Sunday, November 22, 2015

Course Review: Security in a Cloud-Enabled World

Just recently released, I decided to spend some time watching "Security in a Cloud-Enabled World" on MVA.

Overall I thought it was a pretty good course, although not what I expected it to be.  The course was broken down into 2 sections, the first focusing on Microsoft's role as a Trusted cloud provider and the second being a list of roadmaps that should be considered when clients chose a cloud provider to host their solutions.

Here are a couple of points I made about the course:

1)  It is good to get validated on what I am currently doing.  When I engage as an SA on a project, I review many aspects of the roadmaps outlined in this course.  This is good validation that I am on the right path.

2)  If you want to skip several hours of boring content, just read the poster and do the quizzes. 

3)  I am not a big fan of using "user reviews" when judging how secure a cloud provider or solution is.  In the second module, many references to how users perceived the security/availability of their solutions in the cloud.  Most, as you could expect, were favorable of the cloud.  While interesting material, it has been well documented that security is a lemons market.  While I am not saying that Azure's security stance is bad, I do think that ultimately it is very difficult for customers or end users to make even an educated guess on the subject.

4)  There was an inherent lack of focus on how to do things in Azure.  While I guess that wasn't the point of the course, I think that this material needs to be covered somewhere.  In one module, the presenter talks at length about access to the administrative consoles.  Some info is provided on MFA and about how to configure subscriptions for security, but no info is presented on how to audit these admin accounts, control these admin accounts, tie these admin accounts to PAM toolsets, etc.  I think there is a lot of room for content like this.

Overall it was a good course.  It was well structured, and provides a good framework for review when designing out cloud solutions.

1 comment:

  1. Data Encryption and Privacy
    Encryption: Encrypt data both in transit and at rest using strong encryption standards (e.g., AES-256).
    Key Management: Implement secure key management practices to protect encryption keys from unauthorized access.
    Data Residency: Ensure compliance with data residency regulations and choose cloud providers that offer data sovereignty options.

    Network Security Projects For Final Year Students

    2. Identity and Access Management (IAM)
    Multi-factor Authentication (MFA): Enforce MFA for accessing cloud services to add an extra layer of security.
    Least Privilege: Implement least privilege access controls to limit user and application permissions based on job roles.
    Identity Federation: Integrate with identity providers (IdPs) using standards like SAML or OAuth for centralized authentication and authorization.
    3. Network Security
    Virtual Private Cloud (VPC): Use VPCs to logically isolate networks and control inbound and outbound traffic.
    Firewalls and Security Groups: Configure network security groups and firewalls to restrict access to cloud resources based on IP addresses and protocols.
    Intrusion Detection and Prevention Systems (IDPS): Implement IDPS to detect and mitigate network threats in real-time.

    ReplyDelete