Azure IdentityAccessSecurity
Azure IdentityAccessSecurity
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
3
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
4
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
10
Authentication
• Authentication is the process of establishing the identity of a person, service, or
device.
• It requires the person, service, or device to provide some type of credential to
prove who they are.
• Azure supports multiple authentication methods, including standard passwords,
single sign-on (SSO), multifactor authentication (MFA), and passwordless.
• For the longest time, security and convenience seemed to be at odds with each
other.
• Thankfully, new authentication solutions provide both security and convenience.
11
Single Sign-on
Single sign-on (SSO) enables a user to sign in one time and use that credential to access
multiple resources and applications from different providers.
For SSO to work, the different applications and providers must trust the initial
authenticator.
More identities mean more passwords to remember and change. Password policies can
vary among applications.
• As complexity requirements increase, it becomes increasingly difficult for users to remember them.
• The more passwords a user has to manage, the greater the risk of a credential-related security
incident.
Consider the process of managing all those identities.
• More strain is placed on help desks as they deal with account lockouts and password reset
requests.
• If a user leaves an organization, tracking down all those identities and ensuring they're disabled
can be challenging.
• If an identity is overlooked, this might allow access when it should have been eliminated.
With SSO, an user need to remember only one ID and one password.
• Access across applications is granted to a single identity that's tied to the user, which simplifies the
security model.
• As users change roles or leave an organization, access is tied to a single identity.
• This change greatly reduces the effort needed to change or disable accounts.
• Using SSO for accounts makes it easier for users to manage their identities and for IT to manage
users.
12
Multifactor Authentication
Multifactor authentication is the process of prompting a user for an extra form (or factor) of
identification during the sign-in process.
MFA helps protect against a password compromise in situations where the password was
compromised but the second factor wasn't.
Multifactor authentication provides additional security for identities by requiring two or
more elements to fully authenticate.
These elements fall into three categories:
• Something the user knows – this might be a challenge question.
• Something the user has – this might be a code that's sent to the user's mobile phone.
• Something the user is – this is typically some sort of biometric property, such as a fingerprint or face
scan.
Multifactor authentication increases identity security by limiting the impact of credential
exposure (for example, stolen usernames and passwords).
With multifactor authentication enabled, an attacker who has a user's password would also
need to have possession of their phone or their fingerprint to fully authenticate.
Multifactor authentication should be enabled wherever possible because it adds enormous
benefits to security.
Microsoft Entra multifactor authentication is a Microsoft service that provides multifactor
authentication capabilities.
• Microsoft Entra multifactor authentication enables users to choose an additional form of
authentication during sign-in, such as a phone call or mobile app notification.
13
Passwordless Authentication
Features like MFA are a great way to secure an organization, but users often get
frustrated with the additional security layer on top of having to remember their
passwords.
• People are more likely to comply when it's easy and convenient to do so. Passwordless
authentication methods are more convenient because the password is removed and
replaced with something the user have, plus something the user is, or something the
user knows.
Passwordless authentication needs to be set up on a device before it can work.
• For example, a computer is something an user has.
• Once it’s been registered or enrolled, Azure now knows that it’s associated with the user.
• Now that the computer is known, once the usesr provide something they know or are
(such as a PIN or fingerprint), you can be authenticated without using a password.
Each organization has different needs when it comes to authentication.
Microsoft global Azure and Azure Government offer the following three
passwordless authentication options that integrate with Microsoft Entra ID:
• Windows Hello for Business
• Microsoft Authenticator app
• FIDO2 security keys
14
Passwordless Authentication
Windows Hello for Business
• Windows Hello for Business is ideal for information workers that have their own designated Windows PC.
• The biometric and PIN credentials are directly tied to the user's PC, which prevents access from anyone
other than the owner.
• Windows Hello for Business provides a convenient method for seamlessly accessing corporate resources
on-premises and in the cloud.
• Microsoft Authenticator App
• The Authenticator App turns any iOS or Android phone into a strong, passwordless credential.
• Users can sign-in to any platform or browser by getting a notification to their phone, matching a number
displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN
to confirm.
FIDO2 security keys
• The FIDO (Fast IDentity Online) Alliance helps to promote open authentication standards and reduce the
use of passwords as a form of authentication.
• FIDO2 is the latest standard that incorporates the web authentication (WebAuthn) standard.
• FIDO2 security keys are an unphishable standards-based passwordless authentication method that can
come in any form factor.
• Fast Identity Online (FIDO) is an open standard for passwordless authentication.
− FIDO allows users and organizations to leverage the standard to sign-in to their resources without a username or
password by using an external security key or a platform key built into a device.
Users can register and then select a FIDO2 security key at the sign-in interface as their main means of
authentication.
− These FIDO2 security keys are typically USB devices, but could also use Bluetooth or NFC.
− With a hardware device that handles the authentication, the security of an account is increased as there's no password
that could be exposed or guessed.
15
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
16
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
20
The signal might be the user's location, the user's device, or the application that the
user is trying to access.
Based on these signals, the decision might be to allow full access if the user is signing in
from their usual location.
If the user is signing in from an unusual location or a location that's marked as high risk,
then access might be blocked entirely or possibly granted after the user provides a
second form of authentication.
Enforcement is the action that carries out the decision.
• For example, the action is to allow access or require the user to provide a second form of
authentication.
22
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
24
•
28
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
29
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
32
Defense-in-depth
The objective of defense-in-depth is to protect
information and prevent it from being stolen by those
who aren't authorized to access it.
A defense-in-depth strategy uses a series of mechanisms
to slow the advance of an attack that aims at acquiring
unauthorized access to data.
You can visualize defense-in-depth as a set of layers, with
the data to be secured at the center and all the other
layers functioning to protect that central data layer.
• Each layer provides protection so that if one layer is
breached, a subsequent layer is already in place to prevent
further exposure.
• This approach removes reliance on any single layer of
protection.
• It slows down an attack and provides alert information that
security teams can act upon, either automatically or manually.
• Azure provides security tools and features at every level
of the defense-in-depth concept.
33
Physical Security
• Physically securing access to buildings and controlling access to
computing hardware within the datacenter are the first line of
defense.
• With physical security, the intent is to provide physical safeguards
against access to assets.
• These safeguards ensure that other layers can't be bypassed, and loss
or theft is handled appropriately.
• Microsoft uses various physical security mechanisms in its cloud
datacenters
34
Perimeter
The perimeter layer uses distributed denial of service (DDoS)
protection to filter large-scale attacks before they can cause a denial
of service for users.
The network perimeter protects from network-based attacks against
resources.
Identifying these attacks, eliminating their impact, and alerting when
they happen are important ways to keep the network secure.
At this layer, it's important to:
• Use DDoS protection to filter large-scale attacks before they can affect the
availability of a system for users.
• Use perimeter firewalls to identify and alert on malicious attacks against
the network.
36
Network
The network layer limits communication between resources through
segmentation and access controls.
At this layer, the focus is on limiting the network connectivity across
all user resources to allow only what's required.
By limiting this communication, the risk of an attack spreading to
other systems in the network is reduced.
At this layer, it's important to:
• Limit communication between resources.
• Deny by default.
• Restrict inbound internet access and limit outbound access where
appropriate.
• Implement secure connectivity to on-premises networks.
37
Compute
The compute layer secures access to virtual machines.
Malware, unpatched systems, and improperly secured systems open
the environment to attacks.
The focus in this layer is on making sure that the compute resources
are secure and that there is proper controls in place to minimize
security issues.
At this layer, it's important to:
• Secure access to virtual machines.
• Implement endpoint protection on devices and keep systems patched and
current.
38
Application
The application layer helps ensure that applications are secure and
free of security vulnerabilities.
Integrating security into the application development lifecycle helps
reduce the number of vulnerabilities introduced in code.
Every development team should ensure that its applications are
secure by default.
At this layer, it's important to:
• Ensure that applications are secure and free of vulnerabilities.
• Store sensitive application secrets in a secure storage medium.
• Make security a design requirement for all application development.
39
Data
The data layer controls access to business and customer data that
needs to be protected.
Those who store and control access to data are responsible for
ensuring that it's properly secured.
Often, regulatory requirements dictate the controls and processes
that must be in place to ensure the confidentiality, integrity, and
availability of the data.
In almost all cases, attackers are after data:
• Stored in a database.
• Stored on disk inside virtual machines.
• Stored in software as a service (SaaS) applications, such as Office 365.
• Managed through cloud storage.
40
Outline
• Azure directory services
• Azure authentication methods
• Azure external identities
• Azure conditional access
• Azure role-based access control
• Zero trust model
• Defense-in-depth
• Microsoft Defender for Cloud
41
Continually Assess
Defender for cloud continuously assess the user environment.
• Defender for Cloud includes vulnerability assessment solutions for virtual
machines, container registries, and SQL servers.
Microsoft Defender for servers includes automatic, native integration
with Microsoft Defender for Endpoint.
• With this integration enabled, user will have access to the vulnerability
findings from Microsoft threat and vulnerability management.
Between these assessment tools there will be regular, detailed
vulnerability scans that cover compute, data, and infrastructure.
• User can review and respond to the results of these scans all from within
Defender for Cloud.
47
Secure
From authentication methods to access control to the concept of Zero Trust, security in the cloud
is an essential basic that must be done right.
In order to be secure in the cloud, users have to ensure their workloads are secure.
• To secure workloads, security policies are needed that are tailored to the environment and situation.
• Because policies in Defender for Cloud are built on top of Azure Policy controls, user is getting the full
range and flexibility of a world-class policy solution.
• In Defender for Cloud, user can set policies to run on management groups, across subscriptions, and even
for a whole tenant.
One of the benefits of moving to the cloud is the ability to grow and scale as needed, adding
new services and resources as necessary.
• Defender for Cloud is constantly monitoring for new resources being deployed across your workloads.
• Defender for Cloud assesses if new resources are configured according to security best practices.
• If not, they're flagged and user get a prioritized list of recommendations for what needs to be need to be
fixed
• Recommendations help reduce the attack surface across each of the resources.
The list of recommendations is enabled and supported by the Azure Security Benchmark.
• This Microsoft-authored, Azure-specific, benchmark provides a set of guidelines for security and
compliance best practices based on common compliance frameworks.
In this way, Defender for Cloud enables user not just to set security policies, but to apply secure
configuration standards across resources.
48
Secure
• To help users understand how important each recommendation is to the overall security
posture, Defender for Cloud groups the recommendations into security controls and adds
a secure score value to each control.
• The secure score gives u an at-a-glance indicator of the health of the security posture,
while the controls give you a working list of things to consider to improve security score
and the overall security posture.
49
Defend
Defender for Cloud also helps defend anenvironment by providing security alerts and
advanced threat protection features.
When Defender for Cloud detects a threat in any area of your environment, it generates
a security alerts which:
• Describe details of the affected resources
• Suggest remediation steps
• Provide, in some cases, an option to trigger a logic app in response
Defender for Cloud's threat protection includes fusion kill-chain analysis, which
automatically correlates alerts in an environment based on cyber kill-chain analysis, to
help the user better understand the full story of an attack campaign, where it started,
and what kind of impact it had on resources.
Defender for cloud provides advanced threat protection features for many of the
deployed resources, including virtual machines, SQL databases, containers, web
applications, and network.
• Protections include securing the management ports of VMs with just-in-time access, and
adaptive application controls to create allowlists for what apps should and shouldn't run on
machines.