Data security in
cloud computing
Agenda
introduction
Cloud Security Challenges
and solutions
Data Security in Azure
Emerged Teconlogies &
Cloud computing
• Machine learning and artificial intelligence (AI)
• Blockchain
• Internet of Things (IoT)
• Containers
• Homomorphic encryption
On-Prem Cloud
Responsible for security end to end Shared security responsibility
Disconnected security tools; not Interconnected, API-driven On-Prem
typically driven by APIs security tools
vs
Static resources, perimeter-based
security boundaries
Dynamic resources, ephemeral
security boundaries cloud
Security
Rarely automated Can be highly automated
IT-driven Developer-driven
Segmentation of cloud security responsibilities
Software-as-a-service (SaaS) — Customers are responsible for securing their data
and user access.
Platform-as-a-service (PaaS) — Customers are responsible for securing their data,
user access, and applications.
Infrastructure-as-a-service (IaaS) — Customers are responsible for securing their
data, user access, applications, operating systems, and virtual network traffic.
Visibility into cloud data
Control over cloud data
Cloud Access to cloud data and applications
Compliance
security Cloud-native breaches
challenges Misconfiguration
Disaster recovery
Insider threats
• Single sign-on
• Reverse proxy
• Multi-Factor Authentication
Azure • Azure role-based access control (Azure RBAC)
• Security monitoring, alerts, and machine learning-
identity based reports
• Consumer identity and access management
management • Device registration
• Privileged identity management
security • Identity protection
• Hybrid identity management/Azure AD connect
• Azure AD access reviews
Encryption of data in transit
• Data-link Layer encryption in Azure
• TLS encryption in Azure
• Azure Storage transactions
• In-transit encryption in VMs
• In-transit encryption in Data Lake
Encryption of data at rest
• Azure encryption models
• Azure disk encryption
• Azure Storage Service Encryption
• Encryption of data at rest with Azure SQL Database
Azure Key Vault
• Azure Key Vault security
• Key Vault roles
Example
Threat
Conclusion
Thank you