Azure security, privacy, and compliance

Whiteboard design session student guide

October 2018

Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.

Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.

The names of manufacturers, products, or URLs are provided for informational purposes only, and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third-party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein.

© 2018 Microsoft Corporation. All rights reserved.

Microsoft and the trademarks listed at https://www.microsoft.com/en-us/legal/intellectualproperty/Trademarks/Usage/General.aspx are trademarks of the Microsoft group of companies. All other trademarks are the property of their respective owners.

Contents

Azure security, privacy, and compliance whiteboard design session student guide

Abstract and learning objectives

In this whiteboard design session, you will work with a group to design an end-to-end solution that leverages many of Microsoft Azure’s security features.

At the end of this session, you will be better able to design and recommend solutions that help organizations properly secure their cloud-based applications while protecting their sensitive data.

Step 1: Review the customer case study

Outcome

Analyze your customer’s needs.

Timeframe: 15 minutes

Directions: With all participants in the session, the facilitator/SME presents an overview of the customer case study along with technical tips. 1. Meet your table participants and trainer. 2. Read all of the directions for steps 1–3 in the student guide. 3. As a table team, review the following customer case study.

Customer situation

Contoso Ltd is a multinational corporation, headquartered in the United States that provides insurance solutions worldwide. Its products include accident and health insurance, life insurance, travel, home, and auto coverage. Contoso manages data collection services by sending mobile agents directly to the insured to gather information as part of the data collection process for claims from an insured individual. These mobile agents are based all over the world and are residents of the region in which they work. Mobile agents are managed remotely through regional corporate offices.

The fundamental workflow for Contoso is as follows:

  1. Contoso support staff process the incoming claims (which sometimes requires scrubbing) through the corporate website, and create a work order assigned to a mobile agent in the region of the insured.

  2. Mobile agents log in daily to the data collection website and retrieve the list of insured customers they are responsible for visiting. They communicate directly with the insured, schedule a time for a home visit, and ultimately during that visit collect information and input it into the data collection website. The sensitive information collected always includes Personally Identifiable Information (PII) and may include Protected Health Information (PHI) about the insured customer. This data is sent over the public Internet securely over TLS (SSL).

  3. When the data collection for an insured is completed, the mobile agent marks the task completed so that the corporate system can process those results.

  4. Support staff processes complete work orders and submits results through the corporate website requiring another transfer of sensitive data.

Contoso currently hosts their systems at co-locations facilities within each geopolitical region and manages all IT operations for the systems. In the United States, they have achieved SOC 1 and SOC 2 compliance and follow required HIPAA regulations to protect PHI. Because of the new European GDPR laws, Contoso must evaluate their computing environments for compliance gaps. Contoso has concerns about maintaining their SOC 2 certification and HIPAA compliance with respect to moving to Azure. They would like to specifically address concerns about regional issues of data sovereignty for sensitive data within the context of the GDPR and want to ensure that if they move to Azure, they will be able to continue to have isolation between components.

In addition to the GDPR compliance requirements, they are expecting significant growth within the United States and abroad. They foresee the need to scale their system and are exploring moving their web applications (corporate and data collection web apps) to Microsoft Azure via lift and shift and other applicable methods to simplify some of the operations management overhead and associated costs, beginning with their U.S. data center and then those in Europe. They would also like to ensure that the corporate website and external facing web apps are sufficiently isolated.

Jack Tradewinds, the CIO of Contoso Ltd, has heard a great deal of positive news about Azure and its progress in terms of security and compliance. He would like to learn more about the security features and if they can move some of their data and applications away from their on-premises datacenter. Given his long-standing relationship with Microsoft, he would like to see if Azure can meet his needs.

Customer needs

  1. Assure data privacy and protection across all aspects of the system; in transit and at rest.

  2. Address issues of data sovereignty with respect to the location of sensitive data.

  3. Ability to scale as the company grows and system load increases.

  4. Contain hosting and operational costs associated with running the system.

  5. Enable method to continually review and assign legal compliance tasks to the appropriate individuals and provide a compliance reporting ability for Azure resources.

  6. Limit access to the corporate site to users on the Contoso domain, and continue to support VPN access.

  7. Extract all web applications that have configuration or embedded connection strings to a more secure implementation.

  8. Migrate current database applications to Azure PaaS solution with the appropriate data backup features implemented to prevent catastrophic data loss due to intentional or unintentional acts.

  9. Implement all security best practices on the migrated databases such as encryption at rest and during transport as well as ensure that sensitive data is not exposed to non-admin database users and applications.

  10. Ensure network segregation between Azure admin and the lift and shifted web and database tiers.

  11. Enable logging across all components (identity, virtual network, virtual machine, web, and database) to support an all-encompassing monitoring solution.

  12. Ensure that Azure admins utilize best practices when accessing the Azure virtual machine resources and that all logins are logged for identity theft analysis activities.

  13. Ensure ease of use by syncing appropriate admin username and passwords for on-premises and cloud resources.

  14. Ensure that only authorized users can access specific Azure resources when logged into the Azure Portal.

  15. Setup auditing such that software installs are monitored across Azure virtual machine resources.

  16. When specific security events are detected (such as a port scan), allow for the execution of actions to remediate, start the investigative process or prevent further information leakage or damage.

Customer objections

  1. Can Azure support the lift and shift of their web and database applications?

  2. Admins are worried that they won’t have the bandwidth to perform deployments of the corporate website and other supporting web applications.

  3. Can Azure help contain costs for minimally used costly production and development resources?

  4. Does Azure support the ability to allow VPN connections to specific resources?

  5. Can Microsoft employees or government entities access our data?

  6. How does Azure protect against threats?

  7. Does Azure allow enough granular RBAC controls to meet our least privilege needs?

  8. Is Azure virtual networking flexible enough to meet our requirements?

  9. Can Azure supplement on-premises and third-party SIEM systems for auditing and compliance tasks?

  10. What certifications does Azure have and can Azure hosted applications meet the US and European compliance goals?

  11. Is Azure flexible enough to support data sovereignty needs and issues like those referenced in GDPR articles?

  12. How can we ensure continued SOC 1 and SOC 2 compliance?

  13. Does Azure permit penetration testing as a part of a security assessment?

Infographic for common scenarios

This Infographic shows an example of a generic implementation of various security Azure technologies in action that can be used as a reference in your design:

Security and Compliance infographic This is an example of a generic implementation of various Azure security technologies.
Security and Compliance infographic This is an example of a generic implementation of various Azure security technologies.

Step 2: Design a proof of concept solution

Outcome

Design a solution and prepare to present the solution to the target customer audience in a 15-minute chalk-talk format.

Timeframe: 60 minutes

Business needs

Directions: With all participants at your table, answer the following questions and list the answers on a flip chart:

  1. To whom should you present this solution? Who is your target customer audience? Who are the decision makers?

  2. What customer business needs do you need to address with your solution?

Design

Directions: With all participants at your table, respond to the following questions on a flip chart.

High-level architecture

Briefly sketch-out and propose a high-level solution that meets the customer’s business and technical needs and mitigates their objections. For this workshop, you may choose from the following technologies (you may not need all of them in the correct solution):

  1. Azure Virtual Machines and Networks, Network Security Groups

  2. Virtual Private Networks (Point to Point, Site to Site) and Express Route

  3. Azure Web Apps

  4. Azure SQL DB Security Features (Threat Detection, TDE, Column Level Encryption, etc.)

  5. Azure Storage Encryption

  6. SQL Server 2017 in a VM

  7. Azure Security Center, Azure Monitor and Log Analytics

  8. Azure Key Vault

  9. Microsoft Azure Active Directory (Connect, IAM, etc.)

  10. Microsoft Intune

Securing Sensitive Data

On your diagram, indicate how you would secure any sensitive data at rest and in transit with respect to the following:

  1. Web Tier (corporate vs. data collection)

  2. Database Tier

  3. Network, Internal, and External Communications

Ensuring auditing and compliance

Describe how you will use Azure features to ensure the following:

  1. How will you monitor and audit VM access?

  2. How will you monitor and audit network traffic across Virtual Networks?

  3. How will you monitor and audit Azure SQL?

  4. Create custom alerts and execute remediation and investigation activities on detection?

  5. What tools would you setup surface audit and compliance reporting to IT Executives?

Ensuring availability and business continuity

Describe how you would ensure that the following resources would be available in the unlikely event of an attack or intentional or unintentional data loss?

  1. Virtual Machines

  2. Azure SQL

Ensuring protection

Describe how you would secure each Azure resource from internal and external attacks:

  1. Ensure that admin credentials are sufficiently protected and monitored

  2. Prevent admins from causing intended and unintended harm to the environment such as unapproved software installs

  3. Admins access Azure resources from secured and/or compliant corporate assets and do not directly access any production Virtual Machines from the internet

Prepare

Directions: With all participants at your table:

  1. Identify any customer needs that are not addressed with the proposed solution.

  2. Identify the benefits of your solution.

  3. Determine how you will respond to the customer’s objections.

Prepare a 15-minute chalk-talk style presentation to the customer.

Step 3: Present the solution

Outcome

Present a solution to the target customer audience in a 15-minute chalk-talk format.

Timeframe: 30 minutes

Presentation

Directions: 1. Pair with another table.

  1. One table is the Microsoft team and the other table is the customer.

  2. The Microsoft team presents their proposed solution to the customer.

  3. The customer makes one of the objections from the list of objections.

  4. The Microsoft team responds to the objection.

  5. The customer team gives feedback to the Microsoft team.

  6. Tables switch roles and repeat Steps 2–6.

Wrap-up

Timeframe: 15 minutes

Directions: Tables reconvene with the larger group to hear the facilitator/SME share the preferred solution for the case study.

Additional References

Description Links
Azure Virtual Machines https://docs.microsoft.com/en-us/azure/virtual-machines/windows/
Azure Virtual Networks https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-overview
Network Security Groups https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-nsg
Azure VPN Gateway https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-howto-site-to-site-resource-manager-portal
Azure Web Apps https://docs.microsoft.com/en-us/azure/app-service/
Azure SQL https://docs.microsoft.com/en-us/azure/sql-database/
Azure SQL documentation, TDE, data masking and encryption at rest https://docs.microsoft.com/en-us/azure/sql-database/sql-database-always-encrypted-azure-key-vault
Express Route https://docs.microsoft.com/en-us/azure/expressroute/expressroute-introduction
Azure Storage Encryption https://docs.microsoft.com/en-us/azure/storage/common/storage-service-encryption
SQL Server (IaaS) https://docs.microsoft.com/en-us/azure/virtual-machines/windows/sql/virtual-machines-windows-sql-server-iaas-overview
Azure Identity Access Management (IAM) https://docs.microsoft.com/en-us/azure/active-directory/role-based-access-control-configure
Azure Monitor and Log Analytics https://docs.microsoft.com/en-us/azure/monitoring-and-diagnostics/monitoring-overview
Azure Key Vault https://docs.microsoft.com/en-us/azure/key-vault/
Microsoft Azure Active Directory Connect https://docs.microsoft.com/en-us/azure/active-directory/connect/active-directory-aadconnectsync-whatis
Lift and Shift (IaaS) https://docs.microsoft.com/en-us/dotnet/standard/modernize-with-azure-and-containers/lift-and-shift-existing-apps-azure-iaas
Microsoft Intune https://docs.microsoft.com/en-us/intune
Conditional Access https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-azure-portal
Azure, Office 365, Azure SQL and Cloud App references https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-no-modern-authentication
SQL Database Conditional Access https://docs.microsoft.com/en-us/azure/sql-database/sql-database-conditional-access
Azure AD Conditional Access Technical Reference https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-technical-reference
Advanced Threat Analytics https://docs.microsoft.com/en-us/advanced-threat-analytics
Microsoft Cloud App Security https://docs.microsoft.com/en-us/cloud-app-security
Compliance Commitments http://azure.microsoft.com/en-us/support/trust-center/services/
Azure Trust Center http://azure.microsoft.com/en-us/support/trust-center/