MCW Security baseline on Azure
Перейти к файлу
Dawnmarie DesJardins 688c66ac0f
Update README.md
Adding archive notice
2021-06-01 15:52:34 -07:00
Hands-on lab Update HOL step-by step - Security baseline on Azure.md 2021-04-28 13:39:20 -07:00
Whiteboard design session Update WDS trainer guide - Security baseline on Azure.md 2021-04-28 13:40:15 -07:00
.gitignore Initial commit 2018-03-21 14:08:30 -07:00
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 2021-04-20 16:42:15 -07:00
CONTRIBUTING.md Create CONTRIBUTING.md 2021-04-20 16:43:04 -07:00
HTMLLINKS.md Updated HTML links. 2019-04-25 17:17:41 -07:00
LICENSE Update LICENSE 2018-08-31 14:22:04 -04:00
README.md Update README.md 2021-06-01 15:52:34 -07:00
SECURITY.md Create SECURITY.md 2021-04-20 16:42:39 -07:00

README.md

This workshop is archived and is no longer being maintained. Content is read-only.

Security baseline on Azure

Contoso Ltd is a multinational corporation, headquartered in the United States that provides insurance solutions worldwide. Its products include accident and health insurance, life insurance, travel, home, and auto coverage. Contoso manages data collection services by sending mobile agents directly to the insured to gather information as part of the data collection process for claims from an insured individual. These mobile agents are based all over the world and are residents of the region in which they work. Mobile agents are managed remotely through regional corporate offices.

They are exploring a lift and shift strategy to Azure, but have a large focus on Azure Security and Privacy features.

July 2020

Target audience

  • Cloud Administrators
  • Cloud Architects
  • Security Analysts
  • Security Architects

Abstracts

Workshop

In this workshop, you will learn how to design an implementation of Azure Security Center and Microsoft Compliance Manager tools to ensure a secure and privacy-focused Azure cloud-based architecture.

At the end of this workshop, you will be better able to secure your cloud-based applications and services, while ensuring privacy standards are followed and your architecture is compliant.

Whiteboard design session

In this whiteboard design session, you will work with a group to design an end-to-end solution that leverages many of Microsoft Azures security features.

At the end of this session, you will be better able to design and recommend solutions that help organizations properly secure their cloud-based applications while protecting their sensitive data.

Hands-on lab

In this hands-on lab, you will implement many of the Azure Security Center features to secure their cloud-based Azure infrastructure (IaaS) and applications (PaaS). Specifically, you will ensure that any internet exposed resources have been properly secured and any non-required internet access disabled. Additionally, you will implement a “jump machine” for admins with Application Security enabled to prevent admins from installing non-approved software and potentially exposing cloud resources. You will then utilize custom alerts to monitor for TCP/IP Port Scans and then fire alerts and run books based on those attacks.

At the end of this hands-on lab, you will be better able to design and build secure cloud-based architectures, and to improve the security of existing applications hosted within Azure.

  • Azure Virtual Machines and Networks with Network Security Groups
  • Virtual Private Networks (Point to Point, Site to Site)
  • Azure Web Apps
  • Azure SQL DB and corresponding security features (Threat Detection, TDE, Column Level Encryption, etc.)
  • Azure Storage Encryption
  • SQL Server Virtual Machines
  • Azure IAM
  • Azure Monitor and Log Analytics
  • Azure Sentinel
  • Azure Policy
  • Power BI
  • Azure Security Center
  • Secure Score
  • Azure Key Vault Integrations
  • Microsoft Azure Active Directory
  • Microsoft Intune
  • Conditional Access controls

Azure solutions

Security and Management