What is a Security Information and Event Management (SIEM) System?
A SIEM system aggregates security data from multiple sources and provides capabilities for threat detection and response. Basically the “reactive” system after a breach.
Hint: Think “Batman” as a SIEM system…
What is Azure Sentinel and what’s the difference between it and Azure Security Center?
What are four (4) things that it does?
Azure’s SIEM System. This is the system you’d go to for breaches. Unlike Security Center which is proactive prevention, Sentinel is reactive actions and prevention.
What data source connections does Azure Sentinel support?
Connections to the following sources:
Hint: Escalators…
Azure Sentinel’s Built-In Analytics are based on templates? Who built them and what are they based on?
What are three (3) aspects of those templates?
Templates designed by Microsoft security experts based on
Templates are:
Describe Sentinel’s Custom Analytics for threat detection
Rules you create to search your environment for specific criteria.
What are “Incidents” w.r.t. Azure Sentinel?
A group of related Security Alerts
What is the Investigation Graph?
A tool used by Azure Sentinel to examine:
Hint: Obama’s Pandemic Playbook)
What are Azure Monitor Playbooks?
Used to automate responses to threats
The playbook can run manually or automatically when a rule triggers on alert
What’s an example workflow for a Playbook?
When clicking Block ⇒ the IP address is blocked, user is disabled in Azure Active Directory
When clicking Ignore ⇒ Alert is closed in Sentinel and incident is closed in the trigger system
What is Azure Key Vault?
A centralized cloud service for storing application secrets in a single, central location. Provides secure access to sensitive info via access control and logging capabilities
What are three (3) things Azure Key Vault manages?
What’s used to ensure security on your stored secrets?
Manage Secrets - Store control access tokens, passwords, certs, API Keys, etc.
Manage Encryption Keys
Manage SSL/TLS Certs - Provision/Manage/Deploy public or private Secure Socket Layer/Transport Layer Security certificates for both Azure Resources and internal resources
Store secrets backed by hardware security modules (HSMs)
- keys and secrets protected by software or by FIPS 140-2 Level 2 validated HSMs
Hint: What’s great about Azure?
What are four (4) benefits of Azure Key Vault?
What two (2) places can I see my Secret Values?
Viewing Secrets requires authentication and authorization (T/F)?
True. These two paths assume you are already authenticated and authorized through 1. Azure Portal or 2. Cloud Shell’s Azure secure login
What is Azure Dedicated Host?
Microsoft can provide physical servers to host your Azure VMs (Windows or Linux) should you have requirements to do so (i.e. regulatory compliance)
What are Host Groups?
A collection of Azure Dedicated Hosts
Host Group => Dedicated Host => VMs
Your VMs can sit on a Dedicated Host but your Dedicate Host can be grouped with other Dedicated Hosts
What are the benefits of a Dedicated Host?
Complete control over the environment hosting your VMs!
Hint: WITH….not FOR
How do you achieve High Availability with Dedicated Hosts?
Provision multiple hosts in a Host Group, then deploy your VMs across the whole group…
What does Dedicate Host Maintenance Control allow you to do? What the time window for using it?
Lets you control when regular maintenance updates occur (within a 35-DAY ROLLING WINDOW)
How are Dedicated Hosts billed?
Another advantage of Dedicated Hosts are that software licensing, storage and network usage are billed in aggregate with the VMs running on each Dedicated Host (T/F)?
False. Host and VMs are billed separately from all that! 😉