HOW TO DEPLOY & SECURE
YOUR APPLICATIONS IN AZURE
Develop Security & Compliances in Azure
23.03.22
SEVEN PEAKS TEAM
Team Presentation
BIOGRAPHY
Giorgio Desideri
Tech Lead of Cloud Solutions
AGENDA
Points which are presented today
AZURE ACCOUNT
Starting from the base
AZURE ACCOUNT
Consideration before open an account
AZURE ACCOUNT
Consideration before open an account
https://docs.microsoft.com/en-us/azure/active-directory/
People
Devices Management
Domain Service
Identity Governance
Identity Protection
Roles
Application
Hybrid
Azure Active Directory
AZURE ACCOUNT
Consideration before open an account
IDENTITIES
Stepping through access management in Azure
IDENTITIES
Access Management
User
Services
Application
POLICY
Roles
Groups
Devices
“Metadata” :
{
…
},
IDENTITIES
Access Management
User
Services
Application
Devices
IDENTITIES
Access Management
User
Services
Application
Devices
IDENTITIES
Access Management
User
Services
Application
Devices
IDENTITIES
Access Management
User
Services
Application
Devices
IDENTITIES
Access Management
User
Services
Application
RBAC
AD Roles
Devices
Resources
Active Directory
IDENTITIES
Access Management
User
Services
Application
RBAC
AD Roles
Devices
Resources
Active Directory
DATABASE & APPLICATION
How can apply a “secure development” ?
DEVELOPER,
DEVELOPER,
DEVELOPER
DATABASE SECURITY
Development
Authentication
Encryption
Network Restriction
RBAC
Protect Keys
DATABASE SECURITY
Development
Azure AD Authentication vs SQL Authentication
Authentication
Encryption
Network Restriction
DATABASE SECURITY
Development
Data Encryption
Authentication
Encryption
Network Restriction
DATABASE SECURITY
Development
Network access restriction
Authentication
Encryption
Network Restriction
APPLICATION SECURITY
Development
Integrated
Authentication
RBAC
Protect Key
Network Restriction
APPLICATION SECURITY
Development
Scope definitions & restrictions
Authentication
RBAC
Protect Key
Network Restriction
APPLICATION SECURITY
Development
My Secrets are mine and only mine !
Authentication
RBAC
Protect Key
Network Restriction
APPLICATION SECURITY
Development
Network access regulation
Authentication
RBAC
Protect Key
Network Restriction
FRAMEWORKS & MODELS
Approaches to follow
FRAMEWORKS & MODELS
Azure Cloud Adoption Framework
FRAMEWORKS & MODELS
Azure Zero Trust Model
CONCLUSIONS
Considerations
CONCLUSIONS
Take Away points
CONCLUSIONS
Take Away points
CONCLUSIONS
Take Away points
Questions ?
Thanks for joining
UPCOMING MEETUP
Check out our event page
Stay tuned for what’s coming next!