0% found this document useful (0 votes)
64 views28 pages

How Secure Is Your: Azure Cloud Environment?

This document discusses the top 5 pitfalls to avoid when implementing Azure cloud security. It covers issues around unclear responsibility and immature governance leading to misconfigurations. The document provides recommendations around establishing shared responsibility models, investing in integrated security, and using Azure policies and ARM templates to strengthen governance.

Uploaded by

rodrigoduoc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views28 pages

How Secure Is Your: Azure Cloud Environment?

This document discusses the top 5 pitfalls to avoid when implementing Azure cloud security. It covers issues around unclear responsibility and immature governance leading to misconfigurations. The document provides recommendations around establishing shared responsibility models, investing in integrated security, and using Azure policies and ARM templates to strengthen governance.

Uploaded by

rodrigoduoc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

How Secure is Your

Azure Cloud Environment?


Top 5 Pitfalls to Avoid When Implementing Azure

Blaine Biekert
Lead, Cloud Security Services
Revolutionary Security

© 2020 Revolutionary Security, LLC All Rights Reserved.


Agenda
1 Cloud Brief
• Current global landscape
• How the cloud is different
2 Top 5 Pitfalls to avoid
• What are they
• How to mitigate
“Let’s talk about
outpacing cyber threats.”
3 Roadmap to Secure Azure
Blaine Biekert
• How to recognize your weaknesses
• Steps forward for success

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
Azure Security

Cloud Brief

© 2020 Revolutionary Security, LLC All Rights Reserved. REVSEC.COM


Current Landscape
Immediate impact of the global pandemic

Business disruption
Massive cloud consumption increase
Cyber impact – same attacks, increased success

“Cloud computing is again in the


spotlight as one of the key factors in
surviving the pandemic.”
Blaine Biekert

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
Cloud is different.

Different perimeter
Often code deployments

Lift-and-shift is not the answer

“Cloud is just like everything else;


nothing like anything else.”
Blaine Biekert

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
Azure Security

Top 5 Pitfalls

“Misconfiguration is the single biggest


challenge you will face in the cloud. Period.”
Blaine Biekert

© 2020 Revolutionary Security, LLC All Rights Reserved. REVSEC.COM


PITFALL #1: RESPONSIBILITY

Who’s on first?

“If you are not securing your


access and data, you may as
well leave everyone’s purses
and wallets on the sidewalk.”
Blaine Biekert Source: https://www.wsj.com/articles/human-error-often-the-culprit-in-cloud-data-breaches-11566898203

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #1: RESPONSIBILITY

You are responsible. Fix the Misconfiguration

Shared responsibility model

Create a RACI
Include SLAs

Be specific

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #1: RESPONSIBILITY

You are responsible. Fix the Misconfiguration


Shared responsibility model
Shared responsibility model
Microsoft Customer

RESPONSIBILITY ALWAYS RETAINED BY CUSTOMER

Create a RACI RESPONSIBILITY VARIES BY SERVICE TYPE

Include SLAs

Be specific RESPONSIBILITY TRANSFERS TO CLOUD PROVIDER

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #2: GOVERNANCE

Fast and loose.


Immature governance has consequences

Unprotected sprawl
Limited visibility
Missing security controls
“Without proper governance,
cloud systems are a virtual Unknown gaps
playground with limited visibility.”
Blaine Biekert

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #2: GOVERNANCE

Don’t be cheap. Fix the Misconfiguration


Invest in the integrated security bundle

Add technical enforcement for compliance

Use Azure policies

Leverage ARM templates

Add cloud to your Enforce and manage with Azure Blueprints


governance model
Log and monitor everything

Automate and self-heal

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #3: CHANGE MANAGEMENT

Time waits for no man.

“The cloud will remind you how fast


change management should be.”
Blaine Biekert

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #3: CHANGE MANAGEMENT

Keep up. Fix the Misconfiguration

Move to a secure
SDLC and leverage Leverage ARM templates – infrastructure as code
infrastructure as code

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #3: CHANGE MANAGEMENT

Keep up. Fix the Misconfiguration

Move to a secure
SDLC and leverage Leverage ARM templates – Infrastructure as Code
infrastructure as code Keep change management in source control

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #3: CHANGE MANAGEMENT

Keep up. Fix the Misconfiguration

Move to a secure
SDLC and leverage Leverage ARM templates – Infrastructure as Code
infrastructure as code Keep change management in source control
Leverage a Secure SDCL process

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #3: CHANGE MANAGEMENT

Keep up. Fix the Misconfiguration

Move to a secure
SDLC and leverage Leverage ARM templates – Infrastructure as Code
infrastructure as code Keep change management in source control
Leverage a Secure SDCL process
Deploy pipelines with integrated approvals

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #4: WEB APPS & APIS

No {REST} for the weary.


Even secure APIs could be one
misconfiguration away from becoming
public-facing

… Meet Opened Door


Closed Window…

“Of all the targets for cloud


threat actors, misconfigurations
from API’s will top the list.”
Blaine Biekert

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #4: WEB APPS & APIS

Shift gears. Fix the Misconfiguration


Use a secure SDLC with code review
Leverage firewalls, load balancers,
and web application firewalls
Use API management
Strictly control who can add application
permissions to web applications
Practice safe coding
techniques especially for SHIFT LEFT
web applications and APIs

REQUIREMENT DESIGN DEVELOPMENT TEST PRODUCTION


ANALYSIS
© 2020 Revolutionary Security, LLC All Rights Reserved. & MAINTENANCE
REVSEC.COM
PITFALL #5: IAM & DATA PROTECTION

Your VPN is showing.


VPNs are outdated
MFA is underutilized
Data is not being encrypted properly

“Identity is your new perimeter.


Protect it.”
Blain Biekert

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PITFALL #5: IAM & DATA PROTECTION

Get MFA. Fix the Misconfiguration


Enable MFA immediately
Turn on and use Privileged Identity Management
Leverage Azure Information Protection
Auto encrypt sensitive (or all) files

Protect the new perimeter

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
IN SUMMARY

Avoid the pitfalls. 1 Ambiguous responsibility

2 Immature governance

3 Slow change management

4 Insecure web applications and APIs

5 Resistance to IAM & data protection

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
Path Forward

Roadmap to Secure Azure

© 2020 Revolutionary Security, LLC All Rights Reserved. REVSEC.COM


1 Identify weaknesses
Evaluate talent
Perform technology gap assessment

Perform a POC

2 Chart a path forward


“Everything must be made
as simple as possible,
but not one bit simpler.” 30 90 +
Albert Einstein Rapid Advanced Build &
Configuration Protections Mature

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PATH FORWARD: 30 DAYS
Security management Powerful Quick Wins
Threat protection
Accomplish quickly with
Identity and access management
low impact to users
Information protection

Rapid Configuration:
• Basic admin protections
• Logging and analytics
• Basic identity protections
• Tenant configuration
• Prepare stakeholders

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PATH FORWARD: 90 DAYS
Security management Enhanced Capabilities
Threat protection
Longer planning and implementation but
Identity and access management
greatly increase your security posture.
Information protection

Advanced Protections:
• Admin accounts
• Data and user accounts
• Visibility into compliance,
threat, and user needs
• Adapt and implement default
policies and protections

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PATH FORWARD: BEYOND
Security management Next Level
Threat protection
Important security measures
Identity and access management
that build on previous work.
Information protection

Build & Mature:


• Adjust and refine key policies and
controls
• Extend protections to on-premises
dependencies
• Integrate with business and security
processes (legal, insider threat, etc.)

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
PRO TIP SUMMARY

Chart your path. 30 Rapid Configuration


• Start with a budget
• Determine number of clouds
• Utilize all the free stuff you can

90 Advanced Protections
• Exhaust integrated options first
• Verify the impact of enabling
additional services

+ Build & Mature


• Align with overall governance strategy
• Ensure continual assessment
by skilled individual

© 2020 Revolutionary
© 2020
Security,
Revolutionary
LLC All Rights
Security,
Reserved.
LLC All Rights Reserved. REVSEC.COM
Outpace cyber threats with us.

Contact Blaine Biekert


Lead, Cloud Security Services
Revolutionary Security
[email protected]

© 2020 Revolutionary Security, LLC All Rights Reserved. REVSEC.COM

You might also like