Download presentation
Presentation is loading. Please wait.
1
Azure Security in four steps
9/12/ :09 AM THR2143 Azure Security in four steps Fernando Andreazi Microsoft MVP © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
“Even companies focused on security are getting hacked.”
9/12/ :09 AM “Even companies focused on security are getting hacked.” Mark Russinovich, CTO, Microsoft Azure © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
3
this session is focused on IaaS
9/12/ :09 AM this session is focused on IaaS © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4
four steps… IDENTITY #step1 ARCHITECTURE #step2 DATA SECURITY #step3
9/12/ :09 AM four steps… IDENTITY #step1 ARCHITECTURE #step2 DATA SECURITY #step3 MANAGEMENT #step4 ****** © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
5
9/12/ :09 AM Demonstration © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
6
four steps… IDENTITY #step1 ARCHITECTURE #step2 DATA SECURITY #step3
9/12/ :09 AM four steps… IDENTITY #step1 ARCHITECTURE #step2 DATA SECURITY #step3 MANAGEMENT #step4 ****** © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
7
9/12/ :09 AM Next sessions… Shut the door to cybercrime with Azure Active Directory risk-based identity protection Wednesday, September :00 PM - 5:15 PM - OCCC Valencia W415 CD Network security for applications on Microsoft Azure Wednesday, September :00 PM - 5:15 PM - Hyatt Regency Windermere Protect Azure IaaS deployments using Microsoft Azure Security Center Thursday, September :00 AM - 10:15 AM OCCC W230 Everything you need to know about Microsoft Azure security Thursday, September :45 AM - 12:00 PM - OCCC W304 Defense against the dark (cloud) arts: Azure security deep dive Friday, September :30 PM - 1:45 PM - OCCC Valencia W415 AB © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
8
Resources #Step1 - Identity
9/12/ :09 AM Resources Azure Identity Management and access control security best practices Create custom roles for Azure Role-Based Access Control #Step1 - Identity © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
9
Resources #Step2 - Architecture
9/12/ :09 AM Resources Security best practices for IaaS workloads in Azure Best practices for Azure VM security Azure Network Security Best Practices Internet of Things Security Best Practices #Step2 - Architecture © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
10
Resources #Step3 - Data Security
9/12/ :09 AM Resources Azure Data Security and Encryption Best Practices Encrypt an Azure Virtual Machine Azure Disk Encryption for Windows and Linux IaaS VMs Azure Storage Service Encryption for Data at Rest #Step3 - Data Security © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
11
Resources #Step4 - Management
9/12/ :09 AM Resources Azure Operational Security best practices Security management in Azure #Step4 - Management © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
12
Please evaluate this session
Tech Ready 15 9/12/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite Phone: download and use the Microsoft Ignite mobile app Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
13
Thank you :) Fernando Andreazi
9/12/ :09 AM Thank you :) Fernando Andreazi © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.