1 / 25

A Secure Cloud-Computing Platform Azure Partner Architects| 4/11/2011

A Secure Cloud-Computing Platform Azure Partner Architects| 4/11/2011. David McGhee | Windows Azure Platform Technical Specialist | Microsoft ANZ d avid.mcghee@microsoft.com | +61 413 746 120. Agenda. Generational Shift. Business. Economic. Technology.

aquene
Télécharger la présentation

A Secure Cloud-Computing Platform Azure Partner Architects| 4/11/2011

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Secure Cloud-Computing PlatformAzure Partner Architects| 4/11/2011 David McGhee | Windows Azure Platform Technical Specialist | Microsoft ANZ david.mcghee@microsoft.com | +61 413 746 120

  2. Agenda

  3. Generational Shift Business Economic Technology Centralized compute & storage, thin clients High upfront costs for hardware and software Optimized for efficiency due to high cost Perpetual license for OS and application software PCs and servers for distributed compute, storage, etc. Optimized for agility due to low cost Pay as you go, and only for what you use Large DCs, commodity HW, scale-out, devices Order of magnitude better efficiency and agility

  4. Cloud Impact REDUCED MANAGEMENT NEW ECONOMICS INCREASED PRODUCTIVITY • Pay for what you use • Lower and predictable costs • Shift from capex and opex • Accelerate speed to value No patching, maintenance Faster deployment Robust multi-layered security Reliability and fault-tolerance Latest software for users Internet collaboration Anywhere access Instant self-provisioning

  5. IT as a Service Software as a Service (SaaS) Business Requirements End User Config Platform as a Service (PaaS) Application Logic Data Schema Operating System Disaster Recovery Virus Control Database Management Load Balancing Identity/Authorisation Middleware Infrastructure as a Service (IaaS) Hardware Network Storage

  6. The Windows Azure Platform Windows Azure is an internet-scale cloud services platform hosted in Microsoft data centers around the world, proving a simple, reliable and powerful platform for the creation of web applications and services.

  7. Who are the people managing my data? Privileged User Access Customer Security Concerns from Cloud- The Inevitable Questions Is my Data Centre compliant with all international certifications? • Regulatory Compliance Does my provider obey local privacy requirements on behalf of their customers? • Data • Location How is my data separated and secure from others in a shared cloud environment? • Data • Segmentation How does my cloud service provider support me in the case of data failure? • Recovery What measures are taken by my cloud provider, if illegal activity is found within the Data Centre? • Investigating Support How can I get my data back, if the company who owns the Data Centre is absorbed or collapses? • Long Term Viability

  8. Security and Compliance Global Foundation Services – the baseline for Windows Azure DATA CENTER FOUNDATION ROBUST SECURITY PROGRAMS WINDOWS AZURE Build on existing data center compliance programs Evaluate industry/country-specific certifications Participate in cloud security working groups ISO 27001 SAS70 Type II FISMA (US DCs only) SOX PCI DSS Information Security Management Forum Risk Management Program Information Security Policy Program Windows Azure Current Focus • Security ISO 27001 SAS70 Type II (SSAE16) • Privacy • Risk Management Data "privacy by default"

  9. Data Center Management Asia Eastern Europe North America Europe West Europe Security Management North Central US Threat & Vulnerability Management, Monitoring & Response East Asia South Central US Data Access Control & Monitoring, File/Data Integrity User South Asia Account Mgmt, Training & Awareness, Screening Application Secure Engineering (SDL), Access Control & Monitoring, Anti-Malware Host Access Control & Monitoring, Anti-Malware, Patch & Config Mgmt Internal Network Facility Dual-factor Auth, Intrusion Detection, Vulnerability scanning Physical controls, video surveillance, Access Control Network perimeter Edge Routers, Firewalls, Intrusion Detection, Vulnerability scanning

  10. The Microsoft Security Development Lifecycle (SDL) Helping to protect customers by reducing the number and severity of software vulnerabilities prior to Release Executive commitment  SDL a mandatory policy at Microsoft since 2004 Education Technology and Process Accountability Ongoing Process Improvements

  11. Platform as a Service Security Model Less customer control, more trust on the provider Data Data Customer Application Application Host Host Customer Microsoft Network Network Physical Physical Platform as a Service On Premises

  12. Windows Azure Security LayersDefence In Depth Approach

  13. 1 Physical – Tailored to run applications #9 Network capacity providers

  14. 2 Network - Access Paths To and from the developer SSL tunnel with certificates (mutual authentication)

  15. 3 Host – Execution Environment Hypervisor and “Sandbox” • Customer code run on dedicated virtual machines (VMs) • VMs isolated by a Hyper-V based hypervisor • All access to network and disk is mediated by a “root” virtual machine Hyper-V based hypervisor Root VM Guest VM Guest VM Guest VM Guest VM Guest VM Guest VM • 1, 2, 4 or 8 CPUs, up to 14GB of memory • Stripped down, hardened version of Windows Server 2008 • Three virtual hard disks • Limited number of device drivers • Network connectivity restricted using host firewall Hypervisor Network/Disk

  16. 4 Application - Identity and Access Management Use of Active Directory identities and groups through federation In the next release of AppFabric Access Control Services (ACS 2.0), single sign-on with popular Internet identity providers Integration with 3rd party systems through WS-* and SAML 2.0 open standards Enable seamless access experience with other corporate applications tied to AD • WS-* and SAML Other Providers Active Directory On Premises Common Identity Across Applications

  17. Data Access 5 Data - Storage Services Security • Customer data stored on separate hardware from the Windows Azure Compute VMs, organized into storage accounts • Access to data in a specific account is only granted to entities having the secret key for that account • Storage access keys are randomly generated when the storage account is created (or later at the request of the customer) • A storage account may have two active keys at any given time to support key rollover • Data access can be protected using SSL encryption

  18. Redundancy and On-premises Storage 5 Data- Windows Azure Storage Reliability • Data is replicated within Windows Azure to three separate physical nodes for high availability • To ensure physical security over the data, replicated data is stored in a separate Data Centre within the geographical area. Application Application X Customer On-premises Storage Azure Physical Storage • Customer can create custom application to extract data for offsite backups

  19. Security Design considerations • Practices: • Secure design • Secure coding • Threat management • Design patterns • Azure Connect • Service Bus • Access Control

  20. Market Service Management

  21. Service Level Agreements Content delivery network Instance monitoring and restart Service bus and access control availability Compute connectivity Database availability Storage availability • Service will respond to client requests and deliver the requested content without error • Service bus and access control endpoints will have external connectivity • Message operation requests processed successfully • Storage service will be available/ reachable (connectivity) • Your storage requests will be processed successfully • Database is connected to the internet gateway • All databases will be continuously monitored • All running roles will be continuously monitored • If role is not running, we will detect and initiate corrective action • Your service is connected and reachable via web. Internet facing roles will have external connectivity >99.9% >99.9% >99.9% >99.9% >99.95% >99.9%

  22. Q&A?

  23. Overview World-Class Support Carrier-Class Data Centers We proactively monitor outbound access to detect common cases (port scans, spam) Windows Azure Platform Operational Best Practices World-Class Security Application Specific Hardware World-Class Architecture

  24. Next steps to learn more about Windows Azure Platform Security • Visit Microsoft.com/Azureto view the following whitepapers concerning security and the Windows Azure Platform • Windows Azure Security Overview • Security Best Practices For Developing Windows Azure Applications • Security Guidelines for SQL Azure • Microsoft Security Development Lifecycle • http://www.microsoft.com/security/sdl • Get involved in the Windows Azure Platform community • Microsoft Essentials • Windows Azure Platform Security Essentials: Module 1 - Security Architecture • Windows Azure Platform Security Essentials: Module 2 – Identity Access Management • Windows Azure Platform Security Essentials: Module 3 – Storage Access • Windows Azure Platform Security Essentials: Module 4 – Secure Development

  25. Thank You

More Related