Handwritten Flashcards

(35 cards)

1
Q

Service Endpoint

A
  • routing control per Pool
  • bind to subnets, no “peering”
  • No - on Premesis
  • When using NSG, use Service-Tags
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Resource Policy Contributor

A
  • create / modify resource policy
  • create support ticket
  • read resources + hierarchy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

User Access Administrator

A
  • Grant Microsoft.Authorization/roleDef/write
  • Manage User Authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SQL Managed Instance Subnet

A
  • No resource connected => does not mean empty
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HSM-Protected KeyVault Fips-140 level

A

level 2
Key Vault => Level 1
Managed HSM => Level 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cloud App Security Administrator

A

Manages Defender for Cloud Apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Developer

A
  • create new App Registration
  • Manage App Registrations that are owned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Azure Storage Access Queue

A
  • Shared Key
  • Azure RBAC
  • Account und Service SAS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Azure Storage Access Tables

A
  • Entra ID Roles
  • Account SAS
  • Service SAS
  • Shared Key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Azure Storage Access Files / share

A

SMB Access
- AD DS (Kerberos)
- Entra Domain Services
- Entra Kerberos
- shared Key
Rest
- over API with RBAC
- Account and Service SAS
- Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Azure Storage Access Blob

A
  • Entra ID
  • Shared Access Signatures
    • User Delegated SAS
    • Service SAS
    • Account SAS
  • Shared Key
  • Anonymous Public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Azure AKS Kubenet vs CNI

A

Kubenet Replaced by CNI-Overlay
CNI-Overlay
Private Overlay CIDR
low IP consumption
NAT
CNI
Direct VNet Subnet
High IP consumption
Native

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Azure SQL Groups and Entra ID

A
  1. Create Group or User
    CREATE USER [group] FROM EXTERNAL PROVIDER;
  2. Assign Role
    ALTER ROLE db_datareader ADD MEMBER [group];
  3. Limitations
    -> no default schema
    -> no user context
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Customer-Managed Encryption for Log-Analytics

A

1) Create AKV
2) Create a Log-Analytics dedicated Cluster
3) Configure Key Vault
Get, Unwrap, Wrap
or
Cryptic Service Encryption Use
4) Assign Key to Cluster
5) link Cluster with Log-Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Managed vs Dedicated HSM

A

AKV select dedicated HSM if:
1) legacy app
2) appliance level control
3) Migration from on-prem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What types of B2B Collaboration exist?

A

B2B Collaboration
-> invite external as guest
-> internal guest user
B2B Direct Connect
-> Mutual trust, share resources
-> trust external tenant

17
Q

User - Signin - Risk levels

A

high: strong evidence of compromise
medium: suspicious and abnormal behaviour
low: minor anomaly

18
Q

Vnet - Manager Configuration - Routing

A
  • Create Vnet - Manage UDR
    -> Overwrite existing
    -> Preserve old ones
19
Q

How to invite B2B users?

A
  • Add Guest User
    Manual Provisioning
    (Guest Inviter/Admin is Default allows)
  • Self Service Sign Up
    • External Identities User-Flow
20
Q

What to change for fast onboarding?

A
  • Restrict Guest invite capabilities
  • Restrict Guest Access to Directory Data
  • MFA for Guests
  • Use ID Governance
  • Use Tenant Restriction
21
Q

When to use: - Private Endpoint - Vnet Peering - Service Endpoint

A
  • Vnet: Multiple Resources, no sec required
  • Service Endpoint: Cost reduction, Public IP usage
  • Private Endpoint: Security, On-Premise
22
Q

OAuth Authorization Flows

A
  • Authorization Code Flow with PKCE (SPA)
  • implicit Grant Flow (legacy)
  • Authorization Code Flow without PKCE => Server App
23
Q

Vnet Manager Features

A
  • Connectivity
  • Security Admin
  • User Defined Routing
24
Q

Azure Function Networking

A

Inbound
- IP Restriction
- IP/Vnet/Service Endpoint
- deploy is Vnet
- Private Endpoint
- Service Endpoint
Outbound
- Vnet Integration
Routes outbound through Vnet
- Hybrid Connection
- Agent connects to Azure (outbound)

25
App Gateway
Features: - WAF - TLS Termination - End-To-End TLS - Key Vault integration - Requires Subnet - Private / Public IP - Private Link Support - Layer 7 Routing (Backend health) - Zone-Redundant (only special needs force)
26
Azure Front Door active-active active-passive
active-active => Load Balancing active-passive => failover
27
Azure Front Door Standard - Premium
Standard 1) Only Custom WAF 2) No Bot Protection 3) No Private Link
28
Azure WAF Policy Levels
Policy levels - Global - Per-Site - Per-URI
29
Azure WAF Rule Types
1) OWASP Top 10 2) DRS / Threat intelligence 3) Custom Rules (max 100) (Match Rule or Rate limit Rule) 4) Bot Protection (Bot Manager Rules) - Good, Bad, Unknown 5) Geo-Filtering 6) IP-Restriction
30
Azure Container Registry auth (ACR)
1) Entra ID User Pull, Push, Sign, Contributor 2) Service Principal 3) Admin User one account, normally disabled with full data plane access
31
Security Recommendation for Azure API Management
1) Use Oauth, OpenID, mTLS 2) Deploy WAF in front of APIM 3) Use Azure Key Vault 4) Use System Assigned Managed Identity 5) Use HTTPS
32
Azure SQL Entra Auth Steps
1) Assign Entra Admin to Server or Instance 2) Create SQL Principals in Database that are mapped to Entra Identities 3) Configure Client to use Azure Identity Library
33
Vnet - Manager Configuration - Security Admin
- overwriting NSG -> Allow (can be denied) -> denie (endgültig) -> Always Allow
34
Vnet - Manager Configuration - Connectivity
- Hub-Spoke -> select Hub -> Enforce Peering -> Allow high scale priv endpoints - Mesh -> across regions -> High scale Private Endpoints -> Prevent overlapping Address
35
Azure Policy Types Resource-Manager-Modes
- all default - indexed -> only resource types that support tags + location