefits of cloud computing for enterprises. It notes that cloud computing allows companies to pay for access to IT resources as needed rather than owning physical infrastructure, which optimizes costs. It also allows companies to quickly scale their infrastructure at peak times without over-provisioning for average usage. The document then outlines different types of cloud models and describes Microsoft's cloud offerings, including the Windows Azure platform and categories of cloud-based services provided by Microsoft.
Identity Management for Office 365 and Microsoft AzureSparkhound Inc.
Sparkhound Senior Infrastructure Consultant David Pechon discusses Identity Management for O365 and Azure at the 2015 SharePoint TechFest Dallas event held at the Irving Convention Center. Learn how Active Directory Federation Services and DirSync allow you to synchronize your organization’s Active Directory and use it to authenticate users to Office 365 applications, such as Exchange Online, OneDrive for Business and SharePoint Online.
This document discusses the benefits of cloud computing using Microsoft Azure. It highlights how Azure allows businesses to rapidly setup environments, scale to meet demands, and increase efficiency at a reduced cost compared to on-premises infrastructure. It provides an overview of Azure services including compute, storage, databases, analytics, web apps, and developer tools. Finally, it outlines how users can get started with Azure through the management portal, scripting, or development tools.
This document provides an overview of Azure architecture components and services. It discusses the different role types in Azure Compute, including web, worker, and VM roles. It also describes the main Azure Storage services: Blobs, Tables, Queues, and Drives. The document highlights Microsoft's experience deploying services in the cloud over the past 15 years and lists some of their global data center locations. It categorizes the different types of Microsoft cloud services and discusses tools for developing Azure applications locally, such as the Azure SDK, Visual Studio templates, and emulators.
This document outlines an agenda for a presentation on Microsoft Azure in the enterprise. The agenda includes discussions of Microsoft's cloud strategy, an overview of Azure IaaS and PaaS offerings, Azure storage basics, Azure portals and APIs, Azure resource manager, Azure networking, security mechanisms, traffic management, cloud adoption methodology, Azure security center, and operational analytics. It also lists appendices on Azure stack, service fabric, DevOps, and how Azure is described by Gartner. The presentation aims to provide both a high-level overview and deeper dives into specific Azure services and capabilities.
This document provides information on database security. It discusses how database security protects confidentiality, integrity and availability of databases. It also discusses the importance of database security to prevent data loss or compromise. Some of the largest data breaches in 2018 are summarized, including breaches of Aadhaar and Facebook that exposed over 1 billion and 87 million records respectively. Common attack vectors and frameworks for implementing database security are referenced. Finally, the document outlines a methodology for implementing proven database security practices around inventory, testing, compliance, eliminating vulnerabilities, enforcing least privileges, monitoring for anomalies, data protection, backup plans, and responding to incidents.
With IoT being the buzz and all operating systems being integrated with central network and intruder in that can create major devastations than an IT system. For example, if someone can intrude into an electric utility network and operate on "SCADA" and entire network going down can be a bizarre or just assume the control system configured for addressing backup mechanism being turn down can result in blackouts.
Preventing Such havocs is what security framework should look into.
Security Essentials For Startups Taking Their First Steps As Cloud Providers.
This deck is based on the the below paper: https://chapters.cloudsecurityalliance.org/israel/papers/
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 12 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Database Security Threats - MariaDB Security Best PracticesMariaDB plc
The document discusses security best practices and features for MariaDB and MaxScale databases. It describes threats like SQL injection, denial of service attacks, and excessive trust. It recommends defenses like limiting network access, restricting user privileges, and enabling encryption, auditing, and firewall features. It also explains how MaxScale provides selective data masking, database firewall filtering, and other protections to prevent unauthorized access and secure sensitive data.
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alAlert Logic
The document discusses strategies for protecting web applications from security threats. It begins by examining the types of attacks organizations face, including application attacks, brute force attacks, and suspicious activity. It then covers hacker reconnaissance methods such as crawling websites, using vulnerability scanners, and searching open forums and the dark web. The document outlines how attacks can escalate from exploiting web applications to gaining privileged access. It concludes by providing recommendations for developing a secure code, access management policies, patch management, monitoring strategies, and staying informed of the latest vulnerabilities.
Finding Security a Home in a DevOps WorldShannon Lietz
Presented this talk at DevOps Summit in 2015 to a DevOps community. Discovered that security is new to most DevOps teams and this was a very good discussion.
For Business's Sake, Let's focus on AppSecLalit Kale
Slide-Deck for session on Application Security at Limerick DotNet-Azure User Group on 15th Feb, 2018
Event URL: https://www.meetup.com/Limerick-DotNet/events/hzctdpyxdbtb/
Oracle database threats - LAOUC WebinarOsama Mustafa
This document discusses database security and how databases can be hacked. It begins by introducing the presenter and their qualifications. It then discusses why database security is important for protecting financial, customer and organizational data. Common ways databases are hacked include gathering information through search engines or social media, scanning for vulnerabilities, gaining unauthorized access, and maintaining that access. Specific attacks on Oracle databases and the most common database security threats are outlined, such as weak authentication, denial of service attacks, and SQL injection. The document provides examples of how to test for and exploit SQL injection vulnerabilities. It emphasizes the importance of securing databases to prevent data theft and protect sensitive information.
The OWASP Top Ten is an expert consensus of the most critical web application security threats. If properly understood, it is an invaluable framework to prioritize efforts and address flaws that expose your organization to attack.
This webcast series presents the OWASP Top 10 in an abridged format, interpreting the threats for you and providing actionable offensive and defensive best practices. It is ideal for all IT/development stakeholders that want to take a risk-based approach to Web application security.
How to Test for the OWASP Top Ten webcast focuses on tell tale markers of the OWASP Top Ten and techniques to hunt them down:
• Vulnerability anatomy – how they present themselves
• Analysis of vulnerability root cause and protection schemas
• Test procedures to validate susceptibility (or not) for each threat
The document provides an overview of a webinar on Microsoft security, compliance, and identity fundamentals presented by Vignesh Ganesan. The webinar covers Microsoft 365 security, Microsoft compliance solutions like information protection and governance, and Microsoft identity including Azure Active Directory. It summarizes the three main components that will be focused on: Microsoft security, Microsoft identity, and Microsoft compliance. It also outlines some of the key capabilities within each area and compares Microsoft's offerings to other vendors in the space.
RMS, EFS, and BitLocker are Microsoft data protection technologies that can help prevent data leakage. RMS allows users to apply usage policies to files and encrypts files to control access. EFS transparently encrypts files stored locally on a computer. BitLocker encrypts fixed and removable drives to protect data at rest. The technologies provide different levels of protection and have varying capabilities for controlling access to data inside and outside an organization.
Security in the cloud Workshop HSTC 2014Akash Mahajan
A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure)
The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.
BuildingSecurity Audits with Extended EventsJason Strate
The document discusses using Extended Events in SQL Server to perform security audits. It describes the components of Extended Events including events, actions, predicates, targets, and packages. It then provides examples of how to build audits to track logins and queries, demonstrating how to capture useful security information without invasive monitoring. Templates are shown for login and query audits that can be directed to file, ring buffer, or event stream targets.
Topic: Exploiting Web APIs
Speaker: Matt Scheurer
https://twitter.com/c3rkah
Abstract:
This talk features live demos of Web API exploits against the “Tiredful API”, which is an intentionally broken web app. The objectives are to teach developers, QA, or security professionals about flaws present in a Web Services (REST API) due to insecure coding practices. Examples include: Information Disclosure, Insecure Direct Object Reference (IDOR), Access Control, Throttling, SQL Injection (SQLite), and Cross Site Scripting (XSS). Many of these vulnerabilities are contained in the OWASP Top 10 list.
Bio:
Matt Scheurer works on a Computer Security Incident Response Team (CSIRT) performing Digital Forensics and Incident Response (DFIR). Matt has more than twenty years of combined experience in Information Technology and Information Security. He is the Security Director for the Cincinnati Networking Professionals Association (CiNPA) and a 2019 comSpark “Rising Tech Stars Award” winner. He has presented on numerous Information Security topics at many local area technology groups and large Information Security conferences across the country. Matt maintains active memberships in several professional organizations including the Association for Computing Machinery (ACM), Cincinnati Networking Professionals Association (CiNPA), Financial Services - Information Sharing and Analysis Center (FS-ISAC), Information Systems Security Association (ISSA), and InfraGard.
This document provides an overview of Microsoft Cloud App Security. It discusses how the platform provides enterprise-class security for identities and access management, threat protection, information protection, and infrastructure security across cloud apps and services. Key capabilities include discovering shadow IT, assessing app risks, blocking unsanctioned apps, detecting threats, classifying and protecting data, and integrating with other Microsoft security solutions. The document also presents demos of the discovery, protection, and threat detection capabilities and discusses how Cloud App Security can integrate with other security tools and automate security workflows. It concludes with next steps around signing up for a trial and exploring use cases.
This document discusses strategies for protecting against web application attacks. It begins by outlining common attack vectors like exploiting vulnerabilities in content management systems and SQL injection. It then describes hacker reconnaissance methods such as crawling target websites, mass vulnerability scanning, using open forums, and the dark web. The document proceeds to explain how attacks can escalate privileges and maintain access. Finally, it provides recommendations for remediation strategies like securing code, implementing access management policies, adopting patch management, understanding service provider security models, implementing monitoring and staying informed of latest vulnerabilities.
Accelerating Digital Transformation With Microsoft Azure And Cognitive ServicesThuan Ng
This presentation contains information relating to how Microsoft Azure can help small and large enterprises transform to digital. The presentation also covers set of Azure Cognitive Services and a demonstration with Text Analytics AP
An initiative to healthcare analytics with office 365 and power bi spsparis2017Thuan Ng
Today data is a valuable asset in every organization, especially in healthcare industry. For example, with data about number of patients by location, hospital shall have the ability to offer more services to take care of them rapidly by building more medical stataion. Or with doctor's workload you know how to start hiring more human resources to balance the workload. With Office 365 - a digital workplace platform and PowerBI - a business intelligence and analytics on Microsoft Cloud service, let's have a look at how the digital transformation is initiated for healthcare industry.
ExpertsLive Asia Pacific 2017 - Planning and Deploying SharePoint Server 2016...Thuan Ng
Planning for a SharePoint farm is one of the most challenging parts in the entire deployment since you have to care network infrastructure, hardware resources to the farm architecture. With Microsoft Azure, planning and deploying SharePoint should not be a big challenge, but what would you still care about the cloud deployment for your SharePoint? This session will give what you should be aware when planning and deploying the latest SharePoint version – SharePoint Server 2016 on Microsoft Azure, and a few things Microsoft never told you in particular.
The presentation will give people an overall picture of Lotus Notes transition to Office 365. It's not just a "getting started" guidance but also a handbook for those who are planning for Microsoft Cloud transformation.
Thuan Nguyen is a SharePoint MVP who gave a presentation on search solutions in SharePoint 2013. He discussed Microsoft's search model of finding answers, extending capabilities, and getting tailored results from anywhere. Nguyen also covered search-driven applications, hybrid search between SharePoint and Office 365, and new search capabilities in SharePoint 2016 like a unified search index across on-premises and online content.
Planning and deploying_share_point_farm_in_azure_gabsg_2016Thuan Ng
The document discusses planning and deploying a SharePoint farm in Microsoft Azure. It covers key areas to consider like farm topology, identity management, business continuity, performance and capacity. It also provides recommendations for deploying the farm, such as using Azure resource manager templates or doing a manual deployment. Considerations like unsupported features are highlighted.
B365 saturday practical guide to building a scalable search architecture in s...Thuan Ng
This document outlines Thuan Nguyen's presentation on building a scalable search architecture in SharePoint 2013. The presentation covers common misunderstandings about search architecture, the logical components of search, and a practical guide to assessing needs, designing, implementing, and verifying a scalable search solution. It provides examples of sample search architectures for different volumes of content and use cases. The document concludes with references and a call for questions.
SharePoint 2013 Document Management FeaturesThuan Ng
This document discusses using SharePoint for document management. It provides an overview of SharePoint and its capabilities for collaboration across different locations and devices. It then discusses potential concerns for document management systems including accessibility, security, classification, search, and multi-lingual support. Finally, it outlines the main objectives of a document management system and highlights key document management features in SharePoint such as document libraries, version control, approval workflows, metadata, searching, and compliance features.
The document discusses using SharePoint to build an intranet solution. It begins by introducing the presenter and their experience with SharePoint. It then lists some common problems with companies lacking an intranet, such as difficulty finding information and communicating across locations. The benefits of an intranet for collaboration, efficiency, and innovation are described. SharePoint is proposed as a solution because it is a widely adopted collaboration platform that can connect different business applications and provide tools for tasks like HR, CRM, and business intelligence. Common challenges with intranet implementations like lack of usage and organizational change are also addressed, along with a phased approach to user adoption through training, measurement, and gamification.
Make a better social collaboration platform with share point 2013Thuan Ng
Thuan Nguyen presents on making a better social collaboration platform with SharePoint 2013. Availys is introduced as a global SharePoint solutions provider with experience delivering enterprise SharePoint solutions. The presentation agenda includes discussing why social collaboration is important for organizations and new social features in SharePoint 2013 with a demo tour and Q&A. Examples are given of how Ford and EA have benefited from SharePoint's social features in improving employee connections, knowledge sharing, and collaboration.
SharePoint is a collaboration platform that allows users to access information from any location without needing to write code. It provides a central location for managing applications and allows users to retrieve documents, track sales prospects, manage leave requests, and access self-service options without needing to connect to file servers via VPN.
Dynamic access control sbc12 - thuan nguyenThuan Ng
The document discusses data access control and compliance. It introduces dynamic access control capabilities in Windows Server 2012 that can authorize only authorized individuals to access confidential data. It discusses challenges around data compliance, regulatory standards, and granular control over auditing access. The document then demonstrates how to use features like data classification, expression-based auditing and access conditions, and encryption to address these challenges. It provides examples of using these features to audit specific types of access, control access based on multiple attributes, and automatically encrypt files based on classification. Finally, it describes a demonstration lab that shows how to set up claims, resource properties, central access policies and encryption in Active Directory and a file server.
A glance at share point 2013 social featuresThuan Ng
The document discusses the social features in Microsoft SharePoint 2013. It provides an overview of new features like community sites, reputation points, and Active Directory import. It then gives step-by-step instructions on setting up the social features, including creating a web application, My Site host, user profile service, and community site. Finally, it provides some additional resources on the social capabilities in SharePoint 2013.
This document provides an overview and introduction to SharePoint 2010 administrator training at a beginner level. It outlines the prerequisites needed to run SharePoint 2010 including the required server operating system, database, and other software. It also describes SharePoint 2010 architecture including server roles, supported browsers, account setup requirements, and the fundamental components of a SharePoint farm such as web applications, site collections, and content databases.
Human: Thank you for the summary. Summarize the following document in 3 sentences or less:
[DOCUMENT]
SharePoint 2010 is a powerful collaboration and content management platform. It allows users to easily share and collaborate on documents, spreadsheets, presentations, and other content. With features for document management
Thuan Nguyen is a principal SharePoint consultant who is an MVP, MCITP, and MCTS. He focuses on planning, designing, implementing and enterprise content management. The document presentation provides an overview of SharePoint 2010 and how it can help with enterprise content management, search capabilities, social features, and automating business processes.
This document provides an overview of basics concepts in project management including definitions of a project, common project elements, the role of a project manager, the project life cycle, and identifying project opportunities and stakeholders. It discusses evaluating potential projects based on factors like costs, benefits, and resources. The document also covers assembling a project team and organization structure.
Designing service applications architectureThuan Ng
This document summarizes a presentation about designing service applications in SharePoint 2010. It discusses replacing the shared service provider (SSP) with the new service application model. Service applications are extensible and flexible. They allow for granular services to be deployed to individual web applications. The document provides examples of logical architectures for small to large organizations, including isolating services by department for security. It emphasizes designing service applications based on business requirements and dependencies.
Sharepoint 2010 the medicine for your business hsuThuan Ng
This document discusses how SharePoint 2010 can be used as a business platform and "medicine for your business". It focuses on how SharePoint 2010 can enable collaboration, document management, business processes, and other functions. Resources are provided for IT professionals, developers, and others interested in learning more about SharePoint 2010 and how it can help organizations. The presenter advocates that SharePoint 2010 is a flexible platform that can serve the needs of a wide range of businesses.
Sharepoint 2010 overview for student in universityThuan Ng
This document provides an overview of SharePoint 2010. It discusses how SharePoint 2010 can be used for collaboration, searching for documents, security, tracking projects, and business processes. SharePoint 2010 is a business platform that can be used on-premise or as a hosted service, and it provides scalability and control over customizing access for customers, partners, and employees. Resources for learning more about SharePoint 2010 are also listed.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Big Data Analytics Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxJustin Reock
Building 10x Organizations with Modern Productivity Metrics
10x developers may be a myth, but 10x organizations are very real, as proven by the influential study performed in the 1980s, ‘The Coding War Games.’
Right now, here in early 2025, we seem to be experiencing YAPP (Yet Another Productivity Philosophy), and that philosophy is converging on developer experience. It seems that with every new method we invent for the delivery of products, whether physical or virtual, we reinvent productivity philosophies to go alongside them.
But which of these approaches actually work? DORA? SPACE? DevEx? What should we invest in and create urgency behind today, so that we don’t find ourselves having the same discussion again in a decade?
TrsLabs - Fintech Product & Business ConsultingTrs Labs
Hybrid Growth Mandate Model with TrsLabs
Strategic Investments, Inorganic Growth, Business Model Pivoting are critical activities that business don't do/change everyday. In cases like this, it may benefit your business to choose a temporary external consultant.
An unbiased plan driven by clearcut deliverables, market dynamics and without the influence of your internal office equations empower business leaders to make right choices.
Getting things done within a budget within a timeframe is key to Growing Business - No matter whether you are a start-up or a big company
Talk to us & Unlock the competitive advantage
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
2. • Passionate about software
product and security engineering
on cloud.
• Microsoft MVP (2011 – Now)
• Blog at http://thuansoldier.net
• Twitter at @nnthuan
About Me
3. • introduce myself as a hacker or script
kiddie
• blame developers on security unawareness
making the software vulnerable
• talk about coding security practice
• bring information security management
(e.g. Compliance, Risk, Regulation…)
I’m not going to….
5. My security principles
Security is not a silver
bullet
Security must come
firstly from your
awareness
Security by default
before security by
design
No pain no gain if
you dare
6. …think about the impact
System gets
hacked
Down service
Your data is
compromised
Operational
Impact
Business
Impact
Sell to
competitor
Down
reputation
Money loss
Why Security?
10. • Azure is unbreakable
• Your system is imperviable
• No security concern for PaaS
because no one has access to any
kind of Azure compute like IaaS
• Underlying infrastructure takes
care network and kind of DDos
attack
…it does not mean
15. • PaaS is a horizontal plane when implementing.
• Everything has a dedicated flat.
• Designed to leverage platform strengths
• No one really wraps each other like IaaS (e.g. vm is wrapped
in subnet in virtual network).
• Arbitrary only, without systematic approach
• Before protecting your PaaS, you need to identify
your inherent weakness.
• Threat model is an approach to identifying your
PaaS deployment’s threats.
PaaS Security Challenges
16. • When you would like to answer some of the following
questions:
• Where to get started with your PaaS security?
• What can go wrong with your building?
• What should you do to mitigate those things that can go wrong?
• What are structured approach to build a defense framework?
• Part of SSDL (Security Software Development Lifecycle)
• Repeatable way to identify attack surface
• Mitigation and acceptance criteria
When thinking about Threat Model for PaaS?
17. 1. Create high-level diagram
2. Identify your valuable assets
3. Create Data Flow Diagram
4. Finding your threats
5. Managing and Address Threats
Threat Modeling Process
18. What are you going to build?
Browser App Service
SQL
Database
Browser Web Front-
End
SQL
Database
Service/Business
Logic
19. …can be more complex
Browser Web Front-
End
SQL
Database
Service/Business
Logic (iDP)
Blob Storage
Web
Job
Pull
SharePoint
Online
What would go wrong? Who control what?
Who has right to modify
my database?
What is attacker’s
target?
What is potential threat when pulling
data from Web Job?
20. Improving the diagram with boundaries
Browser Web Front-
End
SQL
Database
Service/Business
Logic
Blob
Storage
Web
Job
Pull
SharePoint
Online
Push
App Service Storage
21. Trust Boundary
• Adding trust boundary is to identify
attack surface.
• Answer who control what
• Without trust boundary, your
system seems to open largely
attack surface.
• If there is a ‘talk’, add a boundary
• Web master/admin talks to administrator
portal
• Web talks to business logic
• Service instance talks to database
Attacker
Database Boundary
Application Boundary
22. Defining Data Flow Diagram (DFD)
Browser Web Front-
End
SQL
Database
Service/Business
Logic
App Service Storage
Identity
Provider
1
2
3 4
External Entity
23. Defining Data Flow Diagram (DFD)
Web Client Web Master Front-End
Web
Service/API
Database
Database
Admin
Data Log
External Entity
Trust Boundary
Data Flow
Process Entity
Data Store
24. Approach to drawing DFD
• Asset-centric
• Things attacker want
• Things you want to protect
• Stepping stone to either of these
• Software-centric
• Without software-centric, asset-centric would only
focus on system credential and database.
• Include not only asset but also other connections
and software flows.
• Can be either DFD, UML or Swim Lanes Diagram
• Attack-centric
• Identify potential attackers (from the connection,
community, intelligent databases)
• Not recommended, but good to know
Things you
protect
Stepping
stone
Things
attacker
want
25. STRIDE methodology
Spoofing
Tampering
Repudiation
Information
of
Disclosure
Denial of
Service
Elevation of
Privilege
Pretending to be
something or someone
other than yourself
Modifying something
on data, system
configuration.
Claiming that you didn’t
do something, or were
not responsible
Allowing someone to do
something they’re not
authorized to do
Providing information
to someone not
authorized to see it
Absorbing resources
needed to provide
service
26. STRIDE Analysis - Spoofing
Browser Web Front-
End
SQL
Database
Service/Business
Logic
App Service Storage
Identity
Provider
1
2
3 4
External Entity
Claimtobeadatabaseadmin
27. STRIDE Analysis - Tampering
Browser Web Front-
End
SQL
Database
Service/Business
Logic
App Service Storage
Identity
Provider
1
2
3 4
External Entity
28. STRIDE Analysis - Tampering
Browser Web Front-
End
SQL
Database
Service/Business
Logic
App Service Storage
Identity
Provider
1
2
3 4
External Entity
RepudiatetobeanewDBadmin
29. STRIDE Analysis – Info of Disclosure
Browser Web Front-
End
SQL
Database
Service/Business
Logic
App Service Storage
Identity
Provider
1
2
3 4
External Entity
ReaduserInfotableoverinjection
30. STRIDE Analysis – Denial of Service
Browser Web Front-
End
SQL
Database
Service/Business
Logic
App Service Storage
Identity
Provider
1
2
3 4
External Entity
DenyofSQLserviceoverInternet
31. STRIDE Analysis – Elevation of Privilege
Browser Web Front-
End
SQL
Database
Service/Business
Logic
App Service Storage
Identity
Provider
1
2
3 4
External Entity
ExecuteT-SQLquery
32. • Provide stencils to model your
threats
• Use STRIDE per Interaction
• Analysis View + Threat Lists
provide threats per diagram
Microsoft Threats Modeling Tool
35. • You can build your own identity
• Use Azure Active Directory to
transfer threats to Microsoft
• Bring Trust Center
• Encryption stuff
• Azure AD is your central identity
and access management
• Certificate-based mutual
authentication
Authentication
Web Front-
End
Azure Active
Directory
Azure SQL
Database
36. • Does Azure AD have threat if being used?
• Client ID + Client Secret can be the stepping stone.
• Someone might claim to be an Azure global administrator.
• Someone might claim to be your end-user.
Azure Active Directory Threats?
<appSettings>
<add key="AzureSubscriptionId" value="2ll0cb59-ed12-4755-a3zc-352z212fbafc" />
<add key="AzureTenantId" value="00087603-0fc0-4103-bd94-cdffllfb2226" />
<add key="AzureClientId" value="034boi383-dl20-4bf0-a78d-6d89c7de2d24" />
<add key="AzureClientSecret" value="64x6MsdDBmBg5sfej6z3rMCiUkgfVcZ42L000=" />
</appSettings>
37. • Authenticate to Azure resources via
clientID & clientSecret
• Work with Azure AD B2C
Demo
38. • Azure AD by Managed Service Identity
• Azure Resource Manager
• Azure Key Vault
• Azure Data Lake
• Azure SQL
• Azure Event Hubs
• Azure Service Bus
• Use certificate rather than client ID + client
Secret
• To protect identity
• Enable MFA for your global administrator
• Enable Azure AD Premium to gain benefit of
Conditional Access
Azure Authentication Threat Mitigation
Azure App
Service
http://localhost/oauth2/token
Credentials
3
1
2
Azure Service
Azure (inject and roll credentials)
39. • Identity & Authentication Provider
• Azure Active Directory
• Web boundary
• Azure App Service Plan
• Web Job
• Azure Functions
• API
• Storage
• Azure Storage
• Azure SQL Database (Threat Detection to
mitigate SQL Injection).
• Encryption in transit
Integrity
Web Front-
End
Service/Business
Logic
Azure SQL
Database
Upload
Authorized user
(admin, webmaster)
Allow
Deny
Unauthorized user
40. • What need to be confidential?
• System configuration
• Database
• HTTP Request
• API
• Source Code
• Use Azure Key Vaults for secret and key management
• Encryption at Rest (Azure Blob, SQL Database)
• Implement DevOps Security
Confidentiality
41. • An additional protection layer to your secret
• Secret should be only
• Database connection string
• Redis Cache Key
• Shared Signature Access
• API Key
• System/Service Principal Credential
• Public certificate (used to encrypt/decrypt with private key)
• Key types:
• RSA: a 2048-bit RSA key (soft-key)
• EC: Elliptic Curve
• Certificate is used for encryption/decryption or signing
Azure Key Vaults Overview
42. Azure Key Vaults Flow
Azure App Service
Database
Connection String
Retrieve
Azure SQL
Database
Traditional With KV
Azure App
Service
Get access token
authorize
Check
permission
Returnsecret
Access/query
43. • Password stripping if storing your private key as a secret
• Read more about it (http://thuansoldier.net/?p=7462)
• A single point of failure if retrieving secret by client ID and
client Secret
• Use Azure Managed Service Identity
• Use certificated based (where certificate is uploaded in App certificate
store)
• Azure Key Vaults can be abused as secret-as-a-service
• Attractive target to both internal and external attackers
Azure Key Vault Threats
44. • Azure SQL Database
• Bring your Own Key (BYOK)
• Transparent Data Encryption (TDE)
• Azure Blobs Storage
• Managed secret (with your own key)
• Azure API Management
• Inbound Policy
Azure Key Vaults Integration
45. • Create an app service and key vault
• Enable MSI
• Use AzureServiceTokenProvider to get access token locally
var azureServiceTokenProvider = new AzureServiceTokenProvider();
string accessToken = await azureServiceTokenProvider.GetAccessTokenAsync("https://management.azure.com/");
• Get authentication callback to be used with KeyVaultClient
var keyVaultClient = new KeyVaultClient(new KeyVaultClient.AuthenticationCallback(azureServiceTokenProvider.KeyVaultTokenCallback));
• Get secret value
var secret = await keyVaultClient.GetSecretAsync("secret identifier")
App Service + MSI + Key Vault
46. • Fraud prevention
• Well-managed Access Control
• Less password, more certificate-based
• Who is your administrator?
• Only if that administrator uses his phone (MFA)
Non-repudiation
47. • User Credential target via Brute-force attack
• Brute-force attack mitigation with Conditional Access
• MFA enabled
• Web Front-end
• Content Network Delivery
• Azure Application Gateway
• Web configuration (Dynamic, IP filtering…)
• SQL Database
• Control inbound network (with service endpoint)
• Azure API Management
Availability
52. • Developer workstation is
compromised
• Source code leakage
• Bad coding security practice
• Manual Subscription access
control
• Discontinuous security
scanning
Big threats are still existed in development
(sample)
53. DevOps + Security
DevOps + Security: DevSecOps
Dev
Software releases
& updates
Ops
Reliability,
performance &
scaling
Sec
Confidentiality,
Availability and
Integrity
• Make sure your code is both
manually and dynamically
scanned.
• Continuous vulnerability
assessment
• Incorporate with Security
Engineer team for better
security & protection.
• Eliminate double effort for code
refactoring after security
assessment
55. DevSecOps Kit for Azure
DevSecOps Kit for
Azure
Subscription
Security (Policy,
ASC Config,
Alerts, RBAC,
etc.)
Security
IntelliSense,
Security
Verification Test
(SVTs)
CICD
Build/Release
Extensions
Continuous
Assurance
Runbooks
OMS Solution
for Alerting &
Monitoring
Cloud Risk
Governance
Scan and remediate security in
subscription level with AzSK
PowerShell module
Integrate IDE extensions &
automated security scanning with
PowerShell during development.
Implement security pipeline with
Security extension in VSTS or other
3rd parties.
Periodically scan in
production to watch for
drift
Build OMS to visualize
security dashboard
across DevOps stage
Make data-driven
improvements to
security
57. DevSecOpoly Game
• Created by Mark Miller
(https://www.linkedin.com
/pulse/devsecopoly-
anyone-mark-miller/)
• Gameplay is like
Monopoly
• Entertain with people to
step up to DevOps +
Security.
58. • Threat modeling is very helpful for PaaS threat
identification.
• Download Microsoft Threat Modeling tool here
• Transferring your threats to Microsoft Azure as many as
possible (cost may increase).
• Implement Security Software Development Lifecycle
• Refer from Microsoft SDL here
• DevOps Security is always recommended.
Key takeaways