1 Describe Security and Compliance Concepts
1 Describe Security and Compliance Concepts
Identity Fundamentals
MILESTONE 1
- Describe the concepts of security, compliance, and identity
The shared responsibility model identifies which security tasks are handled by the cloud
provider, and which security tasks are handled by you, the customer. The
responsibilities vary depending on where the workload is hosted:
The shared responsibility model makes responsibilities clear. When organizations move
to the cloud, some responsibilities transfer to the cloud provider and some to the
customer organization.
The following diagram illustrates the areas of responsibility between the customer and
the cloud provider, according to where data is held.
● On-premises data centers. In an on-premises datacenter, you have
responsibility for everything from physical security to encrypting sensitive
data.
● Infrastructure as a Service (IaaS). Of all cloud services, IaaS requires the
most management by the cloud customer. With IaaS, you're using the cloud
provider’s computing infrastructure. The cloud customer isn't responsible for
the physical components, such as computers, the network, or the physical
security of the datacenter. However, the cloud customer still has
responsibility for software components running on that computing
infrastructure such as operating systems, network controls, applications,
and protecting data.
● Platform as a Service (PaaS). PaaS provides an environment for building,
testing, and deploying software applications. The goal of PaaS is to help
you create an application quickly without managing the underlying
infrastructure. With PaaS, the cloud provider manages the hardware and
operating systems, and the customer is responsible for applications and
data.
● Software as a Service (SaaS). SaaS is hosted and managed by the cloud
provider, for the customer. It's usually licensed through a monthly or annual
subscription. Microsoft 365, Skype, and Dynamics CRM Online are all
examples of SaaS software. SaaS requires the least amount of
management by the cloud customer. The cloud provider is responsible for
managing everything except data, devices, accounts, and identities.
For all cloud deployment types you, the cloud customer, own your data and identities.
You're responsible for protecting the security of your data and identities, and
on-premises resources including mobile devices, PCs, printers, and more.
The benefit of the shared responsibility model is that organizations are clear about their
responsibilities, and those of the cloud provider.
While the goals of a cybersecurity strategy are to preserve the confidentiality, integrity,
and availability of systems, networks, applications, and data; it's the goal of
cybercriminals to disrupt these goals. Microsoft’s portfolio includes the solutions and
technologies to enable organizations to deliver on the goals of the CIA triad.
Describe the Zero Trust model
Zero Trust assumes everything is on an open and untrusted network, even resources
behind the firewalls of the corporate network. The Zero Trust model operates on the
principle of “trust no one, verify everything.”
Attackers’ ability to bypass conventional access controls is ending any illusion that
traditional security strategies are sufficient. By no longer trusting the integrity of the
corporate network, security is strengthened.
In the Zero Trust model, all elements work together to provide end-to-end security.
These six elements are the foundational pillars of the Zero Trust model:
● Identities may be users, services, or devices. When an identity attempts to
access a resource, it must be verified with strong authentication, and follow
least privilege access principles.
● Devices create a large attack surface as data flows from devices to
on-premises workloads and the cloud. Monitoring devices for health and
compliance is an important aspect of security.
● Applications are the way that data is consumed. This includes discovering
all applications being used, sometimes called Shadow IT because not all
applications are managed centrally. This pillar also includes managing
permissions and access.
● Data should be classified, labeled, and encrypted based on its attributes.
Security efforts are ultimately about protecting data, and ensuring it remains
safe when it leaves devices, applications, infrastructure, and networks that
the organization controls.
● Infrastructure, whether on-premises or cloud based, represents a threat
vector. To improve security, you assess for version, configuration, and JIT
access, and use telemetry to detect attacks and anomalies. This allows you
to automatically block or flag risky behavior and take protective actions.
● Networks should be segmented, including deeper in-network micro
segmentation. Also, real-time threat protection, end-to-end encryption,
monitoring, and analytics should be employed.
A security strategy that employs the three principles of the Zero Trust model across the
six foundational pillars helps companies deliver and enforce security across their
organization.
There are two top-level types of encryption: symmetric and asymmetric. Symmetric
encryption uses the same key to encrypt and decrypt the data. Asymmetric encryption
uses a public key and private key pair. Either key can encrypt data, but the key used to
encrypt can’t be used to decrypt encrypted data. To decrypt, you need a paired key. For
example, if the public key is used to encrypt, then only the corresponding private key
can be used to decrypt. Asymmetric encryption is used for things such accessing sites
on the internet using the HTTPS protocol and electronic data signing solutions.
Encryption may protect data at rest, or in transit. For additional information on the
concepts of cryptography, refer to Describe concepts of cryptography
Data at rest is the data that's stored on a physical device, such as a server. It may be
stored in a database or a storage account but, regardless of where it's stored,
encryption of data at rest ensures the data is unreadable without the keys and secrets
needed to decrypt it.
If an attacker obtained a hard drive with encrypted data and didn't have access to the
encryption keys, they would be unable to read the data.
Encryption for data in transit
Data in transit is the data moving from one location to another, such as across the
internet or through a private network. Secure transfer can be handled by several
different layers. It could be done by encrypting the data at the application layer before
sending it over a network. HTTPS is an example of encryption in transit.
Encrypting data in transit protects it from outside observers and provides a mechanism
to transmit data while limiting the risk of exposure.
A common use case for encryption of data in use involves securing data in
nonpersistent storage, such as RAM or CPU caches. This can be achieved through
technologies that create an enclave (think of this as a secured lockbox) that protects the
data and keeps data encrypted while the CPU processes the data.
Hashing
Hashing uses an algorithm to convert text to a unique fixed-length value called a hash.
Each time the same text is hashed using the same algorithm, the same hash value is
produced. That hash can then be used as a unique identifier of its associated data.
Hashing is different to encryption in that it doesn't use keys, and the hashed value isn't
subsequently decrypted back to the original.
Hashing is often used to store passwords. When a user enters their password, the
same algorithm that created the stored hash creates a hash of the entered password.
This is compared to the stored hashed version of the password. If they match, the user
has entered their password correctly. This is more secure than storing plain text
passwords, but hashing algorithms are also known to hackers. Because hash functions
are deterministic (the same input produces the same output), hackers can use
brute-force dictionary attacks by hashing the passwords. For every matched hash, they
know the actual password. To mitigate this risk, passwords are often “salted”. This
refers to adding a fixed-length random value to the input of hash functions to create
unique hashes for same input.
Describe governance, risk, and
compliance (GRC) concepts
Governance
Risk
Compliance
It's important to note that compliance is not the same as security. But, security should
be considered when building a compliance plan as effective security is frequently a
compliance requirement. Compliance requires only that the legally mandated minimum
standards are met whereas data security covers all the processes, procedures, and
technologies that define how you look after sensitive data and guard against breaches.